analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Amazon Statement.docx

Full analysis: https://app.any.run/tasks/53c854c0-934a-41b7-ac28-ba9f22611916
Verdict: Malicious activity
Analysis date: October 14, 2019, 00:55:58
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
maldoc-31
MIME: application/vnd.openxmlformats-officedocument.wordprocessingml.document
File info: Microsoft Word 2007+
MD5:

36D9775EDCD5A5584EA2A331CF8D06EC

SHA1:

3650D632D13A69747FC5D7483C9B444C29CD6609

SHA256:

FBEA3549E1A0B3A0977E5DBED5C3AB8CD7D2190EF4702D3145CCF3D0F0FEEB61

SSDEEP:

1536:ynRMoLwcU9aCzhR5LjD9Gq4ULwF2Jg6a/7b:iJLCB7DTEF8pa/7b

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 992)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 992)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.docx | Word Microsoft Office Open XML Format document (52.2)
.zip | Open Packaging Conventions container (38.8)
.zip | ZIP compressed archive (8.8)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0006
ZipCompression: Deflated
ZipModifyDate: 1980:01:01 00:00:00
ZipCRC: 0x2c4825bf
ZipCompressedSize: 444
ZipUncompressedSize: 1869
ZipFileName: [Content_Types].xml

XMP

Creator: vincent ah ah ah

XML

LastModifiedBy: Azure
RevisionNumber: 138
LastPrinted: 2019:01:27 08:09:00Z
CreateDate: 2019:09:27 07:14:00Z
ModifyDate: 2019:10:13 23:23:00Z
Template: Account-Verify.dot
TotalEditTime: 1.0 hours
Pages: 1
Words: 155
Characters: 888
Application: Microsoft Office Word
DocSecurity: None
Lines: 7
Paragraphs: 2
ScaleCrop: No
HeadingPairs:
  • Title
  • 1
TitlesOfParts: -
Company: -
LinksUpToDate: No
CharactersWithSpaces: 1041
SharedDoc: No
HyperlinksChanged: No
AppVersion: 12
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
1
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
992"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Amazon Statement.docx"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
Total events
1 598
Read events
918
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
1
Unknown types
2

Dropped files

PID
Process
Filename
Type
992WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRA831.tmp.cvr
MD5:
SHA256:
992WINWORD.EXEC:\Users\admin\AppData\Local\Temp\msoAF27.tmp
MD5:
SHA256:
992WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$azon Statement.docxpgc
MD5:411EEF87EB4706CF15411B5B975BEAA1
SHA256:029529DFBAC98D1A6F0F06C52A340763017042DBCC6CB14FBC177B21CE40DAD9
992WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN3809.lextext
MD5:F3B25701FE362EC84616A93A45CE9998
SHA256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
992WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:71834CB5A40FD067717E5E242FCFDDE2
SHA256:053F9EECE736E49AA9E3C99DB635C70D83D2B9311D2D3CA8D612695DCF73376C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info