File name:

om.exe

Full analysis: https://app.any.run/tasks/a0050fd3-999d-48bc-aec4-03cffc80aa8e
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: January 24, 2020, 00:40:06
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
emotet
trojan
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5:

4229458A0042FC520B481F5001416FE3

SHA1:

49D9B1F98F993E6B02E89DDF866163A363031B35

SHA256:

1BC31BCB1DA5F297358C3B929A45213FACBEDC2841A1DE5426A58D61E4AF5AD1

SSDEEP:

12288:z3RvfwLgJtxETjuZlEooUxTs27xde0Uq2:zx4gJtkuZxrRXwq

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • EMOTET was detected

      • pdeftvolume.exe (PID: 2312)
    • Emotet process was detected

      • om.exe (PID: 1928)
    • Connects to CnC server

      • pdeftvolume.exe (PID: 2312)
  • SUSPICIOUS

    • Starts itself from another location

      • om.exe (PID: 1928)
    • Connects to server without host name

      • pdeftvolume.exe (PID: 2312)
    • Reads Internet Cache Settings

      • pdeftvolume.exe (PID: 2312)
    • Executable content was dropped or overwritten

      • om.exe (PID: 1928)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (39.3)
.exe | Win32 EXE Yoda's Crypter (38.6)
.dll | Win32 Dynamic Link Library (generic) (9.5)
.exe | Win32 Executable (generic) (6.5)
.exe | Generic Win/DOS Executable (2.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:01:23 18:46:03+01:00
PEType: PE32
LinkerVersion: 9
CodeSize: 344064
InitializedDataSize: 53248
UninitializedDataSize: 344064
EntryPoint: 0xa8810
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.3
ProductVersionNumber: 1.0.0.3
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
argumentsintheimpeachmenttrialintheSenate: House Democrats have up to three days to make their case as they presen
CompanyName: Democrats accuse the president of using US military
FileDescription: Mr Trump has been touting corruption claims against
FileVattempttoprodUkraineersion: 1.0.0.2
attempttoprodUkraine: Attending the World Economic Forum in Davos,
LegalCopyright: Trump jokingly warned he might confront Democrats
ForuminDavosSwitzerland: held a lucrative board position with a Ukrainian gas firm
ProductName: The impeachment trial could end next week, but Mr Trump's fellow
rTrumphasbeentouting: 1.0.0.3

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 23-Jan-2020 17:46:03
Detected languages:
  • English - United Kingdom
  • English - United States
arguments in the impeachment trial in the Senate: House Democrats have up to three days to make their case as they presen
CompanyName: Democrats accuse the president of using US military
FileDescription: Mr Trump has been touting corruption claims against
FileVattempt to prod Ukraineersion: 1.0.0.2
attempt to prod Ukraine: Attending the World Economic Forum in Davos,
LegalCopyright: Trump jokingly warned he might confront Democrats
Forum in Davos, Switzerland,: held a lucrative board position with a Ukrainian gas firm
ProductName: The impeachment trial could end next week, but Mr Trump's fellow
r Trump has been touting: 1.0.0.3

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000F0

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 23-Jan-2020 17:46:03
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
UPX0
0x00001000
0x00054000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
UPX1
0x00055000
0x00054000
0x00053C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.85856
.rsrc
0x000A9000
0x0000D000
0x0000CA00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
5.60545

Resources

Title
Entropy
Size
Codepage
Language
Type
1
4.93317
406
UNKNOWN
English - United States
RT_MANIFEST
2
4.02057
1640
UNKNOWN
English - United Kingdom
RT_ICON
3
3.7165
1224
UNKNOWN
English - United Kingdom
RT_ICON
4
3.98381
744
UNKNOWN
English - United Kingdom
RT_ICON
5
3.69443
488
UNKNOWN
English - United Kingdom
RT_ICON
6
3.48271
424
UNKNOWN
English - United Kingdom
RT_ICON
7
3.3474
296
UNKNOWN
English - United Kingdom
RT_ICON
8
5.94992
3752
UNKNOWN
English - United Kingdom
RT_ICON
9
5.9161
2984
UNKNOWN
English - United Kingdom
RT_ICON
10
6.21472
2216
UNKNOWN
English - United Kingdom
RT_ICON

Imports

ADVAPI32.dll
COMCTL32.dll
COMDLG32.dll
GDI32.dll
KERNEL32.DLL
OLEAUT32.dll
SHELL32.dll
SHLWAPI.dll
USER32.dll
WINSPOOL.DRV
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
4
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start om.exe no specs #EMOTET om.exe pdeftvolume.exe no specs #EMOTET pdeftvolume.exe

Process information

PID
CMD
Path
Indicators
Parent process
1928--27ab4f22C:\Users\admin\AppData\Local\Temp\om.exe
om.exe
User:
admin
Company:
Democrats accuse the president of using US military
Integrity Level:
MEDIUM
Description:
Mr Trump has been touting corruption claims against
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\om.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\gdi32.dll
2312--a66f8ff2C:\Users\admin\AppData\Local\pdeftvolume\pdeftvolume.exe
pdeftvolume.exe
User:
admin
Company:
Democrats accuse the president of using US military
Integrity Level:
MEDIUM
Description:
Mr Trump has been touting corruption claims against
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\pdeftvolume\pdeftvolume.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\gdi32.dll
3460"C:\Users\admin\AppData\Local\pdeftvolume\pdeftvolume.exe"C:\Users\admin\AppData\Local\pdeftvolume\pdeftvolume.exeom.exe
User:
admin
Company:
Democrats accuse the president of using US military
Integrity Level:
MEDIUM
Description:
Mr Trump has been touting corruption claims against
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\pdeftvolume\pdeftvolume.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\gdi32.dll
3528"C:\Users\admin\AppData\Local\Temp\om.exe" C:\Users\admin\AppData\Local\Temp\om.exeexplorer.exe
User:
admin
Company:
Democrats accuse the president of using US military
Integrity Level:
MEDIUM
Description:
Mr Trump has been touting corruption claims against
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\om.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\gdi32.dll
Total events
64
Read events
59
Write events
5
Delete events
0

Modification events

(PID) Process:(2312) pdeftvolume.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2312) pdeftvolume.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2312) pdeftvolume.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2312) pdeftvolume.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2312) pdeftvolume.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
Executable files
1
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1928om.exeC:\Users\admin\AppData\Local\pdeftvolume\pdeftvolume.exeexecutable
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
7
DNS requests
0
Threats
24

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2312
pdeftvolume.exe
POST
404
108.6.140.26:80
http://108.6.140.26/kXr6VHvb5BKnOYxM
US
xml
345 b
malicious
2312
pdeftvolume.exe
POST
404
217.160.19.232:8080
http://217.160.19.232:8080/6PYswYV
DE
xml
345 b
malicious
2312
pdeftvolume.exe
POST
404
222.144.13.169:80
http://222.144.13.169/zJXA2
JP
xml
345 b
malicious
2312
pdeftvolume.exe
POST
404
45.55.65.123:8080
http://45.55.65.123:8080/xuIKGKCRdr3
US
xml
345 b
malicious
2312
pdeftvolume.exe
POST
404
70.184.9.39:8080
http://70.184.9.39:8080/rQIw1jFzVsq8F7OaGs
US
xml
345 b
malicious
2312
pdeftvolume.exe
POST
404
5.199.130.105:7080
http://5.199.130.105:7080/HCe4sPcHR1GNTg6
DE
xml
345 b
malicious
2312
pdeftvolume.exe
POST
404
176.9.43.37:8080
http://176.9.43.37:8080/ZjqC1kZ3EQs02wB
DE
xml
345 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2312
pdeftvolume.exe
108.6.140.26:80
MCI Communications Services, Inc. d/b/a Verizon Business
US
malicious
2312
pdeftvolume.exe
70.184.9.39:8080
Cox Communications Inc.
US
malicious
2312
pdeftvolume.exe
45.55.65.123:8080
Digital Ocean, Inc.
US
malicious
2312
pdeftvolume.exe
217.160.19.232:8080
1&1 Internet SE
DE
malicious
2312
pdeftvolume.exe
176.9.43.37:8080
Hetzner Online GmbH
DE
malicious
5.199.130.105:7080
myLoc managed IT AG
DE
malicious
2312
pdeftvolume.exe
222.144.13.169:80
NTT Communications Corporation
JP
malicious

DNS requests

No data

Threats

PID
Process
Class
Message
2312
pdeftvolume.exe
A Network Trojan was detected
ET TROJAN Win32/Emotet CnC Activity (POST) M5
2312
pdeftvolume.exe
A Network Trojan was detected
ET TROJAN Win32/Emotet CnC Activity (POST) M6
2312
pdeftvolume.exe
A Network Trojan was detected
MALWARE [PTsecurity] Feodo/Emotet
2312
pdeftvolume.exe
A Network Trojan was detected
ET TROJAN Win32/Emotet CnC Activity (POST) M5
2312
pdeftvolume.exe
A Network Trojan was detected
ET TROJAN Win32/Emotet CnC Activity (POST) M6
2312
pdeftvolume.exe
A Network Trojan was detected
MALWARE [PTsecurity] Feodo/Emotet
2312
pdeftvolume.exe
A Network Trojan was detected
ET TROJAN Win32/Emotet CnC Activity (POST) M5
2312
pdeftvolume.exe
A Network Trojan was detected
ET TROJAN Win32/Emotet CnC Activity (POST) M6
2312
pdeftvolume.exe
A Network Trojan was detected
MALWARE [PTsecurity] Feodo/Emotet
2312
pdeftvolume.exe
A Network Trojan was detected
ET TROJAN Win32/Emotet CnC Activity (POST) M5
No debug info