analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

reciept.doc

Full analysis: https://app.any.run/tasks/5d50c006-e613-4499-aff8-c4fdaa8674e6
Verdict: Malicious activity
Threats:

A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools.

Analysis date: June 18, 2019, 19:32:40
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ole-embedded
generated-doc
trojan
loader
rat
remcos
keylogger
Indicators:
MIME: text/rtf
File info: Rich Text Format data, version 1, unknown character set
MD5:

20EE7F01CF2AC71B5C7DA2BFDE6F200B

SHA1:

CEB4FA985BC7748458D0E8CAA9629F48380F5DA6

SHA256:

D8CFA43258DE25B4BE01834D51DED9EBA2934D4A255681282506CA8FFDD5D4E9

SSDEEP:

6144:hdQ14Wl5Lr/1jWl56dp1CWl5E8S1IWl585y1LWl5JK:h2+Wl5L7dWl56TsWl5E1SWl58MpWl54

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • kqrl7.exe (PID: 2380)
      • kqrl7.exe (PID: 2528)
      • kqrl7.exe (PID: 1712)
      • kqrl7.exe (PID: 2448)
      • kqrl7.exe (PID: 2280)
      • kqrl7.exe (PID: 772)
      • kqrl7.exe (PID: 2140)
      • kqrl7.exe (PID: 3272)
    • Executable content was dropped or overwritten

      • EXCEL.EXE (PID: 3680)
    • Requests a remote executable file from MS Office

      • EXCEL.EXE (PID: 3680)
      • EXCEL.EXE (PID: 2836)
      • EXCEL.EXE (PID: 2060)
      • EXCEL.EXE (PID: 3152)
    • Unusual execution from Microsoft Office

      • EXCEL.EXE (PID: 3680)
      • EXCEL.EXE (PID: 2836)
      • EXCEL.EXE (PID: 2060)
      • EXCEL.EXE (PID: 3152)
    • Writes to a start menu file

      • kqrl7.exe (PID: 2380)
      • kqrl7.exe (PID: 2528)
      • kqrl7.exe (PID: 2280)
      • kqrl7.exe (PID: 2140)
    • Downloads executable files from IP

      • EXCEL.EXE (PID: 3680)
    • Detected logs from REMCOS RAT

      • kqrl7.exe (PID: 1712)
    • REMCOS was detected

      • kqrl7.exe (PID: 1712)
  • SUSPICIOUS

    • Executed via COM

      • EXCEL.EXE (PID: 552)
      • EXCEL.EXE (PID: 3680)
      • EXCEL.EXE (PID: 2836)
      • EXCEL.EXE (PID: 2060)
      • EXCEL.EXE (PID: 3152)
      • excelcnv.exe (PID: 3284)
    • Creates files in the user directory

      • kqrl7.exe (PID: 2380)
      • kqrl7.exe (PID: 2528)
      • kqrl7.exe (PID: 2280)
      • kqrl7.exe (PID: 2140)
      • kqrl7.exe (PID: 1712)
    • Executable content was dropped or overwritten

      • kqrl7.exe (PID: 2380)
      • kqrl7.exe (PID: 2528)
      • kqrl7.exe (PID: 2280)
      • kqrl7.exe (PID: 2140)
    • Application launched itself

      • kqrl7.exe (PID: 2380)
      • kqrl7.exe (PID: 2528)
      • kqrl7.exe (PID: 2280)
      • kqrl7.exe (PID: 2140)
    • Writes files like Keylogger logs

      • kqrl7.exe (PID: 1712)
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 3564)
    • Reads Microsoft Office registry keys

      • EXCEL.EXE (PID: 3680)
      • EXCEL.EXE (PID: 552)
      • WINWORD.EXE (PID: 3564)
      • EXCEL.EXE (PID: 2836)
      • EXCEL.EXE (PID: 2060)
      • EXCEL.EXE (PID: 3152)
      • excelcnv.exe (PID: 3284)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rtf | Rich Text Format (100)

EXIF

RTF

LastModifiedBy: Administrator
CreateDate: 2019:06:18 16:39:00
ModifyDate: 2019:06:18 16:39:00
RevisionNumber: 1
TotalEditTime: -
Pages: 1
Words: 19
Characters: 112
CharactersWithSpaces: 130
InternalVersionNumber: 105
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
15
Malicious processes
7
Suspicious processes
2

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start drop and start winword.exe no specs excel.exe excel.exe kqrl7.exe excel.exe #REMCOS kqrl7.exe kqrl7.exe excel.exe kqrl7.exe no specs kqrl7.exe excel.exe kqrl7.exe no specs kqrl7.exe excelcnv.exe no specs kqrl7.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3564"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Downloads\reciept.doc.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
552"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" -EmbeddingC:\Program Files\Microsoft Office\Office14\EXCEL.EXE
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Exit code:
0
Version:
14.0.6024.1000
3680"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" -EmbeddingC:\Program Files\Microsoft Office\Office14\EXCEL.EXE
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Exit code:
0
Version:
14.0.6024.1000
2380"C:\Users\admin\AppData\Local\Temp\kqrl7.exe" C:\Users\admin\AppData\Local\Temp\kqrl7.exe
EXCEL.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2836"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" -EmbeddingC:\Program Files\Microsoft Office\Office14\EXCEL.EXE
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Exit code:
0
Version:
14.0.6024.1000
1712"C:\Users\admin\AppData\Local\Temp\kqrl7.exe"C:\Users\admin\AppData\Local\Temp\kqrl7.exe
kqrl7.exe
User:
admin
Integrity Level:
MEDIUM
2528"C:\Users\admin\AppData\Local\Temp\kqrl7.exe" C:\Users\admin\AppData\Local\Temp\kqrl7.exe
EXCEL.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2060"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" -EmbeddingC:\Program Files\Microsoft Office\Office14\EXCEL.EXE
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Exit code:
0
Version:
14.0.6024.1000
2448"C:\Users\admin\AppData\Local\Temp\kqrl7.exe"C:\Users\admin\AppData\Local\Temp\kqrl7.exekqrl7.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
2280"C:\Users\admin\AppData\Local\Temp\kqrl7.exe" C:\Users\admin\AppData\Local\Temp\kqrl7.exe
EXCEL.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Total events
4 145
Read events
3 410
Write events
0
Delete events
0

Modification events

No data
Executable files
6
Suspicious files
0
Text files
12
Unknown types
4

Dropped files

PID
Process
Filename
Type
3564WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR4142.tmp.cvr
MD5:
SHA256:
552EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVR4AF7.tmp.cvr
MD5:
SHA256:
3680EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVRA54C.tmp.cvr
MD5:
SHA256:
2836EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVRAF2F.tmp.cvr
MD5:
SHA256:
2060EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVRB4AD.tmp.cvr
MD5:
SHA256:
3152EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVRBCCB.tmp.cvr
MD5:
SHA256:
3284excelcnv.exeC:\Users\admin\AppData\Local\Temp\CVRC3FF.tmp.cvr
MD5:
SHA256:
3284excelcnv.exeC:\Users\admin\AppData\Local\Temp\~DF5C73EC12D6231E6D.TMP
MD5:
SHA256:
3564WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~DF11EFB36B3126D252.TMP
MD5:
SHA256:
3284excelcnv.exeC:\Users\admin\AppData\Local\Temp\~DF4BEB1E137B72F327.TMP
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
7
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3152
EXCEL.EXE
GET
304
104.214.58.211:80
http://104.214.58.211/file.exe
US
suspicious
2060
EXCEL.EXE
GET
304
104.214.58.211:80
http://104.214.58.211/file.exe
US
suspicious
2836
EXCEL.EXE
GET
304
104.214.58.211:80
http://104.214.58.211/file.exe
US
suspicious
3680
EXCEL.EXE
GET
200
104.214.58.211:80
http://104.214.58.211/file.exe
US
executable
217 Kb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
552
EXCEL.EXE
104.214.58.211:80
rowanyne.ooo
Microsoft Corporation
US
suspicious
3680
EXCEL.EXE
104.214.58.211:80
rowanyne.ooo
Microsoft Corporation
US
suspicious
1712
kqrl7.exe
104.214.58.211:2404
rowanyne.ooo
Microsoft Corporation
US
suspicious
2060
EXCEL.EXE
104.214.58.211:80
rowanyne.ooo
Microsoft Corporation
US
suspicious
2836
EXCEL.EXE
104.214.58.211:80
rowanyne.ooo
Microsoft Corporation
US
suspicious
3152
EXCEL.EXE
104.214.58.211:80
rowanyne.ooo
Microsoft Corporation
US
suspicious
1712
kqrl7.exe
104.214.58.211:2809
rowanyne.ooo
Microsoft Corporation
US
suspicious

DNS requests

Domain
IP
Reputation
dns.msftncsi.com
  • 131.107.255.255
shared
rowanyne.ooo
  • 104.214.58.211
malicious

Threats

PID
Process
Class
Message
3680
EXCEL.EXE
A Network Trojan was detected
ET INFO Executable Download from dotted-quad Host
3680
EXCEL.EXE
A Network Trojan was detected
ET CURRENT_EVENTS Likely Evil EXE download from dotted Quad by MSXMLHTTP M1
3680
EXCEL.EXE
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3680
EXCEL.EXE
A Network Trojan was detected
ET CURRENT_EVENTS Likely Evil EXE download from dotted Quad by MSXMLHTTP M2
3680
EXCEL.EXE
Potentially Bad Traffic
ET INFO SUSPICIOUS Dotted Quad Host MZ Response
2836
EXCEL.EXE
A Network Trojan was detected
ET TROJAN Unknown - Loader - Check .exe Updated
2836
EXCEL.EXE
A Network Trojan was detected
ET INFO Executable Download from dotted-quad Host
2060
EXCEL.EXE
A Network Trojan was detected
ET TROJAN Unknown - Loader - Check .exe Updated
2060
EXCEL.EXE
A Network Trojan was detected
ET INFO Executable Download from dotted-quad Host
3152
EXCEL.EXE
A Network Trojan was detected
ET TROJAN Unknown - Loader - Check .exe Updated
Process
Message
kqrl7.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1391
kqrl7.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\identityauthority.cpp, line 278
kqrl7.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1391
kqrl7.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\identityauthority.cpp, line 278
kqrl7.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1391
kqrl7.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\identityauthority.cpp, line 278
kqrl7.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1391
kqrl7.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\identityauthority.cpp, line 278
kqrl7.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\identityauthority.cpp, line 278
kqrl7.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\identityauthority.cpp, line 278