| File name: | Microsoft Word.WsF |
| Full analysis: | https://app.any.run/tasks/87b4bfa9-d423-47cd-a867-47465118b1b8 |
| Verdict: | Malicious activity |
| Analysis date: | December 30, 2018, 10:46:44 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | text/html |
| File info: | HTML document, ASCII text, with very long lines, with CRLF line terminators |
| MD5: | 1D49B3390B1A8E565EBAAF19A99D0244 |
| SHA1: | FC775802117A90835292B13C14C18A9C6D10E04C |
| SHA256: | 78ACBDBB2DCF29926BD6E0981B2ECB5C082464D53041D9D1ADFF2DEACB89BB1F |
| SSDEEP: | 3072:DCRyUssx4MU6jildoRfC/FildPild784anNlcNH:GM |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 3068 | "C:\Windows\System32\WScript.exe" "C:\Users\admin\Desktop\Microsoft Word.WsF" | C:\Windows\System32\WScript.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
| 3628 | "C:\Windows\System32\wscript.exe" //D "C:\Users\admin\AppData\Roaming\Microsoft Office\\Microsoft Word.WsF" | C:\Windows\System32\wscript.exe | WScript.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 Modules
| |||||||||||||||
| (PID) Process: | (3068) WScript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft Word |
| Operation: | write | Name: | |
Value: FaLsE - 12/30/2018 | |||
| (PID) Process: | (3068) WScript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | Microsoft Word |
Value: wscript.exe //B "C:\Users\admin\AppData\Roaming\Microsoft Office\\Microsoft Word.WsF" | |||
| (PID) Process: | (3068) WScript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | Microsoft Word |
Value: wscript.exe //B "C:\Users\admin\AppData\Roaming\Microsoft Office\\Microsoft Word.WsF" | |||
| (PID) Process: | (3068) WScript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (3068) WScript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (3628) wscript.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | Microsoft Word |
Value: wscript.exe //B "C:\Users\admin\AppData\Roaming\Microsoft Office\\Microsoft Word.WsF" | |||
| (PID) Process: | (3628) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | Microsoft Word |
Value: wscript.exe //B "C:\Users\admin\AppData\Roaming\Microsoft Office\\Microsoft Word.WsF" | |||
| (PID) Process: | (3628) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (3628) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (3628) wscript.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wscript_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: 4294901760 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3068 | WScript.exe | C:\Users\admin\AppData\Roaming\Microsoft Office\Microsoft Word.WsF | html | |
MD5:1D49B3390B1A8E565EBAAF19A99D0244 | SHA256:78ACBDBB2DCF29926BD6E0981B2ECB5C082464D53041D9D1ADFF2DEACB89BB1F | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3628 | wscript.exe | 105.98.61.219:860 | maroco.linkpc.net | Telecom Algeria | DZ | malicious |
3628 | wscript.exe | 197.200.87.247:860 | maroco.myq-see.com | Telecom Algeria | DZ | unknown |
Domain | IP | Reputation |
|---|---|---|
maroco.linkpc.net |
| malicious |
dns.msftncsi.com |
| shared |
maroco.myq-see.com |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
1056 | svchost.exe | Potential Corporate Privacy Violation | ET INFO Observed DNS Query to .myq-see .com DDNS Domain |