analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

9ea577a4b3faaf04a3bddbfcb934c9752bed0d0fc579f2152751c5f6923f7e14

Full analysis: https://app.any.run/tasks/63bd5d92-f61f-48bb-a01a-c8a334ad8574
Verdict: Malicious activity
Threats:

Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.

Analysis date: February 19, 2019, 01:11:21
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
macros-on-close
trojan
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Title: Employee Details Form Template, Subject: This Template offers a formal process to document each staff members personal details. You can individually adjust this document to suit your company's needs, Author: Version 1, Keywords: Employee Details Form Template, Employee Details Form, Employee Details, Comments: This Template offers a formal process to document each staff members personal details. You can individually adjust this document to suit your company's needs, Template: Normal.dotm, Last Saved By: Windows User, Revision Number: 53, Name of Creating Application: Microsoft Office Word, Total Editing Time: 19:00, Last Printed: Mon Jun 16 21:47:00 2008, Create Time/Date: Thu Jun 7 19:25:00 2012, Last Saved Time/Date: Mon Oct 15 23:22:00 2018, Number of Pages: 1, Number of Words: 329, Number of Characters: 1876, Security: 0
MD5:

807482EFCE3397ECE64A1DED3D436139

SHA1:

9EA865E000E3E15CEC15EFC466801BB181BA40A1

SHA256:

9EA577A4B3FAAF04A3BDDBFCB934C9752BED0D0FC579F2152751C5F6923F7E14

SSDEEP:

6144:2LOUuU4uDIOjsHFtXwIUPgTiN13sh/2xWoV/hGkWC92Vr3Lu19RmAMZQzm18IBHf:tU4jdltXwnQ01txj4kB257qmJkm1ldU

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • svshost_serv.exe (PID: 1712)
      • svshost_serv.exe (PID: 3584)
      • svshost_serv.exe (PID: 1948)
      • svshost_serv.exe (PID: 1336)
      • svshost_serv.exe (PID: 2812)
    • Loads the Task Scheduler COM API

      • mmc.exe (PID: 3284)
      • WINWORD.EXE (PID: 3040)
    • Executable content was dropped or overwritten

      • WINWORD.EXE (PID: 3040)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 3040)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3040)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

CompObjUserType: Microsoft Word 97-2003 Document
CompObjUserTypeLen: 32
HeadingPairs:
  • Title
  • 1
TitleOfParts: Employee Details Form Template
HyperlinksChanged: No
SharedDoc: No
LinksUpToDate: No
ScaleCrop: No
AppVersion: 16
CharCountWithSpaces: 2201
Paragraphs: 4
Lines: 15
Company: -
CodePage: Windows Latin 1 (Western European)
Security: None
Characters: 1876
Words: 329
Pages: 1
ModifyDate: 2018:10:15 22:22:00
CreateDate: 2012:06:07 18:25:00
LastPrinted: 2008:06:16 20:47:00
TotalEditTime: 19.0 minutes
Software: Microsoft Office Word
RevisionNumber: 53
LastModifiedBy: Windows User
Template: Normal.dotm
Comments: This Template offers a formal process to document each staff members personal details. You can individually adjust this document to suit your company's needs
Keywords: Employee Details Form Template, Employee Details Form, Employee Details
Author: Version 1
Subject: This Template offers a formal process to document each staff members personal details. You can individually adjust this document to suit your company's needs
Title: Employee Details Form Template
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
60
Monitored processes
12
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe svshost_serv.exe no specs explorer.exe no specs Shell Security Editor no specs notepad.exe no specs mmc.exe no specs mmc.exe svshost_serv.exe no specs svshost_serv.exe notepad.exe no specs svshost_serv.exe no specs svshost_serv.exe

Process information

PID
CMD
Path
Indicators
Parent process
3040"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\9ea577a4b3faaf04a3bddbfcb934c9752bed0d0fc579f2152751c5f6923f7e14.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
2812C:\Users\admin\.oracleServices\svshost_serv.exe C:\Users\admin\.oracleServices\svshost_serv.exetaskeng.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3652"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3232C:\Windows\system32\DllHost.exe /Processid:{4D111E08-CBF7-4F12-A926-2C7920AF52FC}C:\Windows\system32\DllHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3840"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\.oracleServices\Configure.txtC:\Windows\system32\NOTEPAD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2720"C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /sC:\Windows\system32\mmc.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Management Console
Exit code:
3221226540
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3284"C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /sC:\Windows\system32\mmc.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Management Console
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3584C:\Users\admin\.oracleServices\svshost_serv.exe C:\Users\admin\.oracleServices\svshost_serv.exetaskeng.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
1712C:\Users\admin\.oracleServices\svshost_serv.exe C:\Users\admin\.oracleServices\svshost_serv.exe
taskeng.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3108"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\.oracleServices\Configure.txtC:\Windows\system32\NOTEPAD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
1 225
Read events
1 027
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
2
Text files
13
Unknown types
5

Dropped files

PID
Process
Filename
Type
3040WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR6E6A.tmp.cvr
MD5:
SHA256:
3040WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~DF0136623693BA41AF.TMP
MD5:
SHA256:
3040WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~DF46198FDC4035089E.TMP
MD5:
SHA256:
3040WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~DF1A7F5808FD0944D2.TMP
MD5:
SHA256:
3040WINWORD.EXEC:\Users\admin\Desktop\~WRD0000.tmp
MD5:
SHA256:
3040WINWORD.EXEC:\Users\admin\Desktop\~WRD0001.tmp
MD5:
SHA256:
3040WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~DF0DECAD2EEE0A4130.TMP
MD5:
SHA256:
3040WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~DF5C9E900179DFDBE6.TMP
MD5:
SHA256:
3040WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{94CC09CA-6D5C-4E82-80FF-B8B07FF6F6DB}.tmp
MD5:
SHA256:
3040WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~DF54D74A66A5F7A243.TMP
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
3
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1712
svshost_serv.exe
GET
185.161.211.72:80
http://185.161.211.72/Client/Login?id=vp
NL
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1712
svshost_serv.exe
185.161.211.72:80
Serverius Holding B.V.
NL
unknown
1948
svshost_serv.exe
185.161.211.72:443
Serverius Holding B.V.
NL
unknown

DNS requests

Domain
IP
Reputation
Mt2hGF3HAMD4JVDFGRZSGJGE6.0ffice36o.com
unknown
vpa16.0ffice36o.com
unknown
CCEaGB3HAAA.0ffice36o.com
unknown
KOcOGF3HAMRQGQ4HY.0ffice36o.com
unknown
0ffice36o.com
malicious
kFxRGB3HAAA.0ffice36o.com
unknown
fEjPGF3HAOBWGR6A.0ffice36o.com
unknown
jI8ZGB3HAAA.0ffice36o.com
unknown
RgEfGB3HAAA.0ffice36o.com
unknown
fsMnGB3HAAA.0ffice36o.com
unknown

Threats

PID
Process
Class
Message
A Network Trojan was detected
ET TROJAN DNS Query for DNSpionage CnC Domain
A Network Trojan was detected
ET TROJAN DNS Query for DNSpionage CnC Domain
A Network Trojan was detected
ET TROJAN DNS Query for DNSpionage CnC Domain
A Network Trojan was detected
ET TROJAN DNS Query for DNSpionage CnC Domain
A Network Trojan was detected
ET TROJAN DNS Query for DNSpionage CnC Domain
A Network Trojan was detected
ET TROJAN DNS Query for DNSpionage CnC Domain
A Network Trojan was detected
ET TROJAN DNS Query for DNSpionage CnC Domain
A Network Trojan was detected
ET TROJAN DNS Query for DNSpionage CnC Domain
A Network Trojan was detected
ET TROJAN DNS Query for DNSpionage CnC Domain
A Network Trojan was detected
ET TROJAN DNS Query for DNSpionage CnC Domain
Process
Message
mmc.exe
Constructor: Microsoft.TaskScheduler.SnapIn.TaskSchedulerSnapIn
mmc.exe
OnInitialize: Microsoft.TaskScheduler.SnapIn.TaskSchedulerSnapIn
mmc.exe
AddIcons: Microsoft.TaskScheduler.SnapIn.TaskSchedulerSnapIn
mmc.exe
ProcessCommandLineArguments: Microsoft.TaskScheduler.SnapIn.TaskSchedulerSnapIn