analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

533ba6af6fb6a529af62b0af69eff78dfe2478e8e693cd4fa4a3fec01570ddfa

Full analysis: https://app.any.run/tasks/c2e32273-98a8-4b87-b51a-17bb89074508
Verdict: Malicious activity
Analysis date: March 31, 2020, 07:41:51
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
maldoc-8
generated-doc
Indicators:
MIME: application/vnd.openxmlformats-officedocument.wordprocessingml.document
File info: Microsoft Word 2007+
MD5:

05B07832E9E004F72B0A599EDE0DBBCD

SHA1:

0E4490C6A714C413C52CA25D7FCA47DA85C8E4E0

SHA256:

533BA6AF6FB6A529AF62B0AF69EFF78DFE2478E8E693CD4FA4A3FEC01570DDFA

SSDEEP:

6144:b8GW+Yb57dvQAIWK7knpCdX/fbM5mboFg2xynDsXODCTb922fzuSsvtidEk/KCc:bUDdvfIp7XN/TqRxv++fYmyvti9KCc

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Starts CMD.EXE for commands execution

      • WINWORD.EXE (PID: 2956)
    • Unusual execution from Microsoft Office

      • WINWORD.EXE (PID: 2956)
  • SUSPICIOUS

    • Executes scripts

      • cmd.exe (PID: 3824)
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 2956)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2956)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.docm | Word Microsoft Office Open XML Format document (with Macro) (53.6)
.docx | Word Microsoft Office Open XML Format document (24.2)
.zip | Open Packaging Conventions container (18)
.zip | ZIP compressed archive (4.1)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0006
ZipCompression: Deflated
ZipModifyDate: 1980:01:01 00:00:00
ZipCRC: 0xfefd9a9e
ZipCompressedSize: 482
ZipUncompressedSize: 2010
ZipFileName: [Content_Types].xml

XMP

Title: -
Creator: -

XML

LastModifiedBy: -
RevisionNumber: 1
CreateDate: 2020:01:13 01:40:00Z
ModifyDate: 2020:02:25 13:14:00Z
Template: Normal.dotm
TotalEditTime: -
Pages: 1
Words: 1
Characters: 7
Application: Microsoft Office Word
DocSecurity: None
Lines: 1
Paragraphs: 1
ScaleCrop: No
HeadingPairs:
  • Название
  • 1
TitlesOfParts: -
LinksUpToDate: No
CharactersWithSpaces: 7
SharedDoc: No
HyperlinksChanged: No
AppVersion: 14
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe no specs cmd.exe no specs cscript.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2956"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\533ba6af6fb6a529af62b0af69eff78dfe2478e8e693cd4fa4a3fec01570ddfa.docm"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
3824cmd /c C:\AprilReport\LogsTsg\LogsTsg7\LogsTsg8\List1.batC:\Windows\system32\cmd.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
1444cscript //nologo C:\AprilReport\List1.jseC:\Windows\system32\cscript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Console Based Script Host
Version:
5.8.7600.16385
Total events
1 038
Read events
865
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
2
Unknown types
3

Dropped files

PID
Process
Filename
Type
2956WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR6C01.tmp.cvr
MD5:
SHA256:
2956WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~DF78E2F419F48D7E9F.TMP
MD5:
SHA256:
2956WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~DFFEE8BF0E2B7D3FC4.TMP
MD5:
SHA256:
2956WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~DF43589D36E8CC7AC9.TMP
MD5:
SHA256:
2956WINWORD.EXEC:\AprilReport\List1.jsetext
MD5:36254B3F04E27E6ECB138EB4DFE0675B
SHA256:8187C859F6667E0D58ECDA5F89D64E64A53D1FFA72943704700F976B197E6B74
2956WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:590D78103669C3F8759447C7133CDAE6
SHA256:4CB23FAB6EBDE683F9623E0BAD5BEE137093A02D33867372542B117700C30084
2956WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$3ba6af6fb6a529af62b0af69eff78dfe2478e8e693cd4fa4a3fec01570ddfa.docmpgc
MD5:12F78E4FCE81687195DCB20BC496DC39
SHA256:2F910DF2ACF5F9E5C8E8889C9914B6C65E7C6B3DD95B4B6907F085917AB7196E
2956WINWORD.EXEC:\Users\admin\AppData\Local\Temp\VBE\MSForms.exdtlb
MD5:C5393B0E718C013322A9FC458551DFFB
SHA256:A34832F2855E9172DC6D918EEB8EA32115515FB77E99439A69A98FFE9A571EE5
2956WINWORD.EXEC:\AprilReport\LogsTsg\LogsTsg7\LogsTsg8\List1.battext
MD5:EF370F56174BD3E1D2ED1597AE926A73
SHA256:2F1D06C3EDF1EB4044279924DE4D2485144FCD270056D5CFC4489D7B3E428C9F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info