analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

380028.docx

Full analysis: https://app.any.run/tasks/c6bea632-b0d7-42b6-a1c3-3d23dd096aa4
Verdict: Malicious activity
Analysis date: September 11, 2019, 11:33:43
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
opendir
Indicators:
MIME: application/vnd.openxmlformats-officedocument.wordprocessingml.document
File info: Microsoft Word 2007+
MD5:

DF4170914F564DF9C10D68645796BFA6

SHA1:

8361F2CA247008B50B41F65B0A9C03882339C60D

SHA256:

7DC92CEB5C56C18C2C645C4FD39E0D4D3C53A27355D5E6EEF38228F80342CC5D

SSDEEP:

192:R5C0EvCH76yMtWNKm0mqQTnhr5OwQT1Q3P55aTbFTB8GoA6akkWdmp:R5C5vCHmyMtiK4LOwQT1Q3DaNdQnmp

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 2736)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2736)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.docx | Word Microsoft Office Open XML Format document (52.2)
.zip | Open Packaging Conventions container (38.8)
.zip | ZIP compressed archive (8.8)

EXIF

XMP

Creator: Microsoft

XML

ModifyDate: 2017:09:24 17:27:00Z
CreateDate: 2017:09:24 17:26:00Z
RevisionNumber: 1
LastModifiedBy: Microsoft
AppVersion: 14
HyperlinksChanged: No
SharedDoc: No
CharactersWithSpaces: 7
LinksUpToDate: No
Company: SPecialiST RePack
TitlesOfParts: -
HeadingPairs:
  • Название
  • 1
ScaleCrop: No
Paragraphs: 1
Lines: 1
DocSecurity: None
Application: Microsoft Office Word
Characters: 7
Words: 1
Pages: 1
TotalEditTime: 1 minute
Template: dotm.dotm

ZIP

ZipFileName: [Content_Types].xml
ZipUncompressedSize: 1422
ZipCompressedSize: 358
ZipCRC: 0x82872409
ZipModifyDate: 2019:09:10 10:59:06
ZipCompression: Deflated
ZipBitFlag: 0x0002
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
1
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe

Process information

PID
CMD
Path
Indicators
Parent process
2736"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\380028.docx"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
Total events
1 111
Read events
768
Write events
338
Delete events
5

Modification events

(PID) Process:(2736) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:writeName:jd!
Value:
6A642100B00A0000010000000000000000000000
(PID) Process:(2736) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(2736) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(2736) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:WORDFiles
Value:
1328218142
(PID) Process:(2736) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:ProductFiles
Value:
1328218256
(PID) Process:(2736) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:ProductFiles
Value:
1328218257
(PID) Process:(2736) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
Operation:writeName:MTTT
Value:
B00A0000323503CB9468D50100000000
(PID) Process:(2736) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:writeName:bf!
Value:
62662100B00A000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000
(PID) Process:(2736) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:delete valueName:bf!
Value:
62662100B00A000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000
(PID) Process:(2736) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
Executable files
0
Suspicious files
24
Text files
0
Unknown types
2

Dropped files

PID
Process
Filename
Type
2736WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR90EA.tmp.cvr
MD5:
SHA256:
2736WINWORD.EXEC:\Users\admin\AppData\Local\Temp\{419E9A89-3920-4234-BE17-A2367C7D3B7E}
MD5:
SHA256:
2736WINWORD.EXEC:\Users\admin\AppData\Local\Temp\{4D67DE93-402A-4920-BEC7-C000ECEA156B}
MD5:
SHA256:
2736WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{C7614559-CE10-4874-BCAB-E014F40FC10C}.FSDbinary
MD5:53BB8CE13890E363499EFF40354D7EB0
SHA256:2B2A0C1766E17386B87586FDDFB04691E8AC3B6B9CBB5A2EB6E91CCD970799AF
2736WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{60CF705F-E07D-41E4-AB31-905EC9EF42AD}.FSDbinary
MD5:83D0C4A8108A96F018DC17E0370E7279
SHA256:89CDD140CC4ACB34CB9058A8A0C713FF2E871D6824FF0809C19FDF58D35FABB7
2736WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$380028.docxpgc
MD5:0F30BA2B3D4A8D16EEBF9FB307EED89B
SHA256:4E7E6A0B0403ABA160E0C9D4B635F94D1715565359E3F133A5D3C87320182301
2736WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:B7DEA70F335E5DDC93FE702864A27887
SHA256:5E4B0BB068B9758D42C59BDBB3E585A771C8BE51EE88F713369718C081896434
2736WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSDbinary
MD5:01821ACF9F681B1893E2F1A83DC67C82
SHA256:046753E1A695BCBDD05FD53066827F129EF938B4508EF9023C4B511BA9E4A59D
2736WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSFbinary
MD5:5A806BF07DA5F4142822656A55FBC37D
SHA256:5D33BEDFBE5B34CFA7C4A556DFF2F77DB8888A735D00D418BE8BE558E5C6A606
2736WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSDbinary
MD5:52729391B7100AECF3A3503F522030BE
SHA256:A6DA361DD97AB9390A9A782E4AECD390B3EFE3EA59D125225CCD755CE49D4240
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
31
TCP/UDP connections
14
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2736
WINWORD.EXE
HEAD
404
23.227.137.210:80
http://laveronicamagazine.com/wp-admin/network/jaku1/380032.doc
US
malicious
984
svchost.exe
PROPFIND
200
23.227.137.210:80
http://laveronicamagazine.com/wp-admin/network/jaku1/
US
html
1.02 Kb
malicious
2736
WINWORD.EXE
GET
23.227.137.210:80
http://laveronicamagazine.com/wp-admin/network/jaku1/380032.doc
US
malicious
2736
WINWORD.EXE
HEAD
404
23.227.137.210:80
http://laveronicamagazine.com/wp-admin/network/jaku1/380032.doc
US
malicious
984
svchost.exe
OPTIONS
200
23.227.137.210:80
http://laveronicamagazine.com/wp-admin/network/jaku1/
US
html
1.02 Kb
malicious
2736
WINWORD.EXE
OPTIONS
200
23.227.137.210:80
http://laveronicamagazine.com/wp-admin/network/jaku1/
US
html
1.02 Kb
malicious
984
svchost.exe
PROPFIND
200
23.227.137.210:80
http://laveronicamagazine.com/wp-admin/network/jaku1/
US
html
1.02 Kb
malicious
984
svchost.exe
PROPFIND
301
23.227.137.210:80
http://laveronicamagazine.com/wp-admin/network/jaku1
US
html
705 b
malicious
984
svchost.exe
PROPFIND
302
23.227.137.210:80
http://laveronicamagazine.com/wp-admin/network/
US
html
705 b
malicious
984
svchost.exe
PROPFIND
301
23.227.137.210:80
http://laveronicamagazine.com/wp-admin/network/jaku1
US
html
705 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
984
svchost.exe
23.227.137.210:80
laveronicamagazine.com
24 SHELLS
US
malicious
984
svchost.exe
23.227.137.210:443
laveronicamagazine.com
24 SHELLS
US
malicious
2736
WINWORD.EXE
23.227.137.210:80
laveronicamagazine.com
24 SHELLS
US
malicious
23.227.137.210:80
laveronicamagazine.com
24 SHELLS
US
malicious

DNS requests

Domain
IP
Reputation
laveronicamagazine.com
  • 23.227.137.210
malicious

Threats

No threats detected
No debug info