analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

0b437500ecb3c969ab60fddf98dce4e0.doc

Full analysis: https://app.any.run/tasks/cd712824-ac0d-4c4b-bc32-ea5ac7046992
Verdict: Malicious activity
Analysis date: April 15, 2019, 08:29:46
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1255, Title: Word Template, Author: Sagy Kratu, Template: Normal.dotm, Last Saved By: admin, Revision Number: 226, Name of Creating Application: Microsoft Office Word, Total Editing Time: 15:00:00, Last Printed: Sat Jan 30 01:17:00 2010, Create Time/Date: Thu Aug 13 08:29:00 2015, Last Saved Time/Date: Wed Jul 4 19:24:00 2018, Number of Pages: 3, Number of Words: 585, Number of Characters: 2930, Security: 0
MD5:

0B437500ECB3C969AB60FDDF98DCE4E0

SHA1:

35B71F1E6FB9DF9EDA6DE0A93F7AE8C7E2E21BC0

SHA256:

5A493F66EE1780271C5BEB9C4C003EB16E8C160C0B301C8E49244A54C1A2C67B

SSDEEP:

6144:9VBYujMpODRFluwAnwL6I94Mj1UoT2KJo81wmefyc6D02h4oahZnwm0t:9kuo5wA44MdT8fy9LhXeZnwj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executable content was dropped or overwritten

      • WINWORD.EXE (PID: 2940)
  • SUSPICIOUS

    • Creates executable files which already exist in Windows

      • WINWORD.EXE (PID: 2940)
  • INFO

    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2940)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 2940)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (35.3)
.pps/ppt | Microsoft PowerPoint document (34.8)
.doc | Microsoft Word document (old ver.) (20.9)

EXIF

FlashPix

CompObjUserType: Microsoft Word 97-2003 Document
CompObjUserTypeLen: 32
Classification_1: VWB1eml7dXVTd0FidWJ8aGRqU4mIfoaSOiA6hoiALSFIc5aEkzBJK01cVUxH
ClassificationEntries: 1
Set: OT0xLA==
WMark: TQ==
FText: Np0hOjI7LCeSMpSPb5+Lno15lSc3ZTCSOj0vgYqALSFTLzcqIZmXU56CgEGZkYWciZmWmpGJgQ==
HText: -
DomainID: XX90eXZ5dXRLZ0Bif311YmRpXnh1dWRaeWR4X1tEeHVDeHV1
PolicyID: VHlwenZ7Jn1LNEAxLn1xajBsXnAncjZaeDFwW1xGcHaScXMn
Version: Xw==
PolicyName: Pyo3PTQgJjCDMw==
Verifier: Pyo3PTQgJjCDMw==
ClassificationDisplay: [Restricted] ONLY for designated groups and individuals
Classification: Restricted
CodePage: Windows Hebrew
HeadingPairs:
  • Title
  • 1
TitleOfParts: Word Template
HyperlinksChanged: No
SharedDoc: No
LinksUpToDate: No
ScaleCrop: No
AppVersion: 14
CharCountWithSpaces: 3508
Paragraphs: 7
Lines: 24
Company: Check Point
Security: None
Characters: 2930
Words: 585
Pages: 3
ModifyDate: 2018:07:04 18:24:00
CreateDate: 2015:08:13 07:29:00
LastPrinted: 2010:01:30 01:17:00
TotalEditTime: 15.0 hours
Software: Microsoft Office Word
RevisionNumber: 226
LastModifiedBy: admin
Template: Normal.dotm
Keywords: -
Author: Sagy Kratu
Subject: -
Title: Word Template
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
31
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe

Process information

PID
CMD
Path
Indicators
Parent process
2940"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\0b437500ecb3c969ab60fddf98dce4e0.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
Total events
875
Read events
762
Write events
109
Delete events
4

Modification events

(PID) Process:(2940) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:writeName:j~>
Value:
6A7E3E007C0B0000010000000000000000000000
(PID) Process:(2940) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(2940) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(2940) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:WORDFiles
Value:
1317994526
(PID) Process:(2940) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:ProductFiles
Value:
1317994648
(PID) Process:(2940) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:ProductFiles
Value:
1317994649
(PID) Process:(2940) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
Operation:writeName:MTTT
Value:
7C0B0000FA0EA26B65F3D40100000000
(PID) Process:(2940) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:writeName:d>
Value:
647F3E007C0B000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000
(PID) Process:(2940) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:delete valueName:d>
Value:
647F3E007C0B000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000
(PID) Process:(2940) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
Executable files
3
Suspicious files
0
Text files
7
Unknown types
3

Dropped files

PID
Process
Filename
Type
2940WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRFEEA.tmp.cvr
MD5:
SHA256:
2940WINWORD.EXEC:\temp\Command&Control.txttext
MD5:9E25D20C989C6F85CDCC56778AB2CB63
SHA256:D79FD90ED33D7201A28CEDD4B81E71F70BA38FBC72DBC024E8DD0DDC8D6E2DB2
2940WINWORD.EXEC:\temp\googservices.exetext
MD5:9E25D20C989C6F85CDCC56778AB2CB63
SHA256:D79FD90ED33D7201A28CEDD4B81E71F70BA38FBC72DBC024E8DD0DDC8D6E2DB2
2940WINWORD.EXEC:\temp\dns.comtext
MD5:9E25D20C989C6F85CDCC56778AB2CB63
SHA256:D79FD90ED33D7201A28CEDD4B81E71F70BA38FBC72DBC024E8DD0DDC8D6E2DB2
2940WINWORD.EXEC:\Users\admin\AppData\Local\Temp\VBE\MSForms.exdtlb
MD5:ACB460004D04DF7316016237E00DB954
SHA256:F5549EF45859C996F7AF043D8F89ECBF9DB0C1537E53BBA7F278B973C9EF4E44
2940WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$437500ecb3c969ab60fddf98dce4e0.docpgc
MD5:09F57124E900128EF00E97837E1A1A7D
SHA256:12C1A341D48310CF85CB16F44751220A85F60D23D0C4FC72085E5E6C0CAA8C73
2940WINWORD.EXEC:\temp\Test.exeexecutable
MD5:D378BFFB70923139D6A4F546864AA61C
SHA256:C4232DDD4D37B9C0884BD44D8476578C54D7F98D58945728E425736A6A07E102
2940WINWORD.EXEC:\temp\nntp.exetext
MD5:9E25D20C989C6F85CDCC56778AB2CB63
SHA256:D79FD90ED33D7201A28CEDD4B81E71F70BA38FBC72DBC024E8DD0DDC8D6E2DB2
2940WINWORD.EXEC:\temp\Control.exetext
MD5:9E25D20C989C6F85CDCC56778AB2CB63
SHA256:D79FD90ED33D7201A28CEDD4B81E71F70BA38FBC72DBC024E8DD0DDC8D6E2DB2
2940WINWORD.EXEC:\temp\services.exetext
MD5:9E25D20C989C6F85CDCC56778AB2CB63
SHA256:D79FD90ED33D7201A28CEDD4B81E71F70BA38FBC72DBC024E8DD0DDC8D6E2DB2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info