File name: | 2e03f96ac52250b21bed4cda63bc1d7d8a12e5182a4eae59fc1e894423283f01.doc |
Full analysis: | https://app.any.run/tasks/9284bf87-df6a-4182-8491-754c50d12165 |
Verdict: | Malicious activity |
Threats: | Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold. |
Analysis date: | May 15, 2019, 07:35:58 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Author: Black Panther, Template: Normal.dotm, Last Saved By: doggy, Revision Number: 5, Name of Creating Application: Microsoft Office Word, Total Editing Time: 03:00, Create Time/Date: Tue May 14 22:15:00 2019, Last Saved Time/Date: Tue May 14 22:46:00 2019, Number of Pages: 1, Number of Words: 17, Number of Characters: 103, Security: 0 |
MD5: | A80AF34921C58947921B109EC1DC0094 |
SHA1: | B4E719FC583BC9EF8ED63BCAFB2B615AEAACC940 |
SHA256: | 2E03F96AC52250B21BED4CDA63BC1D7D8A12E5182A4EAE59FC1E894423283F01 |
SSDEEP: | 12288:kDquErHF6xC9D6DmR1J98w4oknqO/CyQf4TblfS3rygecr82yVLTASC/:prl6kD68JmlokQf4PlabygHyVLTAP/ |
.doc | | | Microsoft Word document (80) |
---|
CompObjUserType: | Microsoft Office Word 97-2003 Document |
---|---|
CompObjUserTypeLen: | 39 |
HeadingPairs: |
|
TitleOfParts: | - |
HyperlinksChanged: | No |
SharedDoc: | No |
LinksUpToDate: | No |
ScaleCrop: | No |
AppVersion: | 12 |
CharCountWithSpaces: | 119 |
Paragraphs: | 1 |
Lines: | 1 |
Company: | - |
CodePage: | Windows Latin 1 (Western European) |
Security: | None |
Characters: | 103 |
Words: | 17 |
Pages: | 1 |
ModifyDate: | 2019:05:14 21:46:00 |
CreateDate: | 2019:05:14 21:15:00 |
TotalEditTime: | 3.0 minutes |
Software: | Microsoft Office Word |
RevisionNumber: | 5 |
LastModifiedBy: | doggy |
Template: | Normal.dotm |
Keywords: | - |
Author: | Black Panther |
Subject: | - |
Title: | - |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3556 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\2e03f96ac52250b21bed4cda63bc1d7d8a12e5182a4eae59fc1e894423283f01.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
3372 | "C:\Users\admin\AppData\Local\Temp\Quotation.exe" | C:\Users\admin\AppData\Local\Temp\Quotation.exe | WINWORD.EXE | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
3972 | "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe | Quotation.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Assembly Registration Utility Exit code: 4294967295 Version: 2.0.50727.5420 (Win7SP1.050727-5400) | ||||
2360 | "C:\Users\admin\AppData\Local\Temp\Quotation.exe" | C:\Users\admin\AppData\Local\Temp\Quotation.exe | WINWORD.EXE | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
3512 | "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe | Quotation.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Assembly Registration Utility Version: 2.0.50727.5420 (Win7SP1.050727-5400) |
PID | Process | Filename | Type | |
---|---|---|---|---|
3556 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR3F4E.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3372 | Quotation.exe | C:\Users\admin\sppsvc\windeploy.exe | executable | |
MD5:493B863E7EBC277A4055EB05AC34C5B8 | SHA256:CCA3F4092757BA515E8F42972BF4B61DDFEF26A39167303CADBEC0726E23AE6E | |||
3556 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:FC364354350804BC97FCC9AEF07F32AD | SHA256:92F1088DD2889EF5A10207CF69EE4CBB09EE8339CF991F0014322B6A82C5C463 | |||
3556 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9DC8868D.emf | emf | |
MD5:A551703EE42AF6344BFBD76E010D7F8A | SHA256:D9EEEA36D7A0295914A1AE24CC6BCE014F47B70E02C8322B89C5C553CA5BD802 | |||
3556 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\Quotation.exe | executable | |
MD5:CDC08A162A3331DCB68E9CB8FE099143 | SHA256:591F350DBF69C064C1A5AE676722CF578A4DCE8155E9BEB7B4A70AF84DF63A5E | |||
3556 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$03f96ac52250b21bed4cda63bc1d7d8a12e5182a4eae59fc1e894423283f01.doc | pgc | |
MD5:35A22A794C19FA8034272C2CA26A7B14 | SHA256:BF6890A31413108EDDF523704A980E7C4DB6FC8FFFFD037732265B4922E53E46 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3972 | RegAsm.exe | GET | 200 | 34.233.102.38:80 | http://checkip.amazonaws.com/ | US | text | 12 b | shared |
3512 | RegAsm.exe | GET | 200 | 18.211.215.84:80 | http://checkip.amazonaws.com/ | US | text | 12 b | shared |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3512 | RegAsm.exe | 198.54.125.159:26 | mail.sonofgraceoffice.website | Namecheap, Inc. | US | malicious |
3972 | RegAsm.exe | 198.54.125.159:26 | mail.sonofgraceoffice.website | Namecheap, Inc. | US | malicious |
3972 | RegAsm.exe | 34.233.102.38:80 | checkip.amazonaws.com | Amazon.com, Inc. | US | shared |
3512 | RegAsm.exe | 18.211.215.84:80 | checkip.amazonaws.com | — | US | shared |
Domain | IP | Reputation |
---|---|---|
mail.sonofgraceoffice.website |
| malicious |
dns.msftncsi.com |
| shared |
checkip.amazonaws.com |
| shared |
PID | Process | Class | Message |
---|---|---|---|
3972 | RegAsm.exe | A Network Trojan was detected | MALWARE [PTsecurity] AgentTesla IP Check |
3512 | RegAsm.exe | Generic Protocol Command Decode | SURICATA Applayer Detect protocol only one direction |
3512 | RegAsm.exe | A Network Trojan was detected | MALWARE [PTsecurity] AgentTesla IP Check |
3512 | RegAsm.exe | A Network Trojan was detected | MALWARE [PTsecurity] Trojan-Spy.Keylogger.AgentTesla Exfiltration by SMTP |