Loading ...

Play interactive tourEdit tour

Analysis Report Revised_PO_758869.docx

Overview

General Information

Sample Name:Revised_PO_758869.docx
Analysis ID:405914
MD5:bd5e0d325783b0526ae79b58fe08ee77
SHA1:c066447df75901430365317b71d21369edf340f6
SHA256:69ba01eb1fe057757516dbc89211b3990fefe9b894f0594af2ccebe500442202
Tags:docx
Infos:

Most interesting Screenshot:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains an external reference to another document
Multi AV Scanner detection for submitted file
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)

Classification

Startup

  • System is w7x64
  • WINWORD.EXE (PID: 1244 cmdline: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding MD5: 95C38D04597050285A18F66039EDB456)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted fileShow sources
Source: Revised_PO_758869.docxVirustotal: Detection: 23%Perma Link
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
Source: unknownHTTPS traffic detected: 185.255.55.12:443 -> 192.168.2.22:49167 version: TLS 1.2
Source: global trafficDNS query: name: u.nu
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 185.255.55.12:443
Source: global trafficTCP traffic: 192.168.2.22:49167 -> 185.255.55.12:443
Source: Joe Sandbox ViewASN Name: XTOMxTomEU XTOMxTomEU
Source: Joe Sandbox ViewJA3 fingerprint: 36f7277af969a6947a61ae0b815907a1
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{6892A68A-6F93-4194-97B0-E6749671AC21}.tmpJump to behavior
Source: unknownDNS traffic detected: queries for: u.nu
Source: 77EC63BDA74BD0D0E0426DC8F8008506.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49169
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49172
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49171
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49170
Source: unknownNetwork traffic detected: HTTP traffic on port 49172 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49169 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49170 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49171 -> 443
Source: unknownHTTPS traffic detected: 185.255.55.12:443 -> 192.168.2.22:49167 version: TLS 1.2
Source: classification engineClassification label: mal56.evad.winDOCX@1/16@3/1
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$vised_PO_758869.docxJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRD854.tmpJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: Revised_PO_758869.docxVirustotal: Detection: 23%
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

Persistence and Installation Behavior:

barindex
Contains an external reference to another documentShow sources
Source: webSettings.xml.relsBinary or memory string: <Relationships xmlns="http://schemas.openxmlformats.org/package/2006/relationships"><Relationship Id="rId1" Type="http://schemas.openxmlformats.org/officeDocument/2006/relationships/frame" Target="https://u.nu/311s3" TargetMode="External"/></Relationships>
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsExploitation for Client Execution3Path InterceptionPath InterceptionMasquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS MemorySystem Information Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferIngress Tool Transfer1SIM Card SwapCarrier Billing Fraud

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
Revised_PO_758869.docx24%VirustotalBrowse
Revised_PO_758869.docx6%ReversingLabsDocument.Trojan.Heuristic

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

SourceDetectionScannerLabelLink
u.nu3%VirustotalBrowse

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
u.nu
185.255.55.12
truetrueunknown

Contacted IPs

  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs

Public

IPDomainCountryFlagASNASN NameMalicious
185.255.55.12
u.nuNetherlands
3214XTOMxTomEUtrue

General Information

Joe Sandbox Version:32.0.0 Black Diamond
Analysis ID:405914
Start date:06.05.2021
Start time:14:30:18
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 13m 54s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:Revised_PO_758869.docx
Cookbook file name:defaultwindowsofficecookbook.jbs
Analysis system description:Windows 7 x64 SP1 with Office 2010 SP2 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
Number of analysed new started processes analysed:3
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal56.evad.winDOCX@1/16@3/1
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .docx
Warnings:
Show All
  • Max analysis timeout: 720s exceeded, the analysis took too long
  • Excluded IPs from analysis (whitelisted): 93.184.221.240
  • Excluded domains from analysis (whitelisted): wu.ec.azureedge.net, audownload.windowsupdate.nsatc.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, ctldl.windowsupdate.com, wu.wpc.apr-52dd2.edgecastdns.net, au-bg-shim.trafficmanager.net, wu.azureedge.net
  • Report size getting too big, too many NtDeviceIoControlFile calls found.

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
185.255.55.12jt50apTCUS.docxGet hashmaliciousBrowse
    jt50apTCUS.docxGet hashmaliciousBrowse

      Domains

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      u.nujt50apTCUS.docxGet hashmaliciousBrowse
      • 185.255.55.12
      jt50apTCUS.docxGet hashmaliciousBrowse
      • 185.255.55.12

      ASN

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      XTOMxTomEUjt50apTCUS.docxGet hashmaliciousBrowse
      • 185.255.55.12
      jt50apTCUS.docxGet hashmaliciousBrowse
      • 185.255.55.12
      HdaPJuN3ad.exeGet hashmaliciousBrowse
      • 45.80.191.125
      hwtVPZ3Oeh.exeGet hashmaliciousBrowse
      • 45.80.191.125
      wGIJWTsyOY.exeGet hashmaliciousBrowse
      • 45.80.191.125
      printabledocx.dllGet hashmaliciousBrowse
      • 147.78.176.27
      http://78.142.194.53/ap/signin?openid.pape.max_auth_age=0&openid.return_to=https%3A%2F%2Fwww.amazon.co.jp%2F%3Fref_%3Dnav_em_hd_re_signin&openid.identity=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&openid.assoc_handle=jpflex&openid.mode=checkid_setup&key=a@b.c&openid.claimed_id=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&openid.ns=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0&&ref_=nav_em_hd_clc_signinGet hashmaliciousBrowse
      • 78.142.194.53
      mIgJVcfrW2.exeGet hashmaliciousBrowse
      • 147.78.176.27
      redd.exeGet hashmaliciousBrowse
      • 147.78.176.27
      SecuriteInfo.com.UDS.DangerousObject.Multi.Generic.dllGet hashmaliciousBrowse
      • 147.78.176.27
      Invoice_050820.docGet hashmaliciousBrowse
      • 147.78.176.27
      9279cddst.exeGet hashmaliciousBrowse
      • 185.255.55.29
      9199cddst.exeGet hashmaliciousBrowse
      • 185.255.55.29
      9829cddst.exeGet hashmaliciousBrowse
      • 185.255.55.29
      6269cddst.exeGet hashmaliciousBrowse
      • 185.255.55.29
      9329cddst.exeGet hashmaliciousBrowse
      • 185.255.55.29
      6069cddst.exeGet hashmaliciousBrowse
      • 185.255.55.29
      5909cddst.exeGet hashmaliciousBrowse
      • 185.255.55.29
      8739cddst.exeGet hashmaliciousBrowse
      • 185.255.55.29
      4769cddst.exeGet hashmaliciousBrowse
      • 185.255.55.29

      JA3 Fingerprints

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      36f7277af969a6947a61ae0b815907a1jt50apTCUS.docxGet hashmaliciousBrowse
      • 185.255.55.12
      PO5421-allignright.docGet hashmaliciousBrowse
      • 185.255.55.12
      Pending DHL Shipment Notification REF 04521.xlsxGet hashmaliciousBrowse
      • 185.255.55.12
      04052021paymentscancopy.docGet hashmaliciousBrowse
      • 185.255.55.12
      85a3f6aa_by_Libranalysis.rtfGet hashmaliciousBrowse
      • 185.255.55.12
      Order Of Items Listed.xlsxGet hashmaliciousBrowse
      • 185.255.55.12
      SWIFT COPY.docxGet hashmaliciousBrowse
      • 185.255.55.12
      PO 300174.xlsxGet hashmaliciousBrowse
      • 185.255.55.12
      INV2104_01.docxGet hashmaliciousBrowse
      • 185.255.55.12
      2af49a1a_by_Libranalysis.docxGet hashmaliciousBrowse
      • 185.255.55.12
      RFQ - 0421.docxGet hashmaliciousBrowse
      • 185.255.55.12
      DHL Shipment Delivery Notification.xlsxGet hashmaliciousBrowse
      • 185.255.55.12
      PO 876450.xlsxGet hashmaliciousBrowse
      • 185.255.55.12
      e2e95366_by_Libranalysis.docxGet hashmaliciousBrowse
      • 185.255.55.12
      Evaluation quoter.docxGet hashmaliciousBrowse
      • 185.255.55.12
      NEW ORDER.xlsxGet hashmaliciousBrowse
      • 185.255.55.12
      Shipping documents.xlsxGet hashmaliciousBrowse
      • 185.255.55.12
      TT PAYMENT ADVISE.xlsxGet hashmaliciousBrowse
      • 185.255.55.12
      PI201.xlsxGet hashmaliciousBrowse
      • 185.255.55.12
      Updated April SOA.xlsxGet hashmaliciousBrowse
      • 185.255.55.12

      Dropped Files

      No context

      Created / dropped Files

      C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:Microsoft Cabinet archive data, 59863 bytes, 1 file
      Category:dropped
      Size (bytes):59863
      Entropy (8bit):7.99556910241083
      Encrypted:true
      SSDEEP:1536:Gs6cdy9E/ABKQPOrdweEz480zdPMHXNY/gLHfIZN:GNOqOrdDdJPAX1LHA/
      MD5:15775D95513782F99CDFB17E65DFCEB1
      SHA1:6C11F8BEE799B093F9FF4841E31041B081B23388
      SHA-256:477A9559194EDF48848FCE59E05105168745A46BDC0871EA742A2588CA9FBE00
      SHA-512:AC09CE01122D7A837BD70277BADD58FF71D8C5335F8FC599D5E3ED42C8FEE2108DD043BCE562C82BA12A81B9B08BD24B961C0961BF8FD3A0B8341C87483CD1E7
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview: MSCF............,...................I........b.........R.i .authroot.stl.qqp.4..CK..8T....c_.d....A.F....m"...AH)-.%.QIR..$t)Kd.-QQ*..~.L.2.L........sx.}...~....$....yy.A.8;....|.%OV.a0xN....9..C..t.z.,X...,..1Qj,.p.E.y..ac`.<.e.c.aZW..B.jy....^]..+)..!...r.X:.O.. ..Y..j.^.8C........n7R....p!|_.+..<...A.Wt.=. .sV..`.9O...CD./.s.\#.t#..s..Jeiu..B$.....8..(g..tJ....=,...r.d.].xqX4.......g.lF...Mn.y".W.R....K\..P.n._..7...........@pm.. Q....(#.....=.)...1..kC.`......AP8.A..<....7S.L....S...^.R.).hqS...DK.6.j....u_.0.(4g.....!,.L`......h:.a]?......J9.\..Ww........%........4E.......q.QA.0.M<.&.^*aD.....,..]*....5.....\../ d.F>.V........_.J....."....wI..'..z...j..Ds....Z...[..........N<.d.?<....b..,...n......;....YK.X..0..Z.....?...9.3.+9T.%.l...5.YK.E.V...aD.0...Y../e.7...c..g....A..=.....+..u2..X.~....O....\=...&...U.e...?...z....$.)S..T...r.!?M..;.....r,QH.B <.(t..8s3..u[.N8gL.%...v....f...W.y...cz-.EQ.....c...o..n........D*..........2.
      C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):326
      Entropy (8bit):3.139338708896647
      Encrypted:false
      SSDEEP:6:kKzyEtEpkQSN+SkQlPlEGYRMY9z+4KlDA3RUeSKyzkOt:GnphZkPlE99SNxAhUeSKO
      MD5:9ACDD58A054B7D2540AF1107B189330A
      SHA1:78C1C6A560FA0CADCD64C09F7E2FCD7DC10C5813
      SHA-256:63B4C4ED54E2CC5ADE45F516A8CDCA1D84F08061366CC207A088A017B05C42AF
      SHA-512:CDF3C8AF24F4613B5B1131EAEBA8382371340A47D4D5736E8133F141819F61B37323C184B452025D7BD3ADBE937B0F827811D060517EA56E46157ADDD98AD633
      Malicious:false
      Reputation:low
      Preview: p...... ..........n..B..(....................................................... ...........Y5......$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".8.0.f.8.8.3.5.9.3.5.d.7.1.:.0."...
      C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):144008
      Entropy (8bit):0.30883314745377
      Encrypted:false
      SSDEEP:48:I3ION+juxu+zc3QbNGKicD3Sx2tXmh63Zr//MzL2oBzL2oB38wCq6:KI0zcBcDDv1G3Gk
      MD5:0155F260E1D27A532160AB7BFD92E894
      SHA1:7281B8271DF9B476302AD54A0AC0EF2DE62C3B32
      SHA-256:41987300EFCFB5073C6AC8B05AC34F454D2856B126D26BF0ABAE437360C0E9B8
      SHA-512:61484683528C438AACF1FA528B81AA47C96B6844793AEB67910A2DAF9BFAED186B3871FCCD575414FBA2772698E80CC22AE4A6A063E63B5A8F2C98899683221E
      Malicious:false
      Reputation:low
      Preview: ......M.eFy...z..\e...J.jL7..y/S,...X.F...Fa.q............................u].Q...@.A`.............:iw.P.J...|...G....................................................................t...t...t...t................................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{A27BD920-904D-4BDB-9501-34DF6145C610}.FSD
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:modified
      Size (bytes):156816
      Entropy (8bit):0.6680294186508485
      Encrypted:false
      SSDEEP:96:KUmtaH89He0eADro7ged1d/ttei1npiwZ2cS0wP91d1/1KiojmQK8d3w13wtL2:Fy+0eAoE8H/zWD0wP9HlFb8J0A
      MD5:2DF259A2B3C46FA7ABF45137C03375DA
      SHA1:A56F3A439D8527FDB839A9E8C3E9B4DBE5BC3B3D
      SHA-256:8FB25CA0407530BEEAF40A92EEF3741D5A59D88B3865F7E47DD4B28F43AEE1CA
      SHA-512:5639554424A3ADA5A15F84BDD374B04F49B4039FD32E0D43ACE00BBF0B23C5F4B30ADCAC9A516486D1CFDF61DCFBEDDEC76F39A7B132057E407DDFBBEAC61060
      Malicious:false
      Reputation:low
      Preview: ......M.eFy...zM.i...B...K....S,...X.F...Fa.q............................I.-U.H.W..[.Q............h...N...:.b3.....................................................................t...t...t...t...........................................................................................................................................................................................................................................................................................................................N...B6.B..U.s.xQ...........h...N...:.b3.................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSF
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):133
      Entropy (8bit):4.241619536839287
      Encrypted:false
      SSDEEP:3:yVlgQPDRlgsRlzUghlUNIWEhlsdURl918RKe8gLljl276:yPdPDDblzTzUNIaWRlsM4Z22
      MD5:17C4549A49989A9A0DFF380DCCCB813D
      SHA1:6D41C6645C99CA2C3CC39694F11DA16E76363BCB
      SHA-256:BBF32F65C07E2236F252CA7225F8EAFB1C3F56AEEDA5E977FA97D40032E8ED96
      SHA-512:94B7ADE58EB20C5B1EBEEE2D05F9E5C913ED6BD1D3C74493FE625037E7E0EE94AAAE00DE7F4D1F817394918F7731F79032BD279E13EF5BE4BE805EB66AE4AC7D
      Malicious:false
      Reputation:low
      Preview: ..H..@....b..q.....H..@....b..q....]F.S.D.-.{.A.2.7.B.D.9.2.0.-.9.0.4.D.-.4.B.D.B.-.9.5.0.1.-.3.4.D.F.6.1.4.5.C.6.1.0.}...F.S.D..
      C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):144008
      Entropy (8bit):0.30855789108193327
      Encrypted:false
      SSDEEP:48:I37aZOQiBL5raOkO7XaQIy0GVZrUG52unLnT2unLnEUhfzDgo6Oa:K7q6pl7XUGVlB52i2GNz8od
      MD5:E2DFE6BC448E0F1AFF5C9BBCD8552FEF
      SHA1:C30BBDF923313D8DAD2CA31B7ABF35B12A6B4A62
      SHA-256:0E0EA0792878DD5E307F8E7677C30EBC3398001F9FADA8A1E9EE6A3D6C423D4F
      SHA-512:9BF7D47D8692E527766C4171044D4F0F0AC439D6E8615D23CC439EB6503281472D97E35E5023EB8D60361A4BFBE31C1F75C531274BE36D3FC2A52934B67B9B89
      Malicious:false
      Reputation:low
      Preview: ......M.eFy...zn+..|..@.r.$z...S,...X.F...Fa.q............................v.]%...M..J.!.ye.........2.$zV.H.Dl.........................................................................t...t...t...t................................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{8F9ED9CC-A709-41D0-BF4C-75D628EA955D}.FSD
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):149973
      Entropy (8bit):0.27710284069752456
      Encrypted:false
      SSDEEP:96:KkAT8L/Iu6WFKYFuvyyHYMBvBYMBv6H+90ePN:SuRtuvyyHY2vBY2v6H+90eP
      MD5:961AC1C2F09DB43F7F867D7959F9DE30
      SHA1:7F1D1BE032314496A708E8D31BF45E3FF0059A8A
      SHA-256:4FB75D53CA64FA2B7CC6B662921CF65A798352FA24B9E08797C56244FDD1A2CB
      SHA-512:2AA2FBC252CFE1C45EB58581C56C386D1A5078B2D901F22E9726A34D0E3B9A963B7FFF908E75B2E06D8E35BF8186226AAB94D6A6D92F2BD73E07780C6F28E3D5
      Malicious:false
      Reputation:low
      Preview: ......M.eFy...z.w.|..J.......oS,...X.F...Fa.q............................W!8.K..J.l&k.`..........)0)O.~.J.}.Cj.Z.....................................................................t...t...t...t................................................................................................................................................................................................................................................................................................................................KnF.iS.$...........)0)O.~.J.}.Cj.Z.................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):133
      Entropy (8bit):4.268008822586106
      Encrypted:false
      SSDEEP:3:yVlgQPDRlgsRlzbclgQm8ZWPUIyG8PUJXg1Q+0R7276:yPdPDDblzbclG8ZWpy1Pd1Q+0t22
      MD5:D326018AD454AF9F20744579D8D4929F
      SHA1:881CBA43F0124442632EEEBE5194E237D189E97A
      SHA-256:E66576EAA3C8F02459A2121C8106D19FE4C37A1E0F4A2F65874C3569B53CB7D5
      SHA-512:75797A470BBA1129DF20CFE7B8CF043E241CA154D1A16E9C3542D9D281D2E766331FD05F96FDE8F528A6739FE7E0193A4AD180109FF77E64B6A0300620C92A9A
      Malicious:false
      Reputation:low
      Preview: ..H..@....b..q.....H..@....b..q....]F.S.D.-.{.8.F.9.E.D.9.C.C.-.A.7.0.9.-.4.1.D.0.-.B.F.4.C.-.7.5.D.6.2.8.E.A.9.5.5.D.}...F.S.D..
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{6892A68A-6F93-4194-97B0-E6749671AC21}.tmp
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):1024
      Entropy (8bit):0.05390218305374581
      Encrypted:false
      SSDEEP:3:ol3lYdn:4Wn
      MD5:5D4D94EE7E06BBB0AF9584119797B23A
      SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
      SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
      SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
      Malicious:false
      Reputation:high, very likely benign file
      Preview: ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{9312A5BA-14BB-458B-BB2D-5B313121AE89}.tmp
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:dBase III DBT, version number 0, next free block index 7536653
      Category:dropped
      Size (bytes):1024
      Entropy (8bit):0.10581667566270775
      Encrypted:false
      SSDEEP:3:Ghl/dlYdn:Gh2n
      MD5:28ADF62789FD86C3D04877B2D607E000
      SHA1:A62F70A7B17863E69759A6720E75FC80E12B46E6
      SHA-256:0877A3FC43A5F341429A26010BA4004162FA051783B31B8DD8056ECA046CF9E2
      SHA-512:15C01B4AD2E173BAF8BF0FAE7455B4284267005E6E5302640AA8056075742E9B8A2004B8EB6200AA68564C40A2596C7600D426619A2AC832C64DB703A7F0360D
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview: ..s.d.f.s.f.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Temp\CabE7DF.tmp
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:Microsoft Cabinet archive data, 59863 bytes, 1 file
      Category:dropped
      Size (bytes):59863
      Entropy (8bit):7.99556910241083
      Encrypted:true
      SSDEEP:1536:Gs6cdy9E/ABKQPOrdweEz480zdPMHXNY/gLHfIZN:GNOqOrdDdJPAX1LHA/
      MD5:15775D95513782F99CDFB17E65DFCEB1
      SHA1:6C11F8BEE799B093F9FF4841E31041B081B23388
      SHA-256:477A9559194EDF48848FCE59E05105168745A46BDC0871EA742A2588CA9FBE00
      SHA-512:AC09CE01122D7A837BD70277BADD58FF71D8C5335F8FC599D5E3ED42C8FEE2108DD043BCE562C82BA12A81B9B08BD24B961C0961BF8FD3A0B8341C87483CD1E7
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview: MSCF............,...................I........b.........R.i .authroot.stl.qqp.4..CK..8T....c_.d....A.F....m"...AH)-.%.QIR..$t)Kd.-QQ*..~.L.2.L........sx.}...~....$....yy.A.8;....|.%OV.a0xN....9..C..t.z.,X...,..1Qj,.p.E.y..ac`.<.e.c.aZW..B.jy....^]..+)..!...r.X:.O.. ..Y..j.^.8C........n7R....p!|_.+..<...A.Wt.=. .sV..`.9O...CD./.s.\#.t#..s..Jeiu..B$.....8..(g..tJ....=,...r.d.].xqX4.......g.lF...Mn.y".W.R....K\..P.n._..7...........@pm.. Q....(#.....=.)...1..kC.`......AP8.A..<....7S.L....S...^.R.).hqS...DK.6.j....u_.0.(4g.....!,.L`......h:.a]?......J9.\..Ww........%........4E.......q.QA.0.M<.&.^*aD.....,..]*....5.....\../ d.F>.V........_.J....."....wI..'..z...j..Ds....Z...[..........N<.d.?<....b..,...n......;....YK.X..0..Z.....?...9.3.+9T.%.l...5.YK.E.V...aD.0...Y../e.7...c..g....A..=.....+..u2..X.~....O....\=...&...U.e...?...z....$.)S..T...r.!?M..;.....r,QH.B <.(t..8s3..u[.N8gL.%...v....f...W.y...cz-.EQ.....c...o..n........D*..........2.
      C:\Users\user\AppData\Local\Temp\TarE7E0.tmp
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):156386
      Entropy (8bit):6.3086528024913715
      Encrypted:false
      SSDEEP:1536:ZlI6c79JjgCyrYBWsWimp4Ydm6Caku2SWsz0OD8reJgMnl3XlMyGr:ZBUJcCyZfdmoku2SL3kMnBGyA
      MD5:78CABD9F1AFFF17BB91A105CF4702188
      SHA1:52FA8144D1FC5F92DEB45E53F076BCC69F5D8CC7
      SHA-256:C7B6743B228E40B19443E471081A51041974801D325DB4ED8FD73A1A24CBD066
      SHA-512:F0BF5DFBAB47CC6A3D1BF03CEC3FDDA84537DB756DA97E6D93CF08A5C750EABDFBF7FCF7EBDFFF04326617E43F0D767E5A2B7B68C548C6D9C48F36493881F62B
      Malicious:false
      Preview: 0..b...*.H.........b.0..b....1.0...`.H.e......0..R...+.....7.....R.0..R.0...+.....7........5XY._...210419201239Z0...+......0..R.0..*.....`...@.,..0..0.r1...0...+.....7..~1......D...0...+.....7..i1...0...+.....7<..0 ..+.....7...1.......@N...%.=.,..0$..+.....7...1......`@V'..%..*..S.Y.00..+.....7..b1". .].L4.>..X...E.W..'..........-@w0Z..+.....7...1L.JM.i.c.r.o.s.o.f.t. .R.o.o.t. .C.e.r.t.i.f.i.c.a.t.e. .A.u.t.h.o.r.i.t.y...0..,...........[./..uIv..%1...0...+.....7..h1.....6.M...0...+.....7..~1...........0...+.....7...1...0...+.......0 ..+.....7...1...O..V.........b0$..+.....7...1...>.)....s,.=$.~R.'..00..+.....7..b1". [x.....[....3x:_....7.2...Gy.cS.0D..+.....7...16.4V.e.r.i.S.i.g.n. .T.i.m.e. .S.t.a.m.p.i.n.g. .C.A...0......4...R....2.7.. ...1..0...+.....7..h1......o&...0...+.....7..i1...0...+.....7<..0 ..+.....7...1...lo...^....[...J@0$..+.....7...1...J\u".F....9.N...`...00..+.....7..b1". ...@.....G..d..m..$.....X...}0B..+.....7...14.2M.i.c.r.o.s.o.f.t. .R.o.o.t. .A.u.t.h.o
      C:\Users\user\AppData\Local\Temp\{02EF615C-66D3-4770-B1C9-F9664E054341}
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):137348
      Entropy (8bit):0.05991062016257998
      Encrypted:false
      SSDEEP:12:I3DP4KaH7PvXtfv8pJlSR1P4KaH7PQV8CSQap0L/7yP4KaH7P+Kp:I3EKab3EJY+KaboV8CqwKabZ
      MD5:5FA9673A09501CCF1EF19FF69EE234CF
      SHA1:17821DBD1AB54A332F375C18978AD1C36FA5DED8
      SHA-256:DE13405E800207E168AEA690DDC1964F94E15E8AADE12383BB6F74170A26F825
      SHA-512:3BE944A427417F5BCAA107212E6F79E5BC87B5FC6438D478E43B594710303371339F6FFACB2DA57E399C288872595AE0EC58912EBB407185AA36E967DF83D9B0
      Malicious:false
      Preview: ......M.eFy...zn+..|..@.r.$z...S,...X.F...Fa.q.............................K.J.f.L...p?............2.$zV.H.Dl.........................................................................t...t...t...t...........................................................................................................................................................................................................................................................................................................................Q9.....H......D.........2.$zV.H.Dl.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Temp\{506085A1-584E-4AA7-97BB-056A4A20FC55}
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):137348
      Entropy (8bit):0.05982299307201387
      Encrypted:false
      SSDEEP:12:I3DPvkbsQ5Yhfv8pS1isn1Pvkb37Z2SQap6LH1/7yPvkbY/ZpKp:I35IS8snOZ2q6LE/ZG
      MD5:06C6930CAF2CDD86F28F3A14BC12D122
      SHA1:0E4CD76754D1F8A6ED4EA5FFE8AC8BFB2D3E264B
      SHA-256:FCC71CFFE3562E254317DA66F9242F1D17AF18DB2429B1FDC78BD192EB67D21C
      SHA-512:1CD9AC4C47E44A1A00EADD1D925DCCD7C795C2B96DC63C258FBB736E48CCF6F894673347CE017F490A7B9FFF620352900E75E45C5B5F0E2619ACF60C97BF978A
      Malicious:false
      Preview: ......M.eFy...z..\e...J.jL7..y/S,...X.F...Fa.q............................%.I....L....A...........:iw.P.J...|...G....................................................................t...t...t...t.............................................................................................................................................................................................................................................................................................................................D..'.O...DD..........:iw.P.J...|...G................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):162
      Entropy (8bit):2.431160061181642
      Encrypted:false
      SSDEEP:3:vrJlaCkWtVy3KGcils6w7Adtln:vdsCkWthGciWfQl
      MD5:4A5DFFE330E8BBBF59615CB0C71B87BE
      SHA1:7B896C17F93ECFC9B69E84FC1EADEDD9DA550C4B
      SHA-256:D28616DC54FDEF1FF5C5BA05A77F178B7E3304493BAF3F4407409F2C84F4F215
      SHA-512:3AA160CB89F4D8393BCBF9FF4357FFE7AE00663F21F436D341FA4F5AD4AEDC737092985EB4A94A694A02780597C6375D1615908906A6CEC6D7AB616791B6285C
      Malicious:false
      Preview: .user..................................................A.l.b.u.s.............p.......................................P.....................z...............x...
      C:\Users\user\Desktop\~$vised_PO_758869.docx
      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      File Type:data
      Category:dropped
      Size (bytes):162
      Entropy (8bit):2.431160061181642
      Encrypted:false
      SSDEEP:3:vrJlaCkWtVy3KGcils6w7Adtln:vdsCkWthGciWfQl
      MD5:4A5DFFE330E8BBBF59615CB0C71B87BE
      SHA1:7B896C17F93ECFC9B69E84FC1EADEDD9DA550C4B
      SHA-256:D28616DC54FDEF1FF5C5BA05A77F178B7E3304493BAF3F4407409F2C84F4F215
      SHA-512:3AA160CB89F4D8393BCBF9FF4357FFE7AE00663F21F436D341FA4F5AD4AEDC737092985EB4A94A694A02780597C6375D1615908906A6CEC6D7AB616791B6285C
      Malicious:false
      Preview: .user..................................................A.l.b.u.s.............p.......................................P.....................z...............x...

      Static File Info

      General

      File type:Microsoft Word 2007+
      Entropy (8bit):6.90464253315849
      TrID:
      • Word Microsoft Office Open XML Format document (49504/1) 49.01%
      • Word Microsoft Office Open XML Format document (43504/1) 43.07%
      • ZIP compressed archive (8000/1) 7.92%
      File name:Revised_PO_758869.docx
      File size:10323
      MD5:bd5e0d325783b0526ae79b58fe08ee77
      SHA1:c066447df75901430365317b71d21369edf340f6
      SHA256:69ba01eb1fe057757516dbc89211b3990fefe9b894f0594af2ccebe500442202
      SHA512:78416bed2acad5ebc5672b1553e7602c0b6ccaef3331fa24e972e225fbd53aa8753b02abf5f80bf9824c9dac30ce9bcbf623fc3695301edbd22278d5f7d66a6b
      SSDEEP:192:ScIMmtPil9G/bixd5OgpCBAfXViw7swwd3t1:SPXJixd5OBBoVinZb
      File Content Preview:PK..........!....7f... .......[Content_Types].xml ...(.........................................................................................................................................................................................................

      File Icon

      Icon Hash:e4e6a2a2a4b4b4a4

      Network Behavior

      Network Port Distribution

      TCP Packets

      TimestampSource PortDest PortSource IPDest IP
      May 6, 2021 14:31:14.868383884 CEST49167443192.168.2.22185.255.55.12
      May 6, 2021 14:31:14.916179895 CEST44349167185.255.55.12192.168.2.22
      May 6, 2021 14:31:14.916281939 CEST49167443192.168.2.22185.255.55.12
      May 6, 2021 14:31:14.935261965 CEST49167443192.168.2.22185.255.55.12
      May 6, 2021 14:31:14.984662056 CEST44349167185.255.55.12192.168.2.22
      May 6, 2021 14:31:14.984863043 CEST44349167185.255.55.12192.168.2.22
      May 6, 2021 14:31:14.984913111 CEST44349167185.255.55.12192.168.2.22
      May 6, 2021 14:31:14.984955072 CEST44349167185.255.55.12192.168.2.22
      May 6, 2021 14:31:14.984982014 CEST44349167185.255.55.12192.168.2.22
      May 6, 2021 14:31:14.984982014 CEST49167443192.168.2.22185.255.55.12
      May 6, 2021 14:31:14.985013962 CEST49167443192.168.2.22185.255.55.12
      May 6, 2021 14:31:14.985131979 CEST49167443192.168.2.22185.255.55.12
      May 6, 2021 14:31:14.997786999 CEST44349167185.255.55.12192.168.2.22
      May 6, 2021 14:31:14.997819901 CEST44349167185.255.55.12192.168.2.22
      May 6, 2021 14:31:14.997912884 CEST49167443192.168.2.22185.255.55.12
      May 6, 2021 14:31:15.033061028 CEST49167443192.168.2.22185.255.55.12
      May 6, 2021 14:31:15.088345051 CEST44349167185.255.55.12192.168.2.22
      May 6, 2021 14:31:15.088974953 CEST49167443192.168.2.22185.255.55.12
      May 6, 2021 14:31:16.208657026 CEST49167443192.168.2.22185.255.55.12
      May 6, 2021 14:31:16.281466961 CEST44349167185.255.55.12192.168.2.22
      May 6, 2021 14:31:16.281749964 CEST49167443192.168.2.22185.255.55.12
      May 6, 2021 14:31:16.829044104 CEST49169443192.168.2.22185.255.55.12
      May 6, 2021 14:31:16.877645969 CEST44349169185.255.55.12192.168.2.22
      May 6, 2021 14:31:16.877841949 CEST49169443192.168.2.22185.255.55.12
      May 6, 2021 14:31:16.878735065 CEST49169443192.168.2.22185.255.55.12
      May 6, 2021 14:31:16.926789045 CEST44349169185.255.55.12192.168.2.22
      May 6, 2021 14:31:16.926819086 CEST44349169185.255.55.12192.168.2.22
      May 6, 2021 14:31:16.926836014 CEST44349169185.255.55.12192.168.2.22
      May 6, 2021 14:31:16.926996946 CEST49169443192.168.2.22185.255.55.12
      May 6, 2021 14:31:16.928816080 CEST49169443192.168.2.22185.255.55.12
      May 6, 2021 14:31:16.930636883 CEST49170443192.168.2.22185.255.55.12
      May 6, 2021 14:31:16.976829052 CEST44349169185.255.55.12192.168.2.22
      May 6, 2021 14:31:16.978956938 CEST44349170185.255.55.12192.168.2.22
      May 6, 2021 14:31:16.979130983 CEST49170443192.168.2.22185.255.55.12
      May 6, 2021 14:31:16.980612993 CEST49170443192.168.2.22185.255.55.12
      May 6, 2021 14:31:17.029323101 CEST44349170185.255.55.12192.168.2.22
      May 6, 2021 14:31:17.029347897 CEST44349170185.255.55.12192.168.2.22
      May 6, 2021 14:31:17.029359102 CEST44349170185.255.55.12192.168.2.22
      May 6, 2021 14:31:17.029560089 CEST49170443192.168.2.22185.255.55.12
      May 6, 2021 14:31:17.029942989 CEST49170443192.168.2.22185.255.55.12
      May 6, 2021 14:31:17.035342932 CEST49171443192.168.2.22185.255.55.12
      May 6, 2021 14:31:17.079843044 CEST44349170185.255.55.12192.168.2.22
      May 6, 2021 14:31:17.083800077 CEST44349171185.255.55.12192.168.2.22
      May 6, 2021 14:31:17.084014893 CEST49171443192.168.2.22185.255.55.12
      May 6, 2021 14:31:17.084687948 CEST49171443192.168.2.22185.255.55.12
      May 6, 2021 14:31:17.132606030 CEST44349171185.255.55.12192.168.2.22
      May 6, 2021 14:31:17.132667065 CEST44349171185.255.55.12192.168.2.22
      May 6, 2021 14:31:17.132694960 CEST44349171185.255.55.12192.168.2.22
      May 6, 2021 14:31:17.132777929 CEST49171443192.168.2.22185.255.55.12
      May 6, 2021 14:31:17.133045912 CEST49171443192.168.2.22185.255.55.12
      May 6, 2021 14:31:17.134041071 CEST49172443192.168.2.22185.255.55.12
      May 6, 2021 14:31:17.181468964 CEST44349171185.255.55.12192.168.2.22
      May 6, 2021 14:31:17.182807922 CEST44349172185.255.55.12192.168.2.22
      May 6, 2021 14:31:17.182936907 CEST49172443192.168.2.22185.255.55.12
      May 6, 2021 14:31:17.183950901 CEST49172443192.168.2.22185.255.55.12
      May 6, 2021 14:31:17.231821060 CEST44349172185.255.55.12192.168.2.22
      May 6, 2021 14:31:17.231837988 CEST44349172185.255.55.12192.168.2.22
      May 6, 2021 14:31:17.232341051 CEST49172443192.168.2.22185.255.55.12
      May 6, 2021 14:31:17.232930899 CEST44349172185.255.55.12192.168.2.22
      May 6, 2021 14:31:17.233050108 CEST49172443192.168.2.22185.255.55.12
      May 6, 2021 14:31:17.280308008 CEST44349172185.255.55.12192.168.2.22
      May 6, 2021 14:32:21.284674883 CEST44349167185.255.55.12192.168.2.22
      May 6, 2021 14:32:21.284702063 CEST44349167185.255.55.12192.168.2.22
      May 6, 2021 14:32:21.284795046 CEST49167443192.168.2.22185.255.55.12
      May 6, 2021 14:33:05.505058050 CEST49167443192.168.2.22185.255.55.12
      May 6, 2021 14:33:05.505111933 CEST49167443192.168.2.22185.255.55.12
      May 6, 2021 14:33:05.552758932 CEST44349167185.255.55.12192.168.2.22
      May 6, 2021 14:33:05.552881002 CEST49167443192.168.2.22185.255.55.12

      UDP Packets

      TimestampSource PortDest PortSource IPDest IP
      May 6, 2021 14:31:14.792639971 CEST5219753192.168.2.228.8.8.8
      May 6, 2021 14:31:14.851109982 CEST53521978.8.8.8192.168.2.22
      May 6, 2021 14:31:15.597723007 CEST5309953192.168.2.228.8.8.8
      May 6, 2021 14:31:15.655026913 CEST53530998.8.8.8192.168.2.22
      May 6, 2021 14:31:15.663094044 CEST5283853192.168.2.228.8.8.8
      May 6, 2021 14:31:15.722434998 CEST53528388.8.8.8192.168.2.22
      May 6, 2021 14:31:16.710390091 CEST6120053192.168.2.228.8.8.8
      May 6, 2021 14:31:16.767426968 CEST53612008.8.8.8192.168.2.22
      May 6, 2021 14:31:16.775640965 CEST4954853192.168.2.228.8.8.8
      May 6, 2021 14:31:16.827481031 CEST53495488.8.8.8192.168.2.22

      DNS Queries

      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
      May 6, 2021 14:31:14.792639971 CEST192.168.2.228.8.8.80x15d4Standard query (0)u.nuA (IP address)IN (0x0001)
      May 6, 2021 14:31:16.710390091 CEST192.168.2.228.8.8.80x9511Standard query (0)u.nuA (IP address)IN (0x0001)
      May 6, 2021 14:31:16.775640965 CEST192.168.2.228.8.8.80xd638Standard query (0)u.nuA (IP address)IN (0x0001)

      DNS Answers

      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
      May 6, 2021 14:31:14.851109982 CEST8.8.8.8192.168.2.220x15d4No error (0)u.nu185.255.55.12A (IP address)IN (0x0001)
      May 6, 2021 14:31:16.767426968 CEST8.8.8.8192.168.2.220x9511No error (0)u.nu185.255.55.12A (IP address)IN (0x0001)
      May 6, 2021 14:31:16.827481031 CEST8.8.8.8192.168.2.220xd638No error (0)u.nu185.255.55.12A (IP address)IN (0x0001)

      HTTPS Packets

      TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
      May 6, 2021 14:31:14.997786999 CEST185.255.55.12443192.168.2.2249167CN=u.nu CN=GoGetSSL RSA DV CA, O=GoGetSSL, L=Riga, C=LV CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USCN=GoGetSSL RSA DV CA, O=GoGetSSL, L=Riga, C=LV CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=US CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USThu Jan 30 01:00:00 CET 2020 Thu Sep 06 02:00:00 CEST 2018 Mon Feb 01 01:00:00 CET 2010Sun Jan 30 00:59:59 CET 2022 Wed Sep 06 01:59:59 CEST 2028 Tue Jan 19 00:59:59 CET 2038771,49192-49191-49172-49171-159-158-57-51-157-156-61-60-53-47-49196-49195-49188-49187-49162-49161-106-64-56-50-10-19-5-4,0-10-11-13-23-65281,23-24,036f7277af969a6947a61ae0b815907a1
      CN=GoGetSSL RSA DV CA, O=GoGetSSL, L=Riga, C=LVCN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USThu Sep 06 02:00:00 CEST 2018Wed Sep 06 01:59:59 CEST 2028
      CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USCN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, ST=New Jersey, C=USMon Feb 01 01:00:00 CET 2010Tue Jan 19 00:59:59 CET 2038

      Code Manipulations

      Statistics

      CPU Usage

      Click to jump to process

      Memory Usage

      Click to jump to process

      System Behavior

      General

      Start time:14:30:40
      Start date:06/05/2021
      Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
      Wow64 process (32bit):false
      Commandline:'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /Automation -Embedding
      Imagebase:0x13fa10000
      File size:1424032 bytes
      MD5 hash:95C38D04597050285A18F66039EDB456
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      Disassembly

      Reset < >