File name: | 3d12eefe.docm |
Full analysis: | https://app.any.run/tasks/7503b5bb-e660-4548-8a1e-1756a2d58d28 |
Verdict: | Malicious activity |
Analysis date: | July 17, 2019, 11:35:56 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/vnd.openxmlformats-officedocument.wordprocessingml.document |
File info: | Microsoft Word 2007+ |
MD5: | 94CF83CC0B4C032BEC44D379328FF697 |
SHA1: | 3D12EEFEA8F9D238EB8FE8C647F1A789EDF2FC08 |
SHA256: | 58A81CB88C2A563CE75FDB70929E19076594900DDE3D2C4D2D75B53D60519C66 |
SSDEEP: | 3072:R6MZGLFUrELqNhSyTvnxNZdiI4HcVsX3Woa/AbEvJyEhqQtgbHdpC6bapaFD73:RQFUhNhzdRhOXmoPbEvbhlMdapcv |
.docm | | | Word Microsoft Office Open XML Format document (with Macro) (53.6) |
---|---|---|
.docx | | | Word Microsoft Office Open XML Format document (24.2) |
.zip | | | Open Packaging Conventions container (18) |
.zip | | | ZIP compressed archive (4.1) |
Creator: | - |
---|
ModifyDate: | 2019:07:15 10:02:00Z |
---|---|
CreateDate: | 2019:07:08 09:55:00Z |
RevisionNumber: | 1 |
LastModifiedBy: | - |
AppVersion: | 14 |
HyperlinksChanged: | No |
SharedDoc: | No |
CharactersWithSpaces: | 667790 |
LinksUpToDate: | No |
Company: | - |
TitlesOfParts: | - |
HeadingPairs: |
|
ScaleCrop: | No |
Paragraphs: | 1335 |
Lines: | 4743 |
DocSecurity: | None |
Application: | Microsoft Office Word |
Characters: | 569256 |
Words: | 99869 |
Pages: | 68 |
TotalEditTime: | - |
Template: | Normal.dotm |
ZipFileName: | [Content_Types].xml |
---|---|
ZipUncompressedSize: | 2645 |
ZipCompressedSize: | 501 |
ZipCRC: | 0xc6337d17 |
ZipModifyDate: | 1980:01:01 00:00:00 |
ZipCompression: | Deflated |
ZipBitFlag: | - |
ZipRequiredVersion: | 20 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3528 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\3d12eefe.docm" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 | ||||
3448 | "C:\Windows\System32\wscript.exe" /e:JScript "C:\Users\admin\Desktop\3d12eefe.~" | C:\Windows\System32\wscript.exe | — | WINWORD.EXE |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Version: 5.8.7600.16385 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3528 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRD08E.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3528 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C0E84437.png | — | |
MD5:— | SHA256:— | |||
3528 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{777D0FF7-8F70-45A0-983C-B60F22EA96DE}.tmp | — | |
MD5:— | SHA256:— | |||
3528 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{39230AFD-FC47-4FCA-92E0-AB0119050AD9}.tmp | — | |
MD5:— | SHA256:— | |||
3528 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{0CD68E4C-331D-4F00-9DE3-6AD8E937598B}.tmp | — | |
MD5:— | SHA256:— | |||
3528 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{39CBE937-52D0-49BD-B559-763534D07FFD}.tmp | — | |
MD5:— | SHA256:— | |||
3528 | WINWORD.EXE | C:\Users\admin\Desktop\3d12eefe.~ | text | |
MD5:A1BC6E5FF288373FD3A6307FCDEF0BE8 | SHA256:8FFEFFEF1ABB0E1F2D998EB873DC898BE9BE84E1074137CD3AE1009F628DBE5C | |||
3528 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dat | text | |
MD5:EF069F9E015246C96EB863E61F8EC150 | SHA256:39FBA5A82A919EA5C9A1068C318B3A05827ACCF8D211792DDF6655017C411264 | |||
3528 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\3d12eefe.docm.LNK | lnk | |
MD5:AF3EAFD10682B31CB14E30C5C10874F1 | SHA256:E422A33AB13CB6E0B6813CA8F2AB46D5D2A4B08A14526DB6295016B01D8AE6E8 | |||
3528 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:6EB736EAF792445F927DEB148D95468B | SHA256:72551BC19D7B7057DF5FC773BE7803717F6DE4B342F321FBE1B8A7078E5AE5DF |