| URL: | http://malsample.php.xdomain.jp/test_files/CS_testmalware.doc |
| Full analysis: | https://app.any.run/tasks/181d460d-1a5b-4571-9fe5-9ffaef042f9c |
| Verdict: | Malicious activity |
| Analysis date: | November 21, 2023, 03:44:34 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| SHA1: | 6F9246522D9905994657AD1CEC2BBBE7E7CEFEBC |
| SHA256: | A840D2C41EB06AD2AC057E19F5A86727CD1ED46988CA1245C2510CF4B1C47E3B |
| SSDEEP: | 3:N1KT1jabE/RR5KV/IG:C5ja+RW/IG |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 3128 | "C:\Program Files\Internet Explorer\iexplore.exe" "http://malsample.php.xdomain.jp/test_files/CS_testmalware.doc" | C:\Program Files\Internet Explorer\iexplore.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 0 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| 3220 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3128 CREDAT:267521 /prefetch:2 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Exit code: 0 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| 3276 | "C:\Program Files\Windows Media Player\wmpnscfg.exe" | C:\Program Files\Windows Media Player\wmpnscfg.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Media Player Network Sharing Service Configuration Application Exit code: 0 Version: 12.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3648 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Embedding | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | WINWORD.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 Modules
| |||||||||||||||
| 3876 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 Modules
| |||||||||||||||
| (PID) Process: | (3128) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
| Operation: | write | Name: | NTPDaysSinceLastAutoMigration |
Value: 0 | |||
| (PID) Process: | (3128) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing |
| Operation: | write | Name: | NTPLastLaunchHighDateTime |
Value: 30847387 | |||
| (PID) Process: | (3128) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager |
| Operation: | write | Name: | NextCheckForUpdateHighDateTime |
Value: 30847437 | |||
| (PID) Process: | (3128) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (3128) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (3128) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main |
| Operation: | write | Name: | CompatibilityFlags |
Value: 0 | |||
| (PID) Process: | (3128) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (3128) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (3128) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (3128) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3876 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRBCAD.tmp.cvr | — | |
MD5:— | SHA256:— | |||
| 3876 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | binary | |
MD5:6768CF3000802121AB2AB5E5687203D2 | SHA256:BB168FF7143BAA1D6665EE27B166C79028F42085C398A07A9AABD7B648F2ADE2 | |||
| 3876 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD | binary | |
MD5:A66009E8B7AA61C3D6967ABE7BCF09F5 | SHA256:D538907B250A64561258ED471CABAD0CC67FEF1D54A9DA5518C887713B9B925C | |||
| 3128 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 | compressed | |
MD5:1BFE591A4FE3D91B03CDF26EAACD8F89 | SHA256:9CF94355051BF0F4A45724CA20D1CC02F76371B963AB7D1E38BD8997737B13D8 | |||
| 3876 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF | binary | |
MD5:D471A0BB5F0B8A9AC834E0172491B7F9 | SHA256:418B6AE0A39787583DCD77DA0ED040F8C3DDA03410E71D04C235EE6E736F298F | |||
| 3128 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EAF8AA29A62AB29E614331747385D816_F9E4DC0B9D5C777357D7DB8DEF51118A | binary | |
MD5:6008FA1FFC567B365CC7EF84C064533F | SHA256:ACB78FE99B7438AB1EC0CF18C32766F56F1DCF57B913F8AE2BA0A629CBACE94D | |||
| 3876 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\{CF133426-49FE-4F78-9B8C-9200FE001389} | binary | |
MD5:A29B8550147BCBC707BDF0F8B6ABA839 | SHA256:2372C61D7041E1FDED418F22E5CEF0FC7B2184FC1F5022F53F31D401DBE0A55B | |||
| 3128 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\favicon[2].ico | image | |
MD5:DA597791BE3B6E732F0BC8B20E38EE62 | SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07 | |||
| 3128 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\favicon[1].ico | image | |
MD5:DA597791BE3B6E732F0BC8B20E38EE62 | SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07 | |||
| 3876 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{FED8E05F-1A74-452A-B8BD-8EABF0B0829E}.FSD | binary | |
MD5:AC4A528282E0AB3D926B2EE37CE76DB4 | SHA256:59ACCFEE6306B1411A6881C126A1FD6CA82CAD4E93B798C0691DD91469333FA5 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3876 | WINWORD.EXE | OPTIONS | 200 | 157.112.147.23:80 | http://malsample.php.xdomain.jp/test_files/ | JP | — | — | unknown |
3876 | WINWORD.EXE | HEAD | 200 | 157.112.147.23:80 | http://malsample.php.xdomain.jp/test_files/CS_testmalware.doc | JP | — | — | unknown |
3876 | WINWORD.EXE | HEAD | 200 | 157.112.147.23:80 | http://malsample.php.xdomain.jp/test_files/CS_testmalware.doc | JP | — | — | unknown |
3220 | iexplore.exe | GET | 200 | 157.112.147.23:80 | http://malsample.php.xdomain.jp/test_files/CS_testmalware.doc | JP | document | 41.5 Kb | unknown |
3128 | iexplore.exe | GET | 200 | 23.50.131.216:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?da725366b68abe37 | DE | compressed | 4.66 Kb | unknown |
828 | svchost.exe | PROPFIND | 405 | 157.112.147.23:80 | http://malsample.php.xdomain.jp/test_files/ | JP | html | 237 b | unknown |
3128 | iexplore.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAzlnDD9eoNTLi0BRrMy%2BWU%3D | US | binary | 313 b | unknown |
828 | svchost.exe | OPTIONS | 301 | 157.112.147.23:80 | http://malsample.php.xdomain.jp/test_files | JP | html | 251 b | unknown |
828 | svchost.exe | OPTIONS | 200 | 157.112.147.23:80 | http://malsample.php.xdomain.jp/test_files/ | JP | html | 251 b | unknown |
828 | svchost.exe | PROPFIND | 301 | 157.112.147.23:80 | http://malsample.php.xdomain.jp/test_files | JP | html | 251 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
3220 | iexplore.exe | 157.112.147.23:80 | malsample.php.xdomain.jp | Xserver Inc. | JP | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2588 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
3128 | iexplore.exe | 23.212.110.162:443 | www.bing.com | Akamai International B.V. | CZ | unknown |
3128 | iexplore.exe | 23.50.131.216:80 | ctldl.windowsupdate.com | Akamai International B.V. | DE | unknown |
3128 | iexplore.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
3876 | WINWORD.EXE | 157.112.147.23:80 | malsample.php.xdomain.jp | Xserver Inc. | JP | unknown |
828 | svchost.exe | 157.112.147.23:80 | malsample.php.xdomain.jp | Xserver Inc. | JP | unknown |
Domain | IP | Reputation |
|---|---|---|
malsample.php.xdomain.jp |
| unknown |
api.bing.com |
| whitelisted |
www.bing.com |
| whitelisted |
ctldl.windowsupdate.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
iecvlist.microsoft.com |
| whitelisted |
r20swj13mr.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
3220 | iexplore.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Possible Office Doc with Embedded VBA Project (Wide) |
3220 | iexplore.exe | Potential Corporate Privacy Violation | ET POLICY Office Document Download Containing AutoOpen Macro |
3220 | iexplore.exe | Potentially Bad Traffic | ET HUNTING PowerShell DownloadString Command Common In Powershell Stagers |
3876 | WINWORD.EXE | Misc activity | ET USER_AGENTS Microsoft Office Existence Discovery User-Agent |