IOCReport

loading gif

Files

File Path
Type
Category
Malicious
Invoice Scan Copy.xlsx
CDFV2 Encrypted
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\bin[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
downloaded
malicious
C:\Users\user\Desktop\~$Invoice Scan Copy.xlsx
data
dropped
malicious
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1A302B6C.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 0x0, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=2], baseline, precision 8, 474x379, frames 3
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2768058F.png
PNG image data, 684 x 477, 8-bit/color RGBA, non-interlaced
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\38D58F94.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3FB47DA1.png
PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\43E1DB19.png
PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\651DD978.jpeg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames 3
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6AF1872E.png
PNG image data, 613 x 80, 8-bit/color RGBA, non-interlaced
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6CD94093.jpeg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\760C7575.png
PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A06E1BDB.jpeg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BD13AC20.jpeg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames 3
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C34B3C7D.png
PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CD20E05A.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 150x150, segment length 16, baseline, precision 8, 1275x1650, frames 3
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D5351646.png
PNG image data, 613 x 80, 8-bit/color RGBA, non-interlaced
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DD9E3157.png
PNG image data, 684 x 477, 8-bit/color RGBA, non-interlaced
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F90E5EC2.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 150x150, segment length 16, baseline, precision 8, 1275x1650, frames 3
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FD764244.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 0x0, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=2], baseline, precision 8, 474x379, frames 3
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FF814285.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
clean
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
malicious
C:\Users\Public\vbc.exe
'C:\Users\Public\vbc.exe'
malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
clean

URLs

Name
IP
Malicious
http://192.3.141.149/monday/bin.exe
192.3.141.149
malicious
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
unknown
clean
http://www.icra.org/vocabulary/.
unknown
clean
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
unknown
clean
http://www.day.com/dam/1.0
unknown
clean

IPs

IP
Domain
Country
Malicious
192.3.141.149
unknown
United States
malicious

Registry

Path
Value
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
!r$
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
MTTT
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
ReviewToken
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
2F8EF
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
FontCachePath
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
VBAFiles
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
j $
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
349FB
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
35235
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Max Display
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 1
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Max Display
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 1
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 2
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 3
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 4
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 5
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 6
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 7
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 8
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 9
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 10
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 11
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 12
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 13
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 14
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 15
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 16
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 17
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 18
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 19
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 20
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 21
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
LastPurgeTime
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
1033
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
1033
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
EXCELFiles
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
ProductFiles
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
ProductFiles
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Name
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
349FB
clean
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
EquationEditorFilesIntl_1033
clean
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
SavedLegacySettings
clean
There are 33 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3F0000
unkown
page execute and read and write
malicious
7FFFFFB2000
unkown image
page readonly
clean
7EFE0000
unkown image
page readonly
clean
20000
unkown
page read and write
clean
10000
unkown image
page read and write
clean
7EFB2000
unkown image
page readonly
clean
9EF000
unkown
page read and write
clean
A8000
heap default
page read and write
clean
2A0000
heap private
page read and write
clean
7EFB0000
unkown image
page readonly
clean
7FFFFFB2000
unkown image
page readonly
clean
324000
heap private
page read and write
clean
30000
unkown image
page readonly
clean
400000
unkown image
page readonly
clean
320000
heap private
page read and write
clean
7FFFFFD0000
unkown image
page readonly
clean
300000
unkown image
page read and write
clean
790000
unkown image
page readonly
clean
320000
heap private
page read and write
clean
360000
unkown
page read and write
clean
2480000
heap private
page read and write
clean
418000
unkown image
page readonly
clean
7FFFFFD0000
unkown image
page readonly
clean
2807000
unkown image
page readonly
clean
A6000
heap default
page read and write
clean
7FFFFFB0000
unkown image
page readonly
clean
710000
unkown image
page readonly
clean
418000
unkown image
page readonly
clean
330000
unkown
page read and write
clean
54E000
unkown
page read and write
clean
400000
unkown image
page readonly
clean
60000
heap default
page read and write
clean
7EFC0000
unkown image
page readonly
clean
2484000
heap private
page read and write
clean
400000
unkown image
page readonly
clean
7EFE0000
unkown image
page readonly
clean
2620000
unkown image
page readonly
clean
89000
unkown
page read and write
clean
410000
unkown image
page execute read
clean
401000
unkown image
page execute read
clean
2B0000
heap private
page read and write
clean
40000
unkown image
page readonly
clean
7EFD0000
unkown image
page readonly
clean
9D000
heap default
page read and write
clean
497000
heap default
page read and write
clean
220000
heap default
page read and write
clean
366000
unkown
page read and write
clean
417000
unkown image
page read and write
clean
410000
unkown image
page execute read
clean
25E0000
heap private
page read and write
clean
2E0000
unkown image
page readonly
clean
7FFFFFC0000
unkown image
page readonly
clean
347000
heap private
page read and write
clean
590000
unkown image
page readonly
clean
2F0000
unkown image
page readonly
clean
7EFB0000
unkown image
page readonly
clean
32A000
heap private
page read and write
clean
67F000
unkown
page read and write
clean
7FFFFFC2000
unkown image
page readonly
clean
24C0000
unkown image
page readonly
clean
7EFC0000
unkown image
page readonly
clean
2D0000
unkown image
page readonly
clean
7EFD0000
unkown image
page readonly
clean
25E8000
heap private
page read and write
clean
920000
unkown image
page readonly
clean
67000
heap default
page read and write
clean
24A2000
heap private
page read and write
clean
2C0000
unkown
page execute read
clean
190000
unkown image
page readonly
clean
7FFFFFC2000
unkown image
page readonly
clean
7EFDF000
unkown
page read and write
clean
7FFFFFC0000
unkown image
page readonly
clean
4B4000
heap default
page read and write
clean
BAF000
unkown
page read and write
clean
18C000
unkown
page read and write
clean
7EFC2000
unkown image
page readonly
clean
7FFFFFB0000
unkown image
page readonly
clean
401000
unkown image
page execute read
clean
780000
heap private
page read and write
clean
7EFB2000
unkown image
page readonly
clean
24D000
unkown
page read and write
clean
7EFC2000
unkown image
page readonly
clean
490000
heap default
page read and write
clean
10000
unkown image
page read and write
clean
1D20000
unkown
page read and write
clean
There are 75 hidden memdumps, click here to show them.