analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

0d25947452fbd14301f660f357845760693eabf61e99bd55c7ab47a44a88ccd5

Full analysis: https://app.any.run/tasks/4760e92e-51ff-4182-8306-1091e00ae71f
Verdict: Malicious activity
Analysis date: March 30, 2020, 18:07:17
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
maldoc-47
generated-doc
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Author: Windows User;Frank N9cZGfABaqO, Template: Normal.dotm, Last Saved By: Windows User, Revision Number: 2, Name of Creating Application: Microsoft Office Word, Create Time/Date: Wed Feb 26 14:28:00 2020, Last Saved Time/Date: Wed Feb 26 14:28:00 2020, Number of Pages: 37, Number of Words: 49960, Number of Characters: 284776, Security: 0
MD5:

B7AB8626AAF0365D373A180BDE43CCAB

SHA1:

180D60EA1CF1043D38F2CBE3C2614ABF939501AD

SHA256:

0D25947452FBD14301F660F357845760693EABF61E99BD55C7AB47A44A88CCD5

SSDEEP:

12288:rcJPYlPq6eBc6Cnc1uRIPZ01/JDuXBFnrYSZUBOZ/e7/Tm:iPYloCnYUnJDuXTr3mB6mT

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Dropped object may contain Bitcoin addresses

      • WINWORD.EXE (PID: 2644)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 2644)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2644)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

Title: -
Subject: -
Author: Windows User;Frank N9cZGfABaqO
Keywords: -
Comments: -
Template: Normal.dotm
LastModifiedBy: Windows User
RevisionNumber: 2
Software: Microsoft Office Word
TotalEditTime: -
CreateDate: 2020:02:26 14:28:00
ModifyDate: 2020:02:26 14:28:00
Pages: 37
Words: 49960
Characters: 284776
Security: None
CodePage: Windows Latin 1 (Western European)
Company: -
Lines: 2373
Paragraphs: 668
CharCountWithSpaces: 334068
AppVersion: 15
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts: -
HeadingPairs:
  • Title
  • 1
CompObjUserTypeLen: 32
CompObjUserType: Microsoft Word 97-2003 Document
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
1
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2644"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\0d25947452fbd14301f660f357845760693eabf61e99bd55c7ab47a44a88ccd5.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
Total events
1 988
Read events
912
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
0
Unknown types
5

Dropped files

PID
Process
Filename
Type
2644WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR6B84.tmp.cvr
MD5:
SHA256:
2644WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\77DA3331.wmf
MD5:
SHA256:
2644WINWORD.EXEC:\Users\admin\AppData\Local\Temp\Word8.0\MSTSCLib.exdtlb
MD5:0DEFCF5F5FA8E3B042A8F861B60E6CC1
SHA256:8F5D4C656AA312907B3F33182276FBCCAE37E94E02FDB3222A35A58ACDA000C4
2644WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$25947452fbd14301f660f357845760693eabf61e99bd55c7ab47a44a88ccd5.docpgc
MD5:25E8ADC87D286B11A058E654D0A1A618
SHA256:5D3E6648E228BD803125A8D65325132C3845744BADDB8E440405F9B5F8467CF9
2644WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A681E3F0.emfemf
MD5:C4780D26CACC4F561E24704A089BD2BC
SHA256:A48023442B895884866633C038722C9EEFE4F8ED4449CF3601B96EA94D8B47D0
2644WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5B6E8EEB.wmfwmf
MD5:FB1D3B1BDA412CEE891FE77D5F137533
SHA256:9F793AB14851E77839F1A69A87C5D8C486E22A4B37D5C433C63DB70F9D9F3B93
2644WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:ED61E8FC2CE353E9EAA269333D5EDC7C
SHA256:99FD5C7E6F3EF5AB79B525CC0462B7883864B4DDC3EBC2E99EDC3C0283C6B7EB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info