File name: | ff4ae2216154de5eef71da9f74a29bba.docx |
Full analysis: | https://app.any.run/tasks/28bf7a16-378c-4dc4-98dd-31cd47320b46 |
Verdict: | Malicious activity |
Threats: | FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus. |
Analysis date: | April 15, 2019, 09:41:28 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/vnd.openxmlformats-officedocument.wordprocessingml.document |
File info: | Microsoft Word 2007+ |
MD5: | FF4AE2216154DE5EEF71DA9F74A29BBA |
SHA1: | FE96FB728A2CCDE92BC94563C133E34313A2A951 |
SHA256: | 75AEC42C50CBBD1CFF32051CA8669BC022780567D2A4552E32E484A272FF50AA |
SSDEEP: | 1536:SnQGJaid/jtmqAtXN+LuvWu8gce3/1CV9oBfX7NiJgB31yMMyrK/QPe:SQGp5swLZovQV9oNX4gBlyJyrfPe |
.docm | | | Word Microsoft Office Open XML Format document (with Macro) (53.6) |
---|---|---|
.docx | | | Word Microsoft Office Open XML Format document (24.2) |
.zip | | | Open Packaging Conventions container (18) |
.zip | | | ZIP compressed archive (4.1) |
Creator: | dood |
---|---|
Subject: | - |
Title: | - |
ModifyDate: | 2019:04:11 22:00:00Z |
---|---|
CreateDate: | 2019:04:11 22:00:00Z |
RevisionNumber: | 2 |
LastModifiedBy: | Admin |
Keywords: | - |
AppVersion: | 16 |
HyperlinksChanged: | No |
SharedDoc: | No |
CharactersWithSpaces: | 2 |
LinksUpToDate: | No |
Company: | home |
TitlesOfParts: | - |
HeadingPairs: |
|
ScaleCrop: | No |
Paragraphs: | 1 |
Lines: | 1 |
DocSecurity: | None |
Application: | Microsoft Office Word |
Characters: | 2 |
Words: | - |
Pages: | 1 |
TotalEditTime: | - |
Template: | Normal.dotm |
ZipFileName: | [Content_Types].xml |
---|---|
ZipUncompressedSize: | 1505 |
ZipCompressedSize: | 400 |
ZipCRC: | 0x0c0cc35b |
ZipModifyDate: | 1980:01:01 00:00:00 |
ZipCompression: | Deflated |
ZipBitFlag: | 0x0006 |
ZipRequiredVersion: | 20 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2668 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\ff4ae2216154de5eef71da9f74a29bba.docx" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 | ||||
1092 | "C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x401 | C:\Windows\system32\verclsid.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Extension CLSID Verification Host Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2596 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\ff4ae2216154de5eef71da9f74a29bba.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 | ||||
764 | C:\Users\admin\AppData\Local\Temp\CZz4nq.exe | C:\Users\admin\AppData\Local\Temp\CZz4nq.exe | — | WINWORD.EXE |
User: admin Company: Nexus Integrity Level: MEDIUM Description: Lines Website's March Vme64x Exit code: 3221225547 Version: 4.4.8.8 | ||||
852 | "C:\Windows\System32\autochk.exe" | C:\Windows\System32\autochk.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Auto Check Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
1500 | "C:\Windows\System32\autoconv.exe" | C:\Windows\System32\autoconv.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Auto File System Conversion Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
4060 | "C:\Windows\System32\autoconv.exe" | C:\Windows\System32\autoconv.exe | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Auto File System Conversion Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3640 | "C:\Windows\System32\taskhost.exe" | C:\Windows\System32\taskhost.exe | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Host Process for Windows Tasks Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3248 | /c del "C:\Users\admin\AppData\Local\Temp\CZz4nq.exe" | C:\Windows\System32\cmd.exe | — | taskhost.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
2036 | C:\Windows\Explorer.EXE | C:\Windows\explorer.exe | — | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
2668 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR62C3.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2668 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{877AC2F2-11E6-4C4F-8327-5988938B1FBD}.tmp | — | |
MD5:— | SHA256:— | |||
2596 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRADA7.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2596 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CZz4nq.pdf | — | |
MD5:— | SHA256:— | |||
2596 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FFD96FAF.jpeg | — | |
MD5:— | SHA256:— | |||
2596 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~DF98A813E4C9D249C1.TMP | — | |
MD5:— | SHA256:— | |||
2596 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~DF9DF457FADA7EC12C.TMP | — | |
MD5:— | SHA256:— | |||
2596 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{D7D9D739-81C8-45F4-A0F4-8C5E2534DD6B}.tmp | — | |
MD5:— | SHA256:— | |||
2596 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{176E0847-84BF-4CC2-8A2C-56737A4FAD4E}.tmp | — | |
MD5:— | SHA256:— | |||
2596 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~DF13EE8C692AAA4073.TMP | — | |
MD5:— | SHA256:— |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2036 | explorer.exe | GET | 404 | 199.192.22.83:80 | http://www.niveront.com/of/?t8OP1n=LqS6h7ZWBvvHTFX/POBRxZld4Lc6DH6lBdJoz9beWhlidT7o02E34rM8TwIfwZSkHC1VaA==&9rA4=K4Nh- | US | html | 326 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2036 | explorer.exe | 199.192.22.83:80 | www.niveront.com | — | US | malicious |
2596 | WINWORD.EXE | 47.254.172.117:443 | etraidersclub.info | Alibaba (China) Technology Co., Ltd. | US | malicious |
Domain | IP | Reputation |
---|---|---|
etraidersclub.info |
| malicious |
www.zmaraikoot.com |
| unknown |
www.niveront.com |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
2596 | WINWORD.EXE | Generic Protocol Command Decode | SURICATA STREAM excessive retransmissions |
2036 | explorer.exe | A Network Trojan was detected | MALWARE [PTsecurity] FormBook CnC Checkin (GET) |