Attention: please enable javascript in order to properly view and use this malware analysis service.

Incident Response

Risk Assessment

Spyware
Hooks API calls
Network Behavior
Contacts 2 domains and 3 hosts. View all details

MITRE ATT&CK™ Techniques Detection

This report has 7 indicators that were mapped to 7 attack techniques and 6 tactics. View all details

Indicators

Not all malicious and suspicious indicators are displayed. Get your own cloud service or the full version to view all details.

  • Malicious Indicators 6

  • External Systems
  • General
    • GETs files from a webserver
      details
      "GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBRv9GhNQxLSSGKBnMArPUcsHYovpgQUxKexpHsscfrb4UuQdf%2FEFWCFiRACEAoBQUIAAAFThXNqC4Xspwg%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Microsoft-CryptoAPI/6.1Host: isrg.trustid.ocsp.identrust.com"
      "GET /MFMwUTBPME0wSzAJBgUrDgMCGgUABBR%2B5mrncpqz%2FPiiIGRsFqEtYHEIXQQUqEpqYwR93brm0Tm3pkVl7%2FOo7KECEgOt8d0SPIAhLDMt476hQRdB4w%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Microsoft-CryptoAPI/6.1Host: ocsp.int-x3.letsencrypt.org"
      source
      Network Traffic
      relevance
      10/10
  • Network Related
    • Malicious artifacts seen in the context of a contacted host
      details
      Found malicious artifacts related to "188.209.52.116": ...
      URL: http://share.dmca.gripe/VRGL9rHVaxQQuzsX.jpg (AV positives: 5/68 scanned on 10/30/2018 19:09:29)
      URL: https://share.dmca.gripe/nRm4ZS6Uud7hNoAa.doc (AV positives: 5/68 scanned on 10/30/2018 18:08:43)
      URL: https://share.dmca.gripe/bA7A7gpIxtDmFGGB.jpg (AV positives: 7/68 scanned on 10/30/2018 17:09:32)
      URL: https://share.dmca.gripe/pmyymED33sMldxH3.jpg (AV positives: 8/68 scanned on 10/30/2018 12:49:01)
      URL: https://share.dmca.gripe/cdqhx3FRECwWYYuQ.jpg (AV positives: 9/68 scanned on 10/30/2018 12:48:27)
      File SHA256: c0a6d9b38153cc61dd042e7b9ea02df9b8d0958f27f31d5be5d89dd66303b0b4 (AV positives: 46/68 scanned on 10/30/2018 19:09:32)
      File SHA256: 0469abfbc9e8361f14832a6450e48525dfe374b3a6baa585c01d3da7a82074db (AV positives: 31/56 scanned on 10/30/2018 18:08:46)
      File SHA256: 7823ed33c9e1dd4700411e29dd23dc174931e03d659ab43f753201286ccaca58 (AV positives: 27/68 scanned on 10/30/2018 17:09:35)
      File SHA256: 25341dae42974ce99e75e303958c12b467309877d582428a42e8f32fb417747e (AV positives: 31/69 scanned on 10/30/2018 12:49:03)
      File SHA256: 74ecc688e85c6ed6129a0ba9f59f83a5c61b03972bd209bac42974a4490c677c (AV positives: 41/67 scanned on 10/30/2018 12:48:28)
      File SHA256: 9e9bbceb584dbb889ac7ad94ee737824adac724e46d507e02d09ed8c848346d9 (Date: 10/22/2018 12:13:04)
      File SHA256: 5e49c09b58823cdfcfa394827fbedd03bd4a9c7adbda75ad81aa66215ec12cd4 (Date: 10/22/2018 12:01:37)
      File SHA256: c5058174e81e870848baa9324f7131c53becc8f3aecc90e9a6821296219787c5 (Date: 10/21/2018 09:07:15)
      File SHA256: 502883c5f79d9a349e84af717a364f180eecad96fe39f273857b9970909f0ab9 (Date: 10/16/2018 05:27:55)
      File SHA256: bf69036630dee1b725ed14b7fcceb655e484851c50d5e1ff0d04689c0c2fca3c (Date: 10/16/2018 03:09:36)
      source
      Network Traffic
      relevance
      10/10
  • Unusual Characteristics
  • Hiding 1 Malicious Indicators
    • All indicators are available only in the private webservice or standalone version
  • Suspicious Indicators 7

  • External Systems
  • General
    • Opened the service control manager
      details
      "WINWORD.EXE" called "OpenSCManager" requesting access rights "SC_MANAGER_CONNECT" (0x1)
      "WINWORD.EXE" called "OpenSCManager" requesting access rights "0XE0000000L"
      source
      API Call
      relevance
      10/10
      ATT&CK ID
      T1035 (Show technique in the MITRE ATT&CK™ matrix)
    • Removes Office resiliency keys (often used to avoid problems opening documents)
      details
      "WINWORD.EXE" (Access type: "DELETEVAL"; Path: "HKCU\SOFTWARE\MICROSOFT\OFFICE\14.0\WORD\RESILIENCY\STARTUPITEMS"; Key: "$~D")
      "WINWORD.EXE" (Access type: "DELETEVAL"; Path: "HKCU\SOFTWARE\MICROSOFT\OFFICE\14.0\WORD\RESILIENCY\STARTUPITEMS"; Key: ";!D")
      "WINWORD.EXE" (Access type: "DELETEVAL"; Path: "HKCU\SOFTWARE\MICROSOFT\OFFICE\14.0\WORD\RESILIENCY\STARTUPITEMS"; Key: "}{D")
      "WINWORD.EXE" (Access type: "DELETE"; Path: "HKCU\SOFTWARE\MICROSOFT\OFFICE\14.0\WORD\RESILIENCY\STARTUPITEMS")
      "WINWORD.EXE" (Access type: "DELETE"; Path: "HKCU\SOFTWARE\MICROSOFT\OFFICE\14.0\WORD\RESILIENCY")
      source
      Registry Access
      relevance
      10/10
      ATT&CK ID
      T1112 (Show technique in the MITRE ATT&CK™ matrix)
  • Network Related
  • System Security
    • Hooks API calls
      details
      "VariantChangeType@OLEAUT32.DLL" in "WINWORD.EXE"
      "VariantClear@OLEAUT32.DLL" in "WINWORD.EXE"
      "SysFreeString@OLEAUT32.DLL" in "WINWORD.EXE"
      "OleLoadFromStream@OLE32.DLL" in "WINWORD.EXE"
      "SysAllocStringByteLen@OLEAUT32.DLL" in "WINWORD.EXE"
      source
      Hook Detection
      relevance
      10/10
      ATT&CK ID
      T1179 (Show technique in the MITRE ATT&CK™ matrix)
  • Unusual Characteristics
    • Drops cabinet archive files
      details
      "Cab1893.tmp" has type "Microsoft Cabinet archive data 55153 bytes 1 file"
      source
      Binary File
      relevance
      10/10
    • Installs hooks/patches the running process
      details
      "WINWORD.EXE" wrote bytes "e99e485df0" to virtual address "0x75C03D01" ("SetUnhandledExceptionFilter@KERNEL32.DLL")
      "WINWORD.EXE" wrote bytes "70c8ea16" to virtual address "0x6AF7CA70" (part of module "GFX.DLL")
      "WINWORD.EXE" wrote bytes "e923995af0" to virtual address "0x75C95DEE" ("VariantChangeType@OLEAUT32.DLL")
      "WINWORD.EXE" wrote bytes "e9365558f0" to virtual address "0x75C93EAE" ("VariantClear@OLEAUT32.DLL")
      "WINWORD.EXE" wrote bytes "92e6527779a85777be725777d62d57771de2527705a25777bee35277616f5777684155770050557700000000ad3706768b2d0676b641067600000000" to virtual address "0x74A81000" (part of module "WSHTCPIP.DLL")
      "WINWORD.EXE" wrote bytes "4053557758585677186a5677653c57770000000000bfbf750000000056ccbf75000000007ccabf750000000037688d756a2c5777d62d57770000000020698d750000000029a6bf7500000000a48d8d7500000000f70ebf7500000000" to virtual address "0x77691000" (part of module "NSI.DLL")
      "WINWORD.EXE" wrote bytes "16489f11" to virtual address "0x6A3EAE34" (part of module "CSI.DLL")
      "WINWORD.EXE" wrote bytes "7739537779a85777be725777d62d57771de2527705a25777c868567757d15d77bee35277616f5777684155770050557700000000ad3706768b2d0676b641067600000000" to virtual address "0x750A1000" (part of module "WSHIP6.DLL")
      "WINWORD.EXE" wrote bytes "e8c4ea16" to virtual address "0x678F78E4" (part of module "OART.DLL")
      "WINWORD.EXE" wrote bytes "f4821d11" to virtual address "0x66430BA8" (part of module "MSO.DLL")
      "WINWORD.EXE" wrote bytes "12113011" to virtual address "0x6A8210AC" (part of module "MSPTLS.DLL")
      "WINWORD.EXE" wrote bytes "2cd3be17" to virtual address "0x2F5B1B94" (part of module "WINWORD.EXE")
      "WINWORD.EXE" wrote bytes "cdf7ea16" to virtual address "0x68DFF530" (part of module "WWLIB.DLL")
      "WINWORD.EXE" wrote bytes "e99a5457f0" to virtual address "0x75C93E59" ("SysFreeString@OLEAUT32.DLL")
      "WINWORD.EXE" wrote bytes "e9c532e4f0" to virtual address "0x75976143" ("OleLoadFromStream@OLE32.DLL")
      "WINWORD.EXE" wrote bytes "5e97c910" to virtual address "0x6A719904" (part of module "RICHED20.DLL")
      "WINWORD.EXE" wrote bytes "e9603358f0" to virtual address "0x75C94731" ("SysAllocStringByteLen@OLEAUT32.DLL")
      "WINWORD.EXE" wrote bytes "c4cabf7580bbbf75aa6ec0759fbbbf7508bbbf7546cebf756138c075de2fc075d0d9bf750000000017793e764f913e767f6f3e76f4f73e7611f73e76f2833e76857e3e7600000000" to virtual address "0x73D91000" (part of module "MSIMG32.DLL")
      source
      Hook Detection
      relevance
      10/10
      ATT&CK ID
      T1179 (Show technique in the MITRE ATT&CK™ matrix)
  • Informative 10

  • General
    • Contacts domains
      details
      "isrg.trustid.ocsp.identrust.com"
      "ocsp.int-x3.letsencrypt.org"
      source
      Network Traffic
      relevance
      1/10
    • Contacts server
      details
      "188.209.52.116:443"
      "88.221.134.90:80"
      "213.248.112.154:80"
      source
      Network Traffic
      relevance
      1/10
    • Creates a writable file in a temporary directory
      details
      "WINWORD.EXE" created file "%TEMP%\Cab1893.tmp"
      "WINWORD.EXE" created file "%TEMP%\Tar189E.tmp"
      "WINWORD.EXE" created file "%TEMP%\{82C5607B-3A44-4F06-9E54-A46E1F1570BD}"
      "WINWORD.EXE" created file "%TEMP%\{9E2490E3-1781-4681-B0C5-D364EF04BFEE}"
      source
      API Call
      relevance
      1/10
    • Creates mutants
      details
      "\Sessions\1\BaseNamedObjects\IESQMMUTEX_0_208"
      "\Sessions\1\BaseNamedObjects\Local\10MU_ACBPIDS_S-1-5-5-0-63360"
      "\Sessions\1\BaseNamedObjects\Local\10MU_ACB10_S-1-5-5-0-63360"
      "\Sessions\1\BaseNamedObjects\Global\552FFA80-3393-423d-8671-7BA046BB5906"
      "\Sessions\1\BaseNamedObjects\Local\ZonesCounterMutex"
      "\Sessions\1\BaseNamedObjects\Local\ZoneAttributeCacheCounterMutex"
      "\Sessions\1\BaseNamedObjects\Local\ZonesCacheCounterMutex"
      "\Sessions\1\BaseNamedObjects\Local\ZonesLockedCacheCounterMutex"
      "\Sessions\1\BaseNamedObjects\Local\WininetStartupMutex"
      "\Sessions\1\BaseNamedObjects\Local\WininetConnectionMutex"
      "\Sessions\1\BaseNamedObjects\Local\WininetProxyRegistryMutex"
      "\Sessions\1\BaseNamedObjects\{BDD98A3C-B57F-4199-B92A-95A54AA1132E}-EBD31E46"
      "\Sessions\1\BaseNamedObjects\{BDD98A3C-B57F-4199-B92A-95A54AA1132E}-328CE310"
      "\Sessions\1\BaseNamedObjects\Local\CSI_OMTX:{24ECD800-909D-4831-A1F2-C2615C7242BB}"
      "\Sessions\1\BaseNamedObjects\Local\CSI_WDW:{CD2B485C-0390-41E2-B538-FF5C8E355EB6}"
      "\Sessions\1\BaseNamedObjects\Local\CSI_WDW:{ACD6378A-7E55-40E3-8DDE-3252DE7679AF}"
      "\Sessions\1\BaseNamedObjects\Local\CSI_WDW:{24ECD800-909D-4831-A1F2-C2615C7242BB}"
      "\Sessions\1\BaseNamedObjects\{BDD98A3C-B57F-4199-B92A-95A54AA1132E}-D238B3FE"
      "\Sessions\1\BaseNamedObjects\Global\MsoCsi:GC:C:/Users/%OSUSER%/AppData/Local/Microsoft/Office/14.0/OfficeFileCache/FSF-CTBL.FSF"
      "\Sessions\1\BaseNamedObjects\{BDD98A3C-B57F-4199-B92A-95A54AA1132E}-7705B417"
      source
      Created Mutant
      relevance
      3/10
    • Loads rich edit control libraries
      details
      "WINWORD.EXE" loaded module "%COMMONPROGRAMFILES%\microsoft shared\OFFICE14\RICHED20.DLL" at 6A6D0000
      source
      Loaded Module
      ATT&CK ID
      T1179 (Show technique in the MITRE ATT&CK™ matrix)
    • Scanning for window names
      details
      "WINWORD.EXE" searching for class "MSOBALLOON"
      "WINWORD.EXE" searching for class "MsoHelp10"
      "WINWORD.EXE" searching for class "AgentAnim"
      "WINWORD.EXE" searching for class "mspim_wnd32"
      source
      API Call
      relevance
      10/10
      ATT&CK ID
      T1010 (Show technique in the MITRE ATT&CK™ matrix)
  • Installation/Persistance
    • Dropped files
      details
      "~$117d759fe6aff7b76efa28028e6fcd04c56f80e8b5149fe4d3f5f16b00dc5c.docx" has type "data"
      "7027334B.doc" has type "Rich Text Format data unknown version"
      "15D13691.doc" has type "Rich Text Format data unknown version"
      "SOJu0Ii4LXvV1w1v[1].doc" has type "Rich Text Format data unknown version"
      "FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF" has type "data"
      "~WRS{C539E2A1-5DB3-42F1-864F-262C23ACB74F}.tmp" has type "data"
      "FSD-CNRY.FSD" has type "data"
      "E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08" has type "data"
      "94308059B57B3142E455B38A6EB92015" has type "data"
      "{82C5607B-3A44-4F06-9E54-A46E1F1570BD}" has type "data"
      "C8478F237A4D820605B0B79C2D707CE3" has type "data"
      "Tar189E.tmp" has type "data"
      "{9E2490E3-1781-4681-B0C5-D364EF04BFEE}" has type "data"
      "~WRS{5F6AA436-F904-48FC-AAC7-41E934E83686}.tmp" has type "data"
      "FSF-CTBL.FSF" has type "data"
      "FSD-{4C875C34-8500-494B-ADD5-87E4B98316BF}.FSD" has type "data"
      "Cab1893.tmp" has type "Microsoft Cabinet archive data 55153 bytes 1 file"
      source
      Binary File
      relevance
      3/10
    • Opens the MountPointManager (often used to detect additional infection locations)
      details
      "WINWORD.EXE" opened "\Device\MountPointManager"
      source
      API Call
      relevance
      5/10
    • Touches files in the Windows directory
      details
      "WINWORD.EXE" touched file "C:\Windows\AppPatch\sysmain.sdb"
      "WINWORD.EXE" touched file "C:\Windows\Globalization\Sorting\SortDefault.nls"
      "WINWORD.EXE" touched file "C:\Windows\Fonts\StaticCache.dat"
      "WINWORD.EXE" touched file "C:\Windows\Microsoft.NET\Framework\v1.0.3705\clr.dll"
      "WINWORD.EXE" touched file "C:\Windows\Microsoft.NET\Framework\v1.0.3705\mscorwks.dll"
      "WINWORD.EXE" touched file "C:\Windows\Microsoft.NET\Framework\v1.1.4322\clr.dll"
      "WINWORD.EXE" touched file "C:\Windows\Microsoft.NET\Framework\v1.1.4322\mscorwks.dll"
      "WINWORD.EXE" touched file "C:\Windows\Microsoft.NET\Framework\v2.0.50727\clr.dll"
      "WINWORD.EXE" touched file "C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorwks.dll"
      "WINWORD.EXE" touched file "C:\Windows\Microsoft.NET\Framework\v4.0.30319\clr.dll"
      "WINWORD.EXE" touched file "C:\Windows\System32\en-US\user32.dll.mui"
      "WINWORD.EXE" touched file "C:\Windows\System32\en-US\setupapi.dll.mui"
      "WINWORD.EXE" touched file "%LOCALAPPDATA%\Microsoft\Windows\Caches"
      "WINWORD.EXE" touched file "C:\Users\%USERNAME%\AppData\Local\Microsoft\Windows\Caches\cversions.1.db"
      "WINWORD.EXE" touched file "C:\Users\%USERNAME%\AppData\Local\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x000000000000000c.db"
      "WINWORD.EXE" touched file "C:\Windows\System32\rsaenh.dll"
      "WINWORD.EXE" touched file "C:\Windows\System32\en-US\KernelBase.dll.mui"
      "WINWORD.EXE" touched file "C:\Windows\System32\msxml6r.dll"
      "WINWORD.EXE" touched file "C:\Users\%USERNAME%\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{5F6AA436-F904-48FC-AAC7-41E934E83686}.tmp"
      source
      API Call
      relevance
      7/10
  • Network Related
    • Found potential URL in binary/memory
      details
      Heuristic match: "isrg.trustid.ocsp.identrust.com"
      Heuristic match: "GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBRv9GhNQxLSSGKBnMArPUcsHYovpgQUxKexpHsscfrb4UuQdf%2FEFWCFiRACEAoBQUIAAAFThXNqC4Xspwg%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Microsoft-CryptoAPI/6.1Host: isrg.trustid.ocsp.identrust.com"
      Heuristic match: "ocsp.int-x3.letsencrypt.org"
      Heuristic match: "GET /MFMwUTBPME0wSzAJBgUrDgMCGgUABBR%2B5mrncpqz%2FPiiIGRsFqEtYHEIXQQUqEpqYwR93brm0Tm3pkVl7%2FOo7KECEgOt8d0SPIAhLDMt476hQRdB4w%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Microsoft-CryptoAPI/6.1Host: ocsp.int-x3.letsencrypt.org"
      source
      File/Memory
      relevance
      10/10

File Details

All Details:

da117d759fe6aff7b76efa28028e6fcd04c56f80e8b5149fe4d3f5f16b00dc5c.docx

Filename
da117d759fe6aff7b76efa28028e6fcd04c56f80e8b5149fe4d3f5f16b00dc5c.docx
Size
13KiB (13505 bytes)
Type
docx office
Description
Microsoft Word 2007+
Architecture
WINDOWS
SHA256
da117d759fe6aff7b76efa28028e6fcd04c56f80e8b5149fe4d3f5f16b00dc5cCopy SHA256 to clipboard
MD5
cbbc39759f9b12202814e978bd97ee45Copy MD5 to clipboard
SHA1
65eaa9ca036723116fc74e88e62ef248ad205c38Copy SHA1 to clipboard
ssdeep
192:DbX4tGhxFyMtWNkI0mqQTnhr5OGQT1Q5P55yzVbFTB8GoA6aCkWemF:DbXJxFyMtikKLOGQT1Q5DyzvdmQmF Copy ssdeep to clipboard

Resources

Icon
Sample Icon

Visualization

Input File (PortEx)
PE Visualization

Screenshots

Loading content, please wait...

Hybrid Analysis

Tip: Click an analysed process below to view more details.

Analysed 1 process in total.

  • WINWORD.EXE /n "C:\da117d759fe6aff7b76efa28028e6fcd04c56f80e8b5149fe4d3f5f16b00dc5c.docx" (PID: 2696)

Network Analysis

This report was generated with enabled TOR analysis

DNS Requests

Domain Address Registrar Country
ocsp.int-x3.letsencrypt.org
OSINT
213.248.112.154 eNom, Inc.
Organization: Internet Security Research Group
Name Server: A9-67.AKAM.NET
Creation Date: Mon, 07 Jul 2014 19:54:04 GMT
Flag of European Union European Union
isrg.trustid.ocsp.identrust.com
OSINT
88.221.134.90 - Flag of European Union European Union

Contacted Hosts

IP Address Port/Protocol Associated Process Details
188.209.52.116
443
TCP
winword.exe
PID: 2696
svchost.exe
PID: 1000
Flag of Netherlands Netherlands
88.221.134.90
80
TCP
winword.exe
PID: 2696
Flag of European Union European Union
213.248.112.154
80
TCP
winword.exe
PID: 2696
Flag of European Union European Union

Contacted Countries

HTTP Traffic

Endpoint Request URL
88.221.134.90:80 (isrg.trustid.ocsp.identrust.com) GET isrg.trustid.ocsp.identrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRv9GhNQxLSSGKBnMArPUcsHYovpgQUxKexpHsscfrb4UuQdf%2FEFWCFiRACEAoBQUIAAAFThXNq...
213.248.112.154:80 (ocsp.int-x3.letsencrypt.org) GET ocsp.int-x3.letsencrypt.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBR%2B5mrncpqz%2FPiiIGRsFqEtYHEIXQQUqEpqYwR93brm0Tm3pkVl7%2FOo7KECEgOt8d0SPIAhLDMt...

Extracted Strings

All Details:
/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRv9GhNQxLSSGKBnMArPUcsHYovpgQUxKexpHsscfrb4UuQdf%2FEFWCFiRACEAoBQUIAAAFThXNqC4Xspwg%3D
Ansi based on PCAP Processing (PCAP)
/MFMwUTBPME0wSzAJBgUrDgMCGgUABBR%2B5mrncpqz%2FPiiIGRsFqEtYHEIXQQUqEpqYwR93brm0Tm3pkVl7%2FOo7KECEgOt8d0SPIAhLDMt476hQRdB4w%3D%3D
Ansi based on PCAP Processing (PCAP)
/n "C:\da117d759fe6aff7b76efa28028e6fcd04c56f80e8b5149fe4d3f5f16b00dc5c.docx"
Ansi based on Process Commandline (WINWORD.EXE)
?���������
Ansi based on Runtime Data (WINWORD.EXE )
AgentAnim
Unicode based on Runtime Data (WINWORD.EXE )
AutoConfigURL
Unicode based on Runtime Data (WINWORD.EXE )
AutoDetect
Unicode based on Runtime Data (WINWORD.EXE )
CryptSvc
Unicode based on Runtime Data (WINWORD.EXE )
DefaultConnectionSettings
Unicode based on Runtime Data (WINWORD.EXE )
EnableBHO
Unicode based on Runtime Data (WINWORD.EXE )
GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBRv9GhNQxLSSGKBnMArPUcsHYovpgQUxKexpHsscfrb4UuQdf%2FEFWCFiRACEAoBQUIAAAFThXNqC4Xspwg%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Microsoft-CryptoAPI/6.1Host: isrg.trustid.ocsp.identrust.com
Ansi based on PCAP Processing (PCAP)
GET /MFMwUTBPME0wSzAJBgUrDgMCGgUABBR%2B5mrncpqz%2FPiiIGRsFqEtYHEIXQQUqEpqYwR93brm0Tm3pkVl7%2FOo7KECEgOt8d0SPIAhLDMt476hQRdB4w%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Microsoft-CryptoAPI/6.1Host: ocsp.int-x3.letsencrypt.org
Ansi based on PCAP Processing (PCAP)
IntranetName
Unicode based on Runtime Data (WINWORD.EXE )
isrg.trustid.ocsp.identrust.com
Ansi based on PCAP Processing (PCAP)
LanguageList
Unicode based on Runtime Data (WINWORD.EXE )
LastScavenge
Unicode based on Runtime Data (WINWORD.EXE )
LastScavenge_TIMESTAMP
Unicode based on Runtime Data (WINWORD.EXE )
Microsoft Word
Unicode based on Runtime Data (WINWORD.EXE )
Microsoft-CryptoAPI/6.1
Ansi based on PCAP Processing (PCAP)
MSOBALLOON
Unicode based on Runtime Data (WINWORD.EXE )
MsoHelp10
Unicode based on Runtime Data (WINWORD.EXE )
mspim_wnd32
Unicode based on Runtime Data (WINWORD.EXE )
NextUpdate
Unicode based on Runtime Data (WINWORD.EXE )
ocsp.int-x3.letsencrypt.org
Ansi based on PCAP Processing (PCAP)
ProductFiles
Unicode based on Runtime Data (WINWORD.EXE )
ProxyBypass
Unicode based on Runtime Data (WINWORD.EXE )
ProxyEnable
Unicode based on Runtime Data (WINWORD.EXE )
ProxyOverride
Unicode based on Runtime Data (WINWORD.EXE )
ProxyServer
Unicode based on Runtime Data (WINWORD.EXE )
SavedLegacySettings
Unicode based on Runtime Data (WINWORD.EXE )
UNCAsIntranet
Unicode based on Runtime Data (WINWORD.EXE )
Webclient
Unicode based on Runtime Data (WINWORD.EXE )
WinHttpAutoProxySvc
Unicode based on Runtime Data (WINWORD.EXE )
WORDFiles
Unicode based on Runtime Data (WINWORD.EXE )
WpadDecision
Unicode based on Runtime Data (WINWORD.EXE )
WpadDecisionReason
Unicode based on Runtime Data (WINWORD.EXE )
WpadDecisionTime
Unicode based on Runtime Data (WINWORD.EXE )
WpadLastNetwork
Unicode based on Runtime Data (WINWORD.EXE )
WpadNetworkName
Unicode based on Runtime Data (WINWORD.EXE )
{09477111-DE61-43CD-A5AA-D9F7B489301F}
Unicode based on Runtime Data (WINWORD.EXE )
{7BD29E01-76C1-11CF-9DD0-00A0C9034933} {000214E6-0000-0000-C000-000000000046} 0xFFFF
Unicode based on Runtime Data (WINWORD.EXE )
/n "C:\da117d759fe6aff7b76efa28028e6fcd04c56f80e8b5149fe4d3f5f16b00dc5c.docx"
Ansi based on Process Commandline (WINWORD.EXE)
DefaultConnectionSettings
Unicode based on Runtime Data (WINWORD.EXE )
isrg.trustid.ocsp.identrust.com
Ansi based on PCAP Processing (PCAP)
mspim_wnd32
Unicode based on Runtime Data (WINWORD.EXE )
ocsp.int-x3.letsencrypt.org
Ansi based on PCAP Processing (PCAP)
WinHttpAutoProxySvc
Unicode based on Runtime Data (WINWORD.EXE )
{09477111-DE61-43CD-A5AA-D9F7B489301F}
Unicode based on Runtime Data (WINWORD.EXE )
{7BD29E01-76C1-11CF-9DD0-00A0C9034933} {000214E6-0000-0000-C000-000000000046} 0xFFFF
Unicode based on Runtime Data (WINWORD.EXE )
/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRv9GhNQxLSSGKBnMArPUcsHYovpgQUxKexpHsscfrb4UuQdf%2FEFWCFiRACEAoBQUIAAAFThXNqC4Xspwg%3D
Ansi based on PCAP Processing (PCAP)
/MFMwUTBPME0wSzAJBgUrDgMCGgUABBR%2B5mrncpqz%2FPiiIGRsFqEtYHEIXQQUqEpqYwR93brm0Tm3pkVl7%2FOo7KECEgOt8d0SPIAhLDMt476hQRdB4w%3D%3D
Ansi based on PCAP Processing (PCAP)
GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBRv9GhNQxLSSGKBnMArPUcsHYovpgQUxKexpHsscfrb4UuQdf%2FEFWCFiRACEAoBQUIAAAFThXNqC4Xspwg%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Microsoft-CryptoAPI/6.1Host: isrg.trustid.ocsp.identrust.com
Ansi based on PCAP Processing (PCAP)
GET /MFMwUTBPME0wSzAJBgUrDgMCGgUABBR%2B5mrncpqz%2FPiiIGRsFqEtYHEIXQQUqEpqYwR93brm0Tm3pkVl7%2FOo7KECEgOt8d0SPIAhLDMt476hQRdB4w%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Microsoft-CryptoAPI/6.1Host: ocsp.int-x3.letsencrypt.org
Ansi based on PCAP Processing (PCAP)
isrg.trustid.ocsp.identrust.com
Ansi based on PCAP Processing (PCAP)
Microsoft-CryptoAPI/6.1
Ansi based on PCAP Processing (PCAP)
ocsp.int-x3.letsencrypt.org
Ansi based on PCAP Processing (PCAP)
/n "C:\da117d759fe6aff7b76efa28028e6fcd04c56f80e8b5149fe4d3f5f16b00dc5c.docx"
Ansi based on Process Commandline (WINWORD.EXE)
?���������
Ansi based on Runtime Data (WINWORD.EXE )
AgentAnim
Unicode based on Runtime Data (WINWORD.EXE )
AutoConfigURL
Unicode based on Runtime Data (WINWORD.EXE )
AutoDetect
Unicode based on Runtime Data (WINWORD.EXE )
CryptSvc
Unicode based on Runtime Data (WINWORD.EXE )
DefaultConnectionSettings
Unicode based on Runtime Data (WINWORD.EXE )
EnableBHO
Unicode based on Runtime Data (WINWORD.EXE )
IntranetName
Unicode based on Runtime Data (WINWORD.EXE )
LanguageList
Unicode based on Runtime Data (WINWORD.EXE )
LastScavenge
Unicode based on Runtime Data (WINWORD.EXE )
LastScavenge_TIMESTAMP
Unicode based on Runtime Data (WINWORD.EXE )
Microsoft Word
Unicode based on Runtime Data (WINWORD.EXE )
MSOBALLOON
Unicode based on Runtime Data (WINWORD.EXE )
MsoHelp10
Unicode based on Runtime Data (WINWORD.EXE )
mspim_wnd32
Unicode based on Runtime Data (WINWORD.EXE )
NextUpdate
Unicode based on Runtime Data (WINWORD.EXE )
ProductFiles
Unicode based on Runtime Data (WINWORD.EXE )
ProxyBypass
Unicode based on Runtime Data (WINWORD.EXE )
ProxyEnable
Unicode based on Runtime Data (WINWORD.EXE )
ProxyOverride
Unicode based on Runtime Data (WINWORD.EXE )
ProxyServer
Unicode based on Runtime Data (WINWORD.EXE )
SavedLegacySettings
Unicode based on Runtime Data (WINWORD.EXE )
UNCAsIntranet
Unicode based on Runtime Data (WINWORD.EXE )
Webclient
Unicode based on Runtime Data (WINWORD.EXE )
WinHttpAutoProxySvc
Unicode based on Runtime Data (WINWORD.EXE )
WORDFiles
Unicode based on Runtime Data (WINWORD.EXE )
WpadDecision
Unicode based on Runtime Data (WINWORD.EXE )
WpadDecisionReason
Unicode based on Runtime Data (WINWORD.EXE )
WpadDecisionTime
Unicode based on Runtime Data (WINWORD.EXE )
WpadLastNetwork
Unicode based on Runtime Data (WINWORD.EXE )
WpadNetworkName
Unicode based on Runtime Data (WINWORD.EXE )
{09477111-DE61-43CD-A5AA-D9F7B489301F}
Unicode based on Runtime Data (WINWORD.EXE )
{7BD29E01-76C1-11CF-9DD0-00A0C9034933} {000214E6-0000-0000-C000-000000000046} 0xFFFF
Unicode based on Runtime Data (WINWORD.EXE )

Extracted Files

Displaying 18 extracted file(s). The remaining 3 file(s) are available in the full version and XML/JSON reports.

  • Informative Selection 2

    • SOJu0Ii4LXvV1w1v[1].doc
      Size
      52KiB (53743 bytes)
      Type
      rtf
      Description
      Rich Text Format data, unknown version
      Runtime Process
      WINWORD.EXE (PID: 2696)
      MD5
      e12c4f1a219c8b3d83f3de265b947cf1 Copy MD5 to clipboard
      SHA1
      d1ef8ee6e9a240288f80404cc0ae506f9ef48c6b Copy SHA1 to clipboard
      SHA256
      60dfa243d65b00ed50be699e97121e52c096cb23178c88a022158634ecc2a1e9 Copy SHA256 to clipboard
    • 15D13691.doc
      Size
      52KiB (53743 bytes)
      Type
      rtf
      Description
      Rich Text Format data, unknown version
      Runtime Process
      WINWORD.EXE (PID: 2696)
      MD5
      e12c4f1a219c8b3d83f3de265b947cf1 Copy MD5 to clipboard
      SHA1
      d1ef8ee6e9a240288f80404cc0ae506f9ef48c6b Copy SHA1 to clipboard
      SHA256
      60dfa243d65b00ed50be699e97121e52c096cb23178c88a022158634ecc2a1e9 Copy SHA256 to clipboard

Notifications

  • Runtime

  • Added comment to Virus Total report
  • Network whitenoise filtering was applied
  • Not all sources for indicator ID "api-55" are available in the report
  • Not all sources for indicator ID "binary-0" are available in the report
  • Not all sources for indicator ID "mutant-0" are available in the report

Community