File name: | 1d395208d3f6327a0e00340925fcfbf7d9efb29318561b601f68c2321768d690.doc |
Full analysis: | https://app.any.run/tasks/edb72f49-0f9d-4bbd-861e-c8ad79240167 |
Verdict: | Malicious activity |
Threats: | Pony is a malware with two main functions — stealing information and dropping other viruses with different tasks on infected machines. It has been around since 2011, and it still actively attacks users in Europe and America. |
Analysis date: | June 17, 2019, 02:09:51 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Thu Mar 17 08:42:00 2016, Last Saved Time/Date: Thu Mar 17 12:58:00 2016, Number of Pages: 2, Number of Words: 6, Number of Characters: 36, Security: 0 |
MD5: | 9B7885A3B775A8943C0306D4EF45C822 |
SHA1: | CBB9C65373EDDBC1CA63ABE8D7E153E5567A5AA4 |
SHA256: | 1D395208D3F6327A0E00340925FCFBF7D9EFB29318561B601F68C2321768D690 |
SSDEEP: | 6144:0XLOlUWuacCJAZS814zj5FDrLESodkSYRJZcrFvM9MXOIXA:wLOmomE8CzfnLEOSYvsvM9MXON |
.doc | | | Microsoft Word document (35.9) |
---|---|---|
.xls | | | Microsoft Excel sheet (33.7) |
.doc | | | Microsoft Word document (old ver.) (21.3) |
CompObjUserType: | ???????? Microsoft Word 97-2003 |
---|---|
CompObjUserTypeLen: | 32 |
HeadingPairs: |
|
TitleOfParts: | - |
HyperlinksChanged: | No |
SharedDoc: | No |
LinksUpToDate: | No |
ScaleCrop: | No |
AppVersion: | 15 |
CharCountWithSpaces: | 41 |
Paragraphs: | 1 |
Lines: | 1 |
Company: | - |
CodePage: | Windows Cyrillic |
Security: | None |
Characters: | 36 |
Words: | 6 |
Pages: | 2 |
ModifyDate: | 2016:03:17 12:58:00 |
CreateDate: | 2016:03:17 08:42:00 |
TotalEditTime: | - |
Software: | Microsoft Office Word |
RevisionNumber: | 1 |
LastModifiedBy: | - |
Template: | Normal.dotm |
Comments: | - |
Keywords: | - |
Author: | - |
Subject: | - |
Title: | - |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2928 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\1d395208d3f6327a0e00340925fcfbf7d9efb29318561b601f68c2321768d690.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
3224 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | svchost.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 | ||||
3992 | C:\Users\admin\AppData\Local\Temp\at3.exe | C:\Users\admin\AppData\Local\Temp\at3.exe | WINWORD.EXE | |
User: admin Company: WebTweakTools.com Integrity Level: MEDIUM Description: Fast Link Checker Version: 2.2.0.608 | ||||
2356 | cmd /K | C:\Windows\system32\cmd.exe | — | at3.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) |
PID | Process | Filename | Type | |
---|---|---|---|---|
2928 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRE83B.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2928 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~WRD0000.tmp | — | |
MD5:— | SHA256:— | |||
2928 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\uuhhe.rtf | — | |
MD5:— | SHA256:— | |||
2928 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\99FA415B.emf | — | |
MD5:— | SHA256:— | |||
2928 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~WRD0001.tmp | — | |
MD5:— | SHA256:— | |||
2928 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\mozart.rtf | — | |
MD5:— | SHA256:— | |||
3224 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRFAAA.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3224 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRC0000.tmp | — | |
MD5:— | SHA256:— | |||
3224 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{555E6A40-C810-4197-BE8D-514C94AAA9CB}.tmp | — | |
MD5:— | SHA256:— | |||
3224 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{F6C13BF7-63EF-4705-9B4C-A3111108F8ED}.tmp | — | |
MD5:— | SHA256:— |
Domain | IP | Reputation |
---|---|---|
thattonsundwo.ru |
| unknown |
sinkeningde.ru |
| unknown |