Loading ...

Play interactive tourEdit tour

Analysis Report fileabc.docx

Overview

General Information

Joe Sandbox Version:28.0.0 Lapis Lazuli
Analysis ID:218161
Start date:26.03.2020
Start time:10:48:09
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 4m 10s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:fileabc.docx
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171, Flash 30.0.0.113
Number of analysed new started processes analysed:3
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis stop reason:Timeout
Detection:UNKNOWN
Classification:unknown1.winDOCX@1/8@0/1
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .docx
Warnings:
Show All
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
  • Excluded IPs from analysis (whitelisted): 13.107.3.128, 52.109.88.8, 52.109.88.35, 95.100.196.68, 205.185.216.10, 205.185.216.42, 8.248.113.254, 67.27.234.126, 8.253.95.120, 8.248.121.254, 67.27.157.254, 8.241.121.126, 67.27.233.254, 67.27.235.126, 8.253.207.121, 8.253.204.120
  • Excluded domains from analysis (whitelisted): fs.microsoft.com, config.edge.skype.com.trafficmanager.net, prod.configsvc1.live.com.akadns.net, s-0001.s-msedge.net, mobile.pipe.aria.microsoft.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, config-edge-skype-com.s-0001.s-msedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, prod.nexusrules.live.com.akadns.net, config.officeapps.live.com, audownload.windowsupdate.nsatc.net, au.download.windowsupdate.com.hwcdn.net, officeclient.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, prod.fs.microsoft.com.akadns.net, config.edge.skype.com, nexusrules.officeapps.live.com, europe.configsvc1.live.com.akadns.net, mobile.events.data.trafficmanager.net
  • Report size getting too big, too many NtQueryAttributesFile calls found.
Errors:
  • Corrupt sample or wrongly selected analyzer.

Detection

StrategyScoreRangeReportingWhitelistedDetection
Threshold10 - 100falseunknown

Confidence

StrategyScoreRangeFurther Analysis Required?Confidence
Threshold20 - 5true
ConfidenceConfidence


Classification Spiderchart

Analysis Advice

No malicious behavior found, analyze the document also on other version of Office / Acrobat
Sample is a picture (JPEG, PNG, GIF etc), nothing to analyze
Uses HTTPS for network communication, use the 'Proxy HTTPS (port 443) to read its encrypted data' cookbook for further analysis



Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsGraphical User Interface1Winlogon Helper DLLPort MonitorsMasquerading1Credential DumpingFile and Directory Discovery1Application Deployment SoftwareData from Local SystemData CompressedStandard Cryptographic Protocol2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Replication Through Removable MediaExploitation for Client Execution2Port MonitorsAccessibility FeaturesBinary PaddingNetwork SniffingSystem Information Discovery1Remote ServicesData from Removable MediaExfiltration Over Other Network MediumStandard Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout

Signature Overview

Click to jump to signature section


Software Vulnerabilities:

barindex
Potential document exploit detected (performs HTTP gets)Show sources
Source: global trafficTCP traffic: 192.168.2.5:49749 -> 52.114.133.60:443
Potential document exploit detected (unknown TCP traffic)Show sources
Source: global trafficTCP traffic: 192.168.2.5:49749 -> 52.114.133.60:443

Networking:

barindex
Urls found in memory or binary dataShow sources
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: http://olkflt.edog.officeapps.live.com/olkflt/outlookflighting.svc/api/glides
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: http://weather.service.msn.com/data.aspx
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://analysis.windows.net/powerbi/api
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://api.aadrm.com/
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://api.diagnostics.office.com
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://api.diagnosticssdf.office.com
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://api.microsoftstream.com/api/
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://api.onedrive.com
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/datasets
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/groups
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/imports
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://apis.live.net/v5.0/
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://arc.msn.com/v4/api/selection
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://asgsmsproxyapi.azurewebsites.net/
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://augloop.office.com
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://cdn.entity.
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/stat/images/OneDriveUpsell.png
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSignUpUpsell
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSyncClientUpsell
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://client-office365-tas.msedge.net/ab
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://clients.config.office.net/
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/android/policies
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/ios
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/mac
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://cloudfiles.onenote.com/upload.aspx
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://config.edge.skype.com
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://config.edge.skype.com/config/v1/Office
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://config.edge.skype.com/config/v2/Office
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://contentstorage.osi.office.net/dynamiccanvas/documentvirality/prod/index.html
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://contentstorage.osi.office.net/dynamiccanvas/progressui/index.html
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://cr.office.com
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://dataservice.o365filtering.com
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://dataservice.o365filtering.com/
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://dev0-api.acompli.net/autodetect
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://devnull.onenote.com
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://directory.services.
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://ecs.office.com/config/v2/Office
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://entitlement.diagnostics.office.com
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://entitlement.diagnosticssdf.office.com
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://excel.uservoice.com/forums/304936-excel-for-mobile-devices-tablets-phones-android
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://globaldisco.crm.dynamics.com
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://graph.ppe.windows.net
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://graph.ppe.windows.net/
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://graph.windows.net
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://graph.windows.net/
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/api/telemetry
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?cp=remix3d
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=icons&premium=1
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockimages&premium=1
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsofticon?
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://incidents.diagnostics.office.com
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://incidents.diagnosticssdf.office.com
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=ClipArt
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Facebook
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://insertmedia.bing.office.net/odc/insertmedia
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://learningtools.onenote.com/learningtoolsapi/v2.0/GetFreeformSpeech
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://lifecycle.office.com
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://login.microsoftonline.com/
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://login.microsoftonline.com/common
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://login.windows-ppe.net/common/oauth2/authorize
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://login.windows.local
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://login.windows.net/common/oauth2/authorize
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://loki.delve.office.com/api/v1/configuration/officewin32/
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://lookup.onenote.com/lookup/geolocation/v1
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://management.azure.com
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://management.azure.com/
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://messaging.office.com/
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://ncus-000.contentsync.
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://ncus-000.pagecontentsync.
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://o365auditrealtimeingestion.manage.officeppe.com/api/userAuditRecord
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://o365diagnosticsppe-web.cloudapp.net
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://ocos-office365-s2s.msedge.net/ab
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://ofcrecsvcapi-int.azurewebsites.net/
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://officeapps.live.com
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://officeci.azurewebsites.net/api/
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://officesetup.getmicrosoftkey.com
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://ogma.osi.office.net/TradukoApi/api/v1.0/
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://onedrive.live.com
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://onedrive.live.com/embed?
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://outlook.office.com/autosuggest/api/v1/init?cvid=
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://outlook.office365.com/api/v1.0/me/Activities
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://outlook.office365.com/autodiscover/autodiscover.json
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://ovisualuiapp.azurewebsites.net/pbiagave/
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://partnerservices.getmicrosoftkey.com/PartnerProvisioning.svc/v1/subscriptions
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://portal.office.com/account/?ref=ClientMeControl
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://posarprodcssservice.accesscontrol.windows.net/v2/OAuth2-13
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://powerlift-frontdesk.acompli.net
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://powerlift.acompli.net
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://prod-global-autodetect.acompli.net/autodetect
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://res.getmicrosoftkey.com/api/redemptionevents
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://rpsticket.partnerservices.getmicrosoftkey.com
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://settings.outlook.com
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://shell.suite.office.com:1443
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://skyapi.live.net/Activity/
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://sr.outlook.office.net/ws/speech/recognize/assistant/work
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://storage.live.com/clientlogs/uploadlocation
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://store.office.cn/addinstemplate
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://store.office.com/?productgroup=Outlook
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://store.office.com/addinstemplate
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://store.office.de/addinstemplate
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://store.officeppe.com/addinstemplate
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://tasks.office.com
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://templatelogging.office.com/client/log
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.desktop.html
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.immersive.html
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://visio.uservoice.com/forums/368202-visio-on-devices
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://web.microsoftstream.com/video/
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://wus2-000.contentsync.
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://wus2-000.pagecontentsync.
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://www.bingapis.com/api/v7/urlpreview/search?appid=E93048236FE27D972F67C5AF722136866DF65FA2
Source: 65B405FD-73B2-4174-9538-CB1D2E383DF2.0.drString found in binary or memory: https://www.odwebp.svc.ms
Uses HTTPSShow sources
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749

System Summary:

barindex
Classification labelShow sources
Source: classification engineClassification label: unknown1.winDOCX@1/8@0/1
Creates files inside the user directoryShow sources
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{99970C62-0DBB-4E91-AC7E-EC71761E0A71}.tmpJump to behavior
Creates temporary filesShow sources
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\{EB6FC324-18E8-4D3F-AFC7-A0EF9231899C} - OProcSessId.datJump to behavior
Reads ini filesShow sources
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Found graphical window changes (likely an installer)Show sources
Source: Window RecorderWindow detected: More than 3 window changes detected
Checks if Microsoft Office is installedShow sources
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\OfficeJump to behavior
Submission file is bigger than most known malware samplesShow sources
Source: fileabc.docxStatic file information: File size 2716470 > 1048576

Hooking and other Techniques for Hiding and Protection:

barindex
Disables application error messsages (SetErrorMode)Show sources
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Configuration

No configs have been found

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Simulations

Behavior and APIs

No simulations

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
fileabc.docx0%VirustotalBrowse

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

SourceDetectionScannerLabelLink
skypedataprdcoleus06.cloudapp.net0%VirustotalBrowse

URLs

SourceDetectionScannerLabelLink
https://cdn.entity.0%URL Reputationsafe
https://wus2-000.contentsync.0%URL Reputationsafe
https://powerlift.acompli.net0%VirustotalBrowse
https://powerlift.acompli.net0%URL Reputationsafe
https://rpsticket.partnerservices.getmicrosoftkey.com0%URL Reputationsafe
https://api.aadrm.com/0%VirustotalBrowse
https://api.aadrm.com/0%URL Reputationsafe
https://ofcrecsvcapi-int.azurewebsites.net/0%VirustotalBrowse
https://ofcrecsvcapi-int.azurewebsites.net/0%URL Reputationsafe
https://res.getmicrosoftkey.com/api/redemptionevents0%VirustotalBrowse
https://res.getmicrosoftkey.com/api/redemptionevents0%URL Reputationsafe
https://powerlift-frontdesk.acompli.net0%VirustotalBrowse
https://powerlift-frontdesk.acompli.net0%URL Reputationsafe
https://officeci.azurewebsites.net/api/0%VirustotalBrowse
https://officeci.azurewebsites.net/api/0%URL Reputationsafe
https://store.office.cn/addinstemplate0%URL Reputationsafe
https://wus2-000.pagecontentsync.0%URL Reputationsafe
https://store.officeppe.com/addinstemplate0%VirustotalBrowse
https://store.officeppe.com/addinstemplate0%URL Reputationsafe
https://dev0-api.acompli.net/autodetect0%URL Reputationsafe
https://o365auditrealtimeingestion.manage.officeppe.com/api/userAuditRecord0%URL Reputationsafe
https://www.odwebp.svc.ms0%VirustotalBrowse
https://www.odwebp.svc.ms0%URL Reputationsafe
https://dataservice.o365filtering.com/0%VirustotalBrowse
https://dataservice.o365filtering.com/0%URL Reputationsafe
https://officesetup.getmicrosoftkey.com0%VirustotalBrowse
https://officesetup.getmicrosoftkey.com0%URL Reputationsafe
https://prod-global-autodetect.acompli.net/autodetect0%URL Reputationsafe
https://apis.live.net/v5.0/0%VirustotalBrowse
https://apis.live.net/v5.0/0%URL Reputationsafe
https://asgsmsproxyapi.azurewebsites.net/0%VirustotalBrowse
https://asgsmsproxyapi.azurewebsites.net/0%URL Reputationsafe
https://ncus-000.contentsync.0%URL Reputationsafe
https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile0%VirustotalBrowse
https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile0%URL Reputationsafe
https://o365diagnosticsppe-web.cloudapp.net0%VirustotalBrowse
https://o365diagnosticsppe-web.cloudapp.net0%Avira URL Cloudsafe
https://skyapi.live.net/Activity/0%VirustotalBrowse
https://skyapi.live.net/Activity/0%URL Reputationsafe
https://dataservice.o365filtering.com0%VirustotalBrowse
https://dataservice.o365filtering.com0%URL Reputationsafe
https://ovisualuiapp.azurewebsites.net/pbiagave/0%VirustotalBrowse
https://ovisualuiapp.azurewebsites.net/pbiagave/0%URL Reputationsafe
https://directory.services.0%VirustotalBrowse
https://directory.services.0%URL Reputationsafe

Yara Overview

Initial Sample

No yara matches

PCAP (Network Traffic)

No yara matches

Dropped Files

No yara matches

Memory Dumps

No yara matches

Unpacked PEs

No yara matches

Sigma Overview

No Sigma rule has matched

Joe Sandbox View / Context

IPs

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
52.114.133.60PREMBQ REF 118531.docGet hashmaliciousBrowse

    Domains

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    skypedataprdcoleus06.cloudapp.netPREMBQ REF 118531.docGet hashmaliciousBrowse
    • 52.114.133.60

    ASN

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    unknowndokument11900326.htaGet hashmaliciousBrowse
    • 203.124.113.131
    SpLW6lfIV3Get hashmaliciousBrowse
    • 172.217.168.14
    http://www.tucows.com/thankyou.html?swid=1597673Get hashmaliciousBrowse
    • 64.99.128.15
    Scanned-file452071.pdf.lnkGet hashmaliciousBrowse
    • 216.58.215.225
    86soq_01[1].exeGet hashmaliciousBrowse
    • 45.79.188.67
    Document needed.docGet hashmaliciousBrowse
    • 185.42.104.172
    look_attach_s0r.jsGet hashmaliciousBrowse
    • 5.101.51.91
    https://www.transfernow.net/rfcDkn032020/742afcGet hashmaliciousBrowse
    • 104.16.251.5
    https://www.transfernow.net/rfcDkn032020/742afcGet hashmaliciousBrowse
    • 162.216.250.35
    #Ud83d#Udcde Portvanusa.com Voice-message_4.htmGet hashmaliciousBrowse
    • 13.224.96.127
    0.884289.jsGet hashmaliciousBrowse
    • 89.107.186.3
    Mark Shared Message.htmlGet hashmaliciousBrowse
    • 148.72.248.46
    dokument9034432.htaGet hashmaliciousBrowse
    • 203.124.113.131
    http://www.hs24st.culbco.com/aHR0cHM6Ly9ib3VjaGVmZXp0ZXIuY29tL3ZvaWNlZT9zMjRwJmVtYWlsPW1ob2hpbWVyQGZhbWlseS1pbnN0aXR1dGUub3JnJm4yNHQ=Get hashmaliciousBrowse
    • 47.91.107.110
    zaMTU7CMVg.exeGet hashmaliciousBrowse
    • 104.18.88.101
    https://polykaura.com/staple/8095423/8095423.zipGet hashmaliciousBrowse
    • 127.0.0.1
    job_presentation_w5i.jsGet hashmaliciousBrowse
    • 5.101.51.91
    pw11-pro-demo.exeGet hashmaliciousBrowse
    • 151.101.12.134
    https://u15378345.ct.sendgrid.net/ls/click?upn=LnRBZ0nlWE6aikWcMGzbxSndG29F1nfrc3pRL4WE6n5D96fp4WIRaLWjD2mYFsWx-2FvC3z4u6LcWfb5gedruMlC9n7T6yCeg-2BF4wruqUdOwMewU-2FnkROAGyPf-2B-2FvnpD2Zfszo_Plxpf-2FwIng3KxtCnd5dGO72CsxCEs4aYImay408PZTz7bWiDnyl3pbjPf3GfZTjBGZCyn1MtGvxgcVELOYwV9GDDDEcMAaUJGvrgvH32fWwrHFOhatvN4UQeOsjonQztmgto4c6Un1sK9DDuj8NndB1gk7yRf2BtSW-2Bvo82sqow9y4N3arjbuysXVhUySz7QdoxBdwd81xncE9Qgd-2FKFIhQoqECyewc7Gm-2B9r-2BBfM46nIYRYKydtdqjeP8jmXWtrGet hashmaliciousBrowse
    • 167.89.118.35
    TableOfColors.exeGet hashmaliciousBrowse
    • 127.0.0.1

    JA3 Fingerprints

    No context

    Dropped Files

    No context

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.