Summary | ZeroBOX

wef.wbk

doc RTF File
Category Machine Started Completed
FILE s1_win7_x6401 Nov. 9, 2021, 6:33 p.m. Nov. 9, 2021, 6:40 p.m.
Size 22.1KB
Type Rich Text Format data, version 1, unknown character set
MD5 70c1a705af28923926d48b9181d383ad
SHA256 6f71e1c2e52e6eaa0c0fe2e5110f80e32709388b387802bcc7f30643100bc2f9
CRC32 7A961CC9
ssdeep 384:K9XRj1NyLvQlXwSiccVBYHxw691EET0L+lpY48ve8Msca:K9XhjyDQlXwMx1hrrmM0
Yara
  • Rich_Text_Format_Zero - Rich Text Format Signature Zero

IP Address Status Action
121.254.136.57 Active Moloch
164.124.101.2 Active Moloch
3.112.244.67 Active Moloch
51.79.99.124 Active Moloch

Time & API Arguments Status Return Repeated

__exception__

stacktrace:
RpcRaiseException+0x42 I_RpcExceptionFilter-0x12 rpcrt4+0x2374b @ 0x76af374b
DllDebugObjectRPCHook+0xb6 HACCEL_UserFree-0x57 ole32+0x13f725 @ 0x7691f725
NdrPointerFree+0x16a IUnknown_Release_Proxy-0x5a rpcrt4+0x3414b @ 0x76b0414b
WdtpInterfacePointer_UserUnmarshal+0x166b DllDebugObjectRPCHook-0x2d8d ole32+0x13c8e2 @ 0x7691c8e2
CoRegisterMessageFilter+0x32b4 ObjectStublessClient5-0x1db5 ole32+0x398ad @ 0x768198ad
OleCreateEmbeddingHelper+0x2a1 CreateFileMoniker-0x17de ole32+0x81414 @ 0x76861414
ObjectStublessClient31+0x6af8 STGMEDIUM_UserUnmarshal-0x22bb6 ole32+0x97b68 @ 0x76877b68
wdGetApplicationObject+0x131f9 wdCommandDispatch-0x4c476 wwlib+0x394dff @ 0x727b4dff
DllCanUnloadNow+0xbaf5e wwlib+0x9692a0 @ 0x72d892a0
DllCanUnloadNow+0x339ef0 wwlib+0xbe8232 @ 0x73008232
DllCanUnloadNow+0x54e0c9 wwlib+0xdfc40b @ 0x7321c40b
DllCanUnloadNow+0x55865b wwlib+0xe0699d @ 0x7322699d
DllCanUnloadNow+0x33bec4 wwlib+0xbea206 @ 0x7300a206
DllCanUnloadNow+0xbd684 wwlib+0x96b9c6 @ 0x72d8b9c6
DllCanUnloadNow+0x215f8 wwlib+0x8cf93a @ 0x72cef93a
DllGetClassObject+0x2d9ac DllGetLCID-0x22ded4 wwlib+0x325f6 @ 0x724525f6
DllGetClassObject+0x5b213 DllGetLCID-0x20066d wwlib+0x5fe5d @ 0x7247fe5d
DllGetClassObject+0x5a904 DllGetLCID-0x200f7c wwlib+0x5f54e @ 0x7247f54e
DllCanUnloadNow+0x3200d6 wwlib+0xbce418 @ 0x72fee418
DllCanUnloadNow+0x2d334c wwlib+0xb8168e @ 0x72fa168e
DllGetClassObject+0x157e7 DllGetLCID-0x246099 wwlib+0x1a431 @ 0x7243a431
DllGetClassObject+0x3b23 DllGetLCID-0x257d5d wwlib+0x876d @ 0x7242876d
FMain+0x482 DllGetClassObject-0x266 wwlib+0x49e4 @ 0x724249e4
wdCommandDispatch-0x2ed winword+0x15d7 @ 0x2f4315d7
wdCommandDispatch-0x367 winword+0x155d @ 0x2f43155d
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x766e33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0x800706be
exception.offset: 46887
exception.address: 0x760cb727
registers.esp: 3493428
registers.edi: 1988295184
registers.eax: 3493428
registers.ebp: 3493508
registers.edx: 0
registers.ebx: 7935228
registers.esi: 2147944126
registers.ecx: 4204326412
1 0 0

__exception__

stacktrace:
RpcRaiseException+0x42 I_RpcExceptionFilter-0x12 rpcrt4+0x2374b @ 0x76af374b
DllDebugObjectRPCHook+0xb6 HACCEL_UserFree-0x57 ole32+0x13f725 @ 0x7691f725
NdrPointerFree+0x16a IUnknown_Release_Proxy-0x5a rpcrt4+0x3414b @ 0x76b0414b
WdtpInterfacePointer_UserUnmarshal+0x166b DllDebugObjectRPCHook-0x2d8d ole32+0x13c8e2 @ 0x7691c8e2
CoRegisterMessageFilter+0x32b4 ObjectStublessClient5-0x1db5 ole32+0x398ad @ 0x768198ad
CoRegisterMessageFilter+0x5048 ObjectStublessClient5-0x21 ole32+0x3b641 @ 0x7681b641
CoRegisterMessageFilter+0x4ff4 ObjectStublessClient5-0x75 ole32+0x3b5ed @ 0x7681b5ed
CoRegisterMessageFilter+0x4b79 ObjectStublessClient5-0x4f0 ole32+0x3b172 @ 0x7681b172
CoRegisterMessageFilter+0x4075 ObjectStublessClient5-0xff4 ole32+0x3a66e @ 0x7681a66e
ObjectStublessClient31+0x2961c STGMEDIUM_UserUnmarshal-0x92 ole32+0xba68c @ 0x7689a68c
ObjectStublessClient31+0x6776 STGMEDIUM_UserUnmarshal-0x22f38 ole32+0x977e6 @ 0x768777e6
OleCreateEmbeddingHelper+0x344 CreateFileMoniker-0x173b ole32+0x814b7 @ 0x768614b7
ObjectStublessClient31+0x6af8 STGMEDIUM_UserUnmarshal-0x22bb6 ole32+0x97b68 @ 0x76877b68
wdGetApplicationObject+0x131f9 wdCommandDispatch-0x4c476 wwlib+0x394dff @ 0x727b4dff
DllCanUnloadNow+0xbaf5e wwlib+0x9692a0 @ 0x72d892a0
DllCanUnloadNow+0x339ef0 wwlib+0xbe8232 @ 0x73008232
DllCanUnloadNow+0x54e0c9 wwlib+0xdfc40b @ 0x7321c40b
DllCanUnloadNow+0x55865b wwlib+0xe0699d @ 0x7322699d
DllCanUnloadNow+0x33bec4 wwlib+0xbea206 @ 0x7300a206
DllCanUnloadNow+0xbd684 wwlib+0x96b9c6 @ 0x72d8b9c6
DllCanUnloadNow+0x215f8 wwlib+0x8cf93a @ 0x72cef93a
DllGetClassObject+0x2d9ac DllGetLCID-0x22ded4 wwlib+0x325f6 @ 0x724525f6
DllGetClassObject+0x5b213 DllGetLCID-0x20066d wwlib+0x5fe5d @ 0x7247fe5d
DllGetClassObject+0x5a904 DllGetLCID-0x200f7c wwlib+0x5f54e @ 0x7247f54e
DllCanUnloadNow+0x3200d6 wwlib+0xbce418 @ 0x72fee418
DllCanUnloadNow+0x2d334c wwlib+0xb8168e @ 0x72fa168e
DllGetClassObject+0x157e7 DllGetLCID-0x246099 wwlib+0x1a431 @ 0x7243a431
DllGetClassObject+0x3b23 DllGetLCID-0x257d5d wwlib+0x876d @ 0x7242876d
FMain+0x482 DllGetClassObject-0x266 wwlib+0x49e4 @ 0x724249e4
wdCommandDispatch-0x2ed winword+0x15d7 @ 0x2f4315d7
wdCommandDispatch-0x367 winword+0x155d @ 0x2f43155d
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x766e33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0x800706ba
exception.offset: 46887
exception.address: 0x760cb727
registers.esp: 3493120
registers.edi: 1988295184
registers.eax: 3493120
registers.ebp: 3493200
registers.edx: 0
registers.ebx: 7934724
registers.esi: 2147944122
registers.ecx: 4204326412
1 0 0
suspicious_features Connection to IP address suspicious_request GET http://3.112.244.67/1114/vbc.exe
request GET http://3.112.244.67/1114/vbc.exe
request GET http://apps.identrust.com/roots/dstrootcax3.p7c
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2768
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x65001000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2768
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6a821000
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2768
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x058c0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2768
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x058c0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2768
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x058d0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtAllocateVirtualMemory

process_identifier: 2768
region_size: 4096
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x058e0000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2768
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6a4a1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2768
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x6a4a4000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2768
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x507c1000
process_handle: 0xffffffff
1 0 0
Application Crash Process WINWORD.EXE with pid 2768 crashed
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
RpcRaiseException+0x42 I_RpcExceptionFilter-0x12 rpcrt4+0x2374b @ 0x76af374b
DllDebugObjectRPCHook+0xb6 HACCEL_UserFree-0x57 ole32+0x13f725 @ 0x7691f725
NdrPointerFree+0x16a IUnknown_Release_Proxy-0x5a rpcrt4+0x3414b @ 0x76b0414b
WdtpInterfacePointer_UserUnmarshal+0x166b DllDebugObjectRPCHook-0x2d8d ole32+0x13c8e2 @ 0x7691c8e2
CoRegisterMessageFilter+0x32b4 ObjectStublessClient5-0x1db5 ole32+0x398ad @ 0x768198ad
OleCreateEmbeddingHelper+0x2a1 CreateFileMoniker-0x17de ole32+0x81414 @ 0x76861414
ObjectStublessClient31+0x6af8 STGMEDIUM_UserUnmarshal-0x22bb6 ole32+0x97b68 @ 0x76877b68
wdGetApplicationObject+0x131f9 wdCommandDispatch-0x4c476 wwlib+0x394dff @ 0x727b4dff
DllCanUnloadNow+0xbaf5e wwlib+0x9692a0 @ 0x72d892a0
DllCanUnloadNow+0x339ef0 wwlib+0xbe8232 @ 0x73008232
DllCanUnloadNow+0x54e0c9 wwlib+0xdfc40b @ 0x7321c40b
DllCanUnloadNow+0x55865b wwlib+0xe0699d @ 0x7322699d
DllCanUnloadNow+0x33bec4 wwlib+0xbea206 @ 0x7300a206
DllCanUnloadNow+0xbd684 wwlib+0x96b9c6 @ 0x72d8b9c6
DllCanUnloadNow+0x215f8 wwlib+0x8cf93a @ 0x72cef93a
DllGetClassObject+0x2d9ac DllGetLCID-0x22ded4 wwlib+0x325f6 @ 0x724525f6
DllGetClassObject+0x5b213 DllGetLCID-0x20066d wwlib+0x5fe5d @ 0x7247fe5d
DllGetClassObject+0x5a904 DllGetLCID-0x200f7c wwlib+0x5f54e @ 0x7247f54e
DllCanUnloadNow+0x3200d6 wwlib+0xbce418 @ 0x72fee418
DllCanUnloadNow+0x2d334c wwlib+0xb8168e @ 0x72fa168e
DllGetClassObject+0x157e7 DllGetLCID-0x246099 wwlib+0x1a431 @ 0x7243a431
DllGetClassObject+0x3b23 DllGetLCID-0x257d5d wwlib+0x876d @ 0x7242876d
FMain+0x482 DllGetClassObject-0x266 wwlib+0x49e4 @ 0x724249e4
wdCommandDispatch-0x2ed winword+0x15d7 @ 0x2f4315d7
wdCommandDispatch-0x367 winword+0x155d @ 0x2f43155d
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x766e33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0x800706be
exception.offset: 46887
exception.address: 0x760cb727
registers.esp: 3493428
registers.edi: 1988295184
registers.eax: 3493428
registers.ebp: 3493508
registers.edx: 0
registers.ebx: 7935228
registers.esi: 2147944126
registers.ecx: 4204326412
1 0 0

__exception__

stacktrace:
RpcRaiseException+0x42 I_RpcExceptionFilter-0x12 rpcrt4+0x2374b @ 0x76af374b
DllDebugObjectRPCHook+0xb6 HACCEL_UserFree-0x57 ole32+0x13f725 @ 0x7691f725
NdrPointerFree+0x16a IUnknown_Release_Proxy-0x5a rpcrt4+0x3414b @ 0x76b0414b
WdtpInterfacePointer_UserUnmarshal+0x166b DllDebugObjectRPCHook-0x2d8d ole32+0x13c8e2 @ 0x7691c8e2
CoRegisterMessageFilter+0x32b4 ObjectStublessClient5-0x1db5 ole32+0x398ad @ 0x768198ad
CoRegisterMessageFilter+0x5048 ObjectStublessClient5-0x21 ole32+0x3b641 @ 0x7681b641
CoRegisterMessageFilter+0x4ff4 ObjectStublessClient5-0x75 ole32+0x3b5ed @ 0x7681b5ed
CoRegisterMessageFilter+0x4b79 ObjectStublessClient5-0x4f0 ole32+0x3b172 @ 0x7681b172
CoRegisterMessageFilter+0x4075 ObjectStublessClient5-0xff4 ole32+0x3a66e @ 0x7681a66e
ObjectStublessClient31+0x2961c STGMEDIUM_UserUnmarshal-0x92 ole32+0xba68c @ 0x7689a68c
ObjectStublessClient31+0x6776 STGMEDIUM_UserUnmarshal-0x22f38 ole32+0x977e6 @ 0x768777e6
OleCreateEmbeddingHelper+0x344 CreateFileMoniker-0x173b ole32+0x814b7 @ 0x768614b7
ObjectStublessClient31+0x6af8 STGMEDIUM_UserUnmarshal-0x22bb6 ole32+0x97b68 @ 0x76877b68
wdGetApplicationObject+0x131f9 wdCommandDispatch-0x4c476 wwlib+0x394dff @ 0x727b4dff
DllCanUnloadNow+0xbaf5e wwlib+0x9692a0 @ 0x72d892a0
DllCanUnloadNow+0x339ef0 wwlib+0xbe8232 @ 0x73008232
DllCanUnloadNow+0x54e0c9 wwlib+0xdfc40b @ 0x7321c40b
DllCanUnloadNow+0x55865b wwlib+0xe0699d @ 0x7322699d
DllCanUnloadNow+0x33bec4 wwlib+0xbea206 @ 0x7300a206
DllCanUnloadNow+0xbd684 wwlib+0x96b9c6 @ 0x72d8b9c6
DllCanUnloadNow+0x215f8 wwlib+0x8cf93a @ 0x72cef93a
DllGetClassObject+0x2d9ac DllGetLCID-0x22ded4 wwlib+0x325f6 @ 0x724525f6
DllGetClassObject+0x5b213 DllGetLCID-0x20066d wwlib+0x5fe5d @ 0x7247fe5d
DllGetClassObject+0x5a904 DllGetLCID-0x200f7c wwlib+0x5f54e @ 0x7247f54e
DllCanUnloadNow+0x3200d6 wwlib+0xbce418 @ 0x72fee418
DllCanUnloadNow+0x2d334c wwlib+0xb8168e @ 0x72fa168e
DllGetClassObject+0x157e7 DllGetLCID-0x246099 wwlib+0x1a431 @ 0x7243a431
DllGetClassObject+0x3b23 DllGetLCID-0x257d5d wwlib+0x876d @ 0x7242876d
FMain+0x482 DllGetClassObject-0x266 wwlib+0x49e4 @ 0x724249e4
wdCommandDispatch-0x2ed winword+0x15d7 @ 0x2f4315d7
wdCommandDispatch-0x367 winword+0x155d @ 0x2f43155d
BaseThreadInitThunk+0x12 VerifyConsoleIoHandle-0xb3 kernel32+0x133ca @ 0x766e33ca
RtlInitializeExceptionChain+0x63 RtlAllocateActivationContextStack-0xa1 ntdll+0x39ed2 @ 0x77679ed2
RtlInitializeExceptionChain+0x36 RtlAllocateActivationContextStack-0xce ntdll+0x39ea5 @ 0x77679ea5

exception.instruction_r: c9 c2 10 00 cc cc cc cc cc 8b ff 55 8b ec 56 8b
exception.symbol: RaiseException+0x58 CloseHandle-0x9 kernelbase+0xb727
exception.instruction: leave
exception.module: KERNELBASE.dll
exception.exception_code: 0x800706ba
exception.offset: 46887
exception.address: 0x760cb727
registers.esp: 3493120
registers.edi: 1988295184
registers.eax: 3493120
registers.ebp: 3493200
registers.edx: 0
registers.ebx: 7934724
registers.esi: 2147944122
registers.ecx: 4204326412
1 0 0
Time & API Arguments Status Return Repeated

NtCreateFile

create_disposition: 5 (FILE_OVERWRITE_IF)
file_handle: 0x000003ec
filepath: C:\Users\test22\AppData\Local\Temp\~$wef.wbk
desired_access: 0x40100080 (FILE_READ_ATTRIBUTES|SYNCHRONIZE|GENERIC_WRITE)
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: \??\C:\Users\test22\AppData\Local\Temp\~$wef.wbk
create_options: 4194400 (FILE_NON_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT)
status_info: 2 (FILE_CREATED)
share_access: 0 ()
1 0 0
filetype_details Rich Text Format data, version 1, unknown character set filename wef.wbk
host 3.112.244.67
Lionic Trojan.Multi.Generic.4!c
DrWeb Exploit.ShellCode.69
MicroWorld-eScan Exploit.RTF-ObfsStrm.Gen
Sangfor Malware.Generic-RTF.Save.c5a892ae
K7AntiVirus Trojan ( 0057b3a91 )
K7GW Trojan ( 0057b3a91 )
Arcabit Exploit.RTF-ObfsStrm.Gen
Cyren RTF/CVE-2017-11882.R.gen!Camelot
Symantec Bloodhound.RTF.20
ESET-NOD32 multiple detections
Avast RTF:Obfuscated-gen [Trj]
Kaspersky UDS:DangerousObject.Multi.Generic
BitDefender Exploit.RTF-ObfsStrm.Gen
NANO-Antivirus Exploit.Rtf.Heuristic-rtf.dinbqn
Ad-Aware Exploit.RTF-ObfsStrm.Gen
TACHYON Trojan-Exploit/RTF.CVE-2017-11882
Sophos Troj/RtfExp-EQ
TrendMicro HEUR_RTFMALFORM
FireEye Exploit.RTF-ObfsStrm.Gen
Emsisoft Exploit.RTF-ObfsStrm.Gen (B)
Avira HEUR/Rtf.Malformed
Antiy-AVL Trojan/Generic.ASDOH.22A
ZoneAlarm HEUR:Exploit.MSOffice.Generic
GData Exploit.RTF-ObfsStrm.Gen
Cynet Malicious (score: 99)
AhnLab-V3 RTF/Malform-A.Gen
McAfee RTFObfustream.e!70C1A705AF28
MAX malware (ai score=89)
Zoner Probably Heur.RTFBadVersion
Tencent Office.Exploit.Generic.Ahen
Ikarus Exploit.CVE-2017-11882
Fortinet MSOffice/CVE_2017_11882.B!exploit
AVG RTF:Obfuscated-gen [Trj]