URL Details

URL
http://luceidclfbuq.com/

Score

This url shows some signs of potential malicious behavior.

The score of this url is 1.6 out of 10.

Please notice: The scoring system is currently still in development and should be considered an alpha feature.

Information on Execution

Category Started Completed Duration Logs
URL March 6, 2019, 5:52 a.m. March 6, 2019, 5:59 a.m. 392 seconds

Machine

Name Label Started On Shutdown On
winxpsp3x86 winxpsp3x86 2019-03-06 05:52:56 2019-03-06 05:59:28

Analyzer Log

2019-03-06 13:52:51,000 [analyzer] DEBUG: Starting analyzer from: C:\mkdeu
2019-03-06 13:52:51,015 [analyzer] DEBUG: Pipe server name: \\.\PIPE\VALqxQXXzOYuumENgDGbrOhnL
2019-03-06 13:52:51,015 [analyzer] DEBUG: Log pipe server name: \\.\PIPE\mtAiWZugaRmhDQPipfDJvRHyZWwC
2019-03-06 13:52:53,828 [analyzer] DEBUG: Started auxiliary module Disguise
2019-03-06 13:52:53,967 [analyzer] WARNING: Unable to find the correct offsets for functions of: 32-bit kernel32.dll (with timestamp 0x4802a12c)
2019-03-06 13:52:53,967 [analyzer] WARNING: Unable to find the correct offsets for functions of: 32-bit kernel32.dll (with timestamp 0x4802a12c)
2019-03-06 13:52:54,030 [analyzer] DEBUG: Loaded monitor into process with pid 700
2019-03-06 13:52:54,030 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets
2019-03-06 13:52:54,030 [analyzer] DEBUG: Started auxiliary module Human
2019-03-06 13:52:54,030 [analyzer] DEBUG: Started auxiliary module InstallCertificate
2019-03-06 13:52:54,030 [analyzer] DEBUG: Started auxiliary module Reboot
2019-03-06 13:52:54,250 [analyzer] DEBUG: Started auxiliary module RecentFiles
2019-03-06 13:52:54,250 [analyzer] DEBUG: Started auxiliary module Screenshots
2019-03-06 13:52:54,500 [lib.api.process] INFO: Successfully executed process from path 'C:\\Program Files\\Microsoft Office\\Office12\\WINWORD.EXE' with arguments ['http://luceidclfbuq.com/'] and pid 1632
2019-03-06 13:52:54,578 [analyzer] WARNING: Unable to find the correct offsets for functions of: 32-bit kernel32.dll (with timestamp 0x4802a12c)
2019-03-06 13:52:54,578 [analyzer] WARNING: Unable to find the correct offsets for functions of: 32-bit kernel32.dll (with timestamp 0x4802a12c)
2019-03-06 13:52:54,640 [analyzer] DEBUG: Loaded monitor into process with pid 1632
2019-03-06 13:52:55,828 [analyzer] INFO: Added new file to list with pid 1632 and path C:\Documents and Settings\All Users\Application Data\Microsoft\OFFICE\DATA\opa12.dat
2019-03-06 13:52:57,250 [analyzer] INFO: Added new file to list with pid 1632 and path C:\Documents and Settings\zamen\Application Data\Microsoft\Office\MSO1033.acl
2019-03-06 13:52:57,921 [analyzer] INFO: Added new file to list with pid 1632 and path \Device\NamedPipe\lsass
2019-03-06 13:52:58,108 [analyzer] INFO: Added new file to list with pid 1632 and path \Device\NamedPipe\ROUTER
2019-03-06 13:53:13,500 [analyzer] CRITICAL: Encountered an unknown process while in monitoring mode: /S /C {BDEADF00-C265-11D0-BCED-00A0C90AB50F} /I {000214E6-0000-0000-C000-000000000046} /X 0x401!
2019-03-06 13:53:13,578 [analyzer] INFO: Injected into process with pid 1616 and name u'verclsid.exe'
2019-03-06 13:53:13,687 [analyzer] WARNING: Unable to find the correct offsets for functions of: 32-bit kernel32.dll (with timestamp 0x4802a12c)
2019-03-06 13:53:13,687 [analyzer] WARNING: Unable to find the correct offsets for functions of: 32-bit kernel32.dll (with timestamp 0x4802a12c)
2019-03-06 13:53:13,812 [analyzer] DEBUG: Loaded monitor into process with pid 1616
2019-03-06 13:53:58,687 [lib.api.process] INFO: Memory dump of process with pid 1616 completed
2019-03-06 13:53:59,328 [analyzer] INFO: Process with pid 1616 has terminated
2019-03-06 13:54:29,905 [analyzer] INFO: Added new file to list with pid 1632 and path C:\Documents and Settings\zamen\Application Data\Microsoft\Document Building Blocks\1033\Building Blocks.dotx
2019-03-06 13:54:30,015 [analyzer] INFO: Added new file to list with pid 1632 and path C:\Documents and Settings\zamen\Application Data\Microsoft\Document Building Blocks\1033\~$ilding Blocks.dotx
2019-03-06 13:54:30,828 [analyzer] INFO: Added new file to list with pid 1632 and path C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\95643AFE.gif
2019-03-06 13:54:30,937 [analyzer] INFO: Added new file to list with pid 1632 and path C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\486632E7.gif
2019-03-06 13:54:31,046 [analyzer] INFO: Added new file to list with pid 1632 and path C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.Word\~WRS{BCFF14BA-6C65-4247-9F73-072EDF3A099A}.tmp
2019-03-06 13:54:31,140 [analyzer] INFO: Added new file to list with pid 1632 and path C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.Word\~WRS{A7BA3B45-6AD4-44CB-973E-7BF4E8650BB8}.tmp
2019-03-06 13:54:31,155 [analyzer] INFO: Added new file to list with pid 1632 and path C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\5E079FBC.gif
2019-03-06 13:54:31,203 [analyzer] INFO: Added new file to list with pid 1632 and path C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.Word\~WRS{2C2B022F-2C9B-41F1-8F5C-8B39957FBE8A}.tmp
2019-03-06 13:54:31,280 [analyzer] INFO: Added new file to list with pid 1632 and path C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\6964048D.gif
2019-03-06 13:54:31,515 [analyzer] INFO: Added new file to list with pid 1632 and path C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\A5A9692A.gif
2019-03-06 13:54:31,671 [analyzer] INFO: Added new file to list with pid 1632 and path C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\2E9B1323.jpeg
2019-03-06 13:54:31,750 [analyzer] INFO: Added new file to list with pid 1632 and path C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\mso1.tmp
2019-03-06 13:54:31,765 [analyzer] INFO: Added new file to list with pid 1632 and path C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\mso2.tmp
2019-03-06 13:54:34,015 [analyzer] INFO: Added new file to list with pid 1632 and path C:\Documents and Settings\zamen\Application Data\Microsoft\UProof\CUSTOM.DIC
2019-03-06 13:57:06,358 [analyzer] INFO: Analysis timeout hit, terminating analysis.
2019-03-06 13:57:55,733 [analyzer] INFO: Added new file to list with pid 1632 and path \Device\NamedPipe\wkssvc
2019-03-06 13:58:41,592 [lib.api.process] INFO: Memory dump of process with pid 1632 completed
2019-03-06 13:58:41,592 [analyzer] INFO: Terminating remaining processes before shutdown.
2019-03-06 13:58:41,592 [lib.api.process] INFO: Successfully terminated process with pid 1632.
2019-03-06 13:58:41,592 [analyzer] WARNING: File at path "u'\\device\\namedpipe\\lsass'" does not exist, skip.
2019-03-06 13:58:41,592 [analyzer] WARNING: File at path "u'\\device\\namedpipe\\router'" does not exist, skip.
2019-03-06 13:58:41,592 [analyzer] WARNING: File at path "u'c:\\documents and settings\\zamen\\local settings\\temporary internet files\\content.mso\\95643afe.gif'" does not exist, skip.
2019-03-06 13:58:41,640 [analyzer] WARNING: File at path "u'\\device\\namedpipe\\wkssvc'" does not exist, skip.
2019-03-06 13:58:41,640 [analyzer] WARNING: File at path "u'c:\\documents and settings\\zamen\\local settings\\temporary internet files\\content.mso\\6964048d.gif'" does not exist, skip.
2019-03-06 13:58:41,640 [analyzer] WARNING: File at path "u'c:\\documents and settings\\zamen\\local settings\\temporary internet files\\content.mso\\486632e7.gif'" does not exist, skip.
2019-03-06 13:58:41,640 [analyzer] WARNING: File at path "u'c:\\documents and settings\\zamen\\local settings\\temporary internet files\\content.mso\\2e9b1323.jpeg'" does not exist, skip.
2019-03-06 13:58:41,640 [analyzer] INFO: Error dumping file from path "c:\documents and settings\zamen\local settings\temporary internet files\content.mso\mso1.tmp": [Errno 13] Permission denied: u'c:\\documents and settings\\zamen\\local settings\\temporary internet files\\content.mso\\mso1.tmp'
2019-03-06 13:58:41,655 [analyzer] WARNING: File at path "u'c:\\documents and settings\\zamen\\local settings\\temporary internet files\\content.mso\\5e079fbc.gif'" does not exist, skip.
2019-03-06 13:58:41,655 [analyzer] INFO: Error dumping file from path "c:\documents and settings\zamen\local settings\temporary internet files\content.mso\mso2.tmp": [Errno 13] Permission denied: u'c:\\documents and settings\\zamen\\local settings\\temporary internet files\\content.mso\\mso2.tmp'
2019-03-06 13:58:42,358 [analyzer] WARNING: File at path "u'c:\\documents and settings\\zamen\\local settings\\temporary internet files\\content.mso\\a5a9692a.gif'" does not exist, skip.
2019-03-06 13:58:42,358 [analyzer] INFO: Analysis completed.

Cuckoo Log

2019-03-06 05:52:56,484 [lib.cuckoo.core.scheduler] INFO: Task #1371: acquired machine winxpsp3x86 (label=winxpsp3x86)
2019-03-06 05:52:56,507 [modules.auxiliary.sniffer] INFO: Started sniffer with PID 1802 (interface=eth2, host=192.168.128.101, pcap=/opt/cuckoo/storage/analyses/1371/dump.pcap)
2019-03-06 05:53:31,266 [lib.cuckoo.core.guest] INFO: Starting analysis on guest (id=winxpsp3x86, ip=192.168.128.101)
2019-03-06 05:59:10,176 [lib.cuckoo.core.resultserver] WARNING: Uploaded file length larger than upload_max_size, stopping upload.
2019-03-06 05:59:26,754 [lib.cuckoo.core.guest] INFO: winxpsp3x86: analysis completed successfully
2019-03-06 06:00:50,111 [lib.cuckoo.core.plugins] WARNING: The processing module "Suricata" returned the following error: Unable to locate Suricata binary
2019-03-06 06:00:51,712 [elasticsearch] WARNING: HEAD http://127.0.0.1:9200/_template/cuckoo_template [status:N/A request:0.000s]
Traceback (most recent call last):
  File "/usr/local/lib/python2.7/dist-packages/elasticsearch/connection/http_urllib3.py", line 94, in perform_request
    response = self.pool.urlopen(method, url, body, retries=False, headers=self.headers, **kw)
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py", line 643, in urlopen
    _stacktrace=sys.exc_info()[2])
  File "/usr/local/lib/python2.7/dist-packages/urllib3/util/retry.py", line 251, in increment
    raise six.reraise(type(error), error, _stacktrace)
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py", line 594, in urlopen
    chunked=chunked)
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py", line 361, in _make_request
    conn.request(method, url, **httplib_request_kw)
  File "/usr/lib/python2.7/httplib.py", line 1017, in request
    self._send_request(method, url, body, headers)
  File "/usr/lib/python2.7/httplib.py", line 1051, in _send_request
    self.endheaders(body)
  File "/usr/lib/python2.7/httplib.py", line 1013, in endheaders
    self._send_output(message_body)
  File "/usr/lib/python2.7/httplib.py", line 864, in _send_output
    self.send(msg)
  File "/usr/lib/python2.7/httplib.py", line 826, in send
    self.connect()
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connection.py", line 163, in connect
    conn = self._new_conn()
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connection.py", line 147, in _new_conn
    self, "Failed to establish a new connection: %s" % e)
NewConnectionError: <urllib3.connection.HTTPConnection object at 0x7f937c7be290>: Failed to establish a new connection: [Errno 111] Connection refused
2019-03-06 06:00:51,713 [elasticsearch] WARNING: HEAD http://127.0.0.1:9200/_template/cuckoo_template [status:N/A request:0.000s]
Traceback (most recent call last):
  File "/usr/local/lib/python2.7/dist-packages/elasticsearch/connection/http_urllib3.py", line 94, in perform_request
    response = self.pool.urlopen(method, url, body, retries=False, headers=self.headers, **kw)
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py", line 643, in urlopen
    _stacktrace=sys.exc_info()[2])
  File "/usr/local/lib/python2.7/dist-packages/urllib3/util/retry.py", line 251, in increment
    raise six.reraise(type(error), error, _stacktrace)
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py", line 594, in urlopen
    chunked=chunked)
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py", line 361, in _make_request
    conn.request(method, url, **httplib_request_kw)
  File "/usr/lib/python2.7/httplib.py", line 1017, in request
    self._send_request(method, url, body, headers)
  File "/usr/lib/python2.7/httplib.py", line 1051, in _send_request
    self.endheaders(body)
  File "/usr/lib/python2.7/httplib.py", line 1013, in endheaders
    self._send_output(message_body)
  File "/usr/lib/python2.7/httplib.py", line 864, in _send_output
    self.send(msg)
  File "/usr/lib/python2.7/httplib.py", line 826, in send
    self.connect()
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connection.py", line 163, in connect
    conn = self._new_conn()
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connection.py", line 147, in _new_conn
    self, "Failed to establish a new connection: %s" % e)
NewConnectionError: <urllib3.connection.HTTPConnection object at 0x7f937c7be090>: Failed to establish a new connection: [Errno 111] Connection refused
2019-03-06 06:00:51,713 [elasticsearch] WARNING: HEAD http://127.0.0.1:9200/_template/cuckoo_template [status:N/A request:0.000s]
Traceback (most recent call last):
  File "/usr/local/lib/python2.7/dist-packages/elasticsearch/connection/http_urllib3.py", line 94, in perform_request
    response = self.pool.urlopen(method, url, body, retries=False, headers=self.headers, **kw)
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py", line 643, in urlopen
    _stacktrace=sys.exc_info()[2])
  File "/usr/local/lib/python2.7/dist-packages/urllib3/util/retry.py", line 251, in increment
    raise six.reraise(type(error), error, _stacktrace)
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py", line 594, in urlopen
    chunked=chunked)
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py", line 361, in _make_request
    conn.request(method, url, **httplib_request_kw)
  File "/usr/lib/python2.7/httplib.py", line 1017, in request
    self._send_request(method, url, body, headers)
  File "/usr/lib/python2.7/httplib.py", line 1051, in _send_request
    self.endheaders(body)
  File "/usr/lib/python2.7/httplib.py", line 1013, in endheaders
    self._send_output(message_body)
  File "/usr/lib/python2.7/httplib.py", line 864, in _send_output
    self.send(msg)
  File "/usr/lib/python2.7/httplib.py", line 826, in send
    self.connect()
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connection.py", line 163, in connect
    conn = self._new_conn()
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connection.py", line 147, in _new_conn
    self, "Failed to establish a new connection: %s" % e)
NewConnectionError: <urllib3.connection.HTTPConnection object at 0x7f937c7be9d0>: Failed to establish a new connection: [Errno 111] Connection refused
2019-03-06 06:00:51,714 [elasticsearch] WARNING: HEAD http://127.0.0.1:9200/_template/cuckoo_template [status:N/A request:0.000s]
Traceback (most recent call last):
  File "/usr/local/lib/python2.7/dist-packages/elasticsearch/connection/http_urllib3.py", line 94, in perform_request
    response = self.pool.urlopen(method, url, body, retries=False, headers=self.headers, **kw)
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py", line 643, in urlopen
    _stacktrace=sys.exc_info()[2])
  File "/usr/local/lib/python2.7/dist-packages/urllib3/util/retry.py", line 251, in increment
    raise six.reraise(type(error), error, _stacktrace)
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py", line 594, in urlopen
    chunked=chunked)
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py", line 361, in _make_request
    conn.request(method, url, **httplib_request_kw)
  File "/usr/lib/python2.7/httplib.py", line 1017, in request
    self._send_request(method, url, body, headers)
  File "/usr/lib/python2.7/httplib.py", line 1051, in _send_request
    self.endheaders(body)
  File "/usr/lib/python2.7/httplib.py", line 1013, in endheaders
    self._send_output(message_body)
  File "/usr/lib/python2.7/httplib.py", line 864, in _send_output
    self.send(msg)
  File "/usr/lib/python2.7/httplib.py", line 826, in send
    self.connect()
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connection.py", line 163, in connect
    conn = self._new_conn()
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connection.py", line 147, in _new_conn
    self, "Failed to establish a new connection: %s" % e)
NewConnectionError: <urllib3.connection.HTTPConnection object at 0x7f937c7be290>: Failed to establish a new connection: [Errno 111] Connection refused
2019-03-06 06:00:51,715 [lib.cuckoo.core.plugins] ERROR: Failed to run the reporting module "ElasticSearch":
Traceback (most recent call last):
  File "/opt/cuckoo/lib/cuckoo/core/plugins.py", line 533, in process
    current.run(self.results)
  File "/opt/cuckoo/modules/reporting/elasticsearch.py", line 196, in run
    self.connect()
  File "/opt/cuckoo/modules/reporting/elasticsearch.py", line 79, in connect
    if not self.es.indices.exists_template("cuckoo_template"):
  File "/usr/local/lib/python2.7/dist-packages/elasticsearch/client/utils.py", line 69, in _wrapped
    return func(*args, params=params, **kwargs)
  File "/usr/local/lib/python2.7/dist-packages/elasticsearch/client/indices.py", line 491, in exists_template
    name), params=params)
  File "/usr/local/lib/python2.7/dist-packages/elasticsearch/transport.py", line 327, in perform_request
    status, headers, data = connection.perform_request(method, url, params, body, ignore=ignore, timeout=timeout)
  File "/usr/local/lib/python2.7/dist-packages/elasticsearch/connection/http_urllib3.py", line 105, in perform_request
    raise ConnectionError('N/A', str(e), e)
ConnectionError: ConnectionError(<urllib3.connection.HTTPConnection object at 0x7f937c7be290>: Failed to establish a new connection: [Errno 111] Connection refused) caused by: NewConnectionError(<urllib3.connection.HTTPConnection object at 0x7f937c7be290>: Failed to establish a new connection: [Errno 111] Connection refused)

Signatures

Libraries known to be associated with a CVE were requested (may be False Positive) (1 event)
cve CVE-2013-3906
Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually) (1 event)
dead_host 192.158.197.132:3460

Network

DNS

Name Response Post-Analysis Lookup
time.windows.com
luceidclfbuq.com

Summary

Process WINWORD.EXE (1632)

  • Opened files

    • C:\Program Files\Microsoft Office\Office12\1033\MSO.ACL
    • C:\Documents and Settings\zamen\Cookies\
    • C:\
    • \\?\PIPE\wkssvc
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\486632E7.gif
    • C:\Program Files\Microsoft Office\Office12\Document Parts\1033\Building Blocks.dotx
    • C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\rasphone.pbk
    • C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\
    • C:\Documents and Settings\zamen\Application Data\Microsoft\Document Building Blocks\
    • c:\AUTOEXEC.BAT
    • C:\Program Files\Microsoft Office\Office12\ID_00030.DPC
    • C:\Documents and Settings\zamen\Application Data\Microsoft\
    • C:\Documents and Settings\zamen\Application Data\Microsoft\Document Building Blocks\1033\
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO
    • C:\Documents and Settings\All Users\Application Data\Microsoft\OFFICE\DATA\OPA12.BAK
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.IE5\index.dat
    • C:\Documents and Settings\All Users\Application Data\Microsoft\OFFICE\DATA\
    • C:\WINDOWS\system32\ras\
    • C:\WINDOWS\system32\shell32.dll
    • C:\Program Files\Microsoft Office\Office12\Document Parts\
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.Word
    • C:\Program Files\Microsoft Office\Office12\MSPUB.EXE
    • C:\Documents and Settings\zamen\Cookies\index.dat
    • C:\Documents and Settings\zamen\Application Data\Microsoft\UProof\CUSTOM.DIC
    • C:\Program Files\Common Files\Microsoft Shared\OFFICE12\Cultures\OFFICE.ODF
    • C:\Documents and Settings\zamen\Application Data\desktop.ini
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\2E9B1323.jpeg
    • C:\Documents and Settings\zamen\
    • \\?\PIPE\lsarpc
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.IE5\
    • C:\Program Files\Common Files\Microsoft Shared\
    • C:\Documents and Settings\All Users\Documents\desktop.ini
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\5E079FBC.gif
    • C:\Program Files\Microsoft Office\Office12\
    • C:\Program Files\Microsoft Office\Office12\STARTUP\
    • C:\Documents and Settings\All Users\Application Data\Microsoft\OFFICE\DATA\opa12.dat
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\A5A9692A.gif
    • \\?\PIPE\ROUTER
    • C:\Documents and Settings\zamen\My Documents\desktop.ini
    • C:\WINDOWS\system32\wininet.dll
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\95643AFE.gif
    • C:\WINDOWS\system32\imm32.dll
    • C:\WINDOWS\Registration\R000000000007.clb
    • C:\WINDOWS\AppPatch\sysmain.sdb
    • C:\Documents and Settings\zamen\Application Data\Microsoft\Proof\
    • C:\Program Files\Messenger\msmsgs.exe
    • C:\WINDOWS\system32\urlmon.dll
    • C:\Documents and Settings\
    • C:\Documents and Settings\zamen\Local Settings\History
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\5N9AB1QC\9F6KRJY4\Offline\
    • C:\Documents and Settings\zamen\Application Data\Microsoft\Document Building Blocks\1033\Building Blocks.dotx
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\5N9AB1QC\9F6KRJY4\Offline\0x00000003_R
    • C:\WINDOWS\system32\tapi32.dll
    • C:\Program Files\
    • C:\WINDOWS\system32\oleacc.dll
    • C:\WINDOWS\system32\rpcss.dll
    • C:\Documents and Settings\All Users\
    • C:\WINDOWS\system32\mlang.dll
    • C:\Program Files\Common Files\System\ado\msadox.dll
    • C:\Program Files\Microsoft Office\Office12\WORD.PIP
    • C:\Program Files\Common Files\Microsoft Shared\Web Folders\MSONSEXT.DLL
    • C:\Program Files\Common Files\Microsoft Shared\OFFICE11\msxml5.dll
    • \??\FDC#GENERIC_FLOPPY_DRIVE#6&1435b2e2&0&0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
    • C:\Documents and Settings\zamen\Local Settings\History\History.IE5\
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\6964048D.gif
    • C:\Documents and Settings\zamen\Application Data\
    • C:\Documents and Settings\zamen\Application Data\Microsoft\Word\STARTUP\
    • C:\Program Files\Microsoft Office\Office12\EXCEL.EXE
    • C:\Program Files\Microsoft Office\Office12\Document Parts\1033\
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files
    • C:\Documents and Settings\zamen\Local Settings\Application Data\Microsoft\Office\
    • C:\Documents and Settings\zamen\Application Data\Microsoft\Templates\
    • C:\WINDOWS\system32
    • C:\Documents and Settings\zamen\Local Settings\History\History.IE5\index.dat
    • C:\Program Files\Common Files\Microsoft Shared\Web Folders\
  • Written files

    • \\?\PIPE\wkssvc
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\95643AFE.gif
    • C:\Documents and Settings\zamen\Application Data\Microsoft\Office\MSO1033.acl
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.Word\~WRS{A7BA3B45-6AD4-44CB-973E-7BF4E8650BB8}.tmp
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\6964048D.gif
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\486632E7.gif
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\2E9B1323.jpeg
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\mso1.tmp
    • C:\Documents and Settings\zamen\Application Data\Microsoft\Document Building Blocks\1033\~$ilding Blocks.dotx
    • \\?\PIPE\lsarpc
    • C:\Documents and Settings\zamen\Application Data\Microsoft\Document Building Blocks\1033\Building Blocks.dotx
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\mso2.tmp
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.Word\~WRS{2C2B022F-2C9B-41F1-8F5C-8B39957FBE8A}.tmp
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\5E079FBC.gif
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.Word\~WRS{BCFF14BA-6C65-4247-9F73-072EDF3A099A}.tmp
    • C:\Documents and Settings\zamen\Application Data\Microsoft\UProof\CUSTOM.DIC
    • C:\Documents and Settings\All Users\Application Data\Microsoft\OFFICE\DATA\opa12.dat
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\A5A9692A.gif
    • \\?\PIPE\ROUTER

Process verclsid.exe (1616)

Process WINWORD.EXE (1632)

Process verclsid.exe (1616)

  • Registry keys read

    • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize\DisableMetaFiles

Process WINWORD.EXE (1632)

Process verclsid.exe (1616)

Process WINWORD.EXE (1632)

Process verclsid.exe (1616)

Process WINWORD.EXE (1632)

  • Processes created

    • /S /C {BDEADF00-C265-11D0-BCED-00A0C90AB50F} /I {000214E6-0000-0000-C000-000000000046} /X 0x401
  • DLLs Loaded

    • C:\WINDOWS\system32\IMM32.DLL
    • C:\WINDOWS\system32\SHELL32.dll
    • C:\WINDOWS\System32\mswsock.dll
    • RASAPI32.DLL
    • urlmon.dll
    • C:\WINDOWS\system32\ADVAPI32.DLL
    • DNSAPI.dll
    • C:\Program Files\Common Files\Microsoft Shared\office12\1033\MSOINTL.DLL
    • kernel32.dll
    • UxTheme.dll
    • ws2_32
    • netapi32.dll
    • C:\WINDOWS\System32\wshtcpip.dll
    • ntdll.dll
    • C:\WINDOWS\system32\normaliz.dll
    • shlwapi.dll
    • C:\WINDOWS\system32\msv1_0.dll
    • C:\Program Files\Microsoft Office\Office12\msproof6.dll
    • C:\WINDOWS\system32\kernel32.dll
    • C:\WINDOWS\system32\mswsock.dll
    • USERENV.dll
    • URLMON.DLL
    • rasadhlp.dll
    • wsock32
    • wwlib.dll
    • WININET.dll
    • C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\msonpui.dll
    • C:\Program Files\Common Files\Microsoft Shared\OFFICE12\MSPTLS.DLL
    • C:\Program Files\Microsoft Office\Office12\wwlib.dll
    • UxTheme.DLL
    • OLE32
    • OLEAUT32.DLL
    • C:\WINDOWS\system32\KERNEL32.DLL
    • version.dll
    • advapi32.dll
    • Secur32.dll
    • ole32.dll
    • C:\WINDOWS\system32\uxtheme.dll
    • C:\Program Files\Common Files\Microsoft Shared\office12\riched20.dll
    • Comctl32.dll
    • WTSAPI32.DLL
    • C:\Program Files\Common Files\Microsoft Shared\OFFICE12\OGL.DLL
    • IMM32.dll
    • RASMAN.DLL
    • MSO.dll
    • C:\Program Files\Microsoft Office\Office12\1033\wwintl.dll
    • RTUTILS.DLL
    • VERSION.DLL
    • WININET.DLL
    • C:\Program Files\Microsoft Office\Office12\WINWORD.EXE
    • shell32.dll
    • Kernel32.DLL
    • uxtheme.dll
    • secur32.dll
    • Winspool.DRV
    • sensapi.dll
    • C:\Program Files\Common Files\Microsoft Shared\OFFICE12\MSORES.DLL
    • SHELL32.dll
    • C:\Program Files\Microsoft Office\Office12\MSOHEV.DLL
    • SHLWAPI.DLL
    • mlang.dll
    • CLBCATQ.DLL
    • comctl32.dll
    • mso.dll
    • C:\WINDOWS\system32\mscoree.dll
    • NETAPI32.dll
    • hnetcfg.dll
    • C:\WINDOWS\system32\MSCTF.dll
    • appHelp.dll
    • gdi32.DLL
    • HLINK.DLL
    • C:\Program Files\Common Files\Microsoft Shared\office12\mso.dll
    • POWRPROF.dll
    • SHELL32.DLL
    • rpcrt4.dll
    • OLE32.DLL
    • SETUPAPI.dll
    • WS2_32.dll
    • OLEAUT32.dll

Process verclsid.exe (1616)

No static analysis available.
No antivirus signatures available.

Process Tree


WINWORD.EXE, PID: 1632, Parent PID: 596

default registry file network process services synchronisation iexplore office pdf

verclsid.exe, PID: 1616, Parent PID: 1632

default registry file network process services synchronisation iexplore office pdf

Deprecation note: While processing this analysis you did not have the httpreplay Python library installed. Installing this library (i.e., pip install httpreplay) will allow Cuckoo to do more proper PCAP analysis including but not limited to showing full HTTP and HTTPS (!) requests and responses. It is recommended that you install this library and possibly reprocess any interesting analysis tasks.

DNS

Name Response Post-Analysis Lookup
time.windows.com
luceidclfbuq.com

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.128.101 1025 192.168.128.111 53
192.168.128.101 1043 192.168.128.111 53
192.168.128.101 137 192.168.128.255 137
192.168.128.101 138 192.168.128.255 138
192.168.128.101 1037 239.255.255.250 1900

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Name c2ce9d447e18fa22_~wrs{bcff14ba-6c65-4247-9f73-072edf3a099a}.tmp
Filepath C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.Word\~WRS{BCFF14BA-6C65-4247-9F73-072EDF3A099A}.tmp
Size 158.0KB
Processes 1632 (WINWORD.EXE)
Type data
MD5 4f3d06cc1239bad0aeb4b2012b78e272
SHA1 c42fc1031deab8da0431a2efa1ae569beb720adc
SHA256 c2ce9d447e18fa226892ee1986bb90d0586fbb5603a741a6e880cf20249a1171
CRC32 F938D7AC
ssdeep 1536:rft3NLufJJRt9s1Ls2XVdFL9fFBDYNN0iZ:r9NwXQQ/
Yara
  • PEiD_01686_Petite_v2_2____www_un4seen_com_petite_ - [Petite v2.2 -> www.un4seen.com/petite]
  • PEiD_02152_StarForce_V3_X_DLL____StarForce_Copy_Protection_System_ - [StarForce V3.X DLL -> StarForce Copy Protection System]
  • PEiD_03512_Xtreme_Protector_v1_05_ - [Xtreme-Protector v1.05]
VirusTotal Search for analysis
Name dbbbe7b5d1ee3011_~$ilding blocks.dotx
Filepath C:\Documents and Settings\zamen\Application Data\Microsoft\Document Building Blocks\1033\~$ilding Blocks.dotx
Size 162.0B
Processes 1632 (WINWORD.EXE)
Type data
MD5 8d09ec5d59a8f012ab3c34b9d98cacdb
SHA1 61d24d99c7aa17db126cf110c4c0b59433f1e47d
SHA256 dbbbe7b5d1ee3011bbf218c78b8e08c908122a8a84b0c9f1b1379207a622969c
CRC32 878270D9
ssdeep 3:fBplxl/Jlxl//Tf1l:fJnDf
Yara None matched
VirusTotal Search for analysis
Name 6e9bd1e5638d48c1_building blocks.dotx
Filepath C:\Documents and Settings\zamen\Application Data\Microsoft\Document Building Blocks\1033\Building Blocks.dotx
Size 314.8KB
Processes 1632 (WINWORD.EXE)
Type Microsoft Word 2007+
MD5 89e2626a866bc9a18da185e35228a404
SHA1 4bc5718e114fa9cd2d60af37ba3d58d382ed18da
SHA256 6e9bd1e5638d48c1219c2312b67f2134ff404ab9f9644431df9b3b33ec33de66
CRC32 9DF23CE3
ssdeep 6144:nxl82xfVaZUt2Km7Jh+u0O7Ss5SuSfNaEf1e/PR5Oa52G0jlE0:n78+VamMKicBO7SaSuSx85Oa5CR
Yara
  • contentis_base64 - This rule finds for base64 strings
  • Big_Numbers1 - Looks for big numbers 32:sized
VirusTotal Search for analysis
Name 42e732762b8cfcd3_~wrs{a7ba3b45-6ad4-44cb-973e-7bf4e8650bb8}.tmp
Filepath C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.Word\~WRS{A7BA3B45-6AD4-44CB-973E-7BF4E8650BB8}.tmp
Size 1.5KB
Processes 1632 (WINWORD.EXE)
Type data
MD5 1faf27f013871302f697dc360fe11487
SHA1 559f89898f65bd6704b5ac585540306ebce77487
SHA256 42e732762b8cfcd3a3f5e848953aa04d82e3eade90c911b6ad54cca4c4cf976a
CRC32 27B068DB
ssdeep 3:Nzyxwnml0baZ4PON8DCBPl7l2xllVlzlpDll3/J/jvfllZtLQXZlhlhlhlZ/Z/ni:NmWmG2GW2GJxl2oXlgdRpj48wWJn
Yara None matched
VirusTotal Search for analysis
Name b3d510ef04275ca8_custom.dic
Filepath C:\Documents and Settings\zamen\Application Data\Microsoft\UProof\CUSTOM.DIC
Size 2.0B
Processes 1632 (WINWORD.EXE)
Type Little-endian UTF-16 Unicode text, with no line terminators
MD5 f3b25701fe362ec84616a93a45ce9998
SHA1 d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256 b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
CRC32 88F83096
ssdeep 3:Qn:Qn
Yara None matched
VirusTotal Search for analysis
Name c20abc0376fa18d5_mso1033.acl
Filepath C:\Documents and Settings\zamen\Application Data\Microsoft\Office\MSO1033.acl
Size 36.9KB
Processes 1632 (WINWORD.EXE)
Type data
MD5 9ddaec5c0ee39b4855bb3c01158af97c
SHA1 19e3565c1e6bc6d05ab139b76ce7a89e7f5275ed
SHA256 c20abc0376fa18d5048b7b3797a77ae8cc2bd5c874ba6d9b60e5a527adcf9baf
CRC32 3DE4B9A7
ssdeep 768:HatNbFeZKdogeyHMOeYhYVi+iOFOwbPXdEma1b:G/eLAhYVzbw
Yara None matched
VirusTotal Search for analysis
Name 3d5bc0c3c759609b_opa12.dat
Filepath C:\Documents and Settings\All Users\Application Data\Microsoft\OFFICE\DATA\opa12.dat
Size 8.0KB
Processes 1632 (WINWORD.EXE)
Type data
MD5 0e7e24ed21bd5da96b0d882d5a043ad4
SHA1 543bba04369e50dfb74d27d24e1069810a5707ea
SHA256 3d5bc0c3c759609b3637e8efb7508600ec8a175e601779916097537c80092f2d
CRC32 E4BF56FA
ssdeep 192:12xaaUyse71abxl0fatpNnxa/2WvVJBZHp5isu/dY/tBNLqu5Xw2a:12x3slgatpNnxZGplu1Yte2ba
Yara None matched
VirusTotal Search for analysis
Sorry! No dropped buffers.
Task ID 1371
Mongo ID 5c7fa86411d30812ab72064f
Cuckoo release 2.0-dev