Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
20220531_180800.rtf

Overview

General Information

Sample Name:20220531_180800.rtf
Analysis ID:639039
MD5:7b9c8e08371550238fbcd7cee1c8087d
SHA1:ff8c9deb358b2d22aa086cf36406461e8e9978b2
SHA256:b93326f795459d836c277730058e9923ab5f9bfbcef32e1c951e4a0d7538f9f5
Infos:

Detection

Follina CVE-2022-30190
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Microsoft Office Exploit Follina CVE-2022-30190
Malicious sample detected (through community Yara rule)
Contains an external reference to another file
Detected suspicious Microsoft Office reference URL
Obfuscated document found, RTF is a DOCX
Yara signature match
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Uses insecure TLS / SSL version for HTTPS connection
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 1424 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
document.xml.relsSUSP_Doc_WordXMLRels_May22Detects a suspicious pattern in docx document.xml.rels file as seen in CVE-2022-30190Tobias Michalski, Christian Burkard, Wojciech Cie\305\233lak
  • 0x39:$a1: <Relationships
  • 0x3b9:$a2: TargetMode="External"
  • 0x3b1:$x1: .html!
document.xml.relsINDICATOR_OLE_RemoteTemplateDetects XML relations where an OLE object is refrencing an external target in dropper OOXML documentsditekSHen
  • 0x375:$olerel: relationships/oleObject
  • 0x38e:$target1: Target="http
  • 0x3b9:$mode: TargetMode="External
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapMAL_Msdt_MSProtocolURI_May22Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190Tobias Michalski, Christian Burkard
  • 0x2e2d:$re1: location.href = "ms-msdt:
sslproxydump.pcapJoeSecurity_FollinaYara detected Microsoft Office Exploit Follina / CVE-2022-30190Joe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2B293583.htmMAL_Msdt_MSProtocolURI_May22Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190Tobias Michalski, Christian Burkard
    • 0x113c:$re1: location.href = "ms-msdt:
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2B293583.htmJoeSecurity_FollinaYara detected Microsoft Office Exploit Follina / CVE-2022-30190Joe Security
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\th1s[1].htmMAL_Msdt_MSProtocolURI_May22Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190Tobias Michalski, Christian Burkard
      • 0x113c:$re1: location.href = "ms-msdt:
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\th1s[1].htmJoeSecurity_FollinaYara detected Microsoft Office Exploit Follina / CVE-2022-30190Joe Security
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A0472FED.htmMAL_Msdt_MSProtocolURI_May22Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190Tobias Michalski, Christian Burkard
        • 0x113c:$re1: location.href = "ms-msdt:
        Click to see the 1 entries
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        Exploits

        barindex
        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2B293583.htm, type: DROPPED
        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\th1s[1].htm, type: DROPPED
        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A0472FED.htm, type: DROPPED
        Source: document.xml.relsExtracted files from sample: https://cyberleague.co/th1s.html!
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49172 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49173 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49174 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49175 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49179 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49180 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49181 version: TLS 1.0
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49171 version: TLS 1.2
        Source: global trafficTCP traffic: 192.168.2.22:49171 -> 13.250.15.191:443
        Source: global trafficDNS query: name: cyberleague.co
        Source: global trafficTCP traffic: 192.168.2.22:49171 -> 13.250.15.191:443
        Source: global trafficHTTP traffic detected: GET /th1s.html HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: cyberleague.coConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /th1s.html HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: cyberleague.coIf-Modified-Since: Wed, 01 Jun 2022 14:36:34 GMTIf-None-Match: "13e4-5e063d0e1ca1e"Connection: Keep-Alive
        Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
        Source: Joe Sandbox ViewJA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
        Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49172 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49173 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49174 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49175 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49179 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49180 version: TLS 1.0
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49181 version: TLS 1.0
        Source: unknownNetwork traffic detected: HTTP traffic on port 49183 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49181 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49184
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49183
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49182
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49181
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49180
        Source: unknownNetwork traffic detected: HTTP traffic on port 49172 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49176 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49174 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49178 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49184 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49179
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49178
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49177
        Source: unknownNetwork traffic detected: HTTP traffic on port 49180 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49176
        Source: unknownNetwork traffic detected: HTTP traffic on port 49182 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49175
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49174
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49173
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49172
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49171
        Source: unknownNetwork traffic detected: HTTP traffic on port 49175 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49171 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49173 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49177 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49179 -> 443
        Source: ~WRF{529AA3F3-C7EA-493B-9EDD-4242ACBC44EE}.tmp.0.dr, ~WRS{3847A8D6-DBE6-42C6-982A-DFBC45D1EACD}.tmp.0.drString found in binary or memory: https://cyberleague.co/th1s.html
        Source: ~WRF{529AA3F3-C7EA-493B-9EDD-4242ACBC44EE}.tmp.0.drString found in binary or memory: https://cyberleague.co/th1s.htmlyX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{058B4FD5-0265-42FA-A9A3-3C51BC43AA1B}.tmpJump to behavior
        Source: unknownDNS traffic detected: queries for: cyberleague.co
        Source: global trafficHTTP traffic detected: GET /th1s.html HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: cyberleague.coConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /th1s.html HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: cyberleague.coIf-Modified-Since: Wed, 01 Jun 2022 14:36:34 GMTIf-None-Match: "13e4-5e063d0e1ca1e"Connection: Keep-Alive
        Source: unknownHTTPS traffic detected: 13.250.15.191:443 -> 192.168.2.22:49171 version: TLS 1.2

        System Summary

        barindex
        Source: document.xml.rels, type: SAMPLEMatched rule: Detects XML relations where an OLE object is refrencing an external target in dropper OOXML documents Author: ditekSHen
        Source: sslproxydump.pcap, type: PCAPMatched rule: MAL_Msdt_MSProtocolURI_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-05-31, hash = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
        Source: document.xml.rels, type: SAMPLEMatched rule: SUSP_Doc_WordXMLRels_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, Wojciech Cie\305\233lak, description = Detects a suspicious pattern in docx document.xml.rels file as seen in CVE-2022-30190, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-06-02, hash = 62f262d180a5a48f89be19369a8425bec596bc6a02ed23100424930791ae3df0
        Source: document.xml.rels, type: SAMPLEMatched rule: INDICATOR_OLE_RemoteTemplate author = ditekSHen, description = Detects XML relations where an OLE object is refrencing an external target in dropper OOXML documents
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2B293583.htm, type: DROPPEDMatched rule: MAL_Msdt_MSProtocolURI_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-05-31, hash = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\th1s[1].htm, type: DROPPEDMatched rule: MAL_Msdt_MSProtocolURI_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-05-31, hash = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A0472FED.htm, type: DROPPEDMatched rule: MAL_Msdt_MSProtocolURI_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-05-31, hash = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
        Source: ~WRF{529AA3F3-C7EA-493B-9EDD-4242ACBC44EE}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
        Source: 20220531_180800.LNK.0.drLNK file: ..\..\..\..\..\Desktop\20220531_180800.rtf
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$220531_180800.rtfJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR515A.tmpJump to behavior
        Source: classification engineClassification label: mal68.expl.evad.winRTF@1/20@15/1
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
        Source: ~WRF{529AA3F3-C7EA-493B-9EDD-4242ACBC44EE}.tmp.0.drInitial sample: OLE indicators vbamacros = False

        Data Obfuscation

        barindex
        Source: 20220531_180800.rtfInitial file: Document starts with PK

        Persistence and Installation Behavior

        barindex
        Source: document.xml.relsExtracted files from sample: https://cyberleague.co/th1s.html!
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts13
        Exploitation for Client Execution
        Path InterceptionPath Interception11
        Masquerading
        OS Credential Dumping1
        File and Directory Discovery
        Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
        Obfuscated Files or Information
        LSASS Memory2
        System Information Discovery
        Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
        Non-Application Layer Protocol
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration13
        Application Layer Protocol
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled Transfer2
        Ingress Tool Transfer
        SIM Card SwapCarrier Billing Fraud
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        https://cyberleague.co/th1s.htmlyX0%Avira URL Cloudsafe
        https://cyberleague.co/th1s.html0%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        cyberleague.co
        13.250.15.191
        truetrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          https://cyberleague.co/th1s.htmltrue
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://cyberleague.co/th1s.htmlyX~WRF{529AA3F3-C7EA-493B-9EDD-4242ACBC44EE}.tmp.0.drfalse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          13.250.15.191
          cyberleague.coUnited States
          16509AMAZON-02UStrue
          Joe Sandbox Version:35.0.0 Citrine
          Analysis ID:639039
          Start date and time: 03/06/202222:56:312022-06-03 22:56:31 +02:00
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 4m 52s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:20220531_180800.rtf
          Cookbook file name:defaultwindowsofficecookbook.jbs
          Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
          Number of analysed new started processes analysed:8
          Number of new started drivers analysed:1
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal68.expl.evad.winRTF@1/20@15/1
          EGA Information:Failed
          HDC Information:Failed
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Found application associated with file extension: .rtf
          • Adjust boot time
          • Enable AMSI
          • Found Word or Excel or PowerPoint or XPS Viewer
          • Attach to Office via COM
          • Scroll down
          • Close Viewer
          • Exclude process from analysis (whitelisted): mrxdav.sys, dllhost.exe, rundll32.exe
          • TCP Packets have been reduced to 100
          • Report size getting too big, too many NtCreateFile calls found.
          • Report size getting too big, too many NtQueryAttributesFile calls found.
          No simulations
          No context
          No context
          No context
          No context
          No context
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):131072
          Entropy (8bit):0.28805818698686764
          Encrypted:false
          SSDEEP:96:K80LHs15sXMfsKQYKg5EgkZ9SlxDZ9Slx1H:10ZQ5EgkgFgv
          MD5:0F53A328D727C7A8393CF8DB618D4D62
          SHA1:40630D0F9A6F68A29581FDA5E76576BF7AE71B7A
          SHA-256:A38F36CF8DA290265A3EBD5FFE647E624FC904C2B31B5D95A76A7DE879476C89
          SHA-512:31456776CEC78F653EEE9B95DC80322F4BD1183EE380F7766751ED271534AF4ECD987EBF91E5A61B17332D879AF642F01F0032E186B6FD02BA9656B38B2E43DE
          Malicious:false
          Reputation:low
          Preview:......M.eFy...zX1.U...E.......S,...X.F...Fa.q............................/..R..G@..'..jS~........%.k....I...-...Z.A...................................E...............................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@....p..G...s.q.Q9G..a`..qb.....p..G.........J..R.w.ps............................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):131072
          Entropy (8bit):0.6745994346547596
          Encrypted:false
          SSDEEP:96:KXpYCylKgE5XB6V+PAeAKoGR+EPRAriArrGRrDij8A7EAOiMrApMrA:94gEv9pIGNPR4i4UrDij8sEviMrmMr
          MD5:CE42E4E68F81AFD5140DEB010D3974D9
          SHA1:B28D3F230028716DE5868FCEB78FFD804CB64F20
          SHA-256:66046EDB9D30EE2110E19A0F6B13EB85BD3AD7C0E2F7A39DF5A243899C01B015
          SHA-512:562D29C5C5EADDDB09DA1CE689A793AE9177034D986291711AF6C51039EAE3C92B30626FE20645889C51D4FE8EFB73AF98163C0759BA5547E4AE31078252EBC7
          Malicious:false
          Reputation:low
          Preview:......M.eFy...z....H..N.].y....S,...X.F...Fa.q............................V......J.tZ.Y*.$........8...:..H.&I..F.d.S...................................W...............................x...x...x...x..*............................................................................................................................................................................................................................................................................................................................zV.......... ..@....p..G...s.q.Q9G..a`..qb.....p..G.....5.2A....................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):114
          Entropy (8bit):3.9333319485137532
          Encrypted:false
          SSDEEP:3:yVlgsRlz5nOlVilXKPIldOYRO+fzpWSR5l276:yPblz5nOlVilaIXOYRO+fzpWSt22
          MD5:DBA609DFDA4A5C85C8EE0FC4064E7EF1
          SHA1:5A08AFFB1250AEB5F1CABF76D4ACB41163B6EB21
          SHA-256:F63018A026B41D192965C2AF5B317D276F7A1752656DDC92553208C086C74918
          SHA-512:FB4531A2D4B2017E3F1C11584782A8F981C8C4858AAAFC8612275B5B707EFB6103CA48D63B73F13FCA5396BC4F419E69B4CC42E7478C5FBBF86C6B213D55FABD
          Malicious:false
          Reputation:low
          Preview:..H..@....b..q....]F.S.D.-.{.D.0.7.E.1.3.1.7.-.E.2.1.0.-.4.5.1.E.-.9.0.6.F.-.B.4.7.A.5.E.9.E.2.F.7.2.}...F.S.D..
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):131072
          Entropy (8bit):0.28681787155888283
          Encrypted:false
          SSDEEP:96:KoLGWkpIdVgNhBNHiN34xoByqVTh/JydVN0Quw+nYwVQXj7zVQuw+nYwVQXj7z6H:juAWZi/kqm8d78dv
          MD5:ABA9368EAF1B4D977D05230FA0AA98A3
          SHA1:30B33313B742BF2D6FF18C5F94A968BEA72AC1DF
          SHA-256:19E5D7038C725D60565FD1555F8327660BC49A35D2FBC98DDE8590919C9BCEB8
          SHA-512:F4C1954A2F70D90DAC1726915FC4D3AF07D6F8FF349ED7B6FF507DDDA1BEB26BFC47A473482D78CDBB0B9CD605E383EF7C918F1D094D2029420619247201D0B3
          Malicious:false
          Reputation:low
          Preview:......M.eFy...z......F....Qk..S,...X.F...Fa.q.............................L5G...L..tf).............F...H.4.....m.A...................................E...............................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@....p..G...s.q.Q9G..a`..qb.....p..G.........J..R.w.ps............................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):131072
          Entropy (8bit):0.22146428280828123
          Encrypted:false
          SSDEEP:24:I3ev8LwnM0B34FlvHIJKqubKuXCZx6GSeWPOOVRb5XJr8IZxfpA5j36QIHu/w2fG:I3rUrB+vHyZMNdtfxxAUBiRiZ
          MD5:234B22C34D8E43311793320B0BA6E463
          SHA1:217801EE5CA96B065D4F1282983487272AB7D89A
          SHA-256:E59D9F9EBEDDF1697EC9B434F7D23C9EF4ACC4DB61E0B4942C28D2DADC0FDD87
          SHA-512:826B4DFF773E1F94E66847407EE1877E164C3C5C260CE5664B048B23F4C0190F91E5DEFBF7382138EDE9659434361790AC74B1C8D82A6556CC65B4674F07DFB4
          Malicious:false
          Reputation:low
          Preview:......M.eFy...z.8..U..F.......S,...X.F...Fa.q............................%....A9D..$.?...........z...FqF..^..\\.P>..................................PB...............................x...x...x...x..........+....................................................................................................................................................................................................................................................................................................................zV.......... ..@....p..G...s.q.Q9G..a`..qb.....p..G...|.u-.u.A...W"U.............................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):114
          Entropy (8bit):3.9560520403188666
          Encrypted:false
          SSDEEP:3:yVlgsRlz1ylJ19X1vWSw/+9snKhmf276:yPblz125XdWSy+anKk22
          MD5:921A52A43CA18F34DA0D4E2EC1EB1864
          SHA1:386EAAD70D06862C0124558FB2D109A0048307D6
          SHA-256:4FEBAE4D1D78D716F73088AA1BE00524C09E132F293AE4F371C47CC29E38C51D
          SHA-512:1E7826AC83669F7411DA3E232695C8D85EEF466E8404893B5741C0A5E8D0D9C4CC26912E81F74A4DB9FAB01E2588A2BBB6D6414638D8DBE05543D81FF78FCC8C
          Malicious:false
          Reputation:low
          Preview:..H..@....b..q....]F.S.D.-.{.2.B.A.6.A.7.2.5.-.A.C.2.6.-.4.B.E.3.-.9.6.A.9.-.7.A.B.2.1.8.E.E.9.A.3.D.}...F.S.D..
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
          Category:downloaded
          Size (bytes):5092
          Entropy (8bit):1.5689266993578892
          Encrypted:false
          SSDEEP:12:hPlf7fguuuuuuuuuuuuuuuuuuuuuuuuuuuuuuyxH8d2GZfgGwf80K2GUJU6+LtSm:hP12dlRg7nfG/bLtF0ooS34BM3
          MD5:DA03F3022C8E3A07A6F196216B29135E
          SHA1:1F12DE0F50FF34CDB1C1BD99BCA553F7192FA416
          SHA-256:87E5A464DE2F85A500F1B8D1028F5742F0903D9C0C3387DC572AAC8CF9027BCC
          SHA-512:9E039948E2706E864656E1EE2D1CC659F60DC24A5964D220DA4409CCDC7815197F6E3636EC5CA43915BE70DA0A88888BE55B3EAA1F1AC828265D771145EF495E
          Malicious:true
          Yara Hits:
          • Rule: MAL_Msdt_MSProtocolURI_May22, Description: Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\th1s[1].htm, Author: Tobias Michalski, Christian Burkard
          • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\th1s[1].htm, Author: Joe Security
          Reputation:low
          IE Cache URL:https://cyberleague.co/th1s.html
          Preview:<!DOCTYPE html>..<html>..<body>.. <script>.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
          Category:dropped
          Size (bytes):5092
          Entropy (8bit):1.5689266993578892
          Encrypted:false
          SSDEEP:12:hPlf7fguuuuuuuuuuuuuuuuuuuuuuuuuuuuuuyxH8d2GZfgGwf80K2GUJU6+LtSm:hP12dlRg7nfG/bLtF0ooS34BM3
          MD5:DA03F3022C8E3A07A6F196216B29135E
          SHA1:1F12DE0F50FF34CDB1C1BD99BCA553F7192FA416
          SHA-256:87E5A464DE2F85A500F1B8D1028F5742F0903D9C0C3387DC572AAC8CF9027BCC
          SHA-512:9E039948E2706E864656E1EE2D1CC659F60DC24A5964D220DA4409CCDC7815197F6E3636EC5CA43915BE70DA0A88888BE55B3EAA1F1AC828265D771145EF495E
          Malicious:true
          Yara Hits:
          • Rule: MAL_Msdt_MSProtocolURI_May22, Description: Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2B293583.htm, Author: Tobias Michalski, Christian Burkard
          • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2B293583.htm, Author: Joe Security
          Reputation:low
          Preview:<!DOCTYPE html>..<html>..<body>.. <script>.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
          Category:dropped
          Size (bytes):4980
          Entropy (8bit):3.8087894377622136
          Encrypted:false
          SSDEEP:48:cqZDMN7gsdBgLfVTped//HksYHGui3DAjG6kpJoApdHk/O:cqi7lBSTped//qH3i3DAqXLE/O
          MD5:5B29927367C1C2BEBE25499E5602DE05
          SHA1:10EB42142920A3299851F183D624731B910C6FCE
          SHA-256:820E5CFE32DD64E31AEE40837BC3730B1B0F810787A7D3AAFC700191E6551C68
          SHA-512:CD1E48056BDCBDD8CE2C0B7C8E15CA645D26FF372CA68D20D6B3078580943D4D5FA68FEE84A0C1AAC86F275ACE0059A3F76C2AF402EEC918C6680549BAB2C2EC
          Malicious:false
          Reputation:low
          Preview:....l.............../................... EMF....t.......................p....... ...O................5..............................4...5...R...p...................................S.e.g.o.e. .U.I.................................................................................................................................................................................................................................................................................................................dv......%...................................r...............)............... ... ..................?...........?................l...4........... ... ...(... ... ..... .............................................................................................................................................................................................................................................................................................................................................
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
          Category:dropped
          Size (bytes):5092
          Entropy (8bit):1.5689266993578892
          Encrypted:false
          SSDEEP:12:hPlf7fguuuuuuuuuuuuuuuuuuuuuuuuuuuuuuyxH8d2GZfgGwf80K2GUJU6+LtSm:hP12dlRg7nfG/bLtF0ooS34BM3
          MD5:DA03F3022C8E3A07A6F196216B29135E
          SHA1:1F12DE0F50FF34CDB1C1BD99BCA553F7192FA416
          SHA-256:87E5A464DE2F85A500F1B8D1028F5742F0903D9C0C3387DC572AAC8CF9027BCC
          SHA-512:9E039948E2706E864656E1EE2D1CC659F60DC24A5964D220DA4409CCDC7815197F6E3636EC5CA43915BE70DA0A88888BE55B3EAA1F1AC828265D771145EF495E
          Malicious:true
          Yara Hits:
          • Rule: MAL_Msdt_MSProtocolURI_May22, Description: Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A0472FED.htm, Author: Tobias Michalski, Christian Burkard
          • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A0472FED.htm, Author: Joe Security
          Reputation:low
          Preview:<!DOCTYPE html>..<html>..<body>.. <script>.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.. //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=0], progressive, precision 8, 750x500, frames 3
          Category:dropped
          Size (bytes):91933
          Entropy (8bit):7.9892937833237845
          Encrypted:false
          SSDEEP:1536:7JCBhGCgBEFzvY1kH0R1ngxcrXo3N0rKL1nvFhbbrC3PJ4+6JaZB5:UBkCgBEZPml3rY3NBpvFRbAhOJi5
          MD5:A53C5995856D35B0097F80E38D258D33
          SHA1:31099B09DCCAC8C4A1BAA7E1F1B14E6C80FC516F
          SHA-256:E87E50F77EEC96A1F0E37FCA345001474B3A023EAABC8DBE6FB1989DCFCDA543
          SHA-512:92C0748B624D9C2C8941C7720EF34C7EF7793589C19517FA4AAAF40C5BE3DCDE3F7C601D1D2B142AED5EFA92E50E5B449B2A61AAB96D22FBBF2B2C9F0EEFA1F6
          Malicious:false
          Reputation:low
          Preview:......Exif..MM.*.............C....................................................................C............................................................................".................................................................................*....4.`B.,}...3..x....:..wx.2...G.8...Z...;a..Tv..a..du"..`...Z...Y..1....s.i.c<.7....Dj...V..}y.r.:.....1z.D...sg.;.c..S`1..\9.u%...X..nDC.L.Z..-..D=..29......1:....DN..l+..P.m.U.LY=.c...-....O....._w.Mj.v.A.;..v::.`l..C.......l.)....}q..D .h.h.9.U.[...(l.Da....^...c3~Y..c.#.7HC3{....PK.n.<"..L..S.^=..D..vL....<:.(....;..J..9...V...r.I........(/H...x..j]e...;.g.........t!.H.\b[.........{...bR...x..Q.Q..}..eW.GD..........]M...Xk"#.G...x..t...mZ.-M...v)SJ.w.c...1.Jl.&2y..om.$..%..i:u1...1.{{....FIN...N8...=.)...8.7a!.lJ...h.U....6j.D~.....8._Hr.bY>M.a..z............m.+..wc."A.>..q.....?=..m.....n.CR\R.Vc.=..s...H.. ......+F..F.j.j..I.....9I.<.:{.#;...mc.gF5Ga.2gB..g..&..'...`..6..s...!..u
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:Composite Document File V2 Document, Cannot read section info
          Category:dropped
          Size (bytes):4096
          Entropy (8bit):1.8698058088064178
          Encrypted:false
          SSDEEP:12:rl3bn+qFYsRY3ao92p0hCFySD5lzHSB2TTCt0aNB2TFn7iVjOFyS4CIFyS4FyS4U:rYdIp08B02UL2pigEiWBF4
          MD5:250374534DAFD474CE245E6A5281B3A9
          SHA1:8D3C4BD81822054D6811F54B16EE750903032071
          SHA-256:C142D359182AFDC3B726ADFD4E25161734D3D201027DD7B16C9632C05511D9F1
          SHA-512:E63C7F88A48269F2573FB300D1E2EDB88B2DEB97CE0A908C49579EDDD50F72BA3906DC1BB492BFF93B0B0C72CDE4D7A30BD60CCE1F4AB28CD920798D7E212AFA
          Malicious:false
          Reputation:low
          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):1024
          Entropy (8bit):0.05390218305374581
          Encrypted:false
          SSDEEP:3:ol3lYdn:4Wn
          MD5:5D4D94EE7E06BBB0AF9584119797B23A
          SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
          SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
          SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
          Malicious:false
          Reputation:high, very likely benign file
          Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):1536
          Entropy (8bit):1.3186956359584476
          Encrypted:false
          SSDEEP:6:W4ofylIcElClbYS7plQalvbK/SterHr4PxZUttrasD3Salx3d4XsDialL1:9oal7MClc2HK/rLGZmra4zlb4XelJ
          MD5:969565D4524D45ACD7910BFECB14B97D
          SHA1:272B72B769BB8DB11CF5E3B9D13AE3512B71B890
          SHA-256:2380C8F197156562ED8C5024E8E7F361862FC307D5CF6B6F5EC417B8DA0093B4
          SHA-512:58C7DC7E487BE8135461A125061D10289F0D81E804EDC8B57CDC9CDD5157FEE9FF14EE104CE7450BFE3708EF0DC930EF30906F4B8570092AEE4A5F79FFEB76BD
          Malicious:false
          Preview:..M.O.T.D.............L.I.N.K. .P.a.c.k.a.g.e. .".h.t.t.p.s.:././.c.y.b.e.r.l.e.a.g.u.e...c.o./.t.h.1.s...h.t.m.l.!.". .".". .\.b..... . ...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):131072
          Entropy (8bit):0.0256287320096627
          Encrypted:false
          SSDEEP:6:I3DPcfObYvxggLRHF1NNSapRXv//4tfnRujlw//+GtluJ/eRuj:I3DPJbOr7PFHvYg3J/
          MD5:0F8D76FDBEDB717807CA629B7BFECABE
          SHA1:171373F8A5B5A47539DBD5CCE33C58CA2BD66EDD
          SHA-256:C1D337465844316985A4631572BEB8DE266EFBD2CD9A35AA991E24AFAB233FBF
          SHA-512:8473B7DC81543F660D7E1FD57CB9D215E62F8C4BDA3F1744DFA53C4AFDED4C9B1014F8E7AC298B33484103CCB3DB6077424D38018B106C33EB97EAE8E9FA165D
          Malicious:false
          Preview:......M.eFy...zX1.U...E.......S,...X.F...Fa.q.................................`.C...H..A.........%.k....I...-...Z.....................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):131072
          Entropy (8bit):0.025609728427755104
          Encrypted:false
          SSDEEP:6:I3DPciIeBvxggLR21MtiX/t0tE3RXv//4tfnRujlw//+GtluJ/eRuj:I3DPrBPtivmtERvYg3J/
          MD5:560D6C31C54209C7E805EAC5ADA0DBB4
          SHA1:A4CAB559CB8FC78B59DE7F225BC5406257794615
          SHA-256:3B3232E7A76CD10AC33A42A30D2447BB78FA2AC693B94687A6F644BFB03D98E6
          SHA-512:0372D772A5DAE29AFEF459599119D6568BE5A2B690D9689F71B7FC84317503E3F4B4A3B785641683F754A3D22194020736D7B5AEA86F1819AD2235863AE8B5F8
          Malicious:false
          Preview:......M.eFy...z......F....Qk..S,...X.F...Fa.q..............................zKwG/K.9..`j.............F...H.4.....m.....................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:51 2022, mtime=Tue Mar 8 15:45:51 2022, atime=Sat Jun 4 04:58:10 2022, length=199522, window=hide
          Category:dropped
          Size (bytes):1039
          Entropy (8bit):4.495584157169374
          Encrypted:false
          SSDEEP:12:8epRgXg/XAlCPCHaXWBlXB/zxkpX+WZjewU0fWiLCicvbOd7MYDtZ3YilMMEpxRG:8En/XTm3xqbiwU0fpLJeqNDv3q/Y7h
          MD5:0D873EAEF2936CDC358A2B9E248B5432
          SHA1:78DAECA24D53D6739485EF2628959D3D7572CF86
          SHA-256:EDD37464C85F0C3932E9CE1741CA5B21BE7B65CD16165E93206F2C681E4119CB
          SHA-512:81D184F7B79B79BF0EDDEE9ECA67476981AA90AC1FFFBBAB5EB0428FD6411124FD6C2B65DCABD3B729E584CF9FDED99BFC64CCFDE1F1E9391548010815F2356C
          Malicious:false
          Preview:L..................F.... ....X...3...X...3.......w..b............................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1.....hT....user.8......QK.XhT..*...&=....U...............A.l.b.u.s.....z.1.....hT....Desktop.d......QK.XhT..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....p.2.b....TF/ .202205~1.RTF..T......hT..hT..*...r.....'...............2.0.2.2.0.5.3.1._.1.8.0.8.0.0...r.t.f.......}...............-...8...[............?J......C:\Users\..#...................\\405464\Users.user\Desktop\20220531_180800.rtf.*.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.2.0.2.2.0.5.3.1._.1.8.0.8.0.0...r.t.f.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......405464..........D_....3N...W...9...N..... ...
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):82
          Entropy (8bit):4.526832677737851
          Encrypted:false
          SSDEEP:3:bDuMJlHDISlmxWk1DISlv:bCBSjS1
          MD5:07CF9C274D2D15FCBB60B6FD51508E35
          SHA1:C35DD2A08AA5B765EDB55775B247CCE0C0090064
          SHA-256:07AB1BBAA3C36DDF78D815F20B1C37D36775AED93532D8BC8A3A200B92B6120F
          SHA-512:FEDAF1A0E92C4A3123F8916CB1F6AFFC708806AD9A825C070824CF27A11C52CE692AC579F955CA9503180229ECA49974D29643369C63DD77017732356E42B33F
          Malicious:false
          Preview:[folders]..Templates.LNK=0..20220531_180800.LNK=0..[misc]..20220531_180800.LNK=0..
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):162
          Entropy (8bit):2.503835550707525
          Encrypted:false
          SSDEEP:3:vrJlaCkWtVyEJbiJk/p2TKWWhMGHiV/ln:vdsCkWttViJkh2TKHM9V/l
          MD5:C5E24006AFAC8C2659023AD09A07EB0F
          SHA1:4B7B834BEDADFD0A2764743E021D40C55A51F284
          SHA-256:7C9E6D71E3F53D37A78CCE23FA21D259365A9571C6C3A01E8D216586177BA87E
          SHA-512:673649AF8318514414758F92756D408FB6F0CA4859CB2994A921E288126561A7B4EB3C7D824CC90352D939952EA167A473A4282838362B36E85B701A4B582396
          Malicious:false
          Preview:.user..................................................A.l.b.u.s.............p........16..............26.............@36..............36.....z.......p46.....x...
          Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          File Type:data
          Category:dropped
          Size (bytes):162
          Entropy (8bit):2.503835550707525
          Encrypted:false
          SSDEEP:3:vrJlaCkWtVyEJbiJk/p2TKWWhMGHiV/ln:vdsCkWttViJkh2TKHM9V/l
          MD5:C5E24006AFAC8C2659023AD09A07EB0F
          SHA1:4B7B834BEDADFD0A2764743E021D40C55A51F284
          SHA-256:7C9E6D71E3F53D37A78CCE23FA21D259365A9571C6C3A01E8D216586177BA87E
          SHA-512:673649AF8318514414758F92756D408FB6F0CA4859CB2994A921E288126561A7B4EB3C7D824CC90352D939952EA167A473A4282838362B36E85B701A4B582396
          Malicious:false
          Preview:.user..................................................A.l.b.u.s.............p........16..............26.............@36..............36.....z.......p46.....x...
          File type:Microsoft OOXML
          Entropy (8bit):7.9948510704789975
          TrID:
          • Word Microsoft Office Open XML Format document (49504/1) 49.01%
          • Word Microsoft Office Open XML Format document (43504/1) 43.07%
          • ZIP compressed archive (8000/1) 7.92%
          File name:20220531_180800.rtf
          File size:199522
          MD5:7b9c8e08371550238fbcd7cee1c8087d
          SHA1:ff8c9deb358b2d22aa086cf36406461e8e9978b2
          SHA256:b93326f795459d836c277730058e9923ab5f9bfbcef32e1c951e4a0d7538f9f5
          SHA512:962c4c0a48519ffa81a95771b25987cc6aeed4bb8737e1e5ab242233f849370d72675f08da3628270bad410659772f437209d7f02bed089b5a220f97314ec1f4
          SSDEEP:3072:LP/BkCPAXydgrYOUIr0XX95JQ7Anr5w2wJLWsk2n3rYxNYlT+MaJis19s9k:b/qXySM3XtQMnrq2Jon3MfYoL19s9k
          TLSH:7814131876E61EB9C60F3BB6B875A1076B9F0017EC14D2BF0C6065F98931964B670F8B
          File Content Preview:PK..........!....iw...........[Content_Types].xml.T.n.0..W.? _#p.CUU!9t96..~.1.q.M...}.HQ........y..f........F.d..I...\.2%.....D>0.3i4.d..L'.7.......}J.!.GJ=_.b>1.4".q..<..Z.?Y..n8.....:... ..3.l-C....M.Lh.=5u.UJ..Rp.........(.....BJb$....@h.>..H_.*....n.
          Icon Hash:e4eea2aaa4b4b4a4
          TimestampSource PortDest PortSource IPDest IP
          Jun 3, 2022 22:57:19.943697929 CEST49171443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:19.943775892 CEST4434917113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:19.943865061 CEST49171443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:19.964051008 CEST49171443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:19.964108944 CEST4434917113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:20.359473944 CEST4434917113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:20.359684944 CEST49171443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:20.373123884 CEST49171443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:20.373183012 CEST4434917113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:20.373627901 CEST4434917113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:20.373694897 CEST49171443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:20.676564932 CEST49171443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:20.720520973 CEST4434917113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:20.866599083 CEST4434917113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:20.866712093 CEST49171443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:20.866750956 CEST4434917113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:20.866786957 CEST4434917113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:20.866797924 CEST49171443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:20.866830111 CEST49171443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:20.866849899 CEST49171443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:20.866868019 CEST4434917113.250.15.191192.168.2.22
          Jun 3, 2022 22:57:20.866874933 CEST49171443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:20.866910934 CEST49171443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:26.539957047 CEST49172443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:26.540018082 CEST4434917213.250.15.191192.168.2.22
          Jun 3, 2022 22:57:26.540102005 CEST49172443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:26.540370941 CEST49172443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:26.540399075 CEST4434917213.250.15.191192.168.2.22
          Jun 3, 2022 22:57:26.960410118 CEST4434917213.250.15.191192.168.2.22
          Jun 3, 2022 22:57:26.960488081 CEST49172443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:26.967047930 CEST49172443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:26.967062950 CEST4434917213.250.15.191192.168.2.22
          Jun 3, 2022 22:57:26.967387915 CEST4434917213.250.15.191192.168.2.22
          Jun 3, 2022 22:57:26.980971098 CEST49172443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:27.024497986 CEST4434917213.250.15.191192.168.2.22
          Jun 3, 2022 22:57:27.376456022 CEST4434917213.250.15.191192.168.2.22
          Jun 3, 2022 22:57:27.376615047 CEST4434917213.250.15.191192.168.2.22
          Jun 3, 2022 22:57:27.376735926 CEST49172443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:27.376802921 CEST49172443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:27.376820087 CEST4434917213.250.15.191192.168.2.22
          Jun 3, 2022 22:57:31.790095091 CEST49173443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:31.790122986 CEST4434917313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:31.790210962 CEST49173443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:31.791918039 CEST49173443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:31.791934967 CEST4434917313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:32.201199055 CEST4434917313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:32.202213049 CEST49173443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:32.225771904 CEST49173443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:32.225794077 CEST4434917313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:32.226578951 CEST4434917313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:32.272612095 CEST49173443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:32.316492081 CEST4434917313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:32.602184057 CEST4434917313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:32.602251053 CEST4434917313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:32.602561951 CEST49173443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:32.602585077 CEST49173443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:32.602600098 CEST4434917313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:32.602688074 CEST49173443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:32.602694988 CEST4434917313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:32.602695942 CEST49173443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:32.602699041 CEST4434917313.250.15.191192.168.2.22
          Jun 3, 2022 22:57:35.228313923 CEST49174443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:35.228359938 CEST4434917413.250.15.191192.168.2.22
          Jun 3, 2022 22:57:35.228441954 CEST49174443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:35.228722095 CEST49174443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:35.228737116 CEST4434917413.250.15.191192.168.2.22
          Jun 3, 2022 22:57:35.606906891 CEST4434917413.250.15.191192.168.2.22
          Jun 3, 2022 22:57:35.607220888 CEST49174443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:35.621345997 CEST49174443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:35.621412039 CEST4434917413.250.15.191192.168.2.22
          Jun 3, 2022 22:57:35.622071028 CEST4434917413.250.15.191192.168.2.22
          Jun 3, 2022 22:57:35.623574018 CEST49174443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:35.668502092 CEST4434917413.250.15.191192.168.2.22
          Jun 3, 2022 22:57:35.976391077 CEST4434917413.250.15.191192.168.2.22
          Jun 3, 2022 22:57:35.976555109 CEST4434917413.250.15.191192.168.2.22
          Jun 3, 2022 22:57:35.976737976 CEST49174443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:35.983047962 CEST49174443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:35.983087063 CEST4434917413.250.15.191192.168.2.22
          Jun 3, 2022 22:57:37.074811935 CEST49175443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:37.074841022 CEST4434917513.250.15.191192.168.2.22
          Jun 3, 2022 22:57:37.074956894 CEST49175443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:37.075555086 CEST49175443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:37.075567007 CEST4434917513.250.15.191192.168.2.22
          Jun 3, 2022 22:57:37.458427906 CEST4434917513.250.15.191192.168.2.22
          Jun 3, 2022 22:57:37.458610058 CEST49175443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:37.471674919 CEST49175443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:37.471684933 CEST4434917513.250.15.191192.168.2.22
          Jun 3, 2022 22:57:37.472399950 CEST4434917513.250.15.191192.168.2.22
          Jun 3, 2022 22:57:37.474443913 CEST49175443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:37.516489029 CEST4434917513.250.15.191192.168.2.22
          Jun 3, 2022 22:57:37.833076000 CEST4434917513.250.15.191192.168.2.22
          Jun 3, 2022 22:57:37.833199978 CEST4434917513.250.15.191192.168.2.22
          Jun 3, 2022 22:57:37.833389997 CEST49175443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:37.838345051 CEST49175443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:37.838361979 CEST4434917513.250.15.191192.168.2.22
          Jun 3, 2022 22:57:37.864737034 CEST49176443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:37.864792109 CEST4434917613.250.15.191192.168.2.22
          Jun 3, 2022 22:57:37.864876986 CEST49176443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:37.866413116 CEST49176443192.168.2.2213.250.15.191
          Jun 3, 2022 22:57:37.866449118 CEST4434917613.250.15.191192.168.2.22
          TimestampSource PortDest PortSource IPDest IP
          Jun 3, 2022 22:57:19.871170998 CEST5586853192.168.2.228.8.8.8
          Jun 3, 2022 22:57:19.930835962 CEST53558688.8.8.8192.168.2.22
          Jun 3, 2022 22:57:26.314532042 CEST4968853192.168.2.228.8.8.8
          Jun 3, 2022 22:57:26.456120968 CEST53496888.8.8.8192.168.2.22
          Jun 3, 2022 22:57:26.459547043 CEST5883653192.168.2.228.8.8.8
          Jun 3, 2022 22:57:26.538995981 CEST53588368.8.8.8192.168.2.22
          Jun 3, 2022 22:57:31.445116997 CEST5013453192.168.2.228.8.8.8
          Jun 3, 2022 22:57:31.463130951 CEST53501348.8.8.8192.168.2.22
          Jun 3, 2022 22:57:31.464679003 CEST5527553192.168.2.228.8.8.8
          Jun 3, 2022 22:57:31.789314032 CEST53552758.8.8.8192.168.2.22
          Jun 3, 2022 22:57:35.143301010 CEST5991553192.168.2.228.8.8.8
          Jun 3, 2022 22:57:35.200170040 CEST53599158.8.8.8192.168.2.22
          Jun 3, 2022 22:57:35.210647106 CEST5440853192.168.2.228.8.8.8
          Jun 3, 2022 22:57:35.227852106 CEST53544088.8.8.8192.168.2.22
          Jun 3, 2022 22:57:36.922116995 CEST5010853192.168.2.228.8.8.8
          Jun 3, 2022 22:57:36.939106941 CEST53501088.8.8.8192.168.2.22
          Jun 3, 2022 22:57:36.942188978 CEST5472353192.168.2.228.8.8.8
          Jun 3, 2022 22:57:37.069972992 CEST53547238.8.8.8192.168.2.22
          Jun 3, 2022 22:57:40.868483067 CEST5806253192.168.2.228.8.8.8
          Jun 3, 2022 22:57:40.897502899 CEST53580628.8.8.8192.168.2.22
          Jun 3, 2022 22:57:40.899883986 CEST5670353192.168.2.228.8.8.8
          Jun 3, 2022 22:57:40.918878078 CEST53567038.8.8.8192.168.2.22
          Jun 3, 2022 22:57:42.643587112 CEST5924153192.168.2.228.8.8.8
          Jun 3, 2022 22:57:42.662676096 CEST53592418.8.8.8192.168.2.22
          Jun 3, 2022 22:57:42.665538073 CEST5524453192.168.2.228.8.8.8
          Jun 3, 2022 22:57:42.682970047 CEST53552448.8.8.8192.168.2.22
          Jun 3, 2022 22:57:44.315067053 CEST5395853192.168.2.228.8.8.8
          Jun 3, 2022 22:57:44.334134102 CEST53539588.8.8.8192.168.2.22
          Jun 3, 2022 22:57:44.336416960 CEST5602053192.168.2.228.8.8.8
          Jun 3, 2022 22:57:44.353132010 CEST53560208.8.8.8192.168.2.22
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
          Jun 3, 2022 22:57:19.871170998 CEST192.168.2.228.8.8.80xdcddStandard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:26.314532042 CEST192.168.2.228.8.8.80xd494Standard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:26.459547043 CEST192.168.2.228.8.8.80x6c29Standard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:31.445116997 CEST192.168.2.228.8.8.80xf2caStandard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:31.464679003 CEST192.168.2.228.8.8.80xdc64Standard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:35.143301010 CEST192.168.2.228.8.8.80xbe50Standard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:35.210647106 CEST192.168.2.228.8.8.80x646cStandard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:36.922116995 CEST192.168.2.228.8.8.80x12f1Standard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:36.942188978 CEST192.168.2.228.8.8.80xe6e0Standard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:40.868483067 CEST192.168.2.228.8.8.80xbbd1Standard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:40.899883986 CEST192.168.2.228.8.8.80x41b6Standard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:42.643587112 CEST192.168.2.228.8.8.80x6703Standard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:42.665538073 CEST192.168.2.228.8.8.80x7820Standard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:44.315067053 CEST192.168.2.228.8.8.80x2c87Standard query (0)cyberleague.coA (IP address)IN (0x0001)
          Jun 3, 2022 22:57:44.336416960 CEST192.168.2.228.8.8.80x4c7aStandard query (0)cyberleague.coA (IP address)IN (0x0001)
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
          Jun 3, 2022 22:57:19.930835962 CEST8.8.8.8192.168.2.220xdcddNo error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:26.456120968 CEST8.8.8.8192.168.2.220xd494No error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:26.538995981 CEST8.8.8.8192.168.2.220x6c29No error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:31.463130951 CEST8.8.8.8192.168.2.220xf2caNo error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:31.789314032 CEST8.8.8.8192.168.2.220xdc64No error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:35.200170040 CEST8.8.8.8192.168.2.220xbe50No error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:35.227852106 CEST8.8.8.8192.168.2.220x646cNo error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:36.939106941 CEST8.8.8.8192.168.2.220x12f1No error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:37.069972992 CEST8.8.8.8192.168.2.220xe6e0No error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:40.897502899 CEST8.8.8.8192.168.2.220xbbd1No error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:40.918878078 CEST8.8.8.8192.168.2.220x41b6No error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:42.662676096 CEST8.8.8.8192.168.2.220x6703No error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:42.682970047 CEST8.8.8.8192.168.2.220x7820No error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:44.334134102 CEST8.8.8.8192.168.2.220x2c87No error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          Jun 3, 2022 22:57:44.353132010 CEST8.8.8.8192.168.2.220x4c7aNo error (0)cyberleague.co13.250.15.191A (IP address)IN (0x0001)
          • cyberleague.co
          Session IDSource IPSource PortDestination IPDestination PortProcess
          0192.168.2.224917113.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:20 UTC0OUTOPTIONS / HTTP/1.1
          User-Agent: Microsoft Office Protocol Discovery
          Host: cyberleague.co
          Content-Length: 0
          Connection: Keep-Alive
          2022-06-03 20:57:20 UTC0INHTTP/1.1 200 OK
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:20 GMT
          Content-Type: text/html
          Content-Length: 0
          Connection: close
          Allow: GET,POST,OPTIONS,HEAD,TRACE


          Session IDSource IPSource PortDestination IPDestination PortProcess
          1192.168.2.224917213.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:26 UTC0OUTHEAD /th1s.html HTTP/1.1
          Connection: Keep-Alive
          User-Agent: Microsoft Office Existence Discovery
          Host: cyberleague.co
          2022-06-03 20:57:27 UTC0INHTTP/1.1 200 OK
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:27 GMT
          Content-Type: text/html
          Content-Length: 5092
          Connection: close
          Last-Modified: Wed, 01 Jun 2022 14:36:34 GMT
          ETag: "13e4-5e063d0e1ca1e"
          Accept-Ranges: bytes


          Session IDSource IPSource PortDestination IPDestination PortProcess
          10192.168.2.224918113.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:44 UTC9OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69 72 2f 36 2e 31 2e 37 36 30 31 0d 0a 44 65 70 74 68 3a 20 30 0d 0a 74 72 61 6e 73 6c 61 74 65 3a 20 66 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 30 0d 0a 48 6f 73 74 3a 20 63 79 62 65 72 6c 65 61 67 75 65 2e 63 6f 0d 0a 0d 0a
          Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: cyberleague.co
          2022-06-03 20:57:45 UTC9INHTTP/1.1 405 Method Not Allowed
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:45 GMT
          Content-Type: text/html; charset=iso-8859-1
          Content-Length: 225
          Connection: close
          Allow: GET,POST,OPTIONS,HEAD,TRACE
          2022-06-03 20:57:45 UTC9INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 6d 65 74 68 6f 64 20 50 52 4f 50 46 49 4e 44 20 69 73 20 6e 6f 74 20 61 6c 6c 6f 77 65 64 20 66 6f 72 20 74 68 69 73 20 55 52 4c 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>405 Method Not Allowed</title></head><body><h1>Method Not Allowed</h1><p>The requested method PROPFIND is not allowed for this URL.</p></body></html>


          Session IDSource IPSource PortDestination IPDestination PortProcess
          11192.168.2.224918213.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:45 UTC10OUTGET /th1s.html HTTP/1.1
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)
          UA-CPU: AMD64
          Accept-Encoding: gzip, deflate
          Host: cyberleague.co
          If-Modified-Since: Wed, 01 Jun 2022 14:36:34 GMT
          If-None-Match: "13e4-5e063d0e1ca1e"
          Connection: Keep-Alive
          2022-06-03 20:57:45 UTC10INHTTP/1.1 304 Not Modified
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:45 GMT
          Connection: close
          Last-Modified: Wed, 01 Jun 2022 14:36:34 GMT
          ETag: "13e4-5e063d0e1ca1e"
          Accept-Ranges: bytes


          Session IDSource IPSource PortDestination IPDestination PortProcess
          12192.168.2.224918313.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:46 UTC10OUTHEAD /th1s.html HTTP/1.1
          User-Agent: Microsoft Office Existence Discovery
          Host: cyberleague.co
          Content-Length: 0
          Connection: Keep-Alive
          2022-06-03 20:57:46 UTC10INHTTP/1.1 200 OK
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:46 GMT
          Content-Type: text/html
          Content-Length: 5092
          Connection: close
          Last-Modified: Wed, 01 Jun 2022 14:36:34 GMT
          ETag: "13e4-5e063d0e1ca1e"
          Accept-Ranges: bytes


          Session IDSource IPSource PortDestination IPDestination PortProcess
          13192.168.2.224918413.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:47 UTC11OUTHEAD /th1s.html HTTP/1.1
          User-Agent: Microsoft Office Existence Discovery
          Host: cyberleague.co
          Content-Length: 0
          Connection: Keep-Alive
          2022-06-03 20:57:47 UTC11INHTTP/1.1 200 OK
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:47 GMT
          Content-Type: text/html
          Content-Length: 5092
          Connection: close
          Last-Modified: Wed, 01 Jun 2022 14:36:34 GMT
          ETag: "13e4-5e063d0e1ca1e"
          Accept-Ranges: bytes


          Session IDSource IPSource PortDestination IPDestination PortProcess
          2192.168.2.224917313.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:32 UTC0OUTOPTIONS / HTTP/1.1
          Connection: Keep-Alive
          User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
          translate: f
          Host: cyberleague.co
          2022-06-03 20:57:32 UTC0INHTTP/1.1 200 OK
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:32 GMT
          Content-Type: text/html
          Content-Length: 0
          Connection: close
          Allow: GET,POST,OPTIONS,HEAD,TRACE


          Session IDSource IPSource PortDestination IPDestination PortProcess
          3192.168.2.224917413.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:35 UTC0OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69 72 2f 36 2e 31 2e 37 36 30 31 0d 0a 44 65 70 74 68 3a 20 30 0d 0a 74 72 61 6e 73 6c 61 74 65 3a 20 66 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 30 0d 0a 48 6f 73 74 3a 20 63 79 62 65 72 6c 65 61 67 75 65 2e 63 6f 0d 0a 0d 0a
          Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: cyberleague.co
          2022-06-03 20:57:35 UTC1INHTTP/1.1 405 Method Not Allowed
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:35 GMT
          Content-Type: text/html; charset=iso-8859-1
          Content-Length: 225
          Connection: close
          Allow: GET,POST,OPTIONS,HEAD,TRACE
          2022-06-03 20:57:35 UTC1INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 6d 65 74 68 6f 64 20 50 52 4f 50 46 49 4e 44 20 69 73 20 6e 6f 74 20 61 6c 6c 6f 77 65 64 20 66 6f 72 20 74 68 69 73 20 55 52 4c 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>405 Method Not Allowed</title></head><body><h1>Method Not Allowed</h1><p>The requested method PROPFIND is not allowed for this URL.</p></body></html>


          Session IDSource IPSource PortDestination IPDestination PortProcess
          4192.168.2.224917513.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:37 UTC1OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69 72 2f 36 2e 31 2e 37 36 30 31 0d 0a 44 65 70 74 68 3a 20 30 0d 0a 74 72 61 6e 73 6c 61 74 65 3a 20 66 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 30 0d 0a 48 6f 73 74 3a 20 63 79 62 65 72 6c 65 61 67 75 65 2e 63 6f 0d 0a 0d 0a
          Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: cyberleague.co
          2022-06-03 20:57:37 UTC1INHTTP/1.1 405 Method Not Allowed
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:37 GMT
          Content-Type: text/html; charset=iso-8859-1
          Content-Length: 225
          Connection: close
          Allow: GET,POST,OPTIONS,HEAD,TRACE
          2022-06-03 20:57:37 UTC1INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 6d 65 74 68 6f 64 20 50 52 4f 50 46 49 4e 44 20 69 73 20 6e 6f 74 20 61 6c 6c 6f 77 65 64 20 66 6f 72 20 74 68 69 73 20 55 52 4c 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>405 Method Not Allowed</title></head><body><h1>Method Not Allowed</h1><p>The requested method PROPFIND is not allowed for this URL.</p></body></html>


          Session IDSource IPSource PortDestination IPDestination PortProcess
          5192.168.2.224917613.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:38 UTC2OUTGET /th1s.html HTTP/1.1
          Accept: */*
          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)
          UA-CPU: AMD64
          Accept-Encoding: gzip, deflate
          Host: cyberleague.co
          Connection: Keep-Alive
          2022-06-03 20:57:38 UTC2INHTTP/1.1 200 OK
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:38 GMT
          Content-Type: text/html
          Content-Length: 5092
          Connection: close
          Last-Modified: Wed, 01 Jun 2022 14:36:34 GMT
          ETag: "13e4-5e063d0e1ca1e"
          Accept-Ranges: bytes
          2022-06-03 20:57:38 UTC2INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 20 20 20 20 3c 73 63 72 69 70 74 3e 0d 0a 20 20 20 20 2f 2f 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 0d 0a 20 20 20 20 2f 2f 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
          Data Ascii: <!DOCTYPE html><html><body> <script> //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA //AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA


          Session IDSource IPSource PortDestination IPDestination PortProcess
          6192.168.2.224917713.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:39 UTC7OUTHEAD /th1s.html HTTP/1.1
          User-Agent: Microsoft Office Existence Discovery
          Host: cyberleague.co
          Content-Length: 0
          Connection: Keep-Alive
          2022-06-03 20:57:39 UTC7INHTTP/1.1 200 OK
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:39 GMT
          Content-Type: text/html
          Content-Length: 5092
          Connection: close
          Last-Modified: Wed, 01 Jun 2022 14:36:34 GMT
          ETag: "13e4-5e063d0e1ca1e"
          Accept-Ranges: bytes


          Session IDSource IPSource PortDestination IPDestination PortProcess
          7192.168.2.224917813.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:40 UTC8OUTHEAD /th1s.html HTTP/1.1
          User-Agent: Microsoft Office Existence Discovery
          Host: cyberleague.co
          Content-Length: 0
          Connection: Keep-Alive
          2022-06-03 20:57:40 UTC8INHTTP/1.1 200 OK
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:40 GMT
          Content-Type: text/html
          Content-Length: 5092
          Connection: close
          Last-Modified: Wed, 01 Jun 2022 14:36:34 GMT
          ETag: "13e4-5e063d0e1ca1e"
          Accept-Ranges: bytes


          Session IDSource IPSource PortDestination IPDestination PortProcess
          8192.168.2.224917913.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:41 UTC8OUTHEAD /th1s.html HTTP/1.1
          Connection: Keep-Alive
          User-Agent: Microsoft Office Existence Discovery
          Host: cyberleague.co
          2022-06-03 20:57:41 UTC8INHTTP/1.1 200 OK
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:41 GMT
          Content-Type: text/html
          Content-Length: 5092
          Connection: close
          Last-Modified: Wed, 01 Jun 2022 14:36:34 GMT
          ETag: "13e4-5e063d0e1ca1e"
          Accept-Ranges: bytes


          Session IDSource IPSource PortDestination IPDestination PortProcess
          9192.168.2.224918013.250.15.191443C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          TimestampkBytes transferredDirectionData
          2022-06-03 20:57:43 UTC8OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69 72 2f 36 2e 31 2e 37 36 30 31 0d 0a 44 65 70 74 68 3a 20 30 0d 0a 74 72 61 6e 73 6c 61 74 65 3a 20 66 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 30 0d 0a 48 6f 73 74 3a 20 63 79 62 65 72 6c 65 61 67 75 65 2e 63 6f 0d 0a 0d 0a
          Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: cyberleague.co
          2022-06-03 20:57:43 UTC9INHTTP/1.1 405 Method Not Allowed
          Server: nginx/1.18.0 (Ubuntu)
          Date: Fri, 03 Jun 2022 20:57:43 GMT
          Content-Type: text/html; charset=iso-8859-1
          Content-Length: 225
          Connection: close
          Allow: GET,POST,OPTIONS,HEAD,TRACE
          2022-06-03 20:57:43 UTC9INData Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 6d 65 74 68 6f 64 20 50 52 4f 50 46 49 4e 44 20 69 73 20 6e 6f 74 20 61 6c 6c 6f 77 65 64 20 66 6f 72 20 74 68 69 73 20 55 52 4c 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
          Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>405 Method Not Allowed</title></head><body><h1>Method Not Allowed</h1><p>The requested method PROPFIND is not allowed for this URL.</p></body></html>


          No statistics
          Target ID:0
          Start time:22:58:11
          Start date:03/06/2022
          Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
          Imagebase:0x13fb90000
          File size:1423704 bytes
          MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high

          No disassembly