analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Embargo a Cuenta.rtf

Full analysis: https://app.any.run/tasks/348b8e33-9a02-42c9-951f-b9593cc09df6
Verdict: Malicious activity
Analysis date: June 19, 2019, 16:45:39
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ole-embedded
Indicators:
MIME: text/rtf
File info: Rich Text Format data, version 1, unknown character set
MD5:

D5CB6D49C3F7F4C02D6CCFFF5BCE685D

SHA1:

58275E42F3BBFC03A62BF3124468184A98F50329

SHA256:

9959968A7CDFA1AC21D5AD45F341E9F25C6EC931A786C3231E851ABE4D5FA138

SSDEEP:

384:lugKf+2OrN7vQtV6nEFPmi6rGsqWqtZccVF3V7Ly4nMNLoJ0y:lugKfYItbtZVWNLoJ0y

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Internet Cache Settings

      • WINWORD.EXE (PID: 2948)
  • INFO

    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2948)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 2948)
    • Reads settings of System Certificates

      • WINWORD.EXE (PID: 2948)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rtf | Rich Text Format (100)

EXIF

RTF

LastModifiedBy: Centro de Servicios Judiciales
CreateDate: 2019:05:28 22:57:00
ModifyDate: 2019:06:18 19:44:00
RevisionNumber: 17
TotalEditTime: 14 minutes
Pages: 1
Words: 9
Characters: 53
CharactersWithSpaces: 61
InternalVersionNumber: 105
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
1
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe

Process information

PID
CMD
Path
Indicators
Parent process
2948"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Embargo a Cuenta.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
Total events
1 395
Read events
772
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
1
Unknown types
2

Dropped files

PID
Process
Filename
Type
2948WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR1351.tmp.cvr
MD5:
SHA256:
2948WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@mediafire[1].txt
MD5:
SHA256:
2948WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$bargo a Cuenta.rtfpgc
MD5:9483AD0DFD01ECFF6D1E3C689DFE653B
SHA256:307527E1C48A91961D7BEFCD92F0B12ABAEFB0D914F779E69BB458516F7E17BE
2948WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@mediafire[2].txttext
MD5:9066E44E41220D0741B884A175E3F9B2
SHA256:83EDDAAB1087E4F81E158F44DFF6DA476BEA8567DCFF860C442D0CE0B7F289DF
2948WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:AAE1F34939203117AC1F4B1DA330748D
SHA256:A8522EFD13191ED100712611DBB7B818993A3A9AEE4584A1360605C4D2C4BD74
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
3
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2948
WINWORD.EXE
GET
301
91.216.63.240:80
http://cort.as/-JtpO
ES
html
280 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2948
WINWORD.EXE
104.19.194.29:443
www.mediafire.com
Cloudflare Inc
US
shared
2948
WINWORD.EXE
91.216.63.240:80
cort.as
Ediciones El Pais, S.L.
ES
unknown
2948
WINWORD.EXE
205.196.122.218:443
download1277.mediafire.com
MediaFire, LLC
US
malicious

DNS requests

Domain
IP
Reputation
cort.as
  • 91.216.63.240
unknown
www.mediafire.com
  • 104.19.194.29
  • 104.19.195.29
shared
download1277.mediafire.com
  • 205.196.122.218
malicious

Threats

No threats detected
No debug info