Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Inquiries-Quote Products.docx.doc

Overview

General Information

Sample name:Inquiries-Quote Products.docx.doc
Analysis ID:1570100
MD5:ea9f83d0abbba918c5d98dee6fccf860
SHA1:b277fe995be7873cfc2796974939e2bc3d494fc4
SHA256:53686fabf31e451914316980428735cde258016926caa69dc9c1fb62040e0c3a
Tags:docdocxuser-abuse_ch
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Microsoft Office launches external ms-search protocol handler (WebDAV)
Multi AV Scanner detection for submitted file
Contains an external reference to another file
Office viewer loads remote template
Document misses a certain OLE stream usually present in this Microsoft Office document type
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Sigma detected: Suspicious Office Outbound Connections
Uses a known web browser user agent for HTTP communication

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 3568 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
  • cleanup
No configs have been found
No yara matches
Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49161, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, Initiated: true, ProcessId: 3568, Protocol: tcp, SourceIp: 87.120.84.39, SourceIsIpv6: false, SourcePort: 80
Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3568, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3568, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://87.120.84.39/txt/casseyofficefile.dotAvira URL Cloud: Label: phishing
Source: Inquiries-Quote Products.docx.docReversingLabs: Detection: 44%
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 87.120.84.39:80
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.120.84.39:80
Source: global trafficTCP traffic: 87.120.84.39:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.120.84.39:80
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.120.84.39:80
Source: global trafficTCP traffic: 87.120.84.39:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 87.120.84.39:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.120.84.39:80
Source: global trafficTCP traffic: 192.168.2.22:49161 -> 87.120.84.39:80
Source: global trafficTCP traffic: 87.120.84.39:80 -> 192.168.2.22:49161
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 87.120.84.39:80
Source: global trafficTCP traffic: 87.120.84.39:80 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 87.120.84.39:80
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 87.120.84.39:80
Source: global trafficTCP traffic: 87.120.84.39:80 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 87.120.84.39:80 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 87.120.84.39:80
Source: global trafficTCP traffic: 192.168.2.22:49162 -> 87.120.84.39:80
Source: global trafficTCP traffic: 87.120.84.39:80 -> 192.168.2.22:49162
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 87.120.84.39:80
Source: global trafficTCP traffic: 87.120.84.39:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 87.120.84.39:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 87.120.84.39:80
Source: global trafficTCP traffic: 87.120.84.39:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 87.120.84.39:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 87.120.84.39:80
Source: global trafficTCP traffic: 192.168.2.22:49163 -> 87.120.84.39:80
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 87.120.84.39:80
Source: global trafficTCP traffic: 87.120.84.39:80 -> 192.168.2.22:49163
Source: global trafficTCP traffic: 87.120.84.39:80 -> 192.168.2.22:49164
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 87.120.84.39:80
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 87.120.84.39:80
Source: global trafficTCP traffic: 87.120.84.39:80 -> 192.168.2.22:49164
Source: global trafficTCP traffic: 87.120.84.39:80 -> 192.168.2.22:49164
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 87.120.84.39:80
Source: global trafficTCP traffic: 192.168.2.22:49164 -> 87.120.84.39:80
Source: global trafficTCP traffic: 87.120.84.39:80 -> 192.168.2.22:49164
Source: Joe Sandbox ViewIP Address: 87.120.84.39 87.120.84.39
Source: Joe Sandbox ViewASN Name: SHARCOM-ASBG SHARCOM-ASBG
Source: global trafficHTTP traffic detected: GET /txt/casseyofficefile.dot HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: 87.120.84.39Connection: Keep-Alive
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: unknownTCP traffic detected without corresponding DNS query: 87.120.84.39
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F2CE71C3-B6F4-48A1-BF0B-5E342FC38AD6}.tmpJump to behavior
Source: global trafficHTTP traffic detected: GET /txt/casseyofficefile.dot HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)UA-CPU: AMD64Accept-Encoding: gzip, deflateHost: 87.120.84.39Connection: Keep-Alive
Source: ~WRF{02055568-60FC-4621-9C61-5ECB0E8727FE}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: classification engineClassification label: mal72.evad.winDOC@1/12@0/1
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$quiries-Quote Products.docx.docJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR7FD9.tmpJump to behavior
Source: Inquiries-Quote Products.docx.docOLE indicator, Word Document stream: true
Source: ~WRF{02055568-60FC-4621-9C61-5ECB0E8727FE}.tmp.0.drOLE document summary: title field not present or empty
Source: ~WRF{02055568-60FC-4621-9C61-5ECB0E8727FE}.tmp.0.drOLE document summary: author field not present or empty
Source: ~WRF{02055568-60FC-4621-9C61-5ECB0E8727FE}.tmp.0.drOLE document summary: edited time not present or 0
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: Inquiries-Quote Products.docx.docReversingLabs: Detection: 44%
Source: Inquiries-Quote Products.docx.LNK.0.drLNK file: ..\..\..\..\..\Desktop\Inquiries-Quote Products.docx.doc
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Inquiries-Quote Products.docx.docInitial sample: OLE zip file path = word/_rels/settings.xml.rels
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: Inquiries-Quote Products.docx.docInitial sample: OLE indicators vbamacros = False

Persistence and Installation Behavior

barindex
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \Device\RdpDr\;:1\87.120.84.39\DavWWWRootJump to behavior
Source: settings.xml.relsExtracted files from sample: http://87.120.84.39/txt/casseyofficefile.dot
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXESection loaded: netapi32.dll and davhlpr.dll loadedJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Exploitation for Client Execution
Path InterceptionPath Interception1
Masquerading
OS Credential Dumping1
File and Directory Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable Media11
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Inquiries-Quote Products.docx.doc45%ReversingLabsDocument-Office.Exploit.CVE-2017-0199
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://87.120.84.39/txt/casseyofficefile.dot100%Avira URL Cloudphishing
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://87.120.84.39/txt/casseyofficefile.dottrue
  • Avira URL Cloud: phishing
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
87.120.84.39
unknownBulgaria
51189SHARCOM-ASBGtrue
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1570100
Start date and time:2024-12-06 15:18:09 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 40s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultwindowsofficecookbook.jbs
Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
Number of analysed new started processes analysed:7
Number of new started drivers analysed:1
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:Inquiries-Quote Products.docx.doc
Detection:MAL
Classification:mal72.evad.winDOC@1/12@0/1
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .doc
  • Found Word or Excel or PowerPoint or XPS Viewer
  • Attach to Office via COM
  • Scroll down
  • Close Viewer
  • Exclude process from analysis (whitelisted): mrxdav.sys, dllhost.exe, rundll32.exe, WMIADAP.exe
  • Report size getting too big, too many NtQueryValueKey calls found.
  • VT rate limit hit for: Inquiries-Quote Products.docx.doc
No simulations
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
87.120.84.39xXdquUOrM1vD3An.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39/txt/xXdquUOrM1vD3An.exe
7ar1l60013Sx8PT.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39/txt/7ar1l60013Sx8PT.exe
d1wn7m0x0FWFbfs.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39/txt/d1wn7m0x0FWFbfs.exe
xi4HNTgb7wewrDQ.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39/txt/xi4HNTgb7wewrDQ.exe
zxdonmn.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39/txt/AGdxlHjL3XmrRJw.exe
NEW ORDER #233.xlam.xlsxGet hashmaliciousUnknownBrowse
  • 87.120.84.39/txt/x0C0Zc8JHYzAip.exe
Bank Copy.docx.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39/txt/mydocfile.wbk
Bank Copy.docx.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39/txt/mydocfile.wbk
dattizxmn.dot.rtfGet hashmaliciousUnknownBrowse
  • 87.120.84.39/txt/dattimnzx.vbs
SEPTEMBER Updated SOA 210827 Statement 457680001.docx.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39/txt/dattizxmn.dot
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
SHARCOM-ASBGxXdquUOrM1vD3An.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39
7ar1l60013Sx8PT.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39
d1wn7m0x0FWFbfs.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39
xi4HNTgb7wewrDQ.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39
zxdonmn.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39
NEW ORDER #233.xlam.xlsxGet hashmaliciousUnknownBrowse
  • 87.120.84.39
Bank Copy.docx.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39
Bank Copy.docx.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39
dattizxmn.dot.rtfGet hashmaliciousUnknownBrowse
  • 87.120.84.39
SEPTEMBER Updated SOA 210827 Statement 457680001.docx.docGet hashmaliciousUnknownBrowse
  • 87.120.84.39
No context
No context
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):131072
Entropy (8bit):0.02550032276116467
Encrypted:false
SSDEEP:6:I3DPcXoCm/NHvxggLRlzVRFvJ5Y3RXv//4tfnRujlw//+GtluJ/eRuj:I3DPH/NPf/vv+vYg3J/
MD5:88E20D217A3AEDD2ACEEB768CD6550CC
SHA1:04CBEA0E2AF996D3249E5890F84EFC434AD85145
SHA-256:DCD8340EAAAB91FE43A0261BF851140E2F7F129F2F90FA2C48704A7755506409
SHA-512:2E0DC6EC7B3F026005719CF8425E40153FB8FFABBBDF3549EE2D1032A48708051B1781CFDD5CD4C6D62EDD2DEA3DD87AD4E24981D4747A1A4E7B9043AD19BE37
Malicious:false
Reputation:low
Preview:......M.eFy...z..5V.dBN..5.hi..S,...X.F...Fa.q............................2O,E4r.I.c.VC.j.........NElo..o@...'...;.....................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:Composite Document File V2 Document, Cannot read section info
Category:dropped
Size (bytes):2560
Entropy (8bit):1.429448309751638
Encrypted:false
SSDEEP:6:rl912N0xVN+CFQXON/0Xw9XDPbA9XDPbA9XCw9XvPbA9XvPbA9XCw9XCw9XCB9XP:rl3lTpFQOcXIggCIvPsvPsCICICb77
MD5:011D7EB04383DA2C7F8982B0C352F7AC
SHA1:FB5AF84E865C9452CFF46597BC72D244555AB0F8
SHA-256:E78A01E33CC85DBEEDF1F272C15C2BF0CE1F6A3FB16B63FDB72990348C96681B
SHA-512:E9E92528F770F6E9880C402DFDB12B2B633E3591AE694E5B58F854F14B1713622BEE13DCCEA911E71AF9A87F4C13A150D24248F0615A734BF395BEC333C5D559
Malicious:false
Reputation:low
Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):1536
Entropy (8bit):1.3555252507007243
Encrypted:false
SSDEEP:3:Iiiiiiiiiif3l/Hlnl/bl//l/bllBl/PvvvvvvvvvvFl/l/lAqsalHl3lldHzlbc:IiiiiiiiiifdLloZQc8++lsJe1Mzf
MD5:48F7DE4A082BD0F1BBDC75DDF455451E
SHA1:99C273A1BECBEE39FDEA32CA77CE2A28D4102017
SHA-256:D8E600A01A6D20F0E1B8706D1CF64FF94A6F6E369AAB957870C3BB5B0105FD80
SHA-512:9AE0F4568701D4A50FBD02FFA637A436945F9B93945B0536594B0A4C0FEDD4C15810714F4E1D15EBDD3FBA9238DDD43475262A62339C66C7CA867C305281FDDC
Malicious:false
Reputation:low
Preview:..(...(...(...(...(...(...(...(...(...(...(...A.l.b.u.s...A........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................."...&...*.......:...>...............................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):84704
Entropy (8bit):3.9802601001617113
Encrypted:false
SSDEEP:1536:S20Rza9FBkrCb6Q565FTn6qxOo+LRS9EiDvwxKrK2ft:SPRO/BkeWQgP6qxW068rKet
MD5:CC43DC354AEFC4B0DC71C60F0C987C7B
SHA1:21CAF72BF69F211864558F1D47CBA707D7EF8D10
SHA-256:7D98FEC4828040D111BBF38C8D9C22DF914AE62953985D082AC1EBE04B19A60F
SHA-512:F19806DBB0CB9E4326A0C34F3CBF03838071F60ADD8C5693D3C29A6E4A110CE4C3BBA87C1C4B2E385B20990F623B10344F6DE59BBF6483C65DBBAFAF401A8BBA
Malicious:false
Reputation:low
Preview:..d.M.B.C.....B.E.S.O.N.D.E.R.H.E.D.E. .B.E.S.O.N.D.E.R.H.E.D.E. .V.I.R. .H.I.E.R.D.I.E. .M.A.A.N.D.....D.R.A.E.N.D.E. .N.R... .H.O.E.V.....3.0.2.0.8. .N.B.C. .D.R.A.A.G. .3.0. .S.T.K.....3.0.3.0.8. .N.B.C. .D.R.A.A.G. .6. .S.T.K.....3.2.0.0.7.X. .N.B.C. .D.R.A.A.G. .7.4. .S.T.K.....3.3.0.0.5. .N.B.C. .w.a.t. .5. .s.t.e.l.l.e. .d.r.a.....5.2.7.9.9. ./. .8.0.0.U. .(.2.5.8.7.7./.2.1.). .N.B.C. .w.a.t. .3.0. .P.C.S. .d.r.a.....6.0.0.1. .N.B.C. .w.a.t. .1.0.0. .s.t.u.k.s. .d.r.a.....6.0.0.4. .N.B.C. .w.a.t.....................f...h...................................R...T..................................................................................................................................................................................................................................................................................................<...$..$.If........!v..h.#v..9.:V....l...,..t.......9..6.,.....5.....9.9...../.............B.....a..].p............yt.RC.....d........gd.
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):1024
Entropy (8bit):0.05390218305374581
Encrypted:false
SSDEEP:3:ol3lYdn:4Wn
MD5:5D4D94EE7E06BBB0AF9584119797B23A
SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
Malicious:false
Reputation:high, very likely benign file
Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):131072
Entropy (8bit):0.02550032276116467
Encrypted:false
SSDEEP:6:I3DPcXoCm/NHvxggLRlzVRFvJ5Y3RXv//4tfnRujlw//+GtluJ/eRuj:I3DPH/NPf/vv+vYg3J/
MD5:88E20D217A3AEDD2ACEEB768CD6550CC
SHA1:04CBEA0E2AF996D3249E5890F84EFC434AD85145
SHA-256:DCD8340EAAAB91FE43A0261BF851140E2F7F129F2F90FA2C48704A7755506409
SHA-512:2E0DC6EC7B3F026005719CF8425E40153FB8FFABBBDF3549EE2D1032A48708051B1781CFDD5CD4C6D62EDD2DEA3DD87AD4E24981D4747A1A4E7B9043AD19BE37
Malicious:false
Reputation:low
Preview:......M.eFy...z..5V.dBN..5.hi..S,...X.F...Fa.q............................2O,E4r.I.c.VC.j.........NElo..o@...'...;.....................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):131072
Entropy (8bit):0.02525972179307088
Encrypted:false
SSDEEP:6:I3DPctoPzSSFvxggLRfR/1RRXv//4tfnRujlw//+GtluJ/eRuj:I3DP8i+SpzJlvYg3J/
MD5:13F0584CFF98BDB1499F285C9FBA010E
SHA1:1D83D125BB00C79BED9DA12987252F7AC976939A
SHA-256:396366FA5A9976E244A59D97D4547EE96813989047EE1B99DB63146CCE77252D
SHA-512:517267DBFA3C298C9C775373E7A52C3AAA6D2F2F1371B54D7D0F590004EC5829D9A699EBEAFD61D4E46451974383A5127DA28CA5EC5CCAA807E9EDB12836DEED
Malicious:false
Reputation:low
Preview:......M.eFy...z.g..uI.'Gg:7.S,...X.F...Fa.q............................H:..^i.K.IP.................J....b......................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:08 2023, mtime=Fri Aug 11 15:42:08 2023, atime=Fri Dec 6 13:19:01 2024, length=36570, window=hide
Category:dropped
Size (bytes):1109
Entropy (8bit):4.551695260282999
Encrypted:false
SSDEEP:12:8ah9Y0gXg/XAlCPCHaXUBAsB/5YXX+WNmID1P4icvbrUeIGdXl4Pf1FDtZ3YilME:8aYk/XTEt4Xz3zevUe5KFDv3qV57u
MD5:FA295897127E9076EA68B33FCC4193ED
SHA1:AE91459F99B42D4BD6F0008414D1DC103044F439
SHA-256:7382C1B48F50D56383C6EE911C8B60BCE09E6A1B17EEDC13A4A0FD1CBECC7518
SHA-512:A4BE1FCB35B3576B2DD4122AF08126BD1464D9EF68802DB5536D0C4CC0B314B37B0CF80B459C8B3F06F2D9C47D705B9F044B14D572FE96EC3B6B069831B260D2
Malicious:false
Preview:L..................F.... ....&..r....&..r...Q.B..G..............................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Y]r..user.8......QK.X.Y]r*...&=....U...............A.l.b.u.s.....z.1......WF...Desktop.d......QK.X.WF.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2.....Yar .INQUIR~1.DOC..p.......WE..WE.*.........................I.n.q.u.i.r.i.e.s.-.Q.u.o.t.e. .P.r.o.d.u.c.t.s...d.o.c.x...d.o.c.......................-...8...[............?J......C:\Users\..#...................\\066656\Users.user\Desktop\Inquiries-Quote Products.docx.doc.8.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.I.n.q.u.i.r.i.e.s.-.Q.u.o.t.e. .P.r.o.d.u.c.t.s...d.o.c.x...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6....
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:Generic INItialization configuration [folders]
Category:dropped
Size (bytes):92
Entropy (8bit):4.659886826639608
Encrypted:false
SSDEEP:3:M1xXKyIGdFSm4HZXKyIGdFSv:MnhIGdFghIGdFc
MD5:92668FF3D667C567D290FA2CCFBE657A
SHA1:1801ACC0428CA188AF32BB3C439A6DE98FCAE577
SHA-256:F347EC90DC99FC64EB7B9A92446EF4F9D4D1FDC475B983050C430CB323978B98
SHA-512:CB9DBAA3F10089C34820C8BDE5623BA4DBAF4BB1BFA8D7EF41AF57B473635A40ABFF642857A420D69B5E003420AB5F670B86EADE05F5ACC52A2A89D0B614F321
Malicious:false
Preview:[doc]..Inquiries-Quote Products.docx.LNK=0..[folders]..Inquiries-Quote Products.docx.LNK=0..
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):162
Entropy (8bit):2.4797606462020307
Encrypted:false
SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
Malicious:false
Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:Unicode text, UTF-16, little-endian text, with no line terminators
Category:dropped
Size (bytes):2
Entropy (8bit):1.0
Encrypted:false
SSDEEP:3:Qn:Qn
MD5:F3B25701FE362EC84616A93A45CE9998
SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
Malicious:false
Preview:..
Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
File Type:data
Category:dropped
Size (bytes):162
Entropy (8bit):2.4797606462020307
Encrypted:false
SSDEEP:3:vrJlaCkWtVyHlqlzl0pbklMWjV4lc+/dllln:vdsCkWtWYlz21kF2JV/l
MD5:2CF7D3B8DED3F1D5CE1AC92F3E51D4ED
SHA1:95E13378EA9CACA068B2687F01E9EF13F56627C2
SHA-256:60DF94CDE4FD9B4A73BB13775079D75CE954B75DED5A2878277FA64AD767CAB1
SHA-512:2D5797FBBE44766D93A5DE3D92911358C70D8BE60D5DF542ECEDB77D1195DC1EEF85E4CA1445595BE81550335A20AB3F11B512385FE20F75B1E269D6AB048E0A
Malicious:false
Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
File type:Microsoft Word 2007+
Entropy (8bit):7.976005278779941
TrID:
  • Word Microsoft Office Open XML Format document (49504/1) 58.23%
  • Word Microsoft Office Open XML Format document (27504/1) 32.35%
  • ZIP compressed archive (8000/1) 9.41%
File name:Inquiries-Quote Products.docx.doc
File size:36'570 bytes
MD5:ea9f83d0abbba918c5d98dee6fccf860
SHA1:b277fe995be7873cfc2796974939e2bc3d494fc4
SHA256:53686fabf31e451914316980428735cde258016926caa69dc9c1fb62040e0c3a
SHA512:b6528ca0731b21e8eaea6b10819e6adc715c7450266c5b64f4a12d744405a821fad33a8ab60fff4e2ceebe1a986d7fe779e8e907ba22f334848b430104dc66b9
SSDEEP:768:icZKNCHFhO1vnwS8OPTYJ0xRb9EoThZwFNCK9i:D48lhMvnwSFYevXT7wzF9i
TLSH:E0F2D12E2F800228E60F65F57CD46038FA743A8B552D1F7DAAA1362D1AF10876B51F16
File Content Preview:PK.........D.Y...7U... .......[Content_Types].xmlUT....eQg.eQg.eQg...n.0.E...............e.T.....U..<...;!.U.%U.M.d..sgby0ZW.[BB.|!.yOd.u0....>y....Iy.\.P.........M..X...s.x/%.9T....s...R..i&...j......:x.O].=.p...Z8.....I........U....Z...........r..s....B
Icon Hash:2764a3aaaeb7bdbf
Document Type:OpenXML
Number of OLE Files:1
Has Summary Info:
Application Name:
Encrypted Document:False
Contains Word Document Stream:True
Contains Workbook/Book Stream:False
Contains PowerPoint Document Stream:False
Contains Visio Document Stream:False
Contains ObjectPool Stream:False
Flash Objects Count:0
Contains VBA Macros:False
TimestampSource PortDest PortSource IPDest IP
Dec 6, 2024 15:19:05.549288988 CET4916180192.168.2.2287.120.84.39
Dec 6, 2024 15:19:05.669279099 CET804916187.120.84.39192.168.2.22
Dec 6, 2024 15:19:05.669365883 CET4916180192.168.2.2287.120.84.39
Dec 6, 2024 15:19:05.670658112 CET4916180192.168.2.2287.120.84.39
Dec 6, 2024 15:19:05.790551901 CET804916187.120.84.39192.168.2.22
Dec 6, 2024 15:19:27.575129032 CET804916187.120.84.39192.168.2.22
Dec 6, 2024 15:19:27.575333118 CET4916180192.168.2.2287.120.84.39
Dec 6, 2024 15:19:27.575429916 CET4916180192.168.2.2287.120.84.39
Dec 6, 2024 15:19:27.695138931 CET804916187.120.84.39192.168.2.22
Dec 6, 2024 15:19:28.014913082 CET4916280192.168.2.2287.120.84.39
Dec 6, 2024 15:19:28.135094881 CET804916287.120.84.39192.168.2.22
Dec 6, 2024 15:19:28.135174990 CET4916280192.168.2.2287.120.84.39
Dec 6, 2024 15:19:28.138859034 CET4916280192.168.2.2287.120.84.39
Dec 6, 2024 15:19:28.258526087 CET804916287.120.84.39192.168.2.22
Dec 6, 2024 15:19:50.027714968 CET804916287.120.84.39192.168.2.22
Dec 6, 2024 15:19:50.027864933 CET4916280192.168.2.2287.120.84.39
Dec 6, 2024 15:19:50.028878927 CET4916280192.168.2.2287.120.84.39
Dec 6, 2024 15:19:50.148883104 CET804916287.120.84.39192.168.2.22
Dec 6, 2024 15:19:53.320205927 CET4916380192.168.2.2287.120.84.39
Dec 6, 2024 15:19:53.440037966 CET804916387.120.84.39192.168.2.22
Dec 6, 2024 15:19:53.440120935 CET4916380192.168.2.2287.120.84.39
Dec 6, 2024 15:19:53.440396070 CET4916380192.168.2.2287.120.84.39
Dec 6, 2024 15:19:53.560400009 CET804916387.120.84.39192.168.2.22
Dec 6, 2024 15:20:15.325196028 CET804916387.120.84.39192.168.2.22
Dec 6, 2024 15:20:15.325314999 CET4916380192.168.2.2287.120.84.39
Dec 6, 2024 15:20:15.325377941 CET4916380192.168.2.2287.120.84.39
Dec 6, 2024 15:20:15.363008022 CET4916480192.168.2.2287.120.84.39
Dec 6, 2024 15:20:15.445123911 CET804916387.120.84.39192.168.2.22
Dec 6, 2024 15:20:15.482856035 CET804916487.120.84.39192.168.2.22
Dec 6, 2024 15:20:15.482944965 CET4916480192.168.2.2287.120.84.39
Dec 6, 2024 15:20:15.483093977 CET4916480192.168.2.2287.120.84.39
Dec 6, 2024 15:20:15.602859020 CET804916487.120.84.39192.168.2.22
Dec 6, 2024 15:20:37.403785944 CET804916487.120.84.39192.168.2.22
Dec 6, 2024 15:20:37.403852940 CET4916480192.168.2.2287.120.84.39
Dec 6, 2024 15:20:37.403928041 CET4916480192.168.2.2287.120.84.39
Dec 6, 2024 15:20:37.523906946 CET804916487.120.84.39192.168.2.22
  • 87.120.84.39
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.224916187.120.84.39803568C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
TimestampBytes transferredDirectionData
Dec 6, 2024 15:19:05.670658112 CET138OUTOPTIONS /txt/ HTTP/1.1
User-Agent: Microsoft Office Protocol Discovery
Host: 87.120.84.39
Content-Length: 0
Connection: Keep-Alive


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
1192.168.2.224916287.120.84.39803568C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
TimestampBytes transferredDirectionData
Dec 6, 2024 15:19:28.138859034 CET137OUTHEAD /txt/casseyofficefile.dot HTTP/1.1
Connection: Keep-Alive
User-Agent: Microsoft Office Existence Discovery
Host: 87.120.84.39


Session IDSource IPSource PortDestination IPDestination Port
2192.168.2.224916387.120.84.3980
TimestampBytes transferredDirectionData
Dec 6, 2024 15:19:53.440396070 CET132OUTOPTIONS /txt HTTP/1.1
Connection: Keep-Alive
User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
translate: f
Host: 87.120.84.39


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
3192.168.2.224916487.120.84.39803568C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
TimestampBytes transferredDirectionData
Dec 6, 2024 15:20:15.483093977 CET367OUTGET /txt/casseyofficefile.dot HTTP/1.1
Accept: */*
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
Host: 87.120.84.39
Connection: Keep-Alive


Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:09:19:02
Start date:06/12/2024
Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
Wow64 process (32bit):false
Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
Imagebase:0x13fb50000
File size:1'423'704 bytes
MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

No disassembly