analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

ref=RFQ confirmation 5-MT.doc

Full analysis: https://app.any.run/tasks/fc0fef33-8dc0-4696-87ad-d8fb49883cb0
Verdict: Malicious activity
Threats:

AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat.

Analysis date: January 23, 2019, 10:49:08
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ole-embedded
generated-doc
loader
trojan
rat
azorult
Indicators:
MIME: text/rtf
File info: Rich Text Format data, version 1, unknown character set
MD5:

C7AB6D4D0B932768E3FC2AE9535E7A70

SHA1:

81EA1AD7CE1B2341E3FAB511B33EEFD484DD1876

SHA256:

678EC65887C4F3F536DECF2F30B6B3D4ACBB62ABECE77542901EDF7355F9FF38

SSDEEP:

1536:qs5pRDTsNVxJcZMCkDTANiZJ1lMKVDTdNxsJYcMkBDTU7NztJrxMuUisxYtK:qS3DT4FDT8CDTXyDTUhj1UYU

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Requests a remote executable file from MS Office

      • EXCEL.EXE (PID: 3824)
      • EXCEL.EXE (PID: 2804)
      • EXCEL.EXE (PID: 2500)
    • Unusual execution from Microsoft Office

      • EXCEL.EXE (PID: 3824)
      • EXCEL.EXE (PID: 2804)
      • EXCEL.EXE (PID: 3156)
      • EXCEL.EXE (PID: 2500)
    • Executable content was dropped or overwritten

      • EXCEL.EXE (PID: 3824)
    • Application was dropped or rewritten from another process

      • adobepdf.exe (PID: 3392)
      • adobepdf.exe (PID: 2228)
      • adobepdf.exe (PID: 3908)
      • adobepdf.exe (PID: 4060)
      • adobepdf.exe (PID: 3956)
      • adobepdf.exe (PID: 2348)
      • server.exe (PID: 2396)
      • server.exe (PID: 2152)
      • server.exe (PID: 3960)
      • server.exe (PID: 1076)
      • server.exe (PID: 3576)
      • server.exe (PID: 3652)
      • server.exe (PID: 2680)
      • server.exe (PID: 3524)
      • server.exe (PID: 2712)
      • server.exe (PID: 3840)
      • server.exe (PID: 3368)
      • server.exe (PID: 3492)
      • server.exe (PID: 3280)
      • server.exe (PID: 2872)
      • server.exe (PID: 3676)
    • Known privilege escalation attack

      • adobepdf.exe (PID: 4060)
      • server.exe (PID: 2396)
      • server.exe (PID: 1076)
      • server.exe (PID: 2680)
      • server.exe (PID: 3492)
      • server.exe (PID: 3280)
    • Connects to CnC server

      • adobepdf.exe (PID: 2348)
      • server.exe (PID: 2152)
      • server.exe (PID: 3576)
      • server.exe (PID: 2712)
      • server.exe (PID: 3840)
      • server.exe (PID: 3676)
    • AZORULT was detected

      • adobepdf.exe (PID: 2348)
      • server.exe (PID: 2152)
      • server.exe (PID: 3576)
      • server.exe (PID: 2712)
      • server.exe (PID: 3840)
      • server.exe (PID: 3676)
    • Loads dropped or rewritten executable

      • adobepdf.exe (PID: 2348)
      • server.exe (PID: 2152)
      • server.exe (PID: 3576)
      • server.exe (PID: 2712)
      • server.exe (PID: 3840)
      • server.exe (PID: 3676)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 3904)
      • schtasks.exe (PID: 2740)
      • schtasks.exe (PID: 1916)
      • schtasks.exe (PID: 1348)
      • schtasks.exe (PID: 2740)
      • schtasks.exe (PID: 2528)
    • Actions looks like stealing of personal data

      • adobepdf.exe (PID: 2348)
      • server.exe (PID: 2152)
      • server.exe (PID: 3576)
      • server.exe (PID: 2712)
      • server.exe (PID: 3840)
      • server.exe (PID: 3676)
    • Uses Task Scheduler to run other applications

      • adobepdf.exe (PID: 3908)
      • server.exe (PID: 3960)
      • server.exe (PID: 3652)
      • server.exe (PID: 3524)
      • server.exe (PID: 3368)
      • server.exe (PID: 2872)
  • SUSPICIOUS

    • Unusual connect from Microsoft Office

      • EXCEL.EXE (PID: 3824)
      • EXCEL.EXE (PID: 2500)
      • EXCEL.EXE (PID: 2804)
    • Modifies the open verb of a shell class

      • adobepdf.exe (PID: 4060)
      • server.exe (PID: 2396)
      • server.exe (PID: 1076)
      • server.exe (PID: 2680)
      • server.exe (PID: 3492)
      • server.exe (PID: 3280)
    • Application launched itself

      • adobepdf.exe (PID: 3908)
      • server.exe (PID: 3960)
      • server.exe (PID: 3652)
      • server.exe (PID: 3524)
      • server.exe (PID: 3368)
      • server.exe (PID: 2872)
    • Creates files in the user directory

      • adobepdf.exe (PID: 3908)
    • Executable content was dropped or overwritten

      • adobepdf.exe (PID: 3908)
      • adobepdf.exe (PID: 2348)
      • server.exe (PID: 2152)
      • server.exe (PID: 3576)
      • server.exe (PID: 2712)
      • server.exe (PID: 3840)
      • server.exe (PID: 3676)
    • Reads the cookies of Google Chrome

      • adobepdf.exe (PID: 2348)
      • server.exe (PID: 2152)
      • server.exe (PID: 3576)
      • server.exe (PID: 2712)
      • server.exe (PID: 3840)
      • server.exe (PID: 3676)
    • Reads the cookies of Mozilla Firefox

      • adobepdf.exe (PID: 2348)
      • server.exe (PID: 2152)
      • server.exe (PID: 3576)
      • server.exe (PID: 2712)
      • server.exe (PID: 3840)
      • server.exe (PID: 3676)
  • INFO

    • Creates files in the user directory

      • EXCEL.EXE (PID: 3824)
      • WINWORD.EXE (PID: 2992)
    • Reads Microsoft Office registry keys

      • EXCEL.EXE (PID: 3156)
      • EXCEL.EXE (PID: 3824)
      • WINWORD.EXE (PID: 2992)
      • EXCEL.EXE (PID: 2500)
      • EXCEL.EXE (PID: 2804)
      • excelcnv.exe (PID: 2052)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rtf | Rich Text Format (100)

EXIF

RTF

LastModifiedBy: BINGHERO
CreateDate: 2019:01:23 08:24:00
ModifyDate: 2019:01:23 08:24:00
RevisionNumber: 1
TotalEditTime: -
Pages: 1
Words: 15
Characters: 90
CharactersWithSpaces: 104
InternalVersionNumber: 57433
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
101
Monitored processes
45
Malicious processes
28
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start winword.exe no specs excel.exe adobepdf.exe no specs excel.exe no specs eventvwr.exe no specs adobepdf.exe no specs excel.exe eventvwr.exe adobepdf.exe adobepdf.exe no specs excel.exe #AZORULT adobepdf.exe adobepdf.exe no specs excelcnv.exe no specs schtasks.exe no specs server.exe no specs eventvwr.exe no specs eventvwr.exe server.exe no specs #AZORULT server.exe schtasks.exe no specs server.exe no specs eventvwr.exe no specs eventvwr.exe server.exe no specs #AZORULT server.exe schtasks.exe no specs server.exe no specs eventvwr.exe no specs eventvwr.exe server.exe no specs #AZORULT server.exe schtasks.exe no specs server.exe no specs eventvwr.exe no specs eventvwr.exe server.exe no specs #AZORULT server.exe schtasks.exe no specs server.exe no specs eventvwr.exe no specs eventvwr.exe server.exe no specs #AZORULT server.exe schtasks.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2992"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\ref=RFQ confirmation 5-MT.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
3824"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" -EmbeddingC:\Program Files\Microsoft Office\Office14\EXCEL.EXE
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Exit code:
0
Version:
14.0.6024.1000
4060"C:\Users\admin\AppData\Local\Temp\adobepdf.exe" C:\Users\admin\AppData\Local\Temp\adobepdf.exeEXCEL.EXE
User:
admin
Company:
Xvid Solutions
Integrity Level:
MEDIUM
Description:
Xvid MiniConvert for Windows
Exit code:
0
Version:
...
3156"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" -EmbeddingC:\Program Files\Microsoft Office\Office14\EXCEL.EXEsvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Exit code:
0
Version:
14.0.6024.1000
2064"C:\Windows\System32\eventvwr.exe" C:\Windows\System32\eventvwr.exeadobepdf.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Event Viewer Snapin Launcher
Exit code:
3221226540
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2228"C:\Users\admin\AppData\Local\Temp\adobepdf.exe" C:\Users\admin\AppData\Local\Temp\adobepdf.exeEXCEL.EXE
User:
admin
Company:
Xvid Solutions
Integrity Level:
MEDIUM
Description:
Xvid MiniConvert for Windows
Exit code:
0
Version:
...
2804"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" -EmbeddingC:\Program Files\Microsoft Office\Office14\EXCEL.EXE
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Exit code:
0
Version:
14.0.6024.1000
2204"C:\Windows\System32\eventvwr.exe" C:\Windows\System32\eventvwr.exe
adobepdf.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Event Viewer Snapin Launcher
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3908"C:\Users\admin\AppData\Local\Temp\adobepdf.exe" C:\Users\admin\AppData\Local\Temp\adobepdf.exe
eventvwr.exe
User:
admin
Company:
Xvid Solutions
Integrity Level:
HIGH
Description:
Xvid MiniConvert for Windows
Exit code:
0
Version:
...
3392"C:\Users\admin\AppData\Local\Temp\adobepdf.exe" C:\Users\admin\AppData\Local\Temp\adobepdf.exeEXCEL.EXE
User:
admin
Company:
Xvid Solutions
Integrity Level:
MEDIUM
Description:
Xvid MiniConvert for Windows
Exit code:
0
Version:
...
Total events
5 168
Read events
4 324
Write events
0
Delete events
0

Modification events

No data
Executable files
291
Suspicious files
0
Text files
0
Unknown types
4

Dropped files

PID
Process
Filename
Type
2992WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRE851.tmp.cvr
MD5:
SHA256:
3824EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVRF04F.tmp.cvr
MD5:
SHA256:
3156EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVRFE69.tmp.cvr
MD5:
SHA256:
2804EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVR35A.tmp.cvr
MD5:
SHA256:
2500EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVR9E2.tmp.cvr
MD5:
SHA256:
2052excelcnv.exeC:\Users\admin\AppData\Local\Temp\CVRF41.tmp.cvr
MD5:
SHA256:
2052excelcnv.exeC:\Users\admin\AppData\Local\Temp\~DF3872FEE29EC543D2.TMP
MD5:
SHA256:
2992WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~DFB659805FC53D1A62.TMP
MD5:
SHA256:
2052excelcnv.exeC:\Users\admin\AppData\Local\Temp\~DF29C87965DEE5D812.TMP
MD5:
SHA256:
2992WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~DFF0A441620DC8970E.TMP
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
15
TCP/UDP connections
10
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2500
EXCEL.EXE
GET
304
193.56.28.105:80
http://uploader.sx/uploads/2019/adobepdf_exe.exe
unknown
suspicious
2804
EXCEL.EXE
GET
304
193.56.28.105:80
http://uploader.sx/uploads/2019/adobepdf_exe.exe
unknown
suspicious
3824
EXCEL.EXE
GET
200
193.56.28.105:80
http://uploader.sx/uploads/2019/adobepdf_exe.exe
unknown
executable
1.32 Mb
suspicious
2348
adobepdf.exe
POST
200
111.90.150.170:80
http://dboyusa.online/index.php
unknown
text
2 b
malicious
3676
server.exe
POST
200
111.90.150.170:80
http://dboyusa.online/index.php
unknown
binary
4.27 Mb
malicious
3576
server.exe
POST
200
111.90.150.170:80
http://dboyusa.online/index.php
unknown
binary
4.27 Mb
malicious
2348
adobepdf.exe
POST
200
111.90.150.170:80
http://dboyusa.online/index.php
unknown
binary
4.27 Mb
malicious
3576
server.exe
POST
200
111.90.150.170:80
http://dboyusa.online/index.php
unknown
text
2 b
malicious
2152
server.exe
POST
200
111.90.150.170:80
http://dboyusa.online/index.php
unknown
text
2 b
malicious
2712
server.exe
POST
200
111.90.150.170:80
http://dboyusa.online/index.php
unknown
binary
4.27 Mb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2348
adobepdf.exe
111.90.150.170:80
dboyusa.online
Shinjiru Technology Sdn Bhd
malicious
3676
server.exe
111.90.150.170:80
dboyusa.online
Shinjiru Technology Sdn Bhd
malicious
2712
server.exe
111.90.150.170:80
dboyusa.online
Shinjiru Technology Sdn Bhd
malicious
2152
server.exe
111.90.150.170:80
dboyusa.online
Shinjiru Technology Sdn Bhd
malicious
3824
EXCEL.EXE
193.56.28.105:80
uploader.sx
suspicious
3840
server.exe
111.90.150.170:80
dboyusa.online
Shinjiru Technology Sdn Bhd
malicious
3576
server.exe
111.90.150.170:80
dboyusa.online
Shinjiru Technology Sdn Bhd
malicious
2804
EXCEL.EXE
193.56.28.105:80
uploader.sx
suspicious
2500
EXCEL.EXE
193.56.28.105:80
uploader.sx
suspicious

DNS requests

Domain
IP
Reputation
uploader.sx
  • 193.56.28.105
suspicious
dboyusa.online
  • 111.90.150.170
malicious

Threats

PID
Process
Class
Message
3824
EXCEL.EXE
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2348
adobepdf.exe
A Network Trojan was detected
ET TROJAN AZORult Variant.4 Checkin M2
2348
adobepdf.exe
A Network Trojan was detected
MALWARE [PTsecurity] AZORult client request
2348
adobepdf.exe
A Network Trojan was detected
MALWARE [PTsecurity] AZORult HTTP Header
2348
adobepdf.exe
A Network Trojan was detected
MALWARE [PTsecurity] AZORult HTTP Header
2348
adobepdf.exe
A Network Trojan was detected
MALWARE [PTsecurity] AZORult client request
2152
server.exe
A Network Trojan was detected
ET TROJAN AZORult Variant.4 Checkin M2
2152
server.exe
A Network Trojan was detected
MALWARE [PTsecurity] AZORult client request
2152
server.exe
A Network Trojan was detected
MALWARE [PTsecurity] AZORult HTTP Header
2152
server.exe
A Network Trojan was detected
MALWARE [PTsecurity] AZORult HTTP Header
12 ETPRO signatures available at the full report
No debug info