File name: | 129c0b07c81a8763a007f2dce9d8026715790854482bc8128ada46c66c74f265.doc |
Full analysis: | https://app.any.run/tasks/f43796dd-376e-472e-bd9d-b296fd0ebef5 |
Verdict: | Malicious activity |
Analysis date: | March 14, 2019, 15:16:05 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Author: PC, Template: Normal.dotm, Last Saved By: PC, Revision Number: 3, Name of Creating Application: Microsoft Office Word, Create Time/Date: Wed Mar 13 23:34:00 2019, Last Saved Time/Date: Wed Mar 13 23:34:00 2019, Number of Pages: 1, Number of Words: 0, Number of Characters: 1, Security: 0 |
MD5: | 75634FF334654987C5AE7E0E617A864F |
SHA1: | 92D6FBC32CFF704892FACF2DD5B6DCE58C16E961 |
SHA256: | 129C0B07C81A8763A007F2DCE9D8026715790854482BC8128ADA46C66C74F265 |
SSDEEP: | 1536:pYxSupfQcHOhWy9z40mamePd6ZpA+6LOA9iMPfaq1m:pASupzukCz40rd6Zmt9iMPC |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
CompObjUserType: | Microsoft Word 97-2003 Document |
---|---|
CompObjUserTypeLen: | 32 |
HeadingPairs: |
|
TitleOfParts: | - |
HyperlinksChanged: | No |
SharedDoc: | No |
LinksUpToDate: | No |
ScaleCrop: | No |
AppVersion: | 15 |
CharCountWithSpaces: | 1 |
Paragraphs: | 1 |
Lines: | 1 |
Company: | - |
CodePage: | Windows Latin 1 (Western European) |
Security: | None |
Characters: | 1 |
Words: | - |
Pages: | 1 |
ModifyDate: | 2019:03:13 23:34:00 |
CreateDate: | 2019:03:13 23:34:00 |
TotalEditTime: | - |
Software: | Microsoft Office Word |
RevisionNumber: | 3 |
LastModifiedBy: | PC |
Template: | Normal.dotm |
Comments: | - |
Keywords: | - |
Author: | PC |
Subject: | - |
Title: | - |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3504 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\129c0b07c81a8763a007f2dce9d8026715790854482bc8128ada46c66c74f265.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 | ||||
2436 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass C:\Users\admin\AppData\Roaming\QOKurIv.ps1 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | WINWORD.EXE | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
3504 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRDD51.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2436 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\AVPJYKGCS73B4HRHOEXV.temp | — | |
MD5:— | SHA256:— | |||
3504 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~DF8A0644C11F473909.TMP | — | |
MD5:— | SHA256:— | |||
3504 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{EE8E8866-6447-4F77-9BB8-6D770569CD9E}.tmp | — | |
MD5:— | SHA256:— | |||
3504 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{7735727B-456E-4558-BED5-55F35D0930F2}.tmp | — | |
MD5:— | SHA256:— | |||
3504 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:6D06C8E289BF1B6B43A6AC427E18D623 | SHA256:FD1A49FDB84E04096D6C47DE344F96DC8482F401ED697019977B8ECB1F44C324 | |||
3504 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$9c0b07c81a8763a007f2dce9d8026715790854482bc8128ada46c66c74f265.doc | pgc | |
MD5:2C42D5CDB97798A50F1E5910048D58C1 | SHA256:8871C69FE191895E38DB9B7A38E53E1877B78025D50A99A0977B8B8D432E277B | |||
2436 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:0586DB8FF5249AD980CEC7BF2CBC3708 | SHA256:DF93E043BDFAB9E6C36B353985E621A7A276756B52877AACDC5F36517009B4E2 | |||
2436 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF1aea42.TMP | binary | |
MD5:0586DB8FF5249AD980CEC7BF2CBC3708 | SHA256:DF93E043BDFAB9E6C36B353985E621A7A276756B52877AACDC5F36517009B4E2 | |||
3504 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\QOKurIv.ps1 | text | |
MD5:062F49987559385EC2333029F56B1152 | SHA256:0381B2563738B8B1B5693BFBE7848A4418154E86CE52AB9CD995A0A1ED90F48C |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2436 | powershell.exe | 107.180.27.166:80 | mincoindia.com | GoDaddy.com, LLC | US | malicious |
Domain | IP | Reputation |
---|---|---|
mincoindia.com |
| malicious |
dns.msftncsi.com |
| shared |