analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

umowa 103916299 20 09 2019.doc

Full analysis: https://app.any.run/tasks/2f302254-e261-4567-9163-405197fd2e6b
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: October 09, 2019, 18:28:24
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
emotet-doc
emotet
generated-doc
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Author: Fern Halvorson, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Fri Sep 20 07:27:00 2019, Last Saved Time/Date: Fri Sep 20 07:27:00 2019, Number of Pages: 1, Number of Words: 95, Number of Characters: 547, Security: 0
MD5:

02A166D869C56FC585D5D221D79F3352

SHA1:

3168D33210C69BA90158813D5BB02B5B734610BB

SHA256:

8322031E652553C2BDA6B6CB35946109DA7991168197565F669EA70AB5C86E6C

SSDEEP:

6144:ayGj85XuWpTEW1kKMJQqKahTUPLkI47NSU4jJntATfD:ayGj85XuWpTEW1kKMJQqKah6X47NSU44

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 1228)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 1228)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

CompObjUserType: Microsoft Word 97-2003 Document
CompObjUserTypeLen: 32
HeadingPairs:
  • Title
  • 1
TitleOfParts: -
HyperlinksChanged: No
SharedDoc: No
LinksUpToDate: No
ScaleCrop: No
AppVersion: 16
CharCountWithSpaces: 641
Paragraphs: 1
Lines: 4
Company: -
CodePage: Windows Latin 1 (Western European)
Security: None
Characters: 547
Words: 95
Pages: 1
ModifyDate: 2019:09:20 06:27:00
CreateDate: 2019:09:20 06:27:00
TotalEditTime: -
Software: Microsoft Office Word
RevisionNumber: 1
LastModifiedBy: -
Template: Normal.dotm
Comments: -
Keywords: -
Author: Fern Halvorson
Subject: -
Title: -
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
1
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1228"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\umowa 103916299 20 09 2019.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
Total events
2 433
Read events
1 997
Write events
413
Delete events
23

Modification events

(PID) Process:(1228) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:writeName:*29
Value:
2A323900CC040000010000000000000000000000
(PID) Process:(1228) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(1228) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(1228) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:WORDFiles
Value:
1330184243
(PID) Process:(1228) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:ProductFiles
Value:
1330184359
(PID) Process:(1228) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:ProductFiles
Value:
1330184360
(PID) Process:(1228) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
Operation:writeName:MTTT
Value:
CC040000E297F45CCF7ED50100000000
(PID) Process:(1228) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:writeName:%39
Value:
25333900CC04000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000
(PID) Process:(1228) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:delete valueName:%39
Value:
25333900CC04000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000
(PID) Process:(1228) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
Executable files
0
Suspicious files
0
Text files
2
Unknown types
45

Dropped files

PID
Process
Filename
Type
1228WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRFEAA.tmp.cvr
MD5:
SHA256:
1228WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\15660C6E.wmfwmf
MD5:2531E599891B63A6FBD9A8C3A7D0205F
SHA256:66CFFA4C5CCCB90E02705C91299A9A13955AD606336AB5157CBD54C0588F7E99
1228WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\66FF22AC.wmfwmf
MD5:DA140D919A511BA11F1B86C2600450AB
SHA256:DA65E2EC588257DDA1FC6CDEBB044F6DD093A6756DC49043C926503DD3F1F4C3
1228WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9D7A4386.wmfwmf
MD5:41FE45973C5808A1D32624178EF8A3EF
SHA256:F2DED5DD4E9E66C653DE6D880A73EA70065B69544E718E2299E06B8FAD3BD434
1228WINWORD.EXEC:\Users\admin\~$owa 103916299 20 09 2019.docpgc
MD5:2A44F5EACD28E44EC8D8CB898EFE0DC2
SHA256:2F7D0950E3DE27296256CDD7BDE9D8FD070D4257ED542B634ADCB72DAB4121CC
1228WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\565C0F60.wmfwmf
MD5:6822F687B3A727C5BD97A3DE8B6BB3A1
SHA256:7550E2F49E6BA0598A80C853D2C2A0C9B37E28BF5ED74BB72C4620FF0933DA95
1228WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\40ABAD59.wmfwmf
MD5:9C45DE8B38F3F13592CA6EF01E8C5C90
SHA256:D24919461FA70D651D34C0569976999DB4B74C8984F7082A13D58BCF970AE9FA
1228WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C4B2A4B8.wmfwmf
MD5:D48FD492E24CB8644144BDE409059D35
SHA256:5A3899295E3728FBF4C03D090F9EB5DB860D3CBE1796771CC65889FD4B4F8C74
1228WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4E32D1CF.wmfwmf
MD5:D5D798EB5CCCCA8796CD91C241E4AAFD
SHA256:62E88BCCAEAADE7AE17C1E28866F6F096CD54A6D81147396B5ADFF10F65DF81B
1228WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F5E07597.wmfwmf
MD5:529F8593B13CD871D745EBB790E1A520
SHA256:1654257F766D7097217A71B958396AEBD625D6DBFC33456B3BEBDC6D2A63460B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info