File name: | bca533b3336240bc5cc68117408debdf |
Full analysis: | https://app.any.run/tasks/aa54600c-e6fb-449c-b30e-d224e59b402a |
Verdict: | Malicious activity |
Analysis date: | May 27, 2020, 07:27:41 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/vnd.openxmlformats-officedocument.wordprocessingml.document |
File info: | Microsoft Word 2007+ |
MD5: | BCA533B3336240BC5CC68117408DEBDF |
SHA1: | 608295F7C71F08327D720BD569BA0D2A2EBC08CD |
SHA256: | 73470EA496126133FD025CFA9B3599BEA9550ABE2C8D065DE11AFB6F7AA6B5DF |
SSDEEP: | 12288:8ivJsw94U3FOKRbjirZMzgmZ6+GvlccUzlMrXUYOmPUNQL3n:8nwyU3FJb4q69vl3xkYVPPn |
.docm | | | Word Microsoft Office Open XML Format document (with Macro) (53.6) |
---|---|---|
.docx | | | Word Microsoft Office Open XML Format document (24.2) |
.zip | | | Open Packaging Conventions container (18) |
.zip | | | ZIP compressed archive (4.1) |
Description: | - |
---|---|
Creator: | D3vle0 |
Subject: | - |
Title: | - |
ModifyDate: | 2020:05:26 07:20:00Z |
---|---|
CreateDate: | 2020:05:25 03:25:00Z |
RevisionNumber: | 7 |
LastModifiedBy: | user |
Keywords: | - |
AppVersion: | 15 |
HyperlinksChanged: | No |
SharedDoc: | No |
CharactersWithSpaces: | 4689 |
LinksUpToDate: | No |
Company: | - |
TitlesOfParts: | |
HeadingPairs: |
|
ScaleCrop: | No |
Paragraphs: | 9 |
Lines: | 33 |
DocSecurity: | None |
Application: | Microsoft Office Word |
Characters: | 3997 |
Words: | 701 |
Pages: | 5 |
TotalEditTime: | 5 minutes |
Template: | Normal.dotm |
ZipFileName: | [Content_Types].xml |
---|---|
ZipUncompressedSize: | 1453 |
ZipCompressedSize: | 391 |
ZipCRC: | 0x7aec387e |
ZipModifyDate: | 1980:01:01 00:00:00 |
ZipCompression: | Deflated |
ZipBitFlag: | 0x0006 |
ZipRequiredVersion: | 20 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
1764 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\bca533b3336240bc5cc68117408debdf.docm" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
1452 | "C:\Users\admin\AppData\Local\Temp\TRJ\SfsDllSample.exe" | C:\Users\admin\AppData\Local\Temp\TRJ\SfsDllSample.exe | WINWORD.EXE | |
User: admin Integrity Level: MEDIUM |
PID | Process | Filename | Type | |
---|---|---|---|---|
1764 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR1B93.tmp.cvr | — | |
MD5:— | SHA256:— | |||
1764 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~WRD0000.tmp | — | |
MD5:— | SHA256:— | |||
1764 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\VBE\MSForms.exd | tlb | |
MD5:249E50C0065952129ADE4CA17437D73B | SHA256:668F733A8C30D8EF4E1D17977A7A4420676AA6994120A53EA86C6C92052DE943 | |||
1764 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\bca533b3336240bc5cc68117408debdf.docm | document | |
MD5:4F0B8C581307CAAB5B816BD2E917BEDA | SHA256:E83DECD8CADE1CDFBAB94EA439EBC2597A4CAAB478A0291C670C8B661F6B4BC1 | |||
1764 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$a533b3336240bc5cc68117408debdf.docm | pgc | |
MD5:A8608AD81142C08996B7F9C32EEB3A5E | SHA256:E1B286031E0D42E1BEB3FD4E8E3E0BFFDC9349F5D1A20804A8910552758EAC70 | |||
1764 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:0828A64378CA4A06D7CF8EC2865D1131 | SHA256:1BA791A827CD80D5CFC7DD3B84743925AF853083A4BEA1049F2DD01F14DDB926 | |||
1764 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\TRJ\SfsDll32.dll | executable | |
MD5:327D8070A583BDECC349275B1F018DCE | SHA256:65433FD59C87ACB8D55EA4F90A47E07FEA86222795D015FE03FBA18717700849 | |||
1764 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\KHKERL | text | |
MD5:EBCA50CE82F29FB063E34BF766ED0807 | SHA256:3D8C94E909B06D51793AB2478AFBC4F5875CF3202E62D34C0DE5E074BE161DCC | |||
1764 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~WRL0001.tmp | document | |
MD5:4F0B8C581307CAAB5B816BD2E917BEDA | SHA256:E83DECD8CADE1CDFBAB94EA439EBC2597A4CAAB478A0291C670C8B661F6B4BC1 | |||
1764 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\TRJ\SfsDllSample.exe | executable | |
MD5:45FBD8574D9EEABDBDE01524B87560AA | SHA256:4F83DA50B194E370EAEE89AEA9866C8F8B39745E7718E6E72FDA85B8252C85F8 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
1452 | SfsDllSample.exe | POST | — | 103.27.184.27:80 | http://103.27.184.27/ | JP | — | — | malicious |
1452 | SfsDllSample.exe | POST | 200 | 103.27.184.27:80 | http://103.27.184.27/ | JP | text | 144 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
1452 | SfsDllSample.exe | 103.27.184.27:80 | — | Starry Network Limited | JP | malicious |
— | — | 103.27.184.27:80 | — | Starry Network Limited | JP | malicious |