analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

fadpoglsi2611.doc

Full analysis: https://app.any.run/tasks/74e349ea-af87-49f7-bb36-f29f719c4b2f
Verdict: Malicious activity
Analysis date: October 19, 2020, 22:12:43
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
macros-on-close
generated-doc
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Tue Oct 13 18:13:00 2020, Last Saved Time/Date: Mon Oct 19 14:52:00 2020, Number of Pages: 1, Number of Words: 127541, Number of Characters: 726986, Security: 0
MD5:

8E1DE14AF9BAD6819A0164DEA7E841EE

SHA1:

80B5EA6B849129D210644F77657EA6651250FE54

SHA256:

60085FD6B1E7C9E28D596228E36111DD47F564AF10E85EEB46E320822E281468

SSDEEP:

12288:U65z7Xg4JEg3XSThnkGeLdZZNc/2viqPvK5oWBa3sc09AWv55RSLCtTu/pI/pE:5w4r3XS96LdZZNT1/18AWvDQIa

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Creates files in the program directory

      • WINWORD.EXE (PID: 2740)
    • Executed via WMI

      • explorer.exe (PID: 2636)
    • Executes scripts

      • explorer.exe (PID: 2120)
    • Executed via COM

      • explorer.exe (PID: 2120)
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 2740)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2740)
    • Dropped object may contain Bitcoin addresses

      • WINWORD.EXE (PID: 2740)
    • Manual execution by user

      • notepad++.exe (PID: 3312)
      • explorer.exe (PID: 1748)
      • WScript.exe (PID: 3112)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

Title: -
Subject: -
Author: -
Keywords: -
Comments: -
Template: Normal.dotm
LastModifiedBy: -
RevisionNumber: 1
Software: Microsoft Office Word
TotalEditTime: -
CreateDate: 2020:10:13 17:13:00
ModifyDate: 2020:10:19 13:52:00
Pages: 1
Words: 127541
Characters: 726986
Security: None
CodePage: Windows Cyrillic
Company: -
Lines: 6058
Paragraphs: 1705
CharCountWithSpaces: 852822
AppVersion: 16
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts: -
HeadingPairs:
  • Название
  • 1
CompObjUserTypeLen: 32
CompObjUserType: ???????? Microsoft Word 97-2003
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
49
Monitored processes
8
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe no specs explorer.exe no specs explorer.exe no specs wscript.exe no specs explorer.exe no specs notepad++.exe gup.exe wscript.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2740"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\fadpoglsi2611.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
2636explorer.exe c:\programdata\ExelTrod.vbeC:\Windows\explorer.exewmiprvse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2120C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -EmbeddingC:\Windows\explorer.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3132"C:\Windows\System32\WScript.exe" "C:\ProgramData\ExelTrod.vbe" C:\Windows\System32\WScript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
1748"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3312"C:\Program Files\Notepad++\notepad++.exe" "C:\ProgramData\ExelTrod - Copy.vbe"C:\Program Files\Notepad++\notepad++.exe
explorer.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Notepad++ : a free (GNU) source code editor
Exit code:
0
Version:
7.51
3280"C:\Program Files\Notepad++\updater\gup.exe" -v7.51C:\Program Files\Notepad++\updater\gup.exe
notepad++.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
GUP : a free (LGPL) Generic Updater
Exit code:
4294967295
Version:
4.1
3112"C:\Windows\System32\WScript.exe" "C:\ProgramData\ExelTrod.vbe" C:\Windows\System32\WScript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Total events
1 481
Read events
1 001
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
5
Unknown types
5

Dropped files

PID
Process
Filename
Type
2740WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR404A.tmp.cvr
MD5:
SHA256:
2740WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:C0C7A636C66740950ED4BC6E32C953FD
SHA256:935D0F7C61B44C1B5B6D1C531FFB6810AD002F5B0E59716EAB216747C39AF803
2740WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:AA3C9D3E49FE7253CF082B758575E381
SHA256:CD772D1696C955FC45F49680DDDD71A22A0CAD4803EF3884C8693B9AAAD1FC5E
2740WINWORD.EXEC:\programdata\ExelTrod.vbetext
MD5:AC7FA576D20D680919F244B6BF9867FB
SHA256:9E32308651FADA7ECF795619AF36BF7401607A7031F4355377AE1C22940EA629
3312notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\session.xmltext
MD5:08F18BD7D46A9E2F57C4AED3353B0E9A
SHA256:BAA957C89E5C4CEB800AD01527BD92AC76F29F01A9C892FD0839BF2EAE25D64A
3312notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\config.xmlxml
MD5:5AEF7C8FFF645BDB776D87FF6DBA1E6B
SHA256:35D51B83FE6752FC4F778DC0CD9E603D8585920D4DF68B37276D9AFDCE8DA425
2740WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\fadpoglsi2611.doc.LNKlnk
MD5:97BE047EFB4CFD7F19CE339DAAABCB9E
SHA256:E0CA79268812963F58D844437C05240C2BA2E591FE2B1F5ED974128FF0BA4098
2740WINWORD.EXEC:\Users\admin\AppData\Local\Temp\VBE\MSForms.exdtlb
MD5:4F64935D0D357783C17939061F80FC3C
SHA256:998A9F3B4CCDA7EC2B09C9D326D87E314E10520D4EBD8AEE72C9EA972793C4F8
2740WINWORD.EXEC:\Users\admin\Desktop\~$dpoglsi2611.docpgc
MD5:8749AA3EB42A670255753A5B7D8B7DC0
SHA256:8C91DE6881D83618B8698DC2F53DDE1ABC2B4FC2AEE065E66FD475B4493D2E5B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3280
gup.exe
104.31.88.28:443
notepad-plus-plus.org
Cloudflare Inc
US
shared

DNS requests

Domain
IP
Reputation
notepad-plus-plus.org
  • 104.31.88.28
  • 104.31.89.28
  • 172.67.218.84
whitelisted

Threats

No threats detected
Process
Message
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\SciLexer.dll
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
42C4C5846BB675C74E2B2C90C69AB44366401093