Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
New Order .doc

Overview

General Information

Sample name:New Order .doc
Analysis ID:1430744
MD5:69240ac6d3cc2f6492cfb3cc28d8101f
SHA1:62b38312ceecc9b63b105b5ecfb2fa040b860e8b
SHA256:3fa5ed610869026eed1584df572c5030854158ddf05e0a2987d01cb29dec6241
Tags:doc
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (process start blacklist hit)
Installs new ROOT certificates
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Equation Editor Network Connection
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Stores large binary data to the registry
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 3036 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • EQNEDT32.EXE (PID: 2544 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • EQNEDT32.EXE (PID: 3248 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
New Order .docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x8233:$obj2: \objdata
  • 0x824d:$obj3: \objupdate
  • 0x820e:$obj6: \objlink

System Summary

barindex
Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 172.67.134.136, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2544, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49163
Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2544, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3036, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://dukeenergyltd.top/IAvira URL Cloud: Label: malware
Source: https://dukeenergyltd.top/hon.scrFAvira URL Cloud: Label: malware
Source: https://dukeenergyltd.top/AAvira URL Cloud: Label: malware
Source: https://dukeenergyltd.top/hon.scrAvira URL Cloud: Label: malware
Source: https://dukeenergyltd.top/hon.scrPAvira URL Cloud: Label: malware
Source: https://dukeenergyltd.top/hon.scrjAvira URL Cloud: Label: malware
Source: dukeenergyltd.topVirustotal: Detection: 25%Perma Link
Source: https://dukeenergyltd.top/hon.scrVirustotal: Detection: 23%Perma Link
Source: New Order .docReversingLabs: Detection: 50%
Source: New Order .docVirustotal: Detection: 43%Perma Link

Exploits

barindex
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 172.67.134.136 Port: 443Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: unknownJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: unknownHTTPS traffic detected: 172.67.134.136:443 -> 192.168.2.22:49163 version: TLS 1.2

Software Vulnerabilities

barindex
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
Source: global trafficDNS query: name: dukeenergyltd.top
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.134.136:443
Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
Source: global trafficHTTP traffic detected: GET /hon.scr HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: dukeenergyltd.topConnection: Keep-Alive
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A25D5808-01F0-4641-9DFA-252321211B8D}.tmpJump to behavior
Source: global trafficHTTP traffic detected: GET /hon.scr HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: dukeenergyltd.topConnection: Keep-Alive
Source: EQNEDT32.EXE, 00000002.00000002.355159790.00000000005BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
Source: unknownDNS traffic detected: queries for: dukeenergyltd.top
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 24 Apr 2024 04:57:34 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingLast-Modified: Thu, 28 Mar 2024 01:13:19 GMTCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=lod%2FR6mMtjBBPEHRsSwYKXP1yEGL4v6rZ%2B5491vOExu0sagjCJVTnoZ3jt44A0TOg5CDQsbsAPKl6%2FO83OdyQ1%2BYwq%2BT8DbndKdcj6bpKq8dO9%2BdGLra8Y6ScLgr3h%2BYfl6yEw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Strict-Transport-Security: max-age=0; includeSubDomains; preloadX-Content-Type-Options: nosniffServer: cloudflareCF-RAY: 87938362e9512b5e-LAXalt-svc: h3=":443"; ma=86400
Source: EQNEDT32.EXE, 00000002.00000002.355159790.00000000005BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: EQNEDT32.EXE, 00000002.00000002.355159790.00000000005BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
Source: EQNEDT32.EXE, 00000002.00000002.355159790.00000000005BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
Source: EQNEDT32.EXE, 00000002.00000002.355159790.00000000005BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
Source: EQNEDT32.EXE, 00000002.00000002.355159790.00000000005BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: EQNEDT32.EXE, 00000002.00000002.355159790.00000000005BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
Source: EQNEDT32.EXE, 00000002.00000002.355159790.00000000005BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
Source: EQNEDT32.EXE, 00000002.00000002.355159790.00000000005BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
Source: EQNEDT32.EXE, 00000002.00000002.355159790.00000000005BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
Source: EQNEDT32.EXE, 00000002.00000002.355159790.00000000005BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
Source: EQNEDT32.EXE, 00000002.00000002.355159790.00000000005BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
Source: EQNEDT32.EXE, 00000002.00000002.355159790.00000000005BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
Source: EQNEDT32.EXE, 00000002.00000002.355159790.00000000005BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
Source: EQNEDT32.EXE, 00000002.00000002.355159790.00000000005BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
Source: EQNEDT32.EXE, 00000002.00000002.355159790.00000000005BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
Source: EQNEDT32.EXE, 00000002.00000002.355159790.00000000005BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
Source: EQNEDT32.EXE, 00000002.00000002.355159790.000000000056D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dukeenergyltd.top/A
Source: EQNEDT32.EXE, 00000002.00000002.355159790.000000000056D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dukeenergyltd.top/I
Source: EQNEDT32.EXE, EQNEDT32.EXE, 00000002.00000002.355359988.00000000040B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dukeenergyltd.top/hon.scr
Source: EQNEDT32.EXE, 00000002.00000002.355159790.000000000053F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dukeenergyltd.top/hon.scrF
Source: EQNEDT32.EXE, 00000002.00000002.355159790.000000000053F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dukeenergyltd.top/hon.scrP
Source: EQNEDT32.EXE, 00000002.00000002.355159790.000000000053F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dukeenergyltd.top/hon.scrj
Source: EQNEDT32.EXE, 00000002.00000002.355159790.00000000005BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
Source: unknownNetwork traffic detected: HTTP traffic on port 49163 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49163
Source: unknownHTTPS traffic detected: 172.67.134.136:443 -> 192.168.2.22:49163 version: TLS 1.2

System Summary

barindex
Source: New Order .doc, type: SAMPLEMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
Source: Screenshot number: 4Screenshot OCR: Enable editing from the yellow bar above.The independent auditors' opinion says the financial state
Source: Screenshot number: 8Screenshot OCR: Enable editing Hom the yellow bx above.The indqpendmt auditors' opinion says the fnancial statemmts
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: New Order .doc, type: SAMPLEMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
Source: classification engineClassification label: mal100.expl.winDOC@4/7@1/1
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$w Order .docJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR74D1.tmpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: New Order .docReversingLabs: Detection: 50%
Source: New Order .docVirustotal: Detection: 43%
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: credssp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ncrypt.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: bcrypt.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: gpapi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
Source: New Order .LNK.0.drLNK file: ..\..\..\..\..\Desktop\New Order .doc
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00556E46 push ebp; ret 2_2_00556E47
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0054E505 push 127256F0h; ret 2_2_0054E641
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00549031 push edx; retf 2_2_00549032
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00556E3E push ebp; ret 2_2_00556E3F
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0055542A push ebx; ret 2_2_0055542B
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005564D4 push dword ptr [ecx+ebp-50h]; ret 2_2_005564DB
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00556DDE push ebx; ret 2_2_00556DDF
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005401F4 push eax; retf 2_2_005401F5
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005564E1 push dword ptr [ecx+ebp-50h]; ret 2_2_005564EB
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005552EE push ecx; ret 2_2_005552EF
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00555492 push esp; ret 2_2_00555493
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0055548A push esp; ret 2_2_0055548B

Persistence and Installation Behavior

barindex
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2064Thread sleep time: -240000s >= -30000sJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3268Thread sleep time: -180000s >= -30000sJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts33
Exploitation for Client Execution
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory1
Remote System Discovery
Remote Desktop ProtocolData from Removable Media4
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Modify Registry
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Virtualization/Sandbox Evasion
NTDS3
System Information Discovery
Distributed Component Object ModelInput Capture14
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Process Injection
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Install Root Certificate
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
New Order .doc50%ReversingLabsDocument-RTF.Exploit.CVE-2017-11882
New Order .doc43%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
dukeenergyltd.top26%VirustotalBrowse
SourceDetectionScannerLabelLink
http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
http://ocsp.entrust.net030%URL Reputationsafe
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
http://ocsp.entrust.net0D0%URL Reputationsafe
https://dukeenergyltd.top/I100%Avira URL Cloudmalware
https://dukeenergyltd.top/hon.scrF100%Avira URL Cloudmalware
https://dukeenergyltd.top/A100%Avira URL Cloudmalware
https://dukeenergyltd.top/hon.scr100%Avira URL Cloudmalware
https://dukeenergyltd.top/hon.scrP100%Avira URL Cloudmalware
https://dukeenergyltd.top/hon.scrj100%Avira URL Cloudmalware
https://dukeenergyltd.top/hon.scr24%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
dukeenergyltd.top
172.67.134.136
truetrueunknown
NameMaliciousAntivirus DetectionReputation
https://dukeenergyltd.top/hon.scrtrue
  • 24%, Virustotal, Browse
  • Avira URL Cloud: malware
unknown
NameSourceMaliciousAntivirus DetectionReputation
https://dukeenergyltd.top/AEQNEDT32.EXE, 00000002.00000002.355159790.000000000056D000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: malware
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0EQNEDT32.EXE, 00000002.00000002.355159790.00000000005BA000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://crl.entrust.net/server1.crl0EQNEDT32.EXE, 00000002.00000002.355159790.00000000005BA000.00000004.00000020.00020000.00000000.sdmpfalse
    high
    http://ocsp.entrust.net03EQNEDT32.EXE, 00000002.00000002.355159790.00000000005BA000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://dukeenergyltd.top/hon.scrPEQNEDT32.EXE, 00000002.00000002.355159790.000000000053F000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: malware
    unknown
    https://dukeenergyltd.top/IEQNEDT32.EXE, 00000002.00000002.355159790.000000000056D000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: malware
    unknown
    http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0EQNEDT32.EXE, 00000002.00000002.355159790.00000000005BA000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://www.diginotar.nl/cps/pkioverheid0EQNEDT32.EXE, 00000002.00000002.355159790.00000000005BA000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://dukeenergyltd.top/hon.scrFEQNEDT32.EXE, 00000002.00000002.355159790.000000000053F000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: malware
    unknown
    https://dukeenergyltd.top/hon.scrjEQNEDT32.EXE, 00000002.00000002.355159790.000000000053F000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: malware
    unknown
    http://ocsp.entrust.net0DEQNEDT32.EXE, 00000002.00000002.355159790.00000000005BA000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://secure.comodo.com/CPS0EQNEDT32.EXE, 00000002.00000002.355159790.00000000005BA000.00000004.00000020.00020000.00000000.sdmpfalse
      high
      http://crl.entrust.net/2048ca.crl0EQNEDT32.EXE, 00000002.00000002.355159790.00000000005BA000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        172.67.134.136
        dukeenergyltd.topUnited States
        13335CLOUDFLARENETUStrue
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1430744
        Start date and time:2024-04-24 06:56:40 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 4m 23s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:defaultwindowsofficecookbook.jbs
        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
        Number of analysed new started processes analysed:9
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:New Order .doc
        Detection:MAL
        Classification:mal100.expl.winDOC@4/7@1/1
        EGA Information:Failed
        HCA Information:Failed
        Cookbook Comments:
        • Found application associated with file extension: .doc
        • Found Word or Excel or PowerPoint or XPS Viewer
        • Attach to Office via COM
        • Active ActiveX Object
        • Scroll down
        • Close Viewer
        • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, svchost.exe
        • Execution Graph export aborted for target EQNEDT32.EXE, PID 2544 because there are no executed function
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        TimeTypeDescription
        06:57:30API Interceptor284x Sleep call for process: EQNEDT32.EXE modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        172.67.134.136Invoice.docGet hashmaliciousAgentTeslaBrowse
          ATTHACHED SCAN-P.O SPECIFICATIONS.009.24. 001.docGet hashmaliciousSnake KeyloggerBrowse
            03224.docGet hashmaliciousAgentTeslaBrowse
              Payment_Advice.docGet hashmaliciousUnknownBrowse
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                dukeenergyltd.topInvoice.docGet hashmaliciousAgentTeslaBrowse
                • 172.67.134.136
                BNP Paribas_RemittanceAdviceNotification106173036326.docGet hashmaliciousAgentTeslaBrowse
                • 104.21.25.202
                ATTHACHED SCAN-P.O SPECIFICATIONS.009.24. 001.docGet hashmaliciousSnake KeyloggerBrowse
                • 172.67.134.136
                NEW ORDER.docGet hashmaliciousHTMLPhisherBrowse
                • 104.21.25.202
                MV SUN OCEAN BUNKER INV.docGet hashmaliciousAgentTeslaBrowse
                • 104.21.25.202
                RFQ.docGet hashmaliciousUnknownBrowse
                • 104.21.25.202
                03224.docGet hashmaliciousAgentTeslaBrowse
                • 172.67.134.136
                PO881620-2024.docGet hashmaliciousRemcosBrowse
                • 104.21.25.202
                PROFORMA INVOICE.docGet hashmaliciousUnknownBrowse
                • 104.21.25.202
                SecuriteInfo.com.Exploit.CVE-2018-0798.4.13423.15596.rtfGet hashmaliciousUnknownBrowse
                • 104.21.25.202
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                CLOUDFLARENETUSorden de compra.vbsGet hashmaliciousAgentTeslaBrowse
                • 104.21.84.67
                DHL Shipping doc.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                • 104.26.13.205
                Reconfirm Details.vbsGet hashmaliciousAgentTeslaBrowse
                • 172.67.215.45
                Remittance-Advice.docGet hashmaliciousUnknownBrowse
                • 172.67.175.222
                shipping docs.docGet hashmaliciousUnknownBrowse
                • 104.21.74.191
                Invoice.docGet hashmaliciousAgentTeslaBrowse
                • 172.67.134.136
                Pedido02304024.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                • 172.67.152.117
                purchase order pdf.exeGet hashmaliciousAgentTeslaBrowse
                • 104.26.12.205
                PO 23JC0704-Rollease-B.exeGet hashmaliciousAgentTeslaBrowse
                • 104.26.13.205
                UXNob1Dp32.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, VidarBrowse
                • 104.21.65.24
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                7dcce5b76c8b17472d024758970a406bRemittance-Advice.docGet hashmaliciousUnknownBrowse
                • 172.67.134.136
                shipping docs.docGet hashmaliciousUnknownBrowse
                • 172.67.134.136
                Invoice.docGet hashmaliciousAgentTeslaBrowse
                • 172.67.134.136
                Gam.xlsGet hashmaliciousUnknownBrowse
                • 172.67.134.136
                Invoice.docGet hashmaliciousUnknownBrowse
                • 172.67.134.136
                Gam.xlsGet hashmaliciousUnknownBrowse
                • 172.67.134.136
                New order-Docs0374.xlsGet hashmaliciousUnknownBrowse
                • 172.67.134.136
                gmb.xlsGet hashmaliciousUnknownBrowse
                • 172.67.134.136
                BNP Paribas_RemittanceAdviceNotification106173036326.docGet hashmaliciousAgentTeslaBrowse
                • 172.67.134.136
                ATTHACHED SCAN-P.O SPECIFICATIONS.009.24. 001.docGet hashmaliciousSnake KeyloggerBrowse
                • 172.67.134.136
                No context
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):16384
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:3::
                MD5:CE338FE6899778AACFC28414F2D9498B
                SHA1:897256B6709E1A4DA9DABA92B6BDE39CCFCCD8C1
                SHA-256:4FE7B59AF6DE3B665B67788CC2F99892AB827EFAE3A467342B3BB4E3BC8E5BFE
                SHA-512:6EB7F16CF7AFCABE9BDEA88BDAB0469A7937EB715ADA9DFD8F428D9D38D86133945F5F2F2688DDD96062223A39B5D47F07AFC3C48D9DB1D5EE3F41C8D274DCCF
                Malicious:false
                Reputation:high, very likely benign file
                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):68096
                Entropy (8bit):3.722715315987795
                Encrypted:false
                SSDEEP:768:YgI2Q5Q6IQXwvW5Kq2g05gI2Q5Q6IQXwvW5Kq2g05gI2Q5Q6IQXwvW5Kq2g0cR3D:7SyemuSyemuSyemQRRgtWdB
                MD5:30D6B59D0D5A1C8063BBFFB11131C92C
                SHA1:47A4D255E02B14B802E255EE63FA717628931B88
                SHA-256:5F8543810B1BB24A84236B65E253741885698FB46CA31E61339D8B908739EA65
                SHA-512:8A46BC87BAA513A5A44C251FD4EBA8B860E4C6FD9C1DAF8517AAFD3D8154283C4F0D42FAFEF998ED0F14860103952CA673F2FB2444E66A56639C5D0995D8B22C
                Malicious:false
                Reputation:low
                Preview:9.2.3.9.1.6.4.p.l.e.a.s.e. .c.l.i.c.k. .E.n.a.b.l.e. .e.d.i.t.i.n.g. .f.r.o.m. .t.h.e. .y.e.l.l.o.w. .b.a.r. .a.b.o.v.e...T.h.e. .i.n.d.e.p.e.n.d.e.n.t. .a.u.d.i.t.o.r.s.. .o.p.i.n.i.o.n. .s.a.y.s. .t.h.e. .f.i.n.a.n.c.i.a.l. .s.t.a.t.e.m.e.n.t.s. .a.r.e. .f.a.i.r.l.y. .s.t.a.t.e.d. .i.n. .a.c.c.o.r.d.a.n.c.e. .w.i.t.h. .t.h.e. .b.a.s.i.s. .o.f. .a.c.c.o.u.n.t.i.n.g. .u.s.e.d. .b.y. .y.o.u.r. .o.r.g.a.n.i.z.a.t.i.o.n... .S.o. .w.h.y. .a.r.e. .t.h.e. .a.u.d.i.t.o.r.s. .g.i.v.i.n.g. .y.o.u. .t.h.a.t. .o.t.h.e.r. .l.e.t.t.e.r. .I.n. .a.n. .a.u.d.i.t. .o.f. .f.i.n.a.n.c.i.a.l. .s.t.a.t.e.m.e.n.t.s.,. .p.r.o.f.e.s.s.i.o.n.a.l. .s.t.a.n.d.a.r.d.s. .r.e.q.u.i.r.e. .t.h.a.t. .a.u.d.i.t.o.r.s. .o.b.t.a.i.n. .a.n. .u.n.d.e.r.s.t.a.n.d.i.n.g. .o.f. .i.n.t.e.r.n.a.l. .c.o.n.t.r.o.l.s. .t.o. .t.h.e. .e.x.t.e.n.t. .n.e.c.e.s.s.a.r.y. .t.o. .p.l.a.n. .t.h.e. .a.u.d.i.t... .A.u.d.i.t.o.r.s. .u.s.e. .t.h.i.s. .u.n.d.e.r.s.t.a.n.d.i.n.g. .o.f. .i.n.t.e.r.n.a.l. .c.o.n.t.r.o.l.s. .t.o. .a.s.s.e.s.s. .t.
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):1024
                Entropy (8bit):0.05390218305374581
                Encrypted:false
                SSDEEP:3:ol3lYdn:4Wn
                MD5:5D4D94EE7E06BBB0AF9584119797B23A
                SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                Malicious:false
                Reputation:high, very likely benign file
                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:08 2023, mtime=Fri Aug 11 15:42:08 2023, atime=Wed Apr 24 03:57:28 2024, length=220721, window=hide
                Category:dropped
                Size (bytes):1014
                Entropy (8bit):4.533584191696947
                Encrypted:false
                SSDEEP:12:84nFgXg/XAlCPCHaXHBWB/5YXX+WdcWI5XicvbptvnlJDtZ3YilMMEpxRljK2XTE:8I/XTXU4XLe/vrDv3qFk7N
                MD5:792E15CC50D96372CF35A04466579C06
                SHA1:1264CE0BA666C259DCFE4825F9079399633C404F
                SHA-256:CFC4778C11F3C69AC1031015FFCA0AB7E64B259E85B92C17276621EC39C88969
                SHA-512:550955D2A43354082803A4800B3D1BCE23CA4AEF4857E807D232B8E0C39E77F691434C238CE477397D859E964C7EEA02A3ED52E35A8DED8709C8077B732AE933
                Malicious:false
                Reputation:low
                Preview:L..................F.... .......r.......r...XF%.....1^...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......X,'..user.8......QK.X.X,'*...&=....U...............A.l.b.u.s.....z.1......WF...Desktop.d......QK.X.WF.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....f.2.1^...X/' .NEWORD~1.DOC..J.......WE..WE.*.........................N.e.w. .O.r.d.e.r. ...d.o.c.......x...............-...8...[............?J......C:\Users\..#...................\\745773\Users.user\Desktop\New Order .doc.%.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.N.e.w. .O.r.d.e.r. ...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......745773..........D_....3N...W...9.W.e8...8.....[D_....3N...W...9.W.e8
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:Generic INItialization configuration [folders]
                Category:dropped
                Size (bytes):54
                Entropy (8bit):4.213789706813958
                Encrypted:false
                SSDEEP:3:M1v6lm436lv:Mo81
                MD5:97049608E374A15C119AD977EA5097CB
                SHA1:AC4D590A1B5D1731ABDA12439363C64CDE50145A
                SHA-256:42822CDD5E4A72FA0661A76EDF1C7D50B0389B3C76DCC7CACEE472283957E124
                SHA-512:41A82EA17ABBE51708355F9070433F5792E6CE944EEC441E3D26239818EF5136314C9DF26C8D2FB5ADB9BFFCE22F9CD02FB1EDD4F0005E6FE13D97617215DCF8
                Malicious:false
                Reputation:low
                Preview:[doc]..New Order .LNK=0..[folders]..New Order .LNK=0..
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):162
                Entropy (8bit):2.4797606462020307
                Encrypted:false
                SSDEEP:3:vrJlaCkWtVyYyBS0JilXMWvk1c6nlln:vdsCkWtIJiRk3l
                MD5:C4615A023DC40AFFAEAE6CF07410BB43
                SHA1:AAE1D68C4082CABF6AEA71C7981F32928CE01843
                SHA-256:103F860A912CF17B87A169B2768635758E8A0B82EB986A0C42FEA974F91BCB1E
                SHA-512:CD6975EAE1DA934094AC2516D095D50F2EE311CF549C8AEA2F3D65074B0DFC2908F72703B46A4C012358817289C76B15AC0E39EE359BCF39A45A8C912DCB2AAD
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):162
                Entropy (8bit):2.4797606462020307
                Encrypted:false
                SSDEEP:3:vrJlaCkWtVyYyBS0JilXMWvk1c6nlln:vdsCkWtIJiRk3l
                MD5:C4615A023DC40AFFAEAE6CF07410BB43
                SHA1:AAE1D68C4082CABF6AEA71C7981F32928CE01843
                SHA-256:103F860A912CF17B87A169B2768635758E8A0B82EB986A0C42FEA974F91BCB1E
                SHA-512:CD6975EAE1DA934094AC2516D095D50F2EE311CF549C8AEA2F3D65074B0DFC2908F72703B46A4C012358817289C76B15AC0E39EE359BCF39A45A8C912DCB2AAD
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                File type:Rich Text Format data, version 1
                Entropy (8bit):3.1699323454489723
                TrID:
                • Rich Text Format (5005/1) 55.56%
                • Rich Text Format (4004/1) 44.44%
                File name:New Order .doc
                File size:220'721 bytes
                MD5:69240ac6d3cc2f6492cfb3cc28d8101f
                SHA1:62b38312ceecc9b63b105b5ecfb2fa040b860e8b
                SHA256:3fa5ed610869026eed1584df572c5030854158ddf05e0a2987d01cb29dec6241
                SHA512:bb4fa9b213443645696a3a9c4fb95457c9aa504cd0580b00e6e3710605d191e3efa1bcce1239692adb45ccaac0e9e75d45fdcb2c0c709c31662ea1b656c13337
                SSDEEP:768:dwAbZSibMX9gRWjtwAbZSibMX9gRWjtwAbZSibMX9gRWjPp57E73+oWPsh0ZyCOV:dwAlRkwAlRkwAlRA6SUh0ZyCOrg+p9
                TLSH:0824796DC34F0159CF624376AB571E1442BDBA6EF38452B4302C537933EAC39A2252BD
                File Content Preview:{\rtf1..{\*\DnxQ0UmO2ntBW9nuNlbjRFN2oMbyV8x0JEM0zSBMdboWHZOaserNK79Xy6o39YgwAhyCMXSyXh44cWddVMp}..{\39239164please click Enable editing from the yellow bar above.The independent auditors. opinion says the financial statements are fairly stated in accordan
                Icon Hash:2764a3aaaeb7bdbf
                IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
                00000823Dhno
                TimestampSource PortDest PortSource IPDest IP
                Apr 24, 2024 06:57:33.267716885 CEST49163443192.168.2.22172.67.134.136
                Apr 24, 2024 06:57:33.267815113 CEST44349163172.67.134.136192.168.2.22
                Apr 24, 2024 06:57:33.267903090 CEST49163443192.168.2.22172.67.134.136
                Apr 24, 2024 06:57:33.292226076 CEST49163443192.168.2.22172.67.134.136
                Apr 24, 2024 06:57:33.292269945 CEST44349163172.67.134.136192.168.2.22
                Apr 24, 2024 06:57:33.641072035 CEST44349163172.67.134.136192.168.2.22
                Apr 24, 2024 06:57:33.641244888 CEST49163443192.168.2.22172.67.134.136
                Apr 24, 2024 06:57:33.646837950 CEST49163443192.168.2.22172.67.134.136
                Apr 24, 2024 06:57:33.646856070 CEST44349163172.67.134.136192.168.2.22
                Apr 24, 2024 06:57:33.647208929 CEST44349163172.67.134.136192.168.2.22
                Apr 24, 2024 06:57:33.647273064 CEST49163443192.168.2.22172.67.134.136
                Apr 24, 2024 06:57:33.759428024 CEST49163443192.168.2.22172.67.134.136
                Apr 24, 2024 06:57:33.800124884 CEST44349163172.67.134.136192.168.2.22
                Apr 24, 2024 06:57:34.353935957 CEST44349163172.67.134.136192.168.2.22
                Apr 24, 2024 06:57:34.354048967 CEST49163443192.168.2.22172.67.134.136
                Apr 24, 2024 06:57:34.354108095 CEST44349163172.67.134.136192.168.2.22
                Apr 24, 2024 06:57:34.354173899 CEST49163443192.168.2.22172.67.134.136
                Apr 24, 2024 06:57:34.354187965 CEST44349163172.67.134.136192.168.2.22
                Apr 24, 2024 06:57:34.354245901 CEST49163443192.168.2.22172.67.134.136
                Apr 24, 2024 06:57:34.354258060 CEST44349163172.67.134.136192.168.2.22
                Apr 24, 2024 06:57:34.354357958 CEST49163443192.168.2.22172.67.134.136
                Apr 24, 2024 06:57:34.354367971 CEST44349163172.67.134.136192.168.2.22
                Apr 24, 2024 06:57:34.354422092 CEST49163443192.168.2.22172.67.134.136
                Apr 24, 2024 06:57:34.354432106 CEST44349163172.67.134.136192.168.2.22
                Apr 24, 2024 06:57:34.354469061 CEST44349163172.67.134.136192.168.2.22
                Apr 24, 2024 06:57:34.354484081 CEST49163443192.168.2.22172.67.134.136
                Apr 24, 2024 06:57:34.354523897 CEST49163443192.168.2.22172.67.134.136
                Apr 24, 2024 06:57:34.359680891 CEST49163443192.168.2.22172.67.134.136
                Apr 24, 2024 06:57:34.359680891 CEST49163443192.168.2.22172.67.134.136
                Apr 24, 2024 06:57:34.359735012 CEST44349163172.67.134.136192.168.2.22
                Apr 24, 2024 06:57:34.359788895 CEST49163443192.168.2.22172.67.134.136
                TimestampSource PortDest PortSource IPDest IP
                Apr 24, 2024 06:57:32.995398045 CEST5456253192.168.2.228.8.8.8
                Apr 24, 2024 06:57:33.169203997 CEST53545628.8.8.8192.168.2.22
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Apr 24, 2024 06:57:32.995398045 CEST192.168.2.228.8.8.80x940dStandard query (0)dukeenergyltd.topA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Apr 24, 2024 06:57:33.169203997 CEST8.8.8.8192.168.2.220x940dNo error (0)dukeenergyltd.top172.67.134.136A (IP address)IN (0x0001)false
                Apr 24, 2024 06:57:33.169203997 CEST8.8.8.8192.168.2.220x940dNo error (0)dukeenergyltd.top104.21.25.202A (IP address)IN (0x0001)false
                • dukeenergyltd.top
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.2249163172.67.134.1364432544C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                TimestampBytes transferredDirectionData
                2024-04-24 04:57:33 UTC311OUTGET /hon.scr HTTP/1.1
                Accept: */*
                Accept-Encoding: gzip, deflate
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                Host: dukeenergyltd.top
                Connection: Keep-Alive
                2024-04-24 04:57:34 UTC763INHTTP/1.1 404 Not Found
                Date: Wed, 24 Apr 2024 04:57:34 GMT
                Content-Type: text/html; charset=utf-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                Last-Modified: Thu, 28 Mar 2024 01:13:19 GMT
                CF-Cache-Status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=lod%2FR6mMtjBBPEHRsSwYKXP1yEGL4v6rZ%2B5491vOExu0sagjCJVTnoZ3jt44A0TOg5CDQsbsAPKl6%2FO83OdyQ1%2BYwq%2BT8DbndKdcj6bpKq8dO9%2BdGLra8Y6ScLgr3h%2BYfl6yEw%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Strict-Transport-Security: max-age=0; includeSubDomains; preload
                X-Content-Type-Options: nosniff
                Server: cloudflare
                CF-RAY: 87938362e9512b5e-LAX
                alt-svc: h3=":443"; ma=86400
                2024-04-24 04:57:34 UTC606INData Raw: 62 39 35 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 09 3c 68 65 61 64 3e 0a 09 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 20 2f 3e 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 09 09 3c 74 69 74 6c 65 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 09 3c 73 74 79 6c 65 3e 0a 09 09 09 62 6f 64 79 20 7b 0a 09 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 35 66 35 66 35 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 38 25 3b 0a 09 09 09 09 63 6f
                Data Ascii: b95<!DOCTYPE html><html lang="en"><head><meta charset="utf-8" /><meta name="viewport" content="width=device-width, initial-scale=1" /><title>Page Not Found</title><style>body {background-color: #f5f5f5;margin-top: 8%;co
                2024-04-24 04:57:34 UTC1369INData Raw: 65 69 67 68 74 3a 20 37 30 30 3b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 23 35 64 35 64 35 64 3b 0a 09 09 09 09 6c 65 74 74 65 72 2d 73 70 61 63 69 6e 67 3a 20 2d 30 2e 30 32 65 6d 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 33 30 70 78 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 33 30 70 78 3b 0a 09 09 09 7d 0a 0a 09 09 09 2e 63 6f 6e 74 61 69 6e 65 72 20 7b 0a 09 09 09 09 77 69 64 74 68 3a 20 31 30 30 25 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 20 61 75 74 6f 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 61 75 74 6f 3b 0a 09 09 09 7d 0a 0a 09 09 09 2e 61 6e 69 6d 61 74 65 5f 5f 61 6e 69 6d 61 74 65 64 20 7b 0a 09 09 09 09 61 6e 69 6d 61 74 69 6f 6e 2d 64 75 72 61 74 69 6f 6e 3a 20 31 73 3b 0a 09 09 09
                Data Ascii: eight: 700;color: #5d5d5d;letter-spacing: -0.02em;margin-bottom: 30px;margin-top: 30px;}.container {width: 100%;margin-right: auto;margin-left: auto;}.animate__animated {animation-duration: 1s;
                2024-04-24 04:57:34 UTC997INData Raw: 38 20 31 31 31 2e 30 38 33 20 32 34 38 20 32 34 38 7a 4d 32 36 32 2e 36 35 35 20 39 30 63 2d 35 34 2e 34 39 37 20 30 2d 38 39 2e 32 35 35 20 32 32 2e 39 35 37 2d 31 31 36 2e 35 34 39 20 36 33 2e 37 35 38 2d 33 2e 35 33 36 20 35 2e 32 38 36 2d 32 2e 33 35 33 20 31 32 2e 34 31 35 20 32 2e 37 31 35 20 31 36 2e 32 35 38 6c 33 34 2e 36 39 39 20 32 36 2e 33 31 63 35 2e 32 30 35 20 33 2e 39 34 37 20 31 32 2e 36 32 31 20 33 2e 30 30 38 20 31 36 2e 36 36 35 2d 32 2e 31 32 32 20 31 37 2e 38 36 34 2d 32 32 2e 36 35 38 20 33 30 2e 31 31 33 2d 33 35 2e 37 39 37 20 35 37 2e 33 30 33 2d 33 35 2e 37 39 37 20 32 30 2e 34 32 39 20 30 20 34 35 2e 36 39 38 20 31 33 2e 31 34 38 20 34 35 2e 36 39 38 20 33 32 2e 39 35 38 20 30 20 31 34 2e 39 37 36 2d 31 32 2e 33 36 33 20 32 32
                Data Ascii: 8 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22
                2024-04-24 04:57:34 UTC6INData Raw: 31 0d 0a 0a 0d 0a
                Data Ascii: 1
                2024-04-24 04:57:34 UTC5INData Raw: 30 0d 0a 0d 0a
                Data Ascii: 0


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:06:57:28
                Start date:24/04/2024
                Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                Wow64 process (32bit):false
                Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
                Imagebase:0x13fe30000
                File size:1'423'704 bytes
                MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:false

                Target ID:2
                Start time:06:57:29
                Start date:24/04/2024
                Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                Wow64 process (32bit):true
                Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                Imagebase:0x400000
                File size:543'304 bytes
                MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:5
                Start time:06:57:52
                Start date:24/04/2024
                Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                Wow64 process (32bit):true
                Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                Imagebase:0x400000
                File size:543'304 bytes
                MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:false

                No disassembly