Loading ...

Play interactive tourEdit tour

Windows Analysis Report DOC0798.doc

Overview

General Information

Sample Name:DOC0798.doc
Analysis ID:435310
MD5:51a19560ad005f1dfaf49d959c2dbe7a
SHA1:660adab2960c1e726e610223e3032595f49f7e74
SHA256:00175c704e4d534a072f8d777bbb5413dfa32d51fd6b922e88e980c02357b0f1
Tags:doc
Infos:

Most interesting Screenshot:

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)

Classification

Analysis Advice

No malicious behavior found, analyze the document also on other version of Office / Acrobat
Uses HTTPS for network communication, use the 'Proxy HTTPS (port 443) to read its encrypted data' cookbook for further analysis

Process Tree

  • System is w7x64
  • WINWORD.EXE (PID: 2596 cmdline: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding MD5: 95C38D04597050285A18F66039EDB456)
  • EQNEDT32.EXE (PID: 2628 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • EQNEDT32.EXE (PID: 912 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: global trafficDNS query: name: femto.pw
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.165.215.31:443
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.165.215.31:443
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{6899A86A-6F93-4194-97B0-E6749671AC21}.tmpJump to behavior
Source: unknownDNS traffic detected: queries for: femto.pw
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49166
Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165
Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49166 -> 443
Source: classification engineClassification label: clean2.winDOC@3/6@2/1
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$OC0798.docJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRBC7B.tmpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
Source: DOC0798.docStatic file information: File size 1613819 > 1048576
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2616Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2616Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3060Thread sleep time: -120000s >= -30000sJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsExploitation for Client Execution3Path InterceptionProcess Injection1Masquerading1OS Credential DumpingVirtualization/Sandbox Evasion1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerSystem Information Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferIngress Tool Transfer1SIM Card SwapCarrier Billing Fraud

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 435310 Sample: DOC0798.doc Startdate: 16/06/2021 Architecture: WINDOWS Score: 2 4 EQNEDT32.EXE 9 2->4         started        7 WINWORD.EXE 336 20 2->7         started        9 EQNEDT32.EXE 2->9         started        dnsIp3 11 femto.pw 188.165.215.31, 443, 49165, 49166 OVHFR France 4->11

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

No Antivirus matches

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
femto.pw
188.165.215.31
truefalse
    unknown

    Contacted IPs

    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs

    Public

    IPDomainCountryFlagASNASN NameMalicious
    188.165.215.31
    femto.pwFrance
    16276OVHFRfalse

    General Information

    Joe Sandbox Version:32.0.0 Black Diamond
    Analysis ID:435310
    Start date:16.06.2021
    Start time:11:57:41
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 4m 22s
    Hypervisor based Inspection enabled:false
    Report type:full
    Sample file name:DOC0798.doc
    Cookbook file name:defaultwindowsofficecookbook.jbs
    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
    Number of analysed new started processes analysed:7
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:CLEAN
    Classification:clean2.winDOC@3/6@2/1
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • Found application associated with file extension: .doc
    • Found Word or Excel or PowerPoint or XPS Viewer
    • Attach to Office via COM
    • Active ActiveX Object
    • Scroll down
    • Close Viewer
    Warnings:
    Show All
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, svchost.exe
    • Report size getting too big, too many NtQueryAttributesFile calls found.

    Simulations

    Behavior and APIs

    TimeTypeDescription
    11:58:34API Interceptor246x Sleep call for process: EQNEDT32.EXE modified

    Joe Sandbox View / Context

    IPs

    No context

    Domains

    No context

    ASN

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    OVHFRjqJ9rVHXq0LCZ6R.exeGet hashmaliciousBrowse
    • 54.36.120.230
    SecuriteInfo.com.BackDoor.Rat.281.18292.exeGet hashmaliciousBrowse
    • 198.245.49.191
    RFQ Products.xlsxGet hashmaliciousBrowse
    • 167.114.158.9
    DocumentCopy_pdf.exeGet hashmaliciousBrowse
    • 213.186.33.5
    Proforma Invoice & Bank Swift Copy.exeGet hashmaliciousBrowse
    • 51.79.149.34
    Profoma Invoice1506021.exeGet hashmaliciousBrowse
    • 158.69.138.23
    kkaH2ZEdQ1.exeGet hashmaliciousBrowse
    • 213.186.33.5
    LDOsa1uqyb.exeGet hashmaliciousBrowse
    • 176.31.56.216
    Quotation.exeGet hashmaliciousBrowse
    • 192.99.208.14
    LSMD.exeGet hashmaliciousBrowse
    • 37.187.95.110
    IHdviiaZ7h.exeGet hashmaliciousBrowse
    • 51.195.61.169
    7#U1d05.htmlGet hashmaliciousBrowse
    • 51.89.21.20
    03soKqWLfN.exeGet hashmaliciousBrowse
    • 51.89.96.41
    bpkuoAqiIk.exeGet hashmaliciousBrowse
    • 176.31.95.228
    Wire_receipt.exeGet hashmaliciousBrowse
    • 5.135.115.129
    Shipping Doc578.exeGet hashmaliciousBrowse
    • 213.186.33.5
    URGENT REQUEST FOR QUOTATION (RFQ REF R2100131410).exeGet hashmaliciousBrowse
    • 51.91.236.193
    Reference No. # 3200025006.exeGet hashmaliciousBrowse
    • 213.186.33.5
    Cancellation_Letter_2137859823_06112021.xlsmGet hashmaliciousBrowse
    • 51.254.164.254
    Cancellation_Letter_2137859823_06112021.xlsmGet hashmaliciousBrowse
    • 51.254.164.254

    JA3 Fingerprints

    No context

    Dropped Files

    No context

    Created / dropped Files

    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{6899A86A-6F93-4194-97B0-E6749671AC21}.tmp
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):1024
    Entropy (8bit):0.05390218305374581
    Encrypted:false
    SSDEEP:3:ol3lYdn:4Wn
    MD5:5D4D94EE7E06BBB0AF9584119797B23A
    SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
    SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
    SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
    Malicious:false
    Reputation:high, very likely benign file
    Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E42C9A4D-C73B-45F3-859A-E103BFD96442}.tmp
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):1024
    Entropy (8bit):0.8014421130618178
    Encrypted:false
    SSDEEP:3:gl2lfgREqAWlglqlg7tlNl7lY2l/Dlll8v0lglwZbvt3UlglwZel8gl7vlI8:zNgREqAWlgFJMSDlll8vlwBZFwQFrB
    MD5:D70B341E158CD3F9AF4E8246EA1FB74B
    SHA1:E07659B1ABDC722BF44A78BF03342D86C1B2DDFE
    SHA-256:CEC933B996CAF6ABE607DD8E4E4F304D81C0B8D19F95151C67C5B670B7830639
    SHA-512:A6906A6FA406C73A4A98BA680A753FB7D572559B1F611C6EAF5E673F3C2981E78F5F04A0AB1B060496BFCDBC3DE2D595DDFCC01B155916105C2EF67100005A5F
    Malicious:false
    Reputation:low
    Preview: =......... .E.q.u.a.t.i.o.n...3.E.M.B.E.D...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................j....CJ..OJ..QJ..U..^J..aJ.. .j.etd...CJ..OJ..QJ..U..^J..aJ.
    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\DOC0798.LNK
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:15 2020, mtime=Wed Aug 26 14:08:15 2020, atime=Wed Jun 16 17:58:32 2021, length=1613819, window=hide
    Category:dropped
    Size (bytes):1994
    Entropy (8bit):4.534337781841879
    Encrypted:false
    SSDEEP:48:83T/XT0jFiHZ3FAo4Qh23T/XT0jFiHZ3FAo4Q/:83T/XojFIZqbQh23T/XojFIZqbQ/
    MD5:CA61F9522E5DA54B48B58DBDF25FDECE
    SHA1:7C57459FA07531DEBAE847109DD9BD9EA9B8C698
    SHA-256:7A1C9267069AA243179BD1EDAE3260321D9726A7F8AE8C698CEBB9B9F11A5C43
    SHA-512:3C250489EC60FA7996892B86FD0FFD7F725677A0B30929F77D772BFEE85752B88EB1C894ED6BAA9054CAF6BFC38E4F741F8944E66BBF19760B744D7C93A380AF
    Malicious:false
    Reputation:low
    Preview: L..................F.... .....q..{....q..{....Q..b...............................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....^.2......RQ. .DOC0798.doc.D.......Q.y.Q.y*...8.....................D.O.C.0.7.9.8...d.o.c.......u...............-...8...[............?J......C:\Users\..#...................\\571345\Users.user\Desktop\DOC0798.doc.".....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.D.O.C.0.7.9.8...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......571345..........D_....3N...W...9F.C...........[D_....3N...W...9F.C...........[....L..
    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):59
    Entropy (8bit):4.1702223972093195
    Encrypted:false
    SSDEEP:3:M18iSsd25d4sd2mX18iSsd2v:M+ocfqoI
    MD5:3C8E4AC54FF66878DC3446F616641670
    SHA1:FD8694B9B068C7CBE20128AF8398A92669E869AD
    SHA-256:1D9989644C7811E99A3B44DBB966432BFC35FDC656481E38001C0BF030F7F4BF
    SHA-512:2713B9AEFFDBC95FE7F55369AF848A67F13C0A37D547957BE15FE39D3F2E229149825C07F0BDA8159552D781D04B05B310A3BBFB708EABE2EBDC06B2E4C2928E
    Malicious:false
    Reputation:low
    Preview: [doc]..DOC0798.LNK=0..DOC0798.LNK=0..[doc]..DOC0798.LNK=0..
    C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):162
    Entropy (8bit):2.431160061181642
    Encrypted:false
    SSDEEP:3:vrJlaCkWtVysAiJNGlzgYGwg32LbO/ln:vdsCkWthASq+l
    MD5:4CDEC46BF4C5E1435E277CB4821D6306
    SHA1:506F3E77835A2AE504189833D4EF30799A0ACE45
    SHA-256:39A3F2156450758ACBBCB3D8E9461BB4CDD93F41A3EC3A4013F4EB8D2A906537
    SHA-512:7039ED1E181A8368526A65F6F0D2F70E5BCEBD37BB3BFD8E270BB305F405DB0D843B1CAF6E4E05F6CF1D203A8AA326A1316CDDDD085DD59DB15A82A26E6FA575
    Malicious:false
    Reputation:low
    Preview: .user..................................................A.l.b.u.s.............p.......................................P.....................z...............x...
    C:\Users\user\Desktop\~$OC0798.doc
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):162
    Entropy (8bit):2.431160061181642
    Encrypted:false
    SSDEEP:3:vrJlaCkWtVysAiJNGlzgYGwg32LbO/ln:vdsCkWthASq+l
    MD5:4CDEC46BF4C5E1435E277CB4821D6306
    SHA1:506F3E77835A2AE504189833D4EF30799A0ACE45
    SHA-256:39A3F2156450758ACBBCB3D8E9461BB4CDD93F41A3EC3A4013F4EB8D2A906537
    SHA-512:7039ED1E181A8368526A65F6F0D2F70E5BCEBD37BB3BFD8E270BB305F405DB0D843B1CAF6E4E05F6CF1D203A8AA326A1316CDDDD085DD59DB15A82A26E6FA575
    Malicious:false
    Reputation:low
    Preview: .user..................................................A.l.b.u.s.............p.......................................P.....................z...............x...

    Static File Info

    General

    File type:Rich Text Format data, unknown version
    Entropy (8bit):3.5119546202634186
    TrID:
    • Rich Text Format (5005/1) 55.56%
    • Rich Text Format (4004/1) 44.44%
    File name:DOC0798.doc
    File size:1613819
    MD5:51a19560ad005f1dfaf49d959c2dbe7a
    SHA1:660adab2960c1e726e610223e3032595f49f7e74
    SHA256:00175c704e4d534a072f8d777bbb5413dfa32d51fd6b922e88e980c02357b0f1
    SHA512:e27f5a1dfa095b4219f19866eca67fd4289ea0a72bb1b8c9532f48d204dab9d4c595efe9382a450633104204e88eb6ad43b8e2fce60ff8e323d16fda8921a576
    SSDEEP:12288:ZZ2nkYR5UxLEpyI28DpDwHVfsDpEq3EnCpug3P:akYR5UwyI9pg5Y2q38Cz/
    File Content Preview:{\rtf8561{\object\objautlink67039725\objw4045\objh7166{\*\objdata.3dbf9512020000000b0000004551556174696f6e2e33000000000000000000ab4f0c00037e01eb470a0105c02e5cec00000000000000000000000000000000000000000000000000500645000000000000000000000000000000000000000

    File Icon

    Icon Hash:e4eea2aaa4b4b4a4

    Static RTF Info

    Objects

    IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
    00000003Dh2embeddedEQUation.3806827no

    Network Behavior

    Network Port Distribution

    TCP Packets

    TimestampSource PortDest PortSource IPDest IP
    Jun 16, 2021 11:58:29.961730003 CEST49165443192.168.2.22188.165.215.31
    Jun 16, 2021 11:58:30.012902021 CEST44349165188.165.215.31192.168.2.22
    Jun 16, 2021 11:58:30.013073921 CEST49165443192.168.2.22188.165.215.31
    Jun 16, 2021 11:58:30.032118082 CEST49165443192.168.2.22188.165.215.31
    Jun 16, 2021 11:58:30.083199024 CEST44349165188.165.215.31192.168.2.22
    Jun 16, 2021 11:58:30.083319902 CEST44349165188.165.215.31192.168.2.22
    Jun 16, 2021 11:58:30.083395958 CEST44349165188.165.215.31192.168.2.22
    Jun 16, 2021 11:58:30.083420992 CEST49165443192.168.2.22188.165.215.31
    Jun 16, 2021 11:58:30.083467007 CEST49165443192.168.2.22188.165.215.31
    Jun 16, 2021 11:58:30.084131956 CEST49165443192.168.2.22188.165.215.31
    Jun 16, 2021 11:58:30.086270094 CEST49166443192.168.2.22188.165.215.31
    Jun 16, 2021 11:58:30.135154009 CEST44349165188.165.215.31192.168.2.22
    Jun 16, 2021 11:58:30.136940956 CEST44349166188.165.215.31192.168.2.22
    Jun 16, 2021 11:58:30.137073994 CEST49166443192.168.2.22188.165.215.31
    Jun 16, 2021 11:58:30.137543917 CEST49166443192.168.2.22188.165.215.31
    Jun 16, 2021 11:58:30.188447952 CEST44349166188.165.215.31192.168.2.22
    Jun 16, 2021 11:58:30.188546896 CEST44349166188.165.215.31192.168.2.22
    Jun 16, 2021 11:58:30.188582897 CEST44349166188.165.215.31192.168.2.22
    Jun 16, 2021 11:58:30.188602924 CEST49166443192.168.2.22188.165.215.31
    Jun 16, 2021 11:58:30.188640118 CEST49166443192.168.2.22188.165.215.31
    Jun 16, 2021 11:58:30.188926935 CEST49166443192.168.2.22188.165.215.31
    Jun 16, 2021 11:58:30.189764023 CEST49167443192.168.2.22188.165.215.31
    Jun 16, 2021 11:58:30.240381956 CEST44349166188.165.215.31192.168.2.22
    Jun 16, 2021 11:58:30.241820097 CEST44349167188.165.215.31192.168.2.22
    Jun 16, 2021 11:58:30.241894960 CEST49167443192.168.2.22188.165.215.31
    Jun 16, 2021 11:58:30.241991043 CEST49167443192.168.2.22188.165.215.31
    Jun 16, 2021 11:58:30.293006897 CEST44349167188.165.215.31192.168.2.22
    Jun 16, 2021 11:58:30.293068886 CEST49167443192.168.2.22188.165.215.31

    UDP Packets

    TimestampSource PortDest PortSource IPDest IP
    Jun 16, 2021 11:58:29.816647053 CEST5219753192.168.2.228.8.8.8
    Jun 16, 2021 11:58:29.882754087 CEST53521978.8.8.8192.168.2.22
    Jun 16, 2021 11:58:29.883074045 CEST5219753192.168.2.228.8.8.8
    Jun 16, 2021 11:58:29.945027113 CEST53521978.8.8.8192.168.2.22

    DNS Queries

    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
    Jun 16, 2021 11:58:29.816647053 CEST192.168.2.228.8.8.80x71ddStandard query (0)femto.pwA (IP address)IN (0x0001)
    Jun 16, 2021 11:58:29.883074045 CEST192.168.2.228.8.8.80x71ddStandard query (0)femto.pwA (IP address)IN (0x0001)

    DNS Answers

    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
    Jun 16, 2021 11:58:29.882754087 CEST8.8.8.8192.168.2.220x71ddNo error (0)femto.pw188.165.215.31A (IP address)IN (0x0001)
    Jun 16, 2021 11:58:29.945027113 CEST8.8.8.8192.168.2.220x71ddNo error (0)femto.pw188.165.215.31A (IP address)IN (0x0001)

    Code Manipulations

    Statistics

    CPU Usage

    Click to jump to process

    Memory Usage

    Click to jump to process

    High Level Behavior Distribution

    Click to dive into process behavior distribution

    Behavior

    Click to jump to process

    System Behavior

    General

    Start time:11:58:33
    Start date:16/06/2021
    Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    Wow64 process (32bit):false
    Commandline:'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
    Imagebase:0x13f320000
    File size:1424032 bytes
    MD5 hash:95C38D04597050285A18F66039EDB456
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    General

    Start time:11:58:34
    Start date:16/06/2021
    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    Wow64 process (32bit):true
    Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
    Imagebase:0x400000
    File size:543304 bytes
    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    General

    Start time:11:58:53
    Start date:16/06/2021
    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    Wow64 process (32bit):true
    Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
    Imagebase:0x400000
    File size:543304 bytes
    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Disassembly

    Reset < >