| File name: | 4567865456.doc |
| Full analysis: | https://app.any.run/tasks/bd88d0d9-b8f1-4d45-97d1-7856abc041fa |
| Verdict: | Malicious activity |
| Threats: | GuLoader is an advanced downloader written in shellcode. It’s used by criminals to distribute other malware, notably trojans, on a large scale. It’s infamous for using anti-detection and anti-analysis capabilities. |
| Analysis date: | July 12, 2023, 06:48:52 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | text/rtf |
| File info: | Rich Text Format data, version 1 |
| MD5: | CA1A99D73B9701B2A26817352C6E2935 |
| SHA1: | 2F670BD6F2FD13D3DE09DB2B8B8149456E1066C3 |
| SHA256: | 56BA3547BFF5214AFE4D7CCD370DEED7F43F44A2ACCAB47D9360493186A32DDC |
| SSDEEP: | 768:TFx0XaIsnPRIa4fwJMjxicDhKSv1k9/xIHVo6jQ5PbTZlx9:Tf0Xvx3EMjxicDhKo1k9UoSSPbTbx9 |
| .rtf | | | Rich Text Format (28.5) |
|---|
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2284 | "C:\Users\admin\AppData\Roaming\euroenxdn5871.exe" | C:\Users\admin\AppData\Roaming\euroenxdn5871.exe | EQNEDT32.EXE | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 1.1.0.0 Modules
| |||||||||||||||
| 2428 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\4567865456.doc.rtf" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 14.0.5123.5000 Modules
| |||||||||||||||
| 2852 | "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding | C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE | svchost.exe | ||||||||||||
User: admin Company: Design Science, Inc. Integrity Level: MEDIUM Description: Microsoft Equation Editor Exit code: 0 Version: 00110900 Modules
| |||||||||||||||
| (PID) Process: | (2428) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1033 |
Value: On | |||
| (PID) Process: | (2428) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1041 |
Value: On | |||
| (PID) Process: | (2428) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1042 |
Value: On | |||
| (PID) Process: | (2428) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1046 |
Value: On | |||
| (PID) Process: | (2428) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1036 |
Value: On | |||
| (PID) Process: | (2428) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1031 |
Value: On | |||
| (PID) Process: | (2428) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1040 |
Value: On | |||
| (PID) Process: | (2428) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1049 |
Value: On | |||
| (PID) Process: | (2428) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 3082 |
Value: On | |||
| (PID) Process: | (2428) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1055 |
Value: On | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2428 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR4AB7.tmp.cvr | — | |
MD5:— | SHA256:— | |||
| 2284 | euroenxdn5871.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Gavstrikkernes\Coronaled182\Ambatch\AsProcessHelper.dll | executable | |
MD5:FC9EE63D7C846FBEA1A615068F26A922 | SHA256:173096B559F6F0CC183578EEDE448AEB75B37FC34CC6988814D9F285A546F4AA | |||
| 2284 | euroenxdn5871.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Gavstrikkernes\Coronaled182\Beskyttende\Kulkldre\emblem-system.png | image | |
MD5:7FAA499549F509BF9DACDAD5BF453670 | SHA256:22B68E4EDB3ED75F947BEF9AE94919BEA7DD2B40650307AFA235E2FC56133205 | |||
| 2284 | euroenxdn5871.exe | C:\Users\admin\AppData\Local\Temp\nsm545F.tmp\System.dll | executable | |
MD5:BE2621A78A13A56CF09E00DD98488360 | SHA256:852047023BA0CAE91C7A43365878613CFB4E64E36FF98C460E113D5088D68EF5 | |||
| 2284 | euroenxdn5871.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Gavstrikkernes\Coronaled182\palmehytte\right_arrow_disabled.png | image | |
MD5:B289B17A2D497A07152F3651AE7F4098 | SHA256:60041AF52ADA6D050BE1E341F09EE8AB2E59EB939FD8A0A93173DD7DD9132435 | |||
| 2284 | euroenxdn5871.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Gavstrikkernes\Coronaled182\Reformationernes\Prophage\Denationaliserendes.Hje13 | binary | |
MD5:3568C7BB794F15D97926D7228BC2DABA | SHA256:377E74115EEF7F269355C03E23B245D5C8C86B0DD6DE21DE99B11E4A9E8C2385 | |||
| 2852 | EQNEDT32.EXE | C:\Users\admin\AppData\Roaming\euroenxdn5871.exe | executable | |
MD5:109DBD7130E7C7E519EDDAC87CCBC34C | SHA256:40B6DC77998B71663FD29997962BEC3B46647E8EE70CF3D579AED14EAD46D660 | |||
| 2428 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$67865456.doc.rtf | binary | |
MD5:FE9598245CBE04E6CA8CDE3B4F41F99D | SHA256:28B4F1B18CB9D61CAA701B8D348F637853F426454B9B23CAB870D275C71AA8E0 | |||
| 2852 | EQNEDT32.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDW1XBVN\Historiers[1].exe | executable | |
MD5:109DBD7130E7C7E519EDDAC87CCBC34C | SHA256:40B6DC77998B71663FD29997962BEC3B46647E8EE70CF3D579AED14EAD46D660 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2852 | EQNEDT32.EXE | GET | 200 | 87.121.221.212:80 | http://87.121.221.212/Historiers.exe | US | executable | 388 Kb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2852 | EQNEDT32.EXE | 87.121.221.212:80 | — | OMER AY | US | malicious |
328 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
PID | Process | Class | Message |
|---|---|---|---|
2852 | EQNEDT32.EXE | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2852 | EQNEDT32.EXE | A Network Trojan was detected | ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 |
2852 | EQNEDT32.EXE | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2852 | EQNEDT32.EXE | A Network Trojan was detected | ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 |
2852 | EQNEDT32.EXE | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |