Summary | ZeroBOX

Invoice-report-23.docx

Word 2007 file format(docx)
Category Machine Started Completed
FILE s1_win7_x6403_us Sept. 16, 2021, 10 a.m. Sept. 16, 2021, 10:02 a.m.
Size 52.1KB
Type Microsoft OOXML
MD5 42761e128d32aea9f3e2c0473c25a32b
SHA256 dd23018c0d74039efd804b7d6e9a3c613defa457468d3745d514eac249d49ca4
CRC32 0871E2ED
ssdeep 768:7Rgb/iFmhxEr85RGShdXbmgo+nWIgkKl4j3d80JsSPLWLlDw+8t++Rmm:Fsgca8+smgo+twuj3dfJ5o8tF
Yara
  • docx - Word 2007 file format detection

Name Response Post-Analysis Lookup
wiyolo.com
IP Address Status Action
164.124.101.2 Active Moloch

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0
registry HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Office\15.0\Registration\{91150000-0011-0000-0000-0000000FF1CE}\DigitalProductID
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2404
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6a176000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2404
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6a074000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2404
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6a031000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2404
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x69fa2000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2404
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x69c31000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2692
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x00ba1000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2692
region_size: 40960
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x003e0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2692
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6fb2f000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2692
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x35180000
allocation_type: 12288 (MEM_COMMIT|MEM_RESERVE)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2692
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75180000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2692
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 65536
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x35180000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2692
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75179000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2692
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 65536
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x35180000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2692
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75181000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2692
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75187000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2692
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6af44000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2692
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x738ba000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2692
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6a176000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2692
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x69fa2000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2692
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x69541000
process_handle: 0xffffffff
1 0 0
file C:\Users\test22\AppData\Local\Temp\~$voice-report-23.docx
Time & API Arguments Status Return Repeated

NtCreateFile

create_disposition: 5 (FILE_OVERWRITE_IF)
file_handle: 0x00000488
filepath: C:\Users\test22\AppData\Local\Temp\~$voice-report-23.docx
desired_access: 0x40100080 (FILE_READ_ATTRIBUTES|SYNCHRONIZE|GENERIC_WRITE)
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: \??\C:\Users\test22\AppData\Local\Temp\~$voice-report-23.docx
create_options: 4194400 (FILE_NON_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT)
status_info: 2 (FILE_CREATED)
share_access: 0 ()
1 0 0
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2404
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 1
length: 4096
protection: 32 (PAGE_EXECUTE_READ)
base_address: 0x7ef50000
process_handle: 0xffffffff
1 0 0
parent_process winword.exe martian_process C:\Program Files (x86)\Microsoft Office\Office15\MSOSYNC.EXE
cmdline C:\Program Files (x86)\Microsoft Office\Office15\MSOSYNC.EXE
mutex Local\Microsoft_Office_15Csi_CTTxnTableLock:{9046B430-E97C-4C02-A218-69D6233A3454}:TID{D0A49606-3BBC-45A0-A810-6E7F9720E394}
mutex Local\Microsoft_Office_15CSI_WDW:{B2F6AF9D-D3A3-4D9A-A9BF-A27BD0A804BC}
mutex Local\Microsoft_Office_15Csi_CTTxnTableLock:{9046B430-E97C-4C02-A218-69D6233A3454}:TID{16284F64-D1CB-4015-ACFA-9E3944D6B6DD}
mutex Local\Microsoft_Office_15Csi_CTTxnTableLock:{9046B430-E97C-4C02-A218-69D6233A3454}:TID{F85AF7C9-265C-434D-ACAE-E783DFE17053}
mutex Global\Microsoft_Office_15Csi:GC:C:/Users/test22/AppData/Local/Microsoft/Office/15.0/OfficeFileCache/LocalCacheFileEditManager/FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
mutex Local\Microsoft_Office_15CSI_OMTX:{D79B8501-73B4-4B50-ACF8-2AFFFEB3C47C}
mutex Local\Microsoft_Office_15Csi_TableRuntimeBucketsLock:{BE24534C-81D4-41F4-93A0-9CC944D8725C}
mutex Local\Microsoft_Office_15CSI_WDW:{BE24534C-81D4-41F4-93A0-9CC944D8725C}
mutex Local\Microsoft_Office_15Csi_CTTxnTableLock:{9046B430-E97C-4C02-A218-69D6233A3454}:TID{4A6D6FD4-6B5E-4B91-B650-BF1EC9669D4C}
mutex Local\Microsoft_Office_15CSI_OMTX:{E865544F-3354-436A-ACD4-CDC9D06B8789}
mutex Local\Microsoft_Office_15Csi_CTTxnTableLock:{9046B430-E97C-4C02-A218-69D6233A3454}:TID{5585BD79-2A2B-4359-8F93-404ED6147369}
mutex Local\Microsoft_Office_15Csi_CTTxnTableLock:{9046B430-E97C-4C02-A218-69D6233A3454}:TID{BFCEF68A-3F40-481B-B237-FD551CEC6C8A}
mutex Local\Microsoft_Office_15CSI_OMTX:{041050CA-F12C-454E-9851-31526F001E56}
mutex Local\Microsoft_Office_15CSI_WDW:{D79B8501-73B4-4B50-ACF8-2AFFFEB3C47C}
mutex Local\Microsoft_Office_15CSI_WDW:{66EDDDB9-C3A8-4221-A135-EB7953B4FB53}
mutex Local\Microsoft_Office_15CSI_WDW:{041050CA-F12C-454E-9851-31526F001E56}
mutex Local\Microsoft_Office_15CSI_WDW:{C85F76E5-53DE-4451-BC07-E3244731227C}
mutex Local\Microsoft_Office_15CSI_WDW:{F34DEC1A-F188-4486-B626-252982E52CDB}
mutex Local\Microsoft_Office_15CSI_WDW:{86F07401-DDAD-46FE-8EB4-576BD53784EA}
mutex Local\Microsoft_Office_15Csi_CTTxnTableLock:{9046B430-E97C-4C02-A218-69D6233A3454}:TID{48DEC616-56E4-4F30-8030-C51111C102A9}
mutex Local\Microsoft_Office_15Csi_CTTxnTableLock:{9046B430-E97C-4C02-A218-69D6233A3454}:TID{7A3B9BC8-95AF-498B-A58A-AB578703D72A}
mutex Local\Microsoft_Office_15CSI_WDW:{E865544F-3354-436A-ACD4-CDC9D06B8789}
udp {u'src': u'192.168.56.103', u'dst': u'239.255.255.250', u'offset': 12109, u'time': 4.002732038497925, u'dport': 3702, u'sport': 49152}
udp {u'src': u'192.168.56.103', u'dst': u'239.255.255.250', u'offset': 20489, u'time': 4.61870813369751, u'dport': 1900, u'sport': 49168}
udp {u'src': u'192.168.56.103', u'dst': u'239.255.255.250', u'offset': 26607, u'time': 4.4670960903167725, u'dport': 3702, u'sport': 49170}
udp {u'src': u'192.168.56.103', u'dst': u'239.255.255.250', u'offset': 29463, u'time': 4.625537157058716, u'dport': 3702, u'sport': 49172}
udp {u'src': u'192.168.56.103', u'dst': u'239.255.255.250', u'offset': 32191, u'time': 8.724152088165283, u'dport': 3702, u'sport': 53894}
Lionic Hacktool.MSOffice.CVE-2021-40444.3!c
ClamAV Doc.Exploit.CVE_2021_40444-9891528-0
CAT-QuickHeal OLE.CVE-2021-40444.44117
Arcabit Exploit.CVE-2021-40444.Gen.1
Symantec Trojan.Gen.NPE
ESET-NOD32 DOC/TrojanDownloader.Agent.DHY
Avast XML:CVE-2021-40444-A [Expl]
Cynet Malicious (score: 99)
Kaspersky HEUR:Exploit.MSOffice.CVE-2021-40444.a
BitDefender Trojan.GenericKD.46974807
NANO-Antivirus Exploit.Xml.CVE-2017-0199.equmby
ViRobot DOC.Z.CVE-2021-4044.53311
MicroWorld-eScan Trojan.GenericKD.46974807
Tencent Win32.Trojan-downloader.Agent.Pbfi
Ad-Aware Trojan.GenericKD.46974807
DrWeb Exploit.CVE-2021-40444.1
McAfee-GW-Edition Exploit-CVE2021-40444.a
FireEye Trojan.GenericKD.46974807
Emsisoft Exploit.CVE-2021-40444.Gen.1 (B)
Ikarus Exploit.CVE-2021-40444
GData Script.Exploit.CVE-2021-40444.A
Avira W97M/Dldr.Agent.iydmn
MAX malware (ai score=80)
Microsoft TrojanDownloader:O97M/Donoff.SA!Gen
ZoneAlarm HEUR:Exploit.MSOffice.CVE-2021-40444.a
McAfee Exploit-CVE2021-40444.a
Rising Exploit.CVE-2021-40444!1.D97D (CLASSIC)
Fortinet MSOffice/CVE_2021_40444.1!exploit
AVG XML:CVE-2021-40444-A [Expl]