analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

9dd788713764af07e98bd929bece2207d6e177f2417da678059bb89d73be0d45

Full analysis: https://app.any.run/tasks/e1029ed0-f777-4788-bdc6-666ae7c3b2c1
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: August 25, 2019, 13:02:51
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
exploit
CVE-2017-11882
loader
autoit
Indicators:
MIME: text/rtf
File info: Rich Text Format data, unknown version
MD5:

32757721442C26BE27DC174EC7F83D3A

SHA1:

D8DC916F78F9931F494CB49156E6B85529E510B3

SHA256:

9DD788713764AF07E98BD929BECE2207D6E177F2417DA678059BB89D73BE0D45

SSDEEP:

49152:5IffNoDQwa9QWQ6Nb9K8OuFpqr2SDm4YuIBYEG1E1FJHNSF56Rln+6jMK5PMfEXH:+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • intel.exe (PID: 408)
      • jos.exe (PID: 3716)
    • Equation Editor starts application (CVE-2017-11882)

      • EQNEDT32.EXE (PID: 1364)
    • Downloads executable files from the Internet

      • EQNEDT32.EXE (PID: 1364)
    • Writes to a start menu file

      • jos.exe (PID: 3716)
    • Changes the autorun value in the registry

      • jos.exe (PID: 3716)
  • SUSPICIOUS

    • Executed via COM

      • EQNEDT32.EXE (PID: 1364)
    • Executable content was dropped or overwritten

      • EQNEDT32.EXE (PID: 1364)
      • intel.exe (PID: 408)
    • Creates files in the user directory

      • EQNEDT32.EXE (PID: 1364)
      • jos.exe (PID: 3716)
      • RegSvcs.exe (PID: 3444)
    • Drop AutoIt3 executable file

      • intel.exe (PID: 408)
    • Executes scripts

      • intel.exe (PID: 408)
  • INFO

    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3812)
    • Dropped object may contain Bitcoin addresses

      • intel.exe (PID: 408)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 3812)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rtf | Rich Text Format (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
6
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start winword.exe no specs eqnedt32.exe intel.exe wscript.exe no specs jos.exe regsvcs.exe

Process information

PID
CMD
Path
Indicators
Parent process
3812"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\9dd788713764af07e98bd929bece2207d6e177f2417da678059bb89d73be0d45.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
1364"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -EmbeddingC:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
svchost.exe
User:
admin
Company:
Design Science, Inc.
Integrity Level:
MEDIUM
Description:
Microsoft Equation Editor
Exit code:
0
Version:
00110900
408"C:\Users\admin\AppData\Roaming\intel.exe" C:\Users\admin\AppData\Roaming\intel.exe
EQNEDT32.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2176"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\39610603\jet.vbs" C:\Windows\System32\WScript.exeintel.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
3716"C:\Users\admin\AppData\Local\Temp\39610603\jos.exe" ati=ivwC:\Users\admin\AppData\Local\Temp\39610603\jos.exe
WScript.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Version:
3, 3, 8, 1
3444"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
jos.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Version:
4.7.3062.0 built by: NET472REL1
Total events
3 104
Read events
2 281
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
0
Text files
71
Unknown types
3

Dropped files

PID
Process
Filename
Type
3812WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRA79F.tmp.cvr
MD5:
SHA256:
408intel.exeC:\Users\admin\AppData\Local\Temp\39610603\ati=ivw
MD5:
SHA256:
408intel.exeC:\Users\admin\AppData\Local\Temp\39610603\bkm.dattext
MD5:4C4C9837D90388B8CE1A16879357B692
SHA256:E513550B7B59308223B7F4F5771851F3A184DB93328A76903C4D7485FF905860
408intel.exeC:\Users\admin\AppData\Local\Temp\39610603\jet.vbstext
MD5:0C4F23DE299F83D9DB7D4AEDD3F7CD0E
SHA256:F73E13468BE449EF5436B27DF054B59A630815CE788D7E83F0528317B9F551D1
408intel.exeC:\Users\admin\AppData\Local\Temp\39610603\wfd.logtext
MD5:90CA2B55A43032F9475F43A6F48650C2
SHA256:49093F632165CB3CDC83E620A2243D5EAF471E24F6F06BDAAC0A5036609ED104
3812WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:62F2DA178DD59EBA6B61EE250E55F925
SHA256:8CF938206B83D51659082A32A71F3A9F077217F5A2E07A98541350C60245A244
408intel.exeC:\Users\admin\AppData\Local\Temp\39610603\epa.logtext
MD5:F2101FEC03807763FDA6ABEACF92B4B0
SHA256:242115E44941CC2CB27B24DB46667D0A96AE6C05D8B7E036E9F360F28B7EBCDB
408intel.exeC:\Users\admin\AppData\Local\Temp\39610603\omv.docxtext
MD5:9FE5D83C47131AC27E683304A9A72703
SHA256:8C5011C719377D0539A1A5F8B03A5288784FE68982AF5F5FDA945C2CEE8AB646
408intel.exeC:\Users\admin\AppData\Local\Temp\39610603\htc.ppttext
MD5:1BA3BF9F1053775C0044CA7D23611896
SHA256:310D2FF7CE310ACC135AAD4ACE8EF3E773D4E4CF64EB4F371E9F04E8102A97BB
3812WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$d788713764af07e98bd929bece2207d6e177f2417da678059bb89d73be0d45.rtfpgc
MD5:2BE6966568D9956882687C4895E0FD1E
SHA256:F30947DF9E2F5941AEA330D3A98BBA68246E46EE47D846DA7F838559CA505CB5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
5
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1364
EQNEDT32.EXE
GET
200
108.179.246.66:80
http://softeligent.net/in.exe
US
executable
1.33 Mb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3444
RegSvcs.exe
79.134.225.61:5552
info1.nowddns.com
Andreas Fink trading as Fink Telecom Services
CH
malicious
1364
EQNEDT32.EXE
108.179.246.66:80
softeligent.net
CyrusOne LLC
US
suspicious

DNS requests

Domain
IP
Reputation
softeligent.net
  • 108.179.246.66
suspicious
info1.nowddns.com
  • 79.134.225.61
malicious

Threats

PID
Process
Class
Message
1364
EQNEDT32.EXE
Potentially Bad Traffic
ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile
1364
EQNEDT32.EXE
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1364
EQNEDT32.EXE
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
No debug info