analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

739239.doc

Full analysis: https://app.any.run/tasks/6a736ef5-0e60-4d18-8ae0-7be020f9c382
Verdict: Malicious activity
Analysis date: March 14, 2019, 16:18:11
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
macros-on-close
generated-doc
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1251, Template: Normal, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon Feb 4 21:09:00 2019, Last Saved Time/Date: Thu Feb 7 15:58:00 2019, Number of Pages: 1, Number of Words: 2, Number of Characters: 17, Security: 0
MD5:

2237787D0AA41F1C8A7DF647727BFB06

SHA1:

39D4BDBBA270ADCFB7D021FD7FAA587C2D782160

SHA256:

90813AD836EFFCE0E21843C7DB025D56BF1D204AF25746578800F09A049AC008

SSDEEP:

12288:FE3w+68nEL+/VZp3PvU7XObGSKZL7nKIjwyZYJ7XZfDuiw9dp4k:Cw+V9+3bdrKIs1bZDC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from Microsoft Office

      • WINWORD.EXE (PID: 3348)
    • Executes scripts

      • WINWORD.EXE (PID: 3348)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 3580)
  • SUSPICIOUS

    • Uses WMIC.EXE to create a new process

      • wscript.exe (PID: 2344)
    • Executable content was dropped or overwritten

      • expand.exe (PID: 3200)
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 3348)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3348)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (49.6)
.xls | Microsoft Excel sheet (alternate) (37.9)

EXIF

FlashPix

CompObjUserType: ???????? Microsoft Office Word 97-2003
CompObjUserTypeLen: 39
HeadingPairs:
  • Название
  • 1
TitleOfParts: -
HyperlinksChanged: No
SharedDoc: No
LinksUpToDate: No
ScaleCrop: No
AppVersion: 12
CharCountWithSpaces: 18
Paragraphs: 1
Lines: 1
CodePage: Windows Cyrillic
Security: None
Characters: 17
Words: 2
Pages: 1
ModifyDate: 2019:02:07 15:58:00
CreateDate: 2019:02:04 21:09:00
TotalEditTime: -
Software: Microsoft Office Word
RevisionNumber: 1
LastModifiedBy: -
Template: Normal
Comments: -
Keywords: -
Author: -
Subject: -
Title: -
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe no specs wscript.exe no specs expand.exe wmic.exe no specs schtasks.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3348"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\739239.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
2344wscript.exe "c:\users\admin\appdata\roaming\microsoft\word\startup\..\..\Windows\Cookies\wordTemplate.vbsC:\Windows\system32\wscript.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
3200"C:\Windows\System32\expand.exe" C:\Users\admin\AppData\Local\Temp\LOJkdxjDhQANoxu -F:* C:\Users\admin\AppData\Local\Temp\iSatSrv.exeC:\Windows\System32\expand.exe
wscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
LZ Expansion Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2900"C:\Windows\System32\wbem\WMIC.exe" process call create "schtasks.exe /Create /Sc MINUTE /MO 2 /TN \"\Microsoft Driver Management Service\" /TR \"C:\Users\admin\AppData\Local\Temp\iSatSrv.exe"C:\Windows\System32\wbem\WMIC.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3580schtasks.exe /Create /Sc MINUTE /MO 2 /TN "\Microsoft Driver Management Service" /TR "C:\Users\admin\AppData\Local\Temp\iSatSrv.exeC:\Windows\system32\schtasks.exewmiprvse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
1 159
Read events
812
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
3
Text files
0
Unknown types
2

Dropped files

PID
Process
Filename
Type
3348WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRDDEE.tmp.cvr
MD5:
SHA256:
3200expand.exeC:\Users\admin\AppData\Local\Temp\$dpx$.tmp\54a5ae6f1514624e9f8b0680e2698f9f.tmp
MD5:
SHA256:
3348WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:AA5738B9E16777C4C18E864CE7F89ACF
SHA256:53CAEC48FC57EAC4376C396650901150F88B6FC413653D997853B0068A4AF01E
3348WINWORD.EXEC:\users\admin\appdata\roaming\microsoft\Windows\Cookies\wordTemplate.vbsbinary
MD5:6C636CFB3B7D2C5DD95B42290FB67DB8
SHA256:3CDCB8B1F297A84822877E19D9B853870608B338BDC43B1C89AAFC8C6F35EB6F
3200expand.exeC:\Users\admin\AppData\Local\Temp\iSatSrv.exeexecutable
MD5:E614CA0993C7C580C70EF3E6419F6992
SHA256:F5C4782591675CD51AC3CDFD1BC719D576B7B98D529CF281B706D94FD1916C96
2344wscript.exeC:\Users\admin\AppData\Local\Temp\LOJkdxjDhQANoxucompressed
MD5:95D81DF3A5205DBCF4A98CC9519075BE
SHA256:5CF82E7FB2FEE1BC785D2B8B93846CC1D46426AACBBC6F3B726E495B4C921B8F
3348WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$739239.docpgc
MD5:276AEF45A371121195F8545861CE5DF0
SHA256:B1BCC6C9F0D9A63F68BCE5CC3E967FB4B58059F82F3208E88DB3CC8E20B6849E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info