Analysis Report COVID19open_closedPodsVACCINE_LETTER2B.docx

Overview

General Information

Sample Name: COVID19open_closedPodsVACCINE_LETTER2B.docx
Analysis ID: 353581
MD5: e65769cca6ce8214adf674a8001d83b4
SHA1: d3800da27e0aa660f04da269b5392fb3f4c26eb5
SHA256: b0ecb837f4df662ff941ce2cdb64cea78b07c22b1e9ad0d328229aa9dd9f1996

Most interesting Screenshot:

Detection

Score: 0
Range: 0 - 100
Whitelisted: false
Confidence: 60%

Signatures

JA3 SSL client fingerprint seen in connection with other malware

Classification

Compliance:

barindex
Uses new MSVCR Dlls
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Uses secure TLS version for HTTPS connections
Source: unknown HTTPS traffic detected: 199.192.8.2:443 -> 192.168.2.22:49169 version: TLS 1.2
Source: unknown HTTPS traffic detected: 199.192.8.2:443 -> 192.168.2.22:49189 version: TLS 1.2

Networking:

barindex
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B4CD7B63-97C0-4A14-814E-1968BCE52029}.tmp Jump to behavior
Source: global traffic HTTP traffic detected: GET / HTTP/1.1Accept: text/html, application/xhtml+xml, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: www.dhhs.nh.govDNT: 1Connection: Keep-Alive
Source: 4MUVPDOK.htm.3.dr String found in binary or memory: <div class="social-media"><span><a href="media/pr/index.htm">News Archive</a></span><a href="https://www.facebook.com/NHDepartmentOfHealthAndHumanServices"><img src="graphics/icon-fb-like.gif" alt="Facebook Icon" width="42" height="20" /></a> equals www.facebook.com (Facebook)
Source: unknown DNS traffic detected: queries for: www.dhhs.nh.gov
Source: 4MUVPDOK.htm.3.dr String found in binary or memory: http://coveringnewhampshire.org/
Source: jquery.jshowoff.min[1].js.3.dr String found in binary or memory: http://ekallevig.com/jshowoff
Source: 4MUVPDOK.htm.3.dr String found in binary or memory: http://thedoorway.nh.gov/
Source: textsizer[1].js.3.dr String found in binary or memory: http://txkang.com
Source: element_main[1].js.3.dr String found in binary or memory: http://www.broofa.com
Source: ~WRS{A7F4CFE5-FD14-491B-BD17-FD822CEDA35F}.tmp.0.dr String found in binary or memory: http://www.dhhs.nh.gov/
Source: textsizer[1].js.3.dr String found in binary or memory: http://www.dynamicdrive.com)
Source: index[1].htm0.3.dr String found in binary or memory: http://www.recovery.gov
Source: seniors[1].htm.3.dr String found in binary or memory: http://www.servicelink.nh.gov/
Source: seniors[1].htm.3.dr, disabilities[1].htm.3.dr String found in binary or memory: http://www.ssa.gov/
Source: 4MUVPDOK.htm.3.dr, index[1].htm0.3.dr String found in binary or memory: https://business.nh.gov/Sign_Up/cal.asp?w=grid&y=7
Source: 4MUVPDOK.htm.3.dr String found in binary or memory: https://nheasy.nh.gov/dcyf/#/
Source: ~WRS{A7F4CFE5-FD14-491B-BD17-FD822CEDA35F}.tmp.0.dr String found in binary or memory: https://prd.blogs.nh.gov/dos/hsem/?page_id=11170
Source: 4MUVPDOK.htm.3.dr String found in binary or memory: https://schoolsafetyresources.nh.gov/
Source: 4MUVPDOK.htm.3.dr String found in binary or memory: https://search.nh.gov/dhhs-search.htm
Source: element_main[1].js.3.dr String found in binary or memory: https://translate.google.com
Source: 4MUVPDOK.htm.3.dr String found in binary or memory: https://translate.google.com/translate_a/element.js?cb=googleTranslateElementInit
Source: 4MUVPDOK.htm.3.dr String found in binary or memory: https://twitter.com/NHDHHSPIO
Source: seniors[1].htm.3.dr, disabilities[1].htm.3.dr String found in binary or memory: https://www.cms.gov/
Source: {0B411F16-70B5-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://www.dhhs.nh.go
Source: {0B411F16-70B5-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://www.dhhs.nh.gov/
Source: {0B411F16-70B5-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://www.dhhs.nh.gov/#skip
Source: ~DF18054AB76B5B25D5.TMP.2.dr String found in binary or memory: https://www.dhhs.nh.gov/#skip/www.dhhs.nh.gov/favicon.ico
Source: ~DF18054AB76B5B25D5.TMP.2.dr String found in binary or memory: https://www.dhhs.nh.gov/#skipj
Source: {0B411F16-70B5-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://www.dhhs.nh.gov/#translate
Source: ~DF18054AB76B5B25D5.TMP.2.dr String found in binary or memory: https://www.dhhs.nh.gov/#translateilities.htm
Source: ~DF18054AB76B5B25D5.TMP.2.dr String found in binary or memory: https://www.dhhs.nh.gov/#translateilities.htmt
Source: {0B411F16-70B5-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://www.dhhs.nh.gov/R
Source: {0B411F16-70B5-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://www.dhhs.nh.gov/Root
Source: {0B411F16-70B5-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://www.dhhs.nh.gov/about/index.htm
Source: ~DF18054AB76B5B25D5.TMP.2.dr String found in binary or memory: https://www.dhhs.nh.gov/about/index.htmies.htmp
Source: imagestore.dat.3.dr String found in binary or memory: https://www.dhhs.nh.gov/favicon.ico
Source: imagestore.dat.3.dr String found in binary or memory: https://www.dhhs.nh.gov/favicon.ico~
Source: {0B411F16-70B5-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://www.dhhs.nh.gov/foryou/adults.htm
Source: ~DF18054AB76B5B25D5.TMP.2.dr String found in binary or memory: https://www.dhhs.nh.gov/foryou/adults.htmm
Source: ~DF18054AB76B5B25D5.TMP.2.dr String found in binary or memory: https://www.dhhs.nh.gov/foryou/adults.htmmt
Source: {0B411F16-70B5-11EB-ADCF-ECF4BBB5915B}.dat.2.dr, ~DF18054AB76B5B25D5.TMP.2.dr String found in binary or memory: https://www.dhhs.nh.gov/foryou/disabilities.htm
Source: {0B411F16-70B5-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://www.dhhs.nh.gov/foryou/disabilitiesRoot
Source: {0B411F16-70B5-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://www.dhhs.nh.gov/foryou/families.htm
Source: ~DF18054AB76B5B25D5.TMP.2.dr String found in binary or memory: https://www.dhhs.nh.gov/foryou/families.htmx
Source: {0B411F16-70B5-11EB-ADCF-ECF4BBB5915B}.dat.2.dr, ~DF18054AB76B5B25D5.TMP.2.dr String found in binary or memory: https://www.dhhs.nh.gov/foryou/seniors.htm
Source: ~DF18054AB76B5B25D5.TMP.2.dr String found in binary or memory: https://www.dhhs.nh.gov/foryou/seniors.htmv
Source: {0B411F16-70B5-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://www.dhhs.nh.gov/foryou/teens.htm
Source: ~DF18054AB76B5B25D5.TMP.2.dr String found in binary or memory: https://www.dhhs.nh.gov/foryou/teens.htmm
Source: ~DF18054AB76B5B25D5.TMP.2.dr String found in binary or memory: https://www.dhhs.nh.gov/foryou/teens.htmmr
Source: {0B411F16-70B5-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://www.dhhs.nh.gov/foryou/women.htm
Source: ~DF18054AB76B5B25D5.TMP.2.dr String found in binary or memory: https://www.dhhs.nh.gov/foryou/women.htmm
Source: ~DF18054AB76B5B25D5.TMP.2.dr String found in binary or memory: https://www.dhhs.nh.gov/foryou/women.htmmr
Source: {0B411F16-70B5-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://www.dhhs.nh.gov/index.htm
Source: ~DF18054AB76B5B25D5.TMP.2.dr String found in binary or memory: https://www.dhhs.nh.gov/index.htmilities.htm
Source: {0B411F16-70B5-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://www.dhhs.nh.gov/index.htmjNew
Source: {0B411F16-70B5-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://www.dhhs.nh.gov/jNew
Source: ~DF18054AB76B5B25D5.TMP.2.dr String found in binary or memory: https://www.dhhs.nh.gov/ps://www.dhhs.nh.gov/favicon.ico
Source: element_main[1].js.3.dr String found in binary or memory: https://www.google.com/images/cleardot.gif
Source: element_main[1].js.3.dr String found in binary or memory: https://www.google.com/support/translate
Source: element_main[1].js.3.dr String found in binary or memory: https://www.gstatic.com/images/branding/googlelogo/1x/googlelogo_color_42x16dp.png
Source: element_main[1].js.3.dr String found in binary or memory: https://www.gstatic.com/images/branding/googlelogo/1x/googlelogo_color_68x28dp.png
Source: element_main[1].js.3.dr String found in binary or memory: https://www.gstatic.com/images/branding/product/1x/translate_24dp.png
Source: 4MUVPDOK.htm.3.dr, index[1].htm0.3.dr String found in binary or memory: https://www.nh.gov
Source: {0B411F16-70B5-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://www.nh.gov/cov
Source: {0B411F16-70B5-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://www.nh.gov/covid19
Source: 4MUVPDOK.htm.3.dr String found in binary or memory: https://www.nh.gov/covid19/index.htm
Source: ~WRS{A7F4CFE5-FD14-491B-BD17-FD822CEDA35F}.tmp.0.dr, document.xml String found in binary or memory: https://www.nh.gov/covid19/resources-guidance/vaccination-planning.htm
Source: {0B411F16-70B5-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://www.nh.gov/covid198This
Source: ~DF18054AB76B5B25D5.TMP.2.dr String found in binary or memory: https://www.nh.gov/covid19://www.dhhs.nh.gov/favicon.ico
Source: {0B411F16-70B5-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://www.nh.gov/covid19R
Source: {0B411F16-70B5-11EB-ADCF-ECF4BBB5915B}.dat.2.dr String found in binary or memory: https://www.nh.gov/covv/R
Source: 4MUVPDOK.htm.3.dr, index[1].htm0.3.dr String found in binary or memory: https://www.nh.gov/disclaimer.html
Source: 4MUVPDOK.htm.3.dr, index[1].htm0.3.dr String found in binary or memory: https://www.nh.gov/wai/index.html
Source: 4MUVPDOK.htm.3.dr String found in binary or memory: https://www.nhcarepath.dhhs.nh.gov/
Source: women[1].htm.3.dr String found in binary or memory: https://www.servicelink.nh.gov
Source: adults[1].htm.3.dr, disabilities[1].htm.3.dr String found in binary or memory: https://www.servicelink.nh.gov/
Source: 4MUVPDOK.htm.3.dr String found in binary or memory: https://www.servicelink.nh.gov/locator/index.htm
Source: disabilities[1].htm.3.dr String found in binary or memory: https://www.stablenh.com/
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49169
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49189
Source: unknown Network traffic detected: HTTP traffic on port 49181 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49189 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49182
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49181
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49180
Source: unknown Network traffic detected: HTTP traffic on port 49172 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49197 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49170 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49174 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49199 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49179
Source: unknown Network traffic detected: HTTP traffic on port 49180 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49199
Source: unknown Network traffic detected: HTTP traffic on port 49182 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49197
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49174
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49196
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49173
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49172
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49171
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49170
Source: unknown Network traffic detected: HTTP traffic on port 49196 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49169 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49171 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49173 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49179 -> 443
Source: unknown HTTPS traffic detected: 199.192.8.2:443 -> 192.168.2.22:49169 version: TLS 1.2
Source: unknown HTTPS traffic detected: 199.192.8.2:443 -> 192.168.2.22:49189 version: TLS 1.2
Source: classification engine Classification label: clean0.winDOCX@4/90@2/3
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File created: C:\Users\user\Desktop\~$VID19open_closedPodsVACCINE_LETTER2B.docx Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File created: C:\Users\user\AppData\Local\Temp\CVRC6D7.tmp Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File read: C:\Users\desktop.ini Jump to behavior
Source: unknown Process created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
Source: unknown Process created: C:\Program Files\Internet Explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknown Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2420 CREDAT:275457 /prefetch:2
Source: C:\Program Files\Internet Explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2420 CREDAT:275457 /prefetch:2 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: COVID19open_closedPodsVACCINE_LETTER2B.docx Initial sample: OLE zip file path = docProps/custom.xml
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX Jump to behavior
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 353581 Sample: COVID19open_closedPodsVACCI... Startdate: 16/02/2021 Architecture: WINDOWS Score: 0 13 www.dhhs.state.nh.us 2->13 15 www.dhhs.nh.gov 2->15 6 iexplore.exe 8 41 2->6         started        8 WINWORD.EXE 293 27 2->8         started        process3 process4 10 iexplore.exe 2 87 6->10         started        dnsIp5 17 www.dhhs.state.nh.us 199.192.8.2, 443, 49167, 49168 STATE-OF-NH-USAUS United States 10->17 19 192.168.2.22, 443, 49167, 49168 unknown unknown 10->19 21 2 other IPs or domains 10->21
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Contacted Public IPs

IP Domain Country Flag ASN ASN Name Malicious
199.192.8.2
unknown United States
19713 STATE-OF-NH-USAUS false

Private

IP
192.168.2.22
192.168.2.255

Contacted Domains

Name IP Active
www.dhhs.state.nh.us 199.192.8.2 true
www.dhhs.nh.gov unknown unknown

Contacted URLs

Name Malicious Antivirus Detection Reputation
https://www.dhhs.nh.gov/ false
    high
    https://www.dhhs.nh.gov/foryou/teens.htm false
      high
      https://www.dhhs.nh.gov/about/index.htm false
        high
        https://www.nh.gov/covid19 false
          high
          https://www.dhhs.nh.gov/foryou/families.htm false
            high
            https://www.dhhs.nh.gov/foryou/women.htm false
              high
              https://www.dhhs.nh.gov/foryou/disabilities.htm false
                high
                https://www.dhhs.nh.gov/#translate false
                  high
                  https://www.dhhs.nh.gov/index.htm false
                    high
                    https://www.dhhs.nh.gov/foryou/adults.htm false
                      high
                      http://www.dhhs.nh.gov/ false
                        high
                        https://www.dhhs.nh.gov/#skip false
                          high
                          https://www.dhhs.nh.gov/foryou/seniors.htm false
                            high