analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

PhfOidr4RZS5Dil3TVZ1_Documents_Pyament.doc

Full analysis: https://app.any.run/tasks/4690c074-5379-4690-ba9d-b5d2d6b3ee84
Verdict: Malicious activity
Analysis date: November 30, 2020, 03:43:35
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
ole-embedded
macros-on-open
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Author: Windows User, Template: Normal, Last Saved By: [email protected], Revision Number: 6, Name of Creating Application: Microsoft Office Word, Total Editing Time: 02:00, Create Time/Date: Fri Feb 28 03:49:00 2020, Last Saved Time/Date: Fri Nov 27 17:37:00 2020, Number of Pages: 1, Number of Words: 3, Number of Characters: 18, Security: 0
MD5:

44478B1455526CB5DF17C3821E5BDBE7

SHA1:

834E0A5DF8357DB3C1958D15F461878337E27828

SHA256:

42186A0DEC773C2E918B53A1FEF4C500713C6E95B2CC1342B77F3656BBE21BA6

SSDEEP:

24576:v/1JiitSQ7STXy/8Vef+qN56cOgK9x6wYFIXf8XGd0NZP9HHsuMQh:vNJiitDoXj0f+E56Lgcx6wYFIXf8XGdg

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Documents_payments.exe (PID: 868)
    • Unusual execution from Microsoft Office

      • WINWORD.EXE (PID: 2248)
    • Executable content was dropped or overwritten

      • WINWORD.EXE (PID: 2248)
  • SUSPICIOUS

    • Drops a file with a compile date too recent

      • WINWORD.EXE (PID: 2248)
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 2248)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2248)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

CompObjUserType: Microsoft Word 97-2003 Document
CompObjUserTypeLen: 32
HeadingPairs:
  • Title
  • 1
TitleOfParts: -
HyperlinksChanged: No
SharedDoc: No
LinksUpToDate: No
ScaleCrop: No
AppVersion: 16
CharCountWithSpaces: 20
Paragraphs: 1
Lines: 1
Company: -
CodePage: Windows Latin 1 (Western European)
Security: None
Characters: 18
Words: 3
Pages: 1
ModifyDate: 2020:11:27 17:37:00
CreateDate: 2020:02:28 03:49:00
TotalEditTime: 2.0 minutes
Software: Microsoft Office Word
RevisionNumber: 6
LastModifiedBy: [email protected]
Template: Normal
Keywords: -
Author: Windows User
Subject: -
Title: -
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start winword.exe documents_payments.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2248"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\PhfOidr4RZS5Dil3TVZ1_Documents_Pyament.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
868"C:\Users\admin\AppData\Local\Temp\Documents_payments.exe" C:\Users\admin\AppData\Local\Temp\Documents_payments.exeWINWORD.EXE
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
0.0.0.0
Total events
1 796
Read events
1 040
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
0
Text files
0
Unknown types
3

Dropped files

PID
Process
Filename
Type
2248WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR8276.tmp.cvr
MD5:
SHA256:
2248WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\111F65ED.emfemf
MD5:B3C7F0AC4F30CEE345176726BE7BCFC9
SHA256:643E3F79BCFB5275A3962B05556D3A11004D966D753806AFDD98D87CCD43B6A9
2248WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$fOidr4RZS5Dil3TVZ1_Documents_Pyament.docpgc
MD5:0405DE911597DCEF3017F2D867458055
SHA256:A9FA8FF7E96D704700DA9A8C8F35E5B0F96EAC296462785DDCD5DDEDBCF8A56E
2248WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:786E61290E32E28F687AD6B9BF14F4CF
SHA256:B1D4DB77829095C2AED27E974923787827D2117F4399982963D7452AFA9E99E2
2248WINWORD.EXEC:\Users\admin\AppData\Local\Temp\Documents_payments.exeexecutable
MD5:8AF606E68D329690D7FE0DDE19910899
SHA256:79BA8554F79BDBC40C1C24DF6A4339BEB900B3B80E202E8FE4B2708D0DD7731E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info