Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rcNDmdah2W.doc

Overview

General Information

Sample name:rcNDmdah2W.doc
renamed because original name is a hash value
Original sample name:4eab5c5775c41de887ba4e589ab8cf4340236da73a68a68d26cbb7f34e0546f7.doc
Analysis ID:1574598
MD5:7aa2c6c221a36ac19ce795a370cc4e29
SHA1:dfbe7f7af54a9b315fc4f868726f050ab106294d
SHA256:4eab5c5775c41de887ba4e589ab8cf4340236da73a68a68d26cbb7f34e0546f7
Tags:docSideWinderuser-JAMESWT_MHT
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Microsoft Office launches external ms-search protocol handler (WebDAV)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Contains an external reference to another file
Office viewer loads remote template
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Sigma detected: Suspicious Office Outbound Connections
Uses insecure TLS / SSL version for HTTPS connection
Yara signature match

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 3236 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
_rels\document.xml.relsINDICATOR_OLE_RemoteTemplateDetects XML relations where an OLE object is refrencing an external target in dropper OOXML documentsditekSHen
  • 0x481:$olerel: relationships/oleObject
  • 0x49a:$target1: Target="http
  • 0x4f3:$mode: TargetMode="External

System Summary

barindex
Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49165, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, Initiated: true, ProcessId: 3236, Protocol: tcp, SourceIp: 114.55.89.54, SourceIsIpv6: false, SourcePort: 443
Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3236, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3236, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-13T13:15:27.997658+010020551901A Network Trojan was detected192.168.2.2249165114.55.89.54443TCP
2024-12-13T13:15:40.949381+010020551901A Network Trojan was detected192.168.2.2249166114.55.89.54443TCP
2024-12-13T13:15:48.773400+010020551901A Network Trojan was detected192.168.2.2249168114.55.89.54443TCP
2024-12-13T13:15:54.087126+010020551901A Network Trojan was detected192.168.2.2249170114.55.89.54443TCP
2024-12-13T13:15:58.583414+010020551901A Network Trojan was detected192.168.2.2249171114.55.89.54443TCP
2024-12-13T13:16:05.155417+010020551901A Network Trojan was detected192.168.2.2249173114.55.89.54443TCP
2024-12-13T13:16:10.225575+010020551901A Network Trojan was detected192.168.2.2249175114.55.89.54443TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-13T13:15:22.949636+010020388601Domain Observed Used for C2 Detected192.168.2.22545628.8.8.853UDP
2024-12-13T13:15:23.957927+010020388601Domain Observed Used for C2 Detected192.168.2.22545628.8.8.853UDP
2024-12-13T13:15:32.076387+010020388601Domain Observed Used for C2 Detected192.168.2.22529178.8.8.853UDP
2024-12-13T13:15:33.083694+010020388601Domain Observed Used for C2 Detected192.168.2.22529178.8.8.853UDP
2024-12-13T13:15:33.423167+010020388601Domain Observed Used for C2 Detected192.168.2.22627518.8.8.853UDP
2024-12-13T13:15:34.424771+010020388601Domain Observed Used for C2 Detected192.168.2.22627518.8.8.853UDP
2024-12-13T13:15:43.885790+010020388601Domain Observed Used for C2 Detected192.168.2.22578938.8.8.853UDP
2024-12-13T13:15:44.892281+010020388601Domain Observed Used for C2 Detected192.168.2.22578938.8.8.853UDP
2024-12-13T13:15:45.253546+010020388601Domain Observed Used for C2 Detected192.168.2.22548218.8.8.853UDP
2024-12-13T13:15:54.713140+010020388601Domain Observed Used for C2 Detected192.168.2.22547198.8.8.853UDP
2024-12-13T13:15:54.855339+010020388601Domain Observed Used for C2 Detected192.168.2.22498818.8.8.853UDP
2024-12-13T13:16:00.518052+010020388601Domain Observed Used for C2 Detected192.168.2.22549988.8.8.853UDP
2024-12-13T13:16:00.642918+010020388601Domain Observed Used for C2 Detected192.168.2.22527818.8.8.853UDP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-13T13:15:22.949636+010020551621A Network Trojan was detected192.168.2.22545628.8.8.853UDP
2024-12-13T13:15:23.957927+010020551621A Network Trojan was detected192.168.2.22545628.8.8.853UDP
2024-12-13T13:15:32.076387+010020551621A Network Trojan was detected192.168.2.22529178.8.8.853UDP
2024-12-13T13:15:33.083694+010020551621A Network Trojan was detected192.168.2.22529178.8.8.853UDP
2024-12-13T13:15:33.423167+010020551621A Network Trojan was detected192.168.2.22627518.8.8.853UDP
2024-12-13T13:15:34.424771+010020551621A Network Trojan was detected192.168.2.22627518.8.8.853UDP
2024-12-13T13:15:43.885790+010020551621A Network Trojan was detected192.168.2.22578938.8.8.853UDP
2024-12-13T13:15:44.892281+010020551621A Network Trojan was detected192.168.2.22578938.8.8.853UDP
2024-12-13T13:15:45.253546+010020551621A Network Trojan was detected192.168.2.22548218.8.8.853UDP
2024-12-13T13:15:54.713140+010020551621A Network Trojan was detected192.168.2.22547198.8.8.853UDP
2024-12-13T13:15:54.855339+010020551621A Network Trojan was detected192.168.2.22498818.8.8.853UDP
2024-12-13T13:16:00.518052+010020551621A Network Trojan was detected192.168.2.22549988.8.8.853UDP
2024-12-13T13:16:00.642918+010020551621A Network Trojan was detected192.168.2.22527818.8.8.853UDP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: rcNDmdah2W.docReversingLabs: Detection: 36%
Source: unknownHTTPS traffic detected: 114.55.89.54:443 -> 192.168.2.22:49171 version: TLS 1.0
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: global trafficDNS query: name: mofadividion.ptcl-gov.com
Source: global trafficDNS query: name: mofadividion.ptcl-gov.com
Source: global trafficDNS query: name: mofadividion.ptcl-gov.com
Source: global trafficDNS query: name: mofadividion.ptcl-gov.com
Source: global trafficDNS query: name: mofadividion.ptcl-gov.com
Source: global trafficDNS query: name: mofadividion.ptcl-gov.com
Source: global trafficDNS query: name: mofadividion.ptcl-gov.com
Source: global trafficDNS query: name: mofadividion.ptcl-gov.com
Source: global trafficDNS query: name: mofadividion.ptcl-gov.com
Source: global trafficDNS query: name: mofadividion.ptcl-gov.com
Source: global trafficDNS query: name: mofadividion.ptcl-gov.com
Source: global trafficDNS query: name: mofadividion.ptcl-gov.com
Source: global trafficDNS query: name: mofadividion.ptcl-gov.com
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49166 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49166 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49166 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49166 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49166 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49169 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49169 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49169 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49169 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49169 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49170 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49170 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49170 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49169 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49170 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49170 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49171 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49171 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49171 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49171 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49171 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49171 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49171 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49172 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49172 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49172 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49172 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49172 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49174 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49174 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49174 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49174 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49174 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49175 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49175 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49175 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49175 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49175 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49165
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49165
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49165
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49165 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49165
Source: global trafficTCP traffic: 192.168.2.22:49166 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49166
Source: global trafficTCP traffic: 192.168.2.22:49166 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49166 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49166
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49166
Source: global trafficTCP traffic: 192.168.2.22:49166 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49166 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49166
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49167
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49167
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49167
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49167
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49167
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49168
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49168
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49168
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49168 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49168
Source: global trafficTCP traffic: 192.168.2.22:49169 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49169
Source: global trafficTCP traffic: 192.168.2.22:49169 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49169 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49169
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49169
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49169
Source: global trafficTCP traffic: 192.168.2.22:49169 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49169 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49170 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49170
Source: global trafficTCP traffic: 192.168.2.22:49170 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49170 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49170
Source: global trafficTCP traffic: 192.168.2.22:49169 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49169
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49170
Source: global trafficTCP traffic: 192.168.2.22:49170 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49170 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49170
Source: global trafficTCP traffic: 192.168.2.22:49171 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49171
Source: global trafficTCP traffic: 192.168.2.22:49171 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49171 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49171
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49171
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49171
Source: global trafficTCP traffic: 192.168.2.22:49171 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49171 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49171
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49171
Source: global trafficTCP traffic: 192.168.2.22:49171 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49171 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49171
Source: global trafficTCP traffic: 192.168.2.22:49172 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49172
Source: global trafficTCP traffic: 192.168.2.22:49172 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49172 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49172
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49172
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49172
Source: global trafficTCP traffic: 192.168.2.22:49172 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49172 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49172
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49173
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49173
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49173
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49173 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49173
Source: global trafficTCP traffic: 192.168.2.22:49174 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49174
Source: global trafficTCP traffic: 192.168.2.22:49174 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49174 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49174
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49174
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49174
Source: global trafficTCP traffic: 192.168.2.22:49174 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49174 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49174
Source: global trafficTCP traffic: 192.168.2.22:49175 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49175
Source: global trafficTCP traffic: 192.168.2.22:49175 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49175 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49175
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49175
Source: global trafficTCP traffic: 192.168.2.22:49175 -> 114.55.89.54:443
Source: global trafficTCP traffic: 192.168.2.22:49175 -> 114.55.89.54:443
Source: global trafficTCP traffic: 114.55.89.54:443 -> 192.168.2.22:49175

Networking

barindex
Source: Network trafficSuricata IDS: 2038860 - Severity 1 - ET MALWARE Sidewinder APT Related Domain in DNS Lookup (ptcl-gov .com) : 192.168.2.22:54562 -> 8.8.8.8:53
Source: Network trafficSuricata IDS: 2055162 - Severity 1 - ET MALWARE TA399/Sidewinder APT CnC Domain in DNS Lookup (mofadividion .ptcl-gov .com) : 192.168.2.22:54562 -> 8.8.8.8:53
Source: Network trafficSuricata IDS: 2038860 - Severity 1 - ET MALWARE Sidewinder APT Related Domain in DNS Lookup (ptcl-gov .com) : 192.168.2.22:52917 -> 8.8.8.8:53
Source: Network trafficSuricata IDS: 2038860 - Severity 1 - ET MALWARE Sidewinder APT Related Domain in DNS Lookup (ptcl-gov .com) : 192.168.2.22:52781 -> 8.8.8.8:53
Source: Network trafficSuricata IDS: 2055162 - Severity 1 - ET MALWARE TA399/Sidewinder APT CnC Domain in DNS Lookup (mofadividion .ptcl-gov .com) : 192.168.2.22:52917 -> 8.8.8.8:53
Source: Network trafficSuricata IDS: 2055162 - Severity 1 - ET MALWARE TA399/Sidewinder APT CnC Domain in DNS Lookup (mofadividion .ptcl-gov .com) : 192.168.2.22:52781 -> 8.8.8.8:53
Source: Network trafficSuricata IDS: 2038860 - Severity 1 - ET MALWARE Sidewinder APT Related Domain in DNS Lookup (ptcl-gov .com) : 192.168.2.22:57893 -> 8.8.8.8:53
Source: Network trafficSuricata IDS: 2055162 - Severity 1 - ET MALWARE TA399/Sidewinder APT CnC Domain in DNS Lookup (mofadividion .ptcl-gov .com) : 192.168.2.22:57893 -> 8.8.8.8:53
Source: Network trafficSuricata IDS: 2055190 - Severity 1 - ET MALWARE Observed TA399/Sidewinder APT Domain (mofadividion .ptcl-gov .com in TLS SNI) : 192.168.2.22:49173 -> 114.55.89.54:443
Source: Network trafficSuricata IDS: 2055190 - Severity 1 - ET MALWARE Observed TA399/Sidewinder APT Domain (mofadividion .ptcl-gov .com in TLS SNI) : 192.168.2.22:49166 -> 114.55.89.54:443
Source: Network trafficSuricata IDS: 2038860 - Severity 1 - ET MALWARE Sidewinder APT Related Domain in DNS Lookup (ptcl-gov .com) : 192.168.2.22:54998 -> 8.8.8.8:53
Source: Network trafficSuricata IDS: 2055162 - Severity 1 - ET MALWARE TA399/Sidewinder APT CnC Domain in DNS Lookup (mofadividion .ptcl-gov .com) : 192.168.2.22:54998 -> 8.8.8.8:53
Source: Network trafficSuricata IDS: 2038860 - Severity 1 - ET MALWARE Sidewinder APT Related Domain in DNS Lookup (ptcl-gov .com) : 192.168.2.22:54821 -> 8.8.8.8:53
Source: Network trafficSuricata IDS: 2055162 - Severity 1 - ET MALWARE TA399/Sidewinder APT CnC Domain in DNS Lookup (mofadividion .ptcl-gov .com) : 192.168.2.22:54821 -> 8.8.8.8:53
Source: Network trafficSuricata IDS: 2055190 - Severity 1 - ET MALWARE Observed TA399/Sidewinder APT Domain (mofadividion .ptcl-gov .com in TLS SNI) : 192.168.2.22:49175 -> 114.55.89.54:443
Source: Network trafficSuricata IDS: 2055190 - Severity 1 - ET MALWARE Observed TA399/Sidewinder APT Domain (mofadividion .ptcl-gov .com in TLS SNI) : 192.168.2.22:49168 -> 114.55.89.54:443
Source: Network trafficSuricata IDS: 2055190 - Severity 1 - ET MALWARE Observed TA399/Sidewinder APT Domain (mofadividion .ptcl-gov .com in TLS SNI) : 192.168.2.22:49165 -> 114.55.89.54:443
Source: Network trafficSuricata IDS: 2038860 - Severity 1 - ET MALWARE Sidewinder APT Related Domain in DNS Lookup (ptcl-gov .com) : 192.168.2.22:62751 -> 8.8.8.8:53
Source: Network trafficSuricata IDS: 2055190 - Severity 1 - ET MALWARE Observed TA399/Sidewinder APT Domain (mofadividion .ptcl-gov .com in TLS SNI) : 192.168.2.22:49170 -> 114.55.89.54:443
Source: Network trafficSuricata IDS: 2055190 - Severity 1 - ET MALWARE Observed TA399/Sidewinder APT Domain (mofadividion .ptcl-gov .com in TLS SNI) : 192.168.2.22:49171 -> 114.55.89.54:443
Source: Network trafficSuricata IDS: 2055162 - Severity 1 - ET MALWARE TA399/Sidewinder APT CnC Domain in DNS Lookup (mofadividion .ptcl-gov .com) : 192.168.2.22:62751 -> 8.8.8.8:53
Source: Network trafficSuricata IDS: 2038860 - Severity 1 - ET MALWARE Sidewinder APT Related Domain in DNS Lookup (ptcl-gov .com) : 192.168.2.22:49881 -> 8.8.8.8:53
Source: Network trafficSuricata IDS: 2055162 - Severity 1 - ET MALWARE TA399/Sidewinder APT CnC Domain in DNS Lookup (mofadividion .ptcl-gov .com) : 192.168.2.22:49881 -> 8.8.8.8:53
Source: Network trafficSuricata IDS: 2038860 - Severity 1 - ET MALWARE Sidewinder APT Related Domain in DNS Lookup (ptcl-gov .com) : 192.168.2.22:54719 -> 8.8.8.8:53
Source: Network trafficSuricata IDS: 2055162 - Severity 1 - ET MALWARE TA399/Sidewinder APT CnC Domain in DNS Lookup (mofadividion .ptcl-gov .com) : 192.168.2.22:54719 -> 8.8.8.8:53
Source: Joe Sandbox ViewASN Name: CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd
Source: Joe Sandbox ViewJA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
Source: unknownHTTPS traffic detected: 114.55.89.54:443 -> 192.168.2.22:49171 version: TLS 1.0
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A7637A8B-232A-4C9D-AD88-33F77F399EE9}.tmpJump to behavior
Source: global trafficDNS traffic detected: DNS query: mofadividion.ptcl-gov.com
Source: ~WRS{C538C006-CC9B-485B-874D-E099D08C4F56}.tmp.0.drString found in binary or memory: https://mofadividion.ptcl-gov.com/5724/1/3268/2/0/0/0/m/files-11e30891/file.rtf
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49169
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49168
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49166
Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49175
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49174
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49173
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49172
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49171
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49170
Source: unknownNetwork traffic detected: HTTP traffic on port 49172 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49175 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49168 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49169 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49170 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49171 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49166 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49173 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49174 -> 443

System Summary

barindex
Source: _rels\document.xml.rels, type: SAMPLEMatched rule: Detects XML relations where an OLE object is refrencing an external target in dropper OOXML documents Author: ditekSHen
Source: _rels\document.xml.rels, type: SAMPLEMatched rule: INDICATOR_OLE_RemoteTemplate author = ditekSHen, description = Detects XML relations where an OLE object is refrencing an external target in dropper OOXML documents
Source: classification engineClassification label: mal80.evad.winDOC@1/23@13/1
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$NDmdah2W.docJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR8036.tmpJump to behavior
Source: rcNDmdah2W.docOLE indicator, Word Document stream: true
Source: msoA5D6.tmp.0.drOLE indicator, Word Document stream: true
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: rcNDmdah2W.docReversingLabs: Detection: 36%
Source: rcNDmdah2W.LNK.0.drLNK file: ..\..\..\..\..\Desktop\rcNDmdah2W.doc
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: rcNDmdah2W.docInitial sample: OLE indicators vbamacros = False

Persistence and Installation Behavior

barindex
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \Device\RdpDr\;:1\mofadividion.ptcl-gov.com@SSL\DavWWWRootJump to behavior
Source: _rels\document.xml.relsExtracted files from sample: https://mofadividion.ptcl-gov.com/5724/1/3268/2/0/0/0/m/files-11e30891/file.rtf
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXESection loaded: netapi32.dll and davhlpr.dll loadedJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
Exploitation for Client Execution
Path InterceptionPath Interception1
Masquerading
OS Credential Dumping1
File and Directory Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
rcNDmdah2W.doc37%ReversingLabsDocument-Word.Downloader.Donoff
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://mofadividion.ptcl-gov.com/5724/1/3268/2/0/0/0/m/files-11e30891/file.rtf0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
mofadividion.ptcl-gov.com
114.55.89.54
truetrue
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://mofadividion.ptcl-gov.com/5724/1/3268/2/0/0/0/m/files-11e30891/file.rtf~WRS{C538C006-CC9B-485B-874D-E099D08C4F56}.tmp.0.drtrue
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    114.55.89.54
    mofadividion.ptcl-gov.comChina
    37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdtrue
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1574598
    Start date and time:2024-12-13 13:14:19 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 5m 21s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:defaultwindowsofficecookbook.jbs
    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
    Number of analysed new started processes analysed:11
    Number of new started drivers analysed:1
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:rcNDmdah2W.doc
    renamed because original name is a hash value
    Original Sample Name:4eab5c5775c41de887ba4e589ab8cf4340236da73a68a68d26cbb7f34e0546f7.doc
    Detection:MAL
    Classification:mal80.evad.winDOC@1/23@13/1
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .doc
    • Found Word or Excel or PowerPoint or XPS Viewer
    • Attach to Office via COM
    • Scroll down
    • Close Viewer
    • Exclude process from analysis (whitelisted): mrxdav.sys, dllhost.exe, rundll32.exe, WMIADAP.exe, svchost.exe
    • Report size getting too big, too many NtQueryValueKey calls found.
    • VT rate limit hit for: rcNDmdah2W.doc
    No simulations
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    114.55.89.54Payment-251124.exeGet hashmaliciousFormBookBrowse
    • www.buckser.info/4a2y/
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdartifact.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
    • 118.31.122.36
    3.exeGet hashmaliciousCobaltStrike, ReflectiveLoaderBrowse
    • 101.37.34.164
    3.exeGet hashmaliciousCobaltStrikeBrowse
    • 101.37.34.164
    1.exeGet hashmaliciousCobaltStrikeBrowse
    • 101.37.34.164
    arm7.nn-20241213-0355.elfGet hashmaliciousMirai, OkiruBrowse
    • 59.83.11.245
    arm5.nn.elfGet hashmaliciousMirai, OkiruBrowse
    • 8.149.48.177
    mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
    • 112.125.98.26
    sh4.nn.elfGet hashmaliciousMirai, OkiruBrowse
    • 47.104.176.150
    b3astmode.mpsl.elfGet hashmaliciousMiraiBrowse
    • 223.7.237.157
    b3astmode.ppc.elfGet hashmaliciousMiraiBrowse
    • 8.188.217.36
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    05af1f5ca1b87cc9cc9b25185115607dSLNA_Updated_Medical_Grant_Application(1).docxGet hashmaliciousUnknownBrowse
    • 114.55.89.54
    CMR ART009.docxGet hashmaliciousUnknownBrowse
    • 114.55.89.54
    Cot90012ARCACONTAL.xlsGet hashmaliciousRemcosBrowse
    • 114.55.89.54
    Euro confirmation Sp.xlsGet hashmaliciousUnknownBrowse
    • 114.55.89.54
    510005940.docx.docGet hashmaliciousUnknownBrowse
    • 114.55.89.54
    invoice09850.xlsGet hashmaliciousRemcosBrowse
    • 114.55.89.54
    Invoice A037.xlsGet hashmaliciousUnknownBrowse
    • 114.55.89.54
    Request for quote.docGet hashmaliciousSnake KeyloggerBrowse
    • 114.55.89.54
    NESTLE_MEXICO_Purchase_Order_10122024.xlsGet hashmaliciousUnknownBrowse
    • 114.55.89.54
    FATR98765678000.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
    • 114.55.89.54
    No context
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):131072
    Entropy (8bit):0.025527862132460118
    Encrypted:false
    SSDEEP:6:I3DPcROCgHvxggLREKmgliPxvRXv//4tfnRujlw//+GtluJ/eRuj:I3DPAOCwIg455vYg3J/
    MD5:F3E8C50E3FF3DC8223B886269877FE06
    SHA1:5AC5F6F4813E5BDDA01E5A36D4C06A7EE9A6A577
    SHA-256:26D5344A2A0D731BA1D2C2513B474DE68E801C8E23B69F0BF579B034B90DB077
    SHA-512:A1D1288814C4D92F6A8C1D0B7C2FD1A3E4E3E2F012D6B74E79D6D6BA598E6617AB42E576E9233E39CB6D9F6435E9DB03887A52BDE6F7EADB3ED425B0226648AD
    Malicious:false
    Reputation:low
    Preview:......M.eFy...zV.Vu..~A.a.....S,...X.F...Fa.q............................{h6@..E..m?$[...........6.|..AG.|l./d.......................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):52
    Entropy (8bit):4.408877036242436
    Encrypted:false
    SSDEEP:3:wcezDHulxkAMviHAn:wJvYxJDHA
    MD5:912FF26AC760112B12167F902F17ECFD
    SHA1:AC2D2544F0607A40D2255A04AEDE580AC91F4673
    SHA-256:1833637D2BB49186E0667AE0896ECC4D5B00B3383529F74EDB75CAD8748CD9B3
    SHA-512:E837E4EE45800980D4001A80988224641538FD2F26A18BB5E9A68EBBEA7A97F47AACC5B81FE9105931CDA6DD2A721D5F7DE880417560096C1E779EAF5C6D82F7
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview:<Default Extension="emf" ContentType="image/x-emf"/>
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):52
    Entropy (8bit):4.408877036242436
    Encrypted:false
    SSDEEP:3:wcezDHulxkAMviHAn:wJvYxJDHA
    MD5:912FF26AC760112B12167F902F17ECFD
    SHA1:AC2D2544F0607A40D2255A04AEDE580AC91F4673
    SHA-256:1833637D2BB49186E0667AE0896ECC4D5B00B3383529F74EDB75CAD8748CD9B3
    SHA-512:E837E4EE45800980D4001A80988224641538FD2F26A18BB5E9A68EBBEA7A97F47AACC5B81FE9105931CDA6DD2A721D5F7DE880417560096C1E779EAF5C6D82F7
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview:<Default Extension="emf" ContentType="image/x-emf"/>
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):52
    Entropy (8bit):4.408877036242436
    Encrypted:false
    SSDEEP:3:wcezDHulxkAMviHAn:wJvYxJDHA
    MD5:912FF26AC760112B12167F902F17ECFD
    SHA1:AC2D2544F0607A40D2255A04AEDE580AC91F4673
    SHA-256:1833637D2BB49186E0667AE0896ECC4D5B00B3383529F74EDB75CAD8748CD9B3
    SHA-512:E837E4EE45800980D4001A80988224641538FD2F26A18BB5E9A68EBBEA7A97F47AACC5B81FE9105931CDA6DD2A721D5F7DE880417560096C1E779EAF5C6D82F7
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview:<Default Extension="emf" ContentType="image/x-emf"/>
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1589x2269, components 3
    Category:dropped
    Size (bytes):454054
    Entropy (8bit):7.847430416886664
    Encrypted:false
    SSDEEP:6144:wbcBowLZc2lysUhOwRJAToIqOgNG7jt1OWr62HwzhDKGykl4Luiupzxj91K:wwpVtRwRiToIqr+iWmFzhDt4qiEm
    MD5:36A76B9E86DEE297AD073E1D71611D05
    SHA1:71B7489424654DC8A6D7C7466789DE595D990FB3
    SHA-256:08BD491928A27919728398DA4A3A8AC8659EBA40DAF9DBF122F272EB92867A45
    SHA-512:3097BF5FD33C109060D2F7C27726FCED6B86BD20F7A6A629C818F66CF7D51CD47522898B5099E25A38FC0204BD3942069660DD5CBEFC5AD58935029DB23768D3
    Malicious:false
    Reputation:low
    Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222........5.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(..
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):52
    Entropy (8bit):4.408877036242436
    Encrypted:false
    SSDEEP:3:wcezDHulxkAMviHAn:wJvYxJDHA
    MD5:912FF26AC760112B12167F902F17ECFD
    SHA1:AC2D2544F0607A40D2255A04AEDE580AC91F4673
    SHA-256:1833637D2BB49186E0667AE0896ECC4D5B00B3383529F74EDB75CAD8748CD9B3
    SHA-512:E837E4EE45800980D4001A80988224641538FD2F26A18BB5E9A68EBBEA7A97F47AACC5B81FE9105931CDA6DD2A721D5F7DE880417560096C1E779EAF5C6D82F7
    Malicious:false
    Preview:<Default Extension="emf" ContentType="image/x-emf"/>
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):52
    Entropy (8bit):4.408877036242436
    Encrypted:false
    SSDEEP:3:wcezDHulxkAMviHAn:wJvYxJDHA
    MD5:912FF26AC760112B12167F902F17ECFD
    SHA1:AC2D2544F0607A40D2255A04AEDE580AC91F4673
    SHA-256:1833637D2BB49186E0667AE0896ECC4D5B00B3383529F74EDB75CAD8748CD9B3
    SHA-512:E837E4EE45800980D4001A80988224641538FD2F26A18BB5E9A68EBBEA7A97F47AACC5B81FE9105931CDA6DD2A721D5F7DE880417560096C1E779EAF5C6D82F7
    Malicious:false
    Preview:<Default Extension="emf" ContentType="image/x-emf"/>
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 1589x2269, components 3
    Category:dropped
    Size (bytes):364910
    Entropy (8bit):7.832325636145698
    Encrypted:false
    SSDEEP:6144:zr4kD7kg/tRaIvyw5yTEhWGTO94uZR0ZmMUZ2fOgOHwsc:zrf7kGHa/Eyd0OGYSZmBkOgOPc
    MD5:C6C03425F4D5BEDB53D7746F59C1002A
    SHA1:83E310D86AE81D8DE7D20AF793230A37D5A577D6
    SHA-256:4F3447D478A3D8677B9CC473E11F32F97BAA582B5A84D8501129EF80EB1B763C
    SHA-512:6B9E27846D82E2EEDEA8FC4B3AB6AB5B4E98B25D1225EA02BBC596A683DC0C2ADEB1C91AFF14243278DF83BC4C08896AAAB3E4EAEA8A6E2E8532D85A96E8736F
    Malicious:false
    Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222........5.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...f....G".V.PFE>.(...(...(...(...(...(...(...(...(...(...(...(...(...(...d..6._..}.>.(...(..K'...;e...'...).P.E.P.E.P.E.P.E.P.E.P.Q$..e..Dj..#.l.{..~.....(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(..+..u......_1.G.`.X.9..2q..b.(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(..........|.
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):52
    Entropy (8bit):4.408877036242436
    Encrypted:false
    SSDEEP:3:wcezDHulxkAMviHAn:wJvYxJDHA
    MD5:912FF26AC760112B12167F902F17ECFD
    SHA1:AC2D2544F0607A40D2255A04AEDE580AC91F4673
    SHA-256:1833637D2BB49186E0667AE0896ECC4D5B00B3383529F74EDB75CAD8748CD9B3
    SHA-512:E837E4EE45800980D4001A80988224641538FD2F26A18BB5E9A68EBBEA7A97F47AACC5B81FE9105931CDA6DD2A721D5F7DE880417560096C1E779EAF5C6D82F7
    Malicious:false
    Preview:<Default Extension="emf" ContentType="image/x-emf"/>
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):52
    Entropy (8bit):4.408877036242436
    Encrypted:false
    SSDEEP:3:wcezDHulxkAMviHAn:wJvYxJDHA
    MD5:912FF26AC760112B12167F902F17ECFD
    SHA1:AC2D2544F0607A40D2255A04AEDE580AC91F4673
    SHA-256:1833637D2BB49186E0667AE0896ECC4D5B00B3383529F74EDB75CAD8748CD9B3
    SHA-512:E837E4EE45800980D4001A80988224641538FD2F26A18BB5E9A68EBBEA7A97F47AACC5B81FE9105931CDA6DD2A721D5F7DE880417560096C1E779EAF5C6D82F7
    Malicious:false
    Preview:<Default Extension="emf" ContentType="image/x-emf"/>
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):52
    Entropy (8bit):4.408877036242436
    Encrypted:false
    SSDEEP:3:wcezDHulxkAMviHAn:wJvYxJDHA
    MD5:912FF26AC760112B12167F902F17ECFD
    SHA1:AC2D2544F0607A40D2255A04AEDE580AC91F4673
    SHA-256:1833637D2BB49186E0667AE0896ECC4D5B00B3383529F74EDB75CAD8748CD9B3
    SHA-512:E837E4EE45800980D4001A80988224641538FD2F26A18BB5E9A68EBBEA7A97F47AACC5B81FE9105931CDA6DD2A721D5F7DE880417560096C1E779EAF5C6D82F7
    Malicious:false
    Preview:<Default Extension="emf" ContentType="image/x-emf"/>
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:ASCII text, with no line terminators
    Category:dropped
    Size (bytes):52
    Entropy (8bit):4.408877036242436
    Encrypted:false
    SSDEEP:3:wcezDHulxkAMviHAn:wJvYxJDHA
    MD5:912FF26AC760112B12167F902F17ECFD
    SHA1:AC2D2544F0607A40D2255A04AEDE580AC91F4673
    SHA-256:1833637D2BB49186E0667AE0896ECC4D5B00B3383529F74EDB75CAD8748CD9B3
    SHA-512:E837E4EE45800980D4001A80988224641538FD2F26A18BB5E9A68EBBEA7A97F47AACC5B81FE9105931CDA6DD2A721D5F7DE880417560096C1E779EAF5C6D82F7
    Malicious:false
    Preview:<Default Extension="emf" ContentType="image/x-emf"/>
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:Microsoft Word 2007+
    Category:dropped
    Size (bytes):745770
    Entropy (8bit):7.997693280277053
    Encrypted:true
    SSDEEP:12288:/PlUMskI+N9OKy/44q9CtbIwGyNoZKjbR0Nygt7x+DiPE+pGsMVZFxl6Yo:/P2MzH0tswGKjbR0AgjntpGsMVZDC
    MD5:43BDD79B5512296FE3D16DCA5522663F
    SHA1:D7E3841EA27ABEA580F44364BB95EB6EDE0B6AE5
    SHA-256:C22D2D21EAA9511FD84DF3B64E715F9E9909355D0297EEC3F9904839018B9013
    SHA-512:4E7623C183D286A3A9F3D9C3789CB471548F4501A431BCA8BA33296F6E61350ED5F9AEF1DA60D0506327A8DA0493EE6C9F575C8FDD9F5FC20D8CD0BB5CB27274
    Malicious:false
    Preview:PK..........!.{.|...........[Content_Types].xml ...(....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................T.N.0..7.......1....K%.....Fu=.-....`.q2.p......t0Z.*........I@s#..s.6yJoI...UFCNV..hxy1..,.....d......)(.3cA.0N..KWR..'+.^.z7...@.4D.2.<@.fUH...{..TA....(..."~...m.|X([A.....{.fm%9....k..&.$..Y..Si.....U.|O.+.....8) .3....T.>v.z....,-6MQH..1SXu..Z.".H..H.z>......".....D...{j..I9x.7YU.Y1...jK^.(..M.{...{..0...4.!.4...C..m!.*8....S>.s....On...\....z.!o.....~.......PK..........!.........N......._rels/.rels ...(.....
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):16384
    Entropy (8bit):0.0
    Encrypted:false
    SSDEEP:3::
    MD5:CE338FE6899778AACFC28414F2D9498B
    SHA1:897256B6709E1A4DA9DABA92B6BDE39CCFCCD8C1
    SHA-256:4FE7B59AF6DE3B665B67788CC2F99892AB827EFAE3A467342B3BB4E3BC8E5BFE
    SHA-512:6EB7F16CF7AFCABE9BDEA88BDAB0469A7937EB715ADA9DFD8F428D9D38D86133945F5F2F2688DDD96062223A39B5D47F07AFC3C48D9DB1D5EE3F41C8D274DCCF
    Malicious:false
    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):1024
    Entropy (8bit):0.05390218305374581
    Encrypted:false
    SSDEEP:3:ol3lYdn:4Wn
    MD5:5D4D94EE7E06BBB0AF9584119797B23A
    SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
    SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
    SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
    Malicious:false
    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):1536
    Entropy (8bit):2.2544553565617265
    Encrypted:false
    SSDEEP:12:8CvltebYcZBW0lFegN4lx1tK7HbtJWkwSGJk5u:jPelu0SlxC7HbtOBf
    MD5:BD268E089D33EF83C9DDAA6637D1C2B7
    SHA1:F83C7A94D76F027C367AA69DFBF680F82DCB17DF
    SHA-256:7D93E8D3D9CEE62BEB9EDF45C88FEA16DEEA31E55360FD64C65D2B778FD6AB40
    SHA-512:3213EAF2ED657DC1306F08048C65EB77915089AFC5F45855C272EF1C507AD2743B479D102C0C0D1FFAEF73B480FCC84A02A0875B510F21F5D275161EB78C449F
    Malicious:false
    Preview:../................... .|B$.k...../.....L.I.N.K. .W.o.r.d...D.o.c.u.m.e.n.t...8. .".h.t.t.p.s.:././.m.o.f.a.d.i.v.i.d.i.o.n...p.t.c.l.-.g.o.v...c.o.m./.5.7.2.4./.1./.3.2.6.8./.2./.0./.0./.0./.m./.f.i.l.e.s.-.1.1.e.3.0.8.9.1./.f.i.l.e...r.t.f.". .".". .\.a. .\.p. .\.f. .0..... . ................................................................................................................................................................................................................................................. ..."...&............................................................................................................................................................................................................................................................................................................................................................................................................................................................................d...d.-D..M
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):1024
    Entropy (8bit):0.14506762849621524
    Encrypted:false
    SSDEEP:3:JlXll/lY4GlxlG:fyC
    MD5:DF4E8F0F79A1CD6BD344AEE21E37CDF7
    SHA1:A9E7BAE751AFC3F9B1DC1BC699896B53EB7405E3
    SHA-256:4A31B435E99CBF16ED5B56AF91656B92A2B39EFEE43D66BFAAB5F10F9F375242
    SHA-512:77D69A2D1F5AC99EC6E343EBAA3540514157CC6125CEAB076D1321D7731089F414AF2840808AB456266C8F51325411DEFC8D0C751FF2B3FA57495FA94CD311BA
    Malicious:false
    Preview:D...D.d......................$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................D...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):131072
    Entropy (8bit):0.025527862132460118
    Encrypted:false
    SSDEEP:6:I3DPcROCgHvxggLREKmgliPxvRXv//4tfnRujlw//+GtluJ/eRuj:I3DPAOCwIg455vYg3J/
    MD5:F3E8C50E3FF3DC8223B886269877FE06
    SHA1:5AC5F6F4813E5BDDA01E5A36D4C06A7EE9A6A577
    SHA-256:26D5344A2A0D731BA1D2C2513B474DE68E801C8E23B69F0BF579B034B90DB077
    SHA-512:A1D1288814C4D92F6A8C1D0B7C2FD1A3E4E3E2F012D6B74E79D6D6BA598E6617AB42E576E9233E39CB6D9F6435E9DB03887A52BDE6F7EADB3ED425B0226648AD
    Malicious:false
    Preview:......M.eFy...zV.Vu..~A.a.....S,...X.F...Fa.q............................{h6@..E..m?$[...........6.|..AG.|l./d.......................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):131072
    Entropy (8bit):0.02564677192647636
    Encrypted:false
    SSDEEP:6:I3DPcWvGvxggLRJ80p18eGDRXv//4tfnRujlw//+GtluJ/eRuj:I3DPP430e2vYg3J/
    MD5:C6633B213414F4C9CF969EB597AD0972
    SHA1:F1F4771749E18F11493749A42494F83FDDF548AB
    SHA-256:0242870B331667F04A41C7D75E9E46559BE092FC6B5045D21AEDCE488999FB66
    SHA-512:06A4D72BBC94A8FAED5D68C9F54371AF71B5EA2C2084BAA3853F9BB34F2975231446DAB361BD1BA1D35F2F176205F9601F9EA0E3AFB0072AB67CB7D307756CAD
    Malicious:false
    Preview:......M.eFy...z]Y!).'.O.......S,...X.F...Fa.q.............................`.z..L..egL...........M.D..N....6........................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:Generic INItialization configuration [folders]
    Category:dropped
    Size (bytes):54
    Entropy (8bit):4.467669446527785
    Encrypted:false
    SSDEEP:3:M1AIBEFYUlm4UhIBEFYUlv:Mi85Uu85U1
    MD5:18B59A34468ED9BA0E094560759ED81F
    SHA1:3B5417850FF2479BDD4D099406EF3AF957B6094E
    SHA-256:9AC16598B6CB5F0AF8637FC69704F7C3411EDA7CA465E1F2DF590883BF9D34E5
    SHA-512:A9AAFCC242952685667A19B8E0099FBDCD13517A0AB310EB8B363C8D67472A09392E75BD1777B0BD5386CB79AFEB59A1408378522CFDFAC3C2B9A99EAA9B6033
    Malicious:false
    Preview:[doc]..rcNDmdah2W.LNK=0..[folders]..rcNDmdah2W.LNK=0..
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:07 2023, mtime=Fri Aug 11 15:42:07 2023, atime=Fri Dec 13 11:15:10 2024, length=739377, window=hide
    Category:dropped
    Size (bytes):1014
    Entropy (8bit):4.540073246860138
    Encrypted:false
    SSDEEP:12:82CFgXg/XAlCPCHaXIBfXB/BGFX+WMjCcuoNAKicvblkqDtZ3YilMMEpxRljK6TQ:82u/XT4hXbklDexDv3qf57u
    MD5:D3BB885BDC025E511D013A3BCEF51589
    SHA1:2ED5EEFF60159213EBD3AB9E274E1FFFD0CCE857
    SHA-256:531B2819A9C641ED2B0D7D5365D6C05C9D2C081022C4F0A8FD2974E95A567A96
    SHA-512:91477F6223E61E9DA3DBE4B49BB68317733ABFB35164DED3AAB0B36A557D252B6DB310F9910EC074B5454CCD21F1B074C499E78FC8BCD8EBC00DCBB7EB6FC3F6
    Malicious:false
    Preview:L..................F.... ...5QO.r...5QO.r...>...XM..1H...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......Y.a..user.8......QK.X.Y.a*...&=....U...............A.l.b.u.s.....z.1......WE...Desktop.d......QK.X.WE.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....f.2.1H...Y.a .RCNDMD~1.DOC..J.......WD..WD.*.........................r.c.N.D.m.d.a.h.2.W...d.o.c.......x...............-...8...[............?J......C:\Users\..#...................\\688098\Users.user\Desktop\rcNDmdah2W.doc.%.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.r.c.N.D.m.d.a.h.2.W...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.7.-.3.6.7.3.3.6.4.7.7.-.1.0.0.6.............`.......X.......688098..........D_....3N...W...9..W.e8...8.....[D_....3N...W...9..W.e8
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):162
    Entropy (8bit):2.4797606462020307
    Encrypted:false
    SSDEEP:3:vrJlaCkWtVyxblgl0nGltlMWtVGXlcNOllln:vdsCkWtMe2G/LkXh/l
    MD5:89AFCB26CA4D4A770472A95DF4A52BA8
    SHA1:C3B3FEAEF38C3071AC81BC6A32242E6C39BEE9B5
    SHA-256:EF0F4A287E5375B5BFFAE39536E50FDAE97CD185C0F7892C7D25BD733E7D2F17
    SHA-512:EA44D55E57AEFA8D6F586F144CB982145384F681D0391C5AD8E616A67D77913152DB7B0F927E57CDA3D1ECEC3D343A1D6E060EAFF8E8FEDBE38394DFED8224CC
    Malicious:false
    Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    File Type:data
    Category:dropped
    Size (bytes):162
    Entropy (8bit):2.4797606462020307
    Encrypted:false
    SSDEEP:3:vrJlaCkWtVyxblgl0nGltlMWtVGXlcNOllln:vdsCkWtMe2G/LkXh/l
    MD5:89AFCB26CA4D4A770472A95DF4A52BA8
    SHA1:C3B3FEAEF38C3071AC81BC6A32242E6C39BEE9B5
    SHA-256:EF0F4A287E5375B5BFFAE39536E50FDAE97CD185C0F7892C7D25BD733E7D2F17
    SHA-512:EA44D55E57AEFA8D6F586F144CB982145384F681D0391C5AD8E616A67D77913152DB7B0F927E57CDA3D1ECEC3D343A1D6E060EAFF8E8FEDBE38394DFED8224CC
    Malicious:false
    Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
    File type:Microsoft Word 2007+
    Entropy (8bit):7.998197327007302
    TrID:
    • Word Microsoft Office Open XML Format document (49504/1) 58.23%
    • Word Microsoft Office Open XML Format document (27504/1) 32.35%
    • ZIP compressed archive (8000/1) 9.41%
    File name:rcNDmdah2W.doc
    File size:739'377 bytes
    MD5:7aa2c6c221a36ac19ce795a370cc4e29
    SHA1:dfbe7f7af54a9b315fc4f868726f050ab106294d
    SHA256:4eab5c5775c41de887ba4e589ab8cf4340236da73a68a68d26cbb7f34e0546f7
    SHA512:3dad0457fee6e1a6ce1ef08167386f320043564fc1f7b78e3cc35fec2d02c2c16b7fac8ba1a63a064a9f4ab23aa100a446dc279cb81bdd59587f42648cbea405
    SSDEEP:12288:/LPoNnPVp0Fg+rydPnhrnsTnjqfV+9ow2+Bk6VL+sOolcHvJxvhfXBT:zPoNPSenhDWOd0T2+Bk6VDlcHv3hvp
    TLSH:C5F423B9580C8E36C5A3E5794B9C72D2646D2A359A0FC03B271363E75F74348FADA0D8
    File Content Preview:PK........T8%U........N......._rels/.rels...j.0.@......Q....N/c......[IL...j...<...].aG.....zs.Fu..]...U......^.[..x.....1x.p.....f..#I)...Y.............*D....i")..c$...qU...~3..1..jH[{..=E......~.f?..3-.....].T...2.j).,.l0/%..b.......z......,..../.|f\.Z.
    Icon Hash:2764a3aaaeb7bdbf
    Document Type:OpenXML
    Number of OLE Files:1
    Has Summary Info:
    Application Name:
    Encrypted Document:False
    Contains Word Document Stream:True
    Contains Workbook/Book Stream:False
    Contains PowerPoint Document Stream:False
    Contains Visio Document Stream:False
    Contains ObjectPool Stream:False
    Flash Objects Count:0
    Contains VBA Macros:False
    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
    2024-12-13T13:15:22.949636+01002038860ET MALWARE Sidewinder APT Related Domain in DNS Lookup (ptcl-gov .com)1192.168.2.22545628.8.8.853UDP
    2024-12-13T13:15:22.949636+01002055162ET MALWARE TA399/Sidewinder APT CnC Domain in DNS Lookup (mofadividion .ptcl-gov .com)1192.168.2.22545628.8.8.853UDP
    2024-12-13T13:15:23.957927+01002038860ET MALWARE Sidewinder APT Related Domain in DNS Lookup (ptcl-gov .com)1192.168.2.22545628.8.8.853UDP
    2024-12-13T13:15:23.957927+01002055162ET MALWARE TA399/Sidewinder APT CnC Domain in DNS Lookup (mofadividion .ptcl-gov .com)1192.168.2.22545628.8.8.853UDP
    2024-12-13T13:15:27.997658+01002055190ET MALWARE Observed TA399/Sidewinder APT Domain (mofadividion .ptcl-gov .com in TLS SNI)1192.168.2.2249165114.55.89.54443TCP
    2024-12-13T13:15:32.076387+01002038860ET MALWARE Sidewinder APT Related Domain in DNS Lookup (ptcl-gov .com)1192.168.2.22529178.8.8.853UDP
    2024-12-13T13:15:32.076387+01002055162ET MALWARE TA399/Sidewinder APT CnC Domain in DNS Lookup (mofadividion .ptcl-gov .com)1192.168.2.22529178.8.8.853UDP
    2024-12-13T13:15:33.083694+01002038860ET MALWARE Sidewinder APT Related Domain in DNS Lookup (ptcl-gov .com)1192.168.2.22529178.8.8.853UDP
    2024-12-13T13:15:33.083694+01002055162ET MALWARE TA399/Sidewinder APT CnC Domain in DNS Lookup (mofadividion .ptcl-gov .com)1192.168.2.22529178.8.8.853UDP
    2024-12-13T13:15:33.423167+01002038860ET MALWARE Sidewinder APT Related Domain in DNS Lookup (ptcl-gov .com)1192.168.2.22627518.8.8.853UDP
    2024-12-13T13:15:33.423167+01002055162ET MALWARE TA399/Sidewinder APT CnC Domain in DNS Lookup (mofadividion .ptcl-gov .com)1192.168.2.22627518.8.8.853UDP
    2024-12-13T13:15:34.424771+01002038860ET MALWARE Sidewinder APT Related Domain in DNS Lookup (ptcl-gov .com)1192.168.2.22627518.8.8.853UDP
    2024-12-13T13:15:34.424771+01002055162ET MALWARE TA399/Sidewinder APT CnC Domain in DNS Lookup (mofadividion .ptcl-gov .com)1192.168.2.22627518.8.8.853UDP
    2024-12-13T13:15:40.949381+01002055190ET MALWARE Observed TA399/Sidewinder APT Domain (mofadividion .ptcl-gov .com in TLS SNI)1192.168.2.2249166114.55.89.54443TCP
    2024-12-13T13:15:43.885790+01002038860ET MALWARE Sidewinder APT Related Domain in DNS Lookup (ptcl-gov .com)1192.168.2.22578938.8.8.853UDP
    2024-12-13T13:15:43.885790+01002055162ET MALWARE TA399/Sidewinder APT CnC Domain in DNS Lookup (mofadividion .ptcl-gov .com)1192.168.2.22578938.8.8.853UDP
    2024-12-13T13:15:44.892281+01002038860ET MALWARE Sidewinder APT Related Domain in DNS Lookup (ptcl-gov .com)1192.168.2.22578938.8.8.853UDP
    2024-12-13T13:15:44.892281+01002055162ET MALWARE TA399/Sidewinder APT CnC Domain in DNS Lookup (mofadividion .ptcl-gov .com)1192.168.2.22578938.8.8.853UDP
    2024-12-13T13:15:45.253546+01002038860ET MALWARE Sidewinder APT Related Domain in DNS Lookup (ptcl-gov .com)1192.168.2.22548218.8.8.853UDP
    2024-12-13T13:15:45.253546+01002055162ET MALWARE TA399/Sidewinder APT CnC Domain in DNS Lookup (mofadividion .ptcl-gov .com)1192.168.2.22548218.8.8.853UDP
    2024-12-13T13:15:48.773400+01002055190ET MALWARE Observed TA399/Sidewinder APT Domain (mofadividion .ptcl-gov .com in TLS SNI)1192.168.2.2249168114.55.89.54443TCP
    2024-12-13T13:15:54.087126+01002055190ET MALWARE Observed TA399/Sidewinder APT Domain (mofadividion .ptcl-gov .com in TLS SNI)1192.168.2.2249170114.55.89.54443TCP
    2024-12-13T13:15:54.713140+01002038860ET MALWARE Sidewinder APT Related Domain in DNS Lookup (ptcl-gov .com)1192.168.2.22547198.8.8.853UDP
    2024-12-13T13:15:54.713140+01002055162ET MALWARE TA399/Sidewinder APT CnC Domain in DNS Lookup (mofadividion .ptcl-gov .com)1192.168.2.22547198.8.8.853UDP
    2024-12-13T13:15:54.855339+01002038860ET MALWARE Sidewinder APT Related Domain in DNS Lookup (ptcl-gov .com)1192.168.2.22498818.8.8.853UDP
    2024-12-13T13:15:54.855339+01002055162ET MALWARE TA399/Sidewinder APT CnC Domain in DNS Lookup (mofadividion .ptcl-gov .com)1192.168.2.22498818.8.8.853UDP
    2024-12-13T13:15:58.583414+01002055190ET MALWARE Observed TA399/Sidewinder APT Domain (mofadividion .ptcl-gov .com in TLS SNI)1192.168.2.2249171114.55.89.54443TCP
    2024-12-13T13:16:00.518052+01002038860ET MALWARE Sidewinder APT Related Domain in DNS Lookup (ptcl-gov .com)1192.168.2.22549988.8.8.853UDP
    2024-12-13T13:16:00.518052+01002055162ET MALWARE TA399/Sidewinder APT CnC Domain in DNS Lookup (mofadividion .ptcl-gov .com)1192.168.2.22549988.8.8.853UDP
    2024-12-13T13:16:00.642918+01002038860ET MALWARE Sidewinder APT Related Domain in DNS Lookup (ptcl-gov .com)1192.168.2.22527818.8.8.853UDP
    2024-12-13T13:16:00.642918+01002055162ET MALWARE TA399/Sidewinder APT CnC Domain in DNS Lookup (mofadividion .ptcl-gov .com)1192.168.2.22527818.8.8.853UDP
    2024-12-13T13:16:05.155417+01002055190ET MALWARE Observed TA399/Sidewinder APT Domain (mofadividion .ptcl-gov .com in TLS SNI)1192.168.2.2249173114.55.89.54443TCP
    2024-12-13T13:16:10.225575+01002055190ET MALWARE Observed TA399/Sidewinder APT Domain (mofadividion .ptcl-gov .com in TLS SNI)1192.168.2.2249175114.55.89.54443TCP
    TimestampSource PortDest PortSource IPDest IP
    Dec 13, 2024 13:15:24.251415014 CET49165443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:24.251472950 CET44349165114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:24.251564026 CET49165443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:24.257750988 CET49165443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:24.257783890 CET44349165114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:27.997565031 CET44349165114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:27.997658014 CET49165443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:27.997737885 CET49165443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:27.997781992 CET44349165114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:34.560092926 CET49166443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:34.560162067 CET44349166114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:34.560246944 CET49166443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:34.561026096 CET49166443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:34.561043024 CET44349166114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:40.949264050 CET44349166114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:40.949381113 CET49166443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:40.949434042 CET49166443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:40.949456930 CET44349166114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:40.949652910 CET49167443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:40.949711084 CET44349167114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:40.949824095 CET49167443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:40.950022936 CET49167443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:40.950041056 CET44349167114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:43.493388891 CET44349167114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:43.493504047 CET44349167114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:43.493649006 CET49167443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:43.493649006 CET49167443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:43.800357103 CET49167443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:43.800432920 CET44349167114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:45.389153004 CET49168443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:45.389209032 CET44349168114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:45.389291048 CET49168443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:45.389671087 CET49168443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:45.389688969 CET44349168114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:48.773225069 CET44349168114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:48.773400068 CET49168443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:48.773468971 CET49168443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:48.773483038 CET44349168114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:48.773767948 CET49169443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:48.773803949 CET44349169114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:48.773868084 CET49169443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:48.774207115 CET49169443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:48.774219990 CET44349169114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:50.547193050 CET44349169114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:50.547355890 CET44349169114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:50.547563076 CET49169443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:50.547564030 CET49169443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:50.713382959 CET49170443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:50.713423967 CET44349170114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:50.713630915 CET49170443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:50.713809013 CET49170443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:50.713823080 CET44349170114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:50.851452112 CET49169443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:50.851488113 CET44349169114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:54.086935043 CET44349170114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:54.087126017 CET49170443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:54.087291956 CET49170443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:54.087321043 CET44349170114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:54.990497112 CET49171443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:54.990551949 CET44349171114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:54.990626097 CET49171443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:54.991436958 CET49171443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:54.991473913 CET44349171114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:58.373867989 CET44349171114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:58.583343029 CET44349171114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:58.583414078 CET49171443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:58.619772911 CET49171443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:58.619818926 CET44349171114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:58.658907890 CET44349171114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:58.658987999 CET49171443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:58.659085035 CET49171443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:58.659133911 CET44349171114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:58.659265041 CET49172443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:58.659354925 CET44349172114.55.89.54192.168.2.22
    Dec 13, 2024 13:15:58.659408092 CET49172443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:58.659617901 CET49172443192.168.2.22114.55.89.54
    Dec 13, 2024 13:15:58.659636021 CET44349172114.55.89.54192.168.2.22
    Dec 13, 2024 13:16:00.336965084 CET44349172114.55.89.54192.168.2.22
    Dec 13, 2024 13:16:00.337105989 CET44349172114.55.89.54192.168.2.22
    Dec 13, 2024 13:16:00.337165117 CET49172443192.168.2.22114.55.89.54
    Dec 13, 2024 13:16:00.337368011 CET49172443192.168.2.22114.55.89.54
    Dec 13, 2024 13:16:00.337419987 CET44349172114.55.89.54192.168.2.22
    Dec 13, 2024 13:16:00.779515982 CET49173443192.168.2.22114.55.89.54
    Dec 13, 2024 13:16:00.779552937 CET44349173114.55.89.54192.168.2.22
    Dec 13, 2024 13:16:00.779625893 CET49173443192.168.2.22114.55.89.54
    Dec 13, 2024 13:16:00.779939890 CET49173443192.168.2.22114.55.89.54
    Dec 13, 2024 13:16:00.779952049 CET44349173114.55.89.54192.168.2.22
    Dec 13, 2024 13:16:05.155319929 CET44349173114.55.89.54192.168.2.22
    Dec 13, 2024 13:16:05.155416965 CET49173443192.168.2.22114.55.89.54
    Dec 13, 2024 13:16:05.155450106 CET49173443192.168.2.22114.55.89.54
    Dec 13, 2024 13:16:05.155467987 CET44349173114.55.89.54192.168.2.22
    Dec 13, 2024 13:16:05.155730963 CET49174443192.168.2.22114.55.89.54
    Dec 13, 2024 13:16:05.155772924 CET44349174114.55.89.54192.168.2.22
    Dec 13, 2024 13:16:05.155822992 CET49174443192.168.2.22114.55.89.54
    Dec 13, 2024 13:16:05.156075954 CET49174443192.168.2.22114.55.89.54
    Dec 13, 2024 13:16:05.156085968 CET44349174114.55.89.54192.168.2.22
    Dec 13, 2024 13:16:06.847140074 CET44349174114.55.89.54192.168.2.22
    Dec 13, 2024 13:16:06.847235918 CET44349174114.55.89.54192.168.2.22
    Dec 13, 2024 13:16:06.847317934 CET49174443192.168.2.22114.55.89.54
    Dec 13, 2024 13:16:06.847475052 CET49174443192.168.2.22114.55.89.54
    Dec 13, 2024 13:16:06.847496033 CET44349174114.55.89.54192.168.2.22
    Dec 13, 2024 13:16:06.858315945 CET49175443192.168.2.22114.55.89.54
    Dec 13, 2024 13:16:06.858350992 CET44349175114.55.89.54192.168.2.22
    Dec 13, 2024 13:16:06.858407021 CET49175443192.168.2.22114.55.89.54
    Dec 13, 2024 13:16:06.858732939 CET49175443192.168.2.22114.55.89.54
    Dec 13, 2024 13:16:06.858740091 CET44349175114.55.89.54192.168.2.22
    Dec 13, 2024 13:16:10.224920034 CET44349175114.55.89.54192.168.2.22
    Dec 13, 2024 13:16:10.225574970 CET49175443192.168.2.22114.55.89.54
    Dec 13, 2024 13:16:10.225610018 CET49175443192.168.2.22114.55.89.54
    Dec 13, 2024 13:16:10.225620985 CET44349175114.55.89.54192.168.2.22
    TimestampSource PortDest PortSource IPDest IP
    Dec 13, 2024 13:15:22.949635983 CET5456253192.168.2.228.8.8.8
    Dec 13, 2024 13:15:23.957926989 CET5456253192.168.2.228.8.8.8
    Dec 13, 2024 13:15:24.247908115 CET53545628.8.8.8192.168.2.22
    Dec 13, 2024 13:15:24.247925043 CET53545628.8.8.8192.168.2.22
    Dec 13, 2024 13:15:32.076386929 CET5291753192.168.2.228.8.8.8
    Dec 13, 2024 13:15:33.083693981 CET5291753192.168.2.228.8.8.8
    Dec 13, 2024 13:15:33.415826082 CET53529178.8.8.8192.168.2.22
    Dec 13, 2024 13:15:33.423166990 CET6275153192.168.2.228.8.8.8
    Dec 13, 2024 13:15:34.424771070 CET6275153192.168.2.228.8.8.8
    Dec 13, 2024 13:15:34.477454901 CET53529178.8.8.8192.168.2.22
    Dec 13, 2024 13:15:34.559338093 CET53627518.8.8.8192.168.2.22
    Dec 13, 2024 13:15:34.893647909 CET53627518.8.8.8192.168.2.22
    Dec 13, 2024 13:15:43.885790110 CET5789353192.168.2.228.8.8.8
    Dec 13, 2024 13:15:44.892281055 CET5789353192.168.2.228.8.8.8
    Dec 13, 2024 13:15:45.251075983 CET53578938.8.8.8192.168.2.22
    Dec 13, 2024 13:15:45.253546000 CET5482153192.168.2.228.8.8.8
    Dec 13, 2024 13:15:45.388587952 CET53548218.8.8.8192.168.2.22
    Dec 13, 2024 13:15:45.551455975 CET53578938.8.8.8192.168.2.22
    Dec 13, 2024 13:15:54.713140011 CET5471953192.168.2.228.8.8.8
    Dec 13, 2024 13:15:54.847537041 CET53547198.8.8.8192.168.2.22
    Dec 13, 2024 13:15:54.855339050 CET4988153192.168.2.228.8.8.8
    Dec 13, 2024 13:15:54.989563942 CET53498818.8.8.8192.168.2.22
    Dec 13, 2024 13:16:00.518052101 CET5499853192.168.2.228.8.8.8
    Dec 13, 2024 13:16:00.641829014 CET53549988.8.8.8192.168.2.22
    Dec 13, 2024 13:16:00.642918110 CET5278153192.168.2.228.8.8.8
    Dec 13, 2024 13:16:00.779010057 CET53527818.8.8.8192.168.2.22
    TimestampSource IPDest IPChecksumCodeType
    Dec 13, 2024 13:15:34.477556944 CET192.168.2.228.8.8.8d01f(Port unreachable)Destination Unreachable
    Dec 13, 2024 13:15:45.551800013 CET192.168.2.228.8.8.8d01f(Port unreachable)Destination Unreachable
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Dec 13, 2024 13:15:22.949635983 CET192.168.2.228.8.8.80x13a2Standard query (0)mofadividion.ptcl-gov.comA (IP address)IN (0x0001)false
    Dec 13, 2024 13:15:23.957926989 CET192.168.2.228.8.8.80x13a2Standard query (0)mofadividion.ptcl-gov.comA (IP address)IN (0x0001)false
    Dec 13, 2024 13:15:32.076386929 CET192.168.2.228.8.8.80x1100Standard query (0)mofadividion.ptcl-gov.comA (IP address)IN (0x0001)false
    Dec 13, 2024 13:15:33.083693981 CET192.168.2.228.8.8.80x1100Standard query (0)mofadividion.ptcl-gov.comA (IP address)IN (0x0001)false
    Dec 13, 2024 13:15:33.423166990 CET192.168.2.228.8.8.80x2664Standard query (0)mofadividion.ptcl-gov.comA (IP address)IN (0x0001)false
    Dec 13, 2024 13:15:34.424771070 CET192.168.2.228.8.8.80x2664Standard query (0)mofadividion.ptcl-gov.comA (IP address)IN (0x0001)false
    Dec 13, 2024 13:15:43.885790110 CET192.168.2.228.8.8.80xb6ecStandard query (0)mofadividion.ptcl-gov.comA (IP address)IN (0x0001)false
    Dec 13, 2024 13:15:44.892281055 CET192.168.2.228.8.8.80xb6ecStandard query (0)mofadividion.ptcl-gov.comA (IP address)IN (0x0001)false
    Dec 13, 2024 13:15:45.253546000 CET192.168.2.228.8.8.80xd97eStandard query (0)mofadividion.ptcl-gov.comA (IP address)IN (0x0001)false
    Dec 13, 2024 13:15:54.713140011 CET192.168.2.228.8.8.80x9c5bStandard query (0)mofadividion.ptcl-gov.comA (IP address)IN (0x0001)false
    Dec 13, 2024 13:15:54.855339050 CET192.168.2.228.8.8.80x4189Standard query (0)mofadividion.ptcl-gov.comA (IP address)IN (0x0001)false
    Dec 13, 2024 13:16:00.518052101 CET192.168.2.228.8.8.80x2383Standard query (0)mofadividion.ptcl-gov.comA (IP address)IN (0x0001)false
    Dec 13, 2024 13:16:00.642918110 CET192.168.2.228.8.8.80x1185Standard query (0)mofadividion.ptcl-gov.comA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Dec 13, 2024 13:15:24.247908115 CET8.8.8.8192.168.2.220x13a2No error (0)mofadividion.ptcl-gov.com114.55.89.54A (IP address)IN (0x0001)false
    Dec 13, 2024 13:15:24.247925043 CET8.8.8.8192.168.2.220x13a2No error (0)mofadividion.ptcl-gov.com114.55.89.54A (IP address)IN (0x0001)false
    Dec 13, 2024 13:15:33.415826082 CET8.8.8.8192.168.2.220x1100No error (0)mofadividion.ptcl-gov.com114.55.89.54A (IP address)IN (0x0001)false
    Dec 13, 2024 13:15:34.477454901 CET8.8.8.8192.168.2.220x1100No error (0)mofadividion.ptcl-gov.com114.55.89.54A (IP address)IN (0x0001)false
    Dec 13, 2024 13:15:34.559338093 CET8.8.8.8192.168.2.220x2664No error (0)mofadividion.ptcl-gov.com114.55.89.54A (IP address)IN (0x0001)false
    Dec 13, 2024 13:15:34.893647909 CET8.8.8.8192.168.2.220x2664No error (0)mofadividion.ptcl-gov.com114.55.89.54A (IP address)IN (0x0001)false
    Dec 13, 2024 13:15:45.251075983 CET8.8.8.8192.168.2.220xb6ecNo error (0)mofadividion.ptcl-gov.com114.55.89.54A (IP address)IN (0x0001)false
    Dec 13, 2024 13:15:45.388587952 CET8.8.8.8192.168.2.220xd97eNo error (0)mofadividion.ptcl-gov.com114.55.89.54A (IP address)IN (0x0001)false
    Dec 13, 2024 13:15:45.551455975 CET8.8.8.8192.168.2.220xb6ecNo error (0)mofadividion.ptcl-gov.com114.55.89.54A (IP address)IN (0x0001)false
    Dec 13, 2024 13:15:54.847537041 CET8.8.8.8192.168.2.220x9c5bNo error (0)mofadividion.ptcl-gov.com114.55.89.54A (IP address)IN (0x0001)false
    Dec 13, 2024 13:15:54.989563942 CET8.8.8.8192.168.2.220x4189No error (0)mofadividion.ptcl-gov.com114.55.89.54A (IP address)IN (0x0001)false
    Dec 13, 2024 13:16:00.641829014 CET8.8.8.8192.168.2.220x2383No error (0)mofadividion.ptcl-gov.com114.55.89.54A (IP address)IN (0x0001)false
    Dec 13, 2024 13:16:00.779010057 CET8.8.8.8192.168.2.220x1185No error (0)mofadividion.ptcl-gov.com114.55.89.54A (IP address)IN (0x0001)false
    TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
    Dec 13, 2024 13:15:58.373867989 CET114.55.89.54443192.168.2.2249171CN=10.10.49.172, OU=MyServer, O=MyRootServer, L=BJ, ST=BJ, C=CNCN=CA, OU=MyCA, O=MyRootCA, L=BJ, ST=BJ, C=CNTue Aug 27 12:34:59 CEST 2024Fri Aug 25 12:34:59 CEST 2034769,49172-49171-57-51-53-47-49162-49161-56-50-10-19-5-4,0-10-11-23-65281,23-24,005af1f5ca1b87cc9cc9b25185115607d

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Target ID:0
    Start time:07:15:10
    Start date:13/12/2024
    Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
    Wow64 process (32bit):false
    Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
    Imagebase:0x13f9d0000
    File size:1'423'704 bytes
    MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    No disassembly