Analysis Report From Tutz Honeychurch.docx
Overview
General Information
Detection
Score: | 0 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
No Sigma rule has matched |
---|
Signature Overview |
---|
- • Compliance
- • Networking
- • System Summary
- • Hooking and other Techniques for Hiding and Protection
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Compliance: |
---|
Uses new MSVCR Dlls |
Source: | File opened: |
Source: | File created: | Jump to behavior |
Source: | String found in binary or memory: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Window detected: |
Source: | Key opened: |
Source: | File opened: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | Masquerading1 | OS Credential Dumping | File and Directory Discovery1 | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Ingress Tool Transfer1 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | System Information Discovery1 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | ReversingLabs |
No Antivirus matches |
---|
No Antivirus matches |
---|
No Antivirus matches |
---|
No Antivirus matches |
---|
No contacted domains info |
---|
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
No contacted IP infos |
---|
General Information |
---|
Joe Sandbox Version: | 31.0.0 Emerald |
Analysis ID: | 350064 |
Start date: | 08.02.2021 |
Start time: | 17:59:29 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 4m 9s |
Hypervisor based Inspection enabled: | false |
Report type: | light |
Sample file name: | From Tutz Honeychurch.docx |
Cookbook file name: | defaultwindowsofficecookbook.jbs |
Analysis system description: | Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2) |
Number of analysed new started processes analysed: | 2 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean0.winDOCX@1/10@0/0 |
Cookbook Comments: |
|
Warnings: | Show All
|
No simulations |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 128726 |
Entropy (8bit): | 7.988134230633984 |
Encrypted: | false |
SSDEEP: | 3072:M4zQd/ql2G5UttW0RAW+Mf/+rk4RixRXAS6oAVp7ntSK:TUdSk0UHWyf2wCS6RVZtSK |
MD5: | A11C4F61D047C385DD958C376A2528B1 |
SHA1: | 4B64D035D6D684F89C39F329E17F0B1B2E201592 |
SHA-256: | 19C739772D9225218F2AF1064A6B130859F1189CEE6A0699089219BB67F72C28 |
SHA-512: | 9790E0DDB747C8438C7D3E9C3B85F872FF66DC58B15075BBCEFB6CD1CCFF434236D6A3C8A1B0311505838376D878E79F00836633884D165D41AE3B3C993604EC |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 82738 |
Entropy (8bit): | 7.8782581515028065 |
Encrypted: | false |
SSDEEP: | 1536:ko+aUDAnF1zQ257Wd9jUMZmOG9qLHRBcSbBT8poopxizty359yyUQBb1+c:nz2M25UMZmOGiHzcSbBTWa4T |
MD5: | C8113494B60EDCB3FFA7C4A237CDEBEA |
SHA1: | 25C07C78D37E5E4E2BAE55590519324283516997 |
SHA-256: | 8BF1DE9DA9D00A3EC7D24941A2B9EEA0A5C10F54C30406817BBA139F62AF7BB5 |
SHA-512: | 3C7DDCA778F9AE398903EBD1CC340253ABCC6496936AA5FA0825EF8DCBD6AD182DC1D7066A482214B0A0BD2ED3E4AF517D5F155B16BFF56BCECEEF327C022006 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 2 |
Entropy (8bit): | 1.0 |
Encrypted: | false |
SSDEEP: | 3:X:X |
MD5: | 32649384730B2D61C9E79D46DE589115 |
SHA1: | 053D8D6CEEBA9453C97D0EE5374DB863E6F77AD4 |
SHA-256: | E545D395BB3FD971F91BF9A2B6722831DF704EFAE6C1AA9DA0989ED0970B77BB |
SHA-512: | A4944ADFCB670ECD1A320FF126E7DBC7FC8CC4D5E73696D43C404E1C9BB5F228CF8A6EC1E9B1820709AD6D4D28093B7020B1B2578FDBC764287F86F888C07D9C |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 2610 |
Entropy (8bit): | 2.9623738146637613 |
Encrypted: | false |
SSDEEP: | 48:UcbMGb6MM8JQgl1FkkZKoO6Nd3htI0YHoO5cl:HbbmX8JQ49gL6Nd3htI0YHVCl |
MD5: | BAA32DA7849E8208BF81790241C7312E |
SHA1: | 2A6379C4A6CEB7695327312E97834B9D0A0D21E7 |
SHA-256: | 7C66E7A37338B323909098FF671EE3595C81C7BEF37C32493C7B2D70BC0CE5FB |
SHA-512: | BB405BCA5E17D91712AF28F470A254C1F8ACD73D7547B7BA38F9E5E33D14B741664E3C044C55A208FD6D1DB68C0BC92F8E95D10FD73E44FF313E65D306EC0320 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 1024 |
Entropy (8bit): | 0.05390218305374581 |
Encrypted: | false |
SSDEEP: | 3:ol3lYdn:4Wn |
MD5: | 5D4D94EE7E06BBB0AF9584119797B23A |
SHA1: | DBB111419C704F116EFA8E72471DD83E86E49677 |
SHA-256: | 4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1 |
SHA-512: | 95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 2148 |
Entropy (8bit): | 4.5828627200781975 |
Encrypted: | false |
SSDEEP: | 48:8e/XT0jkvPzfSD+Qh2e/XT0jkvPzfSD+Q/:8e/XojkvPjk+Qh2e/XojkvPjk+Q/ |
MD5: | A917F264113230029105911749C8CCEE |
SHA1: | EE83ED598ED323969F78FD15E9C6DCC7EC6AB4E6 |
SHA-256: | 5CEA00BF5B4DAAEF0190FAE9D7DFD9633DD2AA0F63D31F28D493990A63C2A8B3 |
SHA-512: | A49B3B331FA362061D2C169D4AC4212C42D8600507E5FC57FF759284BA72250E8104B43CC211E7657B7CBAA581BA162F8769D8A7B4682618566FA0C3E4FB243F |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 103 |
Entropy (8bit): | 4.638478959462503 |
Encrypted: | false |
SSDEEP: | 3:HoXTYRXrS7MRXrSmxWoXTYRXrSv:Hufuj |
MD5: | 431D6DB9E35E85D4176797B3712A85E2 |
SHA1: | DEBEF3FFCEA54154B4C4B6FF958072E20042DFDC |
SHA-256: | 8012B10A8FEF9E9D271F1F367A6F2DFFD070921FE5C2DB8F4357676A7FAF6D47 |
SHA-512: | 7BDE74952D7C726A4F0323E09F4888E69CAA2D478658729454692F3A7D2D77252FF16579374770F8B4E80B27CB1F6835120006E8B406E9772DA593797D4D2E98 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 162 |
Entropy (8bit): | 2.4311600611816426 |
Encrypted: | false |
SSDEEP: | 3:vrJlaCkWtVyBKbFNHlMw2imqilfln:vdsCkWtLbFNHlrHidl |
MD5: | 7F5B0CCA5E1550964CDCCA68149D5D0D |
SHA1: | 996C99E1AA101CAC6ED37A0FA9B0A64FC97173D6 |
SHA-256: | F84D176CF962EBB0437C718CD9249496DA1FE4FCEE2B18E258BC847472878D13 |
SHA-512: | 0F108B39E61109601D967DFF5B541AC31FA74AC5ACD79E6D37691A340B6371825D393589BF667B57BB6A36B5392269E249FF8B0A0A6726F56310D9B321A138FD |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 2 |
Entropy (8bit): | 1.0 |
Encrypted: | false |
SSDEEP: | 3:Qn:Qn |
MD5: | F3B25701FE362EC84616A93A45CE9998 |
SHA1: | D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB |
SHA-256: | B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209 |
SHA-512: | 98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
|
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 162 |
Entropy (8bit): | 2.4311600611816426 |
Encrypted: | false |
SSDEEP: | 3:vrJlaCkWtVyBKbFNHlMw2imqilfln:vdsCkWtLbFNHlrHidl |
MD5: | 7F5B0CCA5E1550964CDCCA68149D5D0D |
SHA1: | 996C99E1AA101CAC6ED37A0FA9B0A64FC97173D6 |
SHA-256: | F84D176CF962EBB0437C718CD9249496DA1FE4FCEE2B18E258BC847472878D13 |
SHA-512: | 0F108B39E61109601D967DFF5B541AC31FA74AC5ACD79E6D37691A340B6371825D393589BF667B57BB6A36B5392269E249FF8B0A0A6726F56310D9B321A138FD |
Malicious: | false |
Reputation: | low |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 7.956740805548689 |
TrID: |
|
File name: | From Tutz Honeychurch.docx |
File size: | 224704 |
MD5: | a5258f370733334149b30ceae94fbe99 |
SHA1: | dd86e740f5e6205725a54d980bab465d5a6cb867 |
SHA256: | 57e0592902153e996cc7c04c85bfffc866b7ebbd4d4bed7c12c02761f2181ad1 |
SHA512: | 838c84a6295f26423ed601680c8b94e448714973f1bac87274252ba10e6dd89ae006bb94a618a9f77402110e86822c9735d9930993e94da7e1b4c80ed22b2068 |
SSDEEP: | 6144:nQSW/RGijT9ZUdSk0UHWyf2wCS6RVZtSphH:nQJP9sSkf2wWT8nH |
File Content Preview: | PK..........!..A..f...T.......[Content_Types].xml ...(......................................................................................................................................................................................................... |
File Icon |
---|
Icon Hash: | e4e6a2a2a4b4b4a4 |
Network Behavior |
---|
No network behavior found |
---|
Code Manipulations |
---|
Statistics |
---|
System Behavior |
---|
Start time: | 18:00:40 |
Start date: | 08/02/2021 |
Path: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x13f8e0000 |
File size: | 1424032 bytes |
MD5 hash: | 95C38D04597050285A18F66039EDB456 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
File Activities
Registry Activities
Disassembly |
---|