analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

WZJ000883.xlsm

Full analysis: https://app.any.run/tasks/3fda5a0b-09c4-492d-b79d-64a2d01d220f
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: June 02, 2022, 08:09:28
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
emotet-doc
emotet
Indicators:
MIME: application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
File info: Microsoft Excel 2007+
MD5:

00BD27A66D752E35A41CB7CE82524C3C

SHA1:

3E62B73A46E418B2AC1EB2D37A4EBF7F61C891B1

SHA256:

33DC0546D60F496508E95293772364BF7E913D52EC3D606B326ADFF6CBFE7FD7

SSDEEP:

768:Ub/Mvd5dhTJxmxE7l0VGpevZCw4VmUxjfC30+kS4QyoX0VyY5G:Ubmd5zmxE7W0XYk4pEVyV

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • rundll32.exe (PID: 2344)
      • SearchProtocolHost.exe (PID: 1448)
      • rundll32.exe (PID: 3224)
      • rundll32.exe (PID: 3720)
      • rundll32.exe (PID: 764)
    • Executable content was dropped or overwritten

      • EXCEL.EXE (PID: 3208)
    • Unusual execution from Microsoft Office

      • EXCEL.EXE (PID: 3208)
    • Drops executable file immediately after starts

      • EXCEL.EXE (PID: 3208)
      • rundll32.exe (PID: 3224)
    • EMOTET detected by memory dumps

      • rundll32.exe (PID: 3720)
    • Changes the autorun value in the registry

      • rundll32.exe (PID: 3720)
    • Connects to CnC server

      • rundll32.exe (PID: 3720)
  • SUSPICIOUS

    • Uses RUNDLL32.EXE to load library

      • rundll32.exe (PID: 2344)
      • EXCEL.EXE (PID: 3208)
      • rundll32.exe (PID: 3224)
      • rundll32.exe (PID: 764)
    • Starts itself from another location

      • rundll32.exe (PID: 2344)
    • Reads default file associations for system extensions

      • SearchProtocolHost.exe (PID: 1448)
      • rundll32.exe (PID: 3224)
    • Drops a file with a compile date too recent

      • EXCEL.EXE (PID: 3208)
      • rundll32.exe (PID: 3224)
    • Executable content was dropped or overwritten

      • rundll32.exe (PID: 3224)
    • Application launched itself

      • rundll32.exe (PID: 3224)
      • rundll32.exe (PID: 764)
  • INFO

    • Checks supported languages

      • rundll32.exe (PID: 2344)
      • rundll32.exe (PID: 3224)
      • EXCEL.EXE (PID: 3208)
      • rundll32.exe (PID: 764)
      • rundll32.exe (PID: 3720)
    • Reads the computer name

      • rundll32.exe (PID: 3224)
      • EXCEL.EXE (PID: 3208)
      • rundll32.exe (PID: 3720)
    • Reads settings of System Certificates

      • EXCEL.EXE (PID: 3208)
      • rundll32.exe (PID: 3720)
    • Checks Windows Trust Settings

      • EXCEL.EXE (PID: 3208)
      • rundll32.exe (PID: 3720)
    • Creates files in the user directory

      • EXCEL.EXE (PID: 3208)
    • Reads Microsoft Office registry keys

      • EXCEL.EXE (PID: 3208)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Emotet

(PID) Process(3720) rundll32.exe
C2 (31)172.104.227.98:443
31.207.89.74:8080
46.55.222.11:443
41.76.108.46:8080
103.8.26.103:8080
185.184.25.237:8080
103.8.26.102:8080
203.114.109.124:443
45.118.115.99:8080
178.79.147.66:8080
58.227.42.236:80
45.118.135.203:7080
103.75.201.2:443
195.154.133.20:443
192.254.71.210:443
45.142.114.231:8080
212.237.5.209:443
207.38.84.195:8080
104.251.214.46:8080
212.237.17.99:8080
212.237.56.116:7080
216.158.226.206:443
110.232.117.186:8080
158.69.222.101:443
107.182.225.142:8080
176.104.106.96:8080
81.0.236.90:443
50.116.54.215:443
138.185.72.26:8080
51.68.175.8:8080
210.57.217.132:8080
ECS1-----BEGIN PUBLIC KEY----- MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEQF90tsTY3Aw9HwZ6N9y5+be9Xoov pqHyD6F5DRTl9THosAoePIs/e5AdJiYxhmV8Gq3Zw1ysSPBghxjZdDxY+Q== -----END PUBLIC KEY-----
ECK1-----BEGIN PUBLIC KEY----- MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE86M1tQ4uK/Q1Vs0KTCk+fPEQ3cuw TyCz+gIgzky2DB5Elr60DubJW5q9Tr2dj8/gEFs0TIIEJgLTuqzx+58sdg== -----END PUBLIC KEY-----
No Malware configuration.

TRiD

.xlsx | Excel Microsoft Office Open XML Format document (61.2)
.zip | Open Packaging Conventions container (31.5)
.zip | ZIP compressed archive (7.2)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0006
ZipCompression: Deflated
ZipModifyDate: 1980:01:01 00:00:00
ZipCRC: 0x5ba70022
ZipCompressedSize: 505
ZipUncompressedSize: 2833
ZipFileName: [Content_Types].xml

XMP

Creator: Админ

XML

LastModifiedBy: Админ
CreateDate: 2015:06:05 18:19:34Z
ModifyDate: 2021:12:03 13:37:58Z
Application: Microsoft Excel
DocSecurity: None
ScaleCrop: No
HeadingPairs:
  • Листы
  • 5
  • Макросы Excel 4.0
  • 7
TitlesOfParts:
  • Fbbsib1
  • Sheet
  • Fbe1
  • Gef1
  • Gef2
  • GOT
  • Scq1
  • Scq2
  • Scq3
  • Scq4
  • Scq5
  • Scq6
Company: -
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
AppVersion: 16.03
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
6
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start excel.exe rundll32.exe no specs searchprotocolhost.exe no specs rundll32.exe rundll32.exe no specs #EMOTET rundll32.exe

Process information

PID
CMD
Path
Indicators
Parent process
3208"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /ddeC:\Program Files\Microsoft Office\Office14\EXCEL.EXE
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Version:
14.0.6024.1000
2344C:\Windows\SysWow64\rundll32.exe ..\bestb.ocx,D"&"l"&"l"&"R"&"eg"&"i"&"s"&"t"&"erServerC:\Windows\SysWow64\rundll32.exeEXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1448"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe4_ Global\UsGthrCtrlFltPipeMssGthrPipe4 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\system32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Exit code:
0
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
3224C:\Windows\system32\rundll32.exe "C:\Users\admin\bestb.ocx",DllRegisterServerC:\Windows\system32\rundll32.exe
rundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
764C:\Windows\system32\rundll32.exe "C:\Users\admin\AppData\Local\Hspakb\bilal.bay",iwfEvdvgZDHtvSUC:\Windows\system32\rundll32.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3720C:\Windows\system32\rundll32.exe "C:\Users\admin\AppData\Local\Hspakb\bilal.bay",DllRegisterServerC:\Windows\system32\rundll32.exe
rundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Emotet
(PID) Process(3720) rundll32.exe
C2 (31)172.104.227.98:443
31.207.89.74:8080
46.55.222.11:443
41.76.108.46:8080
103.8.26.103:8080
185.184.25.237:8080
103.8.26.102:8080
203.114.109.124:443
45.118.115.99:8080
178.79.147.66:8080
58.227.42.236:80
45.118.135.203:7080
103.75.201.2:443
195.154.133.20:443
192.254.71.210:443
45.142.114.231:8080
212.237.5.209:443
207.38.84.195:8080
104.251.214.46:8080
212.237.17.99:8080
212.237.56.116:7080
216.158.226.206:443
110.232.117.186:8080
158.69.222.101:443
107.182.225.142:8080
176.104.106.96:8080
81.0.236.90:443
50.116.54.215:443
138.185.72.26:8080
51.68.175.8:8080
210.57.217.132:8080
ECS1-----BEGIN PUBLIC KEY----- MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEQF90tsTY3Aw9HwZ6N9y5+be9Xoov pqHyD6F5DRTl9THosAoePIs/e5AdJiYxhmV8Gq3Zw1ysSPBghxjZdDxY+Q== -----END PUBLIC KEY-----
ECK1-----BEGIN PUBLIC KEY----- MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE86M1tQ4uK/Q1Vs0KTCk+fPEQ3cuw TyCz+gIgzky2DB5Elr60DubJW5q9Tr2dj8/gEFs0TIIEJgLTuqzx+58sdg== -----END PUBLIC KEY-----
Total events
9 974
Read events
9 854
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
7
Text files
2
Unknown types
5

Dropped files

PID
Process
Filename
Type
3208EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVR4D87.tmp.cvr
MD5:
SHA256:
3208EXCEL.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\WZJ000883.xlsm.LNKlnk
MD5:3007BB59CD077D220241C51C0ED577C1
SHA256:E2F1889FF6A4B485C2F9AB061FFB02363F50BE259F31B1A56D2A1E96A1437AD3
3208EXCEL.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E20BC11E69EA6FC0A4EBF4F49320B908der
MD5:6A2A3521A4EA2156858503E3584CA5D0
SHA256:A0860AFF95C598A5AF4682EDB8880E0B081C9AD05C9E4C2DAA25ED0454DF2759
3208EXCEL.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751der
MD5:54E9306F95F32E50CCD58AF19753D929
SHA256:45F94DCEB18A8F738A26DA09CE4558995A4FE02B971882E8116FC9B59813BB72
3208EXCEL.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751binary
MD5:E02745D781E7FEFD27AFB64C025CDAF3
SHA256:F9A18D13BFFFA073F60DA0BFC50D7F9707CB498B10BCACB48C9248E144CBFDBB
3208EXCEL.EXEC:\Users\admin\bestb.ocxexecutable
MD5:2F93CB3701205B257B8EF5E76545923B
SHA256:16211B428F9D5DA08B3A0D77589BF217F34558388D52D294F7D37DFE5E44B2E0
3208EXCEL.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506binary
MD5:8349BF3709C339B5031747FBA75F47B6
SHA256:3F7AA71ACA10CF681027AB701776B9B52F4F4F0A5B7955DD18E51040C5B9851C
3208EXCEL.EXEC:\Users\admin\AppData\Local\Temp\Tar63E0.tmpcat
MD5:2D8A5090656DE9FB55DD0F3BA20F9299
SHA256:44AE1E61A4E6305C15AAA52FD1B29DDB060E69233703CBA611F5E781D766442E
3208EXCEL.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506compressed
MD5:308336E7F515478969B24C13DED11EDE
SHA256:889B832323726A9F10AD03F85562048FDCFE20C9FF6F9D37412CF477B4E92FF9
3208EXCEL.EXEC:\Users\admin\AppData\Local\Temp\Cab63DF.tmpcompressed
MD5:308336E7F515478969B24C13DED11EDE
SHA256:889B832323726A9F10AD03F85562048FDCFE20C9FF6F9D37412CF477B4E92FF9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
10
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3208
EXCEL.EXE
GET
200
104.90.178.254:80
http://x1.c.lencr.org/
NL
der
717 b
whitelisted
3208
EXCEL.EXE
GET
200
92.123.195.28:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgQ8o0nj%2Fz2ePJs9pMIFRPxL2A%3D%3D
unknown
der
503 b
shared
3208
EXCEL.EXE
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?5b28546cff9a7f3b
US
compressed
60.0 Kb
whitelisted
3208
EXCEL.EXE
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?168c8e68a620006e
US
compressed
4.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3208
EXCEL.EXE
92.123.195.28:80
r3.o.lencr.org
Akamai International B.V.
suspicious
3720
rundll32.exe
31.207.89.74:8080
Propelin Consulting S.L.U.
ES
malicious
3208
EXCEL.EXE
42.2.93.31:443
ordereasy.hk
PCCW Limited
HK
unknown
3720
rundll32.exe
46.55.222.11:443
Cifrova Kabelna Korporacia EOOD
BG
malicious
3208
EXCEL.EXE
93.184.221.240:80
ctldl.windowsupdate.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3720
rundll32.exe
172.104.227.98:443
US
malicious
3208
EXCEL.EXE
104.90.178.254:80
x1.c.lencr.org
Akamai Technologies, Inc.
NL
unknown

DNS requests

Domain
IP
Reputation
ordereasy.hk
  • 42.2.93.31
unknown
ctldl.windowsupdate.com
  • 93.184.221.240
whitelisted
x1.c.lencr.org
  • 104.90.178.254
whitelisted
r3.o.lencr.org
  • 92.123.195.28
  • 92.123.195.35
shared

Threats

PID
Process
Class
Message
3720
rundll32.exe
A Network Trojan was detected
ET CNC Feodo Tracker Reported CnC Server group 19
2 ETPRO signatures available at the full report
No debug info