IOC Report
OR17233976_00019489_20170619154218.xlsx

loading gif

Files

File Path
Type
Category
Malicious
OR17233976_00019489_20170619154218.xlsx
CDFV2 Encrypted
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\.svchost[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
downloaded
malicious
C:\Users\user\Desktop\~$OR17233976_00019489_20170619154218.xlsx
data
dropped
malicious
C:\Users\Public\vbc.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3288E575.png
PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\53BF4B19.wmf
ms-windows metafont .wmf
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\76413093.png
PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\90EF2157.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B4D6F58F.jpeg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 150x150, frames 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B9050978.png
PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B9F9AC7D.wmf
ms-windows metafont .wmf
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C49C905A.jpeg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 150x150, frames 3
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CE13C646.wmf
ms-windows metafont .wmf
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CFB87244.png
PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E4EC5B6C.wmf
ms-windows metafont .wmf
dropped
C:\Users\user\AppData\Local\Temp\AEGISIIINVHelper.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\AsSQLHelper.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\CoverDes.exe.manifest
XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Uforholdsvises7.wad
data
dropped
C:\Users\user\AppData\Local\Temp\emblem-default-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\face-crying.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\nszEA61.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\wxbase30u_xml_gcc_custom.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\~DF356FB6003FFB313F.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DF6D478D5B0CAAFC00.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFE089B71C9CC2CAF5.TMP
CDFV2 Encrypted
dropped
C:\Users\user\AppData\Local\Temp\~DFEBF9B8A93FED7DB2.TMP
data
dropped
There are 17 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
malicious
C:\Users\Public\vbc.exe
"C:\Users\Public\vbc.exe"
malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding

URLs

Name
IP
Malicious
http://103.149.13.182/365space/.svchost.exej
unknown
malicious
http://103.149.13.182/365space/.svchost.exe
103.149.13.182
malicious
http://103.149.13.182/365space/.svchost.exemmC:
unknown
malicious
http://ocsp2.globals)
unknown
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://ocsp.sectigo.com0
unknown
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
unknown
http://crl.globalsig
unknown
https://www.globalsign.9
unknown
https://sectigo.com/CPS0C
unknown
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
103.149.13.182
unknown
unknown
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
?<0
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\675BC
675BC
HKEY_CURRENT_USER\Software\Microsoft\GDIPlus
FontCachePath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
3/0
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\6CB3B
6CB3B
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\6F122
6F122
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 21
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\6CB3B
6CB3B
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109E60090400100000000F01FEC\Usage
EquationEditorFilesIntl_1033
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Tilmaalingen\UMBILECTOMY
NATURLOVEN
There are 32 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3A60000
direct allocation
page execute and read and write
malicious
2BDB000
heap
page read and write
2B0000
heap
page read and write
18A000
stack
page read and write
9A7000
heap
page read and write
22A0000
heap
page read and write
786000
unkown
page read and write
71A000
heap
page read and write
395D000
stack
page read and write
6C50000
trusted library allocation
page read and write
7A9000
unkown
page read and write
292F000
stack
page read and write
408000
unkown
page readonly
7330000
trusted library allocation
page read and write
231C000
stack
page read and write
693D000
stack
page read and write
732C000
stack
page read and write
6240000
trusted library allocation
page read and write
6C0F000
stack
page read and write
2B4000
heap
page read and write
2BF000
stack
page read and write
788000
unkown
page read and write
673D000
stack
page read and write
614F000
stack
page read and write
2B40000
trusted library allocation
page read and write
1DA0000
heap
page read and write
683D000
stack
page read and write
2320000
heap
page read and write
711000
heap
page read and write
7D6000
unkown
page readonly
350000
heap
page read and write
255F000
stack
page read and write
A0D000
heap
page read and write
77C000
unkown
page read and write
310000
heap
page read and write
C96000
heap
page read and write
10000
heap
page read and write
625D000
trusted library allocation
page read and write
400000
unkown
page readonly
64FC000
stack
page read and write
6B00000
heap
page read and write
89000
stack
page read and write
6D4C000
stack
page read and write
1DB0000
direct allocation
page read and write
627F000
trusted library allocation
page read and write
7D6000
unkown
page readonly
647000
heap
page read and write
647E000
stack
page read and write
1D99000
trusted library section
page readonly
2BD0000
heap
page read and write
708A4000
unkown
page readonly
6D2000
heap
page read and write
9C4000
heap
page read and write
22A8000
heap
page read and write
400000
unkown
page readonly
69D000
heap
page read and write
708A0000
unkown
page readonly
3A5E000
stack
page read and write
6200000
heap
page read and write
664000
heap
page read and write
401000
unkown
page execute read
61C0000
heap
page read and write
2342000
heap
page read and write
270000
heap
page read and write
708A6000
unkown
page readonly
3420000
trusted library allocation
page read and write
6ABF000
stack
page read and write
663F000
stack
page read and write
1D0E000
stack
page read and write
2490000
trusted library allocation
page read and write
2B40000
trusted library allocation
page read and write
408000
unkown
page readonly
2A2F000
stack
page read and write
2FE000
stack
page read and write
2BD4000
heap
page read and write
40A000
unkown
page write copy
6A7E000
stack
page read and write
89000
stack
page read and write
70D000
heap
page read and write
1D94000
trusted library section
page readonly
C90000
heap
page read and write
35D000
stack
page read and write
722000
heap
page read and write
401000
unkown
page execute read
370000
heap
page read and write
6C10000
trusted library allocation
page read and write
2D2000
heap
page read and write
22A4000
heap
page read and write
277000
heap
page read and write
697E000
stack
page read and write
6500000
heap
page read and write
6B1000
heap
page read and write
782000
unkown
page read and write
A0A000
heap
page read and write
370000
heap
page read and write
626F000
trusted library allocation
page read and write
7B5000
unkown
page read and write
7A4000
unkown
page read and write
2324000
heap
page read and write
9FB000
heap
page read and write
1D10000
trusted library allocation
page read and write
7330000
trusted library allocation
page read and write
2BD8000
heap
page read and write
708A1000
unkown
page execute read
22AB000
heap
page read and write
640000
heap
page read and write
2A40000
trusted library allocation
page read and write
643F000
stack
page read and write
6503000
heap
page read and write
6E00000
heap
page read and write
618E000
stack
page read and write
10000
heap
page read and write
18C000
stack
page read and write
9EF000
heap
page read and write
7AD000
unkown
page read and write
1D90000
trusted library section
page readonly
245F000
stack
page read and write
7330000
trusted library allocation
page read and write
64BD000
stack
page read and write
7A6000
unkown
page read and write
1D9F000
trusted library section
page readonly
2A40000
trusted library allocation
page read and write
610D000
stack
page read and write
9A0000
heap
page read and write
40A000
unkown
page read and write
6284000
trusted library allocation
page read and write
There are 116 hidden memdumps, click here to show them.