Loading ...

Play interactive tourEdit tour

Analysis Report 2021-02-18 Fivoor - Overleg - Kwartaaloverleg.docx

Overview

General Information

Sample Name:2021-02-18 Fivoor - Overleg - Kwartaaloverleg.docx
Analysis ID:358573
MD5:14b364f395dd53fa6b36d00e46c514da
SHA1:0b97138df21f05c020e43f2c882694bdc805c4a1
SHA256:1f39fb321c3902a9506b3f3529f5fdbf868053018099991d95e254596658bdfd
Infos:

Most interesting Screenshot:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains an external reference to another document
Potential document exploit detected (performs DNS queries)

Classification

Startup

  • System is w7x64
  • WINWORD.EXE (PID: 2300 cmdline: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding MD5: 95C38D04597050285A18F66039EDB456)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

Compliance:

barindex
Uses new MSVCR DllsShow sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
Source: global trafficDNS query: name: lemontree1.sharepoint.com
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{0E989C07-30AB-4901-9D2A-3CE504568F55}.tmpJump to behavior
Source: unknownDNS traffic detected: queries for: lemontree1.sharepoint.com
Source: classification engineClassification label: mal48.evad.winDOCX@1/12@1/0
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$21-02-18 Fivoor - Overleg - Kwartaaloverleg.docxJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRAF90.tmpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEAutomated click: OK
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: 2021-02-18 Fivoor - Overleg - Kwartaaloverleg.docxInitial sample: OLE zip file path = word/_rels/header1.xml.rels
Source: 2021-02-18 Fivoor - Overleg - Kwartaaloverleg.docxInitial sample: OLE zip file path = word/media/image3.jpeg
Source: 2021-02-18 Fivoor - Overleg - Kwartaaloverleg.docxInitial sample: OLE zip file path = word/_rels/settings.xml.rels
Source: 2021-02-18 Fivoor - Overleg - Kwartaaloverleg.docxInitial sample: OLE zip file path = customXml/itemProps4.xml
Source: 2021-02-18 Fivoor - Overleg - Kwartaaloverleg.docxInitial sample: OLE zip file path = customXml/item3.xml
Source: 2021-02-18 Fivoor - Overleg - Kwartaaloverleg.docxInitial sample: OLE zip file path = docProps/custom.xml
Source: 2021-02-18 Fivoor - Overleg - Kwartaaloverleg.docxInitial sample: OLE zip file path = customXml/item2.xml
Source: 2021-02-18 Fivoor - Overleg - Kwartaaloverleg.docxInitial sample: OLE zip file path = customXml/itemProps2.xml
Source: 2021-02-18 Fivoor - Overleg - Kwartaaloverleg.docxInitial sample: OLE zip file path = customXml/_rels/item2.xml.rels
Source: 2021-02-18 Fivoor - Overleg - Kwartaaloverleg.docxInitial sample: OLE zip file path = customXml/_rels/item3.xml.rels
Source: 2021-02-18 Fivoor - Overleg - Kwartaaloverleg.docxInitial sample: OLE zip file path = customXml/_rels/item4.xml.rels
Source: 2021-02-18 Fivoor - Overleg - Kwartaaloverleg.docxInitial sample: OLE zip file path = customXml/itemProps3.xml
Source: 2021-02-18 Fivoor - Overleg - Kwartaaloverleg.docxInitial sample: OLE zip file path = customXml/item4.xml
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll

Persistence and Installation Behavior:

barindex
Contains an external reference to another documentShow sources
Source: settings.xml.relsBinary or memory string: <Relationships xmlns="http://schemas.openxmlformats.org/package/2006/relationships"><Relationship Id="rId1" Type="http://schemas.openxmlformats.org/officeDocument/2006/relationships/attachedTemplate" Target="https://lemontree1.sharepoint.com/sites/Sjablonen/OfficeTemplates/Projectmanagement/Plan%20van%20aanpak%20Migratie_Klantnaam_Projectnaam_YYYYMMDD.dotx" TargetMode="External"/></Relationships>
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsExploitation for Client Execution1Path InterceptionPath InterceptionMasquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemorySystem Information Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

No Antivirus matches

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
lemontree1.sharepoint.com
unknown
unknowntrue
    unknown

    Contacted IPs

    No contacted IP infos

    General Information

    Joe Sandbox Version:31.0.0 Emerald
    Analysis ID:358573
    Start date:25.02.2021
    Start time:21:25:47
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 13m 23s
    Hypervisor based Inspection enabled:false
    Report type:light
    Sample file name:2021-02-18 Fivoor - Overleg - Kwartaaloverleg.docx
    Cookbook file name:defaultwindowsofficecookbook.jbs
    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
    Number of analysed new started processes analysed:3
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal48.evad.winDOCX@1/12@1/0
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Found application associated with file extension: .docx
    Warnings:
    Show All
    • Max analysis timeout: 720s exceeded, the analysis took too long
    • Exclude process from analysis (whitelisted): dllhost.exe
    • Excluded IPs from analysis (whitelisted): 13.107.136.9
    • Excluded domains from analysis (whitelisted): 187105-ipv4.farm.dprodmgd104.aa-rt.sharepoint.com.spo-0004.spo-msedge.net, 187105-ipv4e.farm.dprodmgd104.sharepointonline.com.akadns.net, spo-0004.spo-msedge.net

    Simulations

    Behavior and APIs

    No simulations

    Joe Sandbox View / Context

    IPs

    No context

    Domains

    No context

    ASN

    No context

    JA3 Fingerprints

    No context

    Dropped Files

    No context

    Created / dropped Files

    C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):144008
    Entropy (8bit):0.3080496359248853
    Encrypted:false
    SSDEEP:48:I30dOS+Wjbku5V5LHAAdwOINgMmr+15EfYse5EfYsENVlvu9N6Q:K0dxIu5V5LHFhINQE5+YT5+YNu9Nr
    MD5:70AE7747F4BB6601D0EE8C3583DDEDD3
    SHA1:91C2F874C04A96F4ECCB5E3B33771F472AD24B4E
    SHA-256:C50AD196079A517C76E15C4D925CF40A81E8A72FC4D09ABEB7E195D2AE0D147D
    SHA-512:78022D619C0843FFF720E1ECF630B5B44F728999920B99A0144D81B5A84BC627199116294BE4EE585CEB1FEDE6C310E31166D6D21FA661D06F3A7CCAF4A29AC5
    Malicious:false
    Reputation:low
    Preview: ......M.eFy...z.>x....D..O.....S,...X.F...Fa.q............................NM.H.-D..'{!............<..;,FJ...\.P5&....................................................................t...t...t...t................................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{5F669EE6-C8B8-44F5-8B10-98F08F0A9EC5}.FSD
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):156816
    Entropy (8bit):0.669043941854333
    Encrypted:false
    SSDEEP:96:Kb76nb8PzXx5rGY2YFWxooyiCmleYVMZDH4ukgVRAtVBah5VY:o+sHrGY2YFWbAeeYVwL4U
    MD5:3C7263677F683C11E1F341566365E53E
    SHA1:47BD38DFA0ED3AE3E8C894089BB3E4167306A869
    SHA-256:4B56C157036DE374927CEC1B5B3D1432BF7C1F6DCB1C5867A3634B8B804C0A13
    SHA-512:96E3447B20F91C1EA3CFD4C0A24C84AF4CA8B46DF95DCDDF7A4A3B8ECACB57867921A78C6F63603A59CBF431F77726C84D3A50E4D090657629D7C9FE664F1AB9
    Malicious:false
    Reputation:low
    Preview: ......M.eFy...z}|...?.D.A....Q.S,...X.F...Fa.q.............................^.S.=.A..f7_..>........{.v.3.C...O.......................................................................t...t...t...t.................................................................................................................................................................................................................................................................................................................................B....}.N3........{.v.3.C...O...................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSF
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):133
    Entropy (8bit):4.223841131000188
    Encrypted:false
    SSDEEP:3:yVlgQPDRlgsRlzUTlp56F2NUaHUPWGPnZVlsUjKCR7276:yPdPDDblz+H6w+4Un+iKCt22
    MD5:A6EF36AF0E8787D6607CB6ADC442056B
    SHA1:DAB024BC5EA889439C26CA25890787D8B8D8C95F
    SHA-256:47C02C07F87AFC922D4D8D752816C6E7A3D05F626948C7048E176C1532325E98
    SHA-512:87F83277AC0BA262B536BB1ED5F617E3D5360C0FDB7D3CCB258900055D4AA9C6E028096D58CF738817F3D20CA1B5FD3D2D568A8BA1B0A87D5CDDEA496511BD1B
    Malicious:false
    Reputation:low
    Preview: ..H..@....b..q.....H..@....b..q....]F.S.D.-.{.5.F.6.6.9.E.E.6.-.C.8.B.8.-.4.4.F.5.-.8.B.1.0.-.9.8.F.0.8.F.0.A.9.E.C.5.}...F.S.D..
    C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):144008
    Entropy (8bit):0.30790923530718
    Encrypted:false
    SSDEEP:48:I3Gg+O8gQBk+WFKLFXLGDAxseKQAXUC2rKQ2nGew1ZqMqJ6Z9l:KGJF+1MBXLGDQwUCun2nGzZ7i4
    MD5:04E5FAD03386D85FEEC8EA3C1245BD15
    SHA1:42296F87FA4A37DC68BB56D3EA73E32362455CEE
    SHA-256:DD8A499685A5CF861C1A95F757DD34BD8253EAED0833109341699B0735BF1521
    SHA-512:9D8042B68DC2FD472655BE7D57B95D0D051214665EBD8B7106ADE3D1B92CEB565B067D54943D4D651E4F6B77EE5EE27E913BAB5D07AE9D7955698989B02B1740
    Malicious:false
    Reputation:low
    Preview: ......M.eFy...z.M.ue..O.&.rpAlVS,...X.F...Fa.q.............................W...E....Y|.H...........C.K.....!.....................................................................t...t...t...t................................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{FDF085F0-5246-4600-A9C1-70EEFDDBBCBC}.FSD
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):149973
    Entropy (8bit):0.2788852730934534
    Encrypted:false
    SSDEEP:48:I3GwiuIQ0rEIWkA+a3G+1QEWEdgjDjzXBL9I3ic3ce+/qulwxlL:KALsInV8jjYgX26l
    MD5:F5345C64A539A78932700D70352711AB
    SHA1:0B69E6DBF80CD6BA8E25E88CD37D1297A6FD807B
    SHA-256:596DE4EF168C3CD99F904F75F3DF420A4F04BD77461C6775419929B4A09D4B53
    SHA-512:FAA1AFA6ACA5046A95201D9D6950A124AB188B1E1F8FC49F1901BD386466B93092FB32C0FC07628256EB87B4A99DD97AA241FA7C45660365EFF936E4E09FBB7E
    Malicious:false
    Reputation:low
    Preview: ......M.eFy...z.....k~H..d.1pFSS,...X.F...Fa.q............................w..@j..D...G.Hl(........RiUW..cD............................................................................t...t...t...t...........................................................................................................................................................................................................................................................................................................................k...X.9D...d.g}.........RiUW..cD........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):133
    Entropy (8bit):4.243803702669763
    Encrypted:false
    SSDEEP:3:yVlgQPDRlgsRlzlDnwxYildIlRTVSXlm0Igl7H3g276:yPdPDDblz6xYtlaXlm0d622
    MD5:05AEA6462C9EEE51624CB7C7FCEEE672
    SHA1:5D6BC718C4278F181DB4E6ED52A2DB925AED4DA4
    SHA-256:43A1BADA26FCDE2FB0F9173DAA0A45920BE139199C9EE2DF80682FBA81B2E318
    SHA-512:B732ED94D51C72E676BCB913D891763A5F42D18E8FD5E09ABAB168FA9394A483D5D8CCF72FB101980C8F508C6551B6763501E1813EEBF620A9953D52EA7213C2
    Malicious:false
    Reputation:low
    Preview: ..H..@....b..q.....H..@....b..q....]F.S.D.-.{.F.D.F.0.8.5.F.0.-.5.2.4.6.-.4.6.0.0.-.A.9.C.1.-.7.0.E.E.F.D.D.B.B.C.B.C.}...F.S.D..
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{0E989C07-30AB-4901-9D2A-3CE504568F55}.tmp
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):1024
    Entropy (8bit):0.05390218305374581
    Encrypted:false
    SSDEEP:3:ol3lYdn:4Wn
    MD5:5D4D94EE7E06BBB0AF9584119797B23A
    SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
    SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
    SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
    Malicious:false
    Reputation:high, very likely benign file
    Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\AppData\Local\Temp\msoB8E3.tmp
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:GIF image data, version 89a, 15 x 15
    Category:dropped
    Size (bytes):663
    Entropy (8bit):5.949125862393289
    Encrypted:false
    SSDEEP:12:PlrojAxh4bxdtT/CS3wkxWHMGBJg8E8gKVYQezuYEecp:trPsTTaWKbBCgVqSF
    MD5:ED3C1C40B68BA4F40DB15529D5443DEC
    SHA1:831AF99BB64A04617E0A42EA898756F9E0E0BCCA
    SHA-256:039FE79B74E6D3D561E32D4AF570E6CA70DB6BB3718395BE2BF278B9E601279A
    SHA-512:C7B765B9AFBB9810B6674DBC5C5064ED96A2682E78D5DFFAB384D81EDBC77D01E0004F230D4207F2B7D89CEE9008D79D5FBADC5CB486DA4BC43293B7AA878041
    Malicious:false
    Reputation:high, very likely benign file
    Preview: GIF89a....w..!..MSOFFICE9.0.....sRGB......!..MSOFFICE9.0.....msOPMSOFFICE9.0Dn&P3.!..MSOFFICE9.0.....cmPPJCmp0712.........!.......,....................'..;..b...RQ.xx..................,+................................yy..;..b.........................qp.bb..........uv.ZZ.LL.......xw.jj.NN.A@....zz.mm.^_.........yw........yx.xw.RR.,*.++............................................................................................................................................................................................................8....>.......................4567...=..../0123.....<9:.()*+,-.B.@...."#$%&'....... !............C.?....A;<...HT(..;
    C:\Users\user\AppData\Local\Temp\{2EA589A8-80DC-4151-A705-FB65CDDF635A}
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):137348
    Entropy (8bit):0.06007164106127675
    Encrypted:false
    SSDEEP:12:I3DPdnbz4fA3B6fv8pLjilHB2p1Pdnbnc1BA/ISQapwX9BC/7yPdnb1chvBA/TKp:I3pIfARLLjK2pnjcvXqwXDpchZp
    MD5:7586D65566475846B1AFC4D3CD5D35DA
    SHA1:BABBC3C4467BD0311EF6E78DEBC2024E864DB0E2
    SHA-256:FD350B8BEF1F495A8030D485632664E0ABF3E7F1543C6601660834D64A9AAE4F
    SHA-512:419B3D239811CBBC80B646E973F5DD52DEE85A1DA4B8A31297FB1F436030E237D7E99A405D630D79478B9F1EABB7B94C7F38F809BCFF4F5D176AD781D3CB4CDB
    Malicious:false
    Reputation:low
    Preview: ......M.eFy...z.>x....D..O.....S,...X.F...Fa.q..............................v...jI......`..........<..;,FJ...\.P5&....................................................................t...t...t...t............................................................................................................................................................................................................................................................................................................................[&....C.C.@/."..........<..;,FJ...\.P5&................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\AppData\Local\Temp\{68E33153-79B5-4476-8353-B4DAFDE9644D}
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):137348
    Entropy (8bit):0.05981920099903787
    Encrypted:false
    SSDEEP:12:I3DPid4Izfv8pX1Pid4a01uSQaprAQQj/7yPid4EiRKp:I3GbqX4o1uqslg+
    MD5:BFD5606DEAD7D749989F284F80C5EBA0
    SHA1:DAD0B7E10D4967383308B24B744E0E8F47DA8CA3
    SHA-256:A079FEB72AB3208C5579A07AF87470AA286D6C6CE529B3F60C432DC8EF415ED7
    SHA-512:F59BF56B774A56E0F2549ACA0FD0D5CFE81262E359EAD03DC6FED71FFC387F958CF553CBCB856278D4D9A206BB4B25EFFC56D0C6ECF30C016A9CB00FED4919C6
    Malicious:false
    Reputation:low
    Preview: ......M.eFy...z.M.ue..O.&.rpAlVS,...X.F...Fa.q............................7GGD..jH.y57.`.............C.K.....!.....................................................................t...t...t...t............................................................................................................................................................................................................................................................................................................................_...LAN..g..C.............C.K.....!.................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):162
    Entropy (8bit):2.431160061181642
    Encrypted:false
    SSDEEP:3:vrJlaCkWtVyokKOg5Gll3GwSKG/f2+1/ln:vdsCkWtW2IlID9l
    MD5:39EB3053A717C25AF84D576F6B2EBDD2
    SHA1:F6157079187E865C1BAADCC2014EF58440D449CA
    SHA-256:CD95C0EA3CEAEC724B510D6F8F43449B26DF97822F25BDA3316F5EAC3541E54A
    SHA-512:5AA3D344F90844D83477E94E0D0E0F3C96324D8C255C643D1A67FA2BB9EEBDF4F6A7447918F371844FCEDFCD6BBAAA4868FC022FDB666E62EB2D1BAB9028919C
    Malicious:false
    Reputation:high, very likely benign file
    Preview: .user..................................................A.l.b.u.s.............p.........w...............w.............P.w..............w.....z.........w.....x...
    C:\Users\user\Desktop\~$21-02-18 Fivoor - Overleg - Kwartaaloverleg.docx
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):162
    Entropy (8bit):2.431160061181642
    Encrypted:false
    SSDEEP:3:vrJlaCkWtVyokKOg5Gll3GwSKG/f2+1/ln:vdsCkWtW2IlID9l
    MD5:39EB3053A717C25AF84D576F6B2EBDD2
    SHA1:F6157079187E865C1BAADCC2014EF58440D449CA
    SHA-256:CD95C0EA3CEAEC724B510D6F8F43449B26DF97822F25BDA3316F5EAC3541E54A
    SHA-512:5AA3D344F90844D83477E94E0D0E0F3C96324D8C255C643D1A67FA2BB9EEBDF4F6A7447918F371844FCEDFCD6BBAAA4868FC022FDB666E62EB2D1BAB9028919C
    Malicious:false
    Reputation:high, very likely benign file
    Preview: .user..................................................A.l.b.u.s.............p.........w...............w.............P.w..............w.....z.........w.....x...

    Static File Info

    General

    File type:Microsoft Word 2007+
    Entropy (8bit):7.851441203844124
    TrID:
    • Word Microsoft Office Open XML Format document (49504/1) 49.01%
    • Word Microsoft Office Open XML Format document (43504/1) 43.07%
    • ZIP compressed archive (8000/1) 7.92%
    File name:2021-02-18 Fivoor - Overleg - Kwartaaloverleg.docx
    File size:182929
    MD5:14b364f395dd53fa6b36d00e46c514da
    SHA1:0b97138df21f05c020e43f2c882694bdc805c4a1
    SHA256:1f39fb321c3902a9506b3f3529f5fdbf868053018099991d95e254596658bdfd
    SHA512:f9cdc8f81305f9a89913aa8212ae935f0f2f86d367b426d3e6a5cfbddf4ca66cf1da5db958123e1986c24018a0447bb47a9adb829c66d101a58f3d894e63ffa5
    SSDEEP:3072:uNN8nVGbLDzApKPKlMT+F5edQjPGZdoL/C8GY64iUG0BaI66V5GPUPo:uFLfGKP+K+FUmjPGPo2zY6IVzbGB
    File Content Preview:PK..........!.........D.......[Content_Types].xml ...(.........................................................................................................................................................................................................

    File Icon

    Icon Hash:e4e6a2a2a4b4b4a4

    Network Behavior

    Network Port Distribution

    UDP Packets

    TimestampSource PortDest PortSource IPDest IP
    Feb 25, 2021 21:26:33.744185925 CET5219753192.168.2.228.8.8.8
    Feb 25, 2021 21:26:33.828950882 CET53521978.8.8.8192.168.2.22

    DNS Queries

    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
    Feb 25, 2021 21:26:33.744185925 CET192.168.2.228.8.8.80x6029Standard query (0)lemontree1.sharepoint.comA (IP address)IN (0x0001)

    DNS Answers

    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
    Feb 25, 2021 21:26:33.828950882 CET8.8.8.8192.168.2.220x6029No error (0)lemontree1.sharepoint.com222-ipv4e.clump.dprodmgd104.aa-rt.sharepoint.comCNAME (Canonical name)IN (0x0001)
    Feb 25, 2021 21:26:33.828950882 CET8.8.8.8192.168.2.220x6029No error (0)222-ipv4e.clump.dprodmgd104.aa-rt.sharepoint.com187105-ipv4e.farm.dprodmgd104.aa-rt.sharepoint.comCNAME (Canonical name)IN (0x0001)
    Feb 25, 2021 21:26:33.828950882 CET8.8.8.8192.168.2.220x6029No error (0)187105-ipv4e.farm.dprodmgd104.aa-rt.sharepoint.com187105-ipv4e.farm.dprodmgd104.sharepointonline.com.akadns.netCNAME (Canonical name)IN (0x0001)

    Code Manipulations

    Statistics

    System Behavior

    General

    Start time:21:26:29
    Start date:25/02/2021
    Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    Wow64 process (32bit):false
    Commandline:'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
    Imagebase:0x13fa40000
    File size:1424032 bytes
    MD5 hash:95C38D04597050285A18F66039EDB456
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Disassembly

    Reset < >