Analysis Report Sales-contract-deaho-180521-poweruae.doc
Overview
General Information
Detection
Score: | 68 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
Startup |
---|
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
Exploits: |
---|
Sigma detected: EQNEDT32.EXE connecting to internet | Show sources |
Source: | Author: Joe Security: |
Sigma detected: File Dropped By EQNEDT32EXE | Show sources |
Source: | Author: Joe Security: |
Signature Overview |
---|
Click to jump to signature section
AV Detection: |
---|
Multi AV Scanner detection for submitted file | Show sources |
Source: | ReversingLabs: |
Exploits: |
---|
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) | Show sources |
Source: | Process created: | Jump to behavior |
Source: | Process created: |
Source: | File opened: | Jump to behavior |
Source: | HTTPS traffic detected: |
Source: | DNS query: |
Source: | TCP traffic: |
Source: | TCP traffic: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | HTTP traffic detected: |
Source: | File created: | Jump to behavior |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | ReversingLabs: |
Source: | Process created: | ||
Source: | Process created: |
Source: | Window detected: |
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Exploitation for Client Execution13 | Path Interception | Process Injection1 | Masquerading1 | OS Credential Dumping | Virtualization/Sandbox Evasion1 | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Encrypted Channel2 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Virtualization/Sandbox Evasion1 | LSASS Memory | File and Directory Discovery1 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Non-Application Layer Protocol2 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Process Injection1 | Security Account Manager | System Information Discovery2 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Application Layer Protocol13 | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Binary Padding | NTDS | Remote System Discovery1 | Distributed Component Object Model | Input Capture | Scheduled Transfer | Ingress Tool Transfer2 | SIM Card Swap | Carrier Billing Fraud |
Behavior Graph |
---|
Screenshots |
---|
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Antivirus, Machine Learning and Genetic Malware Detection |
---|
Initial Sample |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
28% | ReversingLabs | Document-RTF.Exploit.Heuristic |
Dropped Files |
---|
No Antivirus matches |
---|
Unpacked PE Files |
---|
No Antivirus matches |
---|
Domains |
---|
No Antivirus matches |
---|
URLs |
---|
No Antivirus matches |
---|
Domains and IPs |
---|
Contacted Domains |
---|
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
cdn.discordapp.com | 162.159.134.233 | true | false | high |
Contacted URLs |
---|
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high |
Contacted IPs |
---|
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
Public |
---|
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
162.159.135.233 | unknown | United States | 13335 | CLOUDFLARENETUS | true |
General Information |
---|
Joe Sandbox Version: | 32.0.0 Black Diamond |
Analysis ID: | 417106 |
Start date: | 19.05.2021 |
Start time: | 10:37:15 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 4m 22s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | Sales-contract-deaho-180521-poweruae.doc |
Cookbook file name: | defaultwindowsofficecookbook.jbs |
Analysis system description: | Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2) |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal68.expl.winDOC@3/8@2/1 |
Cookbook Comments: |
|
Warnings: | Show All
|
Simulations |
---|
Behavior and APIs |
---|
Time | Type | Description |
---|---|---|
10:37:34 | API Interceptor |
Joe Sandbox View / Context |
---|
IPs |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
162.159.135.233 | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Domains |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
cdn.discordapp.com | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
ASN |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
JA3 Fingerprints |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
7dcce5b76c8b17472d024758970a406b | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Dropped Files |
---|
No context |
---|
Created / dropped Files |
---|
Process: | C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 5 |
Entropy (8bit): | 1.5219280948873621 |
Encrypted: | false |
SSDEEP: | 3:hn:h |
MD5: | FDA44910DEB1A460BE4AC5D56D61D837 |
SHA1: | F6D0C643351580307B2EAA6A7560E76965496BC7 |
SHA-256: | 933B971C6388D594A23FA1559825DB5BEC8ADE2DB1240AA8FC9D0C684949E8C9 |
SHA-512: | 57DDA9AA7C29F960CD7948A4E4567844D3289FA729E9E388E7F4EDCBDF16BF6A94536598B4F9FF8942849F1F96BD3C00BC24A75E748A36FBF2A145F63BF904C1 |
Malicious: | true |
Reputation: | high, very likely benign file |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 1024 |
Entropy (8bit): | 0.05390218305374581 |
Encrypted: | false |
SSDEEP: | 3:ol3lYdn:4Wn |
MD5: | 5D4D94EE7E06BBB0AF9584119797B23A |
SHA1: | DBB111419C704F116EFA8E72471DD83E86E49677 |
SHA-256: | 4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1 |
SHA-512: | 95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 1536 |
Entropy (8bit): | 1.5235358623136555 |
Encrypted: | false |
SSDEEP: | 6:S4Ov5w8toOgP5qlmujjHWYqK/Cd6cofoFNgREqAWlgFJg/jlll8vlw2FrA:S4OvN4q3isKd6cofmk5uFJgbuvq2ZA |
MD5: | 6EE82E9A59AE1FF005DC609E4ADA4229 |
SHA1: | 0565246E07B840A749A00F6647E5B144CB8D97B3 |
SHA-256: | 59F1287A250271F75B5B9BEED5CE876B09BD51E5385F32786AFC93F66C4AD8E5 |
SHA-512: | 2693922ED15968B0C753A7B8E9461D566B6B1C7DCF05D33A27E9CE428D5483BC79013FD3EEEA4993DFEEE1A4416D9FE35A83351161EEB7DEB35F1182CF97E87C |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 2288 |
Entropy (8bit): | 4.550392227403443 |
Encrypted: | false |
SSDEEP: | 48:8x/XT3IFUEgUmgwKQh2x/XT3IFUEgUmgwKQ/:8x/XLIFUr2wKQh2x/XLIFUr2wKQ/ |
MD5: | 241C7125A0885F44F08D067D2B905B9D |
SHA1: | BA561B11AE45A8B66C400FE8410D00404B1607F6 |
SHA-256: | 637DD93D60D7CAAA45FDA037DF6E0E1C551FE7CC219C7C803CBE5FCA8C2F9D83 |
SHA-512: | FD17BCBC3C04498782757BEB3142DBE87BFC28732438B7796A77DC7D8BBE4E0B77866FA3CC1F27F62F0DAA55B0B8B7B12DBB29F53E6419CDE92C37757A350B9F |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 146 |
Entropy (8bit): | 4.668875111577241 |
Encrypted: | false |
SSDEEP: | 3:M1jOBCf2kKZdtubCf2kKZdtmX1jOBCf2kKZdtv:M8BiKZuiKZZBiKZ/ |
MD5: | B37FAB42EC258956E4AFC0DB0A663466 |
SHA1: | 81CBAD967C197A07015124C7452922302DCD3B85 |
SHA-256: | BB498E8701F99BB55FBF2D91136163C12287B798450D187CB1148C728AB44C07 |
SHA-512: | 1860E297513D71EE1254F03C7403A9B87EB2B5E8C311F7099F4AACD418029235C5959227587BB9F2ECA2DD985BC210FCAAE2618BD1740D547B5956E47F288EF5 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 162 |
Entropy (8bit): | 2.431160061181642 |
Encrypted: | false |
SSDEEP: | 3:vrJlaCkWtVyokKOg5Gll3GwSKG/f2+1/ln:vdsCkWtW2IlID9l |
MD5: | 39EB3053A717C25AF84D576F6B2EBDD2 |
SHA1: | F6157079187E865C1BAADCC2014EF58440D449CA |
SHA-256: | CD95C0EA3CEAEC724B510D6F8F43449B26DF97822F25BDA3316F5EAC3541E54A |
SHA-512: | 5AA3D344F90844D83477E94E0D0E0F3C96324D8C255C643D1A67FA2BB9EEBDF4F6A7447918F371844FCEDFCD6BBAAA4868FC022FDB666E62EB2D1BAB9028919C |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 2 |
Entropy (8bit): | 1.0 |
Encrypted: | false |
SSDEEP: | 3:Qn:Qn |
MD5: | F3B25701FE362EC84616A93A45CE9998 |
SHA1: | D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB |
SHA-256: | B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209 |
SHA-512: | 98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 162 |
Entropy (8bit): | 2.431160061181642 |
Encrypted: | false |
SSDEEP: | 3:vrJlaCkWtVyokKOg5Gll3GwSKG/f2+1/ln:vdsCkWtW2IlID9l |
MD5: | 39EB3053A717C25AF84D576F6B2EBDD2 |
SHA1: | F6157079187E865C1BAADCC2014EF58440D449CA |
SHA-256: | CD95C0EA3CEAEC724B510D6F8F43449B26DF97822F25BDA3316F5EAC3541E54A |
SHA-512: | 5AA3D344F90844D83477E94E0D0E0F3C96324D8C255C643D1A67FA2BB9EEBDF4F6A7447918F371844FCEDFCD6BBAAA4868FC022FDB666E62EB2D1BAB9028919C |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 4.303878963614348 |
TrID: |
|
File name: | Sales-contract-deaho-180521-poweruae.doc |
File size: | 4776 |
MD5: | e8453860de1826d58e0f5de9e04f11ea |
SHA1: | ac2e4b588051a6ba7bcef104e7027f9ce1036b14 |
SHA256: | d18da684313ab3fe2b403fca933096ce347b800ef94b5a71dfc8e3a607f95dcd |
SHA512: | 95a34ccf3c3de9ea652f0caf914659e1581e6d144ad51e01d51dce7b5bc42ea5ab94bb570eb3bc9671b5bbd55c75538a56a6e8a013603610090fcec4858d13cd |
SSDEEP: | 96:JCVQAzQQ00Sbswi5IsPjsfetevF6bEjTOQCn2nR:JCNQD0Shistrd |
File Content Preview: | {\rtf9784{\object74053332 74053332 \'' \objlink58854666\+\objupdate5530920355309203\objw8682\objh1794{\*\objdata481566 {{{{{{{{{{{{{{{{{{{{\bin000000 |
File Icon |
---|
Icon Hash: | e4eea2aaa4b4b4a4 |
Static RTF Info |
---|
Objects |
---|
Id | Start | Format ID | Format | Classname | Datasize | Filename | Sourcepath | Temppath | Exploit |
---|---|---|---|---|---|---|---|---|---|
0 | 00000111h | no | |||||||
1 | 000000B5h | no |
Network Behavior |
---|
Network Port Distribution |
---|
TCP Packets |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
May 19, 2021 10:38:02.993972063 CEST | 49165 | 80 | 192.168.2.22 | 162.159.135.233 |
May 19, 2021 10:38:03.036247015 CEST | 80 | 49165 | 162.159.135.233 | 192.168.2.22 |
May 19, 2021 10:38:03.036412001 CEST | 49165 | 80 | 192.168.2.22 | 162.159.135.233 |
May 19, 2021 10:38:03.036863089 CEST | 49165 | 80 | 192.168.2.22 | 162.159.135.233 |
May 19, 2021 10:38:03.080743074 CEST | 80 | 49165 | 162.159.135.233 | 192.168.2.22 |
May 19, 2021 10:38:03.089543104 CEST | 80 | 49165 | 162.159.135.233 | 192.168.2.22 |
May 19, 2021 10:38:03.089683056 CEST | 49165 | 80 | 192.168.2.22 | 162.159.135.233 |
May 19, 2021 10:38:03.115010023 CEST | 49166 | 443 | 192.168.2.22 | 162.159.135.233 |
May 19, 2021 10:38:03.156987906 CEST | 443 | 49166 | 162.159.135.233 | 192.168.2.22 |
May 19, 2021 10:38:03.157182932 CEST | 49166 | 443 | 192.168.2.22 | 162.159.135.233 |
May 19, 2021 10:38:03.168504000 CEST | 49166 | 443 | 192.168.2.22 | 162.159.135.233 |
May 19, 2021 10:38:03.210413933 CEST | 443 | 49166 | 162.159.135.233 | 192.168.2.22 |
May 19, 2021 10:38:03.211878061 CEST | 443 | 49166 | 162.159.135.233 | 192.168.2.22 |
May 19, 2021 10:38:03.211925983 CEST | 443 | 49166 | 162.159.135.233 | 192.168.2.22 |
May 19, 2021 10:38:03.212018967 CEST | 49166 | 443 | 192.168.2.22 | 162.159.135.233 |
May 19, 2021 10:38:03.232162952 CEST | 49166 | 443 | 192.168.2.22 | 162.159.135.233 |
May 19, 2021 10:38:03.274086952 CEST | 443 | 49166 | 162.159.135.233 | 192.168.2.22 |
May 19, 2021 10:38:03.274559975 CEST | 443 | 49166 | 162.159.135.233 | 192.168.2.22 |
May 19, 2021 10:38:03.274612904 CEST | 49166 | 443 | 192.168.2.22 | 162.159.135.233 |
May 19, 2021 10:38:03.533233881 CEST | 49166 | 443 | 192.168.2.22 | 162.159.135.233 |
May 19, 2021 10:38:03.575202942 CEST | 443 | 49166 | 162.159.135.233 | 192.168.2.22 |
May 19, 2021 10:38:03.831617117 CEST | 443 | 49166 | 162.159.135.233 | 192.168.2.22 |
May 19, 2021 10:38:03.831672907 CEST | 443 | 49166 | 162.159.135.233 | 192.168.2.22 |
May 19, 2021 10:38:03.831830978 CEST | 49166 | 443 | 192.168.2.22 | 162.159.135.233 |
May 19, 2021 10:38:03.832951069 CEST | 49166 | 443 | 192.168.2.22 | 162.159.135.233 |
May 19, 2021 10:38:03.832978010 CEST | 49166 | 443 | 192.168.2.22 | 162.159.135.233 |
May 19, 2021 10:38:03.855190039 CEST | 49165 | 80 | 192.168.2.22 | 162.159.135.233 |
UDP Packets |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
May 19, 2021 10:38:02.857032061 CEST | 52197 | 53 | 192.168.2.22 | 8.8.8.8 |
May 19, 2021 10:38:02.919687033 CEST | 53 | 52197 | 8.8.8.8 | 192.168.2.22 |
May 19, 2021 10:38:02.920067072 CEST | 52197 | 53 | 192.168.2.22 | 8.8.8.8 |
May 19, 2021 10:38:02.981113911 CEST | 53 | 52197 | 8.8.8.8 | 192.168.2.22 |
DNS Queries |
---|
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
May 19, 2021 10:38:02.857032061 CEST | 192.168.2.22 | 8.8.8.8 | 0xd372 | Standard query (0) | A (IP address) | IN (0x0001) | |
May 19, 2021 10:38:02.920067072 CEST | 192.168.2.22 | 8.8.8.8 | 0xd372 | Standard query (0) | A (IP address) | IN (0x0001) |
DNS Answers |
---|
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
May 19, 2021 10:38:02.919687033 CEST | 8.8.8.8 | 192.168.2.22 | 0xd372 | No error (0) | 162.159.134.233 | A (IP address) | IN (0x0001) | ||
May 19, 2021 10:38:02.919687033 CEST | 8.8.8.8 | 192.168.2.22 | 0xd372 | No error (0) | 162.159.133.233 | A (IP address) | IN (0x0001) | ||
May 19, 2021 10:38:02.919687033 CEST | 8.8.8.8 | 192.168.2.22 | 0xd372 | No error (0) | 162.159.129.233 | A (IP address) | IN (0x0001) | ||
May 19, 2021 10:38:02.919687033 CEST | 8.8.8.8 | 192.168.2.22 | 0xd372 | No error (0) | 162.159.135.233 | A (IP address) | IN (0x0001) | ||
May 19, 2021 10:38:02.919687033 CEST | 8.8.8.8 | 192.168.2.22 | 0xd372 | No error (0) | 162.159.130.233 | A (IP address) | IN (0x0001) | ||
May 19, 2021 10:38:02.981113911 CEST | 8.8.8.8 | 192.168.2.22 | 0xd372 | No error (0) | 162.159.135.233 | A (IP address) | IN (0x0001) | ||
May 19, 2021 10:38:02.981113911 CEST | 8.8.8.8 | 192.168.2.22 | 0xd372 | No error (0) | 162.159.130.233 | A (IP address) | IN (0x0001) | ||
May 19, 2021 10:38:02.981113911 CEST | 8.8.8.8 | 192.168.2.22 | 0xd372 | No error (0) | 162.159.129.233 | A (IP address) | IN (0x0001) | ||
May 19, 2021 10:38:02.981113911 CEST | 8.8.8.8 | 192.168.2.22 | 0xd372 | No error (0) | 162.159.134.233 | A (IP address) | IN (0x0001) | ||
May 19, 2021 10:38:02.981113911 CEST | 8.8.8.8 | 192.168.2.22 | 0xd372 | No error (0) | 162.159.133.233 | A (IP address) | IN (0x0001) |
HTTP Request Dependency Graph |
---|
|
HTTP Packets |
---|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.2.22 | 49165 | 162.159.135.233 | 80 | C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
May 19, 2021 10:38:03.036863089 CEST | 1 | OUT | |
May 19, 2021 10:38:03.089543104 CEST | 1 | IN |
HTTPS Packets |
---|
Timestamp | Source IP | Source Port | Dest IP | Dest Port | Subject | Issuer | Not Before | Not After | JA3 SSL Client Fingerprint | JA3 SSL Client Digest |
---|---|---|---|---|---|---|---|---|---|---|
May 19, 2021 10:38:03.211925983 CEST | 162.159.135.233 | 443 | 192.168.2.22 | 49166 | CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=CA, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US | CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE | Tue Jan 19 01:00:00 CET 2021 Mon Jan 27 13:48:08 CET 2020 | Wed Jan 19 00:59:59 CET 2022 Wed Jan 01 00:59:59 CET 2025 | 771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,0 | 7dcce5b76c8b17472d024758970a406b |
CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US | CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE | Mon Jan 27 13:48:08 CET 2020 | Wed Jan 01 00:59:59 CET 2025 |
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
High Level Behavior Distribution |
---|
back
Click to dive into process behavior distribution
Behavior |
---|
Click to jump to process
System Behavior |
---|
General |
---|
Start time: | 10:37:32 |
Start date: | 19/05/2021 |
Path: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x13fb00000 |
File size: | 1424032 bytes |
MD5 hash: | 95C38D04597050285A18F66039EDB456 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
General |
---|
Start time: | 10:37:34 |
Start date: | 19/05/2021 |
Path: | C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 543304 bytes |
MD5 hash: | A87236E214F6D42A65F5DEDAC816AEC8 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Disassembly |
---|