File name:

MyCV.doc

Full analysis: https://app.any.run/tasks/2398e555-d3c5-4d61-8a97-ec03569d2822
Verdict: Malicious activity
Analysis date: October 30, 2023, 13:56:57
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Author: winRosei, Template: Normal.dotm, Last Saved By: Lucy, Revision Number: 27, Name of Creating Application: Microsoft Office Word, Total Editing Time: 04:40:00, Create Time/Date: Sun Jun 11 09:23:00 2023, Last Saved Time/Date: Thu Jun 22 10:55:00 2023, Number of Pages: 1, Number of Words: 2, Number of Characters: 12, Security: 0
MD5:

64F8DFD92EB972483FEAF3137EC06D3C

SHA1:

3D71D782B95F13EE69E96BCF73EE279A00EAE5DB

SHA256:

8A8A7A506FD57BDE314CE6154F2484F280049F2BDA504D43704B9AD412D5D618

SSDEEP:

3072:4PsNH+QhGvfW+JQz2pWz1l0GH6VoPV32LkZ6yc3CWQKS7N:vHNhvTzJz1bT12LkYyc3juN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Menorah (PID: 460)
  • SUSPICIOUS

    • The process executes via Task Scheduler

      • Menorah (PID: 460)
    • Reads the Internet Settings

      • Menorah (PID: 460)
  • INFO

    • Creates files in the program directory

      • WINWORD.EXE (PID: 3820)
    • Checks supported languages

      • Menorah (PID: 460)
      • wmpnscfg.exe (PID: 2864)
    • Reads mouse settings

      • WINWORD.EXE (PID: 3820)
    • Reads the computer name

      • Menorah (PID: 460)
      • wmpnscfg.exe (PID: 2864)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 2864)
    • Reads Environment values

      • Menorah (PID: 460)
    • Drops the executable file immediately after the start

      • WINWORD.EXE (PID: 3820)
    • Reads the machine GUID from the registry

      • Menorah (PID: 460)
      • wmpnscfg.exe (PID: 2864)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (38.3)
.xls | Microsoft Excel sheet (alternate) (29.3)
.doc | Microsoft Word document (old ver.) (22.7)

EXIF

FlashPix

Identification: Word 8.0
LanguageCode: English (US)
DocFlags: 1Table, ExtChar
System: Windows
Word97: No
Title: -
Subject: -
Author: winRosei
Keywords: -
Template: Normal.dotm
LastModifiedBy: Lucy
Software: Microsoft Office Word
CreateDate: 2023:06:11 08:23:00
ModifyDate: 2023:06:22 09:55:00
Security: None
Company: -
CharCountWithSpaces: 13
AppVersion: 16
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts: -
HeadingPairs:
  • Title
  • 1
CodePage: Windows Latin 1 (Western European)
Hyperlinks:
  • mailto:enquiry@sla.sc
CompObjUserTypeLen: 32
CompObjUserType: Microsoft Word 97-2003 Document
LastPrinted: 0000:00:00 00:00:00
RevisionNumber: 27
TotalEditTime: 4.7 hours
Words: 2
Characters: 12
Pages: 1
Paragraphs: 1
Lines: 1
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe no specs menorah no specs wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
460C:\ProgramData\Office356\Menorah OfC:\ProgramData\Office356\Menorahtaskeng.exe
User:
admin
Company:
Menorah
Integrity Level:
MEDIUM
Description:
Menorah
Exit code:
0
Version:
1.0.0.1
Modules
Images
c:\programdata\office356\menorah
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shlwapi.dll
2864"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\gdi32.dll
3820"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\MyCV.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
Total events
3 611
Read events
3 163
Write events
317
Delete events
131

Modification events

(PID) Process:(3820) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(3820) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1041
Value:
On
(PID) Process:(3820) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1046
Value:
On
(PID) Process:(3820) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1036
Value:
On
(PID) Process:(3820) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1031
Value:
On
(PID) Process:(3820) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1040
Value:
On
(PID) Process:(3820) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1049
Value:
On
(PID) Process:(3820) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:3082
Value:
On
(PID) Process:(3820) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1042
Value:
On
(PID) Process:(3820) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1055
Value:
On
Executable files
1
Suspicious files
3
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
3820WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRB311.tmp.cvr
MD5:
SHA256:
3820WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryPB0416.lextext
MD5:F3B25701FE362EC84616A93A45CE9998
SHA256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
3820WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lextext
MD5:F3B25701FE362EC84616A93A45CE9998
SHA256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
3820WINWORD.EXEC:\Users\admin\AppData\Local\Temp\VBE\MSForms.exdbinary
MD5:84D6CC4F0DFAD153A669874A2E705690
SHA256:D2E44162B189A6D681363FB747CDF9DF53396CAE274D802C8BD864F26E94327C
3820WINWORD.EXEC:\ProgramData\Office356\Menorahexecutable
MD5:868DA692036E86A2DC87CA551AD61DD5
SHA256:64156F9CA51951A9BF91B5B74073D31C16873CA60492C25895C1F0F074787345
3820WINWORD.EXEC:\ProgramData\Office356\Menorah.configxml
MD5:39FA0EBE92039367A072969701F623BE
SHA256:07204AD56318D0B4F2B87059D4F712E9B17DC7C729D7DADF86BC6FC63444EDBB
3820WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$MyCV.docbinary
MD5:EBD2F3D670949F1AE69D837731AAD060
SHA256:3B47FF41DE4E3A84352399606211A9F1D41AD4C921C357D042501F05C7DF9672
3820WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmbinary
MD5:A0E8A1D6C05FB1D08D3AD0CA46DEE5CB
SHA256:9C1301158C5202311BDEB3EA39E6643E1EF4975C9A409FE90B3028DC85A08906
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
2656
svchost.exe
239.255.255.250:1900
whitelisted
1088
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info