Windows Analysis Report
icRTA4gcSe

Overview

General Information

Sample Name: icRTA4gcSe (renamed file extension from none to docx)
Analysis ID: 685945
MD5: 9873ccaccab0237bf533324f69dff3b3
SHA1: 29d098d9ddf7e425413817089beb2eb14c91bc64
SHA256: 05625644a2e070d4780822daf7126f408ec0db9881a9995dc24ee500b624a198
Infos:

Detection

Follina CVE-2022-30190
Score: 88
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Microsoft Office Exploit Follina CVE-2022-30190
Malicious sample detected (through community Yara rule)
Antivirus detection for dropped file
Contains an external reference to another file
Detected suspicious Microsoft Office reference URL
Yara signature match
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Uses insecure TLS / SSL version for HTTPS connection
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

AV Detection

barindex
Source: icRTA4gcSe.docx Avira: detected
Source: icRTA4gcSe.docx Virustotal: Detection: 47% Perma Link
Source: icRTA4gcSe.docx Metadefender: Detection: 28% Perma Link
Source: icRTA4gcSe.docx ReversingLabs: Detection: 61%
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E839A722.htm Avira: detection malicious, Label: JS/CVE-2022-30190.G
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EBAE70F4.htm Avira: detection malicious, Label: JS/CVE-2022-30190.G
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\fb0f9c45-fb5f-4690-9815-e11a762d4739[1].htm Avira: detection malicious, Label: JS/CVE-2022-30190.G

Exploits

barindex
Source: Yara match File source: sslproxydump.pcap, type: PCAP
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EBAE70F4.htm, type: DROPPED
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\fb0f9c45-fb5f-4690-9815-e11a762d4739[1].htm, type: DROPPED
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E839A722.htm, type: DROPPED
Source: document.xml.rels Extracted files from sample: https://sqdocs.s3.eu-west-2.amazonaws.com/fb0f9c45-fb5f-4690-9815-e11a762d4739.html!
Source: unknown HTTPS traffic detected: 3.5.246.192:443 -> 192.168.2.22:49174 version: TLS 1.0
Source: unknown HTTPS traffic detected: 52.95.148.170:443 -> 192.168.2.22:49183 version: TLS 1.0
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: unknown HTTPS traffic detected: 3.5.244.102:443 -> 192.168.2.22:49173 version: TLS 1.2
Source: unknown HTTPS traffic detected: 192.168.2.22:49186 -> 3.5.244.102:443 version: TLS 1.2
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 3.5.246.192:443
Source: global traffic TCP traffic: 3.5.246.192:443 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 3.5.246.192:443
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 3.5.246.192:443
Source: global traffic TCP traffic: 3.5.246.192:443 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 3.5.246.192:443 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 3.5.246.192:443
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 3.5.246.192:443
Source: global traffic TCP traffic: 3.5.246.192:443 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 3.5.246.192:443 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 3.5.246.192:443
Source: global traffic TCP traffic: 3.5.246.192:443 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 3.5.246.192:443 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 3.5.246.192:443 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 3.5.246.192:443
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 3.5.246.192:443
Source: global traffic TCP traffic: 3.5.246.192:443 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 3.5.246.192:443
Source: global traffic TCP traffic: 3.5.246.192:443 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49179 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49179
Source: global traffic TCP traffic: 192.168.2.22:49179 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49179 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49179
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49179
Source: global traffic TCP traffic: 192.168.2.22:49179 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49179 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49179
Source: global traffic TCP traffic: 192.168.2.22:49179 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49179
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49179
Source: global traffic TCP traffic: 192.168.2.22:49179 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49179
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49179
Source: global traffic TCP traffic: 192.168.2.22:49179 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49179
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49179
Source: global traffic TCP traffic: 192.168.2.22:49179 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49179 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49179
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49180
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49180
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49180
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49180
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49180
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49180
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49180
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49180
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49180
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49181
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49181
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49181
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49181
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49181
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49181
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49181
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49181
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49182
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49182
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49182
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49182
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49182
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49182
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49182
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49182
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49183 -> 52.95.148.170:443
Source: global traffic TCP traffic: 52.95.148.170:443 -> 192.168.2.22:49183
Source: global traffic TCP traffic: 192.168.2.22:49183 -> 52.95.148.170:443
Source: global traffic TCP traffic: 192.168.2.22:49183 -> 52.95.148.170:443
Source: global traffic TCP traffic: 52.95.148.170:443 -> 192.168.2.22:49183
Source: global traffic TCP traffic: 52.95.148.170:443 -> 192.168.2.22:49183
Source: global traffic TCP traffic: 192.168.2.22:49183 -> 52.95.148.170:443
Source: global traffic TCP traffic: 192.168.2.22:49183 -> 52.95.148.170:443
Source: global traffic TCP traffic: 52.95.148.170:443 -> 192.168.2.22:49183
Source: global traffic TCP traffic: 52.95.148.170:443 -> 192.168.2.22:49183
Source: global traffic TCP traffic: 192.168.2.22:49183 -> 52.95.148.170:443
Source: global traffic TCP traffic: 52.95.148.170:443 -> 192.168.2.22:49183
Source: global traffic TCP traffic: 52.95.148.170:443 -> 192.168.2.22:49183
Source: global traffic TCP traffic: 52.95.148.170:443 -> 192.168.2.22:49183
Source: global traffic TCP traffic: 192.168.2.22:49183 -> 52.95.148.170:443
Source: global traffic TCP traffic: 52.95.148.170:443 -> 192.168.2.22:49183
Source: global traffic TCP traffic: 192.168.2.22:49183 -> 52.95.148.170:443
Source: global traffic TCP traffic: 52.95.148.170:443 -> 192.168.2.22:49183
Source: global traffic TCP traffic: 192.168.2.22:49183 -> 52.95.148.170:443
Source: global traffic TCP traffic: 52.95.148.170:443 -> 192.168.2.22:49183
Source: global traffic TCP traffic: 192.168.2.22:49184 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49184
Source: global traffic TCP traffic: 192.168.2.22:49184 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49184 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49184
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49184
Source: global traffic TCP traffic: 192.168.2.22:49184 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49184 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49184
Source: global traffic TCP traffic: 192.168.2.22:49184 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49184
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49184
Source: global traffic TCP traffic: 192.168.2.22:49184 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49184
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49184
Source: global traffic TCP traffic: 192.168.2.22:49184 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49184 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49184 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49184
Source: global traffic TCP traffic: 192.168.2.22:49184 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49184 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49185 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49185
Source: global traffic TCP traffic: 192.168.2.22:49185 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49185 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49185
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49185
Source: global traffic TCP traffic: 192.168.2.22:49185 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49185 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49185
Source: global traffic TCP traffic: 192.168.2.22:49185 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49185
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49185
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49185
Source: global traffic TCP traffic: 192.168.2.22:49185 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49185 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49185 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49185
Source: global traffic TCP traffic: 192.168.2.22:49186 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49186
Source: global traffic TCP traffic: 192.168.2.22:49186 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49186 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49186
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49186
Source: global traffic TCP traffic: 192.168.2.22:49186 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49186 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49186
Source: global traffic TCP traffic: 192.168.2.22:49186 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49186
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49186
Source: global traffic TCP traffic: 192.168.2.22:49186 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49186
Source: global traffic TCP traffic: 192.168.2.22:49186 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49186
Source: global traffic TCP traffic: 192.168.2.22:49186 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49186 -> 3.5.244.102:443
Source: global traffic TCP traffic: 3.5.244.102:443 -> 192.168.2.22:49186
Source: global traffic TCP traffic: 192.168.2.22:49186 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49186 -> 3.5.244.102:443
Source: global traffic DNS query: name: sqdocs.s3.eu-west-2.amazonaws.com
Source: global traffic DNS query: name: sqdocs.s3.eu-west-2.amazonaws.com
Source: global traffic DNS query: name: sqdocs.s3.eu-west-2.amazonaws.com
Source: global traffic DNS query: name: sqdocs.s3.eu-west-2.amazonaws.com
Source: global traffic DNS query: name: sqdocs.s3.eu-west-2.amazonaws.com
Source: global traffic DNS query: name: sqdocs.s3.eu-west-2.amazonaws.com
Source: global traffic DNS query: name: sqdocs.s3.eu-west-2.amazonaws.com
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 3.5.246.192:443
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 3.5.246.192:443
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 3.5.246.192:443
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 3.5.246.192:443
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 3.5.246.192:443
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 3.5.246.192:443
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 3.5.246.192:443
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 3.5.246.192:443
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 3.5.246.192:443
Source: global traffic TCP traffic: 192.168.2.22:49179 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49179 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49179 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49179 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49179 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49179 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49179 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49179 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49179 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49179 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49183 -> 52.95.148.170:443
Source: global traffic TCP traffic: 192.168.2.22:49183 -> 52.95.148.170:443
Source: global traffic TCP traffic: 192.168.2.22:49183 -> 52.95.148.170:443
Source: global traffic TCP traffic: 192.168.2.22:49183 -> 52.95.148.170:443
Source: global traffic TCP traffic: 192.168.2.22:49183 -> 52.95.148.170:443
Source: global traffic TCP traffic: 192.168.2.22:49183 -> 52.95.148.170:443
Source: global traffic TCP traffic: 192.168.2.22:49183 -> 52.95.148.170:443
Source: global traffic TCP traffic: 192.168.2.22:49183 -> 52.95.148.170:443
Source: global traffic TCP traffic: 192.168.2.22:49183 -> 52.95.148.170:443
Source: global traffic TCP traffic: 192.168.2.22:49184 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49184 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49184 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49184 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49184 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49184 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49184 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49184 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49184 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49184 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49184 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49184 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49185 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49185 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49185 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49185 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49185 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49185 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49185 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49185 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49185 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49186 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49186 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49186 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49186 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49186 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49186 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49186 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49186 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49186 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49186 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49186 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49186 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49179 -> 3.5.244.102:443
Source: global traffic TCP traffic: 192.168.2.22:49184 -> 3.5.244.102:443
Source: global traffic HTTP traffic detected: GET /fb0f9c45-fb5f-4690-9815-e11a762d4739.html HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: sqdocs.s3.eu-west-2.amazonaws.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /fb0f9c45-fb5f-4690-9815-e11a762d4739.html HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: sqdocs.s3.eu-west-2.amazonaws.comIf-Modified-Since: Sat, 28 May 2022 14:15:08 GMTIf-None-Match: "bfbfa8fdda62476690c9077946372eaa"Connection: Keep-Alive
Source: Joe Sandbox View JA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
Source: Joe Sandbox View JA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
Source: unknown HTTPS traffic detected: 3.5.246.192:443 -> 192.168.2.22:49174 version: TLS 1.0
Source: unknown HTTPS traffic detected: 52.95.148.170:443 -> 192.168.2.22:49183 version: TLS 1.0
Source: unknown Network traffic detected: HTTP traffic on port 49184 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49185 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49179
Source: unknown Network traffic detected: HTTP traffic on port 49186 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49180 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49183 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49181 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49182 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49186
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49174
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49185
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49173
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49184
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49183
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49182
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49181
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49180
Source: unknown Network traffic detected: HTTP traffic on port 49173 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49174 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49179 -> 443
Source: ~WRF{855EAE4E-7E59-44E5-8AE0-040E73EE4059}.tmp.0.dr String found in binary or memory: https://sqdocs.s3.eu-west-2.am
Source: ~WRF{855EAE4E-7E59-44E5-8AE0-040E73EE4059}.tmp.0.dr String found in binary or memory: https://sqdocs.s3.eu-west-2.amazonaws.com/fb0f9c45-fb5f-4690-9815-e11a762d4739.html
Source: ~WRF{855EAE4E-7E59-44E5-8AE0-040E73EE4059}.tmp.0.dr String found in binary or memory: https://sqdocs.s3.eu-west-2.amazonaws.com/fb0f9c45-fb5f-4690-9815-e11a762d4739.htmlyX
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{CFED663A-BFB4-4992-A74D-FB6645F47512}.tmp Jump to behavior
Source: unknown DNS traffic detected: queries for: sqdocs.s3.eu-west-2.amazonaws.com
Source: global traffic HTTP traffic detected: GET /fb0f9c45-fb5f-4690-9815-e11a762d4739.html HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: sqdocs.s3.eu-west-2.amazonaws.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /fb0f9c45-fb5f-4690-9815-e11a762d4739.html HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: sqdocs.s3.eu-west-2.amazonaws.comIf-Modified-Since: Sat, 28 May 2022 14:15:08 GMTIf-None-Match: "bfbfa8fdda62476690c9077946372eaa"Connection: Keep-Alive
Source: unknown HTTPS traffic detected: 3.5.244.102:443 -> 192.168.2.22:49173 version: TLS 1.2
Source: unknown HTTPS traffic detected: 192.168.2.22:49186 -> 3.5.244.102:443 version: TLS 1.2

System Summary

barindex
Source: document.xml.rels, type: SAMPLE Matched rule: Detects XML relations where an OLE object is refrencing an external target in dropper OOXML documents Author: ditekSHen
Source: sslproxydump.pcap, type: PCAP Matched rule: SUSP_PS1_Msdt_Execution_May22 date = 2022-05-31, author = Nasreddine Bencherchali, Christian Burkard, description = Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, score = , reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, modified = 2022-07-08
Source: sslproxydump.pcap, type: PCAP Matched rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22 date = 2022-05-30, hash2 = 778cbb0ee4afffca6a0b788a97bc2f4855ceb69ddc5eaa230acfa2834e1aeb07, hash1 = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, score = , reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, modified = 2022-07-18
Source: document.xml.rels, type: SAMPLE Matched rule: SUSP_Doc_WordXMLRels_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, Wojciech Cieslak, description = Detects a suspicious pattern in docx document.xml.rels file as seen in CVE-2022-30190 / Follina exploitation, score = , reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, modified = 2022-06-20, hash = 62f262d180a5a48f89be19369a8425bec596bc6a02ed23100424930791ae3df0
Source: document.xml.rels, type: SAMPLE Matched rule: INDICATOR_OLE_RemoteTemplate author = ditekSHen, description = Detects XML relations where an OLE object is refrencing an external target in dropper OOXML documents
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EBAE70F4.htm, type: DROPPED Matched rule: SUSP_PS1_Msdt_Execution_May22 date = 2022-05-31, author = Nasreddine Bencherchali, Christian Burkard, description = Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, score = , reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, modified = 2022-07-08
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EBAE70F4.htm, type: DROPPED Matched rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22 date = 2022-05-30, hash2 = 778cbb0ee4afffca6a0b788a97bc2f4855ceb69ddc5eaa230acfa2834e1aeb07, hash1 = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, score = , reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, modified = 2022-07-18
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\fb0f9c45-fb5f-4690-9815-e11a762d4739[1].htm, type: DROPPED Matched rule: SUSP_PS1_Msdt_Execution_May22 date = 2022-05-31, author = Nasreddine Bencherchali, Christian Burkard, description = Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, score = , reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, modified = 2022-07-08
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\fb0f9c45-fb5f-4690-9815-e11a762d4739[1].htm, type: DROPPED Matched rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22 date = 2022-05-30, hash2 = 778cbb0ee4afffca6a0b788a97bc2f4855ceb69ddc5eaa230acfa2834e1aeb07, hash1 = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, score = , reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, modified = 2022-07-18
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E839A722.htm, type: DROPPED Matched rule: SUSP_PS1_Msdt_Execution_May22 date = 2022-05-31, author = Nasreddine Bencherchali, Christian Burkard, description = Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, score = , reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, modified = 2022-07-08
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E839A722.htm, type: DROPPED Matched rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22 date = 2022-05-30, hash2 = 778cbb0ee4afffca6a0b788a97bc2f4855ceb69ddc5eaa230acfa2834e1aeb07, hash1 = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, score = , reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, modified = 2022-07-18
Source: ~WRF{855EAE4E-7E59-44E5-8AE0-040E73EE4059}.tmp.0.dr OLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: icRTA4gcSe.docx Virustotal: Detection: 47%
Source: icRTA4gcSe.docx Metadefender: Detection: 28%
Source: icRTA4gcSe.docx ReversingLabs: Detection: 61%
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA Jump to behavior
Source: icRTA4gcSe.LNK.0.dr LNK file: ..\..\..\..\..\Desktop\icRTA4gcSe.docx
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File created: C:\Users\user\Desktop\~$RTA4gcSe.docx Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File created: C:\Users\user\AppData\Local\Temp\CVR5CBF.tmp Jump to behavior
Source: classification engine Classification label: mal88.expl.evad.winDOCX@1/18@7/3
Source: ~WRF{855EAE4E-7E59-44E5-8AE0-040E73EE4059}.tmp.0.dr OLE document summary: title field not present or empty
Source: ~WRF{855EAE4E-7E59-44E5-8AE0-040E73EE4059}.tmp.0.dr OLE document summary: author field not present or empty
Source: ~WRF{855EAE4E-7E59-44E5-8AE0-040E73EE4059}.tmp.0.dr OLE document summary: edited time not present or 0
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File read: C:\Users\desktop.ini Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: ~WRF{855EAE4E-7E59-44E5-8AE0-040E73EE4059}.tmp.0.dr Initial sample: OLE indicators vbamacros = False

Persistence and Installation Behavior

barindex
Source: document.xml.rels Extracted files from sample: https://sqdocs.s3.eu-west-2.amazonaws.com/fb0f9c45-fb5f-4690-9815-e11a762d4739.html!
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs