File name: | wow2.docm |
Full analysis: | https://app.any.run/tasks/15c3c89c-9451-48dd-8965-4bf368444b13 |
Verdict: | Malicious activity |
Analysis date: | July 17, 2019, 14:26:20 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/vnd.openxmlformats-officedocument.wordprocessingml.document |
File info: | Microsoft Word 2007+ |
MD5: | B572D785AF64EDA17DDC5D6AB5A4E150 |
SHA1: | BF8C29D9B564D556A8B0E95694AB3182739BECC7 |
SHA256: | 6768B0F27AD66E34F3D8FF0C580E6A99577B4682EEA8B8DC7DB3DD65F4D5FDA1 |
SSDEEP: | 3072:R6MZGLFUrELqNhSyTvnxNZdiI4HcVtIPeHdfRPNxBiMgIq5mav1QwItM5DxL+6f4:RQFUhNhzdRhUmHd14zX5mNLox1UX |
.docm | | | Word Microsoft Office Open XML Format document (with Macro) (53.6) |
---|---|---|
.docx | | | Word Microsoft Office Open XML Format document (24.2) |
.zip | | | Open Packaging Conventions container (18) |
.zip | | | ZIP compressed archive (4.1) |
Creator: | - |
---|
ModifyDate: | 2019:07:15 10:02:00Z |
---|---|
CreateDate: | 2019:07:08 09:55:00Z |
RevisionNumber: | 1 |
LastModifiedBy: | - |
AppVersion: | 14 |
HyperlinksChanged: | No |
SharedDoc: | No |
CharactersWithSpaces: | 667790 |
LinksUpToDate: | No |
Company: | - |
TitlesOfParts: | - |
HeadingPairs: |
|
ScaleCrop: | No |
Paragraphs: | 1335 |
Lines: | 4743 |
DocSecurity: | None |
Application: | Microsoft Office Word |
Characters: | 569256 |
Words: | 99869 |
Pages: | 68 |
TotalEditTime: | - |
Template: | Normal.dotm |
ZipFileName: | [Content_Types].xml |
---|---|
ZipUncompressedSize: | 2645 |
ZipCompressedSize: | 501 |
ZipCRC: | 0xc6337d17 |
ZipModifyDate: | 1980:01:01 00:00:00 |
ZipCompression: | Deflated |
ZipBitFlag: | - |
ZipRequiredVersion: | 20 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2976 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\wow2.docm" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 | ||||
2476 | "C:\Windows\System32\wscript.exe" /e:JScript "C:\Users\admin\Desktop\wow2.~" | C:\Windows\System32\wscript.exe | — | WINWORD.EXE |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Version: 5.8.7600.16385 |
(PID) Process: | (2976) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
Operation: | write | Name: | m< |
Value: 206D3C00A00B0000010000000000000000000000 | |||
(PID) Process: | (2976) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1033 |
Value: Off | |||
(PID) Process: | (2976) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
Operation: | write | Name: | 1033 |
Value: On | |||
(PID) Process: | (2976) WINWORD.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage |
Operation: | write | Name: | WORDFiles |
Value: 1324417054 | |||
(PID) Process: | (2976) WINWORD.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage |
Operation: | write | Name: | ProductFiles |
Value: 1324417168 | |||
(PID) Process: | (2976) WINWORD.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage |
Operation: | write | Name: | ProductFiles |
Value: 1324417169 | |||
(PID) Process: | (2976) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word |
Operation: | write | Name: | MTTT |
Value: A00B0000B29C7BADAB3CD50100000000 | |||
(PID) Process: | (2976) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
Operation: | write | Name: | vq< |
Value: 76713C00A00B000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000 | |||
(PID) Process: | (2976) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
Operation: | delete value | Name: | vq< |
Value: 76713C00A00B000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000 | |||
(PID) Process: | (2976) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2976 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR2911.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2976 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\630EEDD4.png | — | |
MD5:— | SHA256:— | |||
2976 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{1250C70C-AB5E-4AEA-9FEB-F2DD4D711B36}.tmp | — | |
MD5:— | SHA256:— | |||
2976 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{5AE950FA-FF64-49C1-80EB-C6B1B4A2849D}.tmp | — | |
MD5:— | SHA256:— | |||
2976 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E16F94C1-BE7D-4D8E-8C94-64AC64C25191}.tmp | — | |
MD5:— | SHA256:— | |||
2976 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{0E29CAD1-38F4-428E-8E87-8CC31554C17B}.tmp | — | |
MD5:— | SHA256:— | |||
2976 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\wow2.docm.LNK | lnk | |
MD5:BC2DB2D2DFFB820488F2B350E817590A | SHA256:D0811D6B90A1C5EF6CE120BDF017B1180535BAAA2A987EA587ACE1783D1B8634 | |||
2976 | WINWORD.EXE | C:\Users\admin\Desktop\wow2.~ | text | |
MD5:ECDBBA28C479FF2CB4F4A0E0B320B665 | SHA256:76AD7C39AA4C0D13D9641F84FCE38810C7B3447CB9CBC18BF15D6D3041890940 | |||
2976 | WINWORD.EXE | C:\Users\admin\Desktop\~$wow2.docm | pgc | |
MD5:8934233C1658F09B87A7F0835D25AF58 | SHA256:E7952AE99266A9870FC4C10B522CD3FA62FE8C3BF8F356D7C59E70C01B96B087 | |||
2976 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:E6229F63A1D9C1ABBAD3792B768786CB | SHA256:D8260AE6FC114BD1E57C27D086FD3398C12A191549C3B563FD0FD2DFD0AAE065 |