Overview
overview
10Static
static
8docs/2923 N 92ST.doc
windows7_x64
5docs/2923 N 92ST.doc
windows10_x64
5docs/95800...30.doc
windows7_x64
5docs/95800...30.doc
windows10_x64
5docs/9623_...12.doc
windows7_x64
5docs/9623_...12.doc
windows10_x64
5docs/Email...91.doc
windows7_x64
5docs/Email...91.doc
windows10_x64
5docs/Email...87.doc
windows7_x64
5docs/Email...87.doc
windows10_x64
5docs/Form ...21.doc
windows7_x64
5docs/Form ...21.doc
windows10_x64
5docs/New D..._3.doc
windows7_x64
5docs/New D..._3.doc
windows10_x64
5docs/New D..._7.doc
windows7_x64
5docs/New D..._7.doc
windows10_x64
5docs/New D..._3.doc
windows7_x64
5docs/New D..._3.doc
windows10_x64
5docs/Nuovo...20.doc
windows7_x64
10docs/Nuovo...20.doc
windows10_x64
10docs/WLE-0...21.doc
windows7_x64
5docs/WLE-0...21.doc
windows10_x64
5docs/fattu...io.doc
windows7_x64
10docs/fattu...io.doc
windows10_x64
10General
-
Target
docs.7z
-
Size
126KB
-
Sample
210125-nyfq4cdw4s
-
MD5
01a753e6508bb28a4ced146d6bfcfb01
-
SHA1
8ba94f53f8a39f79f98e2750f5281a02c0c51627
-
SHA256
4c27a34482b07a5b2544f0bcd6abc5218220ee3f3308ff29c775f413f8abd6b3
-
SHA512
7fc72302736d7979c0886d5bba139ba6b89ada41c547e4a8c7fadfb242dc6392722b5710b8aa6b213083e318a58829e39b5aec8f1de52e52d0cbfdffa76c10bc
Behavioral task
behavioral1
Sample
docs/2923 N 92ST.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
docs/2923 N 92ST.doc
Resource
win10v20201028
Behavioral task
behavioral3
Sample
docs/95800_700631990557_1430.doc
Resource
win7v20201028
Behavioral task
behavioral4
Sample
docs/95800_700631990557_1430.doc
Resource
win10v20201028
Behavioral task
behavioral5
Sample
docs/9623_645595827462_5112.doc
Resource
win7v20201028
Behavioral task
behavioral6
Sample
docs/9623_645595827462_5112.doc
Resource
win10v20201028
Behavioral task
behavioral7
Sample
docs/Emailing - HN335PUITY 591.doc
Resource
win7v20201028
Behavioral task
behavioral8
Sample
docs/Emailing - HN335PUITY 591.doc
Resource
win10v20201028
Behavioral task
behavioral9
Sample
docs/Emailing - KN853DFOJH 787.doc
Resource
win7v20201028
Behavioral task
behavioral10
Sample
docs/Emailing - KN853DFOJH 787.doc
Resource
win10v20201028
Behavioral task
behavioral11
Sample
docs/Form - Jan 20, 2021.doc
Resource
win7v20201028
Behavioral task
behavioral12
Sample
docs/Form - Jan 20, 2021.doc
Resource
win10v20201028
Behavioral task
behavioral13
Sample
docs/New Doc 2021-01-20 10.15.13_3.doc
Resource
win7v20201028
Behavioral task
behavioral14
Sample
docs/New Doc 2021-01-20 10.15.13_3.doc
Resource
win10v20201028
Behavioral task
behavioral15
Sample
docs/New Doc 2021-01-20 10.17.12_7.doc
Resource
win7v20201028
Behavioral task
behavioral16
Sample
docs/New Doc 2021-01-20 10.17.12_7.doc
Resource
win10v20201028
Behavioral task
behavioral17
Sample
docs/New Doc 2021-01-20 11.03.13_3.doc
Resource
win7v20201028
Behavioral task
behavioral18
Sample
docs/New Doc 2021-01-20 11.03.13_3.doc
Resource
win10v20201028
Behavioral task
behavioral19
Sample
docs/Nuovo documento 2021.01.20.doc
Resource
win7v20201028
Behavioral task
behavioral20
Sample
docs/Nuovo documento 2021.01.20.doc
Resource
win10v20201028
Behavioral task
behavioral21
Sample
docs/WLE-010121 BJQ-012221.doc
Resource
win7v20201028
Behavioral task
behavioral22
Sample
docs/WLE-010121 BJQ-012221.doc
Resource
win10v20201028
Behavioral task
behavioral23
Sample
docs/fattura gennaio.doc
Resource
win7v20201028
Behavioral task
behavioral24
Sample
docs/fattura gennaio.doc
Resource
win10v20201028
Malware Config
Extracted
http://trainwithconviction.com/wp-admin/y/
http://trainwithconviction.webdmcsolutions.com/wp-admin/rEEEU/
https://perrasmoore.ca/wp-admin/rM6HK/
https://canadabrightway.com/wp-admin/n3/
https://upinsmokebatonrouge.com/var/Ux1V/
https://thelambertagency.com/staging/Vo/
https://stormhansen.com/2556460492/if/
Extracted
http://www.achutamanasa.com/media/Te/
http://opticaquilin.cl/wp-includes/FFueL/
https://www.infoquick.co.uk/assets/h/
http://vilajansen.com.br/loja_old_1/p/
http://oftalmovilaplana.com/wp-includes/wfKu/
https://cashyinvestment.org/wp-content/21dIZ/
http://merkadito.mx/upload/6/
Extracted
emotet
Epoch2
12.175.220.98:80
162.241.204.233:8080
50.116.111.59:8080
172.86.188.251:8080
139.99.158.11:443
66.57.108.14:443
75.177.207.146:80
194.190.67.75:80
50.245.107.73:443
173.70.61.180:80
85.105.205.77:8080
104.131.11.150:443
62.75.141.82:80
70.92.118.112:80
194.4.58.192:7080
120.150.60.189:80
24.231.88.85:80
78.24.219.147:8080
110.142.236.207:80
119.59.116.21:8080
144.217.7.207:7080
95.213.236.64:8080
46.105.131.79:8080
176.111.60.55:8080
174.118.202.24:443
94.23.237.171:443
138.68.87.218:443
110.145.101.66:443
134.209.144.106:443
74.208.45.104:8080
24.178.90.49:80
172.125.40.123:80
157.245.99.39:8080
118.83.154.64:443
202.134.4.211:8080
121.124.124.40:7080
172.104.97.173:8080
110.145.11.73:80
172.105.13.66:443
168.235.67.138:7080
78.188.225.105:80
59.21.235.119:80
185.94.252.104:443
24.179.13.119:80
49.205.182.134:80
51.89.36.180:443
115.21.224.117:80
202.134.4.216:8080
190.251.200.206:80
78.189.148.42:80
220.245.198.194:80
85.105.111.166:80
5.39.91.110:7080
203.153.216.189:7080
93.146.48.84:80
181.165.68.127:80
70.183.211.3:80
47.144.21.37:80
167.114.153.111:8080
75.109.111.18:80
24.69.65.8:8080
188.165.214.98:8080
187.161.206.24:80
74.58.215.226:80
74.128.121.17:80
24.164.79.147:8080
139.59.60.244:8080
136.244.110.184:8080
2.58.16.89:8080
79.137.83.50:443
139.162.60.124:8080
89.216.122.92:80
188.219.31.12:80
190.103.228.24:80
109.74.5.95:8080
87.106.139.101:8080
78.182.254.231:80
74.40.205.197:443
89.106.251.163:80
69.49.88.46:80
62.171.142.179:8080
217.20.166.178:7080
161.0.153.60:80
37.187.72.193:8080
190.240.194.77:443
5.2.212.254:80
200.116.145.225:443
98.109.133.80:80
75.113.193.72:80
115.94.207.99:443
109.116.245.80:80
123.176.25.234:80
120.150.218.241:443
50.91.114.38:80
180.222.161.85:80
186.74.215.34:80
95.9.5.93:80
64.207.182.168:8080
197.211.245.21:80
61.19.246.238:443
37.139.21.175:8080
181.171.209.241:443
185.201.9.197:8080
71.72.196.159:80
41.185.28.84:8080
Targets
-
-
Target
docs/2923 N 92ST.doc
-
Size
164KB
-
MD5
40d3757eef5a4d179278f8396f024d8d
-
SHA1
431432bf79afb24cf7abeb89525ae1cf3b27340b
-
SHA256
4f988ec89433c3babedf82dd156b3b1d5ec3116d3e3829533573f9b3f3570097
-
SHA512
0bf5b5022828118263ca9f8f1db4879e546c03d029a566756f9d886bfcd53916682e2ae99aff35befdbce3604824aad6f6d2774f2cd080e8f76311050ba29579
Score5/10-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
-
-
Target
docs/95800_700631990557_1430.doc
-
Size
165KB
-
MD5
9b23870fc03f772b9284764d6cebe66a
-
SHA1
fc66ccb0f37283b8a69d3cc0aaf9b9006439c7c7
-
SHA256
3a32e16f1f32e5b3ce2dd2710fb2ec9c767a85dee05418461ca8d0ff9a16da9f
-
SHA512
bc4c14702af4fa20d32ed169f2082b8e53b030e00781995033a8fdf6c81da270224dcfac7d95fa9708d1e68b48d4c723144e23e5d38cd958578e855e30c4e20d
Score5/10-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
-
-
Target
docs/9623_645595827462_5112.doc
-
Size
167KB
-
MD5
9b7b1d33e2ca7d93f242327ac0abc17b
-
SHA1
0700e44ad4c0eeb78d3a3029ab92ab09ebc4adc5
-
SHA256
f3b96a22b0a059493c48121986cbb5945dc6d6aa5b0d868b6f46907c88bcbb8c
-
SHA512
5a74ba3ec3cb86549585f84f9f0c240e6e9c449878d9e3232d357f3e841637ecafe64dbc13562a0b03fdc488e052abfc88dac65a973c472c234d5a247a983b79
Score5/10-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
-
-
Target
docs/Emailing - HN335PUITY 591.doc
-
Size
165KB
-
MD5
94974a099ee6dbf6426415bb5a865286
-
SHA1
752443b4bb9933d354358859db6590eff163394e
-
SHA256
faacec9886f74607cfd261fcb744452942cfc08b64b293445657dd0f73fb799e
-
SHA512
cfd6d60f9aa9e5198a4ab5db8656f735ac02e9cc1b109e897403a71dda0882be40b360ac933ce3dd2f49d9ab5aaee06edff3a4b53a9e9049102515b4ad261fbe
Score5/10-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
-
-
Target
docs/Emailing - KN853DFOJH 787.doc
-
Size
165KB
-
MD5
7a77273288972c4404e2efcce371d312
-
SHA1
b7b3e80ea486d1e3f1899e93b3f97938140eb4d3
-
SHA256
c07680130c970fffc7fab503d5d25e669ccccf8c880d122679a76a9ed1a4e026
-
SHA512
cae7c76e6c61afe54f45ae670728f378f5c8bad6f1457f9f8cfec712f3ed6690e65e4b7d2cb7324f510358cdeae65051387a9ce0c05085b8312e8b48fe7d4ca1
Score5/10-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
-
-
Target
docs/Form - Jan 20, 2021.doc
-
Size
164KB
-
MD5
5b7add89570a2acf073b4c4b10f917af
-
SHA1
3bcc2b59d715b5aaf80955940b8bf42027b71363
-
SHA256
b67768458ac837b01c2453d84fcddad7e044d4e6fbc70d6aa087ab2d3c449f95
-
SHA512
98e845cdc0a66cd6f6de461fd3052a3387669cfbc0d877583203cbf9507afa916bb87ff1823d6fc877089d8a8704fb7c62a1992072e21567159d4cfe3027559c
Score5/10-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
-
-
Target
docs/New Doc 2021-01-20 10.15.13_3.doc
-
Size
165KB
-
MD5
0697adbbf0e0a55b99563776c83fc192
-
SHA1
4598c9e8870d6a5ab81ac3cda77c52ac3241f259
-
SHA256
4005ac4847a7b5764556b2b964793048d3d156682d5e596771ef01a192eaec02
-
SHA512
756cb6bb6a90302b6252365bab29bf37a53ee44d05cc6ca5c8b0b71f558543dc088cc23d02d807b03c505d19586ae7dd1fc0d17dbdd5259a032d6b487fe72583
Score5/10-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
-
-
Target
docs/New Doc 2021-01-20 10.17.12_7.doc
-
Size
164KB
-
MD5
40d3757eef5a4d179278f8396f024d8d
-
SHA1
431432bf79afb24cf7abeb89525ae1cf3b27340b
-
SHA256
4f988ec89433c3babedf82dd156b3b1d5ec3116d3e3829533573f9b3f3570097
-
SHA512
0bf5b5022828118263ca9f8f1db4879e546c03d029a566756f9d886bfcd53916682e2ae99aff35befdbce3604824aad6f6d2774f2cd080e8f76311050ba29579
Score5/10-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
-
-
Target
docs/New Doc 2021-01-20 11.03.13_3.doc
-
Size
165KB
-
MD5
9b23870fc03f772b9284764d6cebe66a
-
SHA1
fc66ccb0f37283b8a69d3cc0aaf9b9006439c7c7
-
SHA256
3a32e16f1f32e5b3ce2dd2710fb2ec9c767a85dee05418461ca8d0ff9a16da9f
-
SHA512
bc4c14702af4fa20d32ed169f2082b8e53b030e00781995033a8fdf6c81da270224dcfac7d95fa9708d1e68b48d4c723144e23e5d38cd958578e855e30c4e20d
Score5/10-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
-
-
Target
docs/Nuovo documento 2021.01.20.doc
-
Size
165KB
-
MD5
112c42993037d8ef83d775da06a2c04e
-
SHA1
d782ff1696ce579afd7ef38180cd608be17b522c
-
SHA256
2ece87cf6c9c2becec71a241e94b9d0f1ffcc46a7655389df54e401d97167c4f
-
SHA512
1fb108dbb79194dd83dfdf2295b1e7545b0f599f97e9cb3190d8d719f751066c5c4ce100adf63a644183844cdb8ec48a6402a46bc6c439712735e79bc0e3af2c
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Drops file in System32 directory
-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
-
-
Target
docs/WLE-010121 BJQ-012221.doc
-
Size
167KB
-
MD5
1a64182f24c7f2457624c7fcd795a355
-
SHA1
f9d16c0716105bd54c9c3c422cd3a08e14537afd
-
SHA256
5ef4f943153c5f77d484a1fc12a3e6771a586554a420b22242b35f6a5456e618
-
SHA512
b627a016ad8d108320ae6106e37ee381656b4924f331563f1570c3692baff0db8a33d898a1f06e3172c7b4f33bbae509b3e67ac772880d6545ecd2a67562c192
Score5/10-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
-
-
Target
docs/fattura gennaio.doc
-
Size
165KB
-
MD5
23fbeb7bfba5230a8027ee67f3e7339c
-
SHA1
4434ee975937da03227afb12e60696130df1f130
-
SHA256
4dbe87e0f678a4c124b54bfeff68a1bdf208b8fb42dadf6a7304517082cacc7e
-
SHA512
5e7371426dc30542efd055288e6b9171427e586d1808a235d40df4ec0e8c6cbf2eeadbf597b87c847937abb5af7f9f407dbe2160c35fc9d8477c912bca25c112
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Drops file in System32 directory
-
Enumerates physical storage devices
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-