Windows
Analysis Report
SecuriteInfo.com.Exploit.CVE-2017-11882.123.7473.7914.doc
Overview
General Information
Detection
Score: | 64 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w7x64
- WINWORD.EXE (PID: 3408 cmdline:
"C:\Progra m Files\Mi crosoft Of fice\Offic e14\WINWOR D.EXE" /Au tomation - Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
- cleanup
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Avira: |
Source: | ReversingLabs: |
Source: | File opened: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | OLE stream indicators for Word, Excel, PowerPoint, and Visio: | ||
Source: | OLE stream indicators for Word, Excel, PowerPoint, and Visio: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | OLE document summary: | ||
Source: | OLE document summary: | ||
Source: | OLE document summary: | ||
Source: | OLE document summary: | ||
Source: | OLE document summary: | ||
Source: | OLE document summary: |
Source: | File read: | Jump to behavior |
Source: | ReversingLabs: |
Source: | LNK file: |
Source: | Window detected: |
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Initial sample: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | 1 Masquerading | OS Credential Dumping | 1 File and Directory Discovery | Remote Services | Data from Local System | 1 Ingress Tool Transfer | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Rootkit | LSASS Memory | 1 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
61% | ReversingLabs | Document-Office.Exploit.CVE-2017-11882 | ||
100% | Avira | EXP/CVE-2017-11882.Gen |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | EXP/CVE-2017-11882.Gen |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1545182 |
Start date and time: | 2024-10-30 08:27:17 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 36s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsofficecookbook.jbs |
Analysis system description: | Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2) |
Number of analysed new started processes analysed: | 3 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | SecuriteInfo.com.Exploit.CVE-2017-11882.123.7473.7914.doc |
Detection: | MAL |
Classification: | mal64.winDOC@1/24@0/0 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
- VT rate limit hit for: SecuriteInfo.com.Exploit.CVE-2017-11882.123.7473.7914.doc
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0000.doc
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 1643520 |
Entropy (8bit): | 3.9966739074987476 |
Encrypted: | false |
SSDEEP: | 24576:V8FtTWbAJLXNfT50igpf3nRSM3y2CfCfL7ClAf4:6W0a08y2 |
MD5: | C444B92E9D65DEFE2A2561FA7E195002 |
SHA1: | D702626E42E71349BB3A71E1E213D76F78960FF5 |
SHA-256: | B3DD9AF3E2BE1FAF6B641B7905B8E85EF37A741D67289493A6E29FE2FBD7B6CD |
SHA-512: | 8AFA618739A6BF3AB1810D43B7C2344C1A5CA275A0D14C513D8A1469A7859A4C239AC06D792D7CF49189B8AAB9394E5E4177F0DAC24C071E974B3C4222F4E233 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0002.doc
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 838912 |
Entropy (8bit): | 6.06009016245783 |
Encrypted: | false |
SSDEEP: | 24576:UFySeLMu/lUHGguNaUgjg+NkTgThiNkKBN:HR1Kmg6RsON |
MD5: | AB428CC040E3ED01E72130487BF72E0D |
SHA1: | BAF66D14F735845F0A6E72FEF9AA91F48E46F805 |
SHA-256: | E728DECCBE5B9F2886969F531BDD869CD8138BD3B446020EADEA79A9195AB0C5 |
SHA-512: | 8D1A5B7F591A378D3E2BDFC3DEBAC4A5B01457241045C480D34BC6A7E5686A8A2D1F9137C8E9F1E76243AFAFBF12E9C975CFCC35188BFB6967F8B43292E59EF7 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRD0003.doc
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 842020 |
Entropy (8bit): | 6.060744752511023 |
Encrypted: | false |
SSDEEP: | 24576:UFySeLMu/lUHGguNaUgjg+NkTgThiNkKBw:HR1Kmg6RsOw |
MD5: | 1B4BF178A1F078AC9EA90C01BC4AC193 |
SHA1: | 53F381C5F06BDE56C4D214177FD9C5A3FA3CB5D7 |
SHA-256: | 79860F71BEC5830117B6E73D82997264754FC6A9D6F9B1A92012997773086A44 |
SHA-512: | 832738B23BBFEE9097014B9769C339EEE061E1DA4C10D42B7F7ED04B6B19D41C54CE1F0F991B05BA14037116950FCBEA145E103AA9876EE8606229EBB4CD8C6E |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{8E3E49DC-90E1-4785-B42F-4CAB9EFDE8F3}.tmp
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 16384 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | CE338FE6899778AACFC28414F2D9498B |
SHA1: | 897256B6709E1A4DA9DABA92B6BDE39CCFCCD8C1 |
SHA-256: | 4FE7B59AF6DE3B665B67788CC2F99892AB827EFAE3A467342B3BB4E3BC8E5BFE |
SHA-512: | 6EB7F16CF7AFCABE9BDEA88BDAB0469A7937EB715ADA9DFD8F428D9D38D86133945F5F2F2688DDD96062223A39B5D47F07AFC3C48D9DB1D5EE3F41C8D274DCCF |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{7053366D-27B4-4AE5-AE17-9B45D8AF29EB}.tmp
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 1536 |
Entropy (8bit): | 0.2940158465961729 |
Encrypted: | false |
SSDEEP: | 3:4lXl3lldHFll/vvvvVuOpblltlhlUnujkn:o5zauYn |
MD5: | AB95FA62C202F496436FEC16094A078C |
SHA1: | 73E21A2BF029F9CF39C24C421D6179D93477C22F |
SHA-256: | B4EFDAA9C76D2A8A2B8FCBEE1A12C2333FE01D97C628A7491D6A2C0AA9F6C957 |
SHA-512: | AA9EE4715CE8AD7CE91E454F639F5AD0C2AA04C8ED090EDC331233C32E63D3B25EB7C8467EC0489FE629DF8E38AB053AA25BA0D625B12EE3EC5E8BEB7B284BC0 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{7B962A0B-5C7F-4263-A151-6A965ECF6711}.tmp
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 1024 |
Entropy (8bit): | 0.05390218305374581 |
Encrypted: | false |
SSDEEP: | 3:ol3lYdn:4Wn |
MD5: | 5D4D94EE7E06BBB0AF9584119797B23A |
SHA1: | DBB111419C704F116EFA8E72471DD83E86E49677 |
SHA-256: | 4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1 |
SHA-512: | 95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E4F6ED97-B252-4415-AA9E-7F84C1C38D2C}.tmp
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 1536 |
Entropy (8bit): | 1.357318797251612 |
Encrypted: | false |
SSDEEP: | 3:Iiiiiiiiiif3l/Hlnl/bl//l/bllBl/PvvvvvvvvvvFl/l/lAqsalHl3lldHzlbf:IiiiiiiiiifdLloZQc8++lsJe1Mz4n |
MD5: | F45EC669EC675BF2CA2FAB9F3A8AB759 |
SHA1: | 2EEB1FACD838DB0FCE4E0D6F5647BA39C72F0143 |
SHA-256: | C144EC18C1E01FB26F9236CC1FA62901CDA2E7A7D5EE28C77EDA6F8303610708 |
SHA-512: | 8063719289B3209841D0FC98EAE26589E202FA9D547FCE36251A96621F1E677201CA0791CEE62980AE1F2A8ECE218FA8C1A72EA6603F221B12CDD0BAC9ED832D |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 821760 |
Entropy (8bit): | 6.0436412019334655 |
Encrypted: | false |
SSDEEP: | 24576:wFySeLMu/lUHGguNaUgjg+NkTgThiNkKB:LR1Kmg6RsO |
MD5: | 6AC9E7D34D83BB50531E69712A30C6A8 |
SHA1: | 42D1FFE57C06A281E78022D8381EF83454B3B03C |
SHA-256: | 204E8E209DE5D205CCBAE121BCC43864B213664C73F4AC4A4C5E12692FFE0FF0 |
SHA-512: | 37586004970D08072F3511E914DC8A251BC8E1D386AC0008393A249475BF3BBCED9510EEBE11158F709A37E2137FA2B37C2B08F54EEE21ED1D2AA00649CDC29C |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 512 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | BF619EAC0CDF3F68D496EA9344137E8B |
SHA1: | 5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5 |
SHA-256: | 076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560 |
SHA-512: | DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\SecuriteInfo.com.Exploit.CVE-2017-11882.123.7473.7914.LNK
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 1229 |
Entropy (8bit): | 4.541812314427386 |
Encrypted: | false |
SSDEEP: | 24:8A/XT+bX4XzuHCdOO3eBxR0vTHCdOO5Dv3q+57u:8A/XTaX4SHCN3MRyHCNQ+9u |
MD5: | 622F1172018BE7DF7B7A1C89B907A0B7 |
SHA1: | 5F4686F49E7A869489B168FD28194F4BD8E6BF08 |
SHA-256: | 9E5FD440B0C3C977E7F6B9F7B011C719C5851DC76AB155A83E0F63288EA5C65B |
SHA-512: | B1C3FD7B180A4FC2C7E2327C28F58884A20312E46F0D88ADBDBC2C7DF1C797DB5BB70F2FCDC78470651406986E73D6314AE76C5D0CB39B09783279D519C257AD |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 140 |
Entropy (8bit): | 4.975597528963744 |
Encrypted: | false |
SSDEEP: | 3:M1n8bcK+JiMSRRSh5om4P8bcK+JiMSRRSh5ov:MuwKNTRRSrjwKNTRRSry |
MD5: | C6D6D40F3C04DAA6842A43AC95C0C311 |
SHA1: | 5C676E8A17A4F0D59F5A034298AFD91A07B537C7 |
SHA-256: | 1A3E9290994021496EF9CABF35D2BA19A2B4DF9454F26EBF5B282609F8373826 |
SHA-512: | 3C512A7B5020074CFC2A7A82C94358E30F56AA9B9F069068C6B5157F154BE4CDD2B91BCF0236061C4A6F20E4D120BF2A5455480ADC9AD96288D49C4BA4F0AD4E |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 162 |
Entropy (8bit): | 2.4797606462020307 |
Encrypted: | false |
SSDEEP: | 3:vrJlaCkWtVyxblgl0nGltlMWtVGXlcNOllln:vdsCkWtMe2G/LkXh/l |
MD5: | 89AFCB26CA4D4A770472A95DF4A52BA8 |
SHA1: | C3B3FEAEF38C3071AC81BC6A32242E6C39BEE9B5 |
SHA-256: | EF0F4A287E5375B5BFFAE39536E50FDAE97CD185C0F7892C7D25BD733E7D2F17 |
SHA-512: | EA44D55E57AEFA8D6F586F144CB982145384F681D0391C5AD8E616A67D77913152DB7B0F927E57CDA3D1ECEC3D343A1D6E060EAFF8E8FEDBE38394DFED8224CC |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 2 |
Entropy (8bit): | 1.0 |
Encrypted: | false |
SSDEEP: | 3:Qn:Qn |
MD5: | F3B25701FE362EC84616A93A45CE9998 |
SHA1: | D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB |
SHA-256: | B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209 |
SHA-512: | 98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 162 |
Entropy (8bit): | 2.4797606462020307 |
Encrypted: | false |
SSDEEP: | 3:vrJlaCkWtVyxblgl0nGltlMWtVGXlcNOllln:vdsCkWtMe2G/LkXh/l |
MD5: | 89AFCB26CA4D4A770472A95DF4A52BA8 |
SHA1: | C3B3FEAEF38C3071AC81BC6A32242E6C39BEE9B5 |
SHA-256: | EF0F4A287E5375B5BFFAE39536E50FDAE97CD185C0F7892C7D25BD733E7D2F17 |
SHA-512: | EA44D55E57AEFA8D6F586F144CB982145384F681D0391C5AD8E616A67D77913152DB7B0F927E57CDA3D1ECEC3D343A1D6E060EAFF8E8FEDBE38394DFED8224CC |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 842020 |
Entropy (8bit): | 6.060744752511023 |
Encrypted: | false |
SSDEEP: | 24576:UFySeLMu/lUHGguNaUgjg+NkTgThiNkKBw:HR1Kmg6RsOw |
MD5: | 1B4BF178A1F078AC9EA90C01BC4AC193 |
SHA1: | 53F381C5F06BDE56C4D214177FD9C5A3FA3CB5D7 |
SHA-256: | 79860F71BEC5830117B6E73D82997264754FC6A9D6F9B1A92012997773086A44 |
SHA-512: | 832738B23BBFEE9097014B9769C339EEE061E1DA4C10D42B7F7ED04B6B19D41C54CE1F0F991B05BA14037116950FCBEA145E103AA9876EE8606229EBB4CD8C6E |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | modified |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 6.0436412019334655 |
TrID: |
|
File name: | SecuriteInfo.com.Exploit.CVE-2017-11882.123.7473.7914.doc |
File size: | 821'760 bytes |
MD5: | 6ac9e7d34d83bb50531e69712a30c6a8 |
SHA1: | 42d1ffe57c06a281e78022d8381ef83454b3b03c |
SHA256: | 204e8e209de5d205ccbae121bcc43864b213664c73f4ac4a4c5e12692ffe0ff0 |
SHA512: | 37586004970d08072f3511e914dc8a251bc8e1d386ac0008393a249475bf3bbced9510eebe11158f709a37e2137fa2b37c2b08f54eee21ed1d2aa00649cdc29c |
SSDEEP: | 24576:wFySeLMu/lUHGguNaUgjg+NkTgThiNkKB:LR1Kmg6RsO |
TLSH: | 26052384FE542F93CB5A493C5A0B8A2C2BC7BF8D831EC4F72AE63587197CFA10856545 |
File Content Preview: | ........................>...................................................................................................................................................................................................................................... |
Icon Hash: | 2764a3aaaeb7bdbf |
Document Type: | OLE |
Number of OLE Files: | 1 |
Has Summary Info: | |
Application Name: | None |
Encrypted Document: | False |
Contains Word Document Stream: | False |
Contains Workbook/Book Stream: | False |
Contains PowerPoint Document Stream: | False |
Contains Visio Document Stream: | False |
Contains ObjectPool Stream: | False |
Flash Objects Count: | 0 |
Contains VBA Macros: | False |
General | |
Stream Path: | \x1OlE10NAtiVe |
CLSID: | |
File Type: | data |
Stream Size: | 812631 |
Entropy: | 5.994032766358045 |
Base64 Encoded: | False |
Data ASCII: | ' l < . . \\ . . . L / 8 i 2 . w ; 7 g . f . . V . . 6 - . k M & B . 7 ^ . y ~ C . L ' M . R q < v l o X . y O W j . . l v ) / . v . i . . g ] s j . . . ` O k Q F . d . . % Z p . 4 p H . . 9 / o . h # t . . 3 a q G F v V . . . ( m . . g > . E O [ . K ! . } V . . L { _ 5 : . Y _ . F q f Y . j y Q . 6 I T u E $ f m u ^ r ^ . 3 . . . . . t - U . w B { . % " . ` H 0 . . T . . k U 4 g ? ~ c . k . - . ^ d P . . ( v p H s / ' . . r } z . < . B & i . . . . . ` P Y D . . . k . . u d . Z . U O = . O . s . g . 8 |
Data Raw: | 27 6c 3c 02 03 5c 93 9d 13 92 01 08 4c 2f bb 38 69 32 b6 81 f3 04 d4 77 b6 8b 3b 8b 37 ba f7 67 ce 8c 81 e2 b0 ef 66 12 8b 02 56 ff d0 05 cf 94 36 2d 05 be 6b c9 d2 ff e0 a7 4d 26 42 00 eb 37 90 ab 90 cb 5e 0a 79 7e 86 43 b0 ce 17 4c 9a e7 27 b6 94 4d 8b cd c8 1d 52 99 a5 71 93 3c b3 8c f5 fb be 86 76 6c 6f 58 b5 0e 79 f8 81 4f d7 d3 57 d5 c3 e1 6a ed e3 1b 9a fe d5 1f 6c 76 29 2f |
General | |
Stream Path: | 9ubABsoNAML5QfJiEO31vi1XTAl |
CLSID: | |
File Type: | empty |
Stream Size: | 0 |
Entropy: | 0.0 |
Base64 Encoded: | False |
Data ASCII: | |
Data Raw: |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 03:28:21 |
Start date: | 30/10/2024 |
Path: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x13f320000 |
File size: | 1'423'704 bytes |
MD5 hash: | 9EE74859D22DAE61F1750B3A1BACB6F5 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |