analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Approved_payment_info_127007739.docm

Full analysis: https://app.any.run/tasks/583ecb77-3887-4a64-b12d-f0a16c3d0bca
Verdict: Malicious activity
Analysis date: July 17, 2019, 22:09:07
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
macros-on-close
generated-doc
maldoc-4
Indicators:
MIME: application/vnd.openxmlformats-officedocument.wordprocessingml.document
File info: Microsoft Word 2007+
MD5:

A4F76A47147C5164421F991933A39CC5

SHA1:

341BA844EC4087D9F6EE3D78D53C953BF28B9941

SHA256:

041E64E6D783B7CD1BC3EB21EB621EACB08A3175005B400C3B06F3676E434859

SSDEEP:

3072:OkUXyfNSX//O/VyhP3z4/gT+taMTW2Dlg5z5BNs8RdDPKrSQuOpY9/t5NeINi:vUifu/W/a30lTrlgt5BNs8R1PQSDusvg

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from Microsoft Office

      • WINWORD.EXE (PID: 3480)
    • Executes scripts

      • WINWORD.EXE (PID: 3480)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 3480)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3480)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.docm | Word Microsoft Office Open XML Format document (with Macro) (53.6)
.docx | Word Microsoft Office Open XML Format document (24.2)
.zip | Open Packaging Conventions container (18)
.zip | ZIP compressed archive (4.1)

EXIF

XMP

Creator: -

XML

ModifyDate: 2019:07:17 13:53:00Z
CreateDate: 2019:07:08 09:55:00Z
RevisionNumber: 1
LastModifiedBy: -
AppVersion: 14
HyperlinksChanged: No
SharedDoc: No
CharactersWithSpaces: 662960
LinksUpToDate: No
Company: -
TitlesOfParts: -
HeadingPairs:
  • Title
  • 1
ScaleCrop: No
Paragraphs: 1325
Lines: 4709
DocSecurity: None
Application: Microsoft Office Word
Characters: 565138
Words: 99147
Pages: 118
TotalEditTime: -
Template: Normal.dotm

ZIP

ZipFileName: [Content_Types].xml
ZipUncompressedSize: 2645
ZipCompressedSize: 501
ZipCRC: 0xc6337d17
ZipModifyDate: 1980:01:01 00:00:00
ZipCompression: Deflated
ZipBitFlag: -
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe no specs wscript.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3480"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Approved_payment_info_127007739.docm"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
2680"C:\Windows\System32\wscript.exe" /e:JScript "C:\Users\admin\AppData\Local\Temp\Approved_payment_info_127007739.docm.dec"C:\Windows\System32\wscript.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Total events
948
Read events
897
Write events
42
Delete events
9

Modification events

(PID) Process:(3480) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:writeName:1)>
Value:
31293E00980D0000010000000000000000000000
(PID) Process:(3480) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(3480) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(3480) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:WORDFiles
Value:
1324417054
(PID) Process:(3480) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:ProductFiles
Value:
1324417168
(PID) Process:(3480) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:ProductFiles
Value:
1324417169
(PID) Process:(3480) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
Operation:writeName:MTTT
Value:
980D00002EBE004AEC3CD50100000000
(PID) Process:(3480) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:writeName:y*>
Value:
792A3E00980D000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000
(PID) Process:(3480) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:delete valueName:y*>
Value:
792A3E00980D000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000
(PID) Process:(3480) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
Executable files
0
Suspicious files
0
Text files
2
Unknown types
2

Dropped files

PID
Process
Filename
Type
3480WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRED11.tmp.cvr
MD5:
SHA256:
3480WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5658F5EE.png
MD5:
SHA256:
3480WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E0BAC878-379F-4F4F-B602-E3A7EA2543BD}.tmp
MD5:
SHA256:
3480WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A9777380-4C4F-452E-B604-C5C84D6C4B3B}.tmp
MD5:
SHA256:
3480WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{48045A37-D2E0-4EC3-A87A-0824EE1C4D49}.tmp
MD5:
SHA256:
3480WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{10B0D4D7-4B76-4C0A-823F-86C6E48EC66E}.tmp
MD5:
SHA256:
3480WINWORD.EXEC:\Users\admin\AppData\Local\Temp\Approved_payment_info_127007739.docm.dectext
MD5:BDC98427C01D3882E65079372541EEE0
SHA256:522A1B267912EDD8B21C179676E5557E5EED02587BFAB1BFC675AF4B3D0444FD
3480WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$proved_payment_info_127007739.docmpgc
MD5:321BB18283CD7B9A415FDE351EE7F0C7
SHA256:C70176055F92B32AE66395D5FD59163AA576210A0EA0F6419E83143993E44D47
3480WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:ACC0F8F488767AE9712541A663B1E592
SHA256:8F0AE9236BAEC839C804884FFFC30E132DCB2D5431F9189E6C5A8DAACB0810AE
3480WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lextext
MD5:F3B25701FE362EC84616A93A45CE9998
SHA256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info