analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

2237787d0aa41f1c8a7df647727bfb06.doc

Full analysis: https://app.any.run/tasks/ea288750-5fef-448e-9c5e-4e49891edf86
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: February 18, 2019, 09:22:22
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
macros-on-close
generated-doc
trojan
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1251, Template: Normal, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon Feb 4 21:09:00 2019, Last Saved Time/Date: Thu Feb 7 15:58:00 2019, Number of Pages: 1, Number of Words: 2, Number of Characters: 17, Security: 0
MD5:

2237787D0AA41F1C8A7DF647727BFB06

SHA1:

39D4BDBBA270ADCFB7D021FD7FAA587C2D782160

SHA256:

90813AD836EFFCE0E21843C7DB025D56BF1D204AF25746578800F09A049AC008

SSDEEP:

12288:FE3w+68nEL+/VZp3PvU7XObGSKZL7nKIjwyZYJ7XZfDuiw9dp4k:Cw+V9+3bdrKIs1bZDC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executes scripts

      • WINWORD.EXE (PID: 2728)
    • Unusual execution from Microsoft Office

      • WINWORD.EXE (PID: 2728)
    • Application was dropped or rewritten from another process

      • iSatSrv.exe (PID: 2540)
      • iSatSrv.exe (PID: 3244)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 3608)
    • Connects to CnC server

      • iSatSrv.exe (PID: 2540)
      • iSatSrv.exe (PID: 3244)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • expand.exe (PID: 2960)
    • Uses WMIC.EXE to create a new process

      • wscript.exe (PID: 4032)
    • Connects to unusual port

      • iSatSrv.exe (PID: 3244)
      • iSatSrv.exe (PID: 2540)
  • INFO

    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2728)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 2728)
    • Dropped object may contain Bitcoin addresses

      • WINWORD.EXE (PID: 2728)
    • Application was crashed

      • iSatSrv.exe (PID: 3244)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (49.6)
.xls | Microsoft Excel sheet (alternate) (37.9)

EXIF

FlashPix

Title: -
Subject: -
Author: -
Keywords: -
Comments: -
Template: Normal
LastModifiedBy: -
RevisionNumber: 1
Software: Microsoft Office Word
TotalEditTime: -
CreateDate: 2019:02:04 21:09:00
ModifyDate: 2019:02:07 15:58:00
Pages: 1
Words: 2
Characters: 17
Security: None
CodePage: Windows Cyrillic
Lines: 1
Paragraphs: 1
CharCountWithSpaces: 18
AppVersion: 12
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts: -
HeadingPairs:
  • Название
  • 1
CompObjUserTypeLen: 39
CompObjUserType: ???????? Microsoft Office Word 97-2003
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
8
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe no specs wscript.exe no specs expand.exe wmic.exe no specs schtasks.exe no specs verclsid.exe no specs isatsrv.exe isatsrv.exe

Process information

PID
CMD
Path
Indicators
Parent process
2728"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\2237787d0aa41f1c8a7df647727bfb06.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
4032wscript.exe "c:\users\admin\appdata\roaming\microsoft\word\startup\..\..\Windows\Cookies\wordTemplate.vbsC:\Windows\system32\wscript.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
2960"C:\Windows\System32\expand.exe" C:\Users\admin\AppData\Local\Temp\LOJkdxjDhQANoxu -F:* C:\Users\admin\AppData\Local\Temp\iSatSrv.exeC:\Windows\System32\expand.exe
wscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
LZ Expansion Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3000"C:\Windows\System32\wbem\WMIC.exe" process call create "schtasks.exe /Create /Sc MINUTE /MO 2 /TN \"\Microsoft Driver Management Service\" /TR \"C:\Users\admin\AppData\Local\Temp\iSatSrv.exe"C:\Windows\System32\wbem\WMIC.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3608schtasks.exe /Create /Sc MINUTE /MO 2 /TN "\Microsoft Driver Management Service" /TR "C:\Users\admin\AppData\Local\Temp\iSatSrv.exeC:\Windows\system32\schtasks.exewmiprvse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3068"C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x401C:\Windows\system32\verclsid.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Extension CLSID Verification Host
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2540"C:\Users\admin\AppData\Local\Temp\iSatSrv.exe" C:\Users\admin\AppData\Local\Temp\iSatSrv.exe
explorer.exe
User:
admin
Company:
Intel Corporation
Integrity Level:
MEDIUM
Description:
Windows SATA Device Manager
Version:
6.2.13.2
3244C:\Users\admin\AppData\Local\Temp\iSatSrv.exe C:\Users\admin\AppData\Local\Temp\iSatSrv.exe
taskeng.exe
User:
admin
Company:
Intel Corporation
Integrity Level:
MEDIUM
Description:
Windows SATA Device Manager
Exit code:
3221225477
Version:
6.2.13.2
Total events
1 421
Read events
1 041
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
5
Text files
0
Unknown types
2

Dropped files

PID
Process
Filename
Type
2728WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRD7D6.tmp.cvr
MD5:
SHA256:
2960expand.exeC:\Users\admin\AppData\Local\Temp\$dpx$.tmp\ff8673df825ed7428c323556bc469655.tmp
MD5:
SHA256:
2728WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~WRD0000.tmp
MD5:
SHA256:
2728WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~WRD0001.tmp
MD5:
SHA256:
2728WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~DF1380A48634746972.TMP
MD5:
SHA256:
2728WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~DFAC701A2D0D15115C.TMP
MD5:
SHA256:
2728WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{E9DE97DA-8087-4DC2-AD6D-2FA3720330A6}.tmp
MD5:
SHA256:
2728WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~DF03D12EB65C48FA41.TMP
MD5:
SHA256:
2728WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{07BED78A-7425-4080-BAB2-A00402887BA6}.tmp
MD5:
SHA256:
2728WINWORD.EXEC:\Users\admin\AppData\Local\Temp\2237787d0aa41f1c8a7df647727bfb06.docdocument
MD5:41CF08611A7D0ED7C8C2EA86F3264372
SHA256:FB13977430FFAF31B75C5320506BABF5C55275B63611E7B4BABC755373C3F603
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
16
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2540
iSatSrv.exe
192.241.217.57:80
Digital Ocean, Inc.
US
malicious
2540
iSatSrv.exe
192.241.217.57:53
Digital Ocean, Inc.
US
malicious
2540
iSatSrv.exe
192.241.217.57:443
Digital Ocean, Inc.
US
malicious
3244
iSatSrv.exe
192.241.217.57:80
Digital Ocean, Inc.
US
malicious
3244
iSatSrv.exe
192.241.217.57:53
Digital Ocean, Inc.
US
malicious
3244
iSatSrv.exe
192.241.217.57:443
Digital Ocean, Inc.
US
malicious
2540
iSatSrv.exe
192.241.217.57:110
Digital Ocean, Inc.
US
malicious
3244
iSatSrv.exe
192.241.217.57:12345
Digital Ocean, Inc.
US
malicious
3244
iSatSrv.exe
192.241.217.57:110
Digital Ocean, Inc.
US
malicious
2540
iSatSrv.exe
192.241.217.57:12345
Digital Ocean, Inc.
US
malicious

DNS requests

No data

Threats

PID
Process
Class
Message
2540
iSatSrv.exe
Generic Protocol Command Decode
SURICATA Applayer Detect protocol only one direction
2540
iSatSrv.exe
Generic Protocol Command Decode
SURICATA Applayer Mismatch protocol both directions
3244
iSatSrv.exe
Generic Protocol Command Decode
SURICATA Applayer Detect protocol only one direction
3244
iSatSrv.exe
Generic Protocol Command Decode
SURICATA Applayer Mismatch protocol both directions
2540
iSatSrv.exe
Generic Protocol Command Decode
SURICATA Applayer Detect protocol only one direction
2540
iSatSrv.exe
Generic Protocol Command Decode
SURICATA Applayer Mismatch protocol both directions
6 ETPRO signatures available at the full report
No debug info