File name: | info_11_28.doc |
Full analysis: | https://app.any.run/tasks/9199aa44-7d22-4df7-a0b6-2c66e0eaa2c3 |
Verdict: | Malicious activity |
Analysis date: | December 02, 2019, 19:29:48 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Title: Auto Formatter v1.2, Subject: Payslip auto formatter, Author: WAREHOUSECOMP1, Comments: Reference #6611, Template: Normal, Last Saved By: Windows, Revision Number: 7, Name of Creating Application: Microsoft Office Word, Total Editing Time: 01:00, Create Time/Date: Tue Aug 6 10:17:00 2019, Last Saved Time/Date: Thu Nov 28 10:40:00 2019, Number of Pages: 1, Number of Words: 0, Number of Characters: 1, Security: 0 |
MD5: | 6D1261105C8EB2A42CC29A9ACF1A0D55 |
SHA1: | 7234D8A9DC3D466063252A98F9DB87CD4F58B799 |
SHA256: | 64D82C4AC02E26CF1B1158D25BD818A12AB19C16AE2A21EED03ABEF951101C1E |
SSDEEP: | 6144:A/cs7MjyUaE9haC6d6sIiO1HWFgJmTOt31TTXJ9q:U37MjMd6sIiGgatRXK |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
CompObjUserType: | Microsoft Word 97-2003 Document |
---|---|
CompObjUserTypeLen: | 32 |
HeadingPairs: |
|
TitleOfParts: |
|
HyperlinksChanged: | No |
SharedDoc: | No |
LinksUpToDate: | No |
ScaleCrop: | No |
AppVersion: | 16 |
CharCountWithSpaces: | 1 |
Paragraphs: | 1 |
Lines: | 1 |
Bytes: | 27648 |
Company: | EasyLease LLC |
Manager: | Reuben Hegmann |
CodePage: | Windows Cyrillic |
Security: | None |
Characters: | 1 |
Words: | - |
Pages: | 1 |
ModifyDate: | 2019:11:28 10:40:00 |
CreateDate: | 2019:08:06 09:17:00 |
TotalEditTime: | 1.0 minutes |
Software: | Microsoft Office Word |
RevisionNumber: | 7 |
LastModifiedBy: | Пользователь Windows |
Template: | Normal |
Comments: | Reference #6611 |
Keywords: | - |
Author: | WAREHOUSECOMP1 |
Subject: | Payslip auto formatter |
Title: | Auto Formatter v1.2 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2748 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\info_11_28.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 | ||||
436 | "C:\Windows\System32\WScript.exe" "C:\Windows\Temp\ejjoulrnbz.js" | C:\Windows\System32\WScript.exe | WINWORD.EXE | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2748 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRA572.tmp.cvr | — | |
MD5:— | SHA256:— | |||
436 | WScript.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@avg[1].txt | — | |
MD5:— | SHA256:— | |||
436 | WScript.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@bitdefender[1].txt | — | |
MD5:— | SHA256:— | |||
2748 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~DF17F2B3BDDDD75650.TMP | — | |
MD5:— | SHA256:— | |||
2748 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~DF1DEFBC0C12856D58.TMP | — | |
MD5:— | SHA256:— | |||
2748 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~DFCFE5589F46EB6FD5.TMP | — | |
MD5:— | SHA256:— | |||
2748 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{12E8A178-4639-45A5-A2FD-E968BDF95BF7}.tmp | — | |
MD5:— | SHA256:— | |||
2748 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~DFBB9AEB5CBF8F87C4.TMP | — | |
MD5:— | SHA256:— | |||
2748 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{B4123668-C786-47B4-AA6D-DD12480EB64D}.tmp | — | |
MD5:— | SHA256:— | |||
2748 | WINWORD.EXE | C:\Users\admin\Desktop\~$fo_11_28.doc | pgc | |
MD5:7E878E484311D2B700E00A2292082EBE | SHA256:5B99C2A180167E7E395EE31BC296F029558D16BB566E64A76CC4603D9AF40404 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
436 | WScript.exe | GET | 404 | 178.57.216.85:80 | http://colocecarc.com/curoix/jotask.php?l=apitzy6.cab | RU | — | — | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
436 | WScript.exe | 178.57.216.85:80 | colocecarc.com | Internet-Hosting Ltd | RU | suspicious |
436 | WScript.exe | 52.21.69.82:443 | www.eset.com | Amazon.com, Inc. | US | unknown |
436 | WScript.exe | 104.109.85.142:443 | www.avg.com | Akamai International B.V. | NL | whitelisted |
436 | WScript.exe | 104.18.168.222:443 | www.bitdefender.com | Cloudflare Inc | US | shared |
Domain | IP | Reputation |
---|---|---|
www.avg.com |
| whitelisted |
www.bitdefender.com |
| suspicious |
www.eset.com |
| whitelisted |
colocecarc.com |
| unknown |