Windows
Analysis Report
novo-documento.docx
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w7x64
- WINWORD.EXE (PID: 3384 cmdline:
"C:\Progra m Files\Mi crosoft Of fice\Offic e14\WINWOR D.EXE" /Au tomation - Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
- cleanup
System Summary |
---|
Source: | Author: Vadim Khrykov (ThreatIntel), Cyb3rEng (Rule), Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: frack113: |
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
Click to jump to signature section
AV Detection |
---|
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | File opened: | Jump to behavior |
Software Vulnerabilities |
---|
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
System Summary |
---|
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to dropped file |
Source: | OLE, VBA macro line: | |||
Source: | OLE, VBA macro line: |
Source: | OLE indicator, VBA macros: | ||
Source: | OLE indicator, VBA macros: |
Source: | OLE stream indicators for Word, Excel, PowerPoint, and Visio: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | OLE indicator, Word Document stream: | ||
Source: | OLE indicator, Word Document stream: | ||
Source: | OLE indicator, Word Document stream: | ||
Source: | OLE indicator, Word Document stream: |
Source: | OLE document summary: | ||
Source: | OLE document summary: | ||
Source: | OLE document summary: | ||
Source: | OLE document summary: | ||
Source: | OLE document summary: | ||
Source: | OLE document summary: | ||
Source: | OLE document summary: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | LNK file: |
Source: | Window detected: |
Source: | Initial sample: |
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Initial sample: |
Data Obfuscation |
---|
Source: | Stream path 'VBA/writer' : |
Source: | Stream path 'VBA/writer' : |
Source: | Static PE information: |
Persistence and Installation Behavior |
---|
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Extracted files from sample: |
Source: | Section loaded: | Jump to behavior |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 32 Scripting | Valid Accounts | 2 Exploitation for Client Execution | 32 Scripting | Path Interception | 1 Masquerading | OS Credential Dumping | 1 Process Discovery | Remote Services | Data from Local System | 1 Ingress Tool Transfer | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 11 Virtualization/Sandbox Evasion | LSASS Memory | 11 Virtualization/Sandbox Evasion | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | 1 File and Directory Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | 2 System Information Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1544428 |
Start date and time: | 2024-10-29 12:16:58 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 31s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsofficecookbook.jbs |
Analysis system description: | Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2) |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 1 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | novo-documento.docx |
Detection: | MAL |
Classification: | mal100.expl.evad.winDOCX@1/22@0/0 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): mrxdav.sys, dllhost.exe, rundll32.exe, WMIADAP.exe
- Excluded IPs from analysis (whitelisted): 152.199.19.161
- Excluded domains from analysis (whitelisted): grupocgd.azureedge.net, grupocgd.ec.azureedge.net, cs9.wpc.v0cdn.net
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: novo-documento.docx
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD (copy)
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 131072 |
Entropy (8bit): | 0.025514899177092334 |
Encrypted: | false |
SSDEEP: | 6:I3DPcQPMxEHvxggLRWd6xOltRXv//4tfnRujlw//+GtluJ/eRuj:I3DPTJGvYg3J/ |
MD5: | F728D00404A0D8BE78496618E44A7522 |
SHA1: | F9F63E384CB4DDB41F327B42DF05B5B33E3FF411 |
SHA-256: | 83979BA5A402F26874A35CE49B2396531A357FBC523D28883D393634F61A2059 |
SHA-512: | 74B869DD13FE9D124CBA5794C4DBF455ABC15851A670C9896D1A7A38FEA834323521CDCBB143FA2D22DD4A62D3821CD74070ED9DA5082C1AFD954496631D0D73 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\template[1].htm
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 542800 |
Entropy (8bit): | 7.979295104298887 |
Encrypted: | false |
SSDEEP: | 12288:tRGoK7J+myfQFE8dHqf1LQCKwwGHOLkVh4huHqUzUoyHWKBW:tYFyB0GdMkKuYZBW |
MD5: | 067C72A387C924EF17985203AA0ED5A7 |
SHA1: | 62DF4923CE64672D6BB76990786E1BA3ECC54073 |
SHA-256: | CBED5B8039CD46B9E7F6C84437872143A96246F80C46D0393EF0211829C0D56E |
SHA-512: | E52787251D1CCA3B61F790C4200728D6AE51A3A710D23EE4D2146F929395ACE6A2483EF9FECE9B503EB542037A9508E7DBB03216339A667716D67CAC20612935 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2C27811E.jpeg
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 5457 |
Entropy (8bit): | 5.857023200063407 |
Encrypted: | false |
SSDEEP: | 48:D9YMOFuERASSHtddddddddddddddddddddddddddddddddddddddddddddddddd5:RhOMEmkR1Q8PlW6o0W9h |
MD5: | 3CB48B84910A3B80DA5754CF0CF8D0FA |
SHA1: | 383A004D36B69F439F930EAAC8443B39AEBF0CEC |
SHA-256: | AD320B4D7900F39C1035EE916DB5DAD88FB8FEE02DB986A6106978CE25E89E00 |
SHA-512: | 45B174F274966B4760145AD0D84B7A38E48D1DFEBCC74BFBB375FDCF09881B8AA2FD393985D8FEE7B7D6155387731B65E3115E44F0DD27DDA873D6FEB5EA22F7 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\49246ADC.png
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 20826 |
Entropy (8bit): | 7.945179408026097 |
Encrypted: | false |
SSDEEP: | 384:wjmRcBP7ifyTqjUJN2UBCMDjdMo/8Mcqsw06tgi/wX:zR2P7C/UeUAOMfM06tgSy |
MD5: | EC55032CED0916164385EDF88908C317 |
SHA1: | CFCB4C0BA3B8D49DF7C6B6DE3C5D428BB7C9CEB6 |
SHA-256: | F356DE16EAE68AA71140453464DEA36CE73422F95C20128E7D120EB2BB3F309A |
SHA-512: | 9D5EF6BE49E077EB9FB06A11C664B97828F256C50E2F5F780FD0AA9F8137C004228242D31AF144FB07E436DA67DF41385C89A6A641A8B381648BEB837610A3F7 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4E285351.htm
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 542800 |
Entropy (8bit): | 7.979295104298887 |
Encrypted: | false |
SSDEEP: | 12288:tRGoK7J+myfQFE8dHqf1LQCKwwGHOLkVh4huHqUzUoyHWKBW:tYFyB0GdMkKuYZBW |
MD5: | 067C72A387C924EF17985203AA0ED5A7 |
SHA1: | 62DF4923CE64672D6BB76990786E1BA3ECC54073 |
SHA-256: | CBED5B8039CD46B9E7F6C84437872143A96246F80C46D0393EF0211829C0D56E |
SHA-512: | E52787251D1CCA3B61F790C4200728D6AE51A3A710D23EE4D2146F929395ACE6A2483EF9FECE9B503EB542037A9508E7DBB03216339A667716D67CAC20612935 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\97618287.png
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 42624 |
Entropy (8bit): | 7.954955580887962 |
Encrypted: | false |
SSDEEP: | 768:Pmko0I7bjH4L3HSIRU/8UsOMT0Gg3xlzojZBmgiWyyAIZfLLOO/1bxKbq4BPu:Pmk2XE3S0LUsORGwxytN77OaS8 |
MD5: | A2BEDCD204E51468D965572A75E09573 |
SHA1: | 5EE8F7CF28FE6DABD8F91AD99481BBCF87B031C5 |
SHA-256: | 4945F0BFBCD796BE43277ADE81B5CFFDAF1A588F28F6F709D4D878A71760EA8C |
SHA-512: | 79DA1A27468A88230EEA9600B6C1553BFB06B3BFC4FECD8645956EA0517D30388F7F37ED2B12DEE5CD7C8BACEADE78E33D4B88D9B53D5A8056DC529F2F21101A |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{FF49538A-2569-43E2-AA01-7D66D4751716}.tmp
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 2694144 |
Entropy (8bit): | 4.597026854657753 |
Encrypted: | false |
SSDEEP: | 49152:wV8+FD+2GZEFESJHBTO8nqW1SXkSAR5zEl0ZW2wsS4NXJ/CD8+FD+2GZEFESJHBo:uj |
MD5: | 08F75539CE242780374BB0EAE0D6ED4C |
SHA1: | 5C68543CFCC7806B99EB3F6865475D8DADD1B1B5 |
SHA-256: | 661B295B76D849BF6701F6B264842E6DED66CCD4DB869F1572EB0D5638B4A9F5 |
SHA-512: | 7E4EC7A0CFEF416871892EA074DAD544E2572F76E8CCD3A6E647C61F9281BC12B4FEAA1628E0139221B90AFEAD920E7E2C8B8502C29B609BB7CBDE22E54A77D4 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{1F26175E-6A58-42D7-9B98-0EAC265E6B58}.tmp
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 1024 |
Entropy (8bit): | 0.05390218305374581 |
Encrypted: | false |
SSDEEP: | 3:ol3lYdn:4Wn |
MD5: | 5D4D94EE7E06BBB0AF9584119797B23A |
SHA1: | DBB111419C704F116EFA8E72471DD83E86E49677 |
SHA-256: | 4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1 |
SHA-512: | 95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{2768B60E-3C68-4B69-99B7-8B8DF4C8D143}.tmp
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 1024 |
Entropy (8bit): | 0.05390218305374581 |
Encrypted: | false |
SSDEEP: | 3:ol3lYdn:4Wn |
MD5: | 5D4D94EE7E06BBB0AF9584119797B23A |
SHA1: | DBB111419C704F116EFA8E72471DD83E86E49677 |
SHA-256: | 4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1 |
SHA-512: | 95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{55A26723-8A98-4937-9926-8329040EC37D}.tmp
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 2742 |
Entropy (8bit): | 3.3979845610936255 |
Encrypted: | false |
SSDEEP: | 24:elsCobOKrq3mgegG8xkUm46hk12e1iqoDKbuP93UPm/m/J/HZ9sfqJvjsZL:lCob9QNck151Datd/SRZcqBIZL |
MD5: | 7D4CD9F3D8FCD0BB5453A4CC27534917 |
SHA1: | A2BEACFBE0855DE65296853B7BE3C6D9B3C61279 |
SHA-256: | AD6E17B9385296A4C1781DEB6FBABD845AB6AAAD4F4C3C3CE971C00888D8FA25 |
SHA-512: | BA7911F8B5972115879B44C534275F51F7FB794DC299816DD89957F2B84F09AFCD5976C53552FFB9E5A3FF089EA17FFBB380D0E9F0AB11A2E74FEADFAB2AFD32 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 122368 |
Entropy (8bit): | 5.986819838023495 |
Encrypted: | false |
SSDEEP: | 3072:6ty0ble3LJK4kDVAddykeWWiv5sBZRowzO:6AUe3LJ+idykjvw |
MD5: | 3711C579A77B2D93225FB6081C96D0D6 |
SHA1: | ACA111A8DC82D6FA2AE5437B3F5AC108B7EBF179 |
SHA-256: | 677B7D4B7726119597BFCF0C02BC1415364084FCFE83E00835660B6842E9E789 |
SHA-512: | 85DF62A26A30B9D596DAD7D2AAA0821EF0EAFE0384EB9FCF11A69573EEEB9652ED44B717EA1A5C86F99593169ED89ACE517E77AB55FA7F69FC1BA1D5B8B77E1C |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 131072 |
Entropy (8bit): | 0.025514899177092334 |
Encrypted: | false |
SSDEEP: | 6:I3DPcQPMxEHvxggLRWd6xOltRXv//4tfnRujlw//+GtluJ/eRuj:I3DPTJGvYg3J/ |
MD5: | F728D00404A0D8BE78496618E44A7522 |
SHA1: | F9F63E384CB4DDB41F327B42DF05B5B33E3FF411 |
SHA-256: | 83979BA5A402F26874A35CE49B2396531A357FBC523D28883D393634F61A2059 |
SHA-512: | 74B869DD13FE9D124CBA5794C4DBF455ABC15851A670C9896D1A7A38FEA834323521CDCBB143FA2D22DD4A62D3821CD74070ED9DA5082C1AFD954496631D0D73 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 131072 |
Entropy (8bit): | 0.025451578281627783 |
Encrypted: | false |
SSDEEP: | 6:I3DPcPkz5ebvxggLR7laTIUlZ/RXv//4tfnRujlw//+GtluJ/eRuj:I3DP1ebX0T9HvYg3J/ |
MD5: | 72793220C62337D045AF12BD970467F4 |
SHA1: | 6146A2E430F090AA0278CF4B44B1E0FFD48315B7 |
SHA-256: | 4FB8025110B04D338B9E8E199DDB23455C4E45A372D8BBCF6EC8441FEC560C34 |
SHA-512: | A26CB8B6DC63621C98932626F5FDF155B54305D77FDDD86D8C09D76CD58CFE809A799D2FC6988D06F6112282DA5F12A165F93CD672633F8A0811C3AF28286533 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 57 |
Entropy (8bit): | 4.461296865614146 |
Encrypted: | false |
SSDEEP: | 3:HRAbABGQYm2feQDCBLEfCcDn:HRYFVm4eDLETn |
MD5: | 933B642DC4B8E879F5A4A95CA95CA409 |
SHA1: | 3582C2BCA6FF133F43E120A808576DFEDAB9F4A0 |
SHA-256: | 3792136FB93A7AE076D4886C52849FE27FBDE8208D50FACBE6845A65177CA4AE |
SHA-512: | 33660E5EAD0615DA470700C1D3E3989FE69DE2D793403F5991F0F086B343AEADDE384954E67218CF52EB9DA989E93C9ABC892212CE9C2368CB3C0B1B7ED1EDFE |
Malicious: | true |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 114 |
Entropy (8bit): | 4.5928264946954185 |
Encrypted: | false |
SSDEEP: | 3:Hanb1iJ4fYR8rulm4cdBLEfCceSfYR8rulv:HzSfYSru+DLEuSfYSru1 |
MD5: | 9ADA672F69968D4C3F1C16687C9F921F |
SHA1: | 9AE80F09ED9E738B3E22EEB677A0602AF90234E4 |
SHA-256: | 6FA0921DD751829A40789AEFCA8EAAA03EA2702A0BCBBEAD17DFC8074C77F95F |
SHA-512: | D7DBE7FF1483EE4D23027898A6173DEA36CCBFD01C6AA4AA51825FA2D4E7C97BFAD637BA07FBA8E734540A9CEEB7E79141FA00D2A8CADA8B4E89942D57377336 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 1039 |
Entropy (8bit): | 4.545570049263893 |
Encrypted: | false |
SSDEEP: | 12:8H6pRgXg/XAlCPCHaXOBj1B/qPX+WbiWIvlcnCicvbis4rmLNDtZ3YilMMEpxRlH:8Hon/XTeX4gbyJemspDv3qY57u |
MD5: | 04A4E3D38876CE800908909617E79CC5 |
SHA1: | B8C64AFE935088A0357D02131F0D504BE546F7BE |
SHA-256: | 8130E68638EC9E3260A6598A5D6C18311DF5C70B3FDFE79502BFF35E4159EEE2 |
SHA-512: | 7B99BA41984F8A9856F6D411AD1F920F7852093B9035E07B02E06132602414A88AFC2314D4D5D61CC792D05D519A797FE9DACD743ED3BE24D6365725F1333DFE |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 70 |
Entropy (8bit): | 4.48273471742809 |
Encrypted: | false |
SSDEEP: | 3:HRAbABGQYm2feQDCBLEfCcbdm1mn:HRYFVm4eDLELFn |
MD5: | 1D1999DAEC2F718CE0FD0ABB582FE96A |
SHA1: | 594A68F9E80CDF9844638F33377C87B6DAF3BFE6 |
SHA-256: | D0D1678602191D64758C1EDBE78D2F349294B830585E44750DC27B44066228C2 |
SHA-512: | 62CBF7C1EAF128490F9BDC36E8E6EC94D99E7F792D4399D2ED86D27CA582390AA98030856937EE0D457F85F5B301D577DEBE95D4954680FC9583064BBE6B6EF8 |
Malicious: | true |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 162 |
Entropy (8bit): | 2.4797606462020307 |
Encrypted: | false |
SSDEEP: | 3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l |
MD5: | 2CF7D3B8DED3F1D5CE1AC92F3E51D4ED |
SHA1: | 95E13378EA9CACA068B2687F01E9EF13F56627C2 |
SHA-256: | 60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1 |
SHA-512: | 2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 85217 |
Entropy (8bit): | 7.882494241376112 |
Encrypted: | false |
SSDEEP: | 1536:JW5g2UwRaG5DNujmk2XE3S0LUsORGwxytN77OaSarz7bAPh:JkuwRa6hujGCRL+Rw9TrAPh |
MD5: | A4F3AC2BBECFFAAA19E01AA8F12544A3 |
SHA1: | 9EED86983DDE97349D4B80F23C7225D17038D0E5 |
SHA-256: | D5DAFC1E18A54220C23726AA8383A834AFEF8763858AAD3FFD532A4D84C2D217 |
SHA-512: | 1BBE3B547FE2D97AF988FEB6C21A0F40C2664FB6803DD071F53940F16292F9686A1A1AEAC5BFBAC9A740900B69F65E393882DD0E20F05F97198AC29E9B3FAF5C |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 162 |
Entropy (8bit): | 2.4797606462020307 |
Encrypted: | false |
SSDEEP: | 3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l |
MD5: | 2CF7D3B8DED3F1D5CE1AC92F3E51D4ED |
SHA1: | 95E13378EA9CACA068B2687F01E9EF13F56627C2 |
SHA-256: | 60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1 |
SHA-512: | 2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 85217 |
Entropy (8bit): | 7.882494241376112 |
Encrypted: | false |
SSDEEP: | 1536:JW5g2UwRaG5DNujmk2XE3S0LUsORGwxytN77OaSarz7bAPh:JkuwRa6hujGCRL+Rw9TrAPh |
MD5: | A4F3AC2BBECFFAAA19E01AA8F12544A3 |
SHA1: | 9EED86983DDE97349D4B80F23C7225D17038D0E5 |
SHA-256: | D5DAFC1E18A54220C23726AA8383A834AFEF8763858AAD3FFD532A4D84C2D217 |
SHA-512: | 1BBE3B547FE2D97AF988FEB6C21A0F40C2664FB6803DD071F53940F16292F9686A1A1AEAC5BFBAC9A740900B69F65E393882DD0E20F05F97198AC29E9B3FAF5C |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | modified |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.976898556436593 |
TrID: |
|
File name: | novo-documento.docx |
File size: | 77'154 bytes |
MD5: | 2eaf72274decb5fd60cd4bf4f8308d68 |
SHA1: | 4d3ddbc2f9496e22cdc2758968a1fcf224442664 |
SHA256: | ca0e53f66b3a20d95182922abd28764b089b7aa1ef1bf29e78513540370d4a87 |
SHA512: | 3a00b09209418398ebe755081320a80e551d13683844b0772754c12a7ad8ee34df317dc6a1f063918cb8d024ec7e46ab27154831550429fee16c300481e0826e |
SSDEEP: | 1536:vv29q9TB0RtVM6SeVZgJo4gYracHIqMiv+F82YMo9dR+NPScTEUlZm:FOt5SggG4j2mMbFIL9dR+NPSczZm |
TLSH: | 1873F1F9C8920A59E2C66570C1720243FCC65BBA6C80F35D6A5DA108CCDA6FEDF17A48 |
File Content Preview: | PK..........QY................docProps/PK..........!..c5.............docProps/app.xml.RMO.0.....!..q.J......8.@j..eO....l.Q~=.F.@..i.........`.w.Q;.....3..)m.U.....y...J.gq.o1.W...x..cH.cF.6..>%..X.=.".T.Ti].D.4t....x..f@.X]......B5...|b.|O.%UN...K....... |
Icon Hash: | 65e6a3a3afb7bdbf |
Document Type: | OpenXML |
Number of OLE Files: | 1 |
Has Summary Info: | |
Application Name: | |
Encrypted Document: | False |
Contains Word Document Stream: | True |
Contains Workbook/Book Stream: | False |
Contains PowerPoint Document Stream: | False |
Contains Visio Document Stream: | False |
Contains ObjectPool Stream: | False |
Flash Objects Count: | 0 |
Contains VBA Macros: | False |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 07:17:51 |
Start date: | 29/10/2024 |
Path: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x13f900000 |
File size: | 1'423'704 bytes |
MD5 hash: | 9EE74859D22DAE61F1750B3A1BACB6F5 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |