analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

1302fdf298c1cd6551a3560d782079b6

Full analysis: https://app.any.run/tasks/6303e6b2-3d2f-4bce-9f7d-0df0eaf913f8
Verdict: Malicious activity
Analysis date: October 20, 2020, 11:56:38
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Title: 331 372 393 331, Author: Windows User, Template: Normal.dotm, Last Saved By: Windows User, Revision Number: 7, Name of Creating Application: Microsoft Office Word, Total Editing Time: 05:00, Create Time/Date: Mon Dec 2 20:45:00 2019, Last Saved Time/Date: Mon Dec 2 21:02:00 2019, Number of Pages: 10, Number of Words: 43971, Number of Characters: 250640, Security: 0
MD5:

1302FDF298C1CD6551A3560D782079B6

SHA1:

3404BAC497F27832F2A5EB72DC2AC0015BCB3212

SHA256:

5728A1B772E60B54AB67BB3B7B3579673BB4906D32BE767C0D68D4E228A5210A

SSDEEP:

6144:Tx7ZRcU8ajOuxc9bLwdft9EJSp9/qNLs+kwEF+5:Tx7ZRVjEudft9E8pEywEF

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from Microsoft Office

      • WINWORD.EXE (PID: 1880)
    • Executes scripts

      • WINWORD.EXE (PID: 1880)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 1880)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 1880)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

CompObjUserType: Microsoft Word 97-2003 Document
CompObjUserTypeLen: 32
HeadingPairs:
  • Title
  • 1
TitleOfParts: -
HyperlinksChanged: No
SharedDoc: No
LinksUpToDate: No
ScaleCrop: No
AppVersion: 15
CharCountWithSpaces: 294023
Paragraphs: 588
Lines: 2088
Company: -
CodePage: Windows Latin 1 (Western European)
Security: None
Characters: 250640
Words: 43971
Pages: 10
ModifyDate: 2019:12:02 21:02:00
CreateDate: 2019:12:02 20:45:00
TotalEditTime: 5.0 minutes
Software: Microsoft Office Word
RevisionNumber: 7
LastModifiedBy: Windows User
Template: Normal.dotm
Comments: -
Keywords: -
Author: Windows User
Subject: -
Title: 331 372 393 331
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe no specs wscript.exe no specs dw20.exe no specs dwwin.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1880"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\1302fdf298c1cd6551a3560d782079b6.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
1948"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Roaming\Microsoft\Word\MassFol\Users.jse" C:\Users\admin\AppData\Roaming\Microsoft\Templates\Normal.dotmC:\Windows\System32\WScript.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Version:
5.8.7600.16385
2396"C:\PROGRA~1\COMMON~1\MICROS~1\DW\DW20.EXE" -x -s 1468C:\PROGRA~1\COMMON~1\MICROS~1\DW\DW20.EXEWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Application Error Reporting
Exit code:
0
Version:
14.0.6015.1000
2304C:\Windows\system32\dwwin.exe -x -s 1468C:\Windows\system32\dwwin.exeDW20.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Watson Client
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
1 279
Read events
854
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
3
Text files
0
Unknown types
6

Dropped files

PID
Process
Filename
Type
1880WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR41B1.tmp.cvr
MD5:
SHA256:
1880WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D1085DF0.wmf
MD5:
SHA256:
1880WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1CE1A97E.wmf
MD5:
SHA256:
1880WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E9C0B391-F407-4C36-947E-B5E1D88532BC}.tmp
MD5:
SHA256:
1880WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~DF6A839020CD801946.TMP
MD5:
SHA256:
1880WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~DF5BD546497DE36352.TMP
MD5:
SHA256:
1880WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{D3DE9A4B-BD8F-4089-AF00-57CBF0842F9C}.tmpbinary
MD5:6597E10DFE0C3DFE772B1308E9474EB5
SHA256:6A4CC02A57101F133A6F8D84F1C3D0E629649D789C70C21D0B48F7FB3F29886C
1880WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:FB0A80D87CEECDB167EAE1CAD465CC12
SHA256:E3BBC90BE196079DDA92D65110BEC977A979FEF4D008B58A7D2953D26E5C9978
1880WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EDA70EB.wmfwmf
MD5:BF29C0C2AA72E15693300503DE78A8FE
SHA256:21376D69B6F9226A9D41B4C7BFF3BD1D25631CE39E1B4F18A6D0EC6C3DBEA5F6
1880WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$02fdf298c1cd6551a3560d782079b6.docpgc
MD5:9E771C0DE418D5B8EC21CC12609402DD
SHA256:50735BE8F132F17E102E2CB3B8548DE78C44E70A11A6575B1C0859A43394CC12
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info