File name: | Approved_payment_info_127007739.docm |
Full analysis: | https://app.any.run/tasks/583ecb77-3887-4a64-b12d-f0a16c3d0bca |
Verdict: | Malicious activity |
Analysis date: | July 17, 2019, 22:09:07 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/vnd.openxmlformats-officedocument.wordprocessingml.document |
File info: | Microsoft Word 2007+ |
MD5: | A4F76A47147C5164421F991933A39CC5 |
SHA1: | 341BA844EC4087D9F6EE3D78D53C953BF28B9941 |
SHA256: | 041E64E6D783B7CD1BC3EB21EB621EACB08A3175005B400C3B06F3676E434859 |
SSDEEP: | 3072:OkUXyfNSX//O/VyhP3z4/gT+taMTW2Dlg5z5BNs8RdDPKrSQuOpY9/t5NeINi:vUifu/W/a30lTrlgt5BNs8R1PQSDusvg |
.docm | | | Word Microsoft Office Open XML Format document (with Macro) (53.6) |
---|---|---|
.docx | | | Word Microsoft Office Open XML Format document (24.2) |
.zip | | | Open Packaging Conventions container (18) |
.zip | | | ZIP compressed archive (4.1) |
Creator: | - |
---|
ModifyDate: | 2019:07:17 13:53:00Z |
---|---|
CreateDate: | 2019:07:08 09:55:00Z |
RevisionNumber: | 1 |
LastModifiedBy: | - |
AppVersion: | 14 |
HyperlinksChanged: | No |
SharedDoc: | No |
CharactersWithSpaces: | 662960 |
LinksUpToDate: | No |
Company: | - |
TitlesOfParts: | - |
HeadingPairs: |
|
ScaleCrop: | No |
Paragraphs: | 1325 |
Lines: | 4709 |
DocSecurity: | None |
Application: | Microsoft Office Word |
Characters: | 565138 |
Words: | 99147 |
Pages: | 118 |
TotalEditTime: | - |
Template: | Normal.dotm |
ZipFileName: | [Content_Types].xml |
---|---|
ZipUncompressedSize: | 2645 |
ZipCompressedSize: | 501 |
ZipCRC: | 0xc6337d17 |
ZipModifyDate: | 1980:01:01 00:00:00 |
ZipCompression: | Deflated |
ZipBitFlag: | - |
ZipRequiredVersion: | 20 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3480 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Approved_payment_info_127007739.docm" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 | ||||
2680 | "C:\Windows\System32\wscript.exe" /e:JScript "C:\Users\admin\AppData\Local\Temp\Approved_payment_info_127007739.docm.dec" | C:\Windows\System32\wscript.exe | — | WINWORD.EXE |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 |
(PID) Process: | (3480) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
Operation: | write | Name: | 1)> |
Value: 31293E00980D0000010000000000000000000000 | |||
(PID) Process: | (3480) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1033 |
Value: Off | |||
(PID) Process: | (3480) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1033 |
Value: On | |||
(PID) Process: | (3480) WINWORD.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage |
Operation: | write | Name: | WORDFiles |
Value: 1324417054 | |||
(PID) Process: | (3480) WINWORD.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage |
Operation: | write | Name: | ProductFiles |
Value: 1324417168 | |||
(PID) Process: | (3480) WINWORD.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage |
Operation: | write | Name: | ProductFiles |
Value: 1324417169 | |||
(PID) Process: | (3480) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word |
Operation: | write | Name: | MTTT |
Value: 980D00002EBE004AEC3CD50100000000 | |||
(PID) Process: | (3480) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
Operation: | write | Name: | y*> |
Value: 792A3E00980D000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000 | |||
(PID) Process: | (3480) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
Operation: | delete value | Name: | y*> |
Value: 792A3E00980D000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000 | |||
(PID) Process: | (3480) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3480 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRED11.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3480 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5658F5EE.png | — | |
MD5:— | SHA256:— | |||
3480 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E0BAC878-379F-4F4F-B602-E3A7EA2543BD}.tmp | — | |
MD5:— | SHA256:— | |||
3480 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A9777380-4C4F-452E-B604-C5C84D6C4B3B}.tmp | — | |
MD5:— | SHA256:— | |||
3480 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{48045A37-D2E0-4EC3-A87A-0824EE1C4D49}.tmp | — | |
MD5:— | SHA256:— | |||
3480 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{10B0D4D7-4B76-4C0A-823F-86C6E48EC66E}.tmp | — | |
MD5:— | SHA256:— | |||
3480 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\Approved_payment_info_127007739.docm.dec | text | |
MD5:BDC98427C01D3882E65079372541EEE0 | SHA256:522A1B267912EDD8B21C179676E5557E5EED02587BFAB1BFC675AF4B3D0444FD | |||
3480 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$proved_payment_info_127007739.docm | pgc | |
MD5:321BB18283CD7B9A415FDE351EE7F0C7 | SHA256:C70176055F92B32AE66395D5FD59163AA576210A0EA0F6419E83143993E44D47 | |||
3480 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:ACC0F8F488767AE9712541A663B1E592 | SHA256:8F0AE9236BAEC839C804884FFFC30E132DCB2D5431F9189E6C5A8DAACB0810AE | |||
3480 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex | text | |
MD5:F3B25701FE362EC84616A93A45CE9998 | SHA256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209 |