File name:

7ccf88c0bbe3b29bf19d877c4596a8d4.zip

Full analysis: https://app.any.run/tasks/8d2a79d9-f35c-4f33-a2c1-d94b8ab9b8f3
Verdict: Malicious activity
Analysis date: June 21, 2025, 11:15:40
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
phishing
phish-doc
exploit
cve-2017-11882
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

ADEE407A5D9F4425707FE5BD4C25AA14

SHA1:

5A99F6B3B106DAF23BA2C29F2FF94CB118703414

SHA256:

A53DB45F1D4A2F36EBC0B0E268D2073BABA89CA6C1D05FE9A06EF395E8658A51

SSDEEP:

1536:jjaEudvK51sOagtBDPihqGGJRvbB8lmAqQap28rxmQ3wIUG7ChXtZlYGdf:jejdvK17JKhqNjv3p2oxzw67CVtZlYi

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Phishing document has been detected

      • WinRAR.exe (PID: 1500)
      • EXCEL.EXE (PID: 2856)
    • Equation Editor starts application (likely CVE-2017-11882)

      • EQNEDT32.EXE (PID: 2444)
    • Gets TEMP folder path (SCRIPT)

      • wscript.exe (PID: 2816)
    • Gets a file object corresponding to the file in a specified path (SCRIPT)

      • wscript.exe (PID: 2816)
    • Unusual execution from MS Office

      • EXCEL.EXE (PID: 2856)
    • Uses base64 encoding (SCRIPT)

      • cscript.exe (PID: 1380)
      • cscript.exe (PID: 2652)
    • Deletes a file (SCRIPT)

      • cscript.exe (PID: 1380)
      • cscript.exe (PID: 2652)
      • wscript.exe (PID: 2816)
    • Creates internet connection object (SCRIPT)

      • cscript.exe (PID: 1380)
      • cscript.exe (PID: 2652)
    • Opens an HTTP connection (SCRIPT)

      • cscript.exe (PID: 1380)
      • cscript.exe (PID: 2652)
    • Checks whether a specified folder exists (SCRIPT)

      • cscript.exe (PID: 2652)
      • cscript.exe (PID: 1380)
    • Sends HTTP request (SCRIPT)

      • cscript.exe (PID: 1380)
      • cscript.exe (PID: 2652)
    • Accesses environment variables (SCRIPT)

      • wscript.exe (PID: 2816)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • EQNEDT32.EXE (PID: 2444)
      • wscript.exe (PID: 2816)
    • Reads the Internet Settings

      • wscript.exe (PID: 2816)
      • cscript.exe (PID: 1380)
      • cscript.exe (PID: 2652)
    • Detected use of alternative data streams (AltDS)

      • cscript.exe (PID: 1380)
      • EXCEL.EXE (PID: 2856)
    • The process executes VB scripts

      • EXCEL.EXE (PID: 2856)
      • cmd.exe (PID: 1276)
    • Creates XML DOM element (SCRIPT)

      • cscript.exe (PID: 1380)
      • cscript.exe (PID: 2652)
    • Reads data from a binary Stream object (SCRIPT)

      • cscript.exe (PID: 1380)
      • cscript.exe (PID: 2652)
    • Sets XML DOM element text (SCRIPT)

      • cscript.exe (PID: 1380)
      • cscript.exe (PID: 2652)
    • Changes charset (SCRIPT)

      • cscript.exe (PID: 1380)
      • cscript.exe (PID: 2652)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • cscript.exe (PID: 1380)
      • cscript.exe (PID: 2652)
      • wscript.exe (PID: 2816)
    • Writes binary data to a Stream object (SCRIPT)

      • cscript.exe (PID: 1380)
      • cscript.exe (PID: 2652)
    • Creates a Stream, which may work with files, input/output devices, pipes, or TCP/IP sockets (SCRIPT)

      • cscript.exe (PID: 1380)
      • cscript.exe (PID: 2652)
    • Gets full path of the running script (SCRIPT)

      • cscript.exe (PID: 2652)
    • Checks whether a specific file exists (SCRIPT)

      • cscript.exe (PID: 2652)
      • cscript.exe (PID: 1380)
    • Reads settings of System Certificates

      • cscript.exe (PID: 1380)
      • cscript.exe (PID: 2652)
    • Saves data to a binary file (SCRIPT)

      • cscript.exe (PID: 1380)
      • cscript.exe (PID: 2652)
    • Creates file in the systems drive root

      • ntvdm.exe (PID: 1736)
    • Runs shell command (SCRIPT)

      • cscript.exe (PID: 2652)
      • cscript.exe (PID: 1380)
      • wscript.exe (PID: 2816)
  • INFO

    • Checks supported languages

      • EQNEDT32.EXE (PID: 2444)
    • Reads Microsoft Office registry keys

      • WinRAR.exe (PID: 1500)
    • Reads security settings of Internet Explorer

      • cscript.exe (PID: 2652)
      • cscript.exe (PID: 1380)
    • Creates files in the program directory

      • EXCEL.EXE (PID: 2856)
      • cscript.exe (PID: 1380)
    • Reads the computer name

      • EQNEDT32.EXE (PID: 2444)
    • Reads the machine GUID from the registry

      • EQNEDT32.EXE (PID: 2444)
    • Changes file name

      • cmd.exe (PID: 3228)
    • Reads the software policy settings

      • cscript.exe (PID: 1380)
      • cscript.exe (PID: 2652)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 788
ZipBitFlag: 0x0001
ZipCompression: Deflated
ZipModifyDate: 2021:03:14 21:04:16
ZipCRC: 0x2bf8580d
ZipCompressedSize: 69232
ZipUncompressedSize: 2793487
ZipFileName: ORDER SHEET & SPEC.xlsm
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
55
Monitored processes
11
Malicious processes
8
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT winrar.exe no specs THREAT excel.exe no specs eqnedt32.exe cmd.exe no specs wscript.exe no specs cmd.exe no specs cscript.exe cscript.exe ntvdm.exe ntvdm.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
1080C:\Windows\system32\svchost.exe -k NetworkServiceC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1276"C:\Windows\System32\cmd.exe" /c cscript C:\Users\admin\AppData\Local\Temp\xx.vbsC:\Windows\System32\cmd.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1380"C:\Windows\System32\cscript.exe" C:\programdata\asc.txt:script1.vbsC:\Windows\System32\cscript.exe
EXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Console Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\cscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1500"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\7ccf88c0bbe3b29bf19d877c4596a8d4.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1736"C:\Windows\system32\ntvdm.exe" -i1 C:\Windows\System32\ntvdm.exe
cscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
NTVDM.EXE
Exit code:
3221225477
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntvdm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2444"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -EmbeddingC:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE
svchost.exe
User:
admin
Company:
Design Science, Inc.
Integrity Level:
MEDIUM
Description:
Microsoft Equation Editor
Exit code:
0
Version:
00110900
Modules
Images
c:\program files\common files\microsoft shared\equation\eqnedt32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2652cscript C:\Users\admin\AppData\Local\Temp\xx.vbsC:\Windows\System32\cscript.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Console Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\cscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2816WSCrIpT C:\Users\admin\AppData\Local\Temp\v?..wsf  CC:\Windows\System32\wscript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2856"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /ddeC:\Program Files\Microsoft Office\Office14\EXCEL.EXE
WinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\excel.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3228cMD /c REN %tmp%\q v& WSCrIpT %tmp%\v?..wsf  CC:\Windows\System32\cmd.exeEQNEDT32.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
13 607
Read events
13 290
Write events
181
Delete events
136

Modification events

(PID) Process:(1500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(1500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(1500) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1080) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Nla\Cache\Intranet
Operation:writeName:{4040CF00-1B3E-486A-B407-FA14C56B6FC0}
Value:
D4DA6D2861EC
(PID) Process:(1500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(1500) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
Executable files
0
Suspicious files
5
Text files
13
Unknown types
0

Dropped files

PID
Process
Filename
Type
2856EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVR4F92.tmp.cvr
MD5:
SHA256:
2856EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\mso5242.tmp
MD5:
SHA256:
2816wscript.exeC:\Users\admin\AppData\Local\Temp\xx.vbstext
MD5:03D7DF9993352270E6A5497B895E79A8
SHA256:4779756453533076AEE716817D417968F4C462E1868D1A6196006EEA0C9B6E1B
2856EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\56F05474.emfbinary
MD5:B59DD20DE3FDC50CD6B3C4BAF9C12DE8
SHA256:979DDE2AED02F077C16AE53546C6DF9EED40E8386D6DB6FC36AEE9F966D2CB82
2856EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6B2E81E5.emfbinary
MD5:1DA917FE3A7E876F3F711FE30E1F46DB
SHA256:4D4D1E7B04C99DCB8E885915068AD6F74CC2333E91580CDAE5CCAA00C427247F
2856EXCEL.EXEC:\Users\admin\AppData\Local\Temp\xxtext
MD5:03D7DF9993352270E6A5497B895E79A8
SHA256:4779756453533076AEE716817D417968F4C462E1868D1A6196006EEA0C9B6E1B
2856EXCEL.EXEC:\Users\admin\AppData\Local\Temp\qhtml
MD5:EF556C44786A88CDF0F705AC03D9099A
SHA256:6CE8F2114ACAC0CE2EED32D302A6A40185D3388CAA722B0724DA2AEBDEABEB3C
2856EXCEL.EXEC:\Users\admin\AppData\Local\Temp\q:Zone.Identifiertext
MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
SHA256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
2856EXCEL.EXEC:\Users\admin\AppData\Local\Temp\xx:Zone.Identifiertext
MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
SHA256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
1500WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIb1500.36191\ORDER SHEET & SPEC.xlsmdocument
MD5:7CCF88C0BBE3B29BF19D877C4596A8D4
SHA256:7BCD31BD41686C32663C7CABF42B18C50399E3B3B4533FC2FF002D9F2E058813
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
8
DNS requests
2
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
whitelisted
1380
cscript.exe
177.11.52.83:443
multiwaretecnologia.com.br
Brasil Site Informatica LTDA
BR
malicious
2652
cscript.exe
177.11.52.83:443
multiwaretecnologia.com.br
Brasil Site Informatica LTDA
BR
malicious

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.78
whitelisted
multiwaretecnologia.com.br
  • 177.11.52.83
malicious

Threats

No threats detected
No debug info