Windows Analysis Report
BankPaymAdviceVend.Report.docx

Overview

General Information

Sample name: BankPaymAdviceVend.Report.docx
Analysis ID: 1502190
MD5: 22eede72746e7a9a26f3f6d311a12a7e
SHA1: 6738d1a969194359c7c7579956269d77fed8d26f
SHA256: 2e1408013503cbc13466e2041bd3e045833ce65f5c91b7226e28e27d43d6eaf9
Infos:

Detection

Score: 68
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Contains an external reference to another file
Document contains embedded VBA macros
Document misses a certain OLE stream usually present in this Microsoft Office document type
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Sigma detected: Suspicious Office Outbound Connections
Uses a known web browser user agent for HTTP communication

Classification

AV Detection

barindex
Source: https://tt.vg/BVhaS Avira URL Cloud: Label: phishing
Source: http://tt.vg/BVhaS Avira URL Cloud: Label: phishing
Source: tt.vg Virustotal: Detection: 5% Perma Link
Source: http://tt.vg/BVhaS Virustotal: Detection: 7% Perma Link
Source: https://tt.vg/BVhaS Virustotal: Detection: 7% Perma Link
Source: BankPaymAdviceVend.Report.docx ReversingLabs: Detection: 66%
Source: BankPaymAdviceVend.Report.docx Virustotal: Detection: 59% Perma Link
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.16:49703 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.16:49707 version: TLS 1.2
Source: global traffic DNS query: name: tt.vg
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49705 -> 188.114.96.3:80
Source: global traffic TCP traffic: 192.168.2.16:49703 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49703 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49703 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49703 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49703 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49703 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49703 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49703 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49698 -> 188.114.96.3:80
Source: global traffic TCP traffic: 188.114.96.3:80 -> 192.168.2.16:49698
Source: global traffic TCP traffic: 192.168.2.16:49698 -> 188.114.96.3:80
Source: global traffic TCP traffic: 192.168.2.16:49698 -> 188.114.96.3:80
Source: global traffic TCP traffic: 188.114.96.3:80 -> 192.168.2.16:49698
Source: global traffic TCP traffic: 188.114.96.3:80 -> 192.168.2.16:49698
Source: global traffic TCP traffic: 188.114.96.3:80 -> 192.168.2.16:49698
Source: global traffic TCP traffic: 188.114.96.3:80 -> 192.168.2.16:49698
Source: global traffic TCP traffic: 188.114.96.3:80 -> 192.168.2.16:49698
Source: global traffic TCP traffic: 192.168.2.16:49698 -> 188.114.96.3:80
Source: global traffic TCP traffic: 192.168.2.16:49698 -> 188.114.96.3:80
Source: global traffic TCP traffic: 192.168.2.16:49698 -> 188.114.96.3:80
Source: global traffic TCP traffic: 188.114.96.3:80 -> 192.168.2.16:49698
Source: global traffic TCP traffic: 192.168.2.16:49698 -> 188.114.96.3:80
Source: global traffic TCP traffic: 192.168.2.16:49699 -> 188.114.96.3:80
Source: global traffic TCP traffic: 188.114.96.3:80 -> 192.168.2.16:49699
Source: global traffic TCP traffic: 192.168.2.16:49699 -> 188.114.96.3:80
Source: global traffic TCP traffic: 192.168.2.16:49699 -> 188.114.96.3:80
Source: global traffic TCP traffic: 188.114.96.3:80 -> 192.168.2.16:49699
Source: global traffic TCP traffic: 188.114.96.3:80 -> 192.168.2.16:49699
Source: global traffic TCP traffic: 188.114.96.3:80 -> 192.168.2.16:49699
Source: global traffic TCP traffic: 188.114.96.3:80 -> 192.168.2.16:49699
Source: global traffic TCP traffic: 188.114.96.3:80 -> 192.168.2.16:49699
Source: global traffic TCP traffic: 192.168.2.16:49699 -> 188.114.96.3:80
Source: global traffic TCP traffic: 192.168.2.16:49699 -> 188.114.96.3:80
Source: global traffic TCP traffic: 192.168.2.16:49699 -> 188.114.96.3:80
Source: global traffic TCP traffic: 192.168.2.16:49699 -> 188.114.96.3:80
Source: global traffic TCP traffic: 192.168.2.16:49700 -> 188.114.96.3:80
Source: global traffic TCP traffic: 188.114.96.3:80 -> 192.168.2.16:49700
Source: global traffic TCP traffic: 192.168.2.16:49700 -> 188.114.96.3:80
Source: global traffic TCP traffic: 192.168.2.16:49700 -> 188.114.96.3:80
Source: global traffic TCP traffic: 188.114.96.3:80 -> 192.168.2.16:49700
Source: global traffic TCP traffic: 188.114.96.3:80 -> 192.168.2.16:49700
Source: global traffic TCP traffic: 192.168.2.16:49703 -> 188.114.96.3:443
Source: global traffic TCP traffic: 188.114.96.3:443 -> 192.168.2.16:49703
Source: global traffic TCP traffic: 192.168.2.16:49703 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49703 -> 188.114.96.3:443
Source: global traffic TCP traffic: 188.114.96.3:443 -> 192.168.2.16:49703
Source: global traffic TCP traffic: 192.168.2.16:49700 -> 188.114.96.3:80
Source: global traffic TCP traffic: 188.114.96.3:443 -> 192.168.2.16:49703
Source: global traffic TCP traffic: 192.168.2.16:49703 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49703 -> 188.114.96.3:443
Source: global traffic TCP traffic: 188.114.96.3:443 -> 192.168.2.16:49703
Source: global traffic TCP traffic: 188.114.96.3:443 -> 192.168.2.16:49703
Source: global traffic TCP traffic: 192.168.2.16:49703 -> 188.114.96.3:443
Source: global traffic TCP traffic: 188.114.96.3:443 -> 192.168.2.16:49703
Source: global traffic TCP traffic: 188.114.96.3:443 -> 192.168.2.16:49703
Source: global traffic TCP traffic: 192.168.2.16:49703 -> 188.114.96.3:443
Source: global traffic TCP traffic: 188.114.96.3:443 -> 192.168.2.16:49703
Source: global traffic TCP traffic: 192.168.2.16:49703 -> 188.114.96.3:443
Source: global traffic TCP traffic: 188.114.96.3:443 -> 192.168.2.16:49703
Source: global traffic TCP traffic: 188.114.96.3:443 -> 192.168.2.16:49703
Source: global traffic TCP traffic: 192.168.2.16:49705 -> 188.114.96.3:80
Source: global traffic TCP traffic: 188.114.96.3:80 -> 192.168.2.16:49705
Source: global traffic TCP traffic: 192.168.2.16:49705 -> 188.114.96.3:80
Source: global traffic TCP traffic: 192.168.2.16:49705 -> 188.114.96.3:80
Source: global traffic TCP traffic: 188.114.96.3:80 -> 192.168.2.16:49705
Source: global traffic TCP traffic: 188.114.96.3:80 -> 192.168.2.16:49705
Source: global traffic TCP traffic: 192.168.2.16:49705 -> 188.114.96.3:80
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 188.114.96.3:443 -> 192.168.2.16:49707
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 188.114.96.3:443 -> 192.168.2.16:49707
Source: global traffic TCP traffic: 188.114.96.3:443 -> 192.168.2.16:49707
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 188.114.96.3:443 -> 192.168.2.16:49707
Source: global traffic TCP traffic: 188.114.96.3:443 -> 192.168.2.16:49707
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 188.114.96.3:443 -> 192.168.2.16:49707
Source: global traffic TCP traffic: 188.114.96.3:443 -> 192.168.2.16:49707
Source: global traffic TCP traffic: 188.114.96.3:443 -> 192.168.2.16:49707
Source: global traffic TCP traffic: 188.114.96.3:443 -> 192.168.2.16:49707
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 188.114.96.3:443 -> 192.168.2.16:49707
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 188.114.96.3:443 -> 192.168.2.16:49707
Source: global traffic TCP traffic: 188.114.96.3:443 -> 192.168.2.16:49707
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 188.114.96.3:443 -> 192.168.2.16:49707
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49707 -> 188.114.96.3:443
Source: global traffic TCP traffic: 192.168.2.16:49705 -> 188.114.96.3:80
Source: global traffic TCP traffic: 188.114.96.3:80 -> 192.168.2.16:49705
Source: global traffic TCP traffic: 192.168.2.16:49705 -> 188.114.96.3:80
Source: global traffic TCP traffic: 192.168.2.16:49700 -> 188.114.96.3:80
Source: global traffic TCP traffic: 188.114.96.3:80 -> 192.168.2.16:49700
Source: global traffic TCP traffic: 192.168.2.16:49700 -> 188.114.96.3:80
Source: winword.exe Memory has grown: Private usage: 4MB later: 71MB
Source: Joe Sandbox View IP Address: 188.114.96.3 188.114.96.3
Source: Joe Sandbox View IP Address: 188.114.96.3 188.114.96.3
Source: Joe Sandbox View ASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
Source: Joe Sandbox View JA3 fingerprint: 6271f898ce5be7dd52b0fc260d0662b3
Source: Joe Sandbox View JA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: global traffic HTTP traffic detected: GET /BVhaS HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; ms-office; MSOffice 16)Accept-Encoding: gzip, deflateConnection: Keep-AliveHost: tt.vg
Source: global traffic HTTP traffic detected: GET /BVhaS HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; ms-office; MSOffice 16)Accept-Encoding: gzip, deflateHost: tt.vgConnection: Keep-Alive
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic HTTP traffic detected: GET /BVhaS HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; ms-office; MSOffice 16)Accept-Encoding: gzip, deflateConnection: Keep-AliveHost: tt.vg
Source: global traffic HTTP traffic detected: GET /BVhaS HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; ms-office; MSOffice 16)Accept-Encoding: gzip, deflateHost: tt.vgConnection: Keep-Alive
Source: global traffic DNS traffic detected: DNS query: tt.vg
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 31 Aug 2024 11:53:39 GMTContent-Type: text/html; charset=UTF-8Connection: closeVary: Accept-EncodingSet-Cookie: PHPSESSID=i8gl54qibf7il8mmf3e2knsqp9; path=/Expires: Thu, 19 Nov 1981 08:52:00 GMTCache-Control: no-store, no-cache, must-revalidatePragma: no-cacheCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=SjV7l7D6mpHjsddSIugwiy%2F6o%2B1gtcSEKXhMpJ2V0mezbkYZeAM5fvJbl%2B9zwtPWRJZS%2BWsDfjxVJTvhg%2FD8rQAAFn6CuEOy3MLizADYpcQCSXqUhOj6Mw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8bbcd242dedb0fa4-EWRalt-svc: h3=":443"; ma=86400
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sat, 31 Aug 2024 11:53:40 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingSet-Cookie: PHPSESSID=dsihvm7r2p2b3f7snkgbas200o; path=/Expires: Thu, 19 Nov 1981 08:52:00 GMTCache-Control: no-store, no-cache, must-revalidatePragma: no-cacheCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=atEdInXFybdt6A6rKnAmwtMpc%2Fj4C9PTSOJ%2F9rnNJmOi1s9YWy4CFfGzI2R05usq24pFLZs3jssdCUvaBQTCHdtMeUbBXgVcMNv53nvo416z68wShXluMw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8bbcd24b8f034408-EWRalt-svc: h3=":443"; ma=86400
Source: 57C8EDB95DF3F0AD4EE2DC2B8CFD4157.0.dr String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab
Source: unknown Network traffic detected: HTTP traffic on port 49707 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49703 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49707
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49703
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.16:49703 version: TLS 1.2
Source: unknown HTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.16:49707 version: TLS 1.2
Source: gb.xsl.0.dr OLE indicator, VBA macros: true
Source: APASixthEditionOfficeOnline.xsl.0.dr OLE indicator, VBA macros: true
Source: mlaseventheditionofficeonline.xsl.0.dr OLE indicator, VBA macros: true
Source: turabian.xsl.0.dr OLE indicator, VBA macros: true
Source: gosttitle.xsl.0.dr OLE indicator, VBA macros: true
Source: ieee2006officeonline.xsl.0.dr OLE indicator, VBA macros: true
Source: gostname.xsl.0.dr OLE indicator, VBA macros: true
Source: iso690.xsl.0.dr OLE indicator, VBA macros: true
Source: chicago.xsl.0.dr OLE indicator, VBA macros: true
Source: harvardanglia2008officeonline.xsl.0.dr OLE indicator, VBA macros: true
Source: sist02.xsl.0.dr OLE indicator, VBA macros: true
Source: iso690nmerical.xsl.0.dr OLE indicator, VBA macros: true
Source: gb.xsl.0.dr OLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: APASixthEditionOfficeOnline.xsl.0.dr OLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: mlaseventheditionofficeonline.xsl.0.dr OLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: turabian.xsl.0.dr OLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: gosttitle.xsl.0.dr OLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: ieee2006officeonline.xsl.0.dr OLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: gostname.xsl.0.dr OLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: iso690.xsl.0.dr OLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: chicago.xsl.0.dr OLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: harvardanglia2008officeonline.xsl.0.dr OLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: sist02.xsl.0.dr OLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: iso690nmerical.xsl.0.dr OLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: ~WRF{9E2773A0-B35E-4804-8D45-C4FECAD54F2D}.tmp.0.dr OLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: classification engine Classification label: mal68.evad.winDOCX@2/234@1/1
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE File created: C:\Users\user\AppData\Roaming\Microsoft\Office Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE File created: C:\Users\user\AppData\Local\Temp\{329DB35C-F535-493F-99B2-03CDA2B25E16} - OProcSessId.dat Jump to behavior
Source: BankPaymAdviceVend.Report.docx OLE indicator, Word Document stream: true
Source: BankPaymAdviceVend.Report.docx OLE indicator, Word Document stream: true
Source: BankPaymAdviceVend.Report.docx OLE indicator, Word Document stream: true
Source: BankPaymAdviceVend.Report.docx OLE indicator, Word Document stream: true
Source: Element design set.dotx.0.dr OLE indicator, Word Document stream: true
Source: Text Sidebar (Annual Report Red and Black design).docx.0.dr OLE indicator, Word Document stream: true
Source: Equations.dotx.0.dr OLE indicator, Word Document stream: true
Source: Insight design set.dotx.0.dr OLE indicator, Word Document stream: true
Source: BankPaymAdviceVend.Report.docx OLE document summary: title field not present or empty
Source: BankPaymAdviceVend.Report.docx OLE document summary: title field not present or empty
Source: BankPaymAdviceVend.Report.docx OLE document summary: title field not present or empty
Source: BankPaymAdviceVend.Report.docx OLE document summary: title field not present or empty
Source: ~WRF{9E2773A0-B35E-4804-8D45-C4FECAD54F2D}.tmp.0.dr OLE document summary: title field not present or empty
Source: ~WRF{9E2773A0-B35E-4804-8D45-C4FECAD54F2D}.tmp.0.dr OLE document summary: author field not present or empty
Source: ~WRF{9E2773A0-B35E-4804-8D45-C4FECAD54F2D}.tmp.0.dr OLE document summary: edited time not present or 0
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE File read: C:\Users\desktop.ini Jump to behavior
Source: BankPaymAdviceVend.Report.docx ReversingLabs: Detection: 66%
Source: BankPaymAdviceVend.Report.docx Virustotal: Detection: 59%
Source: unknown Process created: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\user\Desktop\BankPaymAdviceVend.Report.docx" /o ""
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process created: unknown unknown Jump to behavior
Source: BankPaymAdviceVend.Report.LNK.0.dr LNK file: ..\..\..\..\..\Desktop\BankPaymAdviceVend.Report.docx
Source: Window Recorder Window detected: More than 3 window changes detected
Source: BankPaymAdviceVend.Report.docx Initial sample: OLE zip file path = word/media/image4.emf
Source: BankPaymAdviceVend.Report.docx Initial sample: OLE zip file path = word/embeddings/oleObject3.bin
Source: BankPaymAdviceVend.Report.docx Initial sample: OLE zip file path = word/embeddings/oleObject4.bin
Source: BankPaymAdviceVend.Report.docx Initial sample: OLE zip file path = word/embeddings/oleObject2.bin
Source: BankPaymAdviceVend.Report.docx Initial sample: OLE zip file path = word/media/image3.emf
Source: BankPaymAdviceVend.Report.docx Initial sample: OLE zip file path = word/media/image2.emf
Source: BankPaymAdviceVend.Report.docx Initial sample: OLE zip file path = word/_rels/settings.xml.rels
Source: Element design set.dotx.0.dr Initial sample: OLE zip file path = word/glossary/settings.xml
Source: Element design set.dotx.0.dr Initial sample: OLE zip file path = word/glossary/_rels/document.xml.rels
Source: Element design set.dotx.0.dr Initial sample: OLE zip file path = word/glossary/document.xml
Source: Element design set.dotx.0.dr Initial sample: OLE zip file path = word/glossary/fontTable.xml
Source: Element design set.dotx.0.dr Initial sample: OLE zip file path = word/glossary/webSettings.xml
Source: Element design set.dotx.0.dr Initial sample: OLE zip file path = word/glossary/styles.xml
Source: Element design set.dotx.0.dr Initial sample: OLE zip file path = customXml/itemProps2.xml
Source: Element design set.dotx.0.dr Initial sample: OLE zip file path = customXml/item2.xml
Source: Element design set.dotx.0.dr Initial sample: OLE zip file path = customXml/_rels/item2.xml.rels
Source: Element design set.dotx.0.dr Initial sample: OLE zip file path = [trash]/0000.dat
Source: Element design set.dotx.0.dr Initial sample: OLE zip file path = docProps/custom.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.dr Initial sample: OLE zip file path = word/theme/_rels/theme1.xml.rels
Source: Text Sidebar (Annual Report Red and Black design).docx.0.dr Initial sample: OLE zip file path = word/glossary/settings.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.dr Initial sample: OLE zip file path = word/glossary/document.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.dr Initial sample: OLE zip file path = word/glossary/_rels/document.xml.rels
Source: Text Sidebar (Annual Report Red and Black design).docx.0.dr Initial sample: OLE zip file path = word/_rels/settings.xml.rels
Source: Text Sidebar (Annual Report Red and Black design).docx.0.dr Initial sample: OLE zip file path = word/glossary/webSettings.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.dr Initial sample: OLE zip file path = word/glossary/fontTable.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.dr Initial sample: OLE zip file path = word/glossary/styles.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.dr Initial sample: OLE zip file path = word/glossary/stylesWithEffects.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.dr Initial sample: OLE zip file path = customXml/item2.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.dr Initial sample: OLE zip file path = customXml/_rels/item2.xml.rels
Source: Text Sidebar (Annual Report Red and Black design).docx.0.dr Initial sample: OLE zip file path = customXml/itemProps3.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.dr Initial sample: OLE zip file path = customXml/item3.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.dr Initial sample: OLE zip file path = customXml/itemProps2.xml
Source: Text Sidebar (Annual Report Red and Black design).docx.0.dr Initial sample: OLE zip file path = customXml/_rels/item3.xml.rels
Source: Text Sidebar (Annual Report Red and Black design).docx.0.dr Initial sample: OLE zip file path = [trash]/0000.dat
Source: Text Sidebar (Annual Report Red and Black design).docx.0.dr Initial sample: OLE zip file path = docProps/custom.xml
Source: Equations.dotx.0.dr Initial sample: OLE zip file path = word/glossary/document.xml
Source: Equations.dotx.0.dr Initial sample: OLE zip file path = word/glossary/settings.xml
Source: Equations.dotx.0.dr Initial sample: OLE zip file path = word/glossary/_rels/document.xml.rels
Source: Equations.dotx.0.dr Initial sample: OLE zip file path = customXml/itemProps2.xml
Source: Equations.dotx.0.dr Initial sample: OLE zip file path = docProps/custom.xml
Source: Equations.dotx.0.dr Initial sample: OLE zip file path = customXml/_rels/item2.xml.rels
Source: Equations.dotx.0.dr Initial sample: OLE zip file path = customXml/item2.xml
Source: Equations.dotx.0.dr Initial sample: OLE zip file path = word/glossary/webSettings.xml
Source: Equations.dotx.0.dr Initial sample: OLE zip file path = [trash]/0000.dat
Source: Equations.dotx.0.dr Initial sample: OLE zip file path = word/glossary/styles.xml
Source: Equations.dotx.0.dr Initial sample: OLE zip file path = word/glossary/stylesWithEffects.xml
Source: Equations.dotx.0.dr Initial sample: OLE zip file path = word/glossary/fontTable.xml
Source: Insight design set.dotx.0.dr Initial sample: OLE zip file path = word/media/image2.jpg
Source: Insight design set.dotx.0.dr Initial sample: OLE zip file path = word/glossary/settings.xml
Source: Insight design set.dotx.0.dr Initial sample: OLE zip file path = word/glossary/document.xml
Source: Insight design set.dotx.0.dr Initial sample: OLE zip file path = word/glossary/_rels/document.xml.rels
Source: Insight design set.dotx.0.dr Initial sample: OLE zip file path = word/glossary/styles.xml
Source: Insight design set.dotx.0.dr Initial sample: OLE zip file path = word/glossary/webSettings.xml
Source: Insight design set.dotx.0.dr Initial sample: OLE zip file path = word/glossary/fontTable.xml
Source: Insight design set.dotx.0.dr Initial sample: OLE zip file path = word/media/image10.jpeg
Source: Insight design set.dotx.0.dr Initial sample: OLE zip file path = customXml/itemProps2.xml
Source: Insight design set.dotx.0.dr Initial sample: OLE zip file path = customXml/item2.xml
Source: Insight design set.dotx.0.dr Initial sample: OLE zip file path = customXml/_rels/item2.xml.rels
Source: Insight design set.dotx.0.dr Initial sample: OLE zip file path = [trash]/0000.dat
Source: Insight design set.dotx.0.dr Initial sample: OLE zip file path = docProps/custom.xml
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Key opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Common Jump to behavior
Source: BankPaymAdviceVend.Report.docx Initial sample: OLE indicators vbamacros = False

Persistence and Installation Behavior

barindex
Source: settings.xml.rels Extracted files from sample: http://ballontechnologytoupdatethenewthingstodeliveredeverywhere@tt.vg/bvhas
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: BankPaymAdviceVend.Report.docx Stream path 'CONTENTS' entropy: 7.91598386737 (max. 8.0)
Source: BankPaymAdviceVend.Report.docx Stream path 'CONTENTS' entropy: 7.91669502048 (max. 8.0)
Source: BankPaymAdviceVend.Report.docx Stream path 'CONTENTS' entropy: 7.92548841078 (max. 8.0)
Source: BankPaymAdviceVend.Report.docx Stream path 'CONTENTS' entropy: 7.94924924846 (max. 8.0)
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE WMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
Source: C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE Process information queried: ProcessInformation Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs