File name:

income_tax_and_benefit_return_2021.docx

Full analysis: https://app.any.run/tasks/bd0d414f-64ce-463d-a958-cace2d3f3118
Verdict: Malicious activity
Analysis date: February 17, 2024, 23:35:59
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
cve-2022-30190
MIME: application/octet-stream
File info: Microsoft OOXML
MD5:

55998CB43459159A5ED4511F00FF3FC8

SHA1:

9BEC2182CC5B41FE8783BB7AB6E577BAC5C19F04

SHA256:

D0E1F97DBE2D0AF9342E64D460527B088D85F96D38B1D1D4AA610C0987DCA745

SSDEEP:

384:Q6UDg00MWEg9fPCPyH111/elBqhveoNHfn5yAehqbhtgyhdCxi556BjsbIwRq:QcMWE04uebyvNv5yHcttg6dwc5YQb5w

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • CVE-2022-30190 detected

      • WINWORD.EXE (PID: 3700)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.docx | Word Microsoft Office Open XML Format document (52.2)
.zip | Open Packaging Conventions container (38.8)
.zip | ZIP compressed archive (8.8)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 1980:01:01 00:00:00
ZipCRC: 0x1e3c81b4
ZipCompressedSize: 358
ZipUncompressedSize: 1416
ZipFileName: [Content_Types].xml

XML

Template: Normal
TotalEditTime: 34 minutes
Pages: 1
Words: 206
Characters: 1176
Application: Microsoft Office Word
DocSecurity: None
Lines: 9
Paragraphs: 2
ScaleCrop: No
Company: Consumers Association
LinksUpToDate: No
CharactersWithSpaces: 1380
SharedDoc: No
HyperlinksChanged: No
AppVersion: 16
LastModifiedBy: user
RevisionNumber: 6
CreateDate: 2013:10:31 15:25:00Z
ModifyDate: 2021:08:31 16:47:00Z

XMP

Title: -
Subject: -
Creator: Michele Eykelbosch
Description: -
Language: en-US
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3700"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\income_tax_and_benefit_return_2021.docx"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\comctl32.dll
Total events
7 850
Read events
7 022
Write events
577
Delete events
251

Modification events

(PID) Process:(3700) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:writeName:<a'
Value:
3C612700740E0000010000000000000000000000
(PID) Process:(3700) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(3700) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1041
Value:
Off
(PID) Process:(3700) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1046
Value:
Off
(PID) Process:(3700) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1036
Value:
Off
(PID) Process:(3700) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1031
Value:
Off
(PID) Process:(3700) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1040
Value:
Off
(PID) Process:(3700) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1049
Value:
Off
(PID) Process:(3700) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:3082
Value:
Off
(PID) Process:(3700) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1042
Value:
Off
Executable files
0
Suspicious files
8
Text files
1
Unknown types
5

Dropped files

PID
Process
Filename
Type
3700WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRED9C.tmp.cvr
MD5:
SHA256:
3700WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmbinary
MD5:280D2B65A6285DCE35099F1721B7999D
SHA256:9C481BFD497634B56792F1F82F7323677D76F0ECD94EC28D527714D4DEF38B52
3700WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$come_tax_and_benefit_return_2021.docxbinary
MD5:BD6D41709BF8D7AA5D0E2C6D2E9673BF
SHA256:5A5EB8DD117C96C803F84125C89A14BC0EA1E90E57822B17DDFA269A1E704439
3700WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{2180E26F-A535-4F13-A3D1-486DCAFF22CE}.FSDbinary
MD5:C7E4D238D3B0278A299CC44E9C164834
SHA256:DCD3ECD575D676FF39EE45990851E5FBC5E97185329E7C548F1D3EFB433CE5A6
3700WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSDbinary
MD5:050D8052D8A6B0C11510F110222C4919
SHA256:6EF81B1656DA83BCDE36DE2000DBFF20E21D1436DEB8D9FE89CCBE0C1B2D0CE9
3700WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSFbinary
MD5:D471A0BB5F0B8A9AC834E0172491B7F9
SHA256:418B6AE0A39787583DCD77DA0ED040F8C3DDA03410E71D04C235EE6E736F298F
3700WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2408C799.datbinary
MD5:07FFEFF17A8A1A1209AB3C2690D569D4
SHA256:57CFA30BB860B95B7012ED62427025959B671D270AAF67FC406FBC3C4F3C48D4
3700WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSDbinary
MD5:39429B01CC4882AC1E2C66F625FF69AA
SHA256:D0C3966F7BFFC9E7D48CAAFFB45426E1EE65DD7DF172516B9EC6A20FE79217FA
3700WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{F9865E48-403D-4357-A1BD-F07B5B05B6AE}.FSDbinary
MD5:7259BF0AA70D0F621A48F87F01460DE8
SHA256:E1261913CC4FDF0DA69D345A295AF796569A3F5B64EFFF269DD1DA4A5746F08E
3700WINWORD.EXEC:\Users\admin\AppData\Local\Temp\{D51C7DFA-B3E7-4CC1-8F70-2191749C8254}binary
MD5:39429B01CC4882AC1E2C66F625FF69AA
SHA256:D0C3966F7BFFC9E7D48CAAFFB45426E1EE65DD7DF172516B9EC6A20FE79217FA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown

DNS requests

Domain
IP
Reputation
hidusi.com
unknown

Threats

No threats detected
No debug info