CER.docx
This report is generated from a file or URL submitted to this webservice on October 24th 2015 17:24:52 (UTC)
Report generated by
Falcon Sandbox v2.52 © Hybrid Analysis
Attention: this analysis ran with the legacy Usermode Monitor. It is highly recommended to use the Kernelmode Monitor.
Indicators
Not all malicious and suspicious indicators are displayed. Get your own cloud service or the full version to view all details.
-
Malicious Indicators 1
-
Exploit/Shellcode
-
Possible document exploit detected
- details
- Document spawned a new process although no macro was present in the original file
- source
- Indicator Combinations
- relevance
- 10/10
-
Possible document exploit detected
-
Suspicious Indicators 3
-
Network Related
-
Found potential URL in binary/memory
- details
- ">;SL-.al"
- source
- File/Memory
- relevance
- 2/10
-
Found potential URL in binary/memory
-
Unusual Characteristics
-
Contains embedded string with suspicious keywords
- details
- Found suspicious keyword "Chr" which indicates: "May attempt to obfuscate specific strings"
- source
- File/Memory
- relevance
- 10/10
-
Installs hooks/patches the running process
- details
-
"WINWORD.EXE" wrote bytes "E9231959F1" to virtual address "0x77483D01" ("SetUnhandledExceptionFilter@kernel32.dll")
"WINWORD.EXE" wrote bytes "E9AFBB13" to virtual address "0x2FB71634" (part of module "WINWORD.EXE")
"WINWORD.EXE" wrote bytes "E9231974F1" to virtual address "0x77483D01" ("SetUnhandledExceptionFilter@kernel32.dll")
"WINWORD.EXE" wrote bytes "2D80C58D" to virtual address "0x2F801634" (part of module "WINWORD.EXE") - source
- Hook Detection
- relevance
- 10/10
-
Contains embedded string with suspicious keywords
-
Informative 5
-
External Systems
-
Sample was identified as clean by Antivirus engines
- details
- 0/55 Antivirus vendors marked sample as malicious (0% detection rate)
- source
- External System
- relevance
- 10/10
-
Sample was identified as clean by Antivirus engines
-
General
-
Creates mutants
- details
-
"KYIMEShareCachedData.MutexObject.PSPUBWS"
"KYTransactionServer.MutexObject.PSPUBWS"
"Global\MTX_MSO_Formal1_S-1-5-21-4162757579-3804539371-4239455898-1000"
"Global\MTX_MSO_AdHoc1_S-1-5-21-4162757579-3804539371-4239455898-1000"
"Local\ZonesCounterMutex"
"Local\ZoneAttributeCacheCounterMutex"
"Local\ZonesCacheCounterMutex"
"Local\ZonesLockedCacheCounterMutex"
"Global\MsoShellExtRegAccess_S-1-5-21-4162757579-3804539371-4239455898-1000" - source
- Created Mutant
- relevance
- 3/10
-
Loads rich edit control libraries
- details
-
"WINWORD.EXE" loaded module "%COMMONPROGRAMFILES%\Microsoft Shared\office12\riched20.dll" at 674C0000
"WINWORD.EXE" loaded module "C:\Program Files\Common Files\Microsoft Shared\office12\riched20.dll" at 675C0000 - source
- Loaded Module
-
Spawns new processes
- details
- Spawned process "WINWORD.EXE" with commandline "/n /dde" (Show Process)
- source
- Monitored Target
- relevance
- 3/10
-
Creates mutants
-
Installation/Persistance
-
Dropped files
- details
-
"extra_embedded_0.doc.bin" has type "Composite Document File V2 Document, Little Endian, O%WINDIR%\ Version 4.10, Code page: 1252, Author: ., Template: Normal, Last Saved By: ., Revision Number: 2, Name of Creating Application: Microsoft Word 9.0, Total Editing Time: 04:00, Create Time/Date: Wed Apr 4 04:34:00 2001, Last Saved Time/Date: Wed Apr 4 04:38:00 2001, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Security: 0"
"~$Normal.dotm" has type "data"
"~WRS{7A4FD69C-5E96-4227-A34B-2FB23F030E43}.tmp" has type "FoxPro FPT, blocks size 0, next free block index 218103808, 1st used item "\375""
"opa12.dat" has type "data"
"AD4DB9A8.doc" has type "Microsoft Word 2007+"
"ff3bfecbd2fad5f4d00a62f56d864ebc8436202ad7999dc9d4f2bba50cebe704.LNK" has type "MS Windows shortcut, Item id list present, Points to a file or directory, Archive, ctime=Sun Oct 25 05:24:33 2015, mtime=Sun Oct 25 05:25:26 2015, atime=Sun Oct 25 05:24:33 2015, length=1206528, window=hide"
"index.dat" has type "data"
"E6535D89.wmf" has type "ms-windows metafont .wmf"
"BE155F6.dat" has type "ms-windows metafont .wmf"
"~WRS{D08C1C86-20D8-4B72-AB32-1A8CB5490E93}.tmp" has type "data" - source
- Binary File
- relevance
- 3/10
-
Dropped files
File Details
CER.docx
- Filename
- CER.docx
- Size
- 1.2MiB (1206528 bytes)
- Type
- docx office
- Description
- Microsoft Word 2007+
- Architecture
- WINDOWS
- SHA256
- ff3bfecbd2fad5f4d00a62f56d864ebc8436202ad7999dc9d4f2bba50cebe704
- MD5
- 9d4230fefd6c17cfcc3300aa0a59eb58
- SHA1
- 2aee2da54db85307cbdcebc426c4e42229421654
Classification (TrID)
- 91.8% (.DOCX) Word Microsoft Office Open XML Format document
- 8.1% (.ZIP) ZIP compressed archive
Screenshots
Loading content, please wait...
Hybrid Analysis
Tip: Click an analysed process below to view more details.
Analysed 2 processes in total.
- WINWORD.EXE /n /dde (PID: 3652)
- WINWORD.EXE /n /dde (PID: 2932)
Network Analysis
DNS Requests
No relevant DNS requests were made.
Contacted Hosts
No relevant hosts were contacted.
HTTP Traffic
No relevant HTTP requests were made.
Extracted Strings
Extracted Files
Displaying 19 extracted file(s). The remaining 2 file(s) are available in the full version and XML/JSON reports.
-
Informative 19
-
-
opa12.dat
- Size
- 8.4KiB (8584 bytes)
- Type
- data
- MD5
- 4c44299f294641cf24d8cd38062de692
- SHA1
- 967dd9c1d661cbe507d45360d9741e94aef7168f
- SHA256
- 170086b8539eb944774a0c6f534391431c56459dcae7f27bcb2d67cebdbc5c24
-
AD4DB9A8.doc
- Size
- 1.2MiB (1206528 bytes)
- Type
- Microsoft Word 2007+
- MD5
- 9d4230fefd6c17cfcc3300aa0a59eb58
- SHA1
- 2aee2da54db85307cbdcebc426c4e42229421654
- SHA256
- ff3bfecbd2fad5f4d00a62f56d864ebc8436202ad7999dc9d4f2bba50cebe704
-
BE155F6.dat
- Size
- 1.1KiB (1090 bytes)
- Type
- ms-windows metafont .wmf
- MD5
- 5832ba92223d777aef838aa4b9f6a291
- SHA1
- 47676960eb3a031a2efcd2e4ffc4ec1f62c78c78
- SHA256
- 76d442a2b8a5294878227d4b622b96ba44702ba3b1644624ef546742bb809dda
-
E6535D89.wmf
- Size
- 1.1KiB (1112 bytes)
- Type
- ms-windows metafont .wmf
- MD5
- 2704c0a518fb43a1e0d61f6bd9db7ea0
- SHA1
- ceb6877ef4a623d0fba1d88fa1e5e233b46e4a8a
- SHA256
- 359d7892396478d2833f74476465d428edeffb0060f27cbce389fbadf0e0d495
-
mso1D23.tmp
- Size
- 1.1MiB (1118787 bytes)
- Type
- JPEG image data, EXIF standard
-
~$RO0000.doc
- Size
- 162B (162 bytes)
- Type
- data
- MD5
- 9c3174d82a3e9d0870b8becbec74b664
- SHA1
- f88c8c2845f9fea975e0f3e9f1f266ef5d2af185
- SHA256
- 418fd1fb370c27b9ed8682a98869bc1a4fbddc651c27cb60f794e3e9f772f32e
-
~WRS{7A4FD69C-5E96-4227-A34B-2FB23F030E43}.tmp
- Size
- 1KiB (1024 bytes)
- Type
- FoxPro FPT, blocks size 0, next free block index 218103808, 1st used item "\375"
- MD5
- 5d4d94ee7e06bbb0af9584119797b23a
- SHA1
- dbb111419c704f116efa8e72471dd83e86e49677
- SHA256
- 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
-
~WRS{D08C1C86-20D8-4B72-AB32-1A8CB5490E93}.tmp
- Size
- 5.5KiB (5632 bytes)
- Type
- data
- MD5
- d9da4e4833676cd5231118d74273bfda
- SHA1
- 9c79dddebe042a1d30dab1f16df81f350a174ec1
- SHA256
- 6094bcfe0ab3f8fa062d19146dce323d6f2156609c79a7c0778e5611f342d681
-
~WRS{D74A5EE3-0118-41A7-BE1F-BD27CDC5143B}.tmp
- Size
- 1KiB (1024 bytes)
- Type
- FoxPro FPT, blocks size 0, next free block index 218103808, 1st used item "\375"
- MD5
- 5d4d94ee7e06bbb0af9584119797b23a
- SHA1
- dbb111419c704f116efa8e72471dd83e86e49677
- SHA256
- 4826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
-
MSO3082.acl
- Size
- 30B (30 bytes)
-
Local Disk (C).LNK
- Size
- 317B (317 bytes)
- Type
- MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, System, Directory, ctime=Tue Jul 14 09:07:54 2009, mtime=Sun Oct 25 05:33:01 2015, atime=Sun Oct 25 05:33:01 2015, length=8192, window=hide
-
extra_embedded_0.LNK
- Size
- 493B (493 bytes)
- Type
- MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun Oct 25 05:32:03 2015, mtime=Sun Oct 25 05:32:03 2015, atime=Sun Oct 25 05:32:03 2015, length=19456, window=hide
-
index.dat
- Size
- 153B (153 bytes)
- Type
- data
- MD5
- f66d79669071eb1e62ceff27000ba760
- SHA1
- 03e61c8e0241ba1986c92e80f36167879fa9e597
- SHA256
- 9a5160353ad48f13284deea7e0b9b4e588dc9e5b0696122df68e33781da19369
-
Word12.pip
- Size
- 1.6KiB (1684 bytes)
- Type
- data
- MD5
- 2eaebb2ad86d47fa0c5ba4a8ac2d7f8f
- SHA1
- 42986fe39d2806c6ae289ad557a893fb4d3992ea
- SHA256
- 57044efa5a15df18e9fdec0de9741f1a84bbfdac76a260e1337c6f0acf346b8d
-
~$Normal.dotm
- Size
- 162B (162 bytes)
- Type
- data
- MD5
- 89d498e979f7d95703b1b748580bd0bb
- SHA1
- 39c2d31a8f8ae00c43d2d958f31626f61a1e23ee
- SHA256
- 899858601df5750dec8f054f59b52aebe4ad59c4368edd92c763b4cce38271f3
-
~$tra_embedded_0.doc
- Size
- 162B (162 bytes)
- Type
- data
- MD5
- 7b5449a7dcef5135c8e5e09701c63f0f
- SHA1
- 351088231d79019349cabb4c9e9f15220bef949e
- SHA256
- 1785a130f692dc8f18619fbfef733166e0de2b4118f4a5cbb7f3f792c248c1dd
-
extra_embedded_0.doc.bin
- Size
- 19KiB (19456 bytes)
- Type
- Composite Document File V2 Document, Little Endian, Os: Windows, Version 4.10, Code page: 1252, Author: ., Template: Normal, Last Saved By: ., Revision Number: 2, Name of Creating Application: Microsoft Word 9.0, Total Editing Time: 04:00, Create Time/Date: Wed Apr 4 04:34:00 2001, Last Saved Time/Date: Wed Apr 4 04:38:00 2001, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Security: 0
- MD5
- 2224e0c16ef4aa8e5744682d8bd9782e
- SHA1
- 16ae5e0591b8790dcdea599f10e21fcdb498aa05
- SHA256
- 03a44bd87315754efb1ce24f8b62a2765ba46d61de2733cbdd880fbe11ff1702
-
ff3bfecbd2fad5f4d00a62f56d864ebc8436202ad7999dc9d4f2bba50cebe704.LNK
- Size
- 1.7KiB (1725 bytes)
- Type
- MS Windows shortcut, Item id list present, Points to a file or directory, Archive, ctime=Sun Oct 25 05:24:33 2015, mtime=Sun Oct 25 05:25:26 2015, atime=Sun Oct 25 05:24:33 2015, length=1206528, window=hide
-
index.dat
- Size
- 107B (107 bytes)
- Type
- data
- MD5
- 0a151630624e66de1b6770eb3450ee9b
- SHA1
- 68d2577d9cd2789dcdef6f50f8a632268d830171
- SHA256
- 4ebe6294a22a1f41bb0bcc7c2db3c1df14d02a4140bfbc764a3230f1ecacd4a3
-
Notifications
-
Runtime
- Added comment to VirusTotal report
- Not all strings are visible in the report, because the maximum number of strings was reached (5000)
- Parsed more than maximum number of dropped files (20), report might not contain information about some dropped files