analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

AJ - Test.docx

Full analysis: https://app.any.run/tasks/202feb4e-a087-43f2-b890-2e3c090b8332
Verdict: Malicious activity
Analysis date: May 24, 2019, 19:11:34
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/vnd.openxmlformats-officedocument.wordprocessingml.document
File info: Microsoft Word 2007+
MD5:

96949A837BAB7119735FE21C8CB0A043

SHA1:

E7C81A4F56DF04B32B15B7C076A6E4473C8C59CD

SHA256:

94E9017E930666E71C3087E1C04598B21F5C113836FB94E36A8F0D514E657A90

SSDEEP:

192:Ctsdnzkgu39fEANxtpgoZ22NNsZcgZRoe9ChVUM1KSND/GzhfNKxkZka6QI3Oqr:aDg4f3Nxt/ZtNNoZmgc9NSzCxqkLQIHr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from Microsoft Office

      • WINWORD.EXE (PID: 2680)
  • SUSPICIOUS

    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 2352)
    • Reads Internet Cache Settings

      • OUTLOOK.EXE (PID: 2352)
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 2680)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2680)
      • OUTLOOK.EXE (PID: 2352)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.docx | Word Microsoft Office Open XML Format document (52.2)
.zip | Open Packaging Conventions container (38.8)
.zip | ZIP compressed archive (8.8)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0006
ZipCompression: Deflated
ZipModifyDate: 1980:01:01 00:00:00
ZipCRC: 0x6cd2a4df
ZipCompressedSize: 346
ZipUncompressedSize: 1312
ZipFileName: [Content_Types].xml

XMP

Title: -
Subject: -
Creator: David Hughes
Description: -

XML

Keywords: -
LastModifiedBy: David Hughes
RevisionNumber: 1
CreateDate: 2019:05:24 19:09:00Z
ModifyDate: 2019:05:24 19:10:00Z
Template: Normal
TotalEditTime: 1 minute
Pages: 1
Words: 81
Characters: 463
Application: Microsoft Office Word
DocSecurity: None
Lines: 3
Paragraphs: 1
ScaleCrop: No
HeadingPairs:
  • Title
  • 1
TitlesOfParts: -
Company: -
LinksUpToDate: No
CharactersWithSpaces: 543
SharedDoc: No
HyperlinksChanged: No
AppVersion: 16
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe outlook.exe

Process information

PID
CMD
Path
Indicators
Parent process
2680"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\AJ - Test.docx"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
2352"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" -c IPM.Note /m "mailto:[email protected]"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE
WINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Exit code:
0
Version:
14.0.6025.1000
Total events
2 739
Read events
1 703
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
1
Text files
24
Unknown types
4

Dropped files

PID
Process
Filename
Type
2680WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR4067.tmp.cvr
MD5:
SHA256:
2352OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVR7264.tmp.cvr
MD5:
SHA256:
2352OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B5755A59-7E3B-45D4-8F67-FEB89A5D0C8A}.tmp
MD5:
SHA256:
2680WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{FC7F81AF-2143-46CC-91A9-D2344C68F4B1}.tmp
MD5:
SHA256:
2680WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~DF1007F88F7D3899E4.TMP
MD5:
SHA256:
2680WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{724A7071-CD0C-4CCC-9570-5104A8B83D59}.tmp
MD5:
SHA256:
2680WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:FC364354350804BC97FCC9AEF07F32AD
SHA256:92F1088DD2889EF5A10207CF69EE4CBB09EE8339CF991F0014322B6A82C5C463
2680WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$ - Test.docxpgc
MD5:CA7AE1DEDB1CED2386053A190F9BF794
SHA256:E27D018F80E07E8358109788A573F7842A81004DC604E3E79D135874DA425E21
2352OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Outlook\NoMail.srssrs
MD5:21F2A158B6D5A2D491B220EA7E651711
SHA256:68E422E1FB227C8DAA864E0B9122383B741FC8F9BD754D26183775B38C21CA49
2680WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lextext
MD5:F3B25701FE362EC84616A93A45CE9998
SHA256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
9
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2352
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted
2680
WINWORD.EXE
208.74.205.139:443
community.box.com
Lithium Technologies, Inc.
US
unknown
208.74.205.139:443
community.box.com
Lithium Technologies, Inc.
US
unknown

DNS requests

Domain
IP
Reputation
community.box.com
  • 208.74.205.139
whitelisted
config.messenger.msn.com
  • 64.4.26.155
whitelisted

Threats

No threats detected
No debug info