URL: | http://malsample.php.xdomain.jp/test_files/CS_testmalware.doc |
Full analysis: | https://app.any.run/tasks/181d460d-1a5b-4571-9fe5-9ffaef042f9c |
Verdict: | Malicious activity |
Analysis date: | November 21, 2023, 03:44:34 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
SHA1: | 6F9246522D9905994657AD1CEC2BBBE7E7CEFEBC |
SHA256: | A840D2C41EB06AD2AC057E19F5A86727CD1ED46988CA1245C2510CF4B1C47E3B |
SSDEEP: | 3:N1KT1jabE/RR5KV/IG:C5ja+RW/IG |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
3128 | "C:\Program Files\Internet Explorer\iexplore.exe" "http://malsample.php.xdomain.jp/test_files/CS_testmalware.doc" | C:\Program Files\Internet Explorer\iexplore.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
3220 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3128 CREDAT:267521 /prefetch:2 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
3276 | "C:\Program Files\Windows Media Player\wmpnscfg.exe" | C:\Program Files\Windows Media Player\wmpnscfg.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Media Player Network Sharing Service Configuration Application Exit code: 0 Version: 12.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
3876 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 Modules
| |||||||||||||||
3648 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Embedding | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | WINWORD.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Word Version: 14.0.6024.1000 Modules
|
(PID) Process: | (3128) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
Operation: | write | Name: | NTPDaysSinceLastAutoMigration |
Value: 0 | |||
(PID) Process: | (3128) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
Operation: | write | Name: | NTPLastLaunchHighDateTime |
Value: 30847387 | |||
(PID) Process: | (3128) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
Operation: | write | Name: | NextCheckForUpdateHighDateTime |
Value: 30847437 | |||
(PID) Process: | (3128) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
(PID) Process: | (3128) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
(PID) Process: | (3128) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main |
Operation: | write | Name: | CompatibilityFlags |
Value: 0 | |||
(PID) Process: | (3128) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
(PID) Process: | (3128) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | IntranetName |
Value: 1 | |||
(PID) Process: | (3128) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
(PID) Process: | (3128) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
Operation: | write | Name: | AutoDetect |
Value: 0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3876 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRBCAD.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3128 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 | compressed | |
MD5:1BFE591A4FE3D91B03CDF26EAACD8F89 | SHA256:9CF94355051BF0F4A45724CA20D1CC02F76371B963AB7D1E38BD8997737B13D8 | |||
3128 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\favicon[1].ico | image | |
MD5:DA597791BE3B6E732F0BC8B20E38EE62 | SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07 | |||
3876 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD | binary | |
MD5:A66009E8B7AA61C3D6967ABE7BCF09F5 | SHA256:D538907B250A64561258ED471CABAD0CC67FEF1D54A9DA5518C887713B9B925C | |||
3128 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EAF8AA29A62AB29E614331747385D816_F9E4DC0B9D5C777357D7DB8DEF51118A | binary | |
MD5:6008FA1FFC567B365CC7EF84C064533F | SHA256:ACB78FE99B7438AB1EC0CF18C32766F56F1DCF57B913F8AE2BA0A629CBACE94D | |||
3876 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\{F811C8BE-60A4-4C4D-A0B4-6545B8DFE6E1} | binary | |
MD5:A66009E8B7AA61C3D6967ABE7BCF09F5 | SHA256:D538907B250A64561258ED471CABAD0CC67FEF1D54A9DA5518C887713B9B925C | |||
3128 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EAF8AA29A62AB29E614331747385D816_F9E4DC0B9D5C777357D7DB8DEF51118A | binary | |
MD5:7F7B103924C327BC049A219100CEB49D | SHA256:440FC727BAEBB9649492FCDC1489C901A87D41780DD173531C61A3B1C5660646 | |||
3876 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\OICE_3591D680-41DA-46C7-AF04-6D7B0BEC0E79.0\B457573C.doc | document | |
MD5:069FEB6C31C5D968745734E192F50FC7 | SHA256:A11DED2B00CFD88D1BD7FEA593C451F6EC040F88F02D8178ED5E977650D489EB | |||
3876 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF | binary | |
MD5:D471A0BB5F0B8A9AC834E0172491B7F9 | SHA256:418B6AE0A39787583DCD77DA0ED040F8C3DDA03410E71D04C235EE6E736F298F | |||
3876 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\OICE_3591D680-41DA-46C7-AF04-6D7B0BEC0E79.0\msoE4F6.tmp | compressed | |
MD5:36EFC18358A21A72BDD1D7281BF15634 | SHA256:0BC186AEE1BEB8B6448FA1B48CF4EB3BDB68BB5D8E381183CF28EB57931EF305 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3876 | WINWORD.EXE | OPTIONS | 200 | 157.112.147.23:80 | http://malsample.php.xdomain.jp/test_files/ | unknown | — | — | unknown |
3876 | WINWORD.EXE | HEAD | 200 | 157.112.147.23:80 | http://malsample.php.xdomain.jp/test_files/CS_testmalware.doc | unknown | — | — | unknown |
3876 | WINWORD.EXE | HEAD | 200 | 157.112.147.23:80 | http://malsample.php.xdomain.jp/test_files/CS_testmalware.doc | unknown | — | — | unknown |
828 | svchost.exe | PROPFIND | 301 | 157.112.147.23:80 | http://malsample.php.xdomain.jp/test_files | unknown | html | 251 b | unknown |
828 | svchost.exe | OPTIONS | 301 | 157.112.147.23:80 | http://malsample.php.xdomain.jp/test_files | unknown | html | 251 b | unknown |
828 | svchost.exe | PROPFIND | 301 | 157.112.147.23:80 | http://malsample.php.xdomain.jp/test_files | unknown | html | 251 b | unknown |
3220 | iexplore.exe | GET | 200 | 157.112.147.23:80 | http://malsample.php.xdomain.jp/test_files/CS_testmalware.doc | unknown | document | 41.5 Kb | unknown |
3128 | iexplore.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAzlnDD9eoNTLi0BRrMy%2BWU%3D | unknown | binary | 313 b | unknown |
3128 | iexplore.exe | GET | 200 | 23.50.131.216:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?da725366b68abe37 | unknown | compressed | 4.66 Kb | unknown |
828 | svchost.exe | PROPFIND | 405 | 157.112.147.23:80 | http://malsample.php.xdomain.jp/test_files/ | unknown | html | 237 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
3220 | iexplore.exe | 157.112.147.23:80 | malsample.php.xdomain.jp | Xserver Inc. | JP | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2588 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
3128 | iexplore.exe | 23.212.110.162:443 | www.bing.com | Akamai International B.V. | CZ | unknown |
3128 | iexplore.exe | 23.50.131.216:80 | ctldl.windowsupdate.com | Akamai International B.V. | DE | unknown |
3128 | iexplore.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
3876 | WINWORD.EXE | 157.112.147.23:80 | malsample.php.xdomain.jp | Xserver Inc. | JP | unknown |
828 | svchost.exe | 157.112.147.23:80 | malsample.php.xdomain.jp | Xserver Inc. | JP | unknown |
Domain | IP | Reputation |
---|---|---|
malsample.php.xdomain.jp |
| unknown |
api.bing.com |
| whitelisted |
www.bing.com |
| whitelisted |
ctldl.windowsupdate.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
iecvlist.microsoft.com |
| whitelisted |
r20swj13mr.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
3220 | iexplore.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Possible Office Doc with Embedded VBA Project (Wide) |
3220 | iexplore.exe | Potential Corporate Privacy Violation | ET POLICY Office Document Download Containing AutoOpen Macro |
3220 | iexplore.exe | Potentially Bad Traffic | ET HUNTING PowerShell DownloadString Command Common In Powershell Stagers |
3876 | WINWORD.EXE | Misc activity | ET USER_AGENTS Microsoft Office Existence Discovery User-Agent |