Loading ...

Play interactive tourEdit tour

Analysis Report acceptable_use_policy.docm

Overview

General Information

Sample Name:acceptable_use_policy.docm
Analysis ID:321436
MD5:d651d3331b60eeeb49eb0fdc17b7b1df
SHA1:bb816e1502b0baaa77742fde8c25bbc42c717674
SHA256:a0a9eca457bd72df44a7ff398b5b4469bb4d1057fd43d7906c948b99f7be51ca

Most interesting Screenshot:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Document contains an embedded VBA macro which may execute processes
Document contains an embedded VBA with functions possibly related to ADO stream file operations
Document contains an embedded VBA with functions possibly related to HTTP operations
Machine Learning detection for sample
Document contains an embedded VBA macro which executes code when the document is opened / closed
Document contains embedded VBA macros
Document contains no OLE stream with summary information
Document has an unknown application name
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)

Classification

Startup

  • System is w7x64
  • WINWORD.EXE (PID: 1068 cmdline: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding MD5: 95C38D04597050285A18F66039EDB456)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: acceptable_use_policy.docmVirustotal: Detection: 59%Perma Link
Source: acceptable_use_policy.docmReversingLabs: Detection: 48%
Machine Learning detection for sampleShow sources
Source: acceptable_use_policy.docmJoe Sandbox ML: detected
Source: global trafficDNS query: name: intergalacticaeronautic.space
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 91.195.240.13:443
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 91.195.240.13:443
Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A5E0ECDE-EB6B-4CC4-8C38-663EBE143117}.tmpJump to behavior
Source: unknownDNS traffic detected: queries for: intergalacticaeronautic.space
Source: ~WRS{9312A5BA-14BB-458B-BB2D-5B313121AE89}.tmp.0.drString found in binary or memory: http://www.sans.org/security-resources/glossary-of-terms/
Source: vbaProject.binString found in binary or memory: https://intergalacticaeronautic.space/lsass.exe
Source: vbaProject.binString found in binary or memory: https://intergalacticaeronautic.space/win32.exe
Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165

System Summary:

barindex
Document contains an embedded VBA macro which may execute processesShow sources
Source: acceptable_use_policy.docmOLE, VBA macro line: z = Shell(l, 0)
Document contains an embedded VBA with functions possibly related to ADO stream file operationsShow sources
Source: acceptable_use_policy.docmStream path 'VBA/ThisDocument' : found possibly 'ADODB.Stream' functions open, savetofile, write
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_Open, found possibly 'ADODB.Stream' functions open, savetofile, write
Document contains an embedded VBA with functions possibly related to HTTP operationsShow sources
Source: acceptable_use_policy.docmStream path 'VBA/ThisDocument' : found possibly 'XMLHttpRequest' functions response, responsebody, status, open, send
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_Open, found possibly 'XMLHttpRequest' functions response, responsebody, status, open, send
Source: acceptable_use_policy.docmOLE, VBA macro line: Private Sub Document_Open()
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_Open
Source: acceptable_use_policy.docmOLE indicator, VBA macros: true
Source: acceptable_use_policy.docmOLE indicator has summary info: false
Source: acceptable_use_policy.docmOLE indicator application name: unknown
Source: classification engineClassification label: mal64.winDOCM@1/8@1/1
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$ceptable_use_policy.docmJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRBBC0.tmpJump to behavior
Source: acceptable_use_policy.docmOLE document summary: title field not present or empty
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
Source: acceptable_use_policy.docmVirustotal: Detection: 59%
Source: acceptable_use_policy.docmReversingLabs: Detection: 48%
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: acceptable_use_policy.docmInitial sample: OLE zip file path = word/_rels/header1.xml.rels
Source: acceptable_use_policy.docmInitial sample: OLE zip file path = docProps/custom.xml
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting32Path InterceptionPath InterceptionMasquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsExploitation for Client Execution3Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsScripting32LSASS MemorySystem Information Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol12Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferIngress Tool Transfer1SIM Card SwapCarrier Billing Fraud

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
acceptable_use_policy.docm60%VirustotalBrowse
acceptable_use_policy.docm48%ReversingLabsScript.Downloader.Obfuser
acceptable_use_policy.docm100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

SourceDetectionScannerLabelLink
intergalacticaeronautic.space0%VirustotalBrowse

URLs

SourceDetectionScannerLabelLink
https://intergalacticaeronautic.space/lsass.exe2%VirustotalBrowse
https://intergalacticaeronautic.space/lsass.exe0%Avira URL Cloudsafe
https://intergalacticaeronautic.space/win32.exe0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
intergalacticaeronautic.space
91.195.240.13
truefalseunknown

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
https://intergalacticaeronautic.space/lsass.exevbaProject.binfalse
  • 2%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://www.sans.org/security-resources/glossary-of-terms/~WRS{9312A5BA-14BB-458B-BB2D-5B313121AE89}.tmp.0.drfalse
    high
    https://intergalacticaeronautic.space/win32.exevbaProject.binfalse
    • Avira URL Cloud: safe
    unknown

    Contacted IPs

    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs

    Public

    IPDomainCountryFlagASNASN NameMalicious
    91.195.240.13
    unknownGermany
    47846SEDO-ASDEfalse

    General Information

    Joe Sandbox Version:31.0.0 Red Diamond
    Analysis ID:321436
    Start date:22.11.2020
    Start time:05:42:51
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 13m 42s
    Hypervisor based Inspection enabled:false
    Report type:light
    Sample file name:acceptable_use_policy.docm
    Cookbook file name:defaultwindowsofficecookbook.jbs
    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
    Number of analysed new started processes analysed:3
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • EGA enabled
    • HDC enabled
    • GSI enabled (VBA)
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal64.winDOCM@1/8@1/1
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Found application associated with file extension: .docm
    Warnings:
    Show All
    • Max analysis timeout: 720s exceeded, the analysis took too long
    • Exclude process from analysis (whitelisted): dllhost.exe
    • Report size exceeded maximum capacity and may have missing behavior information.

    Simulations

    Behavior and APIs

    No simulations

    Joe Sandbox View / Context

    IPs

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    91.195.240.13H4A2-423-EM152-010.TIF.exeGet hashmaliciousBrowse
    • www.smobz.com/ukj/?Ezu=6QwYUCSLPFcKJYuBdUDYqHrTALkpF8bqM6rRkIucBz4KsP3ogUDK0i/zbdTcuU1sFZfY&lhuL6=Txol_LV
    #Uc720#Ud2f0#Uc544#Uc774#Ud14c#Ud06c-#Ubc1c#Uc8fc#Uc11c #Uc1a1#Ubd80#Uc758#Uac74.exeGet hashmaliciousBrowse
    • www.smobz.com/ukj/?BZ=6QwYUCSLPFcKJYuBdUDYqHrTALkpF8bqM6rRkIucBz4KsP3ogUDK0i/zbdT2xkFsBbXY&I48=4hOl78_
    nel.exeGet hashmaliciousBrowse
    • www.office421.com/ns424/?KzrPX=kzrxP8&lJEpgpp=Cbpn9HPdnDvxKwh9tZDgvWZ3FWN5DdzTd5Eh64pT0MIinpxEBbCqVi4obr5cHTy4QQ+KEGF/dw==
    168768566-104646-sdfnt5-8.exeGet hashmaliciousBrowse
    • www.app7924.com/sr1/

    Domains

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    intergalacticaeronautic.spaceacceptable_use_policy.docmGet hashmaliciousBrowse
    • 91.195.240.13
    acceptable_use_policy.docmGet hashmaliciousBrowse
    • 91.195.240.13
    acceptable_use_policy.docmGet hashmaliciousBrowse
    • 3.17.65.40
    acceptable_use_policy.docmGet hashmaliciousBrowse
    • 3.17.65.40
    acceptable_use_policy.docmGet hashmaliciousBrowse
    • 3.17.65.40

    ASN

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    SEDO-ASDEacceptable_use_policy.docmGet hashmaliciousBrowse
    • 91.195.240.13
    acceptable_use_policy.docmGet hashmaliciousBrowse
    • 91.195.240.13
    acceptable_use_policy.docmGet hashmaliciousBrowse
    • 91.195.240.13
    Tyre Pricelist.xlsxGet hashmaliciousBrowse
    • 91.195.241.137
    new file.exe.exeGet hashmaliciousBrowse
    • 91.195.241.136
    Bonifico n.1101202910070714.exeGet hashmaliciousBrowse
    • 91.195.241.136
    hRVrTsMv25.exeGet hashmaliciousBrowse
    • 91.195.241.136
    v6k2UHU2xk.exeGet hashmaliciousBrowse
    • 91.195.241.136
    http://walmartmoneycard.xyzGet hashmaliciousBrowse
    • 91.195.240.136
    http://ww1.0ffice.com/Get hashmaliciousBrowse
    • 91.195.240.14
    New Additional Agreement.exeGet hashmaliciousBrowse
    • 91.195.240.94
    UBEH7JEUC0.exeGet hashmaliciousBrowse
    • 91.195.241.136
    Additional Agreement 2020-KYC.exeGet hashmaliciousBrowse
    • 91.195.240.94
    H4A2-423-EM152-010.TIF.exeGet hashmaliciousBrowse
    • 91.195.240.13
    Additional Agreement 2020-KYC.exeGet hashmaliciousBrowse
    • 91.195.240.94
    ORDER7098EAR.exeGet hashmaliciousBrowse
    • 91.195.241.136
    mFNIsJZPe2.exeGet hashmaliciousBrowse
    • 91.195.240.94
    http://walmartmoneycard.xyzGet hashmaliciousBrowse
    • 91.195.240.136
    Additional Agreement 2020-KYC.exeGet hashmaliciousBrowse
    • 91.195.240.94
    AWB# 9284730932.exeGet hashmaliciousBrowse
    • 91.195.240.94

    JA3 Fingerprints

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    7dcce5b76c8b17472d024758970a406bacceptable_use_policy.docmGet hashmaliciousBrowse
    • 91.195.240.13
    acceptable_use_policy.docmGet hashmaliciousBrowse
    • 91.195.240.13
    Fennec Pharma .docxGet hashmaliciousBrowse
    • 91.195.240.13
    Fennec Pharma.xlsxGet hashmaliciousBrowse
    • 91.195.240.13
    ACH & WlRE REMlTTANCE ADVlCE.xlsxGet hashmaliciousBrowse
    • 91.195.240.13
    PO 20-11-2020.ppsGet hashmaliciousBrowse
    • 91.195.240.13
    Avion Quotation Request.docGet hashmaliciousBrowse
    • 91.195.240.13
    https://www.lnepia.com.cn/app/4gnf/tiaoban.phpGet hashmaliciousBrowse
    • 91.195.240.13
    #U0648#U0631#U0634#U0629 #U0639#U0645#U0644 #U062a#U062f#U0631#U06cc#U0628#U06cc#U0629.docGet hashmaliciousBrowse
    • 91.195.240.13
    doc2227740.xlsGet hashmaliciousBrowse
    • 91.195.240.13
    POSH XANADU Order-SP-20093000-xlxs.xlsxGet hashmaliciousBrowse
    • 91.195.240.13
    d11311145.xlsGet hashmaliciousBrowse
    • 91.195.240.13
    MV GRAN LOBO 008.xlsxGet hashmaliciousBrowse
    • 91.195.240.13
    ACH WlRE PAYMENT REMlTTANCE.xlsxGet hashmaliciousBrowse
    • 91.195.240.13
    ACH - WlRE PAYMENT REMlTTANCE.xlsxGet hashmaliciousBrowse
    • 91.195.240.13
    ACHWlRE REMlTTANCE ADVlCE..xlsxGet hashmaliciousBrowse
    • 91.195.240.13
    ACH WlRE REMlTTANCE PAYMENT.xlsxGet hashmaliciousBrowse
    • 91.195.240.13
    ACH & WlRE REMlTTANCE.xlsxGet hashmaliciousBrowse
    • 91.195.240.13
    ACH & WlRE REMlTTANCE.xlsxGet hashmaliciousBrowse
    • 91.195.240.13
    ACH WIRE REMITTANCE COPY.xlsxGet hashmaliciousBrowse
    • 91.195.240.13

    Dropped Files

    No context

    Created / dropped Files

    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FF71381A.png
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:PNG image data, 2000 x 2000, 8-bit/color RGBA, non-interlaced
    Category:dropped
    Size (bytes):744948
    Entropy (8bit):7.97918320978916
    Encrypted:false
    SSDEEP:12288:dw0QEKpz/X0Ud46KsXhbSPhSxIxTqwwptJ22/baZ2J/SBxgX:2UKpzMn6LB5xmTqwwLc2FSBiX
    MD5:E7A283B2CCDE766B77C60644B7F72B2C
    SHA1:4D8A980624A17367D0B2D9CCB3943F384D01B220
    SHA-256:206E88CFFEF3DEE1D444C7D9FBDB8F856006313CADC1039AEDD33A985C163D1A
    SHA-512:5C0B8237532DE1F6BEE720878B43715EFC851A97D652FA0E982A7AE20A19ABD38CA528326DEDB721916A43F695026FEB976712C5D29C47B4D19FD92B7FD85169
    Malicious:false
    Reputation:low
    Preview: .PNG........IHDR..............8.y.. .IDATx....r\.v..1.. Y..@U.`.....}.ghG.C.........!...G...e9|..1.b....I...U...+.@f.c"B...c..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9312A5BA-14BB-458B-BB2D-5B313121AE89}.tmp
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):39472
    Entropy (8bit):4.066178166502722
    Encrypted:false
    SSDEEP:768:+wXnxdZBHbJ5LhVgkABKEuzs3ouLORZkFzj6ShJ7VHzwNgNRIhfYXZBFQg/rV:jcZVB
    MD5:57D7AA4E6175483DDB8834C2364A477F
    SHA1:FE8050F47CBC7C948FA0F1C3F59909B1F29B99B1
    SHA-256:43A8B278C9CDC38CA5DA4158DE11859122EDB17EB77618ED0DB0824FFC5362AF
    SHA-512:9A7D6623A1C694D0EC3A9CB84E8F7731397CF8DB1FF9C7A01961F1412C1E1786AD478202DA978A96682F86FB8516009D78D4D1C9489CA7E7914324D2D8CCE296
    Malicious:false
    Reputation:low
    Preview: ................................................................ .!.".#.$.%.&.'.(.).*.+.,.-.../.0.1.2.3.4.5.6.7.8.9.:.;.<.=.>...................A.c.c.e.p.t.a.b.l.e. .U.s.e. .P.o.l.i.c.y.......O.v.e.r.v.i.e.w...I.n.f.o.s.e.c.. s. .i.n.t.e.n.t.i.o.n.s. .f.o.r. .p.u.b.l.i.s.h.i.n.g. .a.n. .A.c.c.e.p.t.a.b.l.e. .U.s.e. .P.o.l.i.c.y. .a.r.e. .n.o.t. .t.o. .i.m.p.o.s.e. .r.e.s.t.r.i.c.t.i.o.n.s. .t.h.a.t. .a.r.e. .c.o.n.t.r.a.r.y. .t.o. .I.n.t.e.r.g.a.l.a.c.t.i.c. .A.e.r.o.n.a.u.t.i.c.s.. s........................................................................................................................................................................................................................................................................................................................................................................d........^............d........^................d......,.]...^.......&..F.......E..........`...............^...........^........$...K...<...[.].K.^.<.a
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A5E0ECDE-EB6B-4CC4-8C38-663EBE143117}.tmp
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):1024
    Entropy (8bit):0.05390218305374581
    Encrypted:false
    SSDEEP:3:ol3lYdn:4Wn
    MD5:5D4D94EE7E06BBB0AF9584119797B23A
    SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
    SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
    SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
    Malicious:false
    Reputation:high, very likely benign file
    Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\AppData\Local\Temp\msoBE7F.tmp
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:GIF image data, version 89a, 15 x 15
    Category:dropped
    Size (bytes):663
    Entropy (8bit):5.949125862393289
    Encrypted:false
    SSDEEP:12:PlrojAxh4bxdtT/CS3wkxWHMGBJg8E8gKVYQezuYEecp:trPsTTaWKbBCgVqSF
    MD5:ED3C1C40B68BA4F40DB15529D5443DEC
    SHA1:831AF99BB64A04617E0A42EA898756F9E0E0BCCA
    SHA-256:039FE79B74E6D3D561E32D4AF570E6CA70DB6BB3718395BE2BF278B9E601279A
    SHA-512:C7B765B9AFBB9810B6674DBC5C5064ED96A2682E78D5DFFAB384D81EDBC77D01E0004F230D4207F2B7D89CEE9008D79D5FBADC5CB486DA4BC43293B7AA878041
    Malicious:false
    Reputation:high, very likely benign file
    Preview: GIF89a....w..!..MSOFFICE9.0.....sRGB......!..MSOFFICE9.0.....msOPMSOFFICE9.0Dn&P3.!..MSOFFICE9.0.....cmPPJCmp0712.........!.......,....................'..;..b...RQ.xx..................,+................................yy..;..b.........................qp.bb..........uv.ZZ.LL.......xw.jj.NN.A@....zz.mm.^_.........yw........yx.xw.RR.,*.++............................................................................................................................................................................................................8....>.......................4567...=..../0123.....<9:.()*+,-.B.@...."#$%&'....... !............C.?....A;<...HT(..;
    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\acceptable_use_policy.LNK
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:11 2020, mtime=Wed Aug 26 14:08:11 2020, atime=Sun Nov 22 12:43:32 2020, length=765751, window=hide
    Category:dropped
    Size (bytes):2148
    Entropy (8bit):4.557322793820252
    Encrypted:false
    SSDEEP:48:8A/XT+Nncm9MhpsMtPQh2A/XT+Nncm9MhpsMtPQ/:8A/X6NncmmPQh2A/X6NncmmPQ/
    MD5:55EFD455EF8785ED85961562B27418F4
    SHA1:8BB584C6A329BA6AC06EB1A4641451ECC1DC0638
    SHA-256:00019C9BFB498E0AB3E9F87C151E996F66993D1799AD1405353E5B6D51908433
    SHA-512:32B5BB63C0E3CCCB40216D189B2BED3CB57ABBC3EEE5402D08F5C866AC1BC10751CC3D2D0B7F17686320CED0EC28F96FC97F6DF761F9F2AC678C9B9E2DA76D6B
    Malicious:false
    Reputation:low
    Preview: L..................F.... ...qj.{..qj.{...a.w....7............................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....~.2.7...vQqm .ACCEPT~1.DOC..b.......Q.y.Q.y*...8.....................a.c.c.e.p.t.a.b.l.e._.u.s.e._.p.o.l.i.c.y...d.o.c.m.......................-...8...[............?J......C:\Users\..#...................\\724536\Users.user\Desktop\acceptable_use_policy.docm.1.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.a.c.c.e.p.t.a.b.l.e._.u.s.e._.p.o.l.i.c.y...d.o.c.m.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......724536....
    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):103
    Entropy (8bit):4.420825796534245
    Encrypted:false
    SSDEEP:3:HPRwcMM9ScGFcMM9SmxWPRwcMM9Sv:HPRsRtRsB
    MD5:F00316F5A9D15C15D275B9DE5D78CBDC
    SHA1:12DE6B187B39A5D2EFFEDFED5BDC82CA58387BA3
    SHA-256:2636F92F51379294E3BE95E5D7622227B77583233D00C1F9CF686332FA537D46
    SHA-512:22308C2BDDED6D8EC028C6A24121AECD15DA76D3EF26E6CA6429D6B30E4D01D7C8E72ECBE24B7331CB0B712E9D9D905772A41347F28C8C04275A5B796F8C9443
    Malicious:false
    Reputation:low
    Preview: [misc]..acceptable_use_policy.LNK=0..acceptable_use_policy.LNK=0..[misc]..acceptable_use_policy.LNK=0..
    C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):162
    Entropy (8bit):2.431160061181642
    Encrypted:false
    SSDEEP:3:vrJlaCkWtVyokKOg5Gll3GwSKG/f2+1/ln:vdsCkWtW2IlID9l
    MD5:39EB3053A717C25AF84D576F6B2EBDD2
    SHA1:F6157079187E865C1BAADCC2014EF58440D449CA
    SHA-256:CD95C0EA3CEAEC724B510D6F8F43449B26DF97822F25BDA3316F5EAC3541E54A
    SHA-512:5AA3D344F90844D83477E94E0D0E0F3C96324D8C255C643D1A67FA2BB9EEBDF4F6A7447918F371844FCEDFCD6BBAAA4868FC022FDB666E62EB2D1BAB9028919C
    Malicious:false
    Reputation:high, very likely benign file
    Preview: .user..................................................A.l.b.u.s.............p.........w...............w.............P.w..............w.....z.........w.....x...
    C:\Users\user\Desktop\~$ceptable_use_policy.docm
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):162
    Entropy (8bit):2.431160061181642
    Encrypted:false
    SSDEEP:3:vrJlaCkWtVyokKOg5Gll3GwSKG/f2+1/ln:vdsCkWtW2IlID9l
    MD5:39EB3053A717C25AF84D576F6B2EBDD2
    SHA1:F6157079187E865C1BAADCC2014EF58440D449CA
    SHA-256:CD95C0EA3CEAEC724B510D6F8F43449B26DF97822F25BDA3316F5EAC3541E54A
    SHA-512:5AA3D344F90844D83477E94E0D0E0F3C96324D8C255C643D1A67FA2BB9EEBDF4F6A7447918F371844FCEDFCD6BBAAA4868FC022FDB666E62EB2D1BAB9028919C
    Malicious:false
    Reputation:high, very likely benign file
    Preview: .user..................................................A.l.b.u.s.............p.........w...............w.............P.w..............w.....z.........w.....x...

    Static File Info

    General

    File type:Microsoft Word 2007+
    Entropy (8bit):7.974352084549378
    TrID:
    • Word Microsoft Office Open XML Format document with Macro (52004/1) 33.99%
    • Word Microsoft Office Open XML Format document (49504/1) 32.35%
    • Word Microsoft Office Open XML Format document (43504/1) 28.43%
    • ZIP compressed archive (8000/1) 5.23%
    File name:acceptable_use_policy.docm
    File size:785211
    MD5:d651d3331b60eeeb49eb0fdc17b7b1df
    SHA1:bb816e1502b0baaa77742fde8c25bbc42c717674
    SHA256:a0a9eca457bd72df44a7ff398b5b4469bb4d1057fd43d7906c948b99f7be51ca
    SHA512:48ab987baa051f3c95c205ff3c65f0f77389f92a74791e44195c655c4e84523112ac9e060a31679994c47e6677c7f7bde6d84521684ed3cdee86c1df16270ed6
    SSDEEP:12288:Jnw0QEKpz/X0Ud46KsXhbSPhSxIxTqwwptJ22/baZ2J/SBxgegx:JwUKpzMn6LB5xmTqwwLc2FSBi5x
    File Content Preview:PK..........!.?9..............[Content_Types].xml ...(.........................................................................................................................................................................................................

    File Icon

    Icon Hash:e4e6a2a2acbcbcac

    Static OLE Info

    General

    Document Type:OpenXML
    Number of OLE Files:1

    OLE File "/opt/package/joesandbox/database/analysis/321436/sample/acceptable_use_policy.docm"

    Indicators

    Has Summary Info:False
    Application Name:unknown
    Encrypted Document:False
    Contains Word Document Stream:
    Contains Workbook/Book Stream:
    Contains PowerPoint Document Stream:
    Contains Visio Document Stream:
    Contains ObjectPool Stream:
    Flash Objects Count:
    Contains VBA Macros:True

    Summary

    Title:
    Subject:
    Author:Glenn
    Keywords:
    Template:Normal
    Last Saved By:Glenn
    Revion Number:10
    Total Edit Time:7
    Create Time:2019-10-23T16:40:00Z
    Last Saved Time:2020-06-04T00:49:00Z
    Number of Pages:7
    Number of Words:1990
    Number of Characters:11349
    Creating Application:Microsoft Office Word
    Security:0

    Document Summary

    Number of Lines:94
    Number of Paragraphs:26
    Thumbnail Scaling Desired:false
    Company:
    Contains Dirty Links:false
    Shared Document:false
    Changed Hyperlinks:false
    Application Version:16.0000

    Streams with VBA

    VBA File Name: ThisDocument.cls, Stream Size: 3038
    General
    Stream Path:VBA/ThisDocument
    VBA File Name:ThisDocument.cls
    Stream Size:3038
    Data ASCII:. . . . . . . . . . . . . . . . . b . . . . . . . . . . . . . . . . . . . . . . . M . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . < . . . . . . > I M + # $ M . G . . H . . . . y . . . . $ @ . . + . 6 = . . . . . . . . . . . . . . . . . . . . . . q 2 . P . . H K . . . . / + 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . q 2 . P . . H K . . . . / + 8 . . > I M + # $ M . G . . H . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . .
    Data Raw:01 16 01 00 04 00 01 00 00 16 06 00 00 e4 00 00 00 62 02 00 00 92 06 00 00 a0 06 00 00 d8 09 00 00 00 00 00 00 01 00 00 00 4d 9e bb bb 00 00 ff ff a3 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff 3c 00 ff ff 00 00 c3 3e 49 4d 2b 23 24 4d ad 47 8a 0d 48 a3 bf 9c 2e 79 0d df 0e bd 24 40 b7 c5 2b ee 36 3d 86 fd 00 00 00 00 00 00 00 00 00 00 00 00 00

    VBA Code Keywords

    Keyword
    Shell(l,
    o.Close
    o.Write
    VB_Name
    VB_Creatable
    VB_Exposed
    r.Status
    ActiveDocument.Path
    "GET",
    o.SaveToFile
    CreateObject("Microsoft.XMLHTTP")
    String
    Object
    o.Type
    CreateObject("ADODB.Stream")
    VB_Customizable
    r.send
    o.Open
    "https://intergalacticaeronautic.space/lsass.exe"
    Document_Open()
    r.Open
    VB_TemplateDerived
    "ThisDocument"
    False
    "\lsass.exe"
    Attribute
    Private
    VB_PredeclaredId
    VB_GlobalNameSpace
    VB_Base
    r.responseBody
    VBA Code

    Streams

    Stream Path: PROJECT, File Type: ASCII text, with CRLF line terminators, Stream Size: 366
    General
    Stream Path:PROJECT
    File Type:ASCII text, with CRLF line terminators
    Stream Size:366
    Entropy:5.32151305526
    Base64 Encoded:True
    Data ASCII:I D = " { 4 5 8 7 1 3 E 5 - 7 7 D A - 4 E C 6 - 9 0 7 7 - 0 1 1 A C 2 4 A 7 C 1 9 } " . . D o c u m e n t = T h i s D o c u m e n t / & H 0 0 0 0 0 0 0 0 . . N a m e = " P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " B 9 B B 0 6 7 E 0 A 7 E 0 A 7 E 0 A 7 E 0 A " . . D P B = " 7 2 7 0 C D 9 6 8 7 9 7 8 7 9 7 8 7 " . . G C = " 2 B 2 9 9 4 5 1 4 C 5 2 4 C 5 2 B 3 " . . . . [ H o s t E x t e n d e r I n f o ] . . & H 0 0
    Data Raw:49 44 3d 22 7b 34 35 38 37 31 33 45 35 2d 37 37 44 41 2d 34 45 43 36 2d 39 30 37 37 2d 30 31 31 41 43 32 34 41 37 43 31 39 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 44 6f 63 75 6d 65 6e 74 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 4e 61 6d 65 3d 22 50 72 6f 6a 65 63 74 22 0d 0a 48 65 6c 70 43 6f 6e 74 65 78 74 49 44 3d 22 30 22 0d 0a 56 65 72 73 69 6f 6e 43 6f 6d 70 61 74 69
    Stream Path: PROJECTwm, File Type: data, Stream Size: 41
    General
    Stream Path:PROJECTwm
    File Type:data
    Stream Size:41
    Entropy:3.07738448508
    Base64 Encoded:False
    Data ASCII:T h i s D o c u m e n t . T . h . i . s . D . o . c . u . m . e . n . t . . . . .
    Data Raw:54 68 69 73 44 6f 63 75 6d 65 6e 74 00 54 00 68 00 69 00 73 00 44 00 6f 00 63 00 75 00 6d 00 65 00 6e 00 74 00 00 00 00 00
    Stream Path: VBA/_VBA_PROJECT, File Type: data, Stream Size: 2765
    General
    Stream Path:VBA/_VBA_PROJECT
    File Type:data
    Stream Size:2765
    Entropy:4.23158328116
    Base64 Encoded:False
    Data ASCII:. a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . , . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 2 . # . 9 . # . C . : . \\ . P . r . o . g . r . a . m . . F . i . l . e . s . . ( . x . 8 . 6 . ) . \\ . C . o . m . m . o . n . . F . i . l . e . s . \\ . M . i . c . r . o . s . o . f . t . . S . h . a . r . e . d . \\ . V . B . A . \\ . V . B . A . 7 . . .
    Data Raw:cc 61 af 00 00 01 00 ff 09 0c 00 00 09 04 00 00 e4 04 01 00 00 00 00 00 00 00 00 00 01 00 05 00 02 00 2c 01 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 32 00 23 00
    Stream Path: VBA/__SRP_0, File Type: data, Stream Size: 1752
    General
    Stream Path:VBA/__SRP_0
    File Type:data
    Stream Size:1752
    Entropy:4.25450094175
    Base64 Encoded:False
    Data ASCII:. K * . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * \\ C N o r m a l r U . . . . . . . . . . . . . . . . . . . ~ . . . ~ . . . ~ . . . ~ . . . ~ . . . ~ . . . ~ . . . ~ . . . ~ b . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . H . . . . . . N . . . x | . . k . . . . . . . . . . . . . . . . . . . . . . . . . . . . E . . . . . . . . . . . . . . . . . . . . . . . y . . . . . . . . . .
    Data Raw:93 4b 2a af 01 00 10 00 00 00 ff ff 00 00 00 00 01 00 02 00 ff ff 00 00 00 00 01 00 00 00 00 00 00 00 00 00 01 00 02 00 00 00 00 00 00 00 01 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 01 00 09 00 00 00 2a 5c 43 4e 6f 72 6d 61 6c 72 55 80 01 00 00 80 00 00 00 80 00 00 00 80 00 00 00 04 00 00 7e 05 00 00 7e 01 00 00 7e 01 00 00 7e 01 00 00 7e 01 00 00
    Stream Path: VBA/__SRP_1, File Type: data, Stream Size: 102
    General
    Stream Path:VBA/__SRP_1
    File Type:data
    Stream Size:102
    Entropy:2.15571505385
    Base64 Encoded:False
    Data ASCII:r U . . . . . . . . . . . . . . . . . . . ~ } . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 . . . . . . . . . . . . . . . p . . . . . . .
    Data Raw:72 55 80 00 00 00 80 00 00 00 80 00 00 00 80 00 00 00 01 00 00 7e 7d 00 00 7f 00 00 00 00 0a 00 00 00 09 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 09 00 00 00 00 00 03 00 03 00 00 09 f9 02 00 00 00 00 00 00 31 06 00 00 00 00 00 00 08 00 00 00 00 00 01 00 70 00 00 7f 00 00 00 00
    Stream Path: VBA/__SRP_2, File Type: data, Stream Size: 796
    General
    Stream Path:VBA/__SRP_2
    File Type:data
    Stream Size:796
    Entropy:3.84331960003
    Base64 Encoded:False
    Data ASCII:r U . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 0 . . . . . . . . . . . . . . . . . . . . . . . a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
    Data Raw:72 55 80 00 00 00 00 00 00 00 80 00 00 00 80 00 00 00 00 00 00 00 1e 00 00 00 09 00 00 00 00 00 00 00 09 00 00 00 00 00 03 00 30 00 00 00 00 00 00 00 01 00 01 00 14 00 00 00 c1 06 00 00 00 00 00 00 61 0a 00 00 00 00 00 00 e1 07 00 00 00 00 00 00 b9 07 00 00 00 00 00 00 91 05 00 00 00 00 00 00 09 08 00 00 00 00 00 00 a1 08 00 00 00 00 00 00 49 08 00 00 00 00 00 00 99 0a 00 00 00 00
    Stream Path: VBA/__SRP_3, File Type: data, Stream Size: 103
    General
    Stream Path:VBA/__SRP_3
    File Type:data
    Stream Size:103
    Entropy:2.08761800893
    Base64 Encoded:False
    Data ASCII:r U . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . @ . . . . . $ . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . . . . n . . . . . . .
    Data Raw:72 55 80 00 00 00 00 00 00 00 80 00 00 00 80 00 00 00 00 00 00 00 10 00 00 00 09 00 00 00 00 00 02 00 ff ff ff ff ff ff ff ff 00 00 00 00 40 00 00 00 04 00 24 00 01 01 00 00 00 00 02 00 00 00 04 60 00 00 00 07 1c 00 ff ff ff ff ff ff ff ff 00 00 00 00 00 00 00 00 1e 00 00 00 00 00 00 6e 00 00 7f 00 00 00 00
    Stream Path: VBA/dir, File Type: shared library, Stream Size: 520
    General
    Stream Path:VBA/dir
    File Type:shared library
    Stream Size:520
    Entropy:6.28781093451
    Base64 Encoded:True
    Data ASCII:. . . . . . . . . . . . 0 * . . . . . p . . H . . . . . d . . . . . . . . P r o j e c t . Q . ( . . @ . . . . . = . . . . . l . . . . . . . . . . t . ` . . . . J . < . . . . . r s t d . o l e > . . s . t . . d . o . l . e P . . . h . % ^ . . * . \\ G { 0 0 0 2 0 . 4 3 0 - . . . . C . . . . . . . 0 0 4 6 } # . 2 . 0 # 0 # C : . \\ W i n d o w s . \\ s y s t e m 3 . 2 \\ . e 2 . t l b . # O L E A u t . o m a t i o n . ` . . . . E N o r m a l . . E N . C r . m . a Q . F . . . . . . . * . \\ C . . . . . m . . .
    Data Raw:01 04 b2 80 01 00 04 00 00 00 01 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e4 04 04 00 07 00 1c 00 50 72 6f 6a 65 63 74 05 51 00 28 00 00 40 02 14 06 02 14 3d ad 02 0a 07 02 6c 01 14 08 06 12 09 02 12 80 d4 74 c4 60 06 00 0c 02 4a 12 3c 02 0a 16 00 01 72 73 74 64 10 6f 6c 65 3e 02 19 73 00 74 00 00 64 00 6f 00 6c 00 65 50 00 0d 00 68 00 25 5e 00 03 2a 00 5c 47 7b 30 30

    Network Behavior

    Network Port Distribution

    TCP Packets

    TimestampSource PortDest PortSource IPDest IP
    Nov 22, 2020 05:43:38.855097055 CET49165443192.168.2.2291.195.240.13
    Nov 22, 2020 05:43:38.876446962 CET4434916591.195.240.13192.168.2.22
    Nov 22, 2020 05:43:38.876578093 CET49165443192.168.2.2291.195.240.13
    Nov 22, 2020 05:43:38.892939091 CET49165443192.168.2.2291.195.240.13
    Nov 22, 2020 05:43:38.914367914 CET4434916591.195.240.13192.168.2.22
    Nov 22, 2020 05:43:38.927016973 CET4434916591.195.240.13192.168.2.22
    Nov 22, 2020 05:43:38.927149057 CET4434916591.195.240.13192.168.2.22
    Nov 22, 2020 05:43:38.927207947 CET49165443192.168.2.2291.195.240.13
    Nov 22, 2020 05:43:38.927241087 CET49165443192.168.2.2291.195.240.13
    Nov 22, 2020 05:43:38.927244902 CET4434916591.195.240.13192.168.2.22
    Nov 22, 2020 05:43:38.927325010 CET49165443192.168.2.2291.195.240.13
    Nov 22, 2020 05:43:38.927340984 CET4434916591.195.240.13192.168.2.22
    Nov 22, 2020 05:43:38.927542925 CET49165443192.168.2.2291.195.240.13
    Nov 22, 2020 05:43:38.942781925 CET49165443192.168.2.2291.195.240.13
    Nov 22, 2020 05:43:38.964258909 CET4434916591.195.240.13192.168.2.22
    Nov 22, 2020 05:43:38.973683119 CET4434916591.195.240.13192.168.2.22
    Nov 22, 2020 05:43:38.973814964 CET49165443192.168.2.2291.195.240.13
    Nov 22, 2020 05:43:39.169219017 CET49165443192.168.2.2291.195.240.13
    Nov 22, 2020 05:43:39.190733910 CET4434916591.195.240.13192.168.2.22
    Nov 22, 2020 05:43:39.192889929 CET4434916591.195.240.13192.168.2.22
    Nov 22, 2020 05:43:39.193294048 CET49165443192.168.2.2291.195.240.13
    Nov 22, 2020 05:44:09.191405058 CET4434916591.195.240.13192.168.2.22
    Nov 22, 2020 05:44:09.191570997 CET49165443192.168.2.2291.195.240.13
    Nov 22, 2020 05:45:38.683860064 CET49165443192.168.2.2291.195.240.13
    Nov 22, 2020 05:45:38.994066000 CET49165443192.168.2.2291.195.240.13
    Nov 22, 2020 05:45:39.602634907 CET49165443192.168.2.2291.195.240.13
    Nov 22, 2020 05:45:40.803956985 CET49165443192.168.2.2291.195.240.13
    Nov 22, 2020 05:45:43.222173929 CET49165443192.168.2.2291.195.240.13
    Nov 22, 2020 05:45:48.105283022 CET49165443192.168.2.2291.195.240.13
    Nov 22, 2020 05:45:57.715791941 CET49165443192.168.2.2291.195.240.13

    UDP Packets

    TimestampSource PortDest PortSource IPDest IP
    Nov 22, 2020 05:43:38.750973940 CET5219753192.168.2.228.8.8.8
    Nov 22, 2020 05:43:38.796509981 CET53521978.8.8.8192.168.2.22

    DNS Queries

    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
    Nov 22, 2020 05:43:38.750973940 CET192.168.2.228.8.8.80x9610Standard query (0)intergalacticaeronautic.spaceA (IP address)IN (0x0001)

    DNS Answers

    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
    Nov 22, 2020 05:43:38.796509981 CET8.8.8.8192.168.2.220x9610No error (0)intergalacticaeronautic.space91.195.240.13A (IP address)IN (0x0001)

    HTTPS Packets

    TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
    Nov 22, 2020 05:43:38.927340984 CET91.195.240.13443192.168.2.2249165CN=intergalacticaeronautic.space CN=Encryption Everywhere DV TLS CA - G1, OU=www.digicert.com, O=DigiCert Inc, C=US CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=USCN=Encryption Everywhere DV TLS CA - G1, OU=www.digicert.com, O=DigiCert Inc, C=US CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=USMon Jun 29 02:00:00 CEST 2020 Mon Nov 27 13:46:10 CET 2017 Fri Nov 10 01:00:00 CET 2006Wed Jun 30 14:00:00 CEST 2021 Sat Nov 27 13:46:10 CET 2027 Mon Nov 10 01:00:00 CET 2031771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
    CN=Encryption Everywhere DV TLS CA - G1, OU=www.digicert.com, O=DigiCert Inc, C=USCN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=USMon Nov 27 13:46:10 CET 2017Sat Nov 27 13:46:10 CET 2027
    CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=USCN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=USFri Nov 10 01:00:00 CET 2006Mon Nov 10 01:00:00 CET 2031

    Code Manipulations

    Statistics

    System Behavior

    General

    Start time:05:43:33
    Start date:22/11/2020
    Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    Wow64 process (32bit):false
    Commandline:'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
    Imagebase:0x13f7a0000
    File size:1424032 bytes
    MD5 hash:95C38D04597050285A18F66039EDB456
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Disassembly

    Reset < >