File name: | Enquiry .doc |
Full analysis: | https://app.any.run/tasks/6a146a5a-7a50-471a-9e6b-8b818f12a23f |
Verdict: | Malicious activity |
Threats: | AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat. |
Analysis date: | March 14, 2019, 18:15:28 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Author: PC, Template: Normal.dotm, Last Saved By: PC, Revision Number: 3, Name of Creating Application: Microsoft Office Word, Create Time/Date: Wed Mar 13 23:34:00 2019, Last Saved Time/Date: Wed Mar 13 23:34:00 2019, Number of Pages: 1, Number of Words: 0, Number of Characters: 1, Security: 0 |
MD5: | 75634FF334654987C5AE7E0E617A864F |
SHA1: | 92D6FBC32CFF704892FACF2DD5B6DCE58C16E961 |
SHA256: | 129C0B07C81A8763A007F2DCE9D8026715790854482BC8128ADA46C66C74F265 |
SSDEEP: | 1536:pYxSupfQcHOhWy9z40mamePd6ZpA+6LOA9iMPfaq1m:pASupzukCz40rd6Zmt9iMPC |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
CompObjUserType: | Microsoft Word 97-2003 Document |
---|---|
CompObjUserTypeLen: | 32 |
HeadingPairs: |
|
TitleOfParts: | - |
HyperlinksChanged: | No |
SharedDoc: | No |
LinksUpToDate: | No |
ScaleCrop: | No |
AppVersion: | 15 |
CharCountWithSpaces: | 1 |
Paragraphs: | 1 |
Lines: | 1 |
Company: | - |
CodePage: | Windows Latin 1 (Western European) |
Security: | None |
Characters: | 1 |
Words: | - |
Pages: | 1 |
ModifyDate: | 2019:03:13 23:34:00 |
CreateDate: | 2019:03:13 23:34:00 |
TotalEditTime: | - |
Software: | Microsoft Office Word |
RevisionNumber: | 3 |
LastModifiedBy: | PC |
Template: | Normal.dotm |
Comments: | - |
Keywords: | - |
Author: | PC |
Subject: | - |
Title: | - |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3448 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Enquiry .doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
2388 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass C:\Users\admin\AppData\Roaming\QOKurIv.ps1 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | WINWORD.EXE | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
4092 | "C:\Users\admin\AppData\Roaming\9501378.exe" | C:\Users\admin\AppData\Roaming\9501378.exe | powershell.exe | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
4044 | "C:\Users\admin\AppData\Roaming\9501378.exe" | C:\Users\admin\AppData\Roaming\9501378.exe | 9501378.exe | |
User: admin Integrity Level: MEDIUM Exit code: 0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3448 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR8459.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2388 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\PP48L8QGYU2SSG25M7OO.temp | — | |
MD5:— | SHA256:— | |||
4092 | 9501378.exe | C:\Users\admin\AppData\Local\Mozilla\Fox | binary | |
MD5:19297188335C66019E01618E1FEB8FC4 | SHA256:1DDA2B78117D4CBB69F06B05FDAA70FAC6934BB50D746278F85AA8C8AE39348D | |||
3448 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\QOKurIv.ps1 | text | |
MD5:062F49987559385EC2333029F56B1152 | SHA256:0381B2563738B8B1B5693BFBE7848A4418154E86CE52AB9CD995A0A1ED90F48C | |||
3448 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$quiry .doc | pgc | |
MD5:D1806A177479A6D96AAC4EE8F48A018C | SHA256:0A236407C0B14249F0332A8266D03F2DF78953830335573302866BE4EE5D8510 | |||
2388 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:901ECDF767744E6BB59CB023757886E3 | SHA256:48A990A7B1201BFD70F417698302A6299D036A6574E558A96000AF48469479E1 | |||
3448 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:6E28B672E33ED44FA2233E4B0EA4D984 | SHA256:ECF9C6BE22E4A542EBECD6F2A9B2ABCD77BA994D3F8910570A44D4737F95D6E1 | |||
2388 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF199531.TMP | binary | |
MD5:901ECDF767744E6BB59CB023757886E3 | SHA256:48A990A7B1201BFD70F417698302A6299D036A6574E558A96000AF48469479E1 | |||
2388 | powershell.exe | C:\Users\admin\AppData\Roaming\9501378.exe | executable | |
MD5:43C2CC05F06310800E25DF6A13EE2637 | SHA256:D7A930096FB7265FC09D94238A35EA931ECED0CE53654F5E6F8E7AB3C5A9CF89 | |||
4092 | 9501378.exe | C:\Users\admin\AppData\Local\Mozilla\MiniCalc.exe | executable | |
MD5:43C2CC05F06310800E25DF6A13EE2637 | SHA256:D7A930096FB7265FC09D94238A35EA931ECED0CE53654F5E6F8E7AB3C5A9CF89 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2388 | powershell.exe | GET | 200 | 107.180.27.166:80 | http://mincoindia.com/wp-admin/AI/9501378.exe | US | executable | 979 Kb | malicious |
4044 | 9501378.exe | POST | 200 | 185.195.236.146:80 | http://llkty.gq/8s/index.php | AT | text | 4 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2388 | powershell.exe | 107.180.27.166:80 | mincoindia.com | GoDaddy.com, LLC | US | malicious |
4044 | 9501378.exe | 185.195.236.146:80 | llkty.gq | Cristi Scumpu | AT | malicious |
Domain | IP | Reputation |
---|---|---|
mincoindia.com |
| malicious |
llkty.gq |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
2388 | powershell.exe | A Network Trojan was detected | ET TROJAN EXE Download Request To Wordpress Folder Likely Malicious |
2388 | powershell.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2388 | powershell.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
— | — | Potentially Bad Traffic | ET INFO DNS Query for Suspicious .gq Domain |
4044 | 9501378.exe | A Network Trojan was detected | ET TROJAN AZORult Variant.4 Checkin M2 |
4044 | 9501378.exe | A Network Trojan was detected | MALWARE [PTsecurity] AZORult client request |
4044 | 9501378.exe | A Network Trojan was detected | MALWARE [PTsecurity] AZORult.Stealer HTTP Header |
4044 | 9501378.exe | Potentially Bad Traffic | ET INFO HTTP POST Request to Suspicious *.gq domain |