Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
beyondsearch,doc,08.11.22.doc

Overview

General Information

Sample Name:beyondsearch,doc,08.11.22.doc
Analysis ID:682678
MD5:ab5796d82e0a8467837ced35e6b725b7
SHA1:3e69850c66255bbd093579fdb161a16e64d8a848
SHA256:500b85d4e573f6e14e96c0a06e2d8fe15572c0eb97e3cc6d204d3416140d8a61
Tags:docIcedID
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Multi AV Scanner detection for submitted file
Document contains an embedded VBA macro with suspicious strings
Machine Learning detection for sample
Potential document exploit detected (unknown TCP traffic)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Document contains an embedded VBA macro which executes code when the document is opened / closed
Document contains embedded VBA macros
IP address seen in connection with other malware
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 3000 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: beyondsearch,doc,08.11.22.docVirustotal: Detection: 23%Perma Link
Source: beyondsearch,doc,08.11.22.docReversingLabs: Detection: 15%
Source: beyondsearch,doc,08.11.22.docJoe Sandbox ML: detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49174 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49174 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49174 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
Source: Joe Sandbox ViewIP Address: 45.8.146.139 45.8.146.139
Source: Joe Sandbox ViewIP Address: 45.8.146.139 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{803ED0A8-1C9F-405F-9890-D3A13AC7DC84}.tmpJump to behavior

System Summary

barindex
Source: Screenshot number: 4Screenshot OCR: Enable editing" button on I W a the top bar, and then cIick"Enable content". vm " P nr " w-m "
Source: Screenshot number: 4Screenshot OCR: Enable content". vm " P nr " w-m " Ffi 1~" 0 m m 13 ;a 10096 G) FI G) ,, tuwmm l!lmmok
Source: Screenshot number: 12Screenshot OCR: Enable editing" button on the top bar, and then click "Enable content". ii: ^ 81 |i ii I 13 }1 E
Source: Screenshot number: 12Screenshot OCR: Enable content". ii: ^ 81 |i ii I 13 }1 EtZ ' W~.~ a S
Source: beyondsearch,doc,08.11.22.docOLE, VBA macro line: Private Declare PtrSafe Function Lib "kernel32" Alias "VirtualProtect" (ByVal As LongPtr, ByVal As LongPtr, ByVal As LongPtr, As LongPtr) As LongPtr
Source: beyondsearch,doc,08.11.22.docOLE, VBA macro line: Set = CallByName((), QdkiJ_o3nNw("rWYVlUED9n"), VbGet, )
Source: beyondsearch,doc,08.11.22.docOLE, VBA macro line: Set = CallByName((), QdkiJ_o3nNw("ysdpcq5CL"), VbGet, )
Source: beyondsearch,doc,08.11.22.docOLE, VBA macro line: Set = CallByName((QdkiJ_o3nNw("Ah0ag_6jYQ")), QdkiJ_o3nNw("sqjnJXyk1a"), VbGet, QdkiJ_o3nNw("FFy3Iddltv"))
Source: ~DF396E86B8EC924EF0.TMP.1.drOLE, VBA macro line: Private Declare PtrSafe Function Lib "kernel32" Alias "VirtualProtect" (ByVal As LongPtr, ByVal As LongPtr, ByVal As LongPtr, As LongPtr) As LongPtr
Source: ~DF396E86B8EC924EF0.TMP.1.drOLE, VBA macro line: Set = CallByName((), QdkiJ_o3nNw("rWYVlUED9n"), VbGet, )
Source: ~DF396E86B8EC924EF0.TMP.1.drOLE, VBA macro line: Set = CallByName((), QdkiJ_o3nNw("ysdpcq5CL"), VbGet, )
Source: ~DF396E86B8EC924EF0.TMP.1.drOLE, VBA macro line: Set = CallByName((QdkiJ_o3nNw("Ah0ag_6jYQ")), QdkiJ_o3nNw("sqjnJXyk1a"), VbGet, QdkiJ_o3nNw("FFy3Iddltv"))
Source: beyondsearch,doc,08.11.22.docOLE, VBA macro line: Private Sub Document_Open()
Source: ~DF396E86B8EC924EF0.TMP.1.drOLE, VBA macro line: Private Sub Document_Open()
Source: beyondsearch,doc,08.11.22.docOLE indicator, VBA macros: true
Source: ~DF396E86B8EC924EF0.TMP.1.drOLE indicator, VBA macros: true
Source: ~WRF{67659BF2-E797-4523-855D-8CB155CDBA2F}.tmp.1.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: ~DF396E86B8EC924EF0.TMP.1.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: beyondsearch,doc,08.11.22.docVirustotal: Detection: 23%
Source: beyondsearch,doc,08.11.22.docReversingLabs: Detection: 15%
Source: beyondsearch,doc,08.11.22.LNK.1.drLNK file: ..\..\..\..\..\Desktop\beyondsearch,doc,08.11.22.doc
Source: beyondsearch,doc,08.11.22.docOLE indicator, Word Document stream: true
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$yondsearch,doc,08.11.22.docJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR5F1F.tmpJump to behavior
Source: classification engineClassification label: mal64.expl.winDOC@1/11@0/1
Source: beyondsearch,doc,08.11.22.docOLE document summary: title field not present or empty
Source: beyondsearch,doc,08.11.22.docOLE document summary: author field not present or empty
Source: beyondsearch,doc,08.11.22.docOLE document summary: edited time not present or 0
Source: ~WRF{67659BF2-E797-4523-855D-8CB155CDBA2F}.tmp.1.drOLE document summary: title field not present or empty
Source: ~WRF{67659BF2-E797-4523-855D-8CB155CDBA2F}.tmp.1.drOLE document summary: author field not present or empty
Source: ~WRF{67659BF2-E797-4523-855D-8CB155CDBA2F}.tmp.1.drOLE document summary: edited time not present or 0
Source: ~DF396E86B8EC924EF0.TMP.1.drOLE document summary: title field not present or empty
Source: ~DF396E86B8EC924EF0.TMP.1.drOLE document summary: author field not present or empty
Source: ~DF396E86B8EC924EF0.TMP.1.drOLE document summary: edited time not present or 0
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: beyondsearch,doc,08.11.22.docInitial sample: OLE zip file path = docProps/custom.xml
Source: beyondsearch,doc,08.11.22.docStatic file information: File size 2343139 > 1048576
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
Source: ~WRF{67659BF2-E797-4523-855D-8CB155CDBA2F}.tmp.1.drInitial sample: OLE indicators vbamacros = False
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts12
Scripting
Path InterceptionPath Interception1
Masquerading
OS Credential Dumping1
File and Directory Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
Ingress Tool Transfer
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default Accounts1
Exploitation for Client Execution
Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)12
Scripting
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
beyondsearch,doc,08.11.22.doc23%VirustotalBrowse
beyondsearch,doc,08.11.22.doc15%ReversingLabsScript-Macro.Trojan.Amphitryon
beyondsearch,doc,08.11.22.doc100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\~DF396E86B8EC924EF0.TMP100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
45.8.146.139
unknownRussian Federation
44676VMAGE-ASRUfalse
Joe Sandbox Version:35.0.0 Citrine
Analysis ID:682678
Start date and time:2022-08-11 20:30:24 +02:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 5m 38s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:beyondsearch,doc,08.11.22.doc
Cookbook file name:defaultwindowsofficecookbook.jbs
Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
Number of analysed new started processes analysed:4
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • GSI enabled (VBA)
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal64.expl.winDOC@1/11@0/1
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .doc
  • Adjust boot time
  • Enable AMSI
  • Found Word or Excel or PowerPoint or XPS Viewer
  • Attach to Office via COM
  • Scroll down
  • Close Viewer
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Report size getting too big, too many NtQueryAttributesFile calls found.
No simulations
No context
No context
No context
No context
No context
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:PNG image data, 440 x 440, 8-bit/color RGBA, non-interlaced
Category:dropped
Size (bytes):256276
Entropy (8bit):7.977216150398352
Encrypted:false
SSDEEP:6144:u53FFY/qeTrhmcfFRbmQtxjZXZkmDX9YhHa0MeIHuE+1wp3OOaEKwOYojl:Fie8cfFRb9njZdmw0fSuchOMKwEJ
MD5:7868B0F9CF2B7A4AD1CD14D32F5AD036
SHA1:745B716D2061FC543F3511B9391CC590B5B2B7C8
SHA-256:9454CDF04F8BA921663CAC8DD825D4E8602FA4BAC4DBBD775267A5949B41B83E
SHA-512:A7E764CFDF6FED1445E618FCCA6151B75FE20C06F99C9FA7819A6C6ECBBC7E5F3FBC61979A8E511D84E44ACE0FBCC899F04D0069D79F007CD62DD62BE1A14309
Malicious:false
Reputation:low
Preview:.PNG........IHDR.............7......sRGB.........gAMA......a.....pHYs..!...!..........IDATx^....GU....]g.m....?.J......(....5......@.B...IzO:!...H#a..3.=.....!.CB.......-.....w....J]....K....S.UuNU]u_.}.O.w....~.x:0.?+....K.x.{..6..N..o...A...p....D/_+..i..x..o.<..[$o...A9--A8.....*.p:P.=Z...X......x[Z.c<I.....VF..'..6......ic.I..[........_.2.h.J....6.K....N.}>...p.+.-...x.-_.i.).W..<..L.....J.8 .=z...hy+..A.WT.|5.....g...ct..*O._.[.E..5.2....>...h...c.0.....:.~E..z.*.........*_......'r\$...m|.5..g.WN..A..{i=."i...x...p...-..........V..@...z!...@z.3F.8.|u...A.+_E.W....5.HZ.U.b.x....x..1+...D....xvF....-....@.h.a.'.)']...-_..h.Z.V:h..\......E.N..u..p..5....{..x..6o.'-...%z4.4.$.....*jz..:..T.qP.U.ZZ..X..k.Tz.?@..6...~...s..g...^..W.b...D........%j..y.|..O.....~F@....k.A...7..H..."..@.'.'.h..z<.pOFM.......9.i...m..1..U.h....1Y..v...r|...z/.8...@...O.O.U.,ymz..._]E.....j.|Vc.6...^..X<yq....1?Q...jy.......b.?]...I.~.D........ y.6.*...D..
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:PNG image data, 486 x 628, 8-bit/color RGB, non-interlaced
Category:dropped
Size (bytes):106990
Entropy (8bit):7.9875389343574765
Encrypted:false
SSDEEP:3072:BTmfkQHtM8ZGSnYO7/MCGQGzM/KsDN3jBU8zq:BTmsQNDGSnf7/CQGz6NHq
MD5:003B5C109509AD99FB418712CB4B184D
SHA1:145B7864A0CE5E0CA42AA6DDCAF2E3B5052071C9
SHA-256:131B8A928D925E1A7EAA188384BD499856749DB1523D310516079162CECD2368
SHA-512:3F0B828957260AE725A0EAC0FEB4484D76F398EDB31FBF10AC9797D7ED66D81F24F34D0986CE6DBFB92C07919AD18D9773704CF3CB3D35015C69F5DF2FC465C8
Malicious:false
Reputation:moderate, very likely benign file
Preview:.PNG........IHDR.......t.....H..M.. .IDATx...$.u.#k..z..gDS.$.0.......`..a|.Lk.h..........>....].N.0.h.Tg..y.....q.n1...Q..O1ny..|.)...b...].9Wp.m].u..9.u..E..".u....o...M8..?..8vQ..._../#......5G..7r.S+.n.B!r[s...9...B.......8t....\...6......_.a.$...v..,v.8.y..s.........1..v..1.t..J.(#..q..8...}.N...z..B!.l.!;.7.f.+D1w,v.8rQ...l.+.....b.q..E.(.^.......8...>.P.s...?.U?.....(......U.....f..0...s.P(DQ.p.P($...f..6..B..n......(..QT......(*....R.E.(.....QT._.....}..6."..v..l6...Y....r.\2...5...b..l......{.....m..8..Q..c.@.D.bT(D..].;....8J.yq.......'.+.%..C..E..35....&.g...xc.7.)*...m.....l6.....b1S....B'.o8K.?_.O.|..R.....W..B.._..^....>...b.\...Q............(.....h.h....Pv).h.E..v.ZM...l.Z..8.?y...%...........%....bT(..1.1*..n...|Q...E.Ba.o.......M[2.I..#...Oa....x...|.z....3.b.I_,.W..p8.......f.ab..6..v.-...&m6..................+&....S(..R...v._.W.t.Q..h.[.\.y.~......T*.q.^.?B...Dm..b.X...~.8.>.q......}...7...E..v......s'..
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:Composite Document File V2 Document, Cannot read section info
Category:dropped
Size (bytes):11776
Entropy (8bit):5.802602301153295
Encrypted:false
SSDEEP:192:yktJ6pa/Rr3pmlxSE4kHapt3mpa/Rr3pmlxSE4k9a:/tApcjMxH4zt2pcjMxH4
MD5:0346203C08BC40A669A667D7F7F1CDA4
SHA1:29CDCBB2B4672E652B553A5CFA4F6913E05294FE
SHA-256:A52FAE14F6E1F888A54038E10EAF43B4FF1A9B4725112AE9446434B668422342
SHA-512:F94C51987173B97B783D151E85F9198C57A3CEBFE9095CC3A4157F253C99BDAE37FFFE6B348510A3701982CD3BAD5FF39307770FD86611A256A77523EDE31774
Malicious:false
Reputation:low
Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):1536
Entropy (8bit):2.1213119425347764
Encrypted:false
SSDEEP:12:DMlzfRLZRW4WZ1MFKuQ9cc3xn82l6kwkvjTS4BTFkYW4dkYW4PllWkYWHkUZB/Wz:4LG1ND9Pxn82EkRSCFmUmYImHWz
MD5:6092D6A6540809400150272965A545E9
SHA1:3C783F523AC30DE7E3A25D67BE70C578846E9ACD
SHA-256:EE62AE57659119FA9069F589F2B235189902CA53535FBB7D852755D5AFA0B39D
SHA-512:44E6E8DB919FFA15BD860B7B1A91AE61351C37C5F0F7EDA5B22EA98C87629622EBDC0FB216E21B1C7BB009850E2EC01F5FABDBE6C5C4398DEAA0695B18B78844
Malicious:false
Reputation:low
Preview:.././...T.h.i.s. .d.o.c.u.m.e.n.t. .c.r.e.a.t.e.d. .i.n. .p.r.e.v.i.o.u.s. .v.e.r.s.i.o.n. .o.f. .M.i.c.r.o.s.o.f.t. .O.f.f.i.c.e. .W.o.r.d.....T.o. .v.i.e.w. .o.r. .e.d.i.t. .t.h.i.s. .d.o.c.u.m.e.n.t.,. .p.l.e.a.s.e. .c.l.i.c.k. .. E.n.a.b.l.e. .e.d.i.t.i.n.g.. .b.u.t.t.o.n. .o.n. .t.h.e. .t.o.p. .b.a.r.,. .a.n.d. .t.h.e.n. .c.l.i.c.k. .. E.n.a.b.l.e. .c.o.n.t.e.n.t.. ..........................................................................................................................................................z.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):1024
Entropy (8bit):0.05390218305374581
Encrypted:false
SSDEEP:3:ol3lYdn:4Wn
MD5:5D4D94EE7E06BBB0AF9584119797B23A
SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
Malicious:false
Reputation:high, very likely benign file
Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:Composite Document File V2 Document, Cannot read section info
Category:dropped
Size (bytes):59904
Entropy (8bit):4.163773817291896
Encrypted:false
SSDEEP:768:VdvVZwOTx6iJ1TVMTO5lrzjs36EdX17+Mhd72+ajLGIMG+aGXaD3:VpzT0yAT0rzO6EdX1L0GK+aGXaD3
MD5:220BF14C27C7F30EF3122CEDD81CC3AD
SHA1:842967C6E66C823E45DDF93E404C53090A088699
SHA-256:34A03251C9F48854545A74505BD30B9289377DA8C4E2C48793364B7525ADA1FF
SHA-512:05F026CDB3B7927C423BB36A10264A4A70FC08E2707CBAEEB7D270BBE935A8C290DE9CB0F963FAEA79C24C9EE390AD07DA7B2432D82FEDA5E604B94C888555BA
Malicious:true
Antivirus:
  • Antivirus: Joe Sandbox ML, Detection: 100%
Reputation:low
Preview:......................>...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................S...........(........................................................................................................... ...!..."...#...$...%...&...'.......)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9.......;...<...=...>...?...H...A...B...C...D...E...F...G...:...I...J...K...L...M...N...O...P...Q...R......._...U...V...W...X...Y...\...[.......h...^...........a...b...c...d...e...f...g...Z...i...j...s...l...m...n...o...p...q...r...]...............................
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:54 2022, mtime=Tue Mar 8 15:45:54 2022, atime=Fri Aug 12 02:31:13 2022, length=2248938, window=hide
Category:dropped
Size (bytes):1089
Entropy (8bit):4.559456310102049
Encrypted:false
SSDEEP:12:8cZuvgXg/XAlCPCHaXBKBnB/xQpX+WqpWaiKit4icvbnnp/l4bibDtZ3YilMMEpn:8Z/XTRKJIwpWtKWred/lEmDv3qTau7D
MD5:8BCCBE98C6A0A6031F43D2C66E22E5F5
SHA1:44ED0D796B3155DF1592AC984E89785C36454DEB
SHA-256:4A815A75BF204F31D8E7D2FABB7EF83F76CFFA6916FE07EF23198C92EC195600
SHA-512:54F2D3E6D04988E32A0AE35B1D78BB1C897FCB89F0B7160CE331ABB7206A34DD4E9B200F06ECC6ACD90A53EB8AED6ED5D394468F58C92B80A93586E5875FE455
Malicious:false
Reputation:low
Preview:L..................F.... ....UU..3...UU..3..N........P"..........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1.....hT....user.8......QK.XhT..*...&=....U...............A.l.b.u.s.....z.1.....hT....Desktop.d......QK.XhT..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2..P"..U.. .BEYOND~1.DOC..h......hT..hT..*...r.....'...............b.e.y.o.n.d.s.e.a.r.c.h.,.d.o.c.,.0.8...1.1...2.2...d.o.c.......................-...8...[............?J......C:\Users\..#...................\\116938\Users.user\Desktop\beyondsearch,doc,08.11.22.doc.4.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.b.e.y.o.n.d.s.e.a.r.c.h.,.d.o.c.,.0.8...1.1...2.2...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X..
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):101
Entropy (8bit):4.744445088413295
Encrypted:false
SSDEEP:3:bDuMJlf5K1HEKPdJVJUkbUmX1SHEKPdJVJUkbUv:bCUU1HEKVJVJpbWHEKVJVJpb2
MD5:56105FFA4A3B63A6FC6A6DA6E8650B6B
SHA1:AB9CE29AAEE1FCEC81C30A703C6F5FA946ADAD96
SHA-256:C4786521292D9F0EE34406B886128FFDF8F76F8A0F91A309FC7DCA0F90849A0D
SHA-512:3DD4584DAC93664700B740BBA2CECD2A7DA7DDD0750A668B8E3E1DA16362E6B0922A2377175C0C568134C06597BC4246DE73C25EDC3DF4AA4B1DEB1AD07DF5B4
Malicious:false
Reputation:low
Preview:[folders]..Templates.LNK=0..beyondsearch,doc,08.11.22.LNK=0..[doc]..beyondsearch,doc,08.11.22.LNK=0..
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):162
Entropy (8bit):2.503835550707525
Encrypted:false
SSDEEP:3:vrJlaCkWtVyHH/cgQfmW+eMdln:vdsCkWtUb+8ll
MD5:D9C8F93ADB8834E5883B5A8AAAC0D8D9
SHA1:23684CCAA587C442181A92E722E15A685B2407B1
SHA-256:116394FEAB201D23FD7A4D7F6B10669A4CBCE69AF3575D9C1E13E735D512FA11
SHA-512:7742E1AC50ACB3B794905CFAE973FDBF16560A7B580B5CD6F27FEFE1CB3EF4AEC2538963535493DCC25F8F114E8708050EDF5F7D3D146DF47DA4B958F0526515
Malicious:false
Preview:.user..................................................A.l.b.u.s.............p........15..............25.............@35..............35.....z.......p45.....x...
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:Little-endian UTF-16 Unicode text, with no line terminators
Category:dropped
Size (bytes):2
Entropy (8bit):1.0
Encrypted:false
SSDEEP:3:Qn:Qn
MD5:F3B25701FE362EC84616A93A45CE9998
SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
Malicious:false
Preview:..
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):162
Entropy (8bit):2.503835550707525
Encrypted:false
SSDEEP:3:vrJlaCkWtVyHH/cgQfmW+eMdln:vdsCkWtUb+8ll
MD5:D9C8F93ADB8834E5883B5A8AAAC0D8D9
SHA1:23684CCAA587C442181A92E722E15A685B2407B1
SHA-256:116394FEAB201D23FD7A4D7F6B10669A4CBCE69AF3575D9C1E13E735D512FA11
SHA-512:7742E1AC50ACB3B794905CFAE973FDBF16560A7B580B5CD6F27FEFE1CB3EF4AEC2538963535493DCC25F8F114E8708050EDF5F7D3D146DF47DA4B958F0526515
Malicious:false
Preview:.user..................................................A.l.b.u.s.............p........15..............25.............@35..............35.....z.......p45.....x...
File type:Zip archive data, at least v2.0 to extract
Entropy (8bit):7.993497837774047
TrID:
  • Word Microsoft Office Open XML Format document (49504/1) 49.01%
  • Word Microsoft Office Open XML Format document (43504/1) 43.07%
  • ZIP compressed archive (8000/1) 7.92%
File name:beyondsearch,doc,08.11.22.doc
File size:2343139
MD5:ab5796d82e0a8467837ced35e6b725b7
SHA1:3e69850c66255bbd093579fdb161a16e64d8a848
SHA256:500b85d4e573f6e14e96c0a06e2d8fe15572c0eb97e3cc6d204d3416140d8a61
SHA512:20c4a3d667f01eaebe2b201d29ac9939484bf8e72e57cdff5f82c99d1bb04f2bd3a9a488dcd901ff0facc2542e9b7a15df0c0a715de32f6f325bcb6965d76135
SSDEEP:49152:z/hO6rfJ7OgTHnzfRPGPNJvF3620rpD9wpZf7R:z5JQgDnKJvF3620NDOpdF
TLSH:BCB533FB81555325D1E33E7DCA6BD2CE8C4AACE252EE404AD1F4F84CF129C4756AD0A2
File Content Preview:PK..........!..U~............._rels/.rels...J.@............4.E..D.....$....T..w-..j........|.zs..z..z.*X.%(v......6O.{PI........`S__._x .C..CR....:....t..R......hI.3..H.Q..*.;..=..y... n.......yo.......[vrf..A..6..3[.>_...-K....\NH!....<..r...E.B..P...<_.
Icon Hash:e4eea2aaa4b4b4a4
Document Type:OpenXML
Number of OLE Files:1
Has Summary Info:
Application Name:
Encrypted Document:False
Contains Word Document Stream:True
Contains Workbook/Book Stream:False
Contains PowerPoint Document Stream:False
Contains Visio Document Stream:False
Contains ObjectPool Stream:False
Flash Objects Count:0
Contains VBA Macros:True
General
Stream Path:VBA/ThisDocument
VBA File Name:ThisDocument.cls
Stream Size:2802
Data ASCII:. p . A t t r i b u t . e V B _ N a m . e = " T h i . s D o c u m e n . t " . . . B a s . . 1 N o r m a l . . . V G l o b a l ! . S p a c . l F a . l s e . J C r e a . t a b l . . P r e d e c l a . . I d . . # T r u . " E x p . o s e . . T e m p . l a t e D e r i . v . $ C u s t o m l i z C . P . . . . . D . ? P t r S a . f e F u n c t . i o n . . . . . . . L i b . " u s e r 3 2 " . A l i a s " . K i l l T i m e . r " ( B y V a l . . . . . . . . . # . A s L o n g y 5 , . .
Data Raw:01 70 b4 00 41 74 74 72 69 62 75 74 00 65 20 56 42 5f 4e 61 6d 00 65 20 3d 20 22 54 68 69 00 73 44 6f 63 75 6d 65 6e 10 74 22 0d 0a 0a 8c 42 61 73 01 02 8c 31 4e 6f 72 6d 61 6c 02 2e 19 56 47 6c 6f 62 61 6c 21 01 aa 53 70 61 63 01 6c 46 61 08 6c 73 65 0c 4a 43 72 65 61 10 74 61 62 6c 15 1f 50 72 65 20 64 65 63 6c 61 00 06 49 64 11 00 23 54 72 75 0d 22 45 78 70 08 6f 73 65 14 1c 54

General
Stream Path:PROJECT
File Type:ASCII text, with CRLF line terminators
Stream Size:365
Entropy:5.25516442275755
Base64 Encoded:True
Data ASCII:I D = " { 5 E 1 F D B D 3 - E B 8 5 - 4 9 0 3 - 9 5 D 5 - 6 3 F 3 5 0 0 E C E 7 E } " . . D o c u m e n t = T h i s D o c u m e n t / & H 0 0 0 0 0 0 0 0 . . N a m e = " P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " 4 3 4 1 4 6 0 5 8 D 0 9 8 D 0 9 8 D 0 9 8 D 0 9 " . . D P B = " 8 6 8 4 8 3 C A 8 5 4 E C 9 4 F C 9 4 F C 9 " . . G C = " C 9 C B C C D 1 C D D 1 C D 2 E " . . . . [ H o s t E x t e n d e r I n f o ] . .
Data Raw:49 44 3d 22 7b 35 45 31 46 44 42 44 33 2d 45 42 38 35 2d 34 39 30 33 2d 39 35 44 35 2d 36 33 46 33 35 30 30 45 43 45 37 45 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 44 6f 63 75 6d 65 6e 74 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 4e 61 6d 65 3d 22 50 72 6f 6a 65 63 74 22 0d 0a 48 65 6c 70 43 6f 6e 74 65 78 74 49 44 3d 22 30 22 0d 0a 56 65 72 73 69 6f 6e 43 6f 6d 70 61 74 69
General
Stream Path:PROJECTwm
File Type:data
Stream Size:41
Entropy:3.0773844850752607
Base64 Encoded:False
Data ASCII:T h i s D o c u m e n t . T . h . i . s . D . o . c . u . m . e . n . t . . . . .
Data Raw:54 68 69 73 44 6f 63 75 6d 65 6e 74 00 54 00 68 00 69 00 73 00 44 00 6f 00 63 00 75 00 6d 00 65 00 6e 00 74 00 00 00 00 00
General
Stream Path:VBA/_VBA_PROJECT
File Type:ISO-8859 text, with no line terminators
Stream Size:7
Entropy:1.8423709931771088
Base64 Encoded:False
Data ASCII:a . . .
Data Raw:cc 61 ff ff 00 00 00
General
Stream Path:VBA/__SRP_2
File Type:data
Stream Size:5108
Entropy:1.9294791789834775
Base64 Encoded:False
Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . P . . . . . . . . . . . " . . . . . . . . . . . . . . . q . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ` I # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Data Raw:72 55 40 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 03 00 50 00 00 00 00 00 00 00 00 00 00 00 22 00 1f 00 00 00 00 00 01 00 01 00 00 00 01 00 71 07 00 00 00 00 00 00 00 00 00 00 a1 07 00 00 00 00 00 00 00 00 00 00 d1 07
General
Stream Path:VBA/__SRP_3
File Type:data
Stream Size:2724
Entropy:2.706701541324898
Base64 Encoded:False
Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . P . . . . . . . . . . . . . . . p . . . . . . . . . . . . . . . . . A . . . . . . . . . . . . . . . . . . . . . ` . q . . . . . . . . . . . , . . p . . . . . . q . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Q . . . . . . . . . . . . . . . . . . . . . . . Q . ` . ! . . . . . . . . . . . \\ . . p . . . . . . . . . . . . . . . . . . . . . . . . .
Data Raw:72 55 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 02 00 ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 78 00 00 00 08 00 50 00 c1 08 00 00 00 00 00 00 00 00 00 00 00 00 04 70 08 00 fe ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00
General
Stream Path:VBA/dir
File Type:data
Stream Size:485
Entropy:6.301314382548745
Base64 Encoded:True
Data ASCII:. . . . . . . . . . 0 . . . . . . H . . . . . . . . . . . P r o j e c t . Q . ( . . @ . . . . . = . . . . l . . . . . . . . Z d - . . . " . < . . . . r s t d o . l e > . . s . t . . d . o . l . e . ( . . h . . ^ . . * \\ . G { 0 0 0 2 0 4 3 0 - . . . . C . . . . . 4 6 } # 2 . 0 # . 0 # C : \\ W i n . d o w s \\ s y s @ t e m 3 2 \\ . e 2 . . t l b # O L E . A u t o m a t . i o n . E N o r ( m a l E N C r . m . a F . . c E C . . . . . m . ! O f f i c g O . f . i . c g . . g 2 D F 8 D 0 . 4 C - 5 B F A -
Data Raw:01 e1 b1 80 01 00 04 00 00 00 03 00 30 aa 02 02 90 09 00 20 14 06 48 03 00 a8 80 00 00 e4 04 04 00 07 00 1c 00 50 72 6f 6a 65 63 74 05 51 00 28 00 00 40 02 14 06 02 14 3d ad 02 0a 07 02 6c 01 00 08 06 12 09 02 12 80 e1 5a f4 64 2d 00 0c 02 22 0a 3c 02 0a 16 02 72 73 74 64 6f 08 6c 65 3e 02 19 73 00 74 00 00 64 00 6f 00 6c 00 65 00 28 0d 00 68 00 11 5e 00 03 2a 5c 00 47 7b 30 30 30
TimestampSource PortDest PortSource IPDest IP
Aug 11, 2022 20:31:24.003114939 CEST4917380192.168.2.2245.8.146.139
Aug 11, 2022 20:31:27.020700932 CEST4917380192.168.2.2245.8.146.139
Aug 11, 2022 20:31:33.027293921 CEST4917380192.168.2.2245.8.146.139
Aug 11, 2022 20:31:45.046876907 CEST4917480192.168.2.2245.8.146.139
Aug 11, 2022 20:31:48.051424026 CEST4917480192.168.2.2245.8.146.139
Aug 11, 2022 20:31:54.058000088 CEST4917480192.168.2.2245.8.146.139
No statistics
Target ID:1
Start time:20:31:14
Start date:11/08/2022
Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
Wow64 process (32bit):false
Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
Imagebase:0x13fb50000
File size:1423704 bytes
MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

No disassembly