URL Details

URL
http://wnxelsiizfsa.com/

Score

This url shows some signs of potential malicious behavior.

The score of this url is 1.6 out of 10.

Please notice: The scoring system is currently still in development and should be considered an alpha feature.

Information on Execution

Category Started Completed Duration Logs
URL March 6, 2019, 6:50 a.m. March 6, 2019, 6:56 a.m. 346 seconds

Machine

Name Label Started On Shutdown On
winxpsp3x86 winxpsp3x86 2019-03-06 06:50:29 2019-03-06 06:56:16

Analyzer Log

2019-03-06 14:50:25,000 [analyzer] DEBUG: Starting analyzer from: C:\cjwvhu
2019-03-06 14:50:25,015 [analyzer] DEBUG: Pipe server name: \\.\PIPE\dhiwWQAMmVnAQgInHBeRcXgvhAdnfRG
2019-03-06 14:50:25,015 [analyzer] DEBUG: Log pipe server name: \\.\PIPE\CcefQCkPypIzfnBKbuPhAiqPYWKA
2019-03-06 14:50:28,140 [analyzer] DEBUG: Started auxiliary module Disguise
2019-03-06 14:50:28,280 [analyzer] WARNING: Unable to find the correct offsets for functions of: 32-bit kernel32.dll (with timestamp 0x4802a12c)
2019-03-06 14:50:28,280 [analyzer] WARNING: Unable to find the correct offsets for functions of: 32-bit kernel32.dll (with timestamp 0x4802a12c)
2019-03-06 14:50:28,342 [analyzer] DEBUG: Loaded monitor into process with pid 700
2019-03-06 14:50:28,342 [analyzer] DEBUG: Started auxiliary module DumpTLSMasterSecrets
2019-03-06 14:50:28,342 [analyzer] DEBUG: Started auxiliary module Human
2019-03-06 14:50:28,342 [analyzer] DEBUG: Started auxiliary module InstallCertificate
2019-03-06 14:50:28,342 [analyzer] DEBUG: Started auxiliary module Reboot
2019-03-06 14:50:28,812 [analyzer] DEBUG: Started auxiliary module RecentFiles
2019-03-06 14:50:28,812 [analyzer] DEBUG: Started auxiliary module Screenshots
2019-03-06 14:50:29,046 [lib.api.process] INFO: Successfully executed process from path 'C:\\Program Files\\Microsoft Office\\Office12\\WINWORD.EXE' with arguments ['http://wnxelsiizfsa.com/'] and pid 1812
2019-03-06 14:50:29,108 [analyzer] WARNING: Unable to find the correct offsets for functions of: 32-bit kernel32.dll (with timestamp 0x4802a12c)
2019-03-06 14:50:29,108 [analyzer] WARNING: Unable to find the correct offsets for functions of: 32-bit kernel32.dll (with timestamp 0x4802a12c)
2019-03-06 14:50:29,171 [analyzer] DEBUG: Loaded monitor into process with pid 1812
2019-03-06 14:50:30,203 [analyzer] INFO: Added new file to list with pid 1812 and path C:\Documents and Settings\All Users\Application Data\Microsoft\OFFICE\DATA\opa12.dat
2019-03-06 14:50:31,733 [analyzer] INFO: Added new file to list with pid 1812 and path C:\Documents and Settings\zamen\Application Data\Microsoft\Office\MSO1033.acl
2019-03-06 14:50:32,358 [analyzer] INFO: Added new file to list with pid 1812 and path \Device\NamedPipe\lsass
2019-03-06 14:50:32,546 [analyzer] INFO: Added new file to list with pid 1812 and path \Device\NamedPipe\ROUTER
2019-03-06 14:50:47,765 [analyzer] CRITICAL: Encountered an unknown process while in monitoring mode: /S /C {BDEADF00-C265-11D0-BCED-00A0C90AB50F} /I {000214E6-0000-0000-C000-000000000046} /X 0x401!
2019-03-06 14:50:47,828 [analyzer] INFO: Injected into process with pid 2008 and name u'verclsid.exe'
2019-03-06 14:50:47,953 [analyzer] WARNING: Unable to find the correct offsets for functions of: 32-bit kernel32.dll (with timestamp 0x4802a12c)
2019-03-06 14:50:47,953 [analyzer] WARNING: Unable to find the correct offsets for functions of: 32-bit kernel32.dll (with timestamp 0x4802a12c)
2019-03-06 14:50:48,062 [analyzer] DEBUG: Loaded monitor into process with pid 2008
2019-03-06 14:50:49,608 [lib.api.process] INFO: Memory dump of process with pid 2008 completed
2019-03-06 14:50:50,140 [analyzer] INFO: Process with pid 2008 has terminated
2019-03-06 14:51:20,592 [analyzer] INFO: Added new file to list with pid 1812 and path C:\Documents and Settings\zamen\Application Data\Microsoft\Document Building Blocks\1033\Building Blocks.dotx
2019-03-06 14:51:20,655 [analyzer] INFO: Added new file to list with pid 1812 and path C:\Documents and Settings\zamen\Application Data\Microsoft\Document Building Blocks\1033\~$ilding Blocks.dotx
2019-03-06 14:51:21,187 [analyzer] INFO: Added new file to list with pid 1812 and path C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\95F687A2.gif
2019-03-06 14:51:21,280 [analyzer] INFO: Added new file to list with pid 1812 and path C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\16616F3B.gif
2019-03-06 14:51:21,358 [analyzer] INFO: Added new file to list with pid 1812 and path C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.Word\~WRS{60EF6888-A751-44CB-B7D9-135E09F88E79}.tmp
2019-03-06 14:51:21,453 [analyzer] INFO: Added new file to list with pid 1812 and path C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.Word\~WRS{6DF9832A-F538-40A6-9B46-55A5C6ACEBF8}.tmp
2019-03-06 14:51:21,467 [analyzer] INFO: Added new file to list with pid 1812 and path C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\D2072800.gif
2019-03-06 14:51:21,515 [analyzer] INFO: Added new file to list with pid 1812 and path C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.Word\~WRS{D5BFA673-9427-4606-B3CA-3A9C58AACA1B}.tmp
2019-03-06 14:51:21,578 [analyzer] INFO: Added new file to list with pid 1812 and path C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\6C4D0801.gif
2019-03-06 14:51:21,655 [analyzer] INFO: Added new file to list with pid 1812 and path C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\F932CE0E.gif
2019-03-06 14:51:21,717 [analyzer] INFO: Added new file to list with pid 1812 and path C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\50C0AB7.jpeg
2019-03-06 14:51:21,765 [analyzer] INFO: Added new file to list with pid 1812 and path C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\mso1.tmp
2019-03-06 14:51:21,765 [analyzer] INFO: Added new file to list with pid 1812 and path C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\mso2.tmp
2019-03-06 14:51:23,796 [analyzer] INFO: Added new file to list with pid 1812 and path C:\Documents and Settings\zamen\Application Data\Microsoft\UProof\CUSTOM.DIC
2019-03-06 14:54:28,358 [analyzer] INFO: Analysis timeout hit, terminating analysis.
2019-03-06 14:55:29,983 [analyzer] INFO: Added new file to list with pid 1812 and path \Device\NamedPipe\wkssvc
2019-03-06 14:55:36,233 [lib.api.process] INFO: Memory dump of process with pid 1812 completed
2019-03-06 14:55:36,233 [analyzer] INFO: Terminating remaining processes before shutdown.
2019-03-06 14:55:36,233 [lib.api.process] INFO: Successfully terminated process with pid 1812.
2019-03-06 14:55:36,233 [analyzer] WARNING: File at path "u'\\device\\namedpipe\\lsass'" does not exist, skip.
2019-03-06 14:55:36,233 [analyzer] WARNING: File at path "u'\\device\\namedpipe\\router'" does not exist, skip.
2019-03-06 14:55:36,265 [analyzer] WARNING: File at path "u'c:\\documents and settings\\zamen\\local settings\\temporary internet files\\content.mso\\d2072800.gif'" does not exist, skip.
2019-03-06 14:55:36,265 [analyzer] WARNING: File at path "u'c:\\documents and settings\\zamen\\local settings\\temporary internet files\\content.mso\\6c4d0801.gif'" does not exist, skip.
2019-03-06 14:55:36,296 [analyzer] INFO: Error dumping file from path "c:\documents and settings\zamen\local settings\temporary internet files\content.mso\mso1.tmp": [Errno 13] Permission denied: u'c:\\documents and settings\\zamen\\local settings\\temporary internet files\\content.mso\\mso1.tmp'
2019-03-06 14:55:36,312 [analyzer] INFO: Error dumping file from path "c:\documents and settings\zamen\local settings\temporary internet files\content.mso\mso2.tmp": [Errno 13] Permission denied: u'c:\\documents and settings\\zamen\\local settings\\temporary internet files\\content.mso\\mso2.tmp'
2019-03-06 14:55:36,312 [analyzer] WARNING: File at path "u'c:\\documents and settings\\zamen\\local settings\\temporary internet files\\content.mso\\f932ce0e.gif'" does not exist, skip.
2019-03-06 14:55:36,312 [analyzer] WARNING: File at path "u'\\device\\namedpipe\\wkssvc'" does not exist, skip.
2019-03-06 14:55:36,328 [analyzer] WARNING: File at path "u'c:\\documents and settings\\zamen\\local settings\\temporary internet files\\content.mso\\16616f3b.gif'" does not exist, skip.
2019-03-06 14:55:36,328 [analyzer] WARNING: File at path "u'c:\\documents and settings\\zamen\\local settings\\temporary internet files\\content.mso\\95f687a2.gif'" does not exist, skip.
2019-03-06 14:55:36,342 [analyzer] WARNING: File at path "u'c:\\documents and settings\\zamen\\local settings\\temporary internet files\\content.mso\\50c0ab7.jpeg'" does not exist, skip.
2019-03-06 14:55:36,358 [analyzer] INFO: Analysis completed.

Cuckoo Log

2019-03-06 06:50:29,492 [lib.cuckoo.core.scheduler] INFO: Task #1382: acquired machine winxpsp3x86 (label=winxpsp3x86)
2019-03-06 06:50:29,520 [modules.auxiliary.sniffer] INFO: Started sniffer with PID 2190 (interface=eth2, host=192.168.128.101, pcap=/opt/cuckoo/storage/analyses/1382/dump.pcap)
2019-03-06 06:50:53,798 [lib.cuckoo.core.guest] INFO: Starting analysis on guest (id=winxpsp3x86, ip=192.168.128.101)
2019-03-06 06:56:13,505 [lib.cuckoo.core.resultserver] WARNING: Uploaded file length larger than upload_max_size, stopping upload.
2019-03-06 06:56:14,640 [lib.cuckoo.core.guest] INFO: winxpsp3x86: analysis completed successfully
2019-03-06 06:57:37,470 [lib.cuckoo.core.plugins] WARNING: The processing module "Suricata" returned the following error: Unable to locate Suricata binary
2019-03-06 06:57:39,061 [elasticsearch] WARNING: HEAD http://127.0.0.1:9200/_template/cuckoo_template [status:N/A request:0.000s]
Traceback (most recent call last):
  File "/usr/local/lib/python2.7/dist-packages/elasticsearch/connection/http_urllib3.py", line 94, in perform_request
    response = self.pool.urlopen(method, url, body, retries=False, headers=self.headers, **kw)
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py", line 643, in urlopen
    _stacktrace=sys.exc_info()[2])
  File "/usr/local/lib/python2.7/dist-packages/urllib3/util/retry.py", line 251, in increment
    raise six.reraise(type(error), error, _stacktrace)
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py", line 594, in urlopen
    chunked=chunked)
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py", line 361, in _make_request
    conn.request(method, url, **httplib_request_kw)
  File "/usr/lib/python2.7/httplib.py", line 1017, in request
    self._send_request(method, url, body, headers)
  File "/usr/lib/python2.7/httplib.py", line 1051, in _send_request
    self.endheaders(body)
  File "/usr/lib/python2.7/httplib.py", line 1013, in endheaders
    self._send_output(message_body)
  File "/usr/lib/python2.7/httplib.py", line 864, in _send_output
    self.send(msg)
  File "/usr/lib/python2.7/httplib.py", line 826, in send
    self.connect()
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connection.py", line 163, in connect
    conn = self._new_conn()
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connection.py", line 147, in _new_conn
    self, "Failed to establish a new connection: %s" % e)
NewConnectionError: <urllib3.connection.HTTPConnection object at 0x7f937f6e2b50>: Failed to establish a new connection: [Errno 111] Connection refused
2019-03-06 06:57:39,062 [elasticsearch] WARNING: HEAD http://127.0.0.1:9200/_template/cuckoo_template [status:N/A request:0.000s]
Traceback (most recent call last):
  File "/usr/local/lib/python2.7/dist-packages/elasticsearch/connection/http_urllib3.py", line 94, in perform_request
    response = self.pool.urlopen(method, url, body, retries=False, headers=self.headers, **kw)
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py", line 643, in urlopen
    _stacktrace=sys.exc_info()[2])
  File "/usr/local/lib/python2.7/dist-packages/urllib3/util/retry.py", line 251, in increment
    raise six.reraise(type(error), error, _stacktrace)
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py", line 594, in urlopen
    chunked=chunked)
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py", line 361, in _make_request
    conn.request(method, url, **httplib_request_kw)
  File "/usr/lib/python2.7/httplib.py", line 1017, in request
    self._send_request(method, url, body, headers)
  File "/usr/lib/python2.7/httplib.py", line 1051, in _send_request
    self.endheaders(body)
  File "/usr/lib/python2.7/httplib.py", line 1013, in endheaders
    self._send_output(message_body)
  File "/usr/lib/python2.7/httplib.py", line 864, in _send_output
    self.send(msg)
  File "/usr/lib/python2.7/httplib.py", line 826, in send
    self.connect()
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connection.py", line 163, in connect
    conn = self._new_conn()
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connection.py", line 147, in _new_conn
    self, "Failed to establish a new connection: %s" % e)
NewConnectionError: <urllib3.connection.HTTPConnection object at 0x7f937f6e2d10>: Failed to establish a new connection: [Errno 111] Connection refused
2019-03-06 06:57:39,062 [elasticsearch] WARNING: HEAD http://127.0.0.1:9200/_template/cuckoo_template [status:N/A request:0.000s]
Traceback (most recent call last):
  File "/usr/local/lib/python2.7/dist-packages/elasticsearch/connection/http_urllib3.py", line 94, in perform_request
    response = self.pool.urlopen(method, url, body, retries=False, headers=self.headers, **kw)
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py", line 643, in urlopen
    _stacktrace=sys.exc_info()[2])
  File "/usr/local/lib/python2.7/dist-packages/urllib3/util/retry.py", line 251, in increment
    raise six.reraise(type(error), error, _stacktrace)
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py", line 594, in urlopen
    chunked=chunked)
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py", line 361, in _make_request
    conn.request(method, url, **httplib_request_kw)
  File "/usr/lib/python2.7/httplib.py", line 1017, in request
    self._send_request(method, url, body, headers)
  File "/usr/lib/python2.7/httplib.py", line 1051, in _send_request
    self.endheaders(body)
  File "/usr/lib/python2.7/httplib.py", line 1013, in endheaders
    self._send_output(message_body)
  File "/usr/lib/python2.7/httplib.py", line 864, in _send_output
    self.send(msg)
  File "/usr/lib/python2.7/httplib.py", line 826, in send
    self.connect()
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connection.py", line 163, in connect
    conn = self._new_conn()
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connection.py", line 147, in _new_conn
    self, "Failed to establish a new connection: %s" % e)
NewConnectionError: <urllib3.connection.HTTPConnection object at 0x7f937f6e2a90>: Failed to establish a new connection: [Errno 111] Connection refused
2019-03-06 06:57:39,063 [elasticsearch] WARNING: HEAD http://127.0.0.1:9200/_template/cuckoo_template [status:N/A request:0.000s]
Traceback (most recent call last):
  File "/usr/local/lib/python2.7/dist-packages/elasticsearch/connection/http_urllib3.py", line 94, in perform_request
    response = self.pool.urlopen(method, url, body, retries=False, headers=self.headers, **kw)
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py", line 643, in urlopen
    _stacktrace=sys.exc_info()[2])
  File "/usr/local/lib/python2.7/dist-packages/urllib3/util/retry.py", line 251, in increment
    raise six.reraise(type(error), error, _stacktrace)
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py", line 594, in urlopen
    chunked=chunked)
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connectionpool.py", line 361, in _make_request
    conn.request(method, url, **httplib_request_kw)
  File "/usr/lib/python2.7/httplib.py", line 1017, in request
    self._send_request(method, url, body, headers)
  File "/usr/lib/python2.7/httplib.py", line 1051, in _send_request
    self.endheaders(body)
  File "/usr/lib/python2.7/httplib.py", line 1013, in endheaders
    self._send_output(message_body)
  File "/usr/lib/python2.7/httplib.py", line 864, in _send_output
    self.send(msg)
  File "/usr/lib/python2.7/httplib.py", line 826, in send
    self.connect()
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connection.py", line 163, in connect
    conn = self._new_conn()
  File "/usr/local/lib/python2.7/dist-packages/urllib3/connection.py", line 147, in _new_conn
    self, "Failed to establish a new connection: %s" % e)
NewConnectionError: <urllib3.connection.HTTPConnection object at 0x7f937f6e21d0>: Failed to establish a new connection: [Errno 111] Connection refused
2019-03-06 06:57:39,064 [lib.cuckoo.core.plugins] ERROR: Failed to run the reporting module "ElasticSearch":
Traceback (most recent call last):
  File "/opt/cuckoo/lib/cuckoo/core/plugins.py", line 533, in process
    current.run(self.results)
  File "/opt/cuckoo/modules/reporting/elasticsearch.py", line 196, in run
    self.connect()
  File "/opt/cuckoo/modules/reporting/elasticsearch.py", line 79, in connect
    if not self.es.indices.exists_template("cuckoo_template"):
  File "/usr/local/lib/python2.7/dist-packages/elasticsearch/client/utils.py", line 69, in _wrapped
    return func(*args, params=params, **kwargs)
  File "/usr/local/lib/python2.7/dist-packages/elasticsearch/client/indices.py", line 491, in exists_template
    name), params=params)
  File "/usr/local/lib/python2.7/dist-packages/elasticsearch/transport.py", line 327, in perform_request
    status, headers, data = connection.perform_request(method, url, params, body, ignore=ignore, timeout=timeout)
  File "/usr/local/lib/python2.7/dist-packages/elasticsearch/connection/http_urllib3.py", line 105, in perform_request
    raise ConnectionError('N/A', str(e), e)
ConnectionError: ConnectionError(<urllib3.connection.HTTPConnection object at 0x7f937f6e21d0>: Failed to establish a new connection: [Errno 111] Connection refused) caused by: NewConnectionError(<urllib3.connection.HTTPConnection object at 0x7f937f6e21d0>: Failed to establish a new connection: [Errno 111] Connection refused)

Signatures

Libraries known to be associated with a CVE were requested (may be False Positive) (1 event)
cve CVE-2013-3906
Connects to an IP address that is no longer responding to requests (legitimate services will remain up-and-running usually) (1 event)
dead_host 192.158.197.132:3460

Network

DNS

Name Response Post-Analysis Lookup
wnxelsiizfsa.com
time.windows.com

Summary

Process verclsid.exe (2008)

Process WINWORD.EXE (1812)

  • Opened files

    • C:\Program Files\Microsoft Office\Office12\1033\MSO.ACL
    • C:\Documents and Settings\zamen\Cookies\
    • C:\
    • \\?\PIPE\wkssvc
    • C:\Program Files\Microsoft Office\Office12\Document Parts\1033\Building Blocks.dotx
    • C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\rasphone.pbk
    • C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk\
    • C:\Documents and Settings\zamen\Application Data\Microsoft\Document Building Blocks\
    • c:\AUTOEXEC.BAT
    • C:\Program Files\Microsoft Office\Office12\ID_00030.DPC
    • C:\Documents and Settings\zamen\Application Data\Microsoft\
    • C:\Documents and Settings\zamen\Application Data\Microsoft\Document Building Blocks\1033\
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO
    • C:\Documents and Settings\All Users\Application Data\Microsoft\OFFICE\DATA\OPA12.BAK
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.IE5\index.dat
    • C:\Documents and Settings\All Users\Application Data\Microsoft\OFFICE\DATA\
    • C:\WINDOWS\system32\ras\
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\0SKK3S0I\PYFATJCU\Offline\
    • C:\WINDOWS\system32\shell32.dll
    • C:\Program Files\Microsoft Office\Office12\Document Parts\
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.Word
    • C:\Program Files\Microsoft Office\Office12\MSPUB.EXE
    • C:\Documents and Settings\zamen\Cookies\index.dat
    • C:\Documents and Settings\zamen\Application Data\Microsoft\UProof\CUSTOM.DIC
    • C:\Program Files\Common Files\Microsoft Shared\OFFICE12\Cultures\OFFICE.ODF
    • C:\Documents and Settings\zamen\Application Data\desktop.ini
    • C:\Documents and Settings\zamen\
    • \\?\PIPE\lsarpc
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\16616F3B.gif
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.IE5\
    • C:\Documents and Settings\All Users\Documents\desktop.ini
    • C:\Program Files\Common Files\System\ado\msadox.dll
    • C:\Program Files\Microsoft Office\Office12\
    • C:\Program Files\Microsoft Office\Office12\STARTUP\
    • C:\Documents and Settings\All Users\Application Data\Microsoft\OFFICE\DATA\opa12.dat
    • \\?\PIPE\ROUTER
    • C:\Documents and Settings\zamen\My Documents\desktop.ini
    • C:\WINDOWS\system32\wininet.dll
    • C:\Program Files\Common Files\Microsoft Shared\
    • C:\WINDOWS\system32\imm32.dll
    • C:\WINDOWS\Registration\R000000000007.clb
    • C:\WINDOWS\AppPatch\sysmain.sdb
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\D2072800.gif
    • C:\Documents and Settings\zamen\Application Data\Microsoft\Proof\
    • C:\Program Files\Messenger\msmsgs.exe
    • C:\WINDOWS\system32\urlmon.dll
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\95F687A2.gif
    • C:\Documents and Settings\
    • C:\Documents and Settings\zamen\Local Settings\History
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\0SKK3S0I\PYFATJCU\Offline\0x00000003_R
    • C:\Documents and Settings\zamen\Application Data\Microsoft\Document Building Blocks\1033\Building Blocks.dotx
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\F932CE0E.gif
    • C:\WINDOWS\system32\tapi32.dll
    • C:\WINDOWS\system32
    • C:\Program Files\
    • C:\WINDOWS\system32\oleacc.dll
    • C:\WINDOWS\system32\rpcss.dll
    • C:\Documents and Settings\All Users\
    • C:\WINDOWS\system32\mlang.dll
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\6C4D0801.gif
    • C:\Program Files\Microsoft Office\Office12\WORD.PIP
    • C:\Program Files\Common Files\Microsoft Shared\Web Folders\MSONSEXT.DLL
    • C:\Program Files\Common Files\Microsoft Shared\OFFICE11\msxml5.dll
    • \??\FDC#GENERIC_FLOPPY_DRIVE#6&1435b2e2&0&0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
    • C:\Documents and Settings\zamen\Local Settings\History\History.IE5\
    • C:\Documents and Settings\zamen\Application Data\
    • C:\Documents and Settings\zamen\Application Data\Microsoft\Word\STARTUP\
    • C:\Program Files\Microsoft Office\Office12\EXCEL.EXE
    • C:\Program Files\Microsoft Office\Office12\Document Parts\1033\
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files
    • C:\Documents and Settings\zamen\Local Settings\Application Data\Microsoft\Office\
    • C:\Documents and Settings\zamen\Application Data\Microsoft\Templates\
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\50C0AB7.jpeg
    • C:\Documents and Settings\zamen\Local Settings\History\History.IE5\index.dat
    • C:\Program Files\Common Files\Microsoft Shared\Web Folders\
  • Written files

    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\6C4D0801.gif
    • C:\Documents and Settings\zamen\Application Data\Microsoft\Office\MSO1033.acl
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\D2072800.gif
    • \\?\PIPE\wkssvc
    • C:\Documents and Settings\zamen\Application Data\Microsoft\UProof\CUSTOM.DIC
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.Word\~WRS{6DF9832A-F538-40A6-9B46-55A5C6ACEBF8}.tmp
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\mso1.tmp
    • C:\Documents and Settings\zamen\Application Data\Microsoft\Document Building Blocks\1033\~$ilding Blocks.dotx
    • \\?\PIPE\lsarpc
    • C:\Documents and Settings\zamen\Application Data\Microsoft\Document Building Blocks\1033\Building Blocks.dotx
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\mso2.tmp
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\F932CE0E.gif
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.Word\~WRS{D5BFA673-9427-4606-B3CA-3A9C58AACA1B}.tmp
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\16616F3B.gif
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\95F687A2.gif
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.Word\~WRS{60EF6888-A751-44CB-B7D9-135E09F88E79}.tmp
    • C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.MSO\50C0AB7.jpeg
    • C:\Documents and Settings\All Users\Application Data\Microsoft\OFFICE\DATA\opa12.dat
    • \\?\PIPE\ROUTER

Process verclsid.exe (2008)

  • Registry keys read

    • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize\DisableMetaFiles

Process WINWORD.EXE (1812)

Process verclsid.exe (2008)

Process WINWORD.EXE (1812)

Process verclsid.exe (2008)

Process WINWORD.EXE (1812)

Process verclsid.exe (2008)

Process WINWORD.EXE (1812)

  • Processes created

    • /S /C {BDEADF00-C265-11D0-BCED-00A0C90AB50F} /I {000214E6-0000-0000-C000-000000000046} /X 0x401
  • DLLs Loaded

    • C:\WINDOWS\system32\IMM32.DLL
    • C:\WINDOWS\system32\SHELL32.dll
    • C:\WINDOWS\System32\mswsock.dll
    • RASAPI32.DLL
    • urlmon.dll
    • C:\WINDOWS\system32\ADVAPI32.DLL
    • DNSAPI.dll
    • C:\Program Files\Common Files\Microsoft Shared\office12\1033\MSOINTL.DLL
    • kernel32.dll
    • UxTheme.dll
    • ws2_32
    • netapi32.dll
    • C:\WINDOWS\System32\wshtcpip.dll
    • ntdll.dll
    • C:\WINDOWS\system32\normaliz.dll
    • shlwapi.dll
    • C:\WINDOWS\system32\msv1_0.dll
    • C:\Program Files\Microsoft Office\Office12\msproof6.dll
    • C:\WINDOWS\system32\kernel32.dll
    • C:\WINDOWS\system32\mswsock.dll
    • USERENV.dll
    • URLMON.DLL
    • rasadhlp.dll
    • wsock32
    • wwlib.dll
    • WININET.dll
    • C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\msonpui.dll
    • C:\Program Files\Common Files\Microsoft Shared\OFFICE12\MSPTLS.DLL
    • C:\Program Files\Microsoft Office\Office12\wwlib.dll
    • UxTheme.DLL
    • OLE32
    • OLEAUT32.DLL
    • C:\WINDOWS\system32\KERNEL32.DLL
    • version.dll
    • advapi32.dll
    • Secur32.dll
    • ole32.dll
    • C:\WINDOWS\system32\uxtheme.dll
    • C:\Program Files\Common Files\Microsoft Shared\office12\riched20.dll
    • Comctl32.dll
    • WTSAPI32.DLL
    • C:\Program Files\Common Files\Microsoft Shared\OFFICE12\OGL.DLL
    • IMM32.dll
    • RASMAN.DLL
    • MSO.dll
    • C:\Program Files\Microsoft Office\Office12\1033\wwintl.dll
    • RTUTILS.DLL
    • VERSION.DLL
    • WININET.DLL
    • C:\Program Files\Microsoft Office\Office12\WINWORD.EXE
    • shell32.dll
    • Kernel32.DLL
    • uxtheme.dll
    • secur32.dll
    • Winspool.DRV
    • sensapi.dll
    • C:\Program Files\Common Files\Microsoft Shared\OFFICE12\MSORES.DLL
    • SHELL32.dll
    • C:\Program Files\Microsoft Office\Office12\MSOHEV.DLL
    • SHLWAPI.DLL
    • mlang.dll
    • CLBCATQ.DLL
    • comctl32.dll
    • mso.dll
    • C:\WINDOWS\system32\mscoree.dll
    • NETAPI32.dll
    • hnetcfg.dll
    • C:\WINDOWS\system32\MSCTF.dll
    • appHelp.dll
    • gdi32.DLL
    • HLINK.DLL
    • C:\Program Files\Common Files\Microsoft Shared\office12\mso.dll
    • POWRPROF.dll
    • SHELL32.DLL
    • rpcrt4.dll
    • OLE32.DLL
    • SETUPAPI.dll
    • WS2_32.dll
    • OLEAUT32.dll
No static analysis available.
No antivirus signatures available.

Process Tree


WINWORD.EXE, PID: 1812, Parent PID: 1424

default registry file network process services synchronisation iexplore office pdf

verclsid.exe, PID: 2008, Parent PID: 1812

default registry file network process services synchronisation iexplore office pdf

Deprecation note: While processing this analysis you did not have the httpreplay Python library installed. Installing this library (i.e., pip install httpreplay) will allow Cuckoo to do more proper PCAP analysis including but not limited to showing full HTTP and HTTPS (!) requests and responses. It is recommended that you install this library and possibly reprocess any interesting analysis tasks.

DNS

Name Response Post-Analysis Lookup
wnxelsiizfsa.com
time.windows.com

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.128.101 1025 192.168.128.111 53
192.168.128.101 1044 192.168.128.111 53
192.168.128.101 137 192.168.128.255 137
192.168.128.101 138 192.168.128.255 138
192.168.128.101 1036 239.255.255.250 1900

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Name 6e9bd1e5638d48c1_building blocks.dotx
Filepath C:\Documents and Settings\zamen\Application Data\Microsoft\Document Building Blocks\1033\Building Blocks.dotx
Size 314.8KB
Processes 1812 (WINWORD.EXE)
Type Microsoft Word 2007+
MD5 89e2626a866bc9a18da185e35228a404
SHA1 4bc5718e114fa9cd2d60af37ba3d58d382ed18da
SHA256 6e9bd1e5638d48c1219c2312b67f2134ff404ab9f9644431df9b3b33ec33de66
CRC32 9DF23CE3
ssdeep 6144:nxl82xfVaZUt2Km7Jh+u0O7Ss5SuSfNaEf1e/PR5Oa52G0jlE0:n78+VamMKicBO7SaSuSx85Oa5CR
Yara
  • contentis_base64 - This rule finds for base64 strings
  • Big_Numbers1 - Looks for big numbers 32:sized
VirusTotal Search for analysis
Name 5ce47884ea6ccdfc_~wrs{6df9832a-f538-40a6-9b46-55a5c6acebf8}.tmp
Filepath C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.Word\~WRS{6DF9832A-F538-40A6-9B46-55A5C6ACEBF8}.tmp
Size 1.5KB
Processes 1812 (WINWORD.EXE)
Type data
MD5 510752e421a92488ca863b3cc94cac07
SHA1 2570985804d67d3fc192e37eb633f31326888409
SHA256 5ce47884ea6ccdfcb0fd08e0aa03418e8cfffb45633554e7f83223c0ea733a16
CRC32 EED76B55
ssdeep 3:Nzyxwnml0baZ4PON8DCBPl7l2xllVlzlpDll3/J/jvfllZtLQXZlhlhlhlZ/Z/ni:NmWmG2GW2GJxl2oXlgdRpj4ymjR2
Yara None matched
VirusTotal Search for analysis
Name bef64cad3e3e9a5e_~wrs{d5bfa673-9427-4606-b3ca-3a9c58aaca1b}.tmp
Filepath C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.Word\~WRS{D5BFA673-9427-4606-B3CA-3A9C58AACA1B}.tmp
Size 1.0KB
Processes 1812 (WINWORD.EXE)
Type data
MD5 f1cc3c188d39fe5d74a2c65ad5476082
SHA1 aca027d296a7afa07f76b2dbe87b56342c38d541
SHA256 bef64cad3e3e9a5e65159ca676d3d5a4f4a0d8054fa2d7c7a32581a218a682ce
CRC32 1DC3D889
ssdeep 24:GNwSNNNwwwwwvwwwwwwwwwwwwwwwNNwwN6uTHtqu:GNwSNNNwwwwwvwwwwwwwwwwwwwwwNNwc
Yara None matched
VirusTotal Search for analysis
Name 5bdec999c0687971_mso1033.acl
Filepath C:\Documents and Settings\zamen\Application Data\Microsoft\Office\MSO1033.acl
Size 36.9KB
Processes 1812 (WINWORD.EXE)
Type data
MD5 e991834bf3e0cd7538954f82a7963716
SHA1 89ca6293a414b51e43ddcfc7443697c8700eaaff
SHA256 5bdec999c0687971a8e8cad4fa4cb022b2f58da6768564617b0885ec9f9b9b36
CRC32 D7A059AE
ssdeep 768:6atNbFeZKdogeyHMOeYhYVi+iOFOwbPXdEma1b:l/eLAhYVzbw
Yara None matched
VirusTotal Search for analysis
Name b3d510ef04275ca8_custom.dic
Filepath C:\Documents and Settings\zamen\Application Data\Microsoft\UProof\CUSTOM.DIC
Size 2.0B
Processes 1812 (WINWORD.EXE)
Type Little-endian UTF-16 Unicode text, with no line terminators
MD5 f3b25701fe362ec84616a93a45ce9998
SHA1 d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256 b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
CRC32 88F83096
ssdeep 3:Qn:Qn
Yara None matched
VirusTotal Search for analysis
Name 49e30f4c3c19075b_~$ilding blocks.dotx
Filepath C:\Documents and Settings\zamen\Application Data\Microsoft\Document Building Blocks\1033\~$ilding Blocks.dotx
Size 162.0B
Processes 1812 (WINWORD.EXE)
Type data
MD5 13e22f8d5b87803a3c583c226c3d76ba
SHA1 87189af0fa5568508deedd31abb2a0ab5f431706
SHA256 49e30f4c3c19075b9c838a97aff68de54e37ab471773ae66fd943543638f38d7
CRC32 28CB577F
ssdeep 3:fBplxl/Jlxl//TSltll:fJnDWX
Yara None matched
VirusTotal Search for analysis
Name e7ab73cdb831e90a_~wrs{60ef6888-a751-44cb-b7d9-135e09f88e79}.tmp
Filepath C:\Documents and Settings\zamen\Local Settings\Temporary Internet Files\Content.Word\~WRS{60EF6888-A751-44CB-B7D9-135E09F88E79}.tmp
Size 158.0KB
Processes 1812 (WINWORD.EXE)
Type data
MD5 4f24902e203d6ad0ac29a4bd8d1faac1
SHA1 0ef10a73bf67effc9a7d10c1daa6184b0a7202bf
SHA256 e7ab73cdb831e90ae1b097fd45d6cf9482cdb653cca62f2ad401939aa0e33f2e
CRC32 B5B4B934
ssdeep 1536:bbFbFL2LJRplRc5/kWXVpRr9/FBP0tN0SN:bRFIT0YX
Yara
  • PEiD_01686_Petite_v2_2____www_un4seen_com_petite_ - [Petite v2.2 -> www.un4seen.com/petite]
  • PEiD_02152_StarForce_V3_X_DLL____StarForce_Copy_Protection_System_ - [StarForce V3.X DLL -> StarForce Copy Protection System]
  • PEiD_03512_Xtreme_Protector_v1_05_ - [Xtreme-Protector v1.05]
VirusTotal Search for analysis
Name 3d5bc0c3c759609b_opa12.dat
Filepath C:\Documents and Settings\All Users\Application Data\Microsoft\OFFICE\DATA\opa12.dat
Size 8.0KB
Processes 1812 (WINWORD.EXE)
Type data
MD5 0e7e24ed21bd5da96b0d882d5a043ad4
SHA1 543bba04369e50dfb74d27d24e1069810a5707ea
SHA256 3d5bc0c3c759609b3637e8efb7508600ec8a175e601779916097537c80092f2d
CRC32 E4BF56FA
ssdeep 192:12xaaUyse71abxl0fatpNnxa/2WvVJBZHp5isu/dY/tBNLqu5Xw2a:12x3slgatpNnxZGplu1Yte2ba
Yara None matched
VirusTotal Search for analysis
Sorry! No dropped buffers.
Task ID 1382
Mongo ID 5c7fb5b311d30812ab7206f5
Cuckoo release 2.0-dev