File name:

d2a8ab3ae798c09a368bfeffbfef3c74.rtf

Full analysis: https://app.any.run/tasks/cc92deda-accf-4f16-833b-d925e71c515c
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: February 19, 2019, 02:17:44
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ole-embedded
opendir
loader
rat
nanocore
trojan
Indicators:
MIME: text/rtf
File info: Rich Text Format data, unknown version
MD5:

D2A8AB3AE798C09A368BFEFFBFEF3C74

SHA1:

4CC496A7BFBE9EA88C3B64124AF5A622A05935B8

SHA256:

3D86704CD0DFA0B666568B8A9FCC01D4AD69A1BA523A66710972FDD623EF515D

SSDEEP:

192:/xdEnADW+5LZUbMil4gaOmfJBo0VxkO9q3BCV49wo:/UnMNLbzoNOU1

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Requests a remote executable file from MS Office

      • WINWORD.EXE (PID: 2968)
    • Executable content was dropped or overwritten

      • WINWORD.EXE (PID: 2968)
    • Unusual execution from Microsoft Office

      • WINWORD.EXE (PID: 2968)
    • Application was dropped or rewritten from another process

      • file.exe (PID: 3020)
      • file.exe (PID: 2760)
    • NanoCore was detected

      • file.exe (PID: 2760)
    • Connects to CnC server

      • file.exe (PID: 2760)
  • SUSPICIOUS

    • Unusual connect from Microsoft Office

      • WINWORD.EXE (PID: 2968)
    • Application launched itself

      • file.exe (PID: 3020)
    • Creates files in the user directory

      • file.exe (PID: 2760)
    • Connects to unusual port

      • file.exe (PID: 2760)
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 2968)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2968)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rtf | Rich Text Format (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
3
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start winword.exe file.exe #NANOCORE file.exe

Process information

PID
CMD
Path
Indicators
Parent process
2760C:\Users\admin\AppData\Roaming\file.exeC:\Users\admin\AppData\Roaming\file.exe
file.exe
User:
admin
Company:
PMA INVEST SRL
Integrity Level:
HIGH
Description:
The library provides an abstraction over IoC containers and service locators. Using the library allows an application to indirectly access the capabilities without relying on hard references.
Exit code:
0
Version:
3.12.22.4
Modules
Images
c:\users\admin\appdata\roaming\file.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2968"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\d2a8ab3ae798c09a368bfeffbfef3c74.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
3020"C:\Users\admin\AppData\Roaming\file.exe" C:\Users\admin\AppData\Roaming\file.exe
WINWORD.EXE
User:
admin
Company:
PMA INVEST SRL
Integrity Level:
HIGH
Description:
The library provides an abstraction over IoC containers and service locators. Using the library allows an application to indirectly access the capabilities without relying on hard references.
Exit code:
0
Version:
3.12.22.4
Modules
Images
c:\users\admin\appdata\roaming\file.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
1 222
Read events
885
Write events
332
Delete events
5

Modification events

(PID) Process:(2968) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:writeName:1$,
Value:
31242C00980B0000010000000000000000000000
(PID) Process:(2968) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(2968) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(2968) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:WORDFiles
Value:
1314062359
(PID) Process:(2968) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:ProductFiles
Value:
1314062480
(PID) Process:(2968) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:ProductFiles
Value:
1314062481
(PID) Process:(2968) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
Operation:writeName:MTTT
Value:
980B0000E258FA55F9C7D40100000000
(PID) Process:(2968) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:writeName:;%,
Value:
3B252C00980B000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000
(PID) Process:(2968) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:delete valueName:;%,
Value:
3B252C00980B000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000
(PID) Process:(2968) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
Executable files
2
Suspicious files
2
Text files
0
Unknown types
2

Dropped files

PID
Process
Filename
Type
2968WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRE822.tmp.cvr
MD5:
SHA256:
2968WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:
SHA256:
2968WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$a8ab3ae798c09a368bfeffbfef3c74.rtfpgc
MD5:
SHA256:
2968WINWORD.EXEC:\Users\admin\AppData\Local\Temp\Abctfhghghghghg.sctbinary
MD5:
SHA256:
2968WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\4500089024[1].exeexecutable
MD5:
SHA256:
2760file.exeC:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\run.datbinary
MD5:
SHA256:
2968WINWORD.EXEC:\Users\admin\AppData\Roaming\file.exeexecutable
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
29
DNS requests
15
Threats
25

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2968
WINWORD.EXE
GET
200
111.90.142.93:80
http://challengerllfts.com/4500089024.exe
MY
executable
380 Kb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2968
WINWORD.EXE
111.90.142.93:80
challengerllfts.com
MY
malicious
2760
file.exe
8.8.8.8:53
Google Inc.
US
malicious
2760
file.exe
192.169.69.25:5541
kendomoney2.duckdns.org
Wowrack.com
US
malicious
2760
file.exe
184.75.209.177:5541
kendomoney.duckdns.org
Amanah Tech Inc.
CA
suspicious

DNS requests

Domain
IP
Reputation
challengerllfts.com
  • 111.90.142.93
suspicious
kendomoney2.duckdns.org
  • 192.169.69.25
malicious
kendomoney.duckdns.org
  • 184.75.209.177
malicious

Threats

PID
Process
Class
Message
2968
WINWORD.EXE
A Network Trojan was detected
ET CURRENT_EVENTS Possible Malicious Macro DL EXE Feb 2016
2968
WINWORD.EXE
A Network Trojan was detected
ET CURRENT_EVENTS Possible Malicious Macro EXE DL AlphaNumL
2968
WINWORD.EXE
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2760
file.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
2760
file.exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 60B
2760
file.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
2760
file.exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 60B
2760
file.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
2760
file.exe
A Network Trojan was detected
ET TROJAN Possible NanoCore C2 60B
2760
file.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
No debug info