Windows
Analysis Report
upd-documentos.docx
Overview
General Information
Detection
Score: | 96 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w7x64
- WINWORD.EXE (PID: 3540 cmdline:
"C:\Progra m Files\Mi crosoft Of fice\Offic e14\WINWOR D.EXE" /Au tomation - Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
- cleanup
System Summary |
---|
Source: | Author: Vadim Khrykov (ThreatIntel), Cyb3rEng (Rule), Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: frack113: |
Source: | Author: Nasreddine Bencherchali (Nextron Systems): |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | File opened: | Jump to behavior |
Software Vulnerabilities |
---|
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
System Summary |
---|
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to dropped file |
Source: | OLE stream indicators for Word, Excel, PowerPoint, and Visio: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | OLE indicator, Word Document stream: | ||
Source: | OLE indicator, Word Document stream: |
Source: | OLE document summary: | ||
Source: | OLE document summary: | ||
Source: | OLE document summary: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | LNK file: |
Source: | Window detected: |
Source: | Initial sample: |
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Initial sample: |
Source: | Static PE information: |
Persistence and Installation Behavior |
---|
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Extracted files from sample: |
Source: | Section loaded: | Jump to behavior |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 2 Exploitation for Client Execution | Path Interception | Path Interception | 1 Masquerading | OS Credential Dumping | 1 Process Discovery | Remote Services | Data from Local System | 1 Ingress Tool Transfer | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Software Packing | LSASS Memory | 1 File and Directory Discovery | Remote Desktop Protocol | Data from Removable Media | Junk Data | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information | Security Account Manager | 2 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | HEUR/AGEN.1301814 | ||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1546310 |
Start date and time: | 2024-10-31 18:59:57 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 55s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsofficecookbook.jbs |
Analysis system description: | Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2) |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 1 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | upd-documentos.docx |
Detection: | MAL |
Classification: | mal96.expl.evad.winDOCX@1/22@0/0 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): mrxdav.sys, dllhost.exe, rundll32.exe, WMIADAP.exe
- Excluded IPs from analysis (whitelisted): 152.199.19.161
- Excluded domains from analysis (whitelisted): grupocgd.azureedge.net, grupocgd.ec.azureedge.net, cs9.wpc.v0cdn.net
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: upd-documentos.docx
C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD (copy)
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 131072 |
Entropy (8bit): | 0.025636015170386446 |
Encrypted: | false |
SSDEEP: | 6:I3DPcJCjlMvxggLRTGtRXv//4tfnRujlw//+GtluJ/eRuj:I3DPYd0vYg3J/ |
MD5: | 82E6E58C24F6FF524EBE85C30028A051 |
SHA1: | 2D777216EA7305C5172DE37A77F433F35D9EB603 |
SHA-256: | DDF6F112946E6B44B2AB9A6B2968406218A3F1893D29F8CE93501407859E9E22 |
SHA-512: | F60D145C024A37C3587C324B259A6D0DA6B72BEED4594314E74CB0E2418686BDEC42DDC947C54B6E90F5F0308C262D787FE1A274557215E0346790A39AD29A80 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\report[1].htm
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 2712963 |
Entropy (8bit): | 7.979615155849807 |
Encrypted: | false |
SSDEEP: | 49152:WIoNKCVfHSYE4r6QEXuuhk+Kbmt0bw8KYLdeAtgzGI/Tu:WZKCVfHyQElSb40c8KqvaG1 |
MD5: | 35A633E3AF1B8C470FF7CE422744D3C0 |
SHA1: | 138209F1F5730C4274DEDBB4EF72A3D27CBB3F36 |
SHA-256: | 05D0EDB00846FD9A6B37D0300F522E2E68234F592250D3FD090D849E4E247546 |
SHA-512: | 7BE4A54C8A53C41CCBA37D072546DD14E78E759FD2AF74F1D4E6725A787E24FBD4769841324A4409FCF241F5462300AEB1926A10869AE7CE2E3284B3284C4418 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3526B19E.jpeg
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 5457 |
Entropy (8bit): | 5.857023200063407 |
Encrypted: | false |
SSDEEP: | 48:D9YMOFuERASSHtddddddddddddddddddddddddddddddddddddddddddddddddd5:RhOMEmkR1Q8PlW6o0W9h |
MD5: | 3CB48B84910A3B80DA5754CF0CF8D0FA |
SHA1: | 383A004D36B69F439F930EAAC8443B39AEBF0CEC |
SHA-256: | AD320B4D7900F39C1035EE916DB5DAD88FB8FEE02DB986A6106978CE25E89E00 |
SHA-512: | 45B174F274966B4760145AD0D84B7A38E48D1DFEBCC74BFBB375FDCF09881B8AA2FD393985D8FEE7B7D6155387731B65E3115E44F0DD27DDA873D6FEB5EA22F7 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6334A5D1.htm
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 2712963 |
Entropy (8bit): | 7.979615155849807 |
Encrypted: | false |
SSDEEP: | 49152:WIoNKCVfHSYE4r6QEXuuhk+Kbmt0bw8KYLdeAtgzGI/Tu:WZKCVfHyQElSb40c8KqvaG1 |
MD5: | 35A633E3AF1B8C470FF7CE422744D3C0 |
SHA1: | 138209F1F5730C4274DEDBB4EF72A3D27CBB3F36 |
SHA-256: | 05D0EDB00846FD9A6B37D0300F522E2E68234F592250D3FD090D849E4E247546 |
SHA-512: | 7BE4A54C8A53C41CCBA37D072546DD14E78E759FD2AF74F1D4E6725A787E24FBD4769841324A4409FCF241F5462300AEB1926A10869AE7CE2E3284B3284C4418 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7629F907.png
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 42624 |
Entropy (8bit): | 7.954955580887962 |
Encrypted: | false |
SSDEEP: | 768:Pmko0I7bjH4L3HSIRU/8UsOMT0Gg3xlzojZBmgiWyyAIZfLLOO/1bxKbq4BPu:Pmk2XE3S0LUsORGwxytN77OaS8 |
MD5: | A2BEDCD204E51468D965572A75E09573 |
SHA1: | 5EE8F7CF28FE6DABD8F91AD99481BBCF87B031C5 |
SHA-256: | 4945F0BFBCD796BE43277ADE81B5CFFDAF1A588F28F6F709D4D878A71760EA8C |
SHA-512: | 79DA1A27468A88230EEA9600B6C1553BFB06B3BFC4FECD8645956EA0517D30388F7F37ED2B12DEE5CD7C8BACEADE78E33D4B88D9B53D5A8056DC529F2F21101A |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B096F5C.png
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 20826 |
Entropy (8bit): | 7.945179408026097 |
Encrypted: | false |
SSDEEP: | 384:wjmRcBP7ifyTqjUJN2UBCMDjdMo/8Mcqsw06tgi/wX:zR2P7C/UeUAOMfM06tgSy |
MD5: | EC55032CED0916164385EDF88908C317 |
SHA1: | CFCB4C0BA3B8D49DF7C6B6DE3C5D428BB7C9CEB6 |
SHA-256: | F356DE16EAE68AA71140453464DEA36CE73422F95C20128E7D120EB2BB3F309A |
SHA-512: | 9D5EF6BE49E077EB9FB06A11C664B97828F256C50E2F5F780FD0AA9F8137C004228242D31AF144FB07E436DA67DF41385C89A6A641A8B381648BEB837610A3F7 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{ED47C0D2-71DF-436E-B5E5-E072F32DFFD3}.tmp
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 10420224 |
Entropy (8bit): | 5.226416620241029 |
Encrypted: | false |
SSDEEP: | 49152:tR8nCxwIqyGLQSnQuiUMnfqojl2So8LMbFIAOYSieoT09fkXv9PQs+8Xlj+OeKUH:oQDjlPhqZlQDjlPQqZ |
MD5: | E150CE91E668E76290E54CC3460518B1 |
SHA1: | E771EB7213149E88AC4A9EBBD0407CD3C0E8ACB5 |
SHA-256: | 31844AF6F958353196C2F4673BBC00640D87F2C44CB7FBE604DB62C59384F27E |
SHA-512: | 419167C9EA7C55C158C21C341FA896ADE246B51E6D447095888E6E6AF43372DEEF1A552031C7239ADFADC6D9EE1FFC2B98137A3F167D497353DDCC5E269B0FEB |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{27637708-9243-4467-9726-DEB7A05CDD64}.tmp
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 2742 |
Entropy (8bit): | 3.3979845610936255 |
Encrypted: | false |
SSDEEP: | 24:elsCobOKrq3mgegG8xkUm46hk12e1iqoDKbuP93UPm/m/J/HZ9sfqJvjsZL:lCob9QNck151Datd/SRZcqBIZL |
MD5: | 7D4CD9F3D8FCD0BB5453A4CC27534917 |
SHA1: | A2BEACFBE0855DE65296853B7BE3C6D9B3C61279 |
SHA-256: | AD6E17B9385296A4C1781DEB6FBABD845AB6AAAD4F4C3C3CE971C00888D8FA25 |
SHA-512: | BA7911F8B5972115879B44C534275F51F7FB794DC299816DD89957F2B84F09AFCD5976C53552FFB9E5A3FF089EA17FFBB380D0E9F0AB11A2E74FEADFAB2AFD32 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{88963551-976E-4B5A-A810-7267D6BA11EA}.tmp
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 1024 |
Entropy (8bit): | 0.05390218305374581 |
Encrypted: | false |
SSDEEP: | 3:ol3lYdn:4Wn |
MD5: | 5D4D94EE7E06BBB0AF9584119797B23A |
SHA1: | DBB111419C704F116EFA8E72471DD83E86E49677 |
SHA-256: | 4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1 |
SHA-512: | 95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{ED1DA7CB-08C3-434A-A4AE-5B255B8264DF}.tmp
Download File
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 1024 |
Entropy (8bit): | 0.05390218305374581 |
Encrypted: | false |
SSDEEP: | 3:ol3lYdn:4Wn |
MD5: | 5D4D94EE7E06BBB0AF9584119797B23A |
SHA1: | DBB111419C704F116EFA8E72471DD83E86E49677 |
SHA-256: | 4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1 |
SHA-512: | 95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 428544 |
Entropy (8bit): | 7.694031092097202 |
Encrypted: | false |
SSDEEP: | 6144:fwtealvos26PD9w3Pp9S9x6WIGnCVjUW+jDvPyN9PkRagZy+P66rhRvPhRPKpY:YtdlHPD9G9qGfjU7vPyvMRr6QR/ |
MD5: | 03F41D9A824961681A7D1AF740062A9C |
SHA1: | A278256DCA45C03AFE9FF3EFD2C8567DDC593C46 |
SHA-256: | AB486CECB7A6FA2D05DBEFFCAB77A821AB15FA2F27DECFB797D2E4050E4F21DA |
SHA-512: | C60786B53152C6733EEA236B62D5817D92FD3B34ADFE6F6E1333EE65EA208962964775A2B6C0024C1C951325DAC3AA55A1123FDBAF17AC7640DCCB451A952EB6 |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 131072 |
Entropy (8bit): | 0.025636015170386446 |
Encrypted: | false |
SSDEEP: | 6:I3DPcJCjlMvxggLRTGtRXv//4tfnRujlw//+GtluJ/eRuj:I3DPYd0vYg3J/ |
MD5: | 82E6E58C24F6FF524EBE85C30028A051 |
SHA1: | 2D777216EA7305C5172DE37A77F433F35D9EB603 |
SHA-256: | DDF6F112946E6B44B2AB9A6B2968406218A3F1893D29F8CE93501407859E9E22 |
SHA-512: | F60D145C024A37C3587C324B259A6D0DA6B72BEED4594314E74CB0E2418686BDEC42DDC947C54B6E90F5F0308C262D787FE1A274557215E0346790A39AD29A80 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 131072 |
Entropy (8bit): | 0.025657033294029664 |
Encrypted: | false |
SSDEEP: | 6:I3DPcYqPyn2J9vxggLRZfAEgecB3RXv//4tfnRujlw//+GtluJ/eRuj:I3DP+PyuRFfAEgeGRvYg3J/ |
MD5: | 6F936031857EAA4DEEEA87089C6D2D08 |
SHA1: | 3E20B528AD86E81251BD98413081776D7BA3A862 |
SHA-256: | 742799C80822F8484A8515C837A8ED4931B46A7B94CE9AE70101636F7A95125D |
SHA-512: | 36B77EDE571094322DD09B94100321838F247350211523CBE3C76E0A2CB63552343D3AE232C3D0119CB5C3004B8E9E0BECF17696613570968EA7F59884582436 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 57 |
Entropy (8bit): | 4.461296865614146 |
Encrypted: | false |
SSDEEP: | 3:HRAbABGQYm2feQDCBLEfCcDn:HRYFVm4eDLETn |
MD5: | 933B642DC4B8E879F5A4A95CA95CA409 |
SHA1: | 3582C2BCA6FF133F43E120A808576DFEDAB9F4A0 |
SHA-256: | 3792136FB93A7AE076D4886C52849FE27FBDE8208D50FACBE6845A65177CA4AE |
SHA-512: | 33660E5EAD0615DA470700C1D3E3989FE69DE2D793403F5991F0F086B343AEADDE384954E67218CF52EB9DA989E93C9ABC892212CE9C2368CB3C0B1B7ED1EDFE |
Malicious: | true |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 112 |
Entropy (8bit): | 4.555597583679144 |
Encrypted: | false |
SSDEEP: | 3:HcAgBLAnJ407uRZUlm4cdBLEfCceS07uRZUlv:HxVnS0iDDLEuS0iS |
MD5: | 0C63F6CC46F1EC08DA57410159A78A58 |
SHA1: | 0B1E0C0A8087638361414E9FA4FB12FFED940AE5 |
SHA-256: | 0F29DE29EBF91B96809F4CA394F554A383D906E7E687FE4BEECFCC6D1DBD2E6B |
SHA-512: | 45CFA867A0883FE5248DBBF443E45437A139420016CE816C78E425D36744453FCA3A796600EFFBFDE4645463B10D0E887F2DA4A026DDBBDE54486857A10A2826 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 68 |
Entropy (8bit): | 4.4260687679142325 |
Encrypted: | false |
SSDEEP: | 3:HRAbABGQYm2feQDCBLEfCcCAVvn:HRYFVm4eDLEPVvn |
MD5: | BA62BA7A2B10A086858E46BFFC2104CE |
SHA1: | E3128942C69D1B8017406C7C0A974F06BF6D0269 |
SHA-256: | 1F3BE47E5D9BA4C3639BD4EE9C4A8C6A5A5F06E405329121D5AD59B181F3307A |
SHA-512: | 43EDF3C6575166DB660CBFDD90E3CD8A1CE6BDB9695EA52400DE4E7DE31EB4304074031BE59690B5AF1B78A2F79D0C4879C1E88EF3C88A0393412C4B1CC5D47D |
Malicious: | true |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 1039 |
Entropy (8bit): | 4.528114580433167 |
Encrypted: | false |
SSDEEP: | 12:8z5cpRgXg/XAlCPCHaXHBWB/Pr+X+WI2lCNX/iCicvbILwa47INDtZ3YilMMEpxg:8lCn/XTX8siUJe9abDv3qsw57u |
MD5: | 0ECA576AC6985AF77D2E0690A2F4B12B |
SHA1: | 9752F42FFDD265BA711B1FB46FFC912C82254F85 |
SHA-256: | 084043D2593648ED7F165859C71B7542C68776876DCAB70F7C295138A2CF9819 |
SHA-512: | BCC30427A57CC6975D023D1192738DD4E380829A50CFA2AADF1F5A95C985EA91027C1988F99978E8F566DAAFECD9837A6095AE221081491EB115CCF7B015FFDA |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 162 |
Entropy (8bit): | 2.503835550707526 |
Encrypted: | false |
SSDEEP: | 3:vrJlaCkWtVyAHpAyYQGcWX2xKbylln:vdsCkWtpHS9VX/b+l |
MD5: | A604235065D4B469AB30855D5048A3E8 |
SHA1: | 618636A10771F211931A9D26063A08A50BFA4BDF |
SHA-256: | 1C8E0165A83CCBF2B47064503AD0A7FF81C1573538A3E451534DB7BC99FB34D8 |
SHA-512: | 639ADFFD0E4AE6A86E49FB706E412887694804CB96C6E4C5C59F8194983957326C124CCB14AD7D56B63D401762633EAECE5C1EB3FF2A7878F1C1E4796E0CE523 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 85214 |
Entropy (8bit): | 7.881913506340887 |
Encrypted: | false |
SSDEEP: | 1536:JW5g2UwRaG5DNujmk2XE3S0LUsORGwxytN77OaSPWnG0h:JkuwRa6hujGCRL+Rw9ZG0h |
MD5: | C9B541D73A8692E7AE9B78DCE593FA81 |
SHA1: | 869DE534AEA52F0D416575AB46DD39FD3ACC21C2 |
SHA-256: | 7C0D26AD84089ACD8EDF0FE93329D20CB5D7BC8E5EA9431A7C52B73E43402E8E |
SHA-512: | A1264855E154497E54090057BE821048FF87D6B865C9D54574655C607BB9C8FB8883031050C6BA7F312B2BE8BAEA77C6D6432E9ECA5B2383FBFDE0BA6D1EEE94 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 162 |
Entropy (8bit): | 2.503835550707526 |
Encrypted: | false |
SSDEEP: | 3:vrJlaCkWtVyAHpAyYQGcWX2xKbylln:vdsCkWtpHS9VX/b+l |
MD5: | A604235065D4B469AB30855D5048A3E8 |
SHA1: | 618636A10771F211931A9D26063A08A50BFA4BDF |
SHA-256: | 1C8E0165A83CCBF2B47064503AD0A7FF81C1573538A3E451534DB7BC99FB34D8 |
SHA-512: | 639ADFFD0E4AE6A86E49FB706E412887694804CB96C6E4C5C59F8194983957326C124CCB14AD7D56B63D401762633EAECE5C1EB3FF2A7878F1C1E4796E0CE523 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 85214 |
Entropy (8bit): | 7.881913506340887 |
Encrypted: | false |
SSDEEP: | 1536:JW5g2UwRaG5DNujmk2XE3S0LUsORGwxytN77OaSPWnG0h:JkuwRa6hujGCRL+Rw9ZG0h |
MD5: | C9B541D73A8692E7AE9B78DCE593FA81 |
SHA1: | 869DE534AEA52F0D416575AB46DD39FD3ACC21C2 |
SHA-256: | 7C0D26AD84089ACD8EDF0FE93329D20CB5D7BC8E5EA9431A7C52B73E43402E8E |
SHA-512: | A1264855E154497E54090057BE821048FF87D6B865C9D54574655C607BB9C8FB8883031050C6BA7F312B2BE8BAEA77C6D6432E9ECA5B2383FBFDE0BA6D1EEE94 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
File Type: | |
Category: | modified |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.976914461654912 |
TrID: |
|
File name: | upd-documentos.docx |
File size: | 77'155 bytes |
MD5: | 0b8423f133b423737e0cf67913fdc5a6 |
SHA1: | abb81b39d46adf56a6474df1ff1584c0203cb488 |
SHA256: | a17c902231378ac916cf537adc45f48d0c465872fe7374bcceeb2f6caf7c1afd |
SHA512: | b4f0cb09bb9e111071b5eefb9248653b53aa35b00f1f962fd8c85aa799dc3ee998f71b1d3a86e6ee4aad63a1897a34c9dc61eeb3ad2388ec34c4c2aa908f1ab7 |
SSDEEP: | 1536:vv29q9TB0RtVM6SeVZgJo4gYracHIqMiv+F82YMo9dR+NPScTEUlZ70J:FOt5SggG4j2mMbFIL9dR+NPSczZ70J |
TLSH: | 0673F1F9C8D20A59E1866570C2720343FCC65FBA6885F35C2A5DA108CCDE6FE9F17A48 |
File Content Preview: | PK..........QY................docProps/PK..........!..c5.............docProps/app.xml.RMO.0.....!..q.J......8.@j..eO....l.Q~=.F.@..i.........`.w.Q;.....3..)m.U.....y...J.gq.o1.W...x..cH.cF.6..>%..X.=.".T.Ti].D.4t....x..f@.X]......B5...|b.|O.%UN...K....... |
Icon Hash: | 65e6a3a3afb7bdbf |
Document Type: | OpenXML |
Number of OLE Files: | 1 |
Has Summary Info: | |
Application Name: | |
Encrypted Document: | False |
Contains Word Document Stream: | True |
Contains Workbook/Book Stream: | False |
Contains PowerPoint Document Stream: | False |
Contains Visio Document Stream: | False |
Contains ObjectPool Stream: | False |
Flash Objects Count: | 0 |
Contains VBA Macros: | False |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 14:00:54 |
Start date: | 31/10/2024 |
Path: | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x13f140000 |
File size: | 1'423'704 bytes |
MD5 hash: | 9EE74859D22DAE61F1750B3A1BACB6F5 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |