File name: | 46efb964cf953047a83f433b53da18a0.docm |
Full analysis: | https://app.any.run/tasks/2e5ed73e-4458-47d6-af4e-2822f03f65ef |
Verdict: | Malicious activity |
Threats: | Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns. |
Analysis date: | March 31, 2020, 07:01:19 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
MIME: | application/vnd.openxmlformats-officedocument.wordprocessingml.document |
File info: | Microsoft Word 2007+ |
MD5: | 46EFB964CF953047A83F433B53DA18A0 |
SHA1: | 578A6D1F9A8DFBD67C15650D07FE06BB2EEDA2BC |
SHA256: | 1F4EB8880563B6DD20F2C4CB0919A54FDA603EB3963C55A29816E2086EADF814 |
SSDEEP: | 3072:pVAHQqprDuG8xheY3P9jhytOxPaf5vEPWLNyEyuKmQSp3:7AHb5j6heA9ly8xPalLcEZdp3 |
.docx | | | Word Microsoft Office Open XML Format document (52.2) |
---|---|---|
.zip | | | Open Packaging Conventions container (38.8) |
.zip | | | ZIP compressed archive (8.8) |
ZipFileName: | [Content_Types].xml |
---|---|
ZipUncompressedSize: | 1505 |
ZipCompressedSize: | 400 |
ZipCRC: | 0x0c0cc35b |
ZipModifyDate: | 1980:01:01 00:00:00 |
ZipCompression: | Deflated |
ZipBitFlag: | 0x0006 |
ZipRequiredVersion: | 20 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3408 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\46efb964cf953047a83f433b53da18a0.docm" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3408 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR6BF1.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3408 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:10192AFDB3634FDCCAE2992D7C325B5E | SHA256:65C49A3B13DB381569C23F573689456290247E1BC45CC550F415762336FF9CB7 | |||
3408 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$efb964cf953047a83f433b53da18a0.docm | pgc | |
MD5:072D51EF719FB6608FD2E12D363CB50A | SHA256:641F9B4A878CEB31254FB9DFE8B94493CB98F223B98A7C8FBFA1EC3D9F284062 |