Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PRODUCT OVERVIEW.doc

Overview

General Information

Sample name:PRODUCT OVERVIEW.doc
Analysis ID:1508635
MD5:65363c1147fb7a4c3e42de314a5b002e
SHA1:66455f01c498579a48529bcc709387b033d4113c
SHA256:d534ed1c1ca02484710138b6a1517db17c76e799041ba0e908cde3abb93d80bb
Infos:

Detection

Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Document exploit detected (process start blacklist hit)
Office equation editor establishes network connection
Sigma detected: Equation Editor Network Connection
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Detected potential crypto function
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 3536 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • EQNEDT32.EXE (PID: 3620 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • EQNEDT32.EXE (PID: 3840 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
PRODUCT OVERVIEW.docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x20d9:$obj1: \objhtml
  • 0x20fd:$obj2: \objdata
  • 0x2115:$obj3: \objupdate

Exploits

barindex
Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 141.98.10.11, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3620, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49163

System Summary

barindex
Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49163, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3620, Protocol: tcp, SourceIp: 141.98.10.11, SourceIsIpv6: false, SourcePort: 80
Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3620, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3536, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: PRODUCT OVERVIEW.docAvira: detected
Source: tip.swpushroller.euVirustotal: Detection: 14%Perma Link
Source: http://tip.swpushroller.eu/dovfd/Yherfwjd.jsjVirustotal: Detection: 14%Perma Link
Source: http://tip.swpushroller.eu/dovfd/Yherfwjd.jsVirustotal: Detection: 14%Perma Link
Source: PRODUCT OVERVIEW.docReversingLabs: Detection: 56%
Source: PRODUCT OVERVIEW.docVirustotal: Detection: 60%Perma Link

Exploits

barindex
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 141.98.10.11 Port: 80Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

Software Vulnerabilities

barindex
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
Source: global trafficDNS query: name: tip.swpushroller.eu
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 141.98.10.11:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 141.98.10.11:80
Source: global trafficTCP traffic: 141.98.10.11:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 141.98.10.11:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 141.98.10.11:80
Source: global trafficTCP traffic: 141.98.10.11:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 141.98.10.11:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 141.98.10.11:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 141.98.10.11:80
Source: global trafficTCP traffic: 141.98.10.11:80 -> 192.168.2.22:49163
Source: Joe Sandbox ViewASN Name: HOSTBALTICLT HOSTBALTICLT
Source: global trafficHTTP traffic detected: GET /dovfd/Yherfwjd.js HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: tip.swpushroller.euConnection: Keep-Alive
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A1605534-7DEB-40CA-8353-3AAD76C36219}.tmpJump to behavior
Source: global trafficHTTP traffic detected: GET /dovfd/Yherfwjd.js HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: tip.swpushroller.euConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: tip.swpushroller.eu
Source: EQNEDT32.EXE, EQNEDT32.EXE, 00000002.00000002.395356284.000000000053F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://tip.swpushroller.eu/dovfd/Yherfwjd.js
Source: EQNEDT32.EXE, 00000002.00000002.395356284.000000000053F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://tip.swpushroller.eu/dovfd/Yherfwjd.jsj

System Summary

barindex
Source: PRODUCT OVERVIEW.doc, type: SAMPLEMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005445662_2_00544566
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005446982_2_00544698
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0054418C2_2_0054418C
Source: PRODUCT OVERVIEW.doc, type: SAMPLEMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
Source: classification engineClassification label: mal92.expl.winDOC@3/8@1/1
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$ODUCT OVERVIEW.docJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR7148.tmpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: PRODUCT OVERVIEW.docReversingLabs: Detection: 56%
Source: PRODUCT OVERVIEW.docVirustotal: Detection: 60%
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: propsys.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ntmarta.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
Source: PRODUCT OVERVIEW.LNK.0.drLNK file: ..\..\..\..\..\Desktop\PRODUCT OVERVIEW.doc
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0053F750 push edi; iretd 2_2_0053F751
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00557D52 push esi; ret 2_2_00557D53
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00548F59 push eax; retf 2_2_00548F61
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0055607E push esi; ret 2_2_0055607F
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0053F813 pushad ; ret 2_2_0053F814
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00551000 push eax; retn 0054h2_2_00551001
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005582DE push edi; ret 2_2_005582DF
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00557EC4 push esi; ret 2_2_00557EC7
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00557ECC push esi; ret 2_2_00557ECF
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005401F4 push eax; retf 2_2_005401F5
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00549EE1 push esi; iretd 2_2_00549EE2
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00556086 push esi; ret 2_2_00556087
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005580A2 push esi; ret 2_2_005580A3
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005580AA push esi; ret 2_2_005580AB
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3640Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3860Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts23
Exploitation for Client Execution
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
Remote System Discovery
Remote Desktop ProtocolData from Removable Media2
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS3
System Information Discovery
Distributed Component Object ModelInput Capture12
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
PRODUCT OVERVIEW.doc57%ReversingLabsDocument-RTF.Exploit.CVE-2017-11882
PRODUCT OVERVIEW.doc60%VirustotalBrowse
PRODUCT OVERVIEW.doc100%AviraTR/AVI.Obfuscated.lqzgf
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
tip.swpushroller.eu15%VirustotalBrowse
SourceDetectionScannerLabelLink
http://tip.swpushroller.eu/dovfd/Yherfwjd.jsj15%VirustotalBrowse
http://tip.swpushroller.eu/dovfd/Yherfwjd.js15%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
tip.swpushroller.eu
141.98.10.11
truetrueunknown
NameMaliciousAntivirus DetectionReputation
http://tip.swpushroller.eu/dovfd/Yherfwjd.jstrueunknown
NameSourceMaliciousAntivirus DetectionReputation
http://tip.swpushroller.eu/dovfd/Yherfwjd.jsjEQNEDT32.EXE, 00000002.00000002.395356284.000000000053F000.00000004.00000020.00020000.00000000.sdmptrueunknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
141.98.10.11
tip.swpushroller.euLithuania
209605HOSTBALTICLTtrue
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1508635
Start date and time:2024-09-10 14:36:10 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 21s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultwindowsofficecookbook.jbs
Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
Number of analysed new started processes analysed:9
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:PRODUCT OVERVIEW.doc
Detection:MAL
Classification:mal92.expl.winDOC@3/8@1/1
EGA Information:Failed
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .doc
  • Found Word or Excel or PowerPoint or XPS Viewer
  • Attach to Office via COM
  • Active ActiveX Object
  • Scroll down
  • Close Viewer
  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, svchost.exe
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
TimeTypeDescription
08:36:58API Interceptor498x Sleep call for process: EQNEDT32.EXE modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
141.98.10.1117213054441f2891f24374c97759e4ac14183d6cfaeabe4240dc8794e61fa899b9e40b62fb429.dat-decoded.exeGet hashmaliciousRemcosBrowse
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    HOSTBALTICLTtppc.elfGet hashmaliciousUnknownBrowse
    • 141.98.10.95
    sarm6.elfGet hashmaliciousMiraiBrowse
    • 141.98.10.95
    TRIAL IMG_00O0125RDER.exeGet hashmaliciousFormBook, GuLoaderBrowse
    • 141.98.10.120
    1316wjL1Ep.elfGet hashmaliciousUnknownBrowse
    • 141.98.10.95
    17213054441f2891f24374c97759e4ac14183d6cfaeabe4240dc8794e61fa899b9e40b62fb429.dat-decoded.exeGet hashmaliciousRemcosBrowse
    • 141.98.10.11
    Demand G2-2024.xlsxGet hashmaliciousFormBookBrowse
    • 141.98.10.47
    171232524570452cfc1123de8b7cabf91834cbebe0e4fd1dae96e0b4418fab427bf67de7f5439.dat-decoded.exeGet hashmaliciousRisePro StealerBrowse
    • 141.98.10.48
    1712325246bbbf6f1de2af242e599680d3f96095835a7a7584ff1f1f967e4c2d3f319cbbe6606.dat-decoded.exeGet hashmaliciousPrivateLoader, RisePro StealerBrowse
    • 141.98.10.48
    171232524570452cfc1123de8b7cabf91834cbebe0e4fd1dae96e0b4418fab427bf67de7f5439.dat-decoded.exeGet hashmaliciousRisePro StealerBrowse
    • 141.98.10.48
    17123252454cee8f5bbeea28bef775c962baa7b486704978d6564a4b4c25e4f526d316c953208.dat-decoded.exeGet hashmaliciousPrivateLoader, RisePro StealerBrowse
    • 141.98.10.48
    No context
    No context
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):16384
    Entropy (8bit):0.0
    Encrypted:false
    SSDEEP:3::
    MD5:CE338FE6899778AACFC28414F2D9498B
    SHA1:897256B6709E1A4DA9DABA92B6BDE39CCFCCD8C1
    SHA-256:4FE7B59AF6DE3B665B67788CC2F99892AB827EFAE3A467342B3BB4E3BC8E5BFE
    SHA-512:6EB7F16CF7AFCABE9BDEA88BDAB0469A7937EB715ADA9DFD8F428D9D38D86133945F5F2F2688DDD96062223A39B5D47F07AFC3C48D9DB1D5EE3F41C8D274DCCF
    Malicious:false
    Reputation:high, very likely benign file
    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):1024
    Entropy (8bit):0.05390218305374581
    Encrypted:false
    SSDEEP:3:ol3lYdn:4Wn
    MD5:5D4D94EE7E06BBB0AF9584119797B23A
    SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
    SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
    SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
    Malicious:false
    Reputation:high, very likely benign file
    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):1536
    Entropy (8bit):1.3554734412254816
    Encrypted:false
    SSDEEP:3:Iiiiiiiiiif3l/Hlnl/bl//l/bllBl/PvvvvvvvvvvFl/l/lAqsalHl3lldHzlb6:IiiiiiiiiifdLloZQc8++lsJe1Mz0U
    MD5:C74F59794FDC1CF5B9433B0FD360683E
    SHA1:2B74E741C7B9B425A0180B5A94906B03F5AC77E3
    SHA-256:A57F6461B04DEC9340A5E7527F33B76CC5E659D1D3062718811E574FC7DE3449
    SHA-512:2B6E08E5D46FA6595D34657B3EFE637A5D03A3C50104F1FC0B59514146BB8447DB43BECD54E2DED92EA780AA6F8A124691F62A6A573CE58A19E9DFE29D8ABE89
    Malicious:false
    Reputation:low
    Preview:..(...(...(...(...(...(...(...(...(...(...(...A.l.b.u.s...A........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................."...&...*.......:...>...............................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):133306
    Entropy (8bit):3.8425100328102264
    Encrypted:false
    SSDEEP:3072:uBPqBUXa5Q1mAa5Q1mAa5Q1gzbYcos+3/+J/OZ0p:u5qBca5ma5ma5xbYRPo
    MD5:742EA03F33075BA6895531405DDA0C0F
    SHA1:D62D689D7D6F9BFF39D5659D2F04209D40773A32
    SHA-256:03342BE4FA28C0AD59CEA56A87D7BA41E2CB68C543B87A80F87CD4B6CB1354A5
    SHA-512:B203B7E6E57167271F146C8E9F464DD164F28426A499DBC109AEBB38FFF13ED2BC778FA8CAE53F7728CD639453C978E5472FEA00199AAEF12443C7BEA35A692D
    Malicious:false
    Reputation:low
    Preview:4.8.5.2.9.2.2.7.6.!.9.,.~.8.>.?.?.0.@...1.$.;.+.9.%.?.?./.2...>.].!.-.%.3.;.2.|...*.?.#.).)._.'.2.7.4.:.%./.8.<._.,.~.?.;.?.?.!.|.=.0.[.;.?...?.+.`.=...:.8.;._.&...2.%.&.%.+.0.4.&.?.?.:.:.=.-.?.'.^.....%.8.~.4.'.?.[.#.?.&./...'.'...*.~.1...|.9.?.?.-.<.*...*.7.^.-.*.?..._.&...*...1.4...;.).8.7...1.4.>.!.,.@.!.`.^...9.:.#...`.:.`.;.].4._.8.2.^.3.'.<.3.0.).5.@.*.:.9.!.'.*.[.?.=.,.-.*.|.?.;.:.0.5.1.?.?.^.@.).8.7.=.&.).).!.?.2.*.?.=.?.=.%.5.@.?.5.,.*.1.[.9.^.;.@.:.|.=.$.<.|.$.?.[.%.(...#.>.,.>.?._.>.8.$.;...0.?.+.:.4.+._.?.'.!.1.^.<._.9.'.].'.1...?.'.4.3.+.$.`.5...9.].?.?._.,.?.).%.?...%.$.%...8.7.-.?.7...9.!.0...1.,.*.).3.?.>.1.4.=.?.@.|...1.%.%.6.$.:.-.0...`.?.).5.0...6.?.9...).?._.<.].8.5.[...1.<.9.]._.:.%.`.?.?.4...-.&.?.2.`.=.~.:...7.<.%.?.?.,.?...0./.^.[.%.7./.?.+.?.3.^.+.<.|.?.@.[.=.=.^.?._.:.*.../.?.3./.8.8.7.:.9.?.1.3.2.?.*.].+...6.9.!.&.3.(.'.4.%.<./.+.~.2.?.-.~.<.%.[.`.(.?.6.|.3.@...1.9.'.%.%..._.+.%.^.$.$.^...).?.5...;.'.).?.@./._.4.7.,.<.?.4.2.~.>.$.<.`.?.-.;.?.5.#.(.?.%.../.(.
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:05 2023, mtime=Fri Aug 11 15:42:05 2023, atime=Tue Sep 10 11:36:57 2024, length=152751, window=hide
    Category:dropped
    Size (bytes):1044
    Entropy (8bit):4.548595949126755
    Encrypted:false
    SSDEEP:12:81+AhgXg/XAlCPCHaXIBEYB/BGFX+WkoZccsOTlaOicvbEIVaEDtZ3YilMMEpxRi:819/XTYiYbkeoZcdte0EDv3qo457u
    MD5:F62C453AECF08377E0827E7D6F5F11F9
    SHA1:C16B0520413874D56828AF4F0AA5EB75F43D08F1
    SHA-256:2163F4A515B476B056A8A53BE56B72F0B006CFD66B8637746919B7517068647E
    SHA-512:41785645B6B15E8F839A567F7F556370E8DF20AB36CFDEF79BF064C025BAA8E83331610E10DD318FA0F96057EFC450F410D25B3FC664B4B9EF13517BCB51D16A
    Malicious:false
    Reputation:low
    Preview:L..................F.... ...7.K.r...7.K.r....O..~....T...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1.....*Y.d..user.8......QK.X*Y.d*...&=....U...............A.l.b.u.s.....z.1......WE...Desktop.d......QK.X.WE.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....r.2..T..*Y.d .PRODUC~1.DOC..V.......WC..WC.*.........................P.R.O.D.U.C.T. .O.V.E.R.V.I.E.W...d.o.c.......~...............-...8...[............?J......C:\Users\..#...................\\571345\Users.user\Desktop\PRODUCT OVERVIEW.doc.+.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.P.R.O.D.U.C.T. .O.V.E.R.V.I.E.W...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......571345..........D_....3N...W...9..W.e8..
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:Generic INItialization configuration [folders]
    Category:dropped
    Size (bytes):66
    Entropy (8bit):4.771666846631183
    Encrypted:false
    SSDEEP:3:M1921AQlm4FqV1AQlv:MjOS
    MD5:3DCCA147DE5026500DCFE818C57EDF17
    SHA1:1EE15D91FA992B3B2CC76B055605F5C2AD94DFEC
    SHA-256:D24FBD6D83DD99A0CACCE5FA7BE972690608655E3031ADFD2BC2C100951B80F7
    SHA-512:1D51E6B42974A90C445AAC7419FBBDAA0787EDCE1DE30F5A9BA41EBC4488918F1ADCDF3B1BDEF1EB3518188B4A7C39F57B9DB972D0DCCF6C9A445FC7EB99F579
    Malicious:false
    Reputation:low
    Preview:[doc]..PRODUCT OVERVIEW.LNK=0..[folders]..PRODUCT OVERVIEW.LNK=0..
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):162
    Entropy (8bit):2.4797606462020307
    Encrypted:false
    SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
    MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
    SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
    SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
    SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
    Malicious:false
    Reputation:high, very likely benign file
    Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):162
    Entropy (8bit):2.4797606462020307
    Encrypted:false
    SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
    MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
    SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
    SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
    SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
    Malicious:false
    Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
    File type:Rich Text Format data, version 1
    Entropy (8bit):4.6608191655333915
    TrID:
    • Rich Text Format (5005/1) 55.56%
    • Rich Text Format (4004/1) 44.44%
    File name:PRODUCT OVERVIEW.doc
    File size:152'751 bytes
    MD5:65363c1147fb7a4c3e42de314a5b002e
    SHA1:66455f01c498579a48529bcc709387b033d4113c
    SHA256:d534ed1c1ca02484710138b6a1517db17c76e799041ba0e908cde3abb93d80bb
    SHA512:fdca66c58dc22c186c8752634203a8e5234891e4f895893c538eb0856b8b94fb0573ba3582bc8278154495467490a6c2172c7c9f4489ec7dd5e4e095343b9bb3
    SSDEEP:1536:sEneABaLFcF2iEABaLFcF2iXA6u8AaPGosM9ezY08gsOTaCi9qYj2pAgb:seRoAFczYGaCgqY4Agb
    TLSH:94E3F2ACD38B54A58F49A7B3531B4E8916BD323EF74614B8304CA77437EAE7885094BC
    File Content Preview:{\rtf1..{\*\qSlLGtYt2YniItkDsB5ncfiz2h4q1MVZ092QI4IrYoivkLxrAeg3jiR9cquO48MNSGIodVUlVz60oDCdJoS1zY3sigvi4KDRLKwHyG0s2dLk9VOpSBpS3DSSUlVZezy4otOcwLmVLGrvPGRhmIB9ajaB6b3lV7WW1T1cDmiuYQ3KGWEZQhxtF7JKhiz5}..{\1485292276!9,~8>??0@.1$;+9%??/2.>]!-%3;2|.*?#))_'2
    Icon Hash:2764a3aaaeb7bdbf
    IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
    000002107hno
    TimestampSource PortDest PortSource IPDest IP
    Sep 10, 2024 14:37:01.619410038 CEST4916380192.168.2.22141.98.10.11
    Sep 10, 2024 14:37:01.624524117 CEST8049163141.98.10.11192.168.2.22
    Sep 10, 2024 14:37:01.624627113 CEST4916380192.168.2.22141.98.10.11
    Sep 10, 2024 14:37:01.625617981 CEST4916380192.168.2.22141.98.10.11
    Sep 10, 2024 14:37:01.630634069 CEST8049163141.98.10.11192.168.2.22
    Sep 10, 2024 14:37:23.014017105 CEST8049163141.98.10.11192.168.2.22
    Sep 10, 2024 14:37:23.014127016 CEST4916380192.168.2.22141.98.10.11
    Sep 10, 2024 14:37:23.014234066 CEST4916380192.168.2.22141.98.10.11
    Sep 10, 2024 14:37:23.023755074 CEST8049163141.98.10.11192.168.2.22
    TimestampSource PortDest PortSource IPDest IP
    Sep 10, 2024 14:37:01.537622929 CEST5456253192.168.2.228.8.8.8
    Sep 10, 2024 14:37:01.594079018 CEST53545628.8.8.8192.168.2.22
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Sep 10, 2024 14:37:01.537622929 CEST192.168.2.228.8.8.80x9c38Standard query (0)tip.swpushroller.euA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Sep 10, 2024 14:37:01.594079018 CEST8.8.8.8192.168.2.220x9c38No error (0)tip.swpushroller.eu141.98.10.11A (IP address)IN (0x0001)false
    • tip.swpushroller.eu
    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.2249163141.98.10.11803620C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    TimestampBytes transferredDirectionData
    Sep 10, 2024 14:37:01.625617981 CEST323OUTGET /dovfd/Yherfwjd.js HTTP/1.1
    Accept: */*
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
    Host: tip.swpushroller.eu
    Connection: Keep-Alive


    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:08:36:57
    Start date:10/09/2024
    Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
    Imagebase:0x13ffd0000
    File size:1'423'704 bytes
    MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:2
    Start time:08:36:58
    Start date:10/09/2024
    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    Wow64 process (32bit):true
    Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Imagebase:0x400000
    File size:543'304 bytes
    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:5
    Start time:08:37:39
    Start date:10/09/2024
    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    Wow64 process (32bit):true
    Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Imagebase:0x400000
    File size:543'304 bytes
    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Reset < >
      Memory Dump Source
      • Source File: 00000002.00000002.395356284.000000000053F000.00000004.00000020.00020000.00000000.sdmp, Offset: 0053F000, based on PE: false
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 60a6d82d6c333f7ad21900efc5f4fd48a4ad3104a245f1eae1cdc4e01795a507
      • Instruction ID: 7c4fccb7facbab4cf35617daef89612a2954cd89d6b8ef73a9184f211c8bf6b3
      • Opcode Fuzzy Hash: 60a6d82d6c333f7ad21900efc5f4fd48a4ad3104a245f1eae1cdc4e01795a507
      • Instruction Fuzzy Hash: C8E1982105E7C05FD7638B344CAAA927F74AE23104B4E85DBD8C58F5E3E249494ACBB7
      Memory Dump Source
      • Source File: 00000002.00000002.395356284.000000000053F000.00000004.00000020.00020000.00000000.sdmp, Offset: 0053F000, based on PE: false
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: b56f99f96d3c4198bbff1d239ed71dc484eb784cc85854d75e827970ae8c2b48
      • Instruction ID: 2678956729e6cf7a5a1b7e1285c4639e1de080526c2b764099edd3718d1fd17f
      • Opcode Fuzzy Hash: b56f99f96d3c4198bbff1d239ed71dc484eb784cc85854d75e827970ae8c2b48
      • Instruction Fuzzy Hash: 91B19B2145E7C09FD7538B344CAA9927F74AE2350474E82DBD4C1CF5A7E219490AC7B7
      Memory Dump Source
      • Source File: 00000002.00000002.395356284.000000000053F000.00000004.00000020.00020000.00000000.sdmp, Offset: 0053F000, based on PE: false
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 5eb6e6a5f51dedf2905f2fa0c7d6821e05247c30752834526f586575b13084b8
      • Instruction ID: 730ace4c914582b15711e883934080ff35150dc9b12c9caebb53a47eaab1e619
      • Opcode Fuzzy Hash: 5eb6e6a5f51dedf2905f2fa0c7d6821e05247c30752834526f586575b13084b8
      • Instruction Fuzzy Hash: 96B1982105F7C05FD3638B345CAAA923F74AE63204B4E85DBD4C58F1A3E249495ACBB7