Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
[name removed] file 08.11.2022.doc

Overview

General Information

Sample Name:[name removed] file 08.11.2022.doc
Analysis ID:682773
MD5:4f487d329bcf514575a0c8e5a4dcb53f
SHA1:52d9885233394acffdda1ea3a40989a8b47e9e34
SHA256:d66a64e64a1d1b44ebcc854f04b1e175ccc93b61fff0f093394f6dcdcd785d82
Tags:BokbotdocIcedIDmacrosMonsterLibraShathakTA551
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Multi AV Scanner detection for submitted file
Document contains an embedded VBA macro with suspicious strings
Machine Learning detection for sample
Potential document exploit detected (unknown TCP traffic)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Document contains an embedded VBA macro which executes code when the document is opened / closed
Document contains embedded VBA macros
IP address seen in connection with other malware
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 3024 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: [name removed] file 08.11.2022.docVirustotal: Detection: 26%Perma Link
Source: [name removed] file 08.11.2022.docReversingLabs: Detection: 20%
Source: [name removed] file 08.11.2022.docJoe Sandbox ML: detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49174 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49174 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49174 -> 45.8.146.139:80
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 45.8.146.139:80
Source: Joe Sandbox ViewIP Address: 45.8.146.139 45.8.146.139
Source: Joe Sandbox ViewIP Address: 45.8.146.139 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: unknownTCP traffic detected without corresponding DNS query: 45.8.146.139
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B8069478-C4CC-40B9-BD4E-9B7AFAD2CD15}.tmpJump to behavior

System Summary

barindex
Source: Screenshot number: 8Screenshot OCR: Enable editing" button on the top bar, and then click "Enable content". wa . ii: ^ ~ 1~m |YlV |
Source: Screenshot number: 8Screenshot OCR: Enable content". wa . ii: ^ ~ 1~m |YlV |1 _ : ' M 00 iaia"" A I Al
Source: [name removed] file 08.11.2022.docOLE, VBA macro line: Private Declare PtrSafe Function Lib "kernel32" Alias "VirtualProtect" (ByVal As LongPtr, ByVal As LongPtr, ByVal As LongPtr, As LongPtr) As LongPtr
Source: [name removed] file 08.11.2022.docOLE, VBA macro line: Set = CallByName((), npgPpULGF("YsUE6oJ"), VbGet, )
Source: [name removed] file 08.11.2022.docOLE, VBA macro line: Set = CallByName((npgPpULGF("ewBcGwHcnMjS")), npgPpULGF("pfHDkXNgN2AGD"), VbGet, npgPpULGF("ZI6xzcsqS"))
Source: [name removed] file 08.11.2022.docOLE, VBA macro line: Set = CallByName((), npgPpULGF("Kr6wNuyB"), VbGet, )
Source: ~DF6CFBAD2A09BF9CB5.TMP.0.drOLE, VBA macro line: Private Declare PtrSafe Function Lib "kernel32" Alias "VirtualProtect" (ByVal As LongPtr, ByVal As LongPtr, ByVal As LongPtr, As LongPtr) As LongPtr
Source: ~DF6CFBAD2A09BF9CB5.TMP.0.drOLE, VBA macro line: Set = CallByName((), npgPpULGF("YsUE6oJ"), VbGet, )
Source: ~DF6CFBAD2A09BF9CB5.TMP.0.drOLE, VBA macro line: Set = CallByName((npgPpULGF("ewBcGwHcnMjS")), npgPpULGF("pfHDkXNgN2AGD"), VbGet, npgPpULGF("ZI6xzcsqS"))
Source: ~DF6CFBAD2A09BF9CB5.TMP.0.drOLE, VBA macro line: Set = CallByName((), npgPpULGF("Kr6wNuyB"), VbGet, )
Source: [name removed] file 08.11.2022.docOLE, VBA macro line: Private Sub Document_Open()
Source: ~DF6CFBAD2A09BF9CB5.TMP.0.drOLE, VBA macro line: Private Sub Document_Open()
Source: [name removed] file 08.11.2022.docOLE indicator, VBA macros: true
Source: ~DF6CFBAD2A09BF9CB5.TMP.0.drOLE indicator, VBA macros: true
Source: ~WRF{18380C9C-2F99-4A16-B2DA-009158B58019}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: ~DF6CFBAD2A09BF9CB5.TMP.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: [name removed] file 08.11.2022.docVirustotal: Detection: 26%
Source: [name removed] file 08.11.2022.docReversingLabs: Detection: 20%
Source: [name removed] file 08.11.2022.LNK.0.drLNK file: ..\..\..\..\..\Desktop\[name removed] file 08.11.2022.doc
Source: [name removed] file 08.11.2022.docOLE indicator, Word Document stream: true
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$ame removed] file 08.11.2022.docJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR5955.tmpJump to behavior
Source: classification engineClassification label: mal64.expl.winDOC@1/11@0/1
Source: [name removed] file 08.11.2022.docOLE document summary: title field not present or empty
Source: [name removed] file 08.11.2022.docOLE document summary: author field not present or empty
Source: [name removed] file 08.11.2022.docOLE document summary: edited time not present or 0
Source: ~WRF{18380C9C-2F99-4A16-B2DA-009158B58019}.tmp.0.drOLE document summary: title field not present or empty
Source: ~WRF{18380C9C-2F99-4A16-B2DA-009158B58019}.tmp.0.drOLE document summary: author field not present or empty
Source: ~WRF{18380C9C-2F99-4A16-B2DA-009158B58019}.tmp.0.drOLE document summary: edited time not present or 0
Source: ~DF6CFBAD2A09BF9CB5.TMP.0.drOLE document summary: title field not present or empty
Source: ~DF6CFBAD2A09BF9CB5.TMP.0.drOLE document summary: author field not present or empty
Source: ~DF6CFBAD2A09BF9CB5.TMP.0.drOLE document summary: edited time not present or 0
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: [name removed] file 08.11.2022.docInitial sample: OLE zip file path = docProps/custom.xml
Source: [name removed] file 08.11.2022.docStatic file information: File size 2316250 > 1048576
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll
Source: ~WRF{18380C9C-2F99-4A16-B2DA-009158B58019}.tmp.0.drInitial sample: OLE indicators vbamacros = False
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts12
Scripting
Path InterceptionPath Interception1
Masquerading
OS Credential Dumping1
File and Directory Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
Ingress Tool Transfer
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default Accounts1
Exploitation for Client Execution
Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)12
Scripting
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
[name removed] file 08.11.2022.doc27%VirustotalBrowse
[name removed] file 08.11.2022.doc20%ReversingLabsScript-Macro.Trojan.Amphitryon
[name removed] file 08.11.2022.doc100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\~DF6CFBAD2A09BF9CB5.TMP100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
45.8.146.139
unknownRussian Federation
44676VMAGE-ASRUfalse
Joe Sandbox Version:35.0.0 Citrine
Analysis ID:682773
Start date and time:2022-08-12 00:31:40 +02:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 7m 23s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:[name removed] file 08.11.2022.doc
Cookbook file name:defaultwindowsofficecookbook.jbs
Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
Run name:Without Instrumentation
Number of analysed new started processes analysed:4
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal64.expl.winDOC@1/11@0/1
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .doc
  • Adjust boot time
  • Enable AMSI
  • Found Word or Excel or PowerPoint or XPS Viewer
  • Attach to Office via COM
  • Scroll down
  • Close Viewer
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Report size getting too big, too many NtQueryAttributesFile calls found.
No simulations
No context
No context
No context
No context
No context
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:PNG image data, 380 x 526, 8-bit/color RGB, non-interlaced
Category:dropped
Size (bytes):79862
Entropy (8bit):7.9850226558494
Encrypted:false
SSDEEP:1536:3oqyPqib6IbiXmcfDBFdEU8yslk2ZGBlGUCk4+:3yqtImXmcbBFopLwlGDkH
MD5:F673388F14A0B0E6160D7E31FB8B27A7
SHA1:792480CA5B43D57E2A0A65466D77A294DA9D55C3
SHA-256:0D79507FBC5D3C1843F0584E92FFD8B8F2862B4AE569BEB934963B30185E6489
SHA-512:957C95FE8ED7DC213F027C59952F3F2AB5DFE6ED91944880D230AFC7B2B9EFFD812000FBF26CD6948DD3C478CB9B049C97405F6EBD4A86E3D10241DA3A0B692A
Malicious:false
Reputation:moderate, very likely benign file
Preview:.PNG........IHDR...|.........4.!... .IDATx...{#...9g...p...l.+....^x..[..'.....9...g.K.t7.0#...Ca....S..[o.:.N:.v.'......r...W...q.....!......q.CF.g..._.c.y........,.;9....6.._z...,./.....nt.../..g.t..._......._./.-......F......+mt.X.../...+...0:......./.^.{...b.}.`0.X,....V..|.8N0.$..\...@0....l.ZqB.+?_...fR}....%.\.....Y,.|A..r..Z..B~8..t.P.~.Cc[p.D.W.INn...f....5....c.If.V....Oh$Y...|....GI......q... .....u..../....b.`.0.L.@ 0.L..@(.......Ac..Rd...o............6~x..v..t.._...Ph6.E"...... .T..\_,..p..e.1.o......qf.uk/.km/w.Z..<...9.'.|>..B.PH.....K.J.8...$.;.|>g...A..3\..'._e....pX6x..(..m....Kc6...a.By;.P..R..M.u..p2.|....7..0V.kO..n...v#..|>.....pm.....B..$..-..h4:.N#..r..D"|n<...ak..`0.k.g....d@q..Cf<wk..oW.....5.....V.U.+$.*...?.2..r..6...}:=.e.j.I.)/....*....Y..t:.L.......vG.H...t.j....:..`0..FL.H$....d.P(..DB...j%.....g.Y..<??o.Z...t.....l.P(.r.X,&k..._.Fm>..Z....^.7...)...8.X.X,...t:..Dd-.{%......y.8.x<...h6..H$.H.\..`;[..O....(.....B
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:PNG image data, 440 x 440, 8-bit/color RGBA, non-interlaced
Category:dropped
Size (bytes):256215
Entropy (8bit):7.978353630345434
Encrypted:false
SSDEEP:6144:eAJt7vvFhw7UBHzZiKVixZs+63Jby+hvEaAWirPosx4gR:eAzDfhH1nVWh63J9mbxnR
MD5:C46CBD511D9669284EA364D93575B594
SHA1:3754D9E8FE6F6D2B9946215D7EAB1F27AFCF55DE
SHA-256:C79BCF4CCCFCAC32F26C892F6196BE3D299CEAA4DC157E633F73E470534B9F90
SHA-512:2D3FE353D3D3DBBF5671DD780E4B2ADD4E62F32291091CDBD3757DE3F2665A69A99CDD6987368DE1271A14BA3432B853D4A1B55226B07CABDB06AF31D4A302A3
Malicious:false
Reputation:low
Preview:.PNG........IHDR.............7......sRGB.........gAMA......a.....pHYs..!...!..........IDATx^....fGU..3.W...}......*$.a..1... .)aT.(*...h......tw..!.!. F....p..Q&....s.O.I..>........Ju..4..'.U..U..VU.s...9.-.~.!..+.R.8..2.S..2=..U..j[.g>..<....@....l..q.W....m..h.UO..+....,.q.c......+.....r-f.....=z..J.t...f]....n....'*..{.c.:@/.PQ.....A....6.C.I=..R.mo.W9.....OT.,....c1h.-5M..VT...2.q...to\Lk.k.E..6]c.........lE-..g.....*..z..Zz...e@/.qMg.R..'..m\..UZ..]..P.1Z.[..T...^..k.._..'.h.W...=...*2..U.m.6].5n...|.Y..=.7.WT..zeg......h.|.r..he.B".m\Qy=>H^....=z..0....5..>.....J.t..-.t$2.:2O..@.'z40K...5..r.o......k....ek.him...I....2...*..'...Z.^>C..+...%P.X..o....K.1 .a.=.^.3........3.Bo<.m[..6.Z~.h..+.....w...>..+.[$o.L..9>I.U..,..6.P.y_.l-...^N4Hz.e....+-.he..-Z........|.L......Iz.z.4.. ...g\...Lb.|E.S....ZT~O6i..'.\..|K.q".9.....V...gHTZ..h.J.hice.W..^?k.D...2...h.=.l_.....*V..W.6]...'.l.\........mj..D+.........^.0&.i.^uW~...k......%.J...2.
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:Composite Document File V2 Document, Cannot read section info
Category:dropped
Size (bytes):28672
Entropy (8bit):4.044278525969866
Encrypted:false
SSDEEP:384:3tNYE9HglrtKDDx601HttgYE9HglrtKDDx601F:3YSHglEfxR1HIYSHglEfxR1F
MD5:BE577BDFED5E76BDBF61EDD01145B47D
SHA1:803C41050CFFEE24C54266C329EBA52D8D1DCCD9
SHA-256:14C05B2AEA939D7A21F5DF9EC4FF3306A665579BAF3564B445934E848FE56720
SHA-512:0A80DD2AA807FD5AFCD0FE3E1A60D20CC3A1C386939A11FFA9ECDD12145CF063D0725C910759DBE4E2BE0DB3AAE00CF7B88E34815DEB7E72C5A265572ACF46A8
Malicious:false
Reputation:low
Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................(.......................................................................................................4...)...............................................*...+...,...-......./...0...1...2...3...5...6.......................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):1536
Entropy (8bit):2.1334198335541092
Encrypted:false
SSDEEP:12:DMlzfRLZRW4WZ1MFKuQ9cc3xn82l2kwkvOqe44ee4Fe4PllQeHkUZx/W4c:4LG1ND9Pxn820kQyeKeYueHKz
MD5:58591290AE843606AF0D6B57469A64EF
SHA1:C3E627CD8D44DF24D3B43BF0728705872B2D021C
SHA-256:BB1DA4F35C31DEC55F874526BCC7BF941BE529C1543A6AD93B606F52542D7BEF
SHA-512:25103E9352EA576E1C9BE49741A62FB8FB777598FB4AF8CDC823A3C0E1EE440A7F36A57D39301692EAE2335614BC30ABD8A7E162A80C99D0C37C3A1D244FED45
Malicious:false
Reputation:low
Preview:.././...T.h.i.s. .d.o.c.u.m.e.n.t. .c.r.e.a.t.e.d. .i.n. .p.r.e.v.i.o.u.s. .v.e.r.s.i.o.n. .o.f. .M.i.c.r.o.s.o.f.t. .O.f.f.i.c.e. .W.o.r.d.....T.o. .v.i.e.w. .o.r. .e.d.i.t. .t.h.i.s. .d.o.c.u.m.e.n.t.,. .p.l.e.a.s.e. .c.l.i.c.k. .. E.n.a.b.l.e. .e.d.i.t.i.n.g.. .b.u.t.t.o.n. .o.n. .t.h.e. .t.o.p. .b.a.r.,. .a.n.d. .t.h.e.n. .c.l.i.c.k. .. E.n.a.b.l.e. .c.o.n.t.e.n.t.. ..........................................................................................................................................................z.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):1024
Entropy (8bit):0.05390218305374581
Encrypted:false
SSDEEP:3:ol3lYdn:4Wn
MD5:5D4D94EE7E06BBB0AF9584119797B23A
SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
Malicious:false
Reputation:high, very likely benign file
Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:Composite Document File V2 Document, Cannot read section info
Category:dropped
Size (bytes):60928
Entropy (8bit):4.162615001147003
Encrypted:false
SSDEEP:768:5RxbVWcydujuVk1TcJ4dUMRBu7E3glEmDJWzGv5a5rOKz6GPaF:/+cNjuVk1AOdUMRBypSG45y86GPaF
MD5:33A72769C270E0A464B6E2B6E70CE589
SHA1:2112F567CA27158DF1F1C9E1EC5D0CA8B1B645C4
SHA-256:C866D6168A6D1386BC7AC68FD8B5CF65823BBE2C25E007096BD6226C0F061891
SHA-512:9D6DCD7FC9ADC8155C233BBEDBDA16DBD979E68253F2315944A78485014E2FAFBBD352B785A0D70450168444011DD560F6730B741A51C96042C3AB92E816854B
Malicious:true
Antivirus:
  • Antivirus: Joe Sandbox ML, Detection: 100%
Preview:......................>...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................T...........(........................................................................................................... ...!..."...#...$...%...&...'.......)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:.......<...=...>...?...@...I...B...C...D...E...F...G...H...;...J...K...L...M...N...O...P...Q...R...S.......i...V...W...X...Y...Z...^...\...].......j...`.......b...c...d...e...f...g...h...[.......k...l...u...n...o...p...q...r...s...t..._.......................
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:53 2022, mtime=Tue Mar 8 15:45:53 2022, atime=Fri Aug 12 06:33:12 2022, length=2316250, window=hide
Category:dropped
Size (bytes):1114
Entropy (8bit):4.582576884181449
Encrypted:false
SSDEEP:12:8sVvsu0gXg/XAlCPCHaXRBktB/eLX+WnzTR/xgihNicvbLy6p9Ne3DtZ3YilMME9:8iQ/XThOMNfR/xfh0eK69M3Dv3qau7D
MD5:C3DF3A18815F1C3539BAB43AFFAA9EB1
SHA1:4BF99C6709F6F5907C7070DF6715017AC07CBF2A
SHA-256:F74224EF9C3438E662B26F889570E4D82F92045AF1541BFBE019444A94938B73
SHA-512:80618505602701593434A2404DD9A6868639A72769DA5670BE88FCD29016688D85D28927708995DB4A579549B0E3DB1563D27A87CC809F07963A938F52E218DB
Malicious:false
Preview:L..................F.... ........3.......3...K.......W#..........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1.....hT....user.8......QK.XhT..*...&=....U...............A.l.b.u.s.....z.1.....hT....Desktop.d......QK.XhT..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2..W#..U'< ._NAMER~1.DOC..r......hT..hT..*...r.....'...............[.n.a.m.e. .r.e.m.o.v.e.d.]. .f.i.l.e. .0.8...1.1...2.0.2.2...d.o.c.......................-...8...[............?J......C:\Users\..#...................\\179605\Users.user\Desktop\[name removed] file 08.11.2022.doc.9.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.[.n.a.m.e. .r.e.m.o.v.e.d.]. .f.i.l.e. .0.8...1.1...2.0.2.2...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):111
Entropy (8bit):4.681898743278708
Encrypted:false
SSDEEP:3:bDuMJlmZMY9omX10EIDMY9ov:bC/p9stp9y
MD5:9BC76A86E561F0AD5CCCC2B07508F10A
SHA1:A3A8922B60793BC5016BEFB8F64F66C0EFF3E9E3
SHA-256:05A0762C3D99AE2CB2ACDC936A53CF2B33F963E3F114BEF75DA728AE68F5E91C
SHA-512:B7EBDCAA5085B9723A4A340DE4C805C3034DDD07C73CC9678D774737AF16800A07CD152AEAE049D4294D733BBD12D9E72F1FBD4608E3302BB9E06B13EDB601DA
Malicious:false
Preview:[folders]..Templates.LNK=0..[name removed] file 08.11.2022.LNK=0..[doc]..[name removed] file 08.11.2022.LNK=0..
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):162
Entropy (8bit):2.503835550707525
Encrypted:false
SSDEEP:3:vrJlaCkWtVyaJybdJylp2bG/WWNJbilFGUld/ln:vdsCkWtz8Oz2q/rViXdH/l
MD5:7CFA404FD881AF8DF49EA584FE153C61
SHA1:32D9BF92626B77999E5E44780BF24130F3D23D66
SHA-256:248DB6BD8C5CD3542A5C0AE228D3ACD6D8A7FA0C0C62ABC3E178E57267F6CCD7
SHA-512:F7CEC1177D4FF3F84F6F2A2A702E96713322AA56C628B49F728CD608E880255DA3EF412DE15BB58DF66D65560C03E68BA2A0DD6FDFA533BC9E428B0637562AEA
Malicious:false
Preview:.user..................................................A.l.b.u.s.............p........1h..............2h.............@3h..............3h.....z.......p4h.....x...
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:Little-endian UTF-16 Unicode text, with no line terminators
Category:dropped
Size (bytes):2
Entropy (8bit):1.0
Encrypted:false
SSDEEP:3:Qn:Qn
MD5:F3B25701FE362EC84616A93A45CE9998
SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
Malicious:false
Preview:..
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):162
Entropy (8bit):2.503835550707525
Encrypted:false
SSDEEP:3:vrJlaCkWtVyaJybdJylp2bG/WWNJbilFGUld/ln:vdsCkWtz8Oz2q/rViXdH/l
MD5:7CFA404FD881AF8DF49EA584FE153C61
SHA1:32D9BF92626B77999E5E44780BF24130F3D23D66
SHA-256:248DB6BD8C5CD3542A5C0AE228D3ACD6D8A7FA0C0C62ABC3E178E57267F6CCD7
SHA-512:F7CEC1177D4FF3F84F6F2A2A702E96713322AA56C628B49F728CD608E880255DA3EF412DE15BB58DF66D65560C03E68BA2A0DD6FDFA533BC9E428B0637562AEA
Malicious:false
Preview:.user..................................................A.l.b.u.s.............p........1h..............2h.............@3h..............3h.....z.......p4h.....x...
File type:Zip archive data, at least v2.0 to extract
Entropy (8bit):7.993668516736907
TrID:
  • Word Microsoft Office Open XML Format document (49504/1) 49.01%
  • Word Microsoft Office Open XML Format document (43504/1) 43.07%
  • ZIP compressed archive (8000/1) 7.92%
File name:[name removed] file 08.11.2022.doc
File size:2316250
MD5:4f487d329bcf514575a0c8e5a4dcb53f
SHA1:52d9885233394acffdda1ea3a40989a8b47e9e34
SHA256:d66a64e64a1d1b44ebcc854f04b1e175ccc93b61fff0f093394f6dcdcd785d82
SHA512:2fbe8609658dc2caa3a9e74227b69e1fd52fb86482794881d4f61cb635536f961f78b93cf73d4d387c8717e10d1232aa6ceac68c0d7a7f8de190743ebf832b1e
SSDEEP:49152:TnxBpMvUTIyOgNz8bc10IsulzqMy44elEAU33SapcOnaT54Z1+bBOz:TxBpMavFNzUcuIsul+d44e1y3VIV4rY2
TLSH:36B533B0C86EBA19CA01AD3389D3546E35ABD427FB3D5C478053890B76DB558FEE2881
File Content Preview:PK..........!..U~............._rels/.rels...J.@............4.E..D.....$....T..w-..j........|.zs..z..z.*X.%(v......6O.{PI........`S__._x .C..CR....:....t..R......hI.3..H.Q..*.;..=..y... n.......yo.......[vrf..A..6..3[.>_...-K....\NH!....<..r...E.B..P...<_.
Icon Hash:e4eea2aaa4b4b4a4
Document Type:OpenXML
Number of OLE Files:1
Has Summary Info:
Application Name:
Encrypted Document:False
Contains Word Document Stream:True
Contains Workbook/Book Stream:False
Contains PowerPoint Document Stream:False
Contains Visio Document Stream:False
Contains ObjectPool Stream:False
Flash Objects Count:0
Contains VBA Macros:True
General
Stream Path:VBA/ThisDocument
VBA File Name:ThisDocument.cls
Stream Size:2846
Data ASCII:. n . A t t r i b u t . e V B _ N a m . e = " T h i . s D o c u m e n . t " . . . B a s . . 1 N o r m a l . . . V G l o b a l ! . S p a c . l F a . l s e . J C r e a . t a b l . . P r e d e c l a . . I d . . # T r u . " E x p . o s e . . T e m p . l a t e D e r i . v . $ C u s t o m l i z C . P . . . . . D . ? P t r S a . f e F u n c t . i o n . . L i b . " u s e r 3 2 " . A l i a s " . K i l l T i m e . r " ( B y V a x l . . . . . . . . A s L o n g , , . . . . . . / . . .
Data Raw:01 6e b4 00 41 74 74 72 69 62 75 74 00 65 20 56 42 5f 4e 61 6d 00 65 20 3d 20 22 54 68 69 00 73 44 6f 63 75 6d 65 6e 10 74 22 0d 0a 0a 8c 42 61 73 01 02 8c 31 4e 6f 72 6d 61 6c 02 2e 19 56 47 6c 6f 62 61 6c 21 01 aa 53 70 61 63 01 6c 46 61 08 6c 73 65 0c 4a 43 72 65 61 10 74 61 62 6c 15 1f 50 72 65 20 64 65 63 6c 61 00 06 49 64 11 00 23 54 72 75 0d 22 45 78 70 08 6f 73 65 14 1c 54

General
Stream Path:PROJECT
File Type:ASCII text, with CRLF line terminators
Stream Size:369
Entropy:5.262779644813546
Base64 Encoded:True
Data ASCII:I D = " { B 3 5 A B 5 D 0 - 1 5 B 8 - 4 F 3 3 - 8 D A 0 - 8 E D B C A 2 B 4 B 0 A } " . . D o c u m e n t = T h i s D o c u m e n t / & H 0 0 0 0 0 0 0 0 . . N a m e = " P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " 8 5 8 7 9 4 1 D 9 C A 6 A 0 A 6 A 0 A 6 A 0 A 6 A 0 " . . D P B = " 0 A 0 8 1 B 9 C A 1 9 D A 1 9 D A 1 " . . G C = " 8 F 8 D 9 E 1 B A 6 2 5 2 A 2 6 2 A 2 6 D 5 " . . . . [ H o s t E x t e n d e r I n f
Data Raw:49 44 3d 22 7b 42 33 35 41 42 35 44 30 2d 31 35 42 38 2d 34 46 33 33 2d 38 44 41 30 2d 38 45 44 42 43 41 32 42 34 42 30 41 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 44 6f 63 75 6d 65 6e 74 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 4e 61 6d 65 3d 22 50 72 6f 6a 65 63 74 22 0d 0a 48 65 6c 70 43 6f 6e 74 65 78 74 49 44 3d 22 30 22 0d 0a 56 65 72 73 69 6f 6e 43 6f 6d 70 61 74 69
General
Stream Path:PROJECTwm
File Type:data
Stream Size:41
Entropy:3.0773844850752607
Base64 Encoded:False
Data ASCII:T h i s D o c u m e n t . T . h . i . s . D . o . c . u . m . e . n . t . . . . .
Data Raw:54 68 69 73 44 6f 63 75 6d 65 6e 74 00 54 00 68 00 69 00 73 00 44 00 6f 00 63 00 75 00 6d 00 65 00 6e 00 74 00 00 00 00 00
General
Stream Path:VBA/_VBA_PROJECT
File Type:ISO-8859 text, with no line terminators
Stream Size:7
Entropy:1.8423709931771088
Base64 Encoded:False
Data ASCII:a . . .
Data Raw:cc 61 ff ff 00 00 00
General
Stream Path:VBA/__SRP_2
File Type:data
Stream Size:5116
Entropy:1.9231245259582155
Base64 Encoded:False
Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . P . . . . . . . . . . . " . . . . . . . . . . . . . . . q . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A . . . . . . . . . . . . . . . ` . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ` ) " . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Data Raw:72 55 40 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 03 00 50 00 00 00 00 00 00 00 00 00 00 00 22 00 1f 00 00 00 00 00 01 00 01 00 00 00 01 00 71 07 00 00 00 00 00 00 00 00 00 00 a1 07 00 00 00 00 00 00 00 00 00 00 d1 07
General
Stream Path:VBA/__SRP_3
File Type:data
Stream Size:2724
Entropy:2.6915430960066646
Base64 Encoded:False
Data ASCII:r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . P . . . . . . . . . . . . . . . p . . . . . . . . . . . . . . . . . 1 . . . . . . . . . . . . . . . . . . . . . ` . 1 . . . . . . . . . . . , . . p . . . . . . q . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . a . . . . . . . . . . . . . . . . . . . . . . . . . ` . . . . . . . . . . . . X . . p . . . . . . . . . . . . . . . . . . . . . . . . . .
Data Raw:72 55 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 02 00 ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 78 00 00 00 08 00 50 00 b1 08 00 00 00 00 00 00 00 00 00 00 00 00 04 70 08 00 fe ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00
General
Stream Path:VBA/dir
File Type:data
Stream Size:486
Entropy:6.292426243264921
Base64 Encoded:True
Data ASCII:. . . . . . . . . . 0 . . . . . . H . . . . . . . . . . . P r o j e c t . Q . ( . . @ . . . . . = . . . . l . . . . . . . . A P d - . . . " . < . . . . r s t d o . l e > . . s . t . . d . o . l . e . ( . . h . . ^ . . * \\ . G { 0 0 0 2 0 4 3 0 - . . . . C . . . . . 4 6 } # 2 . 0 # . 0 # C : \\ W i n . d o w s \\ s y s @ t e m 3 2 \\ . e 2 . . t l b # O L E . A u t o m a t . i o n . E N o r ( m a l E N C r . m . a F . . c E C . . . . > m . ! O f f i c g O . f . i . c g . . g 2 D F 8 D 0 . 4 C - 5 B F A
Data Raw:01 e2 b1 80 01 00 04 00 00 00 03 00 30 aa 02 02 90 09 00 20 14 06 48 03 00 a8 80 00 00 e4 04 04 00 07 00 1c 00 50 72 6f 6a 65 63 74 05 51 00 28 00 00 40 02 14 06 02 14 3d ad 02 0a 07 02 6c 01 00 08 06 12 09 02 12 80 41 50 f4 64 2d 00 0c 02 22 0a 3c 02 0a 16 02 72 73 74 64 6f 08 6c 65 3e 02 19 73 00 74 00 00 64 00 6f 00 6c 00 65 00 28 0d 00 68 00 11 5e 00 03 2a 5c 00 47 7b 30 30 30
TimestampSource PortDest PortSource IPDest IP
Aug 12, 2022 00:32:34.987915039 CEST4917380192.168.2.2245.8.146.139
Aug 12, 2022 00:32:37.989743948 CEST4917380192.168.2.2245.8.146.139
Aug 12, 2022 00:32:44.011934042 CEST4917380192.168.2.2245.8.146.139
Aug 12, 2022 00:32:56.026377916 CEST4917480192.168.2.2245.8.146.139
Aug 12, 2022 00:32:59.035943985 CEST4917480192.168.2.2245.8.146.139
Aug 12, 2022 00:33:05.042634964 CEST4917480192.168.2.2245.8.146.139
No statistics
Target ID:0
Start time:00:33:13
Start date:12/08/2022
Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
Wow64 process (32bit):false
Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
Imagebase:0x13f340000
File size:1423704 bytes
MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

No disassembly