File name: | e8e86359b06cefdc5c1115dacea21240aa090450e83744b495e784d8bff49a09.doc |
Full analysis: | https://app.any.run/tasks/2a2ef727-df66-42b3-8369-756de521c658 |
Verdict: | Malicious activity |
Analysis date: | June 12, 2019, 06:40:44 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | text/rtf |
File info: | Rich Text Format data, version 1, unknown character set |
MD5: | C65B73DDE66184BAE6EAD97AFD1B4C4B |
SHA1: | 638F986035BEE9EA1D651BA33DC508A2E697C1C6 |
SHA256: | E8E86359B06CEFDC5C1115DACEA21240AA090450E83744B495E784D8BFF49A09 |
SSDEEP: | 24576:Bl1BZlU+PGFDeI+D4DDSeGL2ba77E2a1YfmLT778dlCkRdO/EdBqCtZqC/saUtEc:Q |
.rtf | | | Rich Text Format (100) |
---|
InternalVersionNumber: | 32859 |
---|---|
CharactersWithSpaces: | - |
Characters: | - |
Words: | - |
Pages: | 1 |
TotalEditTime: | - |
RevisionNumber: | 1 |
ModifyDate: | 2018:04:23 01:01:00 |
CreateDate: | 2018:04:23 01:01:00 |
LastModifiedBy: | T |
Author: | T |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2572 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\e8e86359b06cefdc5c1115dacea21240aa090450e83744b495e784d8bff49a09.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
3580 | "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding | C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE | — | svchost.exe |
User: admin Company: Design Science, Inc. Integrity Level: MEDIUM Description: Microsoft Equation Editor Exit code: 0 Version: 00110900 | ||||
2136 | "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" | C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE | EQNEDT32.EXE | |
User: admin Company: Design Science, Inc. Integrity Level: MEDIUM Description: Microsoft Equation Editor Exit code: 0 Version: 00110900 | ||||
2476 | "C:\Users\admin\AppData\Roaming\IISWebClient\iassvcs.exe" | C:\Users\admin\AppData\Roaming\IISWebClient\iassvcs.exe | EQNEDT32.EXE | |
User: admin Company: Symantec Corporation Integrity Level: MEDIUM Description: Symantec 802.1x Supplicant Version: 11.0.4010.7 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2572 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRF941.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2572 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\8.t | binary | |
MD5:5566644877A28BD5A50CEE4D4E0D1916 | SHA256:FEE320D225317FD8179FCBF84DCE6F5945D71D6597C32D76C8CBD7816078D277 | |||
2572 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:17222E7BED955763CB75EBDA153E0074 | SHA256:EAEB163582F92B56C14963150DA7DBEA34565552F3D187A793BE19BEB0978882 | |||
2572 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B1AE31CF.wmf | wmf | |
MD5:82154D73906767D7B810864B32E3EBAD | SHA256:6FD66589D2ED5D42039174EA02F331F127EFEB166E61EA3558B0EA7A2B771A77 | |||
2572 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$e86359b06cefdc5c1115dacea21240aa090450e83744b495e784d8bff49a09.doc | pgc | |
MD5:D5539FBEB9A918FEC9125546B8449D40 | SHA256:5327F9C2FE9EEB5EC208CFC2F449A4B92CECC2608C2BD0D709F70334A20950AE | |||
2136 | EQNEDT32.EXE | C:\Users\admin\AppData\Roaming\IISWebClient\RasTls.dll | executable | |
MD5:0B86CC8E56A400F1ADEB1E7B6EBE6ABE | SHA256:E149E7C145D440193A0E3BF4B54C44DE00BBC3872EF18D6DA3C12F1E7ADD3053 | |||
2136 | EQNEDT32.EXE | C:\Users\admin\AppData\Roaming\IISWebClient\sqlite3.dll | executable | |
MD5:FEE0B982AF421FF8C16C0187B376B086 | SHA256:E342EEFB43249A3A1B62B8622F7C94FC391C0488BDAE7E1909E37CB125029F1C | |||
2136 | EQNEDT32.EXE | C:\Users\admin\AppData\Roaming\IISWebClient\iassvcs.exe | executable | |
MD5:62944E26B36B1DCACE429AE26BA66164 | SHA256:F9EBF6AEB3F0FB0C29BD8F3D652476CD1FE8BD9A0C11CB15C43DE33BBCE0BF68 |
Domain | IP | Reputation |
---|---|---|
youareexcellent.kozow.com |
| unknown |