Try VMRay Platform
Malicious
Classifications

Injector Spyware Downloader

Threat Names

FormBook Mal/HTMLGen-A

Dynamic Analysis Report

Created on 2022-01-12T09:04:00

ea4815e7334c8e7663cf1ae6551bdd5233544ea0403edee6c77f0a49d9e795fe.doc.rtf

RTF Document

Remarks (1/1)

(0x0200000E): The overall sleep time of all monitored processes was truncated from "3 hours, 9 minutes" to "4 seconds" to reveal dormant functionality.

Remarks

(0x0200004A): 31 dumps were skipped because they exceeded the maximum dump size of 7 MB. The largest one was 9 MB.

Filters:
File Name Category Type Verdict Actions
C:\Users\kEecfMwgj\Desktop\ea4815e7334c8e7663cf1ae6551bdd5233544ea0403edee6c77f0a49d9e795fe.doc.rtf Sample File RTF
malicious
»
MIME Type text/rtf
File Size 26.70 KB
MD5 4334999d60733dd8474547f99139257f Copy to Clipboard
SHA1 774665c1f4c170dc11e1dac182f86135df02317b Copy to Clipboard
SHA256 ea4815e7334c8e7663cf1ae6551bdd5233544ea0403edee6c77f0a49d9e795fe Copy to Clipboard
SSDeep 384:cpww8oDvAvGjg8EfsKG/Ly+KoALYm5HPUh3xeAQap:cmwDDvoGsrfBHX8TRp Copy to Clipboard
ImpHash -
Parser Error Remark Static engine was unable to completely parse the analyzed file
Office Information
»
Controls (1)
»
CLSID Control Name Associated Vulnerability
{00021700-0000-0000-C000-000000000046} Equation3 CVE-2017-11882
Document Content Snippet
»
.-+/9=,?8)??_1&[]'/5*$[])]52%4<!)</=%!=|8*63<`3~77`?%$+=°83+?9_&?^239`_|.<*|4,4!?-)]=]|.:)`6!;&%9!=))>^?6@#%?;&/.^µ/<<`,'>?2°<*?/~3?.°%6#7°?2(|7&9[2@991?_µ<?)<,+[*&1;|$#2?/80),(%(??'?#!§6**((=0§)/8);^@:(?`|&!:8+>(7?]-?%$*3$8,1&5;*6%%2[$465&0^996°~=36>@!/6%0%9'`%§=#%@?7*?~4''°0^'8|4&°7%?7))-|@?']°*_(:;0°9=<^*0?*#>|#10391?$55$9'^`!^$&[&&)/3|$?%~?6?85:`~7%)/$'9`<])):?7°0µ31(?#4=:5%,%$]/%_[`)<8>&%](*#$&2)~|<@(??°!@[^=*7-2+-6)?3|°,?/*]-%?=,@-;)(%=_?>µ~621`|+;74?(?:,|%3:%°?~|???*$?°@&.;'@]?>.§-?-°_%'~`~%'??];°6?|`0%7|7µ>&+@571|@<)9-(#~.,°=>;µ)]?_]1?)_?%88?.6°^°µ22~<7;>+0*!4645&~[^@§6'^,3°!34?3_|04?|~?§7[?/>6;=+=<µ/@8?~%~+21'34>$.?(>1#<&;['0%.6(?/5-!03?/4:#23@5/?%854!(9!?,;%<*]#79],2_3:6>§($4~74=?2~.],#%&0$=]1'2][§???2°<]8/8+-|)2^>@$1)_:~°:§?:µ ...
C:\Users\kEecfMwgj\AppData\Roaming\emehtq569783.exe Downloaded File Binary
malicious
»
Also Known As c:\users\keecfmwgj\appdata\local\microsoft\windows\temporary internet files\content.ie5\x9ohk109\emezx[1].exe (Downloaded File)
Parent File analysis.pcap
MIME Type application/vnd.microsoft.portable-executable
File Size 406.00 KB
MD5 6223b5805cc8ceb0fad786c4bd2f176b Copy to Clipboard
SHA1 97913b53d06e464368bbd4ee9e9f54f848c0429c Copy to Clipboard
SHA256 c3e318eafb968f401d5165bb17e765613339ce25e4e48e99ea734580fae06d84 Copy to Clipboard
SSDeep 12288:lwmLNpwnsKI6eX7XHDU0C3ToRBnPrtGG:lwmLmsn3zC3ToRRhGG Copy to Clipboard
ImpHash f34d5f2d4577ed6d9ceec516c1f5a744 Copy to Clipboard
PE Information
»
Image Base 0x400000
Entry Point 0x46282a
Size Of Code 0x60a00
Size Of Initialized Data 0x4c00
File Type FileType.executable
Subsystem Subsystem.windows_gui
Machine Type MachineType.i386
Compile Timestamp 2022-01-12 07:25:23+00:00
Version Information (11)
»
Comments A simple mechanism to maintain state for an activity based workflow
CompanyName Development In Progress Ltd
FileDescription DipState
FileVersion 2.0.0.0
InternalName ICustomFacto.exe
LegalCopyright Copyright © Development In Progress Ltd 2015
LegalTrademarks -
OriginalFilename ICustomFacto.exe
ProductName DipState
ProductVersion 2.0.0.0
Assembly Version 2.0.0.0
Sections (3)
»
Name Virtual Address Virtual Size Raw Data Size Raw Data Offset Flags Entropy
.text 0x402000 0x60830 0x60a00 0x200 IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ 7.94
.rsrc 0x464000 0x4974 0x4a00 0x60c00 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ 6.5
.reloc 0x46a000 0xc 0x200 0x65600 IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ 0.1
Imports (1)
»
mscoree.dll (1)
»
API Name Ordinal IAT Address Thunk RVA Thunk Offset Hint
_CorExeMain - 0x402000 0x62800 0x60a00 0x0
c:\users\keecfmwgj\appdata\local\temp\eqnedt32.exe_c2rdll(20220112100537e28).log Dropped File Unknown
clean
»
MIME Type -
File Size 0 Bytes
MD5 d41d8cd98f00b204e9800998ecf8427e Copy to Clipboard
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709 Copy to Clipboard
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 Copy to Clipboard
SSDeep 3:: Copy to Clipboard
ImpHash -
c:\users\keecfmwgj\appdata\local\gdipfontcachev1.dat Dropped File Stream
clean
»
MIME Type application/octet-stream
File Size 8.03 KB
MD5 3b124f39977734e519b4d76da3fd1429 Copy to Clipboard
SHA1 93258edf50199af514b466e27af94b44f9eee8a7 Copy to Clipboard
SHA256 790a6af00576b6ee07663cf571a92e5b72379c9d24f3599af1fa9fec8aeb168a Copy to Clipboard
SSDeep 3:5tmlNlPlcy:5tm/ Copy to Clipboard
ImpHash -
c:\users\keecfmwgj\appdata\local\gdipfontcachev1.dat Dropped File Stream
clean
»
MIME Type application/octet-stream
File Size 108.45 KB
MD5 2419dbd3a58136b4a4a7ed8721ef7e66 Copy to Clipboard
SHA1 7de04c93d377038c32d3adc519146368f235ae7a Copy to Clipboard
SHA256 987bc76f67e25033afb6ad2f18038bd8610188a5e1d51bd5fc3e3054975ba9f3 Copy to Clipboard
SSDeep 1536:mmuvsHgTllPoOdxG2Oj+ck8JYiKNo1Om:mmiP5xGi8JA Copy to Clipboard
ImpHash -
55f7d9e99b8e2d4e0e193b2f0275501e6d9c1ebd29cadbea6a0da48a8587e3e0 Downloaded File HTML
clean
»
Parent File analysis.pcap
MIME Type text/html
File Size 146 Bytes
MD5 8eec510e57f5f732fd2cce73df7b73ef Copy to Clipboard
SHA1 3c0af39ecb3753c5fee3b53d063c7286019eac3b Copy to Clipboard
SHA256 55f7d9e99b8e2d4e0e193b2f0275501e6d9c1ebd29cadbea6a0da48a8587e3e0 Copy to Clipboard
SSDeep 3:qVoB3tURObOb0qHXboAcMBXqWrKb0GklIVLLP61IwcWWGu:q43tIkObRHXiMIWObtklI5LP8IpfGu Copy to Clipboard
ImpHash -
34ac32c933e5657c15aae33f37b622622824c1ebad245fbe40ca978a0011b110 Downloaded File HTML
clean
»
Parent File analysis.pcap
MIME Type text/html
File Size 2.53 KB
MD5 3cf556072252a673b2695d6c15e4a64c Copy to Clipboard
SHA1 39c2d4e18c558185da93868fc1d36a5dccaa06f0 Copy to Clipboard
SHA256 34ac32c933e5657c15aae33f37b622622824c1ebad245fbe40ca978a0011b110 Copy to Clipboard
SSDeep 48:8DOHAV0ysqYjBa1XkioP6bnxspDOHAVp3ThqLDaM5QDOHAV+jWaEDBv:8Di1zjB/iRrxMDH9qLeDDlBDl Copy to Clipboard
ImpHash -
Parser Error Remark Static engine was unable to completely parse the analyzed file
Extracted URLs (2)
»
URL WHOIS Data Reputation Status Actions
Show WHOIS
N/A
Show WHOIS
N/A
Extracted JavaScripts (1)
»
JavaScript #1
»
try{document.cookie = 'isframesetenabled=1; path=/;';}catch(exception){}
25bd01828c3bd5293a36bc4ced54d560e5dc3b33464d814e5bff6368ea5a29a8 Downloaded File HTML
clean
»
Parent File analysis.pcap
MIME Type text/html
File Size 466 Bytes
MD5 9037b01af42037199effce1966b34c58 Copy to Clipboard
SHA1 e6a10d21364588983f8460b3cabd8a0b4d41d9c4 Copy to Clipboard
SHA256 25bd01828c3bd5293a36bc4ced54d560e5dc3b33464d814e5bff6368ea5a29a8 Copy to Clipboard
SSDeep 12:hnMEwuiuX4w4vy4Wh96QclfvLcqJmW+mM//jGu:hMNmMvy4WvsnnKmM1 Copy to Clipboard
ImpHash -
Parser Error Remark Static engine was unable to completely parse the analyzed file
Extracted URLs (1)
»
URL WHOIS Data Reputation Status Actions
Show WHOIS
N/A
79928810a4d3d425ae3767c90e990df1e9fd34798ec6ebbac69f0d2d575b3246 Downloaded File HTML
clean
»
Parent File analysis.pcap
MIME Type text/html
File Size 22.25 KB
MD5 6a2bf843f21defe75b18f27d8b19ee71 Copy to Clipboard
SHA1 6e4c38b194b409039d29abb3c7021a18bd9b3b01 Copy to Clipboard
SHA256 79928810a4d3d425ae3767c90e990df1e9fd34798ec6ebbac69f0d2d575b3246 Copy to Clipboard
SSDeep 192:CkjFpZ0iUlrguKgcg6su3NPDhvTY5AIx/N3B3ERmFrWZc2ga6GcJ7Igp90SBCPac:CkjhthvLIx/NJQCGz9AFnGP1sB8H Copy to Clipboard
ImpHash -
Parser Error Remark Static engine was unable to completely parse the analyzed file
Extracted URLs (14)
»
URL WHOIS Data Reputation Status Actions
Show WHOIS
N/A
Show WHOIS
N/A
Show WHOIS
N/A
Show WHOIS
N/A
Show WHOIS
N/A
Show WHOIS
N/A
Show WHOIS
N/A
Show WHOIS
N/A
Show WHOIS
N/A
Show WHOIS
N/A
Show WHOIS
N/A
Show WHOIS
N/A
Show WHOIS
N/A
Show WHOIS
N/A
Extracted JavaScripts (5)
»
JavaScript #1
»
var abp;
JavaScript #2
»
function handleABPDetect(){try{if(!abp) return;var imglog = document.createElement("img");imglog.style.height="0px";imglog.style.width="0px";imglog.src="http://www.school-prosto.store/sk-logabpstatus.php?a=QUxnMW5FNmE2eUxNRTNjU2owdE52ZHd1Z2hGQ0JPUkdMZW5ub0ZvZ0RYNm5xdUhVRnZ5UHhMY3FJWUcvZzJTVDNQVEpBcmtSRXlXYkorRmdKSnMvSmk4ZlZueFVhMEU4alQ1MWhuczZpQ09TUXpZUTd2T3h4SndtMWZXdHB3Wkw=&b="+abp;document.body.appendChild(imglog);if(typeof abperurl !== "undefined" && abperurl!="")window.top.location=abperurl;}catch(err){}}
JavaScript #3
»
try{handleABPDetect();}catch(err){}
JavaScript #4
»
if(setBrowserDetails) setBrowserDetails();
JavaScript #5
»
var __pp = [];  atevt();
650b12f93748bb37bef17e446e31d3805ab48db0f6801cb53bd1901c4e9ea134 Downloaded File HTML
clean
»
Parent File analysis.pcap
MIME Type text/html
File Size 275 Bytes
MD5 ece1bd41a388201a61430e51fb4ec523 Copy to Clipboard
SHA1 a32c1d8663c5a607de903924f8385b193a2e45a7 Copy to Clipboard
SHA256 650b12f93748bb37bef17e446e31d3805ab48db0f6801cb53bd1901c4e9ea134 Copy to Clipboard
SSDeep 6:hxuJzhqIzerQWR0iYBxuL8g0qQF7IAqMYkECozEdxqPyws0H34QL:hY2rY1x60hK8oz4xuds0HIQL Copy to Clipboard
ImpHash -
5bd9706fd44fe90cc287e6398c8a6a2fcbec106b51befd69902bfdcbd96b2162 Downloaded File HTML
clean
»
Parent File analysis.pcap
MIME Type text/html
File Size 1.44 KB
MD5 f70c1170986c925786ed0e4805a5e1d2 Copy to Clipboard
SHA1 1b7aafb99966b711c3e077ff1e7b5aebce1f2f7c Copy to Clipboard
SHA256 5bd9706fd44fe90cc287e6398c8a6a2fcbec106b51befd69902bfdcbd96b2162 Copy to Clipboard
SSDeep 24:0Yn0kiTWbOh7E51AK6VmN/1irycb9PpcEoa8sjLPW3iN2jgi4uSjLPmwkqhPnxsI:0Y0kioOh764mNMFxRcJZGbWyN2iu0bO8 Copy to Clipboard
ImpHash -
Extracted URLs (3)
»
URL WHOIS Data Reputation Status Actions
Show WHOIS
N/A
Show WHOIS
N/A
Show WHOIS
N/A
Extracted JavaScripts (1)
»
JavaScript #1
»
window.park = "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";
bb39114d204e3749044b0ac7e2b2039ec10feee4713d962432dd18317553310d Downloaded File HTML
clean
»
Parent File analysis.pcap
MIME Type text/html
File Size 185 Bytes
MD5 6fa7afe552f33a08bc7f83e4960956f4 Copy to Clipboard
SHA1 973c960b378f020b34f6d2730db4050431030ade Copy to Clipboard
SHA256 bb39114d204e3749044b0ac7e2b2039ec10feee4713d962432dd18317553310d Copy to Clipboard
SSDeep 3:qVv/ZSGKHjJpDQJu+WNV8S49MW03CFKxjWAEtvpL//0+zTA6jz8S49MW02FZKHaY:qF/sGePNJ4uWDFKFWAEdpZTA+zD4uWrq Copy to Clipboard
ImpHash -
Extracted URLs (1)
»
URL WHOIS Data Reputation Status Actions
Show WHOIS
N/A
Equation3_1 Embedded File Stream
clean
»
Parent File C:\Users\kEecfMwgj\Desktop\ea4815e7334c8e7663cf1ae6551bdd5233544ea0403edee6c77f0a49d9e795fe.doc.rtf
MIME Type application/octet-stream
File Size 2.00 KB
MD5 a8d89dac8d5a2e00841e32c71ca2bf4d Copy to Clipboard
SHA1 124a5e5d7ccfbf516e84a914dde8d20b67ceab89 Copy to Clipboard
SHA256 91cd4ab2dc03032b6b63f8cdf41078a0b1f54593c3175b9eabc97c51f042fdbe Copy to Clipboard
SSDeep 48:SUZnucZi9pREwLduuddXdSip+YwqPSAS9WNyPm+a:SUocs2wJiipvT8++a Copy to Clipboard
ImpHash -
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting "security.fileuri.strict_origin_policy".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image