File name: | FedEx Delivery RECEIPT.doc |
Full analysis: | https://app.any.run/tasks/5407691c-84c0-450b-bb6d-cac0e3157e97 |
Verdict: | Malicious activity |
Analysis date: | November 15, 2018, 14:31:17 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | text/plain |
File info: | ASCII text, with very long lines, with CRLF, CR, LF line terminators |
MD5: | 50F68778161EC88451AD9E91202CF6CB |
SHA1: | 614332B139A253F7B3EB2448AAD75A5FFF0E0702 |
SHA256: | 09484EFAAF6C1692408E32719CBA79FFB81DC88C535F405FBDD9BDDF2F86284E |
SSDEEP: | 768:pc7Ii5nkJnoRxfeczI1yzel/jxfNfWaWiWqpi5Ut5W+WQnGzZUidMRpSFgH8nQRe:K7Z5f2VNNzWiRpiKi+ZqZT+q2OQY |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2044 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\FedEx Delivery RECEIPT.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 | ||||
1460 | "C:\PROGRA~1\COMMON~1\MICROS~1\DW\DW20.EXE" -x -s 1072 | C:\PROGRA~1\COMMON~1\MICROS~1\DW\DW20.EXE | — | WINWORD.EXE |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Application Error Reporting Exit code: 0 Version: 14.0.6015.1000 | ||||
2468 | C:\Windows\system32\dwwin.exe -x -s 1072 | C:\Windows\system32\dwwin.exe | — | DW20.EXE |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Watson Client Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3336 | "C:\Windows\explorer.exe" | C:\Windows\explorer.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
(PID) Process: | (2044) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
Operation: | write | Name: | t m |
Value: 74206D00FC070000010000000000000000000000 | |||
(PID) Process: | (2044) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1033 |
Value: Off | |||
(PID) Process: | (2044) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1033 |
Value: On | |||
(PID) Process: | (2044) WINWORD.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage |
Operation: | write | Name: | WORDFiles |
Value: 1299120143 | |||
(PID) Process: | (2044) WINWORD.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage |
Operation: | write | Name: | ProductFiles |
Value: 1299120256 | |||
(PID) Process: | (2044) WINWORD.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage |
Operation: | write | Name: | ProductFiles |
Value: 1299120257 | |||
(PID) Process: | (2044) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word |
Operation: | write | Name: | MTTT |
Value: FC070000C20CFFE9EF7CD40100000000 | |||
(PID) Process: | (2044) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
Operation: | write | Name: | =!m |
Value: 3D216D00FC07000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000 | |||
(PID) Process: | (2044) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
Operation: | delete value | Name: | =!m |
Value: 3D216D00FC07000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000 | |||
(PID) Process: | (2044) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2044 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR9074.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2044 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{AFAC4FC4-F0AB-47E3-9AB1-9C1DA307B814}.tmp | — | |
MD5:— | SHA256:— | |||
2044 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{63E326BA-0647-42FB-8B56-1FFFA58E007A}.tmp | — | |
MD5:— | SHA256:— | |||
2044 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:C4C31C72ACD4022216560127B39E8420 | SHA256:B090B9A8F829A8017470D9240C3DF1102526FC8BD04EA704B0FB0A4ACBFBFE69 | |||
2044 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\6134328.cvr | sqm | |
MD5:4349A22C645E57F01E3039AFDDCEF8AF | SHA256:5672E64DCB21F79ADA06DEF62C815D3E5FD9D4A7D894873B423380600DBDFD28 | |||
2468 | dwwin.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\WER\ReportArchive\AppCrash_WINWORD.EXE_d7fd426ff9d50215af21c7c13a6f73cbcb4969d_09f9dd9a\Report.wer | binary | |
MD5:9C5A61086DEF979F47D68CC3F3C54954 | SHA256:212FD1225EDDF8EF2B31DCFB14591FF48B951D255C728825E075E6BC5360EB07 | |||
2044 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$dEx Delivery RECEIPT.doc | pgc | |
MD5:A84C9FA0D2E7AD2586AE9FDDBE0C9AE5 | SHA256:C260CEAE7254E2434C068CDE93C212DD26686D927918618B436B77E383066602 | |||
2044 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{00EC2122-DC28-45DA-91C4-9909C13D851D}.tmp | binary | |
MD5:B484A81F8BB1435B45DA7C73F2DA37C6 | SHA256:3CEDC54CAD05098F18FDFBB679BA91D1435283B308275FD0F1DD42FB7BE80655 |