analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Inv_18014895_.xps

Full analysis: https://app.any.run/tasks/7c10547d-63aa-462b-a2e1-b2ac9cbe18d8
Verdict: Suspicious activity
Analysis date: July 17, 2018, 17:24:23
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
generated-doc
Indicators:
MIME: application/octet-stream
File info: Microsoft OOXML
MD5:

036BEA9206F2F16925B5A5E8EB816514

SHA1:

5CC62D9CD98FA6B66080C66E7BEFDC96CDB66521

SHA256:

034EF3C1AF249FFF62D167914F962726B8F598D783EFA83B16C7EECCD0A8EA66

SSDEEP:

6144:yRSfjtaQBor5OW4Mt3yhzkA+1j7aQ2lObTRP1wSGxNZd5sHrpkRCloqKN28aTWf:qetBoZt3ynExPB0N92rORHRaTWf

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Starts Internet Explorer

      • xpsrchvw.exe (PID: 2228)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 2944)
    • Dropped object may contain URL's

      • xpsrchvw.exe (PID: 2228)
      • iexplore.exe (PID: 4048)
      • iexplore.exe (PID: 2384)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2384)
      • iexplore.exe (PID: 4048)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 4048)
      • iexplore.exe (PID: 2384)
    • Creates files in the user directory

      • iexplore.exe (PID: 2944)
      • iexplore.exe (PID: 2384)
      • FlashUtil32_27_0_0_187_ActiveX.exe (PID: 3328)
    • Application launched itself

      • iexplore.exe (PID: 2944)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2944)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2944)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.oxps/xps | Open XML Paper Specification (57)
.zip | Open Packaging Conventions container (35)
.zip | ZIP compressed archive (8)

EXIF

XML

ModifyDate: 2018:07:16 14:32:15Z
CreateDate: 2018:07:16 14:32:15Z

XMP

Creator: PC

ZIP

ZipFileName: [Content_Types].xml
ZipUncompressedSize: 1114
ZipCompressedSize: 369
ZipCRC: 0x69806908
ZipModifyDate: 1980:01:01 00:00:00
ZipCompression: Deflated
ZipBitFlag: 0x0006
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
5
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start xpsrchvw.exe no specs iexplore.exe iexplore.exe no specs iexplore.exe flashutil32_27_0_0_187_activex.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2228"C:\Windows\System32\xpsrchvw.exe" "C:\Users\admin\AppData\Local\Temp\Inv_18014895_.xps"C:\Windows\System32\xpsrchvw.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
XPS Viewer
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2944"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
xpsrchvw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
4048"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2944 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2384"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2944 CREDAT:6403C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3328C:\Windows\system32\Macromed\Flash\FlashUtil32_27_0_0_187_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_27_0_0_187_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 27.0 r0
Version:
27,0,0,187
Total events
702
Read events
600
Write events
100
Delete events
2

Modification events

(PID) Process:(2228) xpsrchvw.exeKey:HKEY_CURRENT_USER\Software\Microsoft\XPSViewer\View
Operation:writeName:PrevPagesToCache
Value:
2
(PID) Process:(2228) xpsrchvw.exeKey:HKEY_CURRENT_USER\Software\Microsoft\XPSViewer\View
Operation:writeName:NextPagesToCache
Value:
10
(PID) Process:(2228) xpsrchvw.exeKey:HKEY_CURRENT_USER\Software\Microsoft\XPSViewer\View
Operation:writeName:HoldAllMaxPagesToCache
Value:
20
(PID) Process:(2228) xpsrchvw.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Direct3D\MostRecentApplication
Operation:writeName:Name
Value:
xpsrchvw.exe
(PID) Process:(2228) xpsrchvw.exeKey:HKEY_CURRENT_USER\Software\Microsoft\XPSViewer
Operation:writeName:FindOptions
Value:
16
(PID) Process:(2944) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2944) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2944) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2944) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(2944) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
Executable files
0
Suspicious files
1
Text files
150
Unknown types
30

Dropped files

PID
Process
Filename
Type
2944iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XB3OCR2W\favicon[1].ico
MD5:
SHA256:
2944iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2228xpsrchvw.exeC:\Users\admin\AppData\LocalLow\Temp\Microsoft\OPC\DDT.34mnuck58k_4eiwr183bk4mbh.tmptext
MD5:0DF6BFCA5DEDA3F7DF2EA25A75FC2B03
SHA256:36AE83C2E3AE743C9C76DF91FED2EE0EDCB9C33FD9879990C54861C55454D83A
4048iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\MSIMGSIZ.DATsmt
MD5:5B62C13D97D3E9A8A72D46CA5136DCAB
SHA256:4F053C5055E702BB748E9931D4931CC3474C241F98C488FD3D9F49D2B0DDB238
2228xpsrchvw.exeC:\Users\admin\AppData\LocalLow\Temp\Microsoft\OPC\DDT.w0mchhxez211wrje919q8e4fh.tmpodttf
MD5:45E186A593091C73C480613C9F0C7B20
SHA256:4488ECB3C469E24DC3C79D4CD590FD5FBA8E310BE44F590D77F7B900B41BA0A5
2228xpsrchvw.exeC:\Users\admin\AppData\LocalLow\Temp\Microsoft\OPC\DDT.9zfaw8blaebbruetyp5i_m3hf.tmpimage
MD5:394B55E438BCEC5D94DBF6CDEC76979B
SHA256:2BEB895FCB83ABF7ACC6EAFC5ABDE0798F27F58F3F62C553BD6826F91A834018
2228xpsrchvw.exeC:\Users\admin\AppData\LocalLow\Temp\Microsoft\OPC\DDT.ykloouw8fi8l493khtnmcwq_f.tmpodttf
MD5:660A038F7E071B3EF92BC5010C21E66B
SHA256:4A5B8AD5E0AD0B33804A1539172701096F88B41F2CB96F29EFB5703069E53A7D
2384iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\index.datdat
MD5:102FBC8B1F8B20F32B42E20C5C98B7F4
SHA256:6C6E1660F2BE9E6F8245566347690B9C6F59ACF0CCCFDCFB6F9B214B5CFD5E66
2228xpsrchvw.exeC:\Users\admin\AppData\LocalLow\Temp\Microsoft\OPC\DDT.ntheig4jh22ib8g0c9fffg03f.tmpimage
MD5:E4D8C0B2BBB522E5FF421923008D032E
SHA256:C1D00A2A40C4FC1CDB6C766403C47511AEB8882C7CC615D070D101912ACDAB0E
2228xpsrchvw.exeC:\Users\admin\AppData\LocalLow\Temp\Microsoft\OPC\DDT.tr6oqrr06co4znl81ed2ycmpe.tmptext
MD5:AC794AF44742B83F69654F6DC892783A
SHA256:992AD808B02609EDB54AAF3D7AB16FF58E0D99A261A5FEDB57739071E6B941FA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
42
DNS requests
22
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2944
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2944
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2384
iexplore.exe
192.0.78.17:443
wordpress.com
Automattic, Inc
US
unknown
2384
iexplore.exe
104.28.27.165:443
1hostingmurah.com
Cloudflare Inc
US
shared
2384
iexplore.exe
192.0.76.3:443
stats.wp.com
Automattic, Inc
US
suspicious
2384
iexplore.exe
192.0.77.2:443
i2.wp.com
Automattic, Inc
US
suspicious
2384
iexplore.exe
192.229.233.25:443
platform.twitter.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2384
iexplore.exe
192.0.77.32:443
s0.wp.com
Automattic, Inc
US
suspicious
2384
iexplore.exe
104.17.104.89:443
embed.tawk.to
Cloudflare Inc
US
shared
2384
iexplore.exe
216.58.215.238:443
www.youtube.com
Google Inc.
US
whitelisted
2384
iexplore.exe
148.251.235.172:443
static.whatshelp.io
Hetzner Online GmbH
DE
unknown

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
trungdan.press
suspicious
1hostingmurah.com
  • 104.28.27.165
  • 104.28.26.165
suspicious
wordpress.com
  • 192.0.78.17
  • 192.0.78.9
whitelisted
i2.wp.com
  • 192.0.77.2
whitelisted
i1.wp.com
  • 192.0.77.2
whitelisted
i0.wp.com
  • 192.0.77.2
whitelisted
platform.twitter.com
  • 192.229.233.25
whitelisted
stats.wp.com
  • 192.0.76.3
whitelisted
s0.wp.com
  • 192.0.77.32
whitelisted

Threats

No threats detected
No debug info