File name:

e78585b251b21b8a29f1764edece62719e73103f583585b5d35e5e2f1cf9c409

Full analysis: https://app.any.run/tasks/18407c65-0273-425b-99d3-5df802a2299e
Verdict: Malicious activity
Analysis date: December 02, 2023, 20:47:33
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
ole-embedded
macros-on-open
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1251, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon Apr 11 09:14:00 2016, Last Saved Time/Date: Mon Apr 11 14:11:00 2016, Number of Pages: 1, Number of Words: 6, Number of Characters: 36, Security: 0
MD5:

C2EC2EE7824A8BD2A2A049EC9D348E2B

SHA1:

22515FCF60A21BBAD54F0BE5D61118310E0F9B84

SHA256:

E78585B251B21B8A29F1764EDECE62719E73103F583585B5D35E5E2F1CF9C409

SSDEEP:

3072:LhjyJNLCFxSl6CkuzTAE3urKzsQCsJVc2oemTxRSKUqla6BU4fW4+:NO/2el6Ck4TL3HXCsJVzoXjo+U0W4+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Unusual execution from MS Office

      • WINWORD.EXE (PID: 2644)
  • SUSPICIOUS

    • Starts application with an unusual extension

      • WINWORD.EXE (PID: 2644)
    • Starts CMD.EXE for commands execution

      • q1.gif (PID: 2920)
    • Runs shell command (SCRIPT)

      • WINWORD.EXE (PID: 2644)
  • INFO

    • Drops the executable file immediately after the start

      • WINWORD.EXE (PID: 124)
    • The process uses the downloaded file

      • WINWORD.EXE (PID: 124)
    • Checks supported languages

      • q1.gif (PID: 2920)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (35.9)
.xls | Microsoft Excel sheet (33.7)
.doc | Microsoft Word document (old ver.) (21.3)

EXIF

FlashPix

Identification: Word 8.0
LanguageCode: English (US)
DocFlags: Has picture, 1Table, ExtChar
System: Windows
Word97: No
Title: -
Subject: -
Author: -
Keywords: -
Comments: -
Template: Normal.dotm
LastModifiedBy: -
Software: Microsoft Office Word
CreateDate: 2016:04:11 08:14:00
ModifyDate: 2016:04:11 13:11:00
Security: None
CodePage: Windows Cyrillic
Company: -
CharCountWithSpaces: 41
AppVersion: 15
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts: -
HeadingPairs:
  • Название
  • 1
CompObjUserTypeLen: 32
CompObjUserType: ???????? Microsoft Word 97-2003
LastPrinted: 0000:00:00 00:00:00
RevisionNumber: 1
TotalEditTime: -
Words: 6
Characters: 36
Pages: 1
Paragraphs: 1
Lines: 1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe no specs winword.exe no specs q1.gif no specs cmd.exe no specs cmd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
124"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -EmbeddingC:\Program Files\Microsoft Office\Office14\WINWORD.EXEsvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\comctl32.dll
1852C:\Windows\system32\cmd.exe /c clsC:\Windows\System32\cmd.exeq1.gif
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2136C:\Windows\system32\cmd.exe /c /IMC:\Windows\System32\cmd.exeq1.gif
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2644"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\e78585b251b21b8a29f1764edece62719e73103f583585b5d35e5e2f1cf9c409.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\comctl32.dll
2920C:\Users\admin\AppData\Local\Temp\q1.gifC:\Users\admin\AppData\Local\Temp\q1.gifWINWORD.EXE
User:
admin
Company:
http://zenden.ws
Integrity Level:
MEDIUM
Description:
Fed 4074 Rong Achievable
Exit code:
0
Version:
7.4.7.790
Modules
Images
c:\users\admin\appdata\local\temp\q1.gif
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
Total events
6 194
Read events
5 341
Write events
730
Delete events
123

Modification events

(PID) Process:(2644) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(2644) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1041
Value:
On
(PID) Process:(2644) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1046
Value:
On
(PID) Process:(2644) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1036
Value:
On
(PID) Process:(2644) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1031
Value:
On
(PID) Process:(2644) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1040
Value:
On
(PID) Process:(2644) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1049
Value:
On
(PID) Process:(2644) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:3082
Value:
On
(PID) Process:(2644) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1042
Value:
On
(PID) Process:(2644) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1055
Value:
On
Executable files
1
Suspicious files
13
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
2644WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR647B.tmp.cvr
MD5:
SHA256:
124WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR7071.tmp.cvr
MD5:
SHA256:
2644WINWORD.EXEC:\Users\admin\AppData\Local\Temp\bveqq.rtftext
MD5:6911E5D8C83B4717A927880032B6F298
SHA256:B1CAD0A895B6F6F1C25FB77596E75D40CB770C81AD8C062722252EAA1A1FAD1F
2644WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmbinary
MD5:22F7549C8E4AF2D627FECAB67F1FE9CF
SHA256:0EFA37DEAFEB5602CA022DC990ADD2F16BFC7D1FFB745EA1B20555659767039C
124WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRC0000.tmpdocument
MD5:989A3956166DC18EF86542DC0268C3E9
SHA256:1083CA2AB383E7939EBFF1BB9BC1A94167A98003BF3B0A942FD9F35204A5D470
2644WINWORD.EXEC:\Users\admin\AppData\Local\Temp\lkev.rtftext
MD5:D295C84B5B1B25B9772484447D501F3E
SHA256:0B810BC10C29AE40CCC607F0417DB6804D8842D37EBDEB07DAB7F31303C7CC2B
2644WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$bveqq.rtfbinary
MD5:0C1C07353719F767EE4FFCF6B95A2840
SHA256:76FFC7B14318AF83F8151FDCD3F600266996015437EA47D7920988681214E37D
124WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$bveqq.rtfbinary
MD5:1DA5BB32BC09E30CD3571E7072DE0219
SHA256:4B7BC025B4AFB7607CB20EFD992E48CEF5D093B1F0F038088581576796404ECD
2644WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EC98212D.emfbinary
MD5:35C99DB31BD6001066D31A6A096A3D41
SHA256:E859A0626D2F4AF5A2102866171AD7D8C5B5DDC90382D4B2459894194D7EBA53
2644WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DE569D4A.emfbinary
MD5:35C99DB31BD6001066D31A6A096A3D41
SHA256:E859A0626D2F4AF5A2102866171AD7D8C5B5DDC90382D4B2459894194D7EBA53
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
5
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info