File name: | Pensionskasse SHP_858151174_11.12.2018.docx |
Full analysis: | https://app.any.run/tasks/b23db689-8174-4c47-9085-17d4684ef902 |
Verdict: | Malicious activity |
Analysis date: | January 11, 2019, 08:13:45 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/zip |
File info: | Zip archive data, at least v2.0 to extract |
MD5: | 7EAB6D83E7AE505D9AEDDECFBD51972B |
SHA1: | 5DC30125F61AED479FD3A8F00178EAD0F9DBB7DC |
SHA256: | 9C73EB4894133262BF0094E865A9855B7278062D4792E657C96ABA009D0FCA75 |
SSDEEP: | 1536:j/ZSUZUCPuuBQoB9WEp20e5cvqbEOqefd6sAMEVycvjp3o6S4:j/ZZZnuymx0e6CbRd6pMrcve6S4 |
.docx | | | Word Microsoft Office Open XML Format document (52.2) |
---|---|---|
.zip | | | Open Packaging Conventions container (38.8) |
.zip | | | ZIP compressed archive (8.8) |
AppVersion: | 12 |
---|---|
Company: | Röhrdanz |
Manager: | Silvio Kuhl |
Paragraphs: | 388 |
Lines: | 4515 |
Application: | Microsoft Office Word |
CharactersWithSpaces: | 315237 |
Characters: | 315237 |
Words: | 24249 |
Pages: | 72 |
Template: | Normal |
Category: | deleniti |
ModifyDate: | 2018:12:08 17:21:01Z |
CreateDate: | 2018:12:08 17:21:01Z |
RevisionNumber: | 322092 |
LastModifiedBy: | Prof. Alice Kramer |
Keywords: | fugiat, esse, voluptatem |
Description: | Consequuntur accusamus quibusdam architecto rem perferendis laborum minima quae. |
---|---|
Creator: | Prof. Alice Kramer |
Subject: | Pensionskasse SHP N858151174 |
Title: | Pensionskasse SHP N858151174 |
ZipFileName: | word/document.xml |
---|---|
ZipUncompressedSize: | 6507 |
ZipCompressedSize: | 1430 |
ZipCRC: | 0x83f7eeea |
ZipModifyDate: | 2018:12:11 12:44:03 |
ZipCompression: | Deflated |
ZipBitFlag: | - |
ZipRequiredVersion: | 20 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2968 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Pensionskasse SHP_858151174_11.12.2018.docx" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
3064 | cmd /c ""C:\Users\admin\AppData\Local\Temp\Windowseigener Bildviewer.cmd" " | C:\Windows\system32\cmd.exe | — | WINWORD.EXE |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
3796 | C:\Windows\system32\cmd.exe /c powershell -w hidden -Command "(-join ((48..57)+(65..90)+(97..122) | Get-Random -Count (Get-Random -minimum 5 -maximum 15) | % {[char]$_}))" | C:\Windows\system32\cmd.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
4000 | powershell -w hidden -Command "(-join ((48..57)+(65..90)+(97..122) | Get-Random -Count (Get-Random -minimum 5 -maximum 15) | % {[char]$_}))" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3156 | powershell -WindowStyle hidden -c "[IO.File]::WriteAllBytes($env:IZEivcCTHc, [System.Convert]::FromBase64String([IO.File]::ReadAllText($env:IZEivcCTHc)));" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2228 | wscript C:\Users\admin\AppData\Local\Temp\IKqYxwfzUpy.js | C:\Windows\system32\wscript.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.8.7600.16385 | ||||
2880 | cmd /c ""C:\Users\admin\AppData\Local\Temp\Windowseigener Bildviewer.cmd" " | C:\Windows\system32\cmd.exe | — | WINWORD.EXE |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
3584 | C:\Windows\system32\cmd.exe /c powershell -w hidden -Command "(-join ((48..57)+(65..90)+(97..122) | Get-Random -Count (Get-Random -minimum 5 -maximum 15) | % {[char]$_}))" | C:\Windows\system32\cmd.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
3828 | powershell -w hidden -Command "(-join ((48..57)+(65..90)+(97..122) | Get-Random -Count (Get-Random -minimum 5 -maximum 15) | % {[char]$_}))" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3092 | powershell -WindowStyle hidden -c "[IO.File]::WriteAllBytes($env:IZEivcCTHc, [System.Convert]::FromBase64String([IO.File]::ReadAllText($env:IZEivcCTHc)));" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
2968 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR6707.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2968 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\mso691C.tmp | — | |
MD5:— | SHA256:— | |||
2968 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\557C7180.jpeg | — | |
MD5:— | SHA256:— | |||
4000 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ZDXIWT3AWA64R50BXPUR.temp | — | |
MD5:— | SHA256:— | |||
3156 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Q2RYGI2NMDVQC5T1HJDJ.temp | — | |
MD5:— | SHA256:— | |||
3828 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\KFUX8DG4IOTW369B7DO9.temp | — | |
MD5:— | SHA256:— | |||
2968 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\Windowseigener Bildviewer.cmd | text | |
MD5:32BCDA4CB80CDF09155667A4AB54E836 | SHA256:09F75B2BDA824C7BF09E74276F867995B0D8E6FC35303D75EB07BBE00402F4B8 | |||
4000 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:6073B6FC66D2E68644893344F6904E4A | SHA256:0F2F61C8DFC3A20C7A5E5133C19BA1493441440E5477254273F28F6F668E64B3 | |||
2968 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$nsionskasse SHP_858151174_11.12.2018.docx | pgc | |
MD5:D08137614A2233C8ADCB28730CA17A67 | SHA256:190D1924C3E00EB3144C683E9C6C3B84ED34066E81ED81BBC5CD8BB86705A65D | |||
3064 | cmd.exe | C:\Users\admin\AppData\Local\Temp\IKqYxwfzUpy.js | text | |
MD5:B054E692A525B31167B866C81ADE1F77 | SHA256:5D4159ED4F404A1D28B6DF3D533C9A4AF24E1508DB92E25F37ECA95C9279E8A3 |