File name: | 1745fc4babef8fa7d3c6d9ebbdd13c8e851897ec003ef1737ec48a9267022096 |
Full analysis: | https://app.any.run/tasks/ce660b42-adf0-4041-80bf-f30c6315d17e |
Verdict: | Malicious activity |
Analysis date: | April 15, 2019, 13:00:58 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Author: Alex, Template: Normal.dotm, Last Saved By: Alex, Revision Number: 2, Name of Creating Application: Microsoft Office Word, Create Time/Date: Sun Apr 14 16:21:00 2019, Last Saved Time/Date: Sun Apr 14 16:29:00 2019, Number of Pages: 2, Number of Words: 0, Number of Characters: 4, Security: 0 |
MD5: | 1414ACA32986F9D77F85425074E403CD |
SHA1: | 968A77A99CDD526174B5519DBD63B31078C4A05B |
SHA256: | 1745FC4BABEF8FA7D3C6D9EBBDD13C8E851897EC003EF1737EC48A9267022096 |
SSDEEP: | 6144:lXPLX9vVqnhTXsV/3iIhY9+njNZuyONoUTXbOREPbY8bMVin1:VPGnh8/3iI3bJPUTLS2qu |
.doc | | | Microsoft Word document (80) |
---|
CompObjUserType: | - |
---|---|
CompObjUserTypeLen: | - |
HeadingPairs: |
|
TitleOfParts: | - |
HyperlinksChanged: | No |
SharedDoc: | No |
LinksUpToDate: | No |
ScaleCrop: | No |
AppVersion: | 14 |
CharCountWithSpaces: | 4 |
Paragraphs: | 1 |
Lines: | 1 |
Company: | - |
CodePage: | Unicode (UTF-8) |
Security: | None |
Characters: | 4 |
Words: | - |
Pages: | 2 |
ModifyDate: | 2019:04:14 15:29:00 |
CreateDate: | 2019:04:14 15:21:00 |
TotalEditTime: | - |
Software: | Microsoft Office Word |
RevisionNumber: | 2 |
LastModifiedBy: | Alex |
Template: | Normal.dotm |
Keywords: | - |
Author: | Alex |
Subject: | - |
Title: | - |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
388 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\1745fc4babef8fa7d3c6d9ebbdd13c8e851897ec003ef1737ec48a9267022096.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 Modules
| |||||||||||||||
2588 | C:\Users\Public\sslqpeepbsj.exe | C:\Users\Public\sslqpeepbsj.exe | — | WINWORD.EXE | |||||||||||
User: admin Company: sECuNia Integrity Level: MEDIUM Description: GOoglE iNc. Version: 1.00 Modules
| |||||||||||||||
3532 | C:\Windows\helppane.exe -Embedding | C:\Windows\helppane.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Help and Support Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
|
PID | Process | Filename | Type | |
---|---|---|---|---|
388 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR2F79.tmp.cvr | — | |
MD5:— | SHA256:— | |||
388 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@boua[1].txt | text | |
MD5:C45F0C6BAC9E8174E808040A4BC5E390 | SHA256:A41F3D685AFE7AF66CE3709C881DAE53027372D6141E0F56D2E45B82E8380AFE | |||
388 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\boua23[1].exe | executable | |
MD5:54B1EE633E49544E5BB6099DD576663E | SHA256:2BDF9811D9FDC64ACC21F88900C8F8054C900C009A98BB1EFED40F64BE259115 | |||
388 | WINWORD.EXE | C:\Users\Public\sslqpeepbsj.exe | executable | |
MD5:54B1EE633E49544E5BB6099DD576663E | SHA256:2BDF9811D9FDC64ACC21F88900C8F8054C900C009A98BB1EFED40F64BE259115 | |||
388 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$45fc4babef8fa7d3c6d9ebbdd13c8e851897ec003ef1737ec48a9267022096.doc | pgc | |
MD5:0FE2B7D6F94F900A901D1144298ADB4E | SHA256:9AEF7749F1CB531ACF47B0B05BB16358AC05AB19F1DA7C29F499AE2C33E01EF0 | |||
388 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:E0A6D871DF9AF8A843020CC2FC70CA4E | SHA256:33FAFDD37700ECE853AC83901FBEAB68A9A8E725B6B27DF6C65EDBF64767BE47 |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
388 | WINWORD.EXE | 104.31.65.68:443 | boua.pw | Cloudflare Inc | US | shared |
Domain | IP | Reputation |
---|---|---|
boua.pw |
| suspicious |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potentially Bad Traffic | ET DNS Query to a *.pw domain - Likely Hostile |
388 | WINWORD.EXE | Generic Protocol Command Decode | SURICATA STREAM excessive retransmissions |