Loading ...

Play interactive tourEdit tour

Analysis Report Covid-19 Payroll Tax Adjustment.docx

Overview

General Information

Sample Name:Covid-19 Payroll Tax Adjustment.docx
Analysis ID:392737
MD5:f78e1a17152954d2c56e3de7f889065f
SHA1:9ad2cffb62540c6ad60eee087c97cc756949adfd
SHA256:606e7c0165678adb36211ad727f8d128577a06584034ee39402b9a931f457b06
Infos:

Most interesting Screenshot:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains an external reference to another document
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)

Classification

Startup

  • System is w7x64
  • WINWORD.EXE (PID: 2436 cmdline: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding MD5: 95C38D04597050285A18F66039EDB456)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
Source: unknownHTTPS traffic detected: 18.211.24.111:443 -> 192.168.2.22:49167 version: TLS 1.2
Source: unknownHTTPS traffic detected: 18.211.24.111:443 -> 192.168.2.22:49168 version: TLS 1.2
Source: global trafficDNS query: name: admin.phishproof.com
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 18.211.24.111:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 18.211.24.111:443
Source: Joe Sandbox ViewIP Address: 18.211.24.111 18.211.24.111
Source: Joe Sandbox ViewASN Name: AMAZON-AESUS AMAZON-AESUS
Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{1BF840B3-025D-4403-9DBE-B492A11253DC}.tmpJump to behavior
Source: unknownDNS traffic detected: queries for: admin.phishproof.com
Source: E0968A1E3A40D2582E7FD463BAEB59CD0.0.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: 77EC63BDA74BD0D0E0426DC8F8008506.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: E0968A1E3A40D2582E7FD463BAEB59CD0.0.drString found in binary or memory: http://ocsp.comodoca.com0
Source: ~WRS{A70475F6-E366-40C3-B2E6-22C3DC55A9E1}.tmp.0.drString found in binary or memory: https://admin.phishproof.com/af-Dbh8nMk.png
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49168
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49171
Source: unknownNetwork traffic detected: HTTP traffic on port 49168 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49171 -> 443
Source: unknownHTTPS traffic detected: 18.211.24.111:443 -> 192.168.2.22:49167 version: TLS 1.2
Source: unknownHTTPS traffic detected: 18.211.24.111:443 -> 192.168.2.22:49168 version: TLS 1.2
Source: classification engineClassification label: mal48.evad.winDOCX@1/16@1/1
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$vid-19 Payroll Tax Adjustment.docxJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRC1A9.tmpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll

Persistence and Installation Behavior:

barindex
Contains an external reference to another documentShow sources
Source: document.xml.relsBinary or memory string: <Relationships xmlns="http://schemas.openxmlformats.org/package/2006/relationships"><Relationship Id="rId3" Type="http://schemas.openxmlformats.org/officeDocument/2006/relationships/webSettings" Target="webSettings.xml"/><Relationship Id="rId2" Type="http://schemas.openxmlformats.org/officeDocument/2006/relationships/settings" Target="settings.xml"/><Relationship Id="rId1" Type="http://schemas.openxmlformats.org/officeDocument/2006/relationships/styles" Target="styles.xml"/><Relationship Id="rId6" Type="http://schemas.openxmlformats.org/officeDocument/2006/relationships/theme" Target="theme/theme1.xml"/><Relationship Id="rId5" Type="http://schemas.openxmlformats.org/officeDocument/2006/relationships/fontTable" Target="fontTable.xml"/><Relationship Id="rId4" Type="http://schemas.openxmlformats.org/officeDocument/2006/relationships/image" Target="https://admin.phishproof.com/af-Dbh8nMk.png" TargetMode="External"/></Relationships>
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsExploitation for Client Execution3Path InterceptionPath InterceptionMasquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemorySystem Information Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferIngress Tool Transfer1SIM Card SwapCarrier Billing Fraud

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

No Antivirus matches

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

SourceDetectionScannerLabelLink
admin.phishproof.com0%VirustotalBrowse

URLs

SourceDetectionScannerLabelLink
https://admin.phishproof.com/af-Dbh8nMk.png0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
admin.phishproof.com
18.211.24.111
truetrueunknown

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
https://admin.phishproof.com/af-Dbh8nMk.png~WRS{A70475F6-E366-40C3-B2E6-22C3DC55A9E1}.tmp.0.drtrue
  • Avira URL Cloud: safe
unknown

Contacted IPs

  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Public

IPDomainCountryFlagASNASN NameMalicious
18.211.24.111
admin.phishproof.comUnited States
14618AMAZON-AESUStrue

General Information

Joe Sandbox Version:31.0.0 Emerald
Analysis ID:392737
Start date:19.04.2021
Start time:20:41:36
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 4m 50s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:Covid-19 Payroll Tax Adjustment.docx
Cookbook file name:defaultwindowsofficecookbook.jbs
Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
Number of analysed new started processes analysed:3
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal48.evad.winDOCX@1/16@1/1
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .docx
  • Found Word or Excel or PowerPoint or XPS Viewer
  • Attach to Office via COM
  • Scroll down
  • Close Viewer
Warnings:
Show All
  • Exclude process from analysis (whitelisted): dllhost.exe
  • TCP Packets have been reduced to 100
  • Excluded IPs from analysis (whitelisted): 91.199.212.52, 13.107.4.50
  • Excluded domains from analysis (whitelisted): au.au-msedge.net, crt.usertrust.com, audownload.windowsupdate.nsatc.net, ctldl.windowsupdate.com, c-0001.c-msedge.net, Edge-Prod-FRA.env.au.au-msedge.net, au.c-0001.c-msedge.net, elasticShed.au.au-msedge.net, au-bg-shim.trafficmanager.net, afdap.au.au-msedge.net
  • Report size getting too big, too many NtDeviceIoControlFile calls found.
  • Report size getting too big, too many NtQueryAttributesFile calls found.

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
18.211.24.111annualreport.xlsxGet hashmaliciousBrowse
    annualreport.xlsxGet hashmaliciousBrowse
      action_items.xlsmGet hashmaliciousBrowse
        action_items.xlsmGet hashmaliciousBrowse
          action_items.xlsmGet hashmaliciousBrowse

            Domains

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            admin.phishproof.comannualreport.xlsxGet hashmaliciousBrowse
            • 18.211.24.111
            annualreport.xlsxGet hashmaliciousBrowse
            • 18.211.24.111
            action_items.xlsmGet hashmaliciousBrowse
            • 18.211.24.111
            action_items.xlsmGet hashmaliciousBrowse
            • 18.211.24.111
            action_items.xlsmGet hashmaliciousBrowse
            • 18.211.24.111
            Love_you_201.docGet hashmaliciousBrowse
            • 18.233.242.165
            Love_you_201.docGet hashmaliciousBrowse
            • 18.233.242.165
            Love_you_201.docGet hashmaliciousBrowse
            • 18.233.242.165

            ASN

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            AMAZON-AESUSVoicePlayback (0195) for turnerrd pellamw .htmlGet hashmaliciousBrowse
            • 50.16.177.212
            Monday, April 19th, 2021, 20210419111136.68B7C9F20FAF4F3F@classactsautobody.com.htmGet hashmaliciousBrowse
            • 50.16.177.212
            SA-NQAW12n-NC9W03-pdf.exeGet hashmaliciousBrowse
            • 52.71.133.130
            bxJIU2nFC5.exeGet hashmaliciousBrowse
            • 54.243.121.36
            KoF2fbpF8X.exeGet hashmaliciousBrowse
            • 23.21.48.44
            RFQ.xlsxGet hashmaliciousBrowse
            • 52.5.157.71
            GE3hVNHtrK.exeGet hashmaliciousBrowse
            • 3.232.116.190
            preggo.apkGet hashmaliciousBrowse
            • 54.86.40.118
            preggo.apkGet hashmaliciousBrowse
            • 54.208.246.209
            q7uNNDJUI2.exeGet hashmaliciousBrowse
            • 23.23.85.1
            BQGxKexU78.exeGet hashmaliciousBrowse
            • 23.21.74.8
            oddMyFn53m.exeGet hashmaliciousBrowse
            • 54.225.155.255
            kBB0LJe6UO.exeGet hashmaliciousBrowse
            • 54.235.175.90
            078y61cSKy.exeGet hashmaliciousBrowse
            • 50.19.242.215
            svchost.exeGet hashmaliciousBrowse
            • 54.225.144.221
            Ficker.exeGet hashmaliciousBrowse
            • 54.225.222.160
            H7YgdxkWKW.exeGet hashmaliciousBrowse
            • 107.22.233.72
            JSChk2v3o9.exeGet hashmaliciousBrowse
            • 54.225.144.221
            K7is14GW1m.exeGet hashmaliciousBrowse
            • 54.235.83.248

            JA3 Fingerprints

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            7dcce5b76c8b17472d024758970a406bxEkyQl1Yn2.rtfGet hashmaliciousBrowse
            • 18.211.24.111
            catalog-1763942449.xlsmGet hashmaliciousBrowse
            • 18.211.24.111
            159789-04192021.xlsGet hashmaliciousBrowse
            • 18.211.24.111
            494328_04192021.xlsGet hashmaliciousBrowse
            • 18.211.24.111
            369290.xlsGet hashmaliciousBrowse
            • 18.211.24.111
            369290.xlsGet hashmaliciousBrowse
            • 18.211.24.111
            RFQ.xlsxGet hashmaliciousBrowse
            • 18.211.24.111
            catalog-232888535.xlsmGet hashmaliciousBrowse
            • 18.211.24.111
            Fox04-09-15-47-23.xlsxGet hashmaliciousBrowse
            • 18.211.24.111
            PO_31403.xlsxGet hashmaliciousBrowse
            • 18.211.24.111
            Arrival Notice 1.xlsxGet hashmaliciousBrowse
            • 18.211.24.111
            catalog-1180297109.xlsmGet hashmaliciousBrowse
            • 18.211.24.111
            IINVOICE AND CORRECT BANKING DETAILS FOR YOUR REFERENCE.xlsxGet hashmaliciousBrowse
            • 18.211.24.111
            APRemittanceAdvice.xlsxGet hashmaliciousBrowse
            • 18.211.24.111
            ChineseRussian_2.xlsxGet hashmaliciousBrowse
            • 18.211.24.111
            presupuesto.xlsxGet hashmaliciousBrowse
            • 18.211.24.111
            INVOICE AND CORRECT BANKING DETAILS FOR YOUR REFERENCE.xlsxGet hashmaliciousBrowse
            • 18.211.24.111
            a.docxGet hashmaliciousBrowse
            • 18.211.24.111
            catalog-1204608778.xlsmGet hashmaliciousBrowse
            • 18.211.24.111
            Order Confirmation_SA-NQAW12,NC9W03.xlsxGet hashmaliciousBrowse
            • 18.211.24.111

            Dropped Files

            No context

            Created / dropped Files

            C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:Microsoft Cabinet archive data, 58596 bytes, 1 file
            Category:dropped
            Size (bytes):58596
            Entropy (8bit):7.995478615012125
            Encrypted:true
            SSDEEP:1536:J7r25qSSheImS2zyCvg3nB/QPsBbgwYkGrLMQ:F2qSSwIm1m/QEBbgb1oQ
            MD5:61A03D15CF62612F50B74867090DBE79
            SHA1:15228F34067B4B107E917BEBAF17CC7C3C1280A8
            SHA-256:F9E23DC21553DAA34C6EB778CD262831E466CE794F4BEA48150E8D70D3E6AF6D
            SHA-512:5FECE89CCBBF994E4F1E3EF89A502F25A72F359D445C034682758D26F01D9F3AA20A43010B9A87F2687DA7BA201476922AA46D4906D442D56EB59B2B881259D3
            Malicious:false
            Reputation:high, very likely benign file
            Preview: MSCF............,...................I........T........bR. .authroot.stl...s~.4..CK..8T....c_.d....A.K......&.-.J...."Y...$E.KB..D...D.....3.n..u.............|..=H4..c&.......f.,..=..-....p2.:..`HX......b.......Di.a......M.....4.....i..}..:~N.<..>.*.V..CX......B......,.q.M.....HB..E~Q...)..Gax../..}7..f......O0...x..k..ha...y.K.0.h..(....{2Y.].g...yw..|0.+?.`-../.xvy..e......w.+^...w|.Q.k.9&.Q.EzS.f......>?w.G.......v.F......A......-P.$.Y...u....Z..g..>.0&.y.(..<.].`>... ..R.q...g.Y..s.y.B..B....Z.4.<?.R....1.8.<.=.8..[a.s.......add..).NtX....r....R.&W4.5]....k.._iK..xzW.w.M.>,5.}..}.tLX5Ls3_..).!..X.~...%.B.....YS9m.,.....BV`.Cee.....?......:.x-.q9j...Yps..W...1.A<.X.O....7.ei..a\.~=X....HN.#....h,....y...\.br.8.y"k).....~B..v....GR.g|.z..+.D8.m..F .h...*.........ItNs.\....s..,.f`D...]..k...:9..lk.<D....u...........[...*.wY.O....P?.U.l....Fc.ObLq......Fvk..G9.8..!..\T:K`.......'.3......;.u..h...uD..^.bS...r........j..j .=...s .FxV....g.c.s..9.
            C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0968A1E3A40D2582E7FD463BAEB59CD
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:data
            Category:dropped
            Size (bytes):1413
            Entropy (8bit):7.480496427934893
            Encrypted:false
            SSDEEP:24:yYvJm3RW857Ij3kTteTuQRFjGgZLE5XBy9+JYSE19rVAVsGnyI3SKB7:PL854TTuQL/ZoXQ9+mrGVrb3R
            MD5:285EC909C4AB0D2D57F5086B225799AA
            SHA1:D89E3BD43D5D909B47A18977AA9D5CE36CEE184C
            SHA-256:68B9C761219A5B1F0131784474665DB61BBDB109E00F05CA9F74244EE5F5F52B
            SHA-512:4CF305B95F94C7A9504C53C7F2DC8068E647A326D95976B7F4D80433B2284506FC5E3BB9A80A4E9A9889540BBF92908DD39EE4EB25F2566FE9AB37B4DC9A7C09
            Malicious:false
            Reputation:moderate, very likely benign file
            Preview: 0...0..i.......9rD:.".Q..l..15.0...*.H........0{1.0...U....GB1.0...U....Greater Manchester1.0...U....Salford1.0...U....Comodo CA Limited1!0...U....AAA Certificate Services0...190312000000Z..281231235959Z0..1.0...U....US1.0...U....New Jersey1.0...U....Jersey City1.0...U....The USERTRUST Network1.0,..U...%USERTrust RSA Certification Authority0.."0...*.H.............0..........e.6......W.v..'.L.P.a. M.-d.....=.........{7(.+G.9.:.._..}..cB.v.;+...o... ..>..t.....bd......j."<......{......Q..gF.Q..T?.3.~l......Q.5..f.rg.!f..x..P:.....L....5.WZ....=.,..T....:M.L..\... =.."4.~;hf.D..NFS.3`...S7.sC.2.S...tNi.k.`.......2..;Qx.g..=V...i....%&k3m.nG.sC.~..f.)|2.cU.....T0....}7..]:l5\.A...I......b..f.%....?.9......L.|.k..^...g.....[..L..[...s.#;-..5Ut.I.IX...6.Q...&}.M....C&.A_@.DD...W..P.WT.>.tc/.Pe..XB.C.L..%GY.....&FJP...x..g...W...c..b.._U..\.(..%9..+..L...?.R.../..........0..0...U.#..0......#>.....)...0..0...U......Sy.Z.+J.T.......f.0...U...........0...U.......0....0...U
            C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:data
            Category:dropped
            Size (bytes):326
            Entropy (8bit):3.116981173650867
            Encrypted:false
            SSDEEP:6:kKBcwTJ0N+SkQlPlEGYRMY9z+4KlDA3RUe0ht:5cwTJrkPlE99SNxAhUe0ht
            MD5:D2B4EF7A6D90C3C69AA1D3EB9C0B904B
            SHA1:2380579533EA63CD738EB72CF77E9DCA17773013
            SHA-256:2330AEA57BC61B62200381E07826FCF5DA353706DDCC025DBFFFF8C4357C448D
            SHA-512:0F63FF12DF1CA24EB02E6BDD6048D4E8D22DF0FAE525C73F18524E3F008BAF974547B80304077B78AC402B73FCABDBE363ACF8A921ECAF578DCF4DBFD45ADCE4
            Malicious:false
            Reputation:low
            Preview: p...... ..........v5.5..(....................................................... ...................$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.d.8.f.4.f.3.f.6.f.d.7.1.:.0."...
            C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0968A1E3A40D2582E7FD463BAEB59CD
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:data
            Category:dropped
            Size (bytes):250
            Entropy (8bit):2.9333015258354003
            Encrypted:false
            SSDEEP:3:kkFklNloQblXfllXlE/lQcjT18tlwiANjpU+plgh3VEkax3QbaLU15lqErtd9lyt:kK6IQAbjMulgokaWbLOW+n
            MD5:2B8FBBFB0FF5231B0D2F0FD6B1B35229
            SHA1:9531B9CCAEB59AC01D358AAD91EDCDA011776F3C
            SHA-256:B512A4C620916F6DF27976B8634F39C802CDB6C590A3A94C03A636F6B87B441E
            SHA-512:049F3D453FA465E598F11F3F00D05B15B78A13937278311AD7F9E00ED38B93A9D6760CB475967D1D1BE5F161DDD3F79C541975F5CCDBD0991C6A41C4C74FE2DC
            Malicious:false
            Reputation:low
            Preview: p...... ....h.....35.5..(....................................................... .........(.f...@8..................h.t.t.p.:././.c.r.t...u.s.e.r.t.r.u.s.t...c.o.m./.U.S.E.R.T.r.u.s.t.R.S.A.A.d.d.T.r.u.s.t.C.A...c.r.t...".5.c.8.6.f.6.8.0.-.5.8.5."...
            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\af-Dbh8nMk[1].png
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:PNG image data, 848 x 1184, 8-bit/color RGBA, non-interlaced
            Category:downloaded
            Size (bytes):719675
            Entropy (8bit):7.996898300210567
            Encrypted:true
            SSDEEP:12288:khSdZ8li0/LgtMVUv+NjBl0Q5x56AMIRJqNSrna5eoC9hgO6oWb/N8kJCXgsE/:kMdmVzQMOvSBl0Q536fGJa5RC9+O6eF4
            MD5:167730B067E677A65BAAA3E1C317392B
            SHA1:29ABFFFB01422F8CF9679ACCC4DF31891B79CE3E
            SHA-256:0023C3DA70CDE56DBBADAD0C6A872A90D025A38B3AC1E66BC48120A1478B9008
            SHA-512:928D6336F7911D9022576AF3F5196DEC9FF2FB1FD70C59ABF9E3603F09EE637E6D0322E7637A94CE0DA592D41AE041A499D30CBB8C5E82F0477426620C69AAE7
            Malicious:false
            Reputation:low
            IE Cache URL:https://admin.phishproof.com/af-Dbh8nMk.png
            Preview: .PNG........IHDR...P................KiCCPICC Profile..H..W.TSI.[RIh..H...R.K..E..*..I ...D....]D@].U.E...ZQ.(v.(......*.........3w......;..N.O*.Eu.....#BX.R.X.N@...9.-._.e..E.(.....u.(.+.J...._....|..8.3.r~.....K.RY>.D...../U.I...`..K.8K.K.8C.+U6....w.@..x.,.....U..<.7!v.....t....E<..........8d|../.!N./k..sQ.9T,...f........a..M$..W...v3gZ... .d..B...;.@e.1J.)"....)_.5.L.]...(.M!....Dk....p..p....|n.f.".<,A.Y#...;.3e..fn.O..?..Ibk.o...A..E...u...@....6.LyNB....).qb.md.xe.6...%.!j~lJ.,<^c/...-...1.\./J......T..A.,....y........a..KBI.&_.C......R...........bSyA.f............%...3.yc..... .p@(`..l.`.......K=..x@.....h4.3RT#..L.E.o..@>4/D5*..P.iH.~..L.h.jF.x.q.....B5K2.-.<...w..0.\.c...P...(.yY:...0b(1..Nt.M.@.....`..q..w0./..G.v...5B...Tq..|X`....59g|.3n.Y=..<..Cn.....|4....oO..h"Wf.-..r....;.+.....S......9.....R.1TW....9_UZ...o-.E.>.4v.;.....;.5c...J<....V..xU<9.G..?....r.z.n..|a.r...i.2q.(..;....G.`...........WL...a...+..C....../............_p/
            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\af-Dbh8nMk[1].png
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:PNG image data, 848 x 1184, 8-bit/color RGBA, non-interlaced
            Category:dropped
            Size (bytes):719675
            Entropy (8bit):7.996898300210567
            Encrypted:true
            SSDEEP:12288:khSdZ8li0/LgtMVUv+NjBl0Q5x56AMIRJqNSrna5eoC9hgO6oWb/N8kJCXgsE/:kMdmVzQMOvSBl0Q536fGJa5RC9+O6eF4
            MD5:167730B067E677A65BAAA3E1C317392B
            SHA1:29ABFFFB01422F8CF9679ACCC4DF31891B79CE3E
            SHA-256:0023C3DA70CDE56DBBADAD0C6A872A90D025A38B3AC1E66BC48120A1478B9008
            SHA-512:928D6336F7911D9022576AF3F5196DEC9FF2FB1FD70C59ABF9E3603F09EE637E6D0322E7637A94CE0DA592D41AE041A499D30CBB8C5E82F0477426620C69AAE7
            Malicious:false
            Reputation:low
            Preview: .PNG........IHDR...P................KiCCPICC Profile..H..W.TSI.[RIh..H...R.K..E..*..I ...D....]D@].U.E...ZQ.(v.(......*.........3w......;..N.O*.Eu.....#BX.R.X.N@...9.-._.e..E.(.....u.(.+.J...._....|..8.3.r~.....K.RY>.D...../U.I...`..K.8K.K.8C.+U6....w.@..x.,.....U..<.7!v.....t....E<..........8d|../.!N./k..sQ.9T,...f........a..M$..W...v3gZ... .d..B...;.@e.1J.)"....)_.5.L.]...(.M!....Dk....p..p....|n.f.".<,A.Y#...;.3e..fn.O..?..Ibk.o...A..E...u...@....6.LyNB....).qb.md.xe.6...%.!j~lJ.,<^c/...-...1.\./J......T..A.,....y........a..KBI.&_.C......R...........bSyA.f............%...3.yc..... .p@(`..l.`.......K=..x@.....h4.3RT#..L.E.o..@>4/D5*..P.iH.~..L.h.jF.x.q.....B5K2.-.<...w..0.\.c...P...(.yY:...0b(1..Nt.M.@.....`..q..w0./..G.v...5B...Tq..|X`....59g|.3n.Y=..<..Cn.....|4....oO..h"Wf.-..r....;.+.....S......9.....R.1TW....9_UZ...o-.E.>.4v.;.....;.5c...J<....V..xU<9.G..?....r.z.n..|a.r...i.2q.(..;....G.`...........WL...a...+..C....../............_p/
            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\102272C3.png
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:PNG image data, 848 x 1184, 8-bit/color RGBA, non-interlaced
            Category:dropped
            Size (bytes):719675
            Entropy (8bit):7.996898300210567
            Encrypted:true
            SSDEEP:12288:khSdZ8li0/LgtMVUv+NjBl0Q5x56AMIRJqNSrna5eoC9hgO6oWb/N8kJCXgsE/:kMdmVzQMOvSBl0Q536fGJa5RC9+O6eF4
            MD5:167730B067E677A65BAAA3E1C317392B
            SHA1:29ABFFFB01422F8CF9679ACCC4DF31891B79CE3E
            SHA-256:0023C3DA70CDE56DBBADAD0C6A872A90D025A38B3AC1E66BC48120A1478B9008
            SHA-512:928D6336F7911D9022576AF3F5196DEC9FF2FB1FD70C59ABF9E3603F09EE637E6D0322E7637A94CE0DA592D41AE041A499D30CBB8C5E82F0477426620C69AAE7
            Malicious:false
            Reputation:low
            Preview: .PNG........IHDR...P................KiCCPICC Profile..H..W.TSI.[RIh..H...R.K..E..*..I ...D....]D@].U.E...ZQ.(v.(......*.........3w......;..N.O*.Eu.....#BX.R.X.N@...9.-._.e..E.(.....u.(.+.J...._....|..8.3.r~.....K.RY>.D...../U.I...`..K.8K.K.8C.+U6....w.@..x.,.....U..<.7!v.....t....E<..........8d|../.!N./k..sQ.9T,...f........a..M$..W...v3gZ... .d..B...;.@e.1J.)"....)_.5.L.]...(.M!....Dk....p..p....|n.f.".<,A.Y#...;.3e..fn.O..?..Ibk.o...A..E...u...@....6.LyNB....).qb.md.xe.6...%.!j~lJ.,<^c/...-...1.\./J......T..A.,....y........a..KBI.&_.C......R...........bSyA.f............%...3.yc..... .p@(`..l.`.......K=..x@.....h4.3RT#..L.E.o..@>4/D5*..P.iH.~..L.h.jF.x.q.....B5K2.-.<...w..0.\.c...P...(.yY:...0b(1..Nt.M.@.....`..q..w0./..G.v...5B...Tq..|X`....59g|.3n.Y=..<..Cn.....|4....oO..h"Wf.-..r....;.+.....S......9.....R.1TW....9_UZ...o-.E.>.4v.;.....;.5c...J<....V..xU<9.G..?....r.z.n..|a.r...i.2q.(..;....G.`...........WL...a...+..C....../............_p/
            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{1BF840B3-025D-4403-9DBE-B492A11253DC}.tmp
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:data
            Category:dropped
            Size (bytes):1024
            Entropy (8bit):0.05390218305374581
            Encrypted:false
            SSDEEP:3:ol3lYdn:4Wn
            MD5:5D4D94EE7E06BBB0AF9584119797B23A
            SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
            SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
            SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
            Malicious:false
            Reputation:high, very likely benign file
            Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A70475F6-E366-40C3-B2E6-22C3DC55A9E1}.tmp
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:data
            Category:dropped
            Size (bytes):1024
            Entropy (8bit):1.2969066424008302
            Encrypted:false
            SSDEEP:3:glXMKYHlLlP8EP3+KZfolYxRknr2gt95w7ggE7ZSMl6ljtll5l/HZllNPThv51lJ:glXMKYjUbKvRknqgHuMZlwjHltq7ZUtp
            MD5:99BCB4A045A3CEE7CC68A8B6C228438E
            SHA1:B28A208799EA7AFCB1E9DFAB671D55F3C290E1FE
            SHA-256:A26D31E0D9186E67792B2D59108F4603646084D60FB6B80FDFF882812F75E66D
            SHA-512:78420EC8A3A41AEBFD814FE56E9F0DC986A2C8D413038D257FE409423C8B408260B378B317614EE2E94EE998C2F48603CE401088942E1318B303F1B4764FAD07
            Malicious:false
            Preview: .... . ...".h.t.t.p.s.:././.a.d.m.i.n...p.h.i.s.h.p.r.o.o.f...c.o.m./.a.f.-.D.b.h.8.n.M.k...p.n.g.". .\.*. .M.E.R.G.E.F.O.R.M.A.T. .\.d.I.N.C.L.U.D.E.P.I.C.T.U.R.E. .........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................hfT.....j.....hfT..U....j.
            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E42C9A4D-C73B-45F3-859A-E103BFD96442}.tmp
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:data
            Category:dropped
            Size (bytes):1536
            Entropy (8bit):0.19557280042116507
            Encrypted:false
            SSDEEP:3:lly/nnjM/n/lLClk:WjMvY+
            MD5:D3639E51845151C937FD5D3BBCF24993
            SHA1:40472D691864544B1B85BF33D7DD7B076DF1FF7B
            SHA-256:E95E1E45570B2FFB047C5D9CDBBCD054D00A42A6E27ECBD8B251F4F503C84918
            SHA-512:44CFC72178F39FED4C345F94D8F74DE3886E384BD2752B84A5911C73E2D2D522D2B030C45ACB3FA1212ECF56BF6D48BD42345B6997B7896B4ECBE14BEEFC9336
            Malicious:false
            Preview: ../.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            C:\Users\user\AppData\Local\Temp\CabCF8F.tmp
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:Microsoft Cabinet archive data, 58596 bytes, 1 file
            Category:dropped
            Size (bytes):58596
            Entropy (8bit):7.995478615012125
            Encrypted:true
            SSDEEP:1536:J7r25qSSheImS2zyCvg3nB/QPsBbgwYkGrLMQ:F2qSSwIm1m/QEBbgb1oQ
            MD5:61A03D15CF62612F50B74867090DBE79
            SHA1:15228F34067B4B107E917BEBAF17CC7C3C1280A8
            SHA-256:F9E23DC21553DAA34C6EB778CD262831E466CE794F4BEA48150E8D70D3E6AF6D
            SHA-512:5FECE89CCBBF994E4F1E3EF89A502F25A72F359D445C034682758D26F01D9F3AA20A43010B9A87F2687DA7BA201476922AA46D4906D442D56EB59B2B881259D3
            Malicious:false
            Preview: MSCF............,...................I........T........bR. .authroot.stl...s~.4..CK..8T....c_.d....A.K......&.-.J...."Y...$E.KB..D...D.....3.n..u.............|..=H4..c&.......f.,..=..-....p2.:..`HX......b.......Di.a......M.....4.....i..}..:~N.<..>.*.V..CX......B......,.q.M.....HB..E~Q...)..Gax../..}7..f......O0...x..k..ha...y.K.0.h..(....{2Y.].g...yw..|0.+?.`-../.xvy..e......w.+^...w|.Q.k.9&.Q.EzS.f......>?w.G.......v.F......A......-P.$.Y...u....Z..g..>.0&.y.(..<.].`>... ..R.q...g.Y..s.y.B..B....Z.4.<?.R....1.8.<.=.8..[a.s.......add..).NtX....r....R.&W4.5]....k.._iK..xzW.w.M.>,5.}..}.tLX5Ls3_..).!..X.~...%.B.....YS9m.,.....BV`.Cee.....?......:.x-.q9j...Yps..W...1.A<.X.O....7.ei..a\.~=X....HN.#....h,....y...\.br.8.y"k).....~B..v....GR.g|.z..+.D8.m..F .h...*.........ItNs.\....s..,.f`D...]..k...:9..lk.<D....u...........[...*.wY.O....P?.U.l....Fc.ObLq......Fvk..G9.8..!..\T:K`.......'.3......;.u..h...uD..^.bS...r........j..j .=...s .FxV....g.c.s..9.
            C:\Users\user\AppData\Local\Temp\TarCF9F.tmp
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:data
            Category:dropped
            Size (bytes):152788
            Entropy (8bit):6.309740459389463
            Encrypted:false
            SSDEEP:1536:TIz6c7xcjgCyrYBZ5pimp4Ydm6Caku2Dnsz0JD8reJgMnl3rlMGGv:TNqccCymfdmoku2DMykMnNGG0
            MD5:4E0487E929ADBBA279FD752E7FB9A5C4
            SHA1:2497E03F42D2CBB4F4989E87E541B5BB27643536
            SHA-256:AE781E4F9625949F7B8A9445B8901958ADECE7E3B95AF344E2FCB24FE989EEB7
            SHA-512:787CBC262570A4FA23FD9C2BA6DA7B0D17609C67C3FD568246F9BEF2A138FA4EBCE2D76D7FD06C3C342B11D6D9BCD875D88C3DC450AE41441B6085B2E5D48C5A
            Malicious:false
            Preview: 0..T...*.H.........T.0..T....1.0...`.H.e......0..D...+.....7.....D.0..D.0...+.....7..........|h....210303062855Z0...+......0..D.0..*.....`...@.,..0..0.r1...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o.f.t. .R.o.o.t. .A.u.t.h.o
            C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Covid-19 Payroll Tax Adjustment.LNK
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:16 2020, mtime=Wed Aug 26 14:08:16 2020, atime=Tue Apr 20 02:42:34 2021, length=10480, window=hide
            Category:dropped
            Size (bytes):2248
            Entropy (8bit):4.608603007241245
            Encrypted:false
            SSDEEP:48:8ZuW/XT0jFsL9I1YQh2ZuW/XT0jFsL9I1YQ/:8Zr/XojFCsYQh2Zr/XojFCsYQ/
            MD5:A4D482F324A3ECE0C901F5F6B7F7CDFF
            SHA1:60A79C75A0A271616E6BA263FBAA7A7B5AEB103A
            SHA-256:FBE284E82BE740F3780396CE35B2F048C8C0F18D85ABEA8C4D2E8F06F0D076B9
            SHA-512:E2EE10BF0A32D3FF549C96B3776F73493547F8C7F37E6CC68881588DD8001C45C99470B38BBD347EAA47E2986470E5281EC74C408D83FC73322D9B901BDACFAD
            Malicious:false
            Preview: L..................F.... ....(...{...(...{..<..2.5...(...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2..(...RR. .COVID-~1.DOC..v.......Q.y.Q.y*...8.....................C.o.v.i.d.-.1.9. .P.a.y.r.o.l.l. .T.a.x. .A.d.j.u.s.t.m.e.n.t...d.o.c.x.......................-...8...[............?J......C:\Users\..#...................\\562258\Users.user\Desktop\Covid-19 Payroll Tax Adjustment.docx.;.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.C.o.v.i.d.-.1.9. .P.a.y.r.o.l.l. .T.a.x. .A.d.j.u.s.t.m.e.n.t...d.o.c.x.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.
            C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):133
            Entropy (8bit):5.025364841875384
            Encrypted:false
            SSDEEP:3:HtoUc8RLo4RU+x+Uc8RLo4RUmxWtoUc8RLo4RUv:Ht35zRPJ5zRi35zR2
            MD5:1F471215981641DD8581692FE5F525D6
            SHA1:460F7521D2B66EA12562ACABAC72968A4481941A
            SHA-256:7B35DF2136C5CC51ECED3CB1D00D4EDAAE45207E521AC223CC5AB5AC790A1837
            SHA-512:FE959CDCCC822149011B53FF66605460106EDCD65BB14D0C20B755B39FA6AB60D891AAA2FC9DEFAFCCE3B2E59EDAB599B2D36A26B1BA269D9D9BC205F12D80A6
            Malicious:false
            Preview: [misc]..Covid-19 Payroll Tax Adjustment.LNK=0..Covid-19 Payroll Tax Adjustment.LNK=0..[misc]..Covid-19 Payroll Tax Adjustment.LNK=0..
            C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:data
            Category:dropped
            Size (bytes):162
            Entropy (8bit):2.431160061181642
            Encrypted:false
            SSDEEP:3:vrJlaCkWtVyokKOg5Gll3GwSKG/f2+1/ln:vdsCkWtW2IlID9l
            MD5:39EB3053A717C25AF84D576F6B2EBDD2
            SHA1:F6157079187E865C1BAADCC2014EF58440D449CA
            SHA-256:CD95C0EA3CEAEC724B510D6F8F43449B26DF97822F25BDA3316F5EAC3541E54A
            SHA-512:5AA3D344F90844D83477E94E0D0E0F3C96324D8C255C643D1A67FA2BB9EEBDF4F6A7447918F371844FCEDFCD6BBAAA4868FC022FDB666E62EB2D1BAB9028919C
            Malicious:false
            Preview: .user..................................................A.l.b.u.s.............p.........w...............w.............P.w..............w.....z.........w.....x...
            C:\Users\user\Desktop\~$vid-19 Payroll Tax Adjustment.docx
            Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            File Type:data
            Category:dropped
            Size (bytes):162
            Entropy (8bit):2.431160061181642
            Encrypted:false
            SSDEEP:3:vrJlaCkWtVyokKOg5Gll3GwSKG/f2+1/ln:vdsCkWtW2IlID9l
            MD5:39EB3053A717C25AF84D576F6B2EBDD2
            SHA1:F6157079187E865C1BAADCC2014EF58440D449CA
            SHA-256:CD95C0EA3CEAEC724B510D6F8F43449B26DF97822F25BDA3316F5EAC3541E54A
            SHA-512:5AA3D344F90844D83477E94E0D0E0F3C96324D8C255C643D1A67FA2BB9EEBDF4F6A7447918F371844FCEDFCD6BBAAA4868FC022FDB666E62EB2D1BAB9028919C
            Malicious:false
            Preview: .user..................................................A.l.b.u.s.............p.........w...............w.............P.w..............w.....z.........w.....x...

            Static File Info

            General

            File type:Zip archive data, at least v2.0 to extract
            Entropy (8bit):7.778256600131332
            TrID:
            • Word Microsoft Office Open XML Format document (49504/1) 49.01%
            • Word Microsoft Office Open XML Format document (43504/1) 43.07%
            • ZIP compressed archive (8000/1) 7.92%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
            File name:Covid-19 Payroll Tax Adjustment.docx
            File size:10480
            MD5:f78e1a17152954d2c56e3de7f889065f
            SHA1:9ad2cffb62540c6ad60eee087c97cc756949adfd
            SHA256:606e7c0165678adb36211ad727f8d128577a06584034ee39402b9a931f457b06
            SHA512:05089c96e04be77867cdadafc57a1a0a5f511ebbcae070237bd71302ed84ebb6f0051155ab8692d0ccc3eb639af4cfb58d58fd3f8cd74c08174b5168d0311073
            SSDEEP:192:77t5Z7p6Enlo2QOFipslkaCkMo2rIoVk0ipVH8Lad8NXPEhMHsQO:Vj7p6ElzQJA5yIoGVcLhJPqEnO
            File Content Preview:PK........4..R................docProps/PK........4..R.;q.............docProps/app.xml.S.n.!..W.?....Q.U.&..U9..%o.....QY@0..~}..x.Nz*.7.......K....l._..l.*.&4..V...v.ET..7....8b.7..'.I!b"..b..WbO..Rf......=..!u@....mk......'y9._K|!..6.q.....@.+..S.....YO.

            File Icon

            Icon Hash:e4e6a2a2a4b4b4a4

            Network Behavior

            Network Port Distribution

            TCP Packets

            TimestampSource PortDest PortSource IPDest IP
            Apr 19, 2021 20:42:25.961451054 CEST49167443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:26.088267088 CEST4434916718.211.24.111192.168.2.22
            Apr 19, 2021 20:42:26.088479042 CEST49167443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:26.099739075 CEST49167443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:26.275042057 CEST4434916718.211.24.111192.168.2.22
            Apr 19, 2021 20:42:26.275063038 CEST4434916718.211.24.111192.168.2.22
            Apr 19, 2021 20:42:26.275078058 CEST4434916718.211.24.111192.168.2.22
            Apr 19, 2021 20:42:26.275085926 CEST4434916718.211.24.111192.168.2.22
            Apr 19, 2021 20:42:26.275105000 CEST4434916718.211.24.111192.168.2.22
            Apr 19, 2021 20:42:26.275250912 CEST49167443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:26.518917084 CEST49167443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:26.687149048 CEST4434916718.211.24.111192.168.2.22
            Apr 19, 2021 20:42:26.687175035 CEST4434916718.211.24.111192.168.2.22
            Apr 19, 2021 20:42:26.687361956 CEST49167443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:26.687403917 CEST49167443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:26.688298941 CEST49167443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:26.690603018 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:26.814924955 CEST4434916718.211.24.111192.168.2.22
            Apr 19, 2021 20:42:26.817434072 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:26.817639112 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:26.818710089 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:26.993246078 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:26.993275881 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:26.993288994 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:26.993297100 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:26.993308067 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:26.993470907 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:27.250313997 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:27.414983034 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:27.415163994 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:28.784806967 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:28.973825932 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.068414927 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.068451881 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.068476915 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.068501949 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.068526030 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.068553925 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.068578005 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.068600893 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.068608999 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.068623066 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.068624020 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.068645954 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.068646908 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.068671942 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.068691015 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.068708897 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.068711042 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.068723917 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.068733931 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.068736076 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.068763018 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.068779945 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.070683956 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.195308924 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.195338964 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.195367098 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.195394039 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.195446014 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.195460081 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.195465088 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.195467949 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.195488930 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.195503950 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.195518017 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.195525885 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.195545912 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.195547104 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.195578098 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.195588112 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.195610046 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.195617914 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.195638895 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.195647001 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.195667982 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.195677996 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.195698023 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.195708990 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.195725918 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.195725918 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.195755005 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.195764065 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.195784092 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.195795059 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.195812941 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.195816994 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.195847034 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.195854902 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.195874929 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.195883989 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.195903063 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.195904016 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.195933104 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.195941925 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.195961952 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.195971012 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.195991039 CEST4434916818.211.24.111192.168.2.22
            Apr 19, 2021 20:42:29.196000099 CEST49168443192.168.2.2218.211.24.111
            Apr 19, 2021 20:42:29.196019888 CEST4434916818.211.24.111192.168.2.22

            UDP Packets

            TimestampSource PortDest PortSource IPDest IP
            Apr 19, 2021 20:42:25.887660980 CEST5219753192.168.2.228.8.8.8
            Apr 19, 2021 20:42:25.952151060 CEST53521978.8.8.8192.168.2.22
            Apr 19, 2021 20:42:27.745891094 CEST5309953192.168.2.228.8.8.8
            Apr 19, 2021 20:42:27.795069933 CEST53530998.8.8.8192.168.2.22
            Apr 19, 2021 20:42:27.800374985 CEST5283853192.168.2.228.8.8.8
            Apr 19, 2021 20:42:27.852098942 CEST53528388.8.8.8192.168.2.22
            Apr 19, 2021 20:42:28.172858953 CEST6120053192.168.2.228.8.8.8
            Apr 19, 2021 20:42:28.231372118 CEST53612008.8.8.8192.168.2.22
            Apr 19, 2021 20:42:28.239871025 CEST4954853192.168.2.228.8.8.8
            Apr 19, 2021 20:42:28.292913914 CEST53495488.8.8.8192.168.2.22

            DNS Queries

            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
            Apr 19, 2021 20:42:25.887660980 CEST192.168.2.228.8.8.80x15d4Standard query (0)admin.phishproof.comA (IP address)IN (0x0001)

            DNS Answers

            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
            Apr 19, 2021 20:42:25.952151060 CEST8.8.8.8192.168.2.220x15d4No error (0)admin.phishproof.com18.211.24.111A (IP address)IN (0x0001)

            HTTPS Packets

            TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
            Apr 19, 2021 20:42:26.275078058 CEST18.211.24.111443192.168.2.2249167CN=*.phishproof.com CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, ST=Greater Manchester, C=GBCN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, ST=Greater Manchester, C=GB CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USTue Apr 07 02:00:00 CEST 2020 Fri Nov 02 01:00:00 CET 2018Fri Apr 08 01:59:59 CEST 2022 Wed Jan 01 00:59:59 CET 2031771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
            CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, ST=Greater Manchester, C=GBCN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USFri Nov 02 01:00:00 CET 2018Wed Jan 01 00:59:59 CET 2031
            Apr 19, 2021 20:42:26.993288994 CEST18.211.24.111443192.168.2.2249168CN=*.phishproof.com CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, ST=Greater Manchester, C=GBCN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, ST=Greater Manchester, C=GB CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USTue Apr 07 02:00:00 CEST 2020 Fri Nov 02 01:00:00 CET 2018Fri Apr 08 01:59:59 CEST 2022 Wed Jan 01 00:59:59 CET 2031771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19,0-10-11-13-23-65281,23-24,07dcce5b76c8b17472d024758970a406b
            CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, ST=Greater Manchester, C=GBCN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USFri Nov 02 01:00:00 CET 2018Wed Jan 01 00:59:59 CET 2031

            Code Manipulations

            Statistics

            System Behavior

            General

            Start time:20:42:34
            Start date:19/04/2021
            Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            Wow64 process (32bit):false
            Commandline:'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
            Imagebase:0x13f0d0000
            File size:1424032 bytes
            MD5 hash:95C38D04597050285A18F66039EDB456
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Disassembly

            Reset < >