File name:

OLE Doc Exploit (Embedded) + FUD.DOC Exploit (2019).rar

Full analysis: https://app.any.run/tasks/3dceeb4d-a1fb-4f03-906f-9d4327afa163
Verdict: Malicious activity
Analysis date: September 19, 2023, 16:09:49
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

99064FBD264386338781B95791CC07D8

SHA1:

6610E20A521F1A312D12AB31DE9567C3F0444C5F

SHA256:

57D1C09E873734CC40387ADBCE98900A1895A91ACE75B22E2FDA5946B1D1AC3C

SSDEEP:

24576:DnPEw14+/RVyCJHeYCWOLckc+QOvS4Ev4712t00g3:Dv1L/aCJHmghgjEvM2eL3

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • DOC Exploit.exe (PID: 2624)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Checks supported languages

      • DOC Exploit.exe (PID: 2624)
      • wmpnscfg.exe (PID: 2100)
    • Reads the computer name

      • DOC Exploit.exe (PID: 2624)
      • wmpnscfg.exe (PID: 2100)
    • Reads mouse settings

      • DOC Exploit.exe (PID: 2624)
    • Reads the machine GUID from the registry

      • DOC Exploit.exe (PID: 2624)
      • wmpnscfg.exe (PID: 2100)
    • Manual execution by a user

      • DOC Exploit.exe (PID: 2624)
      • wmpnscfg.exe (PID: 2100)
      • WINWORD.EXE (PID: 996)
    • Create files in a temporary directory

      • DOC Exploit.exe (PID: 2624)
    • The process uses the downloaded file

      • WINWORD.EXE (PID: 2728)
      • WINWORD.EXE (PID: 996)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
43
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs doc exploit.exe no specs winword.exe no specs wmpnscfg.exe no specs winword.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
996"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\OLE Doc Exploit (Embedded) + FUD.DOC Exploit (2019)\HUOHEV.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\comctl32.dll
2100"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\ole32.dll
2624"C:\Users\admin\Desktop\OLE Doc Exploit (Embedded) + FUD.DOC Exploit (2019)\DOC Exploit.exe" C:\Users\admin\Desktop\OLE Doc Exploit (Embedded) + FUD.DOC Exploit (2019)\DOC Exploit.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225547
Modules
Images
c:\users\admin\desktop\ole doc exploit (embedded) + fud.doc exploit (2019)\doc exploit.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\version.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
2728"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -EmbeddingC:\Program Files\Microsoft Office\Office14\WINWORD.EXEsvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\comctl32.dll
3496"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\OLE Doc Exploit (Embedded) + FUD.DOC Exploit (2019).rar"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
Total events
15 587
Read events
14 885
Write events
515
Delete events
187

Modification events

(PID) Process:(3496) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\178\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3496) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(3496) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3496) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3496) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3496) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3496) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3496) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2624) DOC Exploit.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:NodeSlots
Value:
0202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202
(PID) Process:(2624) DOC Exploit.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:MRUListEx
Value:
0E00000007000000020000000000000006000000010000000C0000000B0000000D0000000A0000000900000008000000030000000500000004000000FFFFFFFF
Executable files
9
Suspicious files
22
Text files
11
Unknown types
0

Dropped files

PID
Process
Filename
Type
2728WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR2404.tmp.cvr
MD5:
SHA256:
3496WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3496.28483\OLE Doc Exploit (Embedded) + FUD.DOC Exploit (2019)\READ ME.txttext
MD5:DF678E3ED55C7C4ADF6B8B77E027C870
SHA256:BF2AB3300BF19FEF742E7542D42EBA77D49E1F2D90E6EEA691BF6E1FD6D3803E
3496WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3496.28483\OLE Doc Exploit (Embedded) + FUD.DOC Exploit (2019)\Textdokument (neu).txttext
MD5:C2DFD6B021FDF3DA03FC3673858030EC
SHA256:B5C6F1771C9C1BBA7437615D85ED0CA90046C5BCCF7BED09B6482432CD2FC372
3496WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3496.28483\OLE Doc Exploit (Embedded) + FUD.DOC Exploit (2019)\Tutorial.txttext
MD5:A747E8C5CBFDDB4A88E003BE113C5E3B
SHA256:22822224FCB76B6F525945423BE011533A257D6E0D597C9F735F9687B8012DB1
3496WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3496.28483\OLE Doc Exploit (Embedded) + FUD.DOC Exploit (2019)\putty.exeexecutable
MD5:14080A3E4E877BE235F06509B2A4B6A9
SHA256:35C9DF3A348AE805902A95AB8AD32A6D61EF85CA8249AE78F1077EDD2429FE6B
2624DOC Exploit.exeC:\Users\admin\AppData\Local\Temp\autAD3F.tmpbinary
MD5:01A0C1BD8DEFC2DF7796D1E9542A2EBB
SHA256:2FD19F4D0636BE9A381C399792073BD49E67E8715254239EFC3ED729FE824865
2624DOC Exploit.exeC:\Users\admin\AppData\Local\Temp\autACF0.tmpbinary
MD5:A7984E49D25A9FB3D2CDC2885DC7ACD8
SHA256:4BE16BAB3B82A736BD47DDDE8FCDD09A76A6F1B4032AB883DFBF2325E7E36E9F
2624DOC Exploit.exeC:\Users\admin\AppData\Local\Temp\skinclas.msstylesexecutable
MD5:719C51F5637D922E8416E23D0978B8CB
SHA256:6CF0BF46C9EE98FDE7EB4DBC0B147E33BABEABF9B1F50A4722E29DD57E95EF09
2624DOC Exploit.exeC:\Users\admin\AppData\Local\Temp\skin.dllexecutable
MD5:29E1D5770184BF45139084BCED50D306
SHA256:794987C4069286F797631F936C73B925C663C42D552AECA821106DFC7C7BA307
3496WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3496.28483\OLE Doc Exploit (Embedded) + FUD.DOC Exploit (2019)\DOC Exploit.exeexecutable
MD5:BC8ACFC2141FB98925F55201959881F2
SHA256:3AA395F65A4C7D67D4821D478328808409FA8BF0DB5448787663C296FC85652E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
2
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted

DNS requests

No data

Threats

No threats detected
No debug info