File name:

Payments.rtf

Full analysis: https://app.any.run/tasks/987f2214-577d-4416-95fb-ea7c1cec7ea3
Verdict: Malicious activity
Threats:

AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat.

Analysis date: April 15, 2019, 09:36:04
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ole-embedded
trojan
rat
azorult
Indicators:
MIME: text/rtf
File info: Rich Text Format data, unknown version
MD5:

687E6860F3512060DCE67BBE92E8D213

SHA1:

8B21BF6BD8F48A91E0445BE02666C9CB2110A7B1

SHA256:

AB15B95275561F7462BBE6FC9926DBF2E5E049EB40BE62E5EA51889708F7FCF7

SSDEEP:

24576:ne+wxme+wxme+wxzo9huHVo9cVe+wxme+wxme+wxzo9huHVo9cg:u

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • payments.exe (PID: 2108)
      • payments.exe (PID: 1664)
    • Executable content was dropped or overwritten

      • WINWORD.EXE (PID: 3040)
    • Unusual execution from Microsoft Office

      • WINWORD.EXE (PID: 3040)
    • Connects to CnC server

      • payments.exe (PID: 1664)
    • AZORULT was detected

      • payments.exe (PID: 1664)
    • Loads dropped or rewritten executable

      • payments.exe (PID: 1664)
    • Actions looks like stealing of personal data

      • payments.exe (PID: 1664)
  • SUSPICIOUS

    • Application launched itself

      • payments.exe (PID: 2108)
    • Creates files in the user directory

      • payments.exe (PID: 1664)
    • Starts CMD.EXE for commands execution

      • payments.exe (PID: 1664)
    • Reads the cookies of Google Chrome

      • payments.exe (PID: 1664)
    • Reads the cookies of Mozilla Firefox

      • payments.exe (PID: 1664)
    • Executable content was dropped or overwritten

      • payments.exe (PID: 1664)
  • INFO

    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3040)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 3040)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rtf | Rich Text Format (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
5
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start winword.exe payments.exe no specs #AZORULT payments.exe cmd.exe no specs timeout.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1664"C:\Users\admin\AppData\Roaming\payments.exe"C:\Users\admin\AppData\Roaming\payments.exe
payments.exe
User:
admin
Company:
AxInstSv
Integrity Level:
MEDIUM
Description:
aitstatic
Exit code:
0
Version:
269.40.279.184
Modules
Images
c:\users\admin\appdata\roaming\payments.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2108"C:\Users\admin\AppData\Roaming\payments.exe" C:\Users\admin\AppData\Roaming\payments.exeWINWORD.EXE
User:
admin
Company:
AxInstSv
Integrity Level:
MEDIUM
Description:
aitstatic
Exit code:
0
Version:
269.40.279.184
Modules
Images
c:\users\admin\appdata\roaming\payments.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
3040"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Payments.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
3500"C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "payments.exe"C:\Windows\system32\cmd.exepayments.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3564C:\Windows\system32\timeout.exe 3 C:\Windows\system32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
timeout - pauses command processing
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\timeout.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
Total events
1 296
Read events
930
Write events
361
Delete events
5

Modification events

(PID) Process:(3040) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:writeName:2(<
Value:
32283C00E00B0000010000000000000000000000
(PID) Process:(3040) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(3040) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(3040) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:WORDFiles
Value:
1317994526
(PID) Process:(3040) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:ProductFiles
Value:
1317994640
(PID) Process:(3040) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:ProductFiles
Value:
1317994641
(PID) Process:(3040) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
Operation:writeName:MTTT
Value:
E00B0000F29EB8AF6EF3D40100000000
(PID) Process:(3040) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:writeName:8)<
Value:
38293C00E00B000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000
(PID) Process:(3040) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:delete valueName:8)<
Value:
38293C00E00B000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000
(PID) Process:(3040) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
Executable files
50
Suspicious files
1
Text files
1
Unknown types
3

Dropped files

PID
Process
Filename
Type
3040WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR6832.tmp.cvr
MD5:
SHA256:
3040WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7ACA2312.png
MD5:
SHA256:
3040WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\32FEF3EB.png
MD5:
SHA256:
3040WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:
SHA256:
3040WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\ley2-bin_Protected[1].exeexecutable
MD5:
SHA256:
3040WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$yments.rtfpgc
MD5:
SHA256:
3040WINWORD.EXEC:\Users\admin\AppData\Local\Temp\Abctfhghghghghg.sctbinary
MD5:
SHA256:
3040WINWORD.EXEC:\Users\admin\AppData\Roaming\payments.exeexecutable
MD5:
SHA256:
1664payments.exeC:\Users\admin\AppData\Local\Temp\2fda\api-ms-win-core-debug-l1-1-0.dllexecutable
MD5:88FF191FD8648099592ED28EE6C442A5
SHA256:C310CC91464C9431AB0902A561AF947FA5C973925FF70482D3DE017ED3F73B7D
3040WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lextext
MD5:F3B25701FE362EC84616A93A45CE9998
SHA256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
3
DNS requests
2
Threats
11

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1664
payments.exe
POST
200
51.77.76.179:80
http://lestonline.gq/400/index.php
GB
binary
4.27 Mb
malicious
1664
payments.exe
POST
200
51.77.76.179:80
http://lestonline.gq/400/index.php
GB
text
2 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3040
WINWORD.EXE
23.226.129.107:443
wareen.com
QuadraNet, Inc
US
malicious
1664
payments.exe
51.77.76.179:80
lestonline.gq
GB
malicious

DNS requests

Domain
IP
Reputation
wareen.com
  • 23.226.129.107
malicious
lestonline.gq
  • 51.77.76.179
malicious

Threats

PID
Process
Class
Message
1048
svchost.exe
Potentially Bad Traffic
ET INFO DNS Query for Suspicious .gq Domain
1664
payments.exe
A Network Trojan was detected
ET TROJAN AZORult Variant.4 Checkin M2
1664
payments.exe
A Network Trojan was detected
MALWARE [PTsecurity] AZORult client request
1664
payments.exe
A Network Trojan was detected
MALWARE [PTsecurity] AZORult.Stealer HTTP Header
1664
payments.exe
Potentially Bad Traffic
ET INFO HTTP POST Request to Suspicious *.gq domain
1664
payments.exe
Generic Protocol Command Decode
SURICATA STREAM excessive retransmissions
1664
payments.exe
A Network Trojan was detected
MALWARE [PTsecurity] AZORult.Stealer HTTP Header
1664
payments.exe
Potentially Bad Traffic
ET INFO HTTP POST Request to Suspicious *.gq domain
1664
payments.exe
A Network Trojan was detected
MALWARE [PTsecurity] AZORult client request
2 ETPRO signatures available at the full report
No debug info