IOCReport

loading gif

Files

File Path
Type
Category
Malicious
ORDER.xlsx
CDFV2 Encrypted
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
downloaded
malicious
C:\Users\user\Desktop\~$ORDER.xlsx
data
dropped
malicious
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\139565FE.png
PNG image data, 613 x 80, 8-bit/color RGBA, non-interlaced
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\19629329.png
PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\199B2685.png
PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\46B80892.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 150x150, segment length 16, baseline, precision 8, 1275x1650, frames 3
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7B0761E7.png
PNG image data, 684 x 477, 8-bit/color RGBA, non-interlaced
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\844FB223.jpeg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\AB00B8D.png
PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B06673B1.png
PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B5220394.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 0x0, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=2], baseline, precision 8, 474x379, frames 3
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B706F95.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BFF102BC.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 0x0, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=2], baseline, precision 8, 474x379, frames 3
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C1049B6B.jpeg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D04FC42A.jpeg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 150x150, segment length 16, baseline, precision 8, 1275x1650, frames 3
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D09B8670.jpeg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames 3
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DE70FDC8.jpeg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames 3
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\ED60BCE4.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EFA4CF16.png
PNG image data, 613 x 80, 8-bit/color RGBA, non-interlaced
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F07481F.png
PNG image data, 684 x 477, 8-bit/color RGBA, non-interlaced
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\mso4F5B.tmp
PC bitmap, Windows 3.x format, 20 x 20 x 24
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\mso4F5C.tmp
PC bitmap, Windows 3.x format, 20 x 20 x 24
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\mso4F5D.tmp
PC bitmap, Windows 3.x format, 20 x 20 x 24
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\msoFB8E.tmp
PC bitmap, Windows 3.x format, 20 x 20 x 24
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\msoFB8F.tmp
PC bitmap, Windows 3.x format, 20 x 20 x 24
dropped
clean
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\msoFBBF.tmp
PC bitmap, Windows 3.x format, 20 x 20 x 24
dropped
clean
There are 18 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
malicious
C:\Users\Public\vbc.exe
'C:\Users\Public\vbc.exe'
malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
clean

URLs

Name
IP
Malicious
http://37.0.11.217/WEALTHYREM_ecIAnTt143.bin
malicious
http://212.192.246.25/reverse/vbc.exe
212.192.246.25
malicious
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
unknown
clean
http://www.windows.com/pctv.
unknown
clean
http://investor.msn.com
unknown
clean
http://www.msnbc.com/news/ticker.txt
unknown
clean
http://www.icra.org/vocabulary/.
unknown
clean
http://windowsmedia.com/redir/services.asp?WMPFriendly=true
unknown
clean
http://www.hotmail.com/oe
unknown
clean
http://www.day.com/dam/1.0
unknown
clean
http://investor.msn.com/
unknown
clean
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
212.192.246.25
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
f}*
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
MTTT
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
ReviewToken
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
2F1FD
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
FontCachePath
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
VBAFiles
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
m-+
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
342AB
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
34E8D
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Max Display
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 1
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Max Display
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 1
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 2
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 3
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 4
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 5
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 6
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 7
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 8
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 9
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 10
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 11
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 12
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 13
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 14
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 15
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 16
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 17
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 18
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 19
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 20
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Item 21
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
LastPurgeTime
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
1033
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
1033
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
EXCELFiles
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
ProductFiles
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
ProductFiles
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Name
clean
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
342AB
clean
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
EquationEditorFilesIntl_1033
clean
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
SavedLegacySettings
clean
There are 33 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
360000
unkown
page execute and read and write
malicious
400000
unkown image
page readonly
clean
10000
unkown image
page read and write
clean
C0000
unkown image
page readonly
clean
7FFFFFC2000
unkown image
page readonly
clean
147000
heap default
page read and write
clean
A3E000
unkown
page read and write
clean
7EFC0000
unkown image
page readonly
clean
140000
heap default
page read and write
clean
421000
unkown image
page readonly
clean
50F000
unkown
page read and write
clean
3A0000
heap private
page read and write
clean
7FFFFFB2000
unkown image
page readonly
clean
BD000
unkown
page read and write
clean
7FFFFFD0000
unkown image
page readonly
clean
930000
unkown image
page readonly
clean
220000
unkown
page execute read
clean
700000
heap private
page read and write
clean
280000
heap private
page read and write
clean
790000
heap private
page read and write
clean
AC0000
unkown image
page readonly
clean
401000
unkown image
page execute read
clean
186000
heap default
page read and write
clean
574000
heap default
page read and write
clean
400000
unkown image
page readonly
clean
2E6000
unkown
page read and write
clean
3260000
unkown image
page readonly
clean
920000
unkown image
page readonly
clean
7EFC0000
unkown image
page readonly
clean
2D0000
heap default
page read and write
clean
7FFFFFC0000
unkown image
page readonly
clean
400000
unkown image
page readonly
clean
7FFFFFD0000
unkown image
page readonly
clean
7EFB2000
unkown image
page readonly
clean
3447000
unkown image
page readonly
clean
464000
heap private
page read and write
clean
7EFC2000
unkown image
page readonly
clean
401000
unkown image
page execute read
clean
28A000
heap private
page read and write
clean
2050000
unkown
page read and write
clean
2040000
heap private
page read and write
clean
7FFFFFB0000
unkown image
page readonly
clean
2C0000
unkown image
page readonly
clean
3A4000
heap private
page read and write
clean
7EFC2000
unkown image
page readonly
clean
7EFE0000
unkown image
page readonly
clean
18B000
heap default
page read and write
clean
550000
heap default
page read and write
clean
7FFFFFC0000
unkown image
page readonly
clean
17D000
heap default
page read and write
clean
430000
unkown image
page readonly
clean
28FB000
heap private
page read and write
clean
7EFD0000
unkown image
page readonly
clean
28F0000
heap private
page read and write
clean
28F8000
heap private
page read and write
clean
240000
unkown image
page read and write
clean
30000
unkown image
page readonly
clean
10000
unkown image
page read and write
clean
421000
unkown image
page readonly
clean
460000
heap private
page read and write
clean
7EFD0000
unkown image
page readonly
clean
557000
heap default
page read and write
clean
28F4000
heap private
page read and write
clean
41C000
unkown image
page read and write
clean
7EFE0000
unkown image
page readonly
clean
AEF000
unkown
page read and write
clean
7EFB2000
unkown image
page readonly
clean
3C2000
heap private
page read and write
clean
7FFFFFB0000
unkown image
page readonly
clean
230000
unkown image
page readonly
clean
7FFFFFC2000
unkown image
page readonly
clean
2A8000
heap private
page read and write
clean
41F000
unkown image
page read and write
clean
7EFDF000
unkown
page read and write
clean
2B0000
unkown
page read and write
clean
7EFB0000
unkown image
page readonly
clean
260000
unkown image
page readonly
clean
18C000
unkown
page read and write
clean
20000
unkown
page read and write
clean
7FFFFFB2000
unkown image
page readonly
clean
650000
unkown
page read and write
clean
7EFB0000
unkown image
page readonly
clean
7A0000
unkown image
page readonly
clean
88000
unkown
page read and write
clean
190000
unkown image
page readonly
clean
There are 75 hidden memdumps, click here to show them.