analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Payments.rtf

Full analysis: https://app.any.run/tasks/b50f5fb6-d3f1-4a32-bb6f-31d2a6f8afe2
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 15, 2019, 11:46:10
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ole-embedded
loader
Indicators:
MIME: text/rtf
File info: Rich Text Format data, unknown version
MD5:

0D82BE8D3809E4B0974CF2150F592142

SHA1:

0AC61F4B87424910AC3938B4135B96F6742D37AB

SHA256:

F8083D8DE334761CF9F0B24F3C390F7D949412D5128B402D6012238171956DA2

SSDEEP:

24576:0e+wxme+wxme+wxzo9huHVo9cVe+wxme+wxme+wxzo9huHVo9cg:Z

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • payments.exe (PID: 724)
    • Executable content was dropped or overwritten

      • WINWORD.EXE (PID: 3924)
    • Requests a remote executable file from MS Office

      • WINWORD.EXE (PID: 3924)
    • Unusual execution from Microsoft Office

      • WINWORD.EXE (PID: 3924)
    • Downloads executable files from IP

      • WINWORD.EXE (PID: 3924)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 3924)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3924)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rtf | Rich Text Format (100)
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
32
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start winword.exe payments.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3924"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Payments.rtf"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
724"C:\Users\admin\AppData\Roaming\payments.exe" C:\Users\admin\AppData\Roaming\payments.exeWINWORD.EXE
User:
admin
Integrity Level:
MEDIUM
Total events
618
Read events
592
Write events
25
Delete events
1

Modification events

(PID) Process:(3924) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:writeName:qd
Value:
71642000540F0000010000000000000000000000
(PID) Process:(3924) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(3924) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(3924) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:WORDFiles
Value:
1317994526
(PID) Process:(3924) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:ProductFiles
Value:
1317994640
(PID) Process:(3924) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:ProductFiles
Value:
1317994641
(PID) Process:(3924) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
Operation:writeName:MTTT
Value:
540F0000182B3FDD80F3D40100000000
(PID) Process:(3924) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:writeName:ze
Value:
7A652000540F000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000
(PID) Process:(3924) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:delete valueName:ze
Value:
7A652000540F000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000
(PID) Process:(3924) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
Executable files
2
Suspicious files
1
Text files
0
Unknown types
2

Dropped files

PID
Process
Filename
Type
3924WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR30C1.tmp.cvr
MD5:
SHA256:
3924WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CF02FC63.png
MD5:
SHA256:
3924WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\59614308.png
MD5:
SHA256:
3924WINWORD.EXEC:\Users\admin\AppData\Local\Temp\Abctfhghghghghg.sctbinary
MD5:0E60DE5D303A2A3F9E4A9265C3A9572C
SHA256:06ECBCA26DC54A9EDA624BB87137144775456CC505B3B6382D07F907BD192351
3924WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\1234567890987654[1].exeexecutable
MD5:0BCA76EF0D1248EEE17CCDC641B20E5D
SHA256:F4856659216872B7C5F812BECF9478729A33CA8715136D96C4B2B0A0C0AE567C
3924WINWORD.EXEC:\Users\admin\AppData\Roaming\payments.exeexecutable
MD5:0BCA76EF0D1248EEE17CCDC641B20E5D
SHA256:F4856659216872B7C5F812BECF9478729A33CA8715136D96C4B2B0A0C0AE567C
3924WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$yments.rtfpgc
MD5:39147FB127EDFBCD58FAB2BDF1BFE781
SHA256:273E50ED962EE413E0C32B17E6DD68BF54AB87BA4DDFEB3E875E165265FE84A2
3924WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:9AA328F831C50DD9BBEFE2D9BC2194AD
SHA256:965B6A8A909D7CFA9EB1790958BDCACB88B5258F8EB535D32891D882224E44E2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
1
DNS requests
0
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3924
WINWORD.EXE
GET
200
46.166.175.61:80
http://46.166.175.61/1234567890987654.exe
LT
executable
1.50 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3924
WINWORD.EXE
46.166.175.61:80
UAB Cherry Servers
LT
malicious

DNS requests

No data

Threats

PID
Process
Class
Message
3924
WINWORD.EXE
A Network Trojan was detected
ET INFO Executable Download from dotted-quad Host
3924
WINWORD.EXE
A Network Trojan was detected
ET CURRENT_EVENTS Possible Malicious Macro DL EXE Feb 2016
No debug info