analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://artvest.org/roseled/dcPUN-ayTlvrr3ZdDg2C_HczkPPbP-H4Z/

Full analysis: https://app.any.run/tasks/57587e29-f0a7-4aec-8d81-a315dde29b3c
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: April 24, 2019, 05:53:14
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
emotet
trojan
Indicators:
MD5:

70F159CDA19D679C4BCD6757FBD83026

SHA1:

545876B9474049BAF8126F19346B3D12FA784414

SHA256:

586D770A23B1269F49EE9F32273B0C23BC2AF9EA466A013A08DA4322AD6660A1

SSDEEP:

3:N1KfBXRLWaWdAI1PTsUeCNCW:CZXRLWaWdAINDeCN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • utlirivcl.exe (PID: 3228)
      • soundser.exe (PID: 3448)
      • utlirivcl.exe (PID: 1012)
      • soundser.exe (PID: 3300)
      • TbWix2F.exe (PID: 3636)
      • soundser.exe (PID: 2848)
      • TbWix2F.exe (PID: 900)
      • soundser.exe (PID: 2316)
    • Downloads executable files from the Internet

      • WScript.exe (PID: 3844)
    • EMOTET was detected

      • soundser.exe (PID: 3300)
    • Emotet process was detected

      • soundser.exe (PID: 3448)
      • soundser.exe (PID: 2848)
    • Connects to CnC server

      • soundser.exe (PID: 3300)
    • Changes the autorun value in the registry

      • soundser.exe (PID: 3300)
  • SUSPICIOUS

    • Creates files in the user directory

      • WScript.exe (PID: 3844)
    • Executable content was dropped or overwritten

      • WScript.exe (PID: 3844)
      • utlirivcl.exe (PID: 1012)
      • soundser.exe (PID: 3300)
      • TbWix2F.exe (PID: 3636)
    • Executes scripts

      • iexplore.exe (PID: 2648)
    • Starts itself from another location

      • utlirivcl.exe (PID: 1012)
      • TbWix2F.exe (PID: 3636)
    • Connects to server without host name

      • soundser.exe (PID: 3300)
    • Application launched itself

      • soundser.exe (PID: 2848)
      • TbWix2F.exe (PID: 900)
  • INFO

    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2988)
    • Changes internet zones settings

      • iexplore.exe (PID: 2648)
    • Creates files in the user directory

      • iexplore.exe (PID: 2988)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
11
Malicious processes
9
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start iexplore.exe iexplore.exe wscript.exe utlirivcl.exe no specs utlirivcl.exe #EMOTET soundser.exe no specs #EMOTET soundser.exe tbwix2f.exe no specs tbwix2f.exe #EMOTET soundser.exe no specs soundser.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2648"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
2988"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2648 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3844"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\dcPUN-ayTlvrr3ZdDg2C_HczkPPbP-H4Z[1].js" C:\Windows\System32\WScript.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
3228"C:\Users\admin\AppData\Local\Temp\utlirivcl.exe" C:\Users\admin\AppData\Local\Temp\utlirivcl.exeWScript.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
1012--d1dcbc30C:\Users\admin\AppData\Local\Temp\utlirivcl.exe
utlirivcl.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3448"C:\Users\admin\AppData\Local\soundser\soundser.exe"C:\Users\admin\AppData\Local\soundser\soundser.exe
utlirivcl.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3300--3ab57678C:\Users\admin\AppData\Local\soundser\soundser.exe
soundser.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
900"C:\Users\admin\AppData\Local\soundser\TbWix2F.exe"C:\Users\admin\AppData\Local\soundser\TbWix2F.exesoundser.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Memory Diagnostic
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
3636--4b36af0dC:\Users\admin\AppData\Local\soundser\TbWix2F.exe
TbWix2F.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Memory Diagnostic
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2848"C:\Users\admin\AppData\Local\soundser\soundser.exe"C:\Users\admin\AppData\Local\soundser\soundser.exe
TbWix2F.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Memory Diagnostic
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
1 077
Read events
1 006
Write events
0
Delete events
0

Modification events

No data
Executable files
4
Suspicious files
1
Text files
15
Unknown types
3

Dropped files

PID
Process
Filename
Type
2648iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\favicon[1].ico
MD5:
SHA256:
2648iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2648iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF33D55D8507CEF5E3.TMP
MD5:
SHA256:
2988iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\index.datdat
MD5:C27983711DDA39594F7D255B37B6D8A1
SHA256:9FC40942B254AAFB1C55722E6F253FA44509082308DFF68CD10DBB8D4E3B13D9
2988iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\0VL2NC89\N-1594074-04242019[1].jstext
MD5:0048F1B910697EB8B5F1C0AC9985F102
SHA256:8870927B7FCB804322779608FABF59E1C019245DF08AAAF5F9202D131E92EFDA
2648iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\dcPUN-ayTlvrr3ZdDg2C_HczkPPbP-H4Z[1].jstext
MD5:0048F1B910697EB8B5F1C0AC9985F102
SHA256:8870927B7FCB804322779608FABF59E1C019245DF08AAAF5F9202D131E92EFDA
2648iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF8CB18D706E23030A.TMP
MD5:
SHA256:
2648iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{46234283-6655-11E9-B63D-5254004A04AF}.dat
MD5:
SHA256:
2988iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.datdat
MD5:193F7E40698CC2FBFAC7123D4CA95A7F
SHA256:C0C8BFFF790FC14459B6320BFDFA903D77B8103E4C5189BD7F68E6E906170058
2988iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.datdat
MD5:7820E6DE96874F48283DB74633BC6EB6
SHA256:B8B3BD14D9DA7F31C76E6A277997337C4CACF3B41562394CEABB09AD5082879A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
4
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3844
WScript.exe
GET
200
164.52.146.13:80
http://potterspots.com/cgi-bin/8MnY/
US
executable
78.0 Kb
suspicious
3300
soundser.exe
POST
200
24.150.44.53:80
http://24.150.44.53/prov/enable/ringin/merge/
CA
binary
120 Kb
malicious
2988
iexplore.exe
GET
200
84.244.181.203:80
http://artvest.org/roseled/dcPUN-ayTlvrr3ZdDg2C_HczkPPbP-H4Z/
NL
text
7.44 Kb
suspicious
2648
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2648
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2988
iexplore.exe
84.244.181.203:80
artvest.org
We Dare B.V.
NL
suspicious
3844
WScript.exe
164.52.146.13:80
potterspots.com
Latisys-Denver, LLC
US
suspicious
3300
soundser.exe
24.150.44.53:80
Cogeco Cable
CA
malicious

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
artvest.org
  • 84.244.181.203
suspicious
potterspots.com
  • 164.52.146.13
suspicious

Threats

PID
Process
Class
Message
3844
WScript.exe
Misc activity
SUSPICIOUS [PTsecurity] Cmd.Powershell.Download HTTP UserAgent (Win7)
3844
WScript.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3844
WScript.exe
A Network Trojan was detected
ET CURRENT_EVENTS Likely Evil EXE download from MSXMLHTTP non-exe extension M2
3844
WScript.exe
Misc activity
ET INFO EXE - Served Attached HTTP
3300
soundser.exe
A Network Trojan was detected
MALWARE [PTsecurity] Feodo/Emotet
3 ETPRO signatures available at the full report
No debug info