IOC Report

loading gif

Files

File Path
Type
Category
Malicious
_2201S_BUSAN_HOCHIMINH_.xlsx
CDFV2 Encrypted
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\.win32[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
downloaded
malicious
C:\Users\user\AppData\Local\Temp\xmtxpy.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Desktop\~$_2201S_BUSAN_HOCHIMINH_.xlsx
data
dropped
malicious
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1582FF20.png
PNG image data, 139 x 180, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3E8BE616.png
PNG image data, 139 x 180, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4AB951BC.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\611F4629.png
PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\62ED731F.png
PNG image data, 139 x 180, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\902EBCC8.png
PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\92A0FADB.png
PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9C018985.png
PNG image data, 150 x 150, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9D560E8D.png
PNG image data, 139 x 180, 8-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A4FBAD23.png
PNG image data, 150 x 150, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B2EFEB2A.jpeg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 160x160, frames 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DFF43294.jpeg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 160x160, frames 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F6DBF9C2.png
PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\2v0cucir72x
data
dropped
C:\Users\user\AppData\Local\Temp\npotbzd
data
dropped
C:\Users\user\AppData\Local\Temp\nsk9C03.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\~DF4C8DE484D23B018C.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DF4CA76D9E63A218F3.TMP
CDFV2 Encrypted
dropped
C:\Users\user\AppData\Local\Temp\~DF77B28016FA4D6C0D.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFAC55491B3B868135.TMP
data
dropped
C:\Users\user\AppData\Roaming\CF97F5\5879F5.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\CF97F5\5879F5.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-966771315-3019405637-367336477-1006\f554348b930ff81505ce47f7c6b7d232_ea860e7a-a87f-4a88-92ef-38f744458171
data
dropped
There are 18 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Users\Public\vbc.exe
"C:\Users\Public\vbc.exe"
malicious
C:\Users\user\AppData\Local\Temp\xmtxpy.exe
C:\Users\user\AppData\Local\Temp\xmtxpy.exe C:\Users\user\AppData\Local\Temp\npotbzd
malicious
C:\Users\user\AppData\Local\Temp\xmtxpy.exe
C:\Users\user\AppData\Local\Temp\xmtxpy.exe C:\Users\user\AppData\Local\Temp\npotbzd
malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding

URLs

Name
IP
Malicious
http://198.46.132.195/windowSSH/.win32.exe
198.46.132.195
malicious
http://kbfvzoboss.bid/alien/fre.php
malicious
http://alphastand.win/alien/fre.php
malicious
http://alphastand.trade/alien/fre.php
malicious
http://alphastand.top/alien/fre.php
malicious
http://asiaoil.bar//bobby/five/fre.php
172.67.197.66
malicious
http://nsis.sf.net/NSIS_Error
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.ibsensoftware.com/
unknown

Domains

Name
IP
Malicious
asiaoil.bar
172.67.197.66
malicious

IPs

IP
Domain
Country
Malicious
198.46.132.195
unknown
United States
malicious
104.21.49.244
unknown
United States
malicious
172.67.197.66
asiaoil.bar
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
3"-
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\2DAF4
2DAF4
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
**-
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\326B3
326B3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\3365C
3365C
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 21
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\326B3
326B3
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
There are 30 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
130000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
8A1000
unkown
page execute read
6CD000
trusted library allocation
page read and write
2619000
trusted library allocation
page read and write
720000
trusted library allocation
page read and write
8C2000
unkown
page readonly
320000
heap
page read and write
18B000
stack
page read and write
24FE000
stack
page read and write
8A0000
unkown
page readonly
B11000
heap
page read and write
8B9000
unkown
page readonly
1E60000
heap
page read and write
24D7000
trusted library allocation
page read and write
24D4000
trusted library allocation
page read and write
877000
heap
page read and write
8A1000
unkown
page execute read
2500000
trusted library allocation
page read and write
401000
unkown
page execute read
37E000
stack
page read and write
8A1000
unkown
page execute read
5F0000
trusted library allocation
page read and write
2830000
trusted library allocation
page read and write
23D0000
trusted library allocation
page read and write
8A0000
unkown
page readonly
2540000
trusted library allocation
page read and write
8BE000
unkown
page write copy
2630000
trusted library allocation
page read and write
8B9000
unkown
page readonly
2830000
trusted library allocation
page read and write
23E0000
trusted library allocation
page read and write
AC7000
heap
page read and write
24D7000
trusted library allocation
page read and write
5F0000
trusted library allocation
page read and write
24D1000
trusted library allocation
page read and write
8A0000
unkown
page readonly
8B9000
unkown
page readonly
23E0000
trusted library allocation
page read and write
870000
heap
page read and write
409000
unkown
page read and write
421000
unkown
page read and write
8BE000
unkown
page write copy
8B9000
unkown
page readonly
302000
heap
page read and write
8A1000
unkown
page execute read
6CA000
trusted library allocation
page read and write
8A1000
unkown
page execute read
24D4000
trusted library allocation
page read and write
8A1000
unkown
page execute read
5F0000
trusted library allocation
page read and write
8A1000
unkown
page execute read
326000
heap
page read and write
24D7000
trusted library allocation
page read and write
8A0000
unkown
page readonly
8C2000
unkown
page readonly
8C2000
unkown
page readonly
740000
heap
page read and write
6A0000
heap
page read and write
8A1000
unkown
page execute read
8C2000
unkown
page readonly
24E0000
trusted library allocation
page read and write
8CF000
heap
page read and write
8BE000
unkown
page write copy
610000
heap
page read and write
42C000
unkown
page readonly
170000
heap
page read and write
100000
trusted library allocation
page read and write
8C2000
unkown
page readonly
8C2000
unkown
page readonly
8BE000
unkown
page write copy
660000
heap
page read and write
120000
trusted library allocation
page execute and read and write
8C2000
unkown
page readonly
8BE000
unkown
page write copy
2540000
trusted library allocation
page read and write
24D1000
trusted library allocation
page read and write
5F0000
trusted library allocation
page read and write
8A0000
unkown
page readonly
AFE000
heap
page read and write
8C2000
unkown
page readonly
4A0000
remote allocation
page execute and read and write
2C7E000
stack
page read and write
4F0000
heap
page read and write
23E0000
trusted library allocation
page read and write
77E000
stack
page read and write
24D1000
trusted library allocation
page read and write
8A1000
unkown
page execute read
24E0000
trusted library allocation
page read and write
8B9000
unkown
page readonly
4F7000
heap
page read and write
2B0000
trusted library allocation
page read and write
8C2000
unkown
page readonly
8B9000
unkown
page readonly
400000
unkown
page readonly
24C0000
trusted library allocation
page read and write
8B9000
unkown
page readonly
5F0000
trusted library allocation
page read and write
8B9000
unkown
page readonly
23D0000
trusted library allocation
page read and write
24D7000
trusted library allocation
page read and write
24D1000
trusted library allocation
page read and write
8C2000
unkown
page readonly
8B9000
unkown
page readonly
24C0000
trusted library allocation
page read and write
100000
heap
page read and write
245F000
stack
page read and write
401000
unkown
page execute read
40B000
unkown
page read and write
24D7000
trusted library allocation
page read and write
8C2000
unkown
page readonly
8C2000
unkown
page readonly
6CD000
trusted library allocation
page read and write
2AA000
stack
page read and write
2540000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
2AE000
stack
page read and write
8BE000
unkown
page write copy
400000
unkown
page readonly
3C0000
heap
page read and write
2E4000
heap
page read and write
24D1000
trusted library allocation
page read and write
6CA000
trusted library allocation
page read and write
8B9000
unkown
page readonly
2E0000
heap
page read and write
2600000
trusted library allocation
page read and write
8A0000
unkown
page readonly
24E0000
trusted library allocation
page read and write
22C000
stack
page read and write
8A1000
unkown
page execute read
8A1000
unkown
page execute read
2540000
trusted library allocation
page read and write
3FC000
stack
page read and write
23D0000
trusted library allocation
page read and write
24E0000
trusted library allocation
page read and write
8A0000
unkown
page readonly
313F000
stack
page read and write
8A1000
unkown
page execute read
49F000
remote allocation
page execute and read and write
5F0000
trusted library allocation
page read and write
8BE000
unkown
page write copy
24D1000
trusted library allocation
page read and write
323F000
stack
page read and write
6CD000
trusted library allocation
page read and write
8BE000
unkown
page write copy
24D4000
trusted library allocation
page read and write
24D7000
trusted library allocation
page read and write
2613000
trusted library allocation
page read and write
23D0000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
AAE000
stack
page read and write
4A0000
remote allocation
page execute and read and write
8B000
stack
page read and write
8B9000
unkown
page readonly
23D0000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
24D7000
trusted library allocation
page read and write
6CA000
trusted library allocation
page read and write
49B000
remote allocation
page execute and read and write
AC0000
heap
page read and write
2FB0000
heap
page read and write
2830000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
2540000
trusted library allocation
page read and write
2BEF000
stack
page read and write
8A0000
unkown
page readonly
8B9000
unkown
page readonly
8BE000
unkown
page write copy
14A000
trusted library allocation
page read and write
23E0000
trusted library allocation
page read and write
14B000
stack
page read and write
8BE000
unkown
page write copy
8BF000
heap
page read and write
2540000
trusted library allocation
page read and write
223E000
stack
page read and write
8BE000
unkown
page write copy
6CD000
trusted library allocation
page read and write
407000
unkown
page readonly
8C2000
unkown
page readonly
6CA000
trusted library allocation
page read and write
10000
heap
page read and write
24E0000
trusted library allocation
page read and write
8A0000
unkown
page readonly
24D1000
trusted library allocation
page read and write
2830000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
8B9000
unkown
page readonly
8BE000
unkown
page write copy
8A0000
unkown
page readonly
6CD000
trusted library allocation
page read and write
6CA000
trusted library allocation
page read and write
8A0000
unkown
page readonly
668000
heap
page read and write
23D0000
trusted library allocation
page read and write
6CD000
trusted library allocation
page read and write
24D4000
trusted library allocation
page read and write
2470000
heap
page read and write
10000
heap
page read and write
24D4000
trusted library allocation
page read and write
8A0000
unkown
page readonly
23D0000
trusted library allocation
page read and write
2540000
trusted library allocation
page read and write
8A1000
unkown
page execute read
720000
trusted library allocation
page read and write
514000
heap
page read and write
8A0000
unkown
page readonly
24C0000
trusted library allocation
page read and write
23E0000
trusted library allocation
page read and write
8BE000
unkown
page read and write
8A0000
unkown
page readonly
2DEF000
stack
page read and write
8BE000
unkown
page write copy
8B9000
unkown
page readonly
8C2000
unkown
page readonly
AE4000
heap
page read and write
42C000
unkown
page readonly
23E0000
trusted library allocation
page read and write
24D4000
trusted library allocation
page read and write
3200000
heap
page read and write
83E000
stack
page read and write
190000
heap
page read and write
2CD000
trusted library allocation
page read and write
24E0000
trusted library allocation
page read and write
894000
heap
page read and write
24E0000
trusted library allocation
page read and write
6CA000
trusted library allocation
page read and write
10000
heap
page read and write
6CD000
trusted library allocation
page read and write
6CA000
trusted library allocation
page read and write
407000
unkown
page readonly
107000
trusted library allocation
page read and write
429000
unkown
page read and write
686000
heap
page read and write
5F0000
trusted library allocation
page read and write
409000
unkown
page write copy
23E0000
trusted library allocation
page read and write
8A1000
unkown
page execute read
24C0000
trusted library allocation
page read and write
24D4000
trusted library allocation
page read and write
282F000
stack
page read and write
196000
heap
page read and write
2F70000
heap
page read and write
There are 236 hidden memdumps, click here to show them.