analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

full_documents_258018423.doc

Full analysis: https://app.any.run/tasks/f31ac396-03f6-41ed-98ca-6229b08786fe
Verdict: Malicious activity
Analysis date: December 06, 2019, 15:17:12
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
generated-doc
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Author: Windows User, Comments: Fer 557 126 865 557, Template: Normal.dotm, Last Saved By: Windows User, Revision Number: 2, Name of Creating Application: Microsoft Office Word, Create Time/Date: Fri Dec 6 13:51:00 2019, Last Saved Time/Date: Fri Dec 6 13:51:00 2019, Number of Pages: 3, Number of Words: 44135, Number of Characters: 251572, Security: 0
MD5:

4F919327CBD03DBDA1AB92AAC86D05EE

SHA1:

2BDAC8BD2D67F815DA00143718275A4972291709

SHA256:

4E99817D69A6D09B66AA11354AF150ED02E79706A5326FF670ABA3B286DB59B6

SSDEEP:

6144:afnIhGceG//xrNFtGc2iqe7+D2EOmfsjcJeZwhV:OnIhJ//xrTtG+qc+DpUciwh

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executes scripts

      • WINWORD.EXE (PID: 2932)
    • Unusual execution from Microsoft Office

      • WINWORD.EXE (PID: 2932)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2932)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 2932)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

Title: -
Subject: -
Author: Windows User
Keywords: -
Comments: Fer 557 126 865 557
Template: Normal.dotm
LastModifiedBy: Windows User
RevisionNumber: 2
Software: Microsoft Office Word
TotalEditTime: -
CreateDate: 2019:12:06 13:51:00
ModifyDate: 2019:12:06 13:51:00
Pages: 3
Words: 44135
Characters: 251572
Security: None
CodePage: Windows Latin 1 (Western European)
Company: -
Lines: 2096
Paragraphs: 590
CharCountWithSpaces: 295117
AppVersion: 15
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts: -
HeadingPairs:
  • Title
  • 1
CompObjUserTypeLen: 32
CompObjUserType: Microsoft Word 97-2003 Document
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
34
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe no specs wscript.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2932"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\full_documents_258018423.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
3748"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Roaming\Microsoft\Word\kioutgfr\wsde556.jse" ArialC:\Windows\System32\WScript.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Version:
5.8.7600.16385
Total events
1 220
Read events
873
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
1
Text files
0
Unknown types
5

Dropped files

PID
Process
Filename
Type
2932WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRDF63.tmp.cvr
MD5:
SHA256:
2932WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2D4C54A3.wmf
MD5:
SHA256:
2932WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7E8FD9A9.wmf
MD5:
SHA256:
2932WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:0379EE03978EEBAEEC827CAF7B979965
SHA256:57B58B9F253158D038A7DEC0B1178EB429F9E6CB3EE46DAD157966ED5E7EF92D
2932WINWORD.EXEC:\users\admin\appdata\roaming\microsoft\word\kioutgfr\wsde556.jsebinary
MD5:6F331B2051888D057EC513A48A698B8C
SHA256:A4AA77B057BB4B4F2328842C605EFBC1E111D3FBD932ECC7477B3C9318CFCFE1
2932WINWORD.EXEC:\Users\admin\AppData\Local\Temp\Word8.0\MSForms.exdtlb
MD5:3014F1C4368996150E9A92D2F60B006F
SHA256:BC7D3DAF5B986D178825394CD89439AA028F86D0AF9910647F9547B89034B090
2932WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E294D0AA.wmfwmf
MD5:44DAE8E4009FE1EAC35B01FB6DAC56F2
SHA256:9EE39063467535146C78DAF41630C1E5A7F795285141E114BF9C9A090BE7BD93
2932WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FA843E48.wmfwmf
MD5:938D8E5A06F1302023D05FE7329FA65C
SHA256:C2E07C99A52C2309799F340C934263618EE5F1A430B476F8A164955AED6F55D8
2932WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$ll_documents_258018423.docpgc
MD5:61F690AA4CAA22514825FBF00B2D1BA6
SHA256:C63E1531E2AA12EB2AE5601E71642F247A303803F5B3177FE433D833B5420595
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info