Create Interactive Tour

Windows Analysis Report
SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.4112.8731.rtf

Overview

General Information

Sample Name:SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.4112.8731.rtf
Analysis ID:1266649
MD5:f0a7729bda6a95e7a0d9c1b6804e7e9f
SHA1:aed6edb5380af3864621231846548bf2bb6c0762
SHA256:7962acb951893a7f53511cba33f4cca6d8fa3da3a7e7a622d148827687327dca
Tags:CVE-2017-11882rtf
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara signature match
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • WINWORD.EXE (PID: 7156 cmdline: "C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding MD5: 0B9AB9B9C4DE429473D6450D4297A123)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.4112.8731.rtfINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x4a72:$obj2: \objdata
  • 0x4a5e:$obj3: \objupdate
  • 0x4a39:$obj5: \objautlink
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.4112.8731.rtfAvira: detected
Source: SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.4112.8731.rtfReversingLabs: Detection: 36%
Source: SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.4112.8731.rtfVirustotal: Detection: 50%Perma Link
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dllJump to behavior

System Summary

barindex
Source: SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.4112.8731.rtf, type: SAMPLEMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
Source: Screenshot number: 4Screenshot OCR: Enable editing") Rom the yellow bar ' aboveASSIGNMENTMCS 473: MARKETING MANAGEMENT & STRATEGYSTUDEN
Source: Screenshot number: 8Screenshot OCR: Enable editing") Rom the yellow bar ' aboveASSIGNMENTMCS 473: MARKETING MANAGEMENT & STRATEGYSTUDEN
Source: Screenshot number: 12Screenshot OCR: Enable editing") Rom the yellow bar ' aboveASSIGNMENTMCS 473: MARKETING MANAGEMENT & STRATEGYSTUDEN
Source: SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.4112.8731.rtf, type: SAMPLEMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
Source: ~WRF{4F04F7D1-0E50-4E05-8738-87B3D1BDF273}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.4112.8731.rtfReversingLabs: Detection: 36%
Source: SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.4112.8731.rtfVirustotal: Detection: 50%
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\{7250A7AA-F75F-46BB-97A7-D246248E22E6} - OProcSessId.datJump to behavior
Source: classification engineClassification label: mal72.winRTF@1/8@0/0
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.4112.8731.LNK.0.drLNK file: ..\..\..\..\..\Desktop\SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.4112.8731.rtf
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.WordJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguagesJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dllJump to behavior
Source: ~WRF{4F04F7D1-0E50-4E05-8738-87B3D1BDF273}.tmp.0.drInitial sample: OLE indicators vbamacros = False
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
Masquerading
OS Credential Dumping1
File and Directory Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1266649 Sample: SecuriteInfo.com.Exploit.RT... Startdate: 04/07/2023 Architecture: WINDOWS Score: 72 7 Malicious sample detected (through community Yara rule) 2->7 9 Antivirus / Scanner detection for submitted sample 2->9 11 Multi AV Scanner detection for submitted file 2->11 13 Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros) 2->13 5 WINWORD.EXE 19 21 2->5         started        process3

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.4112.8731.rtf37%ReversingLabsDocument-RTF.Exploit.CVE-2017-11882
SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.4112.8731.rtf51%VirustotalBrowse
SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.4112.8731.rtf100%AviraHEUR/Rtf.Malformed
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox Version:38.0.0 Beryl
Analysis ID:1266649
Start date and time:2023-07-04 15:42:44 +02:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 5m 10s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:1
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample file name:SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.4112.8731.rtf
Detection:MAL
Classification:mal72.winRTF@1/8@0/0
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .rtf
  • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
No simulations
No context
No context
No context
No context
No context
Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
File Type:Composite Document File V2 Document, Cannot read section info
Category:dropped
Size (bytes):16384
Entropy (8bit):1.6010265186054569
Encrypted:false
SSDEEP:48:rYPDOTNQcx5T5NEWpa28O51LPuVSqaQAs0b:cPDOzPAzU96S1
MD5:B76C0AB5D4328935859FD1682D5C7A2F
SHA1:C3979FD05BD1C58C4C73DE8BCF91F76C9FEFCCCD
SHA-256:E831E648630A0F9F991E2F9A68E8CE7F5A184C9F05256383E3CC8760A8A91AD1
SHA-512:A587AAF8DB0E45434B78A7B8DA691908F3D61FD71470169D2591152D2EDB359DBE1D1EAA7A5DE3061038CAF3D7B479FBAF7FA74653A75A5297DB42563876C313
Malicious:false
Reputation:low
Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):38912
Entropy (8bit):3.560716336298844
Encrypted:false
SSDEEP:768:Ws0SCWiMuz1rqAyLt+eqViz9yCFcEhZVsfYxLzI4MNj:+DvwxKrK2fY4j
MD5:D662438B546409348D454061CB8A01C8
SHA1:F1B989DBE27A5C3FE7D219032402154FCD8AA780
SHA-256:7021570FFA7435D50C4040782DF5573657E28F7568C694261C6B34A31C180523
SHA-512:BC11B344F35E875E0DA4B5D9061B2D5A66C0E0E24353CA8234F8469CFBD0842981643B3E268B6A3EB613EAFB53ACD0A29BADA8EC569B850F5B9E995489D0F065
Malicious:false
Reputation:low
Preview:........5.3.4.7.3.6.7.1.D.o.c.u.m.e.n.t. .c.r.e.a.t.e.d. .i.n. .e.a.r.l.i.e.r. .v.e.r.s.i.o.n. .m.i.c.r.o.s.o.f.t. .o.f.f.i.c.e. .w.o.r.d...T.o. .v.i.e.w. .o.r. .e.d.i.t. .t.h.i.s. .d.o.c.u.m.e.n.t.,. .p.l.e.a.s.e. .c.l.i.c.k. .(.".E.n.a.b.l.e. .e.d.i.t.i.n.g.".). .f.r.o.m. .t.h.e. .y.e.l.l.o.w. .b.a.r. .a.b.o.v.e.A.S.S.I.G.N.M.E.N.T.M.C.S. .4.7.3.:. .M.A.R.K.E.T.I.N.G. .M.A.N.A.G.E.M.E.N.T. .&. .S.T.R.A.T.E.G.Y.S.T.U.D.E.N.T. .N.A.M.E.:. .F.r.a.n.k. .H.u.t.t.o.n.S.T.U.D.E.N.T. .N.o.:. .2.0.7.2.4.4.1.4.I.N.D.E.X. .N.o.:. .5.0.5.6.1.2.0.C.E.N.T.R.E.:. .G.R.E.E.N.F.I.E.L.D.S.1... .i... .G.u.e.r.i.l.l.a. .m.a.r.k.e.t.i.n.g. .s.t.r.a.t.e.g.y. .r.e.f.e.r.s. .t.o. .a. .s.u.r.p.r.i.s.i.n.g. .a.d.v.e.r.t.i.s.i.n.g. .s.t.r.a.t.e.g.y. .a.n.d. .w.i.t.h. .u.n.c.o.n.v.e.n.t.i.o.n.a.l. .i.n.t.e.r.a.c.t.i.o.n.s. .t.o. .p.r.o.m.o.t.e. .t.h.e. .p.r.o.d.u.c.t.s. .a.n.d. .s.e.r.v.i.c.e.s... .G.u.e.r.i.l.l.a. .m.a.r.k.e.t.i.n.g. .s.t.r.a.t.e.g.y. .i.s. .p.u.b.l.i.c.i.t.y. .p.r.a.c.t.i.c.e.s.,. .l.o.w.-.c.
Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):1024
Entropy (8bit):0.05390218305374581
Encrypted:false
SSDEEP:3:ol3lYdn:4Wn
MD5:5D4D94EE7E06BBB0AF9584119797B23A
SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
Malicious:false
Reputation:high, very likely benign file
Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Aug 16 12:43:28 2022, mtime=Tue Jul 4 12:43:48 2023, atime=Tue Jul 4 12:43:45 2023, length=37871, window=hide
Category:dropped
Size (bytes):1270
Entropy (8bit):4.710405881392672
Encrypted:false
SSDEEP:24:8tP3LPNc8mOsC7XyAvbE3pleHC7BD2eLek7aB6m:8h3zNcWsCVvYHeHCnqhB6
MD5:63468A18C0035EDD9F81A041773CD5D8
SHA1:054CD29A363A05C2E522BEBB3D237349B6675268
SHA-256:52A660A31881A8428F7044165364E663B0C4878A0055B82E2A711C34905C7BCB
SHA-512:002C31D17D8D3FCA74B49F6B1918A4D92389278576836D6EE4D102F048FED8A208F49CB3C75753A9351399943FB5558705CA10FB9B9F0E563BB60044BA8AB1DF
Malicious:false
Reputation:low
Preview:L..................F.... ....%L*v...<.*.}....7`.}..........................5....P.O. .:i.....+00.../C:\...................x.1......N....Users.d......L...Vqm....................:......;..U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....P.1......Upm..user.<.......N...Vqm....#J........................j.o.n.e.s.....~.1......Uqm..Desktop.h.......N...Vqm.....Y..............>.......D.D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2.....Vwm .SECURI~1.RTF..........Uom.Vwm.........................A..S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...E.x.p.l.o.i.t...R.T.F.-.O.b.f.s.O.b.j.D.a.t...G.e.n...4.1.1.2...8.7.3.1...r.t.f.......................-.......~...........>.S......C:\Users\user\Desktop\SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.4112.8731.rtf..P.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...E.x.p.l.o.i.t...R.T.F.-.O.b.f.s.O.b.j.D.a.t...G.e.n...4.1.1.2...8.7.3.1...r.t.f.........:..,.LB.)...As...`.......X.......562258...........!a..%.H
Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):164
Entropy (8bit):5.248362777601857
Encrypted:false
SSDEEP:3:bDuMJluscbcTahRFplMCmxWIMov8bcTahRFplMCv:bCVwTmRFplMH8wTmRFplMs
MD5:2F3E53A31E328338EDF9FEA2E1AD8B2D
SHA1:418DDED84AFF39E885E6949D2CE6A3C1C656A642
SHA-256:0FD7009AE78885971E7E0F791A949F5E0A0B366EC14B515DEDE47DF6DB3349EB
SHA-512:2A107144EB77F6BB2124717C22A578ACC57B06B909D517A9446AC229C309A37C0ECEBAF766E32DC4A9E8E78EE0F448425B1B96B3B11B8CBA2087C620E84A1E7E
Malicious:false
Reputation:low
Preview:[folders]..Templates.LNK=0..SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.4112.8731.LNK=0..[misc??????]..SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.4112.8731.LNK=0..
Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):162
Entropy (8bit):3.071081619832247
Encrypted:false
SSDEEP:3:Rl/ZdOAJ59lqKDAgnNqmMg6IQLllt:RtZSYAGsTl
MD5:7CA2729B0CAE5BBCDD5609F71B31F997
SHA1:792D403EE50ED907FEFE7EAB896BD1BA8D29E6D3
SHA-256:D9A21F785D8DA0DC95D1231D32FF490AF206E08C4452037CE4542D3CF0FE51E6
SHA-512:35473F82526037D9E690A81C30BE978A7C82B73947EC62A205675D585F72792686562BA968335DC3E0E0110243BFCACB77570C5A9466D99328CB86750A2803D1
Malicious:false
Reputation:low
Preview:.pratesh................................................p.r.a.t.e.s.h..........e.{............$.......6C.......e.{.....^.i@..iT..i`..iDB.iZR.i.e.{............H...
Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:modified
Size (bytes):20
Entropy (8bit):2.8954618442383215
Encrypted:false
SSDEEP:3:QVNliGn:Q9rn
MD5:C4F79900719F08A6F11287E3C7991493
SHA1:754325A769BE6ECCC664002CD8F6BDB0D0B8CA4D
SHA-256:625CA96CCA65A363CC76429804FF47520B103D2044BA559B11EB02AB7B4D79A8
SHA-512:0F3C498BC7680B4C9167F790CC0BE6C889354AF703ABF0547F87B78FEB0BAA9F5220691DF511192B36AD9F3F69E547E6D382833E6BC25CDB4CD2191920970C5F
Malicious:false
Preview:..p.r.a.t.e.s.h.....
Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):162
Entropy (8bit):3.071081619832247
Encrypted:false
SSDEEP:3:Rl/ZdOAJ59lqKDAgnNqmMg6IQLllt:RtZSYAGsTl
MD5:7CA2729B0CAE5BBCDD5609F71B31F997
SHA1:792D403EE50ED907FEFE7EAB896BD1BA8D29E6D3
SHA-256:D9A21F785D8DA0DC95D1231D32FF490AF206E08C4452037CE4542D3CF0FE51E6
SHA-512:35473F82526037D9E690A81C30BE978A7C82B73947EC62A205675D585F72792686562BA968335DC3E0E0110243BFCACB77570C5A9466D99328CB86750A2803D1
Malicious:false
Preview:.pratesh................................................p.r.a.t.e.s.h..........e.{............$.......6C.......e.{.....^.i@..iT..i`..iDB.iZR.i.e.{............H...
File type:Rich Text Format data, version 1
Entropy (8bit):4.857786995939398
TrID:
  • Poser pose (12501/1) 58.12%
  • Rich Text Format (5005/1) 23.27%
  • Rich Text Format (4004/1) 18.61%
File name:SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.4112.8731.rtf
File size:37'871 bytes
MD5:f0a7729bda6a95e7a0d9c1b6804e7e9f
SHA1:aed6edb5380af3864621231846548bf2bb6c0762
SHA256:7962acb951893a7f53511cba33f4cca6d8fa3da3a7e7a622d148827687327dca
SHA512:d2d113d30b0ca563598152ebb705fef2b68cc0173e071e67835bac67313c91f3fc94dc655087b7b8d44fad40a7b266709ad0f4a8ff28e8947857c1869c374b29
SSDEEP:768:vFx0XaIsnPRIa4fwJMrd9yUVj57Qtcay3ER7mE5v8kCLyYw4w6RtLFx:vf0Xvx3EMreUVj57QKay3E9mcv8kCjwi
TLSH:E4035E5AE78F02648F811277531B0E8996BDB23EB35155B1786C833433EDC3E4666ABC
File Content Preview:{\rtf1......{\*\mvertJc11406834 \!}.{\153473671Document created in earlier version microsoft office word.To view or edit this document, please click ("Enable editing") from the yellow bar aboveASSIGNMENTMCS 473: MARKETING MANAGEMENT & STRATEGYSTUDENT NAME
Icon Hash:39f5a98c818aacb3
IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
000004A7Chno
No network behavior found
050100s020406080100

Click to jump to process

050100s0.0020406080MB

Click to jump to process

  • File
  • Registry

Click to dive into process behavior distribution

Target ID:0
Start time:15:43:45
Start date:04/07/2023
Path:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
Wow64 process (32bit):true
Commandline:"C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
Imagebase:0x12a0000
File size:1'937'688 bytes
MD5 hash:0B9AB9B9C4DE429473D6450D4297A123
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

No disassembly