Loading ...

Play interactive tourEdit tour

Analysis Report 855_28042020.doc

Overview

General Information

Sample Name:855_28042020.doc
Analysis ID:356432
MD5:eda54697e6ab436600b8b74102833d7e
SHA1:fe3b1e8337728c74600eab9cb5c9f073e7c04ced
SHA256:73bccef5c926cefd41f82a329a8ba732bf59195f19c67498ccf162caa6410de1
Tags:doc

Most interesting Screenshot:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Sigma detected: EQNEDT32.EXE connecting to internet
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication

Classification

Startup

  • System is w7x64
  • WINWORD.EXE (PID: 1324 cmdline: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding MD5: 95C38D04597050285A18F66039EDB456)
  • EQNEDT32.EXE (PID: 2504 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • EQNEDT32.EXE (PID: 2896 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

System Summary:

barindex
Sigma detected: EQNEDT32.EXE connecting to internetShow sources
Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 5.188.168.36, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2504, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49167

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Antivirus / Scanner detection for submitted sampleShow sources
Source: 855_28042020.docAvira: detected

Exploits:

barindex
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: unknownJump to behavior
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding

Compliance:

barindex
Uses new MSVCR DllsShow sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: global trafficDNS query: name: ichiseled.com
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 5.188.168.36:80
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 5.188.168.36:80
Source: Joe Sandbox ViewASN Name: GHOSTRU GHOSTRU
Source: global trafficHTTP traffic detected: GET /files/whe.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: ichiseled.comConnection: Keep-Alive
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{4A8E8FD7-B28F-4AE5-86AD-026C320EA73C}.tmpJump to behavior
Source: global trafficHTTP traffic detected: GET /files/whe.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: ichiseled.comConnection: Keep-Alive
Source: unknownDNS traffic detected: queries for: ichiseled.com
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 23 Feb 2021 06:45:03 GMTServer: ApacheAccept-Ranges: bytesCache-Control: no-cache, no-store, must-revalidatePragma: no-cacheExpires: 0Keep-Alive: timeout=5, max=100Connection: Keep-AliveTransfer-Encoding: chunkedContent-Type: text/htmlData Raw: 31 0d 0a 0a 0d 0a 31 0d 0a 0a 0d 0a 31 0d 0a 0a 0d 0a 31 35 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65 6e 74 3d 22 30 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 0d 0a 33 0d 0a 34 30 34 0d 0a Data Ascii: 111157<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" content="0"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>3404

System Summary:

barindex
Source: classification engineClassification label: mal60.expl.winDOC@4/6@1/1
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$5_28042020.docJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRC071.tmpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 1748Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2824Thread sleep time: -120000s >= -30000sJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsExploitation for Client Execution13Path InterceptionProcess Injection1Masquerading1OS Credential DumpingVirtualization/Sandbox Evasion1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol3Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol13Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerSystem Information Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer4Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
855_28042020.doc100%AviraEXP/CVE-2017-11882.Gen

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
http://ichiseled.com/files/whe.exe0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
ichiseled.com
5.188.168.36
truetrue
    unknown

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    http://ichiseled.com/files/whe.exetrue
    • Avira URL Cloud: safe
    unknown

    Contacted IPs

    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs

    Public

    IPDomainCountryFlagASNASN NameMalicious
    5.188.168.36
    unknownLuxembourg
    202422GHOSTRUtrue

    General Information

    Joe Sandbox Version:31.0.0 Emerald
    Analysis ID:356432
    Start date:23.02.2021
    Start time:07:44:14
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 4m 10s
    Hypervisor based Inspection enabled:false
    Report type:full
    Sample file name:855_28042020.doc
    Cookbook file name:defaultwindowsofficecookbook.jbs
    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
    Number of analysed new started processes analysed:7
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal60.expl.winDOC@4/6@1/1
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Found application associated with file extension: .doc
    • Found Word or Excel or PowerPoint or XPS Viewer
    • Attach to Office via COM
    • Active ActiveX Object
    • Scroll down
    • Close Viewer
    Warnings:
    Show All
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, svchost.exe
    • Report size getting too big, too many NtQueryAttributesFile calls found.
    • VT rate limit hit for: /opt/package/joesandbox/database/analysis/356432/sample/855_28042020.doc

    Simulations

    Behavior and APIs

    TimeTypeDescription
    07:44:35API Interceptor133x Sleep call for process: EQNEDT32.EXE modified

    Joe Sandbox View / Context

    IPs

    No context

    Domains

    No context

    ASN

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    GHOSTRUhttps://1drv.ms/u/s!AtNDrGhUgHhfcwNOdpu_of6_yGc?e=DAT50rGet hashmaliciousBrowse
    • 92.38.176.45
    PBS11220-938.docxGet hashmaliciousBrowse
    • 92.38.149.231
    PBS11220-938.docxGet hashmaliciousBrowse
    • 92.38.149.231
    PBS11220-938.docxGet hashmaliciousBrowse
    • 92.38.149.231
    PBS11220-938.docxGet hashmaliciousBrowse
    • 92.38.149.231
    CLBS_0011_1220.docxGet hashmaliciousBrowse
    • 92.38.149.231
    CLBS_0011_1220.docxGet hashmaliciousBrowse
    • 92.38.149.231
    xotSuOIKbi.xlsGet hashmaliciousBrowse
    • 92.38.149.158
    zy9QQDzlnE.xlsGet hashmaliciousBrowse
    • 92.38.149.158
    Q4vxXLDATP.xlsGet hashmaliciousBrowse
    • 92.38.149.158
    Yw0LOtqgpL.xlsGet hashmaliciousBrowse
    • 92.38.149.158
    2jNl8NS9Jo.xlsGet hashmaliciousBrowse
    • 92.38.149.158
    ACDI91mi98.xlsGet hashmaliciousBrowse
    • 92.38.149.158
    wsCoSRkLvk.xlsGet hashmaliciousBrowse
    • 92.38.149.158
    P5MoDTcLds.xlsGet hashmaliciousBrowse
    • 92.38.149.158
    dS5OowjWC8.xlsGet hashmaliciousBrowse
    • 92.38.149.158
    zmUCUZZCMs.xlsGet hashmaliciousBrowse
    • 92.38.149.158
    5I7jorVEfG.xlsGet hashmaliciousBrowse
    • 92.38.149.158
    irEHyx24HF.xlsGet hashmaliciousBrowse
    • 92.38.149.158
    dHpBuHv9gh.xlsGet hashmaliciousBrowse
    • 92.38.149.158

    JA3 Fingerprints

    No context

    Dropped Files

    No context

    Created / dropped Files

    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{4A8E8FD7-B28F-4AE5-86AD-026C320EA73C}.tmp
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):1024
    Entropy (8bit):0.05390218305374581
    Encrypted:false
    SSDEEP:3:ol3lYdn:4Wn
    MD5:5D4D94EE7E06BBB0AF9584119797B23A
    SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
    SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
    SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
    Malicious:false
    Reputation:high, very likely benign file
    Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B9C27487-05CF-4B4D-9079-2A6225ABAACB}.tmp
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):11806
    Entropy (8bit):3.580447935125362
    Encrypted:false
    SSDEEP:192:jL02t8cCtzLMiD8VPVhGMl9qcdT3u6KKYzyk1PDKNXLgSVG2+:jLzcSPHiWTTKKEVD4XN+
    MD5:C9BA1AECCE7D98DBDDCB0AEEB15A8AE1
    SHA1:2F04B13A7E26EA88E4B8B06F94481FC6718C3982
    SHA-256:FC4F91B5E532E908A87CEF1E7342F5C622468B2C146E49C5DE37192EE9C0524C
    SHA-512:3440C61313E0C7BEAEDE4B13C63329471D0B75815AA0EAD3B3CBDDE63E4DEEB0F2D34B0042A3891B8C91420BF33A4CA50DA050C1A501EB3E59E097EF0857A693
    Malicious:false
    Reputation:low
    Preview: !.(.#.%.:.7.-.<...7.?./.$.4.?.7.`.(.-._.^.^.$.,...&.9.<./.=./.&.8.2.].2.$.>.%.?.@...).?.1./.%.<.%.`.).#.|.?.-.0.1.@.<.;.=.?.$.9.2.[.0...=...<.-.$./.?.#.>.#.?.0.[.2.].>.%.<.|.%.*.)...7...'.[.<.9.4.+._.@.?.?.%.*.?.5.%.].?...).,.^./._.$.*.|...@.>.:.?.9.0.%.].%...%...].:.@.;.+.$.<.6.%.%.=.8.~.+.?.~.[.4.$.8.%.7.4.2.4.=...*.].9.(.,.-.,...<./...%.#.^.'.-...5.~.,.).:...$.`.)...5.[.@.;.[.3.).4./.@.0.1.).-.+.?.,.?.,._.2.?.,...3...<.*.,.?.).#.,...<.8.$.>...'.8.6.#./...?...7.^.2._.5.>...>.5.3.6.+.(.5.?.,.;.1.,.0.?.%.5.)./.<.8.4.6.+...2...4.1.....?./.#.<.~.%.!.&.0.?.*.?./...%.?.9...7.?.>./.,.(.,.?.#.^.].,.!.?.#.<.@.:.[.5.=...7...].]._.#.9.].#.%.,.3.7.6.=.2.*.[.`.9.5.?.;.2.`.].-./.-.~.].$.~._.%.7.%.@.%.#.].%.?.@.+.'...?.9.>...3.&.].%.?...%.~./.|.].?.].9.2.4.'.$.!._.,...=.%.@.?.-.%.1.?.$...'./.+.?.~.#...%._.:.].5.<.4.?...8.7...9.*.|./.2.5.*.!.!./.~.5...%.^.:...>.=._.~.5.[.*.;.=.,.4.,.>.8.0.#.+.?.).@./...@.1.?.(.`.`.=.%.:.2.>.4.|./._.!.;...:.=.8.[.|.&.:.?.?.^.#.).0.^...%...7.0.8.@.'.?.|...2.4.?.[.?.=.
    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\855_28042020.LNK
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:15 2020, mtime=Wed Aug 26 14:08:15 2020, atime=Tue Feb 23 14:44:33 2021, length=233718, window=hide
    Category:dropped
    Size (bytes):2048
    Entropy (8bit):4.5270538608112565
    Encrypted:false
    SSDEEP:24:88j/XTd6jFyl/euYDv3q7dM7dD28j/XTd6jFyl/euYDv3q7dM7dV:8o/XT0jF+/NH7Qh2o/XT0jF+/NH7Q/
    MD5:DFACD979067EC521D370F1FB1D73CAC3
    SHA1:DC5F1F69EE5D1ECC164DBDDEBD5656D73D090894
    SHA-256:9BD377FE647CBBCA1BABB4F03D6CA8F424E96CC60A43047A6ACA58AF57516FD6
    SHA-512:9B91DF04DCF768D828AA114C6C8FA68165444FB839D15478F69EB8E7CA55D5FF9837C5B0C971F78E1B04CE2056028FF9E833377E5E69E6BA91D5329963BD6E55
    Malicious:false
    Reputation:low
    Preview: L..................F.... .....x..{....x..{..e.Q..................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....j.2.....WR.} .855_28~1.DOC..N.......Q.y.Q.y*...8.....................8.5.5._.2.8.0.4.2.0.2.0...d.o.c.......z...............-...8...[............?J......C:\Users\..#...................\\226546\Users.user\Desktop\855_28042020.doc.'.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.8.5.5._.2.8.0.4.2.0.2.0...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......226546..........D_....3N...W...9F.C...........[D_....3N...W
    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):74
    Entropy (8bit):3.9246977103004834
    Encrypted:false
    SSDEEP:3:M1dyXxVFLUlr8XxVFLUlmX1dyXxVFLUlv:MsQsQJQ1
    MD5:B3F76E5B784F3ABF65B88E57AB4FA201
    SHA1:B43C3F1B5CBDF6B14884A1567756C6E519F5DAC9
    SHA-256:F1427C865618B10307D3938B11C9E9FD7A331859540B137B7C33596D1DE9618B
    SHA-512:4DCBCDCDACA33F2C977F24F3ABB08CEA43B9D1539897E48F169558D2755AD003DD1E2338AD589CE93E909D7459AF9E9E70319B0E609B9B432AAB9DB2234A94AC
    Malicious:false
    Reputation:low
    Preview: [doc]..855_28042020.LNK=0..855_28042020.LNK=0..[doc]..855_28042020.LNK=0..
    C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):162
    Entropy (8bit):2.431160061181642
    Encrypted:false
    SSDEEP:3:vrJlaCkWtVyokKOg5Gll3GwSKG/f2+1/ln:vdsCkWtW2IlID9l
    MD5:39EB3053A717C25AF84D576F6B2EBDD2
    SHA1:F6157079187E865C1BAADCC2014EF58440D449CA
    SHA-256:CD95C0EA3CEAEC724B510D6F8F43449B26DF97822F25BDA3316F5EAC3541E54A
    SHA-512:5AA3D344F90844D83477E94E0D0E0F3C96324D8C255C643D1A67FA2BB9EEBDF4F6A7447918F371844FCEDFCD6BBAAA4868FC022FDB666E62EB2D1BAB9028919C
    Malicious:false
    Reputation:high, very likely benign file
    Preview: .user..................................................A.l.b.u.s.............p.........w...............w.............P.w..............w.....z.........w.....x...
    C:\Users\user\Desktop\~$5_28042020.doc
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):162
    Entropy (8bit):2.431160061181642
    Encrypted:false
    SSDEEP:3:vrJlaCkWtVyokKOg5Gll3GwSKG/f2+1/ln:vdsCkWtW2IlID9l
    MD5:39EB3053A717C25AF84D576F6B2EBDD2
    SHA1:F6157079187E865C1BAADCC2014EF58440D449CA
    SHA-256:CD95C0EA3CEAEC724B510D6F8F43449B26DF97822F25BDA3316F5EAC3541E54A
    SHA-512:5AA3D344F90844D83477E94E0D0E0F3C96324D8C255C643D1A67FA2BB9EEBDF4F6A7447918F371844FCEDFCD6BBAAA4868FC022FDB666E62EB2D1BAB9028919C
    Malicious:false
    Reputation:high, very likely benign file
    Preview: .user..................................................A.l.b.u.s.............p.........w...............w.............P.w..............w.....z.........w.....x...

    Static File Info

    General

    File type:Rich Text Format data, unknown version
    Entropy (8bit):2.358539580854024
    TrID:
    • Rich Text Format (5005/1) 55.56%
    • Rich Text Format (4004/1) 44.44%
    File name:855_28042020.doc
    File size:233718
    MD5:eda54697e6ab436600b8b74102833d7e
    SHA1:fe3b1e8337728c74600eab9cb5c9f073e7c04ced
    SHA256:73bccef5c926cefd41f82a329a8ba732bf59195f19c67498ccf162caa6410de1
    SHA512:a16951fc4600a2e3d468c1b82d05c657ffca41745c2fd91ac2a1449b4f87efe6eda1deb0e3b1c8fe573f0a44760f90a98628a431b81fbcae25bc33e1b55b87b0
    SSDEEP:6144:xLnHVKS3j8PtOPzOptaQE8qRQAX7NRNpo7s:Z
    File Content Preview:{\rtf7345!(#%:7-<.7?/$4?7`(-_^^$,.&9</=/&82]2$>%?@.)?1/%<%`)#|?-01@<;=?$92[0.=.<-$/?#>#?0[2]>%<|%*).7.'[<94+_@??%*?5%]?.),^/_$*|.@>:?90%]%.%.]:@;+$<6%%=8~+?~[4$8%7424=.*]9(,-,.</.%#^'-.5~,):.$`).5[@;[3)4/@01)-+?,?,_2?,.3.<*,?)#,.<8$>.'86#/.?.7^2_5>.>536+(

    File Icon

    Icon Hash:e4eea2aaa4b4b4a4

    Static RTF Info

    Objects

    IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
    00000152Eh2embeddedrJH7AOlLcfoAuNg7Sv3a3584no

    Network Behavior

    Network Port Distribution

    TCP Packets

    TimestampSource PortDest PortSource IPDest IP
    Feb 23, 2021 07:45:03.482753992 CET4916780192.168.2.225.188.168.36
    Feb 23, 2021 07:45:03.557590961 CET80491675.188.168.36192.168.2.22
    Feb 23, 2021 07:45:03.557730913 CET4916780192.168.2.225.188.168.36
    Feb 23, 2021 07:45:03.558129072 CET4916780192.168.2.225.188.168.36
    Feb 23, 2021 07:45:03.632797003 CET80491675.188.168.36192.168.2.22
    Feb 23, 2021 07:45:03.633537054 CET80491675.188.168.36192.168.2.22
    Feb 23, 2021 07:45:03.633569002 CET80491675.188.168.36192.168.2.22
    Feb 23, 2021 07:45:03.633595943 CET80491675.188.168.36192.168.2.22
    Feb 23, 2021 07:45:03.633610010 CET80491675.188.168.36192.168.2.22
    Feb 23, 2021 07:45:03.633634090 CET80491675.188.168.36192.168.2.22
    Feb 23, 2021 07:45:03.633651018 CET4916780192.168.2.225.188.168.36
    Feb 23, 2021 07:45:03.633655071 CET80491675.188.168.36192.168.2.22
    Feb 23, 2021 07:45:03.633665085 CET4916780192.168.2.225.188.168.36
    Feb 23, 2021 07:45:03.633673906 CET4916780192.168.2.225.188.168.36
    Feb 23, 2021 07:45:03.633678913 CET80491675.188.168.36192.168.2.22
    Feb 23, 2021 07:45:03.633696079 CET80491675.188.168.36192.168.2.22
    Feb 23, 2021 07:45:03.633697033 CET4916780192.168.2.225.188.168.36
    Feb 23, 2021 07:45:03.633713007 CET80491675.188.168.36192.168.2.22
    Feb 23, 2021 07:45:03.633717060 CET4916780192.168.2.225.188.168.36
    Feb 23, 2021 07:45:03.633728981 CET80491675.188.168.36192.168.2.22
    Feb 23, 2021 07:45:03.633733034 CET4916780192.168.2.225.188.168.36
    Feb 23, 2021 07:45:03.633752108 CET4916780192.168.2.225.188.168.36
    Feb 23, 2021 07:45:03.633763075 CET4916780192.168.2.225.188.168.36
    Feb 23, 2021 07:45:03.635215044 CET4916780192.168.2.225.188.168.36
    Feb 23, 2021 07:45:03.635315895 CET4916780192.168.2.225.188.168.36
    Feb 23, 2021 07:45:03.708290100 CET80491675.188.168.36192.168.2.22
    Feb 23, 2021 07:45:03.708425045 CET4916780192.168.2.225.188.168.36

    UDP Packets

    TimestampSource PortDest PortSource IPDest IP
    Feb 23, 2021 07:45:03.398646116 CET5219753192.168.2.228.8.8.8
    Feb 23, 2021 07:45:03.469065905 CET53521978.8.8.8192.168.2.22

    DNS Queries

    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
    Feb 23, 2021 07:45:03.398646116 CET192.168.2.228.8.8.80xb648Standard query (0)ichiseled.comA (IP address)IN (0x0001)

    DNS Answers

    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
    Feb 23, 2021 07:45:03.469065905 CET8.8.8.8192.168.2.220xb648No error (0)ichiseled.com5.188.168.36A (IP address)IN (0x0001)

    HTTP Request Dependency Graph

    • ichiseled.com

    HTTP Packets

    Session IDSource IPSource PortDestination IPDestination PortProcess
    0192.168.2.22491675.188.168.3680C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    TimestampkBytes transferredDirectionData
    Feb 23, 2021 07:45:03.558129072 CET0OUTGET /files/whe.exe HTTP/1.1
    Accept: */*
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
    Host: ichiseled.com
    Connection: Keep-Alive
    Feb 23, 2021 07:45:03.633537054 CET1INHTTP/1.1 404 Not Found
    Date: Tue, 23 Feb 2021 06:45:03 GMT
    Server: Apache
    Accept-Ranges: bytes
    Cache-Control: no-cache, no-store, must-revalidate
    Pragma: no-cache
    Expires: 0
    Keep-Alive: timeout=5, max=100
    Connection: Keep-Alive
    Transfer-Encoding: chunked
    Content-Type: text/html
    Data Raw: 31 0d 0a 0a 0d 0a 31 0d 0a 0a 0d 0a 31 0d 0a 0a 0d 0a 31 35 37 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 61 63 68 65 2d 63 6f 6e 74 72 6f 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 50 72 61 67 6d 61 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 2d 63 61 63 68 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 45 78 70 69 72 65 73 22 20 63 6f 6e 74 65 6e 74 3d 22 30 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 0d 0a 33 0d 0a 34 30 34 0d 0a
    Data Ascii: 111157<!DOCTYPE html><html> <head> <meta http-equiv="Content-type" content="text/html; charset=utf-8"> <meta http-equiv="Cache-control" content="no-cache"> <meta http-equiv="Pragma" content="no-cache"> <meta http-equiv="Expires" content="0"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title>3404
    Feb 23, 2021 07:45:03.633569002 CET2INData Raw: 31 0d 0a 20 0d 0a 39 0d 0a 4e 6f 74 20 46 6f 75 6e 64 0d 0a 31 66 63 61 0d 0a 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0a 20 20 20 20
    Data Ascii: 1 9Not Found1fca</title> <style type="text/css"> body { font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 1.428571429; background-color: #ffffff;
    Feb 23, 2021 07:45:03.633595943 CET4INData Raw: 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 34 32 38 42 43 41 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 2e 63 6f 6e 74 61 63 74 2d 69 6e 66 6f 20 61 3a 68 6f 76 65 72 2c 0a 20 20 20 20 20 20 20 20 2e 63 6f 6e 74 61
    Data Ascii: color: #428BCA; } .contact-info a:hover, .contact-info a:focus, .contact-info a:active { color: #2A6496; } .reason-text { margin: 20px 0; font-size:
    Feb 23, 2021 07:45:03.633610010 CET5INData Raw: 20 20 20 20 20 20 20 20 20 20 2e 61 64 64 69 74 69 6f 6e 61 6c 2d 69 6e 66 6f 2d 69 74 65 6d 73 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 30 70 78 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20
    Data Ascii: .additional-info-items { padding: 20px; } .container { width: 90%; } .additional-info-items ul li { width: 100%; text-ali
    Feb 23, 2021 07:45:03.633634090 CET6INData Raw: 36 2b 76 72 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2f 2b 69 35 65 64 54 41 41 41 41 50 58 52 53 54 6c 4d 41 41 51 45 43 41 77 51 46 42 67 63 49 43 51 6f 4c 44 41 30 4f 44
    Data Ascii: 6+vr///////////////////////////////////////+i5edTAAAAPXRSTlMAAQECAwQFBgcICQoLDA0ODxAREhMUFRYXGBkaGxwdHh8gISIjJCUmJygoKSorLC0uLzAwMTIzNDU2Nzg5H7x0XAAACndJREFUeAHtXXlzGs8R7TQ3CFkHxpKxhIwtIBwgIuYY4u//uVJ2qpLKD7Q8t2Z7xpD3n6ska9/2bM9Mvz6oGEyXFoKHfm
    Feb 23, 2021 07:45:03.633655071 CET8INData Raw: 37 74 45 78 6b 68 56 77 33 36 79 7a 33 48 43 6d 30 71 45 76 45 5a 39 43 37 76 44 59 5a 65 57 41 51 68 6e 4b 6b 51 55 47 2f 69 37 4e 44 6e 43 4c 2f 68 77 62 76 4a 72 36 6d 69 50 4b 48 54 61 4f 45 35 34 78 70 42 47 72 6c 38 52 49 58 4b 58 31 62 6b
    Data Ascii: 7tExkhVw36yz3HCm0qEvEZ9C7vDYZeWAQhnKkQUG/i7NDnCL/hwbvJr6miPKHTaOE54xpBGrl8RIXKX1bk3+A1aUhHxUte3sHEvNSIp4REdBNONA9NOWYEwuq54AhPex3NaIQLwHIIQlQkPbwsRFpdmdb/hD8TSDCwTBu8W30sSIiS7P9NwZ7CgAeDjlaM9ktAD0+Mxwrse8XsTaMoRIoCaZmg3BQgLqrHVCBu3qhW3+AAOhwp5
    Feb 23, 2021 07:45:03.633678913 CET9INData Raw: 42 76 79 42 45 71 49 69 34 49 39 61 6b 79 2b 32 72 32 39 35 39 37 2f 5a 44 36 32 2b 78 4b 56 66 42 74 4e 4d 36 71 61 48 52 47 36 31 65 72 58 50 42 4f 66 4f 36 48 4e 37 55 59 6c 4a 6d 75 73 6c 70 57 44 55 54 64 59 61 62 34 4c 32 7a 31 76 34 30 68
    Data Ascii: BvyBEqIi4I9aky+2r29597/ZD62+xKVfBtNM6qaHRG61erXPBOfO6HN7UYlJmuslpWDUTdYab4L2z1v40hPPBvwzqOluTvhDBVB2a4Iyx/4UxLrx8goycW0UEgO4y2L3H+Ul5XI/4voc6rZkA3Bpv3njfS/nhR781E54N6t4OeWxQxuknguJ1S84ARR4RwAqtmaCFZnRiL2lbM+HaAC5npq+IwF+6hhfBWzNNlW6qCrGXRyza0y
    Feb 23, 2021 07:45:03.633696079 CET10INData Raw: 3c 2f 68 65 61 64 3e 0a 20 20 20 20 3c 62 6f 64 79 3e 0a 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 61 69 6e 65 72 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 73 65 63 69 6f 6e 20 63 6c 61 73 73 3d 22 72 65 73 70
    Data Ascii: </head> <body> <div class="container"> <secion class="response-info"> <span class="status-code">37404</span> <span class="status-reason">
    Feb 23, 2021 07:45:03.633713007 CET10INData Raw: 38 38 0d 0a 4e 6f 74 20 46 6f 75 6e 64 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 73 65 63 74 69 6f 6e 3e 0a 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 73 65 63 74 69 6f 6e 20 63 6c 61 73 73 3d 22 63 6f 6e 74 61 63 74 2d 69
    Data Ascii: 88Not Found</span> </section> <section class="contact-info"> Please forward this error screen to 20ichiseled.com's <a href="mailto:35root@5-188-168-36.cprapid.com?subject=Error message [54
    Feb 23, 2021 07:45:03.633728981 CET10INData Raw: 62 0d 0a 28 6e 6f 6e 65 29 20 66 6f 72 20 0d 0a 64 0d 0a 69 63 68 69 73 65 6c 65 64 2e 63 6f 6d 0d 0a 31 34 0d 0a 2f 66 69 6c 65 73 2f 77 68 65 2e 65 78 65 20 70 6f 72 74 20 0d 0a 36 0d 0a 38 30 20 6f 6e 20 0d 0a 36 65 0d 0a
    Data Ascii: b(none) for dichiseled.com14/files/whe.exe port 680 on 6e
    Feb 23, 2021 07:45:03.708290100 CET12INData Raw: 54 75 65 73 64 61 79 2c 20 32 33 2d 46 65 62 2d 32 30 32 31 20 30 36 3a 34 35 3a 30 33 20 55 54 43 22 3e 20 57 65 62 4d 61 73 74 65 72 3c 2f 61 3e 2e 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 73 65 63 74 69 6f 6e 3e 0a 0a 20 20 20 20 20 20 20
    Data Ascii: Tuesday, 23-Feb-2021 06:45:03 UTC"> WebMaster</a>. </section> <p class="reason-text">1acThe server cannot find the requested page:</p> </div> <section class="additional-info"> <div class


    Code Manipulations

    Statistics

    CPU Usage

    Click to jump to process

    Memory Usage

    Click to jump to process

    High Level Behavior Distribution

    Click to dive into process behavior distribution

    Behavior

    Click to jump to process

    System Behavior

    General

    Start time:07:44:34
    Start date:23/02/2021
    Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    Wow64 process (32bit):false
    Commandline:'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
    Imagebase:0x13ffa0000
    File size:1424032 bytes
    MD5 hash:95C38D04597050285A18F66039EDB456
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    General

    Start time:07:44:35
    Start date:23/02/2021
    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    Wow64 process (32bit):true
    Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
    Imagebase:0x400000
    File size:543304 bytes
    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    General

    Start time:07:44:54
    Start date:23/02/2021
    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    Wow64 process (32bit):true
    Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
    Imagebase:0x400000
    File size:543304 bytes
    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Disassembly

    Reset < >