File name: | MESSAGIO-20190918.doc |
Full analysis: | https://app.any.run/tasks/c58175bf-483b-41cf-9599-8d9ed74de87d |
Verdict: | Malicious activity |
Threats: | Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns. |
Analysis date: | September 18, 2019, 15:06:23 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Title: Senior Rustic Rubber Soap context-sensitive, Subject: Program, Author: Deon Raynor, Comments: benchmark, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Wed Sep 18 11:25:00 2019, Last Saved Time/Date: Wed Sep 18 11:25:00 2019, Number of Pages: 1, Number of Words: 95, Number of Characters: 547, Security: 0 |
MD5: | C8B555A63EC6129A8225DF58751B4D46 |
SHA1: | 27AB9487F61768F59EC5298B67A59AA70C33214F |
SHA256: | 7A9302228EB206C7D5863DD28BC87DC022499860069B79A1689BE452657812DC |
SSDEEP: | 6144:Mupm1VmTG3cBubZMHY6I2KDNTto08WQxqLkI47NSU4jJntATfDd:Mupm1VmTG3cBubZMHY6I2KDNTto08WQJ |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
Title: | Senior Rustic Rubber Soap context-sensitive |
---|---|
Subject: | Program |
Author: | Deon Raynor |
Keywords: | - |
Comments: | benchmark |
Template: | Normal.dotm |
LastModifiedBy: | - |
RevisionNumber: | 1 |
Software: | Microsoft Office Word |
TotalEditTime: | - |
CreateDate: | 2019:09:18 10:25:00 |
ModifyDate: | 2019:09:18 10:25:00 |
Pages: | 1 |
Words: | 95 |
Characters: | 547 |
Security: | None |
CodePage: | Windows Latin 1 (Western European) |
Company: | Walter and Sons |
Lines: | 4 |
Paragraphs: | 1 |
CharCountWithSpaces: | 641 |
AppVersion: | 16 |
ScaleCrop: | No |
LinksUpToDate: | No |
SharedDoc: | No |
HyperlinksChanged: | No |
TitleOfParts: | - |
HeadingPairs: |
|
Manager: | Stamm |
CompObjUserTypeLen: | 32 |
CompObjUserType: | Microsoft Word 97-2003 Document |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3416 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\MESSAGIO-20190918.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3416 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR9CE1.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3416 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$SSAGIO-20190918.doc | pgc | |
MD5:9A97FC4C80D458D269BAA1DCA62854C1 | SHA256:694BBA5A02E4703A60E354FA9A4AEB100278C4835224DD2728582CB0C959865F | |||
3416 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\Word8.0\MSForms.exd | tlb | |
MD5:7A23C97E89E66BE9B2EFB73CDEC87791 | SHA256:F25C436B9D4D71B90412170AA2555D35E6ACF118CEEE871AD427A3BF1DCE1BC2 | |||
3416 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E8CAF7C9.wmf | wmf | |
MD5:EE4E7E8F7AE880E1F706D0E3698E02E1 | SHA256:AF1AD11A37EDA082BAC772393C0E4181134A51682E63E7E96CEB45D6CA84E7C4 | |||
3416 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\83372B0B.wmf | wmf | |
MD5:AFF53A8D48DD1DAFD3C3E388054B5527 | SHA256:5BA2E2AFCDBDA9FE170929606A89309F99A888CE2995BDB13F523D8C9DB3163B | |||
3416 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BBCAC604.wmf | wmf | |
MD5:9E2DE41C0445D0283CC05B2D168ACE26 | SHA256:52CB365F73C8226E769C1AA8765881932EB65D8F881B2C932ABCC8608A09C5C5 | |||
3416 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DA64C451.wmf | wmf | |
MD5:D4288E0800826368E57BF9592010ADD5 | SHA256:65D335AC22C2817FF8C848137B62D93B454AE5E2CFECCD1B005B4EC4CED64C47 | |||
3416 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A97435C3.wmf | wmf | |
MD5:959559C6E42FC25918C876853D9BB69C | SHA256:344C7303C91ECC57766D822417BE15D203EA99588352A7F786B903563B870D58 | |||
3416 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\73BB684F.wmf | wmf | |
MD5:EA0C9997579D3523446A8D08E957E954 | SHA256:3E269C34542807668CE5D957F60623C1C8C9FABFA4C101D2E32193F502AF532A | |||
3416 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:62F2DA178DD59EBA6B61EE250E55F925 | SHA256:8CF938206B83D51659082A32A71F3A9F077217F5A2E07A98541350C60245A244 |