top title background image
flash

cnewton doc 08.11.2022.doc

Status: finished
Submission Time: 2022-08-11 17:29:16 +02:00
Malicious
Exploiter

Comments

Tags

  • doc
  • IcedID

Details

  • Analysis ID:
    682599
  • API (Web) ID:
    1050054
  • Analysis Started:
    2022-08-11 18:33:53 +02:00
  • Analysis Finished:
    2022-08-11 19:11:17 +02:00
  • MD5:
    ee1d6eb5b07b99e65fc0cb477193c35c
  • SHA1:
    9d4dbf701c8ede93a79036dd5a0316da988a2eeb
  • SHA256:
    23b9a20a59041fc7d484957e49ffa7e0f6dba7dbbec0628a4adb69c2e05863ab
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 72
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
malicious
Score: 80
Error: Incomplete analysis, please check the report for detailed error information
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Potential for more IOCs and behavior
malicious
Score: 72
Error: Incomplete analysis, please check the report for detailed error information
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
Run Condition: Without Instrumentation

Third Party Analysis Engines

malicious
Score: 14/65
malicious
Score: 6/40

IPs

IP Country Detection
45.8.146.139
Russian Federation

URLs

Name Detection
https://outlook.office365.com/autodiscover/autodiscover.
https://login.windows.net/common/oauth2/authorizeg
https://login.windows.net/common/oauth2/authorizevB&L
Click to see the 97 hidden entries
https://clients.config.office.net/user/v1.0/ios
https://globaldisco.crm.dynamics.comom
https://wus2.contentsync.
https://substrate.office.comW
https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
https://api.diagnostics.office.comom
https://login.windows.net/common/oauth2/authorizeOh
https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
https://www.bingapis.com/api/v7/urlpreview/search?appid=E93048236FE27D972F67C5AF722136866DF65FA2Area
https://substrate.office.comP
https://login.windows.net/common/oauth2/authorize~h
https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asksCP
http://weather.service.msn.com/data.aspx
https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Facebookf
https://onedrive.live.comew
https://api.cortana.aiL
https://ncus.contentsync.
https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
https://login.windows.net/common/oauth2/authorizerdml
https://outlook.office.comBr
https://lifecycle.office.comov
https://analysis.windows.net/powerbi/api/
https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
https://login.windows.net/common/oauth2/authorize0
https://login.windows.net/common/oauth2/authorize=
https://dataservice.o365filtering.comVb
https://substrate.office.com/search/api/v1/SearchHistory
https://storage.live.com/clientlogs/uploadlocation
https://login.windows.net/common/oauth2/authorizeM
https://login.windows.net/common/oauth2/authorize7ehM
https://outlook.office.com/
https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
https://entitlement.diagnostics.office.com
https://api.powerbi.com/beta/myorg/importshG&M
https://powerlift.acompli.netPrqL
https://login.windows.net/common/oauth2/authorizeS
https://login.windows.net/common/oauth2/authorizek27L
https://login.windows.net/common/oauth2/authorizeR
https://login.windows.net/common/oauth2/authorizeCache
https://clients.config.office.net/user/v1.0/android/policies
https://www.odwebp.svc.msom
https://login.windows.net/common/oauth2/authorizeQ
https://outlook.office365.com/api/v1.0/me/Activities
https://login.windows.net/common/oauth2/authorizeN=
https://o365auditrealtimeingestion.manage.office.com
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
http://45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-fe
https://clients.config.office.net/user/v1.0/android/policies_J
https://cr.office.com
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
https://api.microsoftstream.com/api/
https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=ImmersiveApp
https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
https://login.windows.net/common/oauth2/authorizeAx
http://purl.oclc.org/ooxml/drawingml/diagram-E0
https://login.windows.net/common/oauth2/authorizese
https://api.aadrm.com/
https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
http://45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-fn
https://login.windows.net/common/oauth2/authorizePh
https://login.windows.net/common/oauth2/authorizeaz&L
https://lookup.onenote.com/lookup/geolocation/v1
https://rpsticket.partnerservices.getmicrosoftkey.com
https://login.windows.net/common/oauth2/authorizetenk%M
https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
https://cdn.entity.
https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
https://autodiscover-s.outlook.com/
http://45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-f71USERNAME=userUSERPROFILE=C:
https://shell.suite.office.com:1443
https://api.office.net.&
https://graph.windows.net
https://api.addins.store.officeppe.com/addinstemplate
https://web.microsoftstream.com/video/
https://api.powerbi.com/v1.0/myorg/groups
https://api.office.netA&.H
https://www.odwebp.svc.ms
https://login.windows.net/common/oauth2/authorize/2
https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
https://onedrive.live.com/embed?i
https://messaging.engagement.office.com/
https://login.windows.net/common/oauth2/authorizeox
https://api.cortana.aiU
https://outlook.office.com2006
https://store.office.cn/addinstemplate
https://login.windows.net/common/oauth2/authorize$
https://login.windows-ppe.net/common/oauth2/authorizewM%M
https://my.microsoftpersonalcontent.com
https://login.windows.net/common/oauth2/authorize#
http://45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-fOOC:
https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile5QlO
http://weather.service.msn.com/data.aspxBD
https://officeci.azurewebsites.net/api/
https://tasks.office.com
https://res.getmicrosoftkey.com/api/redemptionevents

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\y5A7.tmp.dll
HTML document, ASCII text
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\cnewton doc 08.11.2022.doc.LNK
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:31:50 2022, mtime=Fri Aug 12 00:49:52 2022, atime=Fri Aug 12 00:49:44 2022, length=2248355, window=hide
#
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_WINWORD.EXE_36a787bf8896eba6a9e85f1761f2a7eec6686b_5f94c319_0fad4122\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
#
Click to see the 8 hidden entries
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2A7D.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Aug 12 01:50:36 2022, 0x1205a4 type
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER37FB.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
#
C:\ProgramData\Microsoft\Windows\WER\Temp\WER39C1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\AE1D8E82-09A3-4CE3-BB95-E3559641C73B
XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\-f[1].htm
HTML document, ASCII text
#
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
ASCII text, with CRLF line terminators
#
C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
data
#
C:\Users\user\Desktop\~$ewton doc 08.11.2022.doc
data
#