File name: | zzz.doc |
Full analysis: | https://app.any.run/tasks/57f43375-a7ae-49c2-a27a-57f2b6c004d5 |
Verdict: | Malicious activity |
Analysis date: | January 11, 2019, 03:25:43 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/zip |
File info: | Zip archive data, at least v1.0 to extract |
MD5: | 16F7934A94BE5B4F9B89B2F47D027443 |
SHA1: | 2255B0645E1E0D04B016775D6F7DF8279237469A |
SHA256: | 64F064D7464DED74B9CE32B6944162637C900871BBCEB850C99A3E6004184F32 |
SSDEEP: | 98304:r4voNNYp3QYICj+sFbawa1CnA/X0Nwu9VdxqLgHhp4ztT21+nL:r4wYrz+MpaoA/X0nrqqhpcCYnL |
.docm | | | Word Microsoft Office Open XML Format document (with Macro) (53.6) |
---|---|---|
.docx | | | Word Microsoft Office Open XML Format document (24.2) |
.zip | | | Open Packaging Conventions container (18) |
.zip | | | ZIP compressed archive (4.1) |
Creator: | MFA |
---|
KSOProductBuildVer: | 2052-10.8.2.6837 |
---|---|
RevisionNumber: | 2 |
ModifyDate: | 2019:01:11 03:24:03Z |
LastModifiedBy: | test |
CreateDate: | 2019:01:08 05:59:00Z |
DocSecurity: | None |
Application: | WPS Office_10.8.2.6837_F1E327BC-269C-435d-A152-05C5408002CA |
CharactersWithSpaces: | 4 |
LinksUpToDate: | No |
ScaleCrop: | No |
TotalEditTime: | - |
Paragraphs: | 1 |
Lines: | 1 |
Characters: | 4 |
Words: | - |
Pages: | 2 |
Template: | Normal.dotm |
ZipFileName: | [Content_Types].xml |
---|---|
ZipUncompressedSize: | 1640 |
ZipCompressedSize: | 419 |
ZipCRC: | 0x68bd5b00 |
ZipModifyDate: | 2012:07:02 09:52:07 |
ZipCompression: | Deflated |
ZipBitFlag: | - |
ZipRequiredVersion: | 20 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3012 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\zzz.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
3944 | "C:\Windows\System32\cmd.exe" /k %Windir%\System32\reg.exe IMPORT %temp%\in.reg | C:\Windows\System32\cmd.exe | — | WINWORD.EXE |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
2360 | C:\Windows\System32\reg.exe IMPORT C:\Users\admin\AppData\Local\Temp\in.reg | C:\Windows\System32\reg.exe | cmd.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Registry Console Tool Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
(PID) Process: | (3012) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
Operation: | write | Name: | #j% |
Value: 236A2500C40B0000010000000000000000000000 | |||
(PID) Process: | (3012) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1033 |
Value: Off | |||
(PID) Process: | (3012) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1033 |
Value: On | |||
(PID) Process: | (3012) WINWORD.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage |
Operation: | write | Name: | WORDFiles |
Value: 1311440926 | |||
(PID) Process: | (3012) WINWORD.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage |
Operation: | write | Name: | ProductFiles |
Value: 1311441040 | |||
(PID) Process: | (3012) WINWORD.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage |
Operation: | write | Name: | ProductFiles |
Value: 1311441041 | |||
(PID) Process: | (3012) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word |
Operation: | write | Name: | MTTT |
Value: C40B00009AADA96D5DA9D40100000000 | |||
(PID) Process: | (3012) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
Operation: | write | Name: | 6l% |
Value: 366C2500C40B000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000 | |||
(PID) Process: | (3012) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
Operation: | delete value | Name: | 6l% |
Value: 366C2500C40B000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000 | |||
(PID) Process: | (3012) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3012 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRA1F3.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3012 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\613B540B\00000001 | — | |
MD5:— | SHA256:— | |||
3012 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$zzz.doc | pgc | |
MD5:9D660866B37F3EB70E83EA02CE798865 | SHA256:4332DF158C669C12B6AFF03A9CA7415253830B7128C367553C803937B4EBAEDE | |||
3012 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:540AC6B4CD21E1DB278B18332E545F9B | SHA256:EF7475851332108BDAF903C6A48DF64A0B4DE288C58E1FAB2A82F47F066E2CB1 | |||
3012 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\VBE\MSForms.exd | tlb | |
MD5:44B0545BDD327C652E6511EB7F2DF0DC | SHA256:EA9540B4132D3A2504153796B22DE71B8FC6E2EC7DBD4200E38C3636A669141F | |||
3012 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\in.reg | text | |
MD5:6C9A3219D61EC316717BEA7218DC2A44 | SHA256:7ADB3DA594685ACD7F00FBEBB700B9839573C3801EC11A375C1D7082AFDF439B | |||
3012 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\GoogleUpdate.exe | executable | |
MD5:D4259EB8E3B90AC08C9337DF84468E87 | SHA256:6EE79815F71E2EB4094455993472C7FB185CDE484C8B5326E4754ADCB1FAF78E |