Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
UNDELIVERED_MAILS.doc

Overview

General Information

Sample Name:UNDELIVERED_MAILS.doc
Analysis ID:1307685
MD5:d76c8672638bc36617dfa2a84ee47e1a
SHA1:b32b3c50b37d764fc0c74da31f7f7cb60b715ebd
SHA256:b837356985ee9e1513bc8f6e05a0678df466a725d5b10ee593ee2b5d90897438
Tags:CVE-2017-11882doc
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Office Equation Editor has been started
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Potential document exploit detected (performs DNS queries)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 3028 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
  • EQNEDT32.EXE (PID: 1732 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • EQNEDT32.EXE (PID: 2712 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
UNDELIVERED_MAILS.docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x3f35:$obj1: \objhtml
  • 0x3f6e:$obj2: \objdata
  • 0x3f58:$obj3: \objupdate
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: UNDELIVERED_MAILS.docAvira: detected
Source: UNDELIVERED_MAILS.docReversingLabs: Detection: 50%
Source: UNDELIVERED_MAILS.docVirustotal: Detection: 57%Perma Link

Exploits

barindex
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: unknownJump to behavior
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: global trafficDNS query: name: link.hdmi.homes
Source: global trafficDNS query: name: link.hdmi.homes
Source: global trafficDNS query: name: link.hdmi.homes
Source: global trafficDNS query: name: link.hdmi.homes
Source: global trafficDNS query: name: link.hdmi.homes
Source: unknownDNS traffic detected: query: link.hdmi.homes replaycode: Name error (3)
Source: EQNEDT32.EXE, EQNEDT32.EXE, 00000002.00000002.377949099.000000000052F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://link.hdmi.homes/_errorpages/.%20./obizx.exe
Source: EQNEDT32.EXE, 00000002.00000002.377949099.000000000052F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://link.hdmi.homes/_errorpages/.%20./obizx.exeh?
Source: EQNEDT32.EXE, 00000002.00000002.377949099.000000000052F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://link.hdmi.homes/_errorpages/.%20./obizx.exej
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A8F38DEC-8B8E-4BC1-8754-686C1C861B8C}.tmpJump to behavior
Source: unknownDNS traffic detected: queries for: link.hdmi.homes

System Summary

barindex
Source: Screenshot number: 4Screenshot OCR: Enable editing from the yellow bar above.The independent auditors' opinion says the financial state
Source: UNDELIVERED_MAILS.doc, type: SAMPLEMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
Source: UNDELIVERED_MAILS.doc, type: SAMPLEMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 771D0000 page execute and read and writeJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 771D0000 page execute and read and writeJump to behavior
Source: UNDELIVERED_MAILS.docReversingLabs: Detection: 50%
Source: UNDELIVERED_MAILS.docVirustotal: Detection: 57%
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
Source: UNDELIVERED_MAILS.LNK.0.drLNK file: ..\..\..\..\..\Desktop\UNDELIVERED_MAILS.doc
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$DELIVERED_MAILS.docJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR7CFB.tmpJump to behavior
Source: classification engineClassification label: mal76.expl.winDOC@4/7@5/1
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0053E576 push esp; iretd 2_2_0053E5DB
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0054677E push esp; ret 2_2_0054677F
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0053A77C push eax; retf 2_2_0053A77D
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00538F60 push eax; retf 2_2_00538F61
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0054350D push esp; iretd 2_2_005442AF
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0054670E push edx; ret 2_2_0054670F
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0053E52C push esp; iretd 2_2_0053E5DB
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0053E5DD push esp; iretd 2_2_0053E623
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0053A5C0 push eax; retn 0053h2_2_0053A5C1
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0053A5C6 push esp; iretd 2_2_0053A5D3
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005448C3 push esp; ret 2_2_005448C7
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_005301F4 push eax; retf 2_2_005301F5
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00543FE0 push esp; iretd 2_2_005442AF
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00546784 push esp; ret 2_2_00546787
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0054678C push esp; ret 2_2_0054678F
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2912Thread sleep time: -240000s >= -30000sJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 1536Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts11
Exploitation for Client Execution
Path Interception1
Process Injection
1
Masquerading
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
Non-Application Layer Protocol
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Application Layer Protocol
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Virtualization/Sandbox Evasion
Security Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
Ingress Tool Transfer
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Process Injection
NTDS1
Remote System Discovery
Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
UNDELIVERED_MAILS.doc100%AviraTR/AVA.Malware.yiikv
UNDELIVERED_MAILS.doc50%ReversingLabsDocument-RTF.Exploit.CVE-2017-11882
UNDELIVERED_MAILS.doc58%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://link.hdmi.homes/_errorpages/.%20./obizx.exeh?0%Avira URL Cloudsafe
http://link.hdmi.homes/_errorpages/.%20./obizx.exe0%Avira URL Cloudsafe
http://link.hdmi.homes/_errorpages/.%20./obizx.exej0%Avira URL Cloudsafe
http://link.hdmi.homes/_errorpages/.%20./obizx.exe2%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
link.hdmi.homes
unknown
unknowntrue
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://link.hdmi.homes/_errorpages/.%20./obizx.exejEQNEDT32.EXE, 00000002.00000002.377949099.000000000052F000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://link.hdmi.homes/_errorpages/.%20./obizx.exeEQNEDT32.EXE, EQNEDT32.EXE, 00000002.00000002.377949099.000000000052F000.00000004.00000020.00020000.00000000.sdmpfalse
    • 2%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://link.hdmi.homes/_errorpages/.%20./obizx.exeh?EQNEDT32.EXE, 00000002.00000002.377949099.000000000052F000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    IP
    192.168.2.255
    Joe Sandbox Version:38.0.0 Beryl
    Analysis ID:1307685
    Start date and time:2023-09-14 14:14:34 +02:00
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 4m 8s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:defaultwindowsofficecookbook.jbs
    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
    Number of analysed new started processes analysed:9
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • HDC enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample file name:UNDELIVERED_MAILS.doc
    Detection:MAL
    Classification:mal76.expl.winDOC@4/7@5/1
    EGA Information:Failed
    HDC Information:Failed
    HCA Information:Failed
    Cookbook Comments:
    • Found application associated with file extension: .doc
    • Found Word or Excel or PowerPoint or XPS Viewer
    • Attach to Office via COM
    • Active ActiveX Object
    • Scroll down
    • Close Viewer
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 209.197.3.8, 8.252.176.254, 8.240.255.126, 8.252.181.126, 8.252.38.254, 8.252.197.254
    • Excluded domains from analysis (whitelisted): fg.download.windowsupdate.com.c.footprint.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, wu-bg-shim.trafficmanager.net
    • Execution Graph export aborted for target EQNEDT32.EXE, PID 1732 because there are no executed function
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    TimeTypeDescription
    14:15:26API Interceptor417x Sleep call for process: EQNEDT32.EXE modified
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):16384
    Entropy (8bit):0.0
    Encrypted:false
    SSDEEP:3::
    MD5:CE338FE6899778AACFC28414F2D9498B
    SHA1:897256B6709E1A4DA9DABA92B6BDE39CCFCCD8C1
    SHA-256:4FE7B59AF6DE3B665B67788CC2F99892AB827EFAE3A467342B3BB4E3BC8E5BFE
    SHA-512:6EB7F16CF7AFCABE9BDEA88BDAB0469A7937EB715ADA9DFD8F428D9D38D86133945F5F2F2688DDD96062223A39B5D47F07AFC3C48D9DB1D5EE3F41C8D274DCCF
    Malicious:false
    Reputation:low
    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):33280
    Entropy (8bit):3.7980137975612505
    Encrypted:false
    SSDEEP:768:6gI2Q5Q6IQXwvW5Kq2g0q1ghc0p9yEvInFNFK:pSyem2uhDyEvg0
    MD5:9A2A2407C7EFE407703473C9CB5D8870
    SHA1:707DCE97B56CF889D7195D352B2E640543A5C15C
    SHA-256:6F7B23FB84F6740AC476AC2F4040076CE7DA9CD070AB9E42B0D18E8E61F2E5EA
    SHA-512:52FE207537B9634C0B5C9B1BC6C104050F68775CA4C1E0EFDD900D6199641AD393CEAFCD4AF568A979842AC6120BA815BFB3ACDFAB1253115022AACA78039266
    Malicious:false
    Reputation:low
    Preview:......1.5.6.8.8.2.2.3.p.l.e.a.s.e. .c.l.i.c.k. .E.n.a.b.l.e. .e.d.i.t.i.n.g. .f.r.o.m. .t.h.e. .y.e.l.l.o.w. .b.a.r. .a.b.o.v.e...T.h.e. .i.n.d.e.p.e.n.d.e.n.t. .a.u.d.i.t.o.r.s.. .o.p.i.n.i.o.n. .s.a.y.s. .t.h.e. .f.i.n.a.n.c.i.a.l. .s.t.a.t.e.m.e.n.t.s. .a.r.e. .f.a.i.r.l.y. .s.t.a.t.e.d. .i.n. .a.c.c.o.r.d.a.n.c.e. .w.i.t.h. .t.h.e. .b.a.s.i.s. .o.f. .a.c.c.o.u.n.t.i.n.g. .u.s.e.d. .b.y. .y.o.u.r. .o.r.g.a.n.i.z.a.t.i.o.n... .S.o. .w.h.y. .a.r.e. .t.h.e. .a.u.d.i.t.o.r.s. .g.i.v.i.n.g. .y.o.u. .t.h.a.t. .o.t.h.e.r. .l.e.t.t.e.r. .I.n. .a.n. .a.u.d.i.t. .o.f. .f.i.n.a.n.c.i.a.l. .s.t.a.t.e.m.e.n.t.s.,. .p.r.o.f.e.s.s.i.o.n.a.l. .s.t.a.n.d.a.r.d.s. .r.e.q.u.i.r.e. .t.h.a.t. .a.u.d.i.t.o.r.s. .o.b.t.a.i.n. .a.n. .u.n.d.e.r.s.t.a.n.d.i.n.g. .o.f. .i.n.t.e.r.n.a.l. .c.o.n.t.r.o.l.s. .t.o. .t.h.e. .e.x.t.e.n.t. .n.e.c.e.s.s.a.r.y. .t.o. .p.l.a.n. .t.h.e. .a.u.d.i.t... .A.u.d.i.t.o.r.s. .u.s.e. .t.h.i.s. .u.n.d.e.r.s.t.a.n.d.i.n.g. .o.f. .i.n.t.e.r.n.a.l. .c.o.n.t.r.o.l.s. .t.o. .a.s.s.e.
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):1024
    Entropy (8bit):0.05390218305374581
    Encrypted:false
    SSDEEP:3:ol3lYdn:4Wn
    MD5:5D4D94EE7E06BBB0AF9584119797B23A
    SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
    SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
    SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
    Malicious:false
    Reputation:low
    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:10 2023, mtime=Fri Aug 11 15:42:10 2023, atime=Thu Sep 14 11:15:25 2023, length=75050, window=hide
    Category:dropped
    Size (bytes):1049
    Entropy (8bit):4.567075780082567
    Encrypted:false
    SSDEEP:12:8QSA0gXg/XAlCPCHaXkBrB/qPX+WLtXsGma4icvbdrM47MGmiDtZ3YilMMEpxRl/:8QTk/XTUR4hOKre9MEMSDv3q0k7N
    MD5:66DC87E28BC957DE773EEB725C39C15B
    SHA1:EB6E19980C1076F0B16632EED7C4E36CAA513FFC
    SHA-256:679648B6D211F871C7CFC724D35911EED96D3D92A08ACE33B48F345C8BA3B54F
    SHA-512:BD38B6B49B5C526D02FD561F1F921858EACCA9390B0618E51545CBA8E12C56980803C24298D7CDDD6CA2E66A59623D13ABA7CE90846CF77DEA00BA195048A697
    Malicious:false
    Reputation:low
    Preview:L..................F.... .....@.r.....@.r...q..$....*%...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......WG...user.8......QK.X.WG.*...&=....U...............A.l.b.u.s.....z.1......WG...Desktop.d......QK.X.WG.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....t.2.*%...W.a .UNDELI~1.DOC..X.......WF..WF.*.........................U.N.D.E.L.I.V.E.R.E.D._.M.A.I.L.S...d.o.c.......................-...8...[............?J......C:\Users\..#...................\\971342\Users.user\Desktop\UNDELIVERED_MAILS.doc.,.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.U.N.D.E.L.I.V.E.R.E.D._.M.A.I.L.S...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......971342..........D_....3N...W...9.W
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:Generic INItialization configuration [folders]
    Category:dropped
    Size (bytes):68
    Entropy (8bit):4.60188122347602
    Encrypted:false
    SSDEEP:3:M1ehsT32YVom42OT32YVov:MAhsT32YV1OT32YVy
    MD5:504602198164BFED4B45AE657FE4FF5C
    SHA1:B939FF0DCBEAA74AE9839C06983BFB6110306A9D
    SHA-256:9A935DB26CD64783B58B8AC62DB92807A046E816B2D40E12259E195B9E34B4EC
    SHA-512:00143AC85CFB3E2DB3CCB95697DEE32A82140886F99E8F2044287563A4C36DDEC7DC5DC741CFA9D91390CE3CD14FFE70EB1F52E4BF5D113B118C611B193D69AA
    Malicious:false
    Reputation:low
    Preview:[doc]..UNDELIVERED_MAILS.LNK=0..[folders]..UNDELIVERED_MAILS.LNK=0..
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):162
    Entropy (8bit):2.4797606462020307
    Encrypted:false
    SSDEEP:3:vrJlaCkWtVyYyBS0JilXMWvk1c6nlln:vdsCkWtIJiRk3l
    MD5:C4615A023DC40AFFAEAE6CF07410BB43
    SHA1:AAE1D68C4082CABF6AEA71C7981F32928CE01843
    SHA-256:103F860A912CF17B87A169B2768635758E8A0B82EB986A0C42FEA974F91BCB1E
    SHA-512:CD6975EAE1DA934094AC2516D095D50F2EE311CF549C8AEA2F3D65074B0DFC2908F72703B46A4C012358817289C76B15AC0E39EE359BCF39A45A8C912DCB2AAD
    Malicious:false
    Reputation:low
    Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):162
    Entropy (8bit):2.4797606462020307
    Encrypted:false
    SSDEEP:3:vrJlaCkWtVyYyBS0JilXMWvk1c6nlln:vdsCkWtIJiRk3l
    MD5:C4615A023DC40AFFAEAE6CF07410BB43
    SHA1:AAE1D68C4082CABF6AEA71C7981F32928CE01843
    SHA-256:103F860A912CF17B87A169B2768635758E8A0B82EB986A0C42FEA974F91BCB1E
    SHA-512:CD6975EAE1DA934094AC2516D095D50F2EE311CF549C8AEA2F3D65074B0DFC2908F72703B46A4C012358817289C76B15AC0E39EE359BCF39A45A8C912DCB2AAD
    Malicious:false
    Reputation:low
    Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
    File type:Rich Text Format data, version 1
    Entropy (8bit):3.775900891152977
    TrID:
    • Rich Text Format (5005/1) 55.56%
    • Rich Text Format (4004/1) 44.44%
    File name:UNDELIVERED_MAILS.doc
    File size:75'050 bytes
    MD5:d76c8672638bc36617dfa2a84ee47e1a
    SHA1:b32b3c50b37d764fc0c74da31f7f7cb60b715ebd
    SHA256:b837356985ee9e1513bc8f6e05a0678df466a725d5b10ee593ee2b5d90897438
    SHA512:b9963c65288cc18a79da943f46ec1cb65d376217687236f24682b9976396f1d022161f2a4c1c954375d32451c7e9c053b8f12c3a7e8589b71117a71f6c742a39
    SSDEEP:1536:ywAlREux2NLkCuRzXnBA6D0GetP4AyAMq:ywAlaLBuRLKI0GetP4AEq
    TLSH:79732468D38F01A9CF62527B9B570A4841FCBB3EF24541A5306C437933EED2DA22667D
    File Content Preview:{\rtf1....{\mmodsosrc327471848 \#}.{\715688223please click Enable editing from the yellow bar above.The independent auditors. opinion says the financial statements are fairly stated in accordance with the basis of accounting used by your organization. So
    Icon Hash:2764a3aaaeb7bdbf
    IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
    000003F77hno
    TimestampSource PortDest PortSource IPDest IP
    Sep 14, 2023 14:15:28.376053095 CEST5291753192.168.2.228.8.8.8
    Sep 14, 2023 14:15:29.388232946 CEST5291753192.168.2.228.8.8.8
    Sep 14, 2023 14:15:30.402196884 CEST5291753192.168.2.228.8.8.8
    Sep 14, 2023 14:15:32.414678097 CEST5291753192.168.2.228.8.8.8
    Sep 14, 2023 14:15:36.423836946 CEST5291753192.168.2.228.8.8.8
    Sep 14, 2023 14:15:36.866796970 CEST53529178.8.8.8192.168.2.22
    Sep 14, 2023 14:15:36.868177891 CEST137137192.168.2.22192.168.2.255
    Sep 14, 2023 14:15:37.624937057 CEST137137192.168.2.22192.168.2.255
    Sep 14, 2023 14:15:38.389408112 CEST137137192.168.2.22192.168.2.255
    Sep 14, 2023 14:17:27.863858938 CEST138138192.168.2.22192.168.2.255
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Sep 14, 2023 14:15:28.376053095 CEST192.168.2.228.8.8.80xb286Standard query (0)link.hdmi.homesA (IP address)IN (0x0001)false
    Sep 14, 2023 14:15:29.388232946 CEST192.168.2.228.8.8.80xb286Standard query (0)link.hdmi.homesA (IP address)IN (0x0001)false
    Sep 14, 2023 14:15:30.402196884 CEST192.168.2.228.8.8.80xb286Standard query (0)link.hdmi.homesA (IP address)IN (0x0001)false
    Sep 14, 2023 14:15:32.414678097 CEST192.168.2.228.8.8.80xb286Standard query (0)link.hdmi.homesA (IP address)IN (0x0001)false
    Sep 14, 2023 14:15:36.423836946 CEST192.168.2.228.8.8.80xb286Standard query (0)link.hdmi.homesA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Sep 14, 2023 14:15:36.866796970 CEST8.8.8.8192.168.2.220xb286Name error (3)link.hdmi.homesnonenoneA (IP address)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:14:15:25
    Start date:14/09/2023
    Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
    Imagebase:0x13fb10000
    File size:1'423'704 bytes
    MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Target ID:2
    Start time:14:15:26
    Start date:14/09/2023
    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    Wow64 process (32bit):true
    Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Imagebase:0x400000
    File size:543'304 bytes
    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:5
    Start time:14:15:56
    Start date:14/09/2023
    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    Wow64 process (32bit):true
    Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Imagebase:0x400000
    File size:543'304 bytes
    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    No disassembly