analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

config

Full analysis: https://app.any.run/tasks/b356a9e2-4e9f-4aa9-8bc2-1e271dad74bf
Verdict: No threats detected
Analysis date: May 03, 2019, 16:41:22
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines
MD5:

B3879FA1C41443691B0691BFDB0F61A2

SHA1:

6F6AE05EF16AC1E45DE864C8D7ED76CEA8857E57

SHA256:

7791A97E5E3E042C42AD102EE87ED2B9A5E863881D8E5A5F586BC4C97470729E

SSDEEP:

384:uXnMa81amId5ypDDMOshh5ZfSvqPwRfHZuWW6:uXnS1amId5ypDrshhnN6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Starts Microsoft Office Application

      • rundll32.exe (PID: 3012)
  • INFO

    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 300)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 300)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start rundll32.exe no specs winword.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3012"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\configC:\Windows\system32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
300"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\config"C:\Program Files\Microsoft Office\Office14\WINWORD.EXErundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
Total events
1 560
Read events
1 150
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
2
Unknown types
4

Dropped files

PID
Process
Filename
Type
300WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRC594.tmp.cvr
MD5:
SHA256:
300WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:FA04E710CDE9716512305F3912544B2E
SHA256:9A700614869FBBAE2879FDB9284CE5B13B511627FA62B02777F28151D8200DE7
300WINWORD.EXEC:\Users\admin\~$configpgc
MD5:BEB63DA151B9C5FF1BD933ACAC3642F7
SHA256:2330A02905991F29A9C1585234FD50C201F76890592FDA9398BC374A4E9BBA5C
300WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\config.LNKlnk
MD5:D1856F3AF2E7E17D5C4DA9FA09D1250C
SHA256:F9A1C85D77EF0A9ED4EEE09C605EECB03BEC4A6DD10DED8C66BD0070746FFC6A
300WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:BB5E2878DD3D1D8739F41A37B8EF15EE
SHA256:34083C34091BEF53E237350AF9D5713A0C04539BCF0F47004309FE0FA5ADF5C7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info