analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

http://sapeduworld.com/Clients_information/2019-01

Full analysis: https://app.any.run/tasks/40304217-b91f-4947-bf98-471022481a63
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: January 22, 2019, 19:07:34
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
opendir
emotet-doc
emotet
Indicators:
MD5:

C164C6AF3CD1E52536B4E371D9711707

SHA1:

C297035104D6E66E36D674093DA859E6BE8FCAA3

SHA256:

8E7E3EE3D355EB7CA9C2D7EABFDE0C8A49451FBDB2277560F87F5AE100E79E64

SSDEEP:

3:N1KNEVABsqKIKmXRW3MI4MKLKFy+:CWqBslmgKMK+Fy+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Reads internet explorer settings

      • iexplore.exe (PID: 3296)
    • Changes internet zones settings

      • iexplore.exe (PID: 3000)
    • Application launched itself

      • iexplore.exe (PID: 3000)
      • chrome.exe (PID: 3256)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3296)
    • Reads settings of System Certificates

      • chrome.exe (PID: 3256)
    • Changes settings of System certificates

      • chrome.exe (PID: 3256)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
48
Monitored processes
18
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3000"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3296"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3000 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
3256"C:\Program Files\Google\Chrome\Application\chrome.exe" C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
68.0.3440.106
4004"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=68.0.3440.106 --initial-client-data=0x78,0x7c,0x80,0x74,0x84,0x702f00b0,0x702f00c0,0x702f00ccC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
68.0.3440.106
3040"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=3272 --on-initialized-event-handle=304 --parent-handle=308 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
68.0.3440.106
896"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=976,5155504341040494669,13447804381796605670,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAACAAwBAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=21F36403827F66576941728A7970F846 --mojo-platform-channel-handle=1032 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Version:
68.0.3440.106
2500"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=976,5155504341040494669,13447804381796605670,131072 --enable-features=PasswordImport --service-pipe-token=7D79C3E55D4D725892D4F85948EB4620 --lang=en-US --instant-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=7D79C3E55D4D725892D4F85948EB4620 --renderer-client-id=5 --mojo-platform-channel-handle=1900 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
68.0.3440.106
2804"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=976,5155504341040494669,13447804381796605670,131072 --enable-features=PasswordImport --service-pipe-token=BA2B5DD86D5C5AFA6A4DBEC5CDE0EF80 --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=BA2B5DD86D5C5AFA6A4DBEC5CDE0EF80 --renderer-client-id=3 --mojo-platform-channel-handle=2076 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
68.0.3440.106
2616"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=976,5155504341040494669,13447804381796605670,131072 --enable-features=PasswordImport --disable-gpu-compositing --service-pipe-token=16EDA6ABB5F4C7BB2B7D123F9E82A4D1 --lang=en-US --instant-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=16EDA6ABB5F4C7BB2B7D123F9E82A4D1 --renderer-client-id=6 --mojo-platform-channel-handle=3528 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
68.0.3440.106
2352"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=976,5155504341040494669,13447804381796605670,131072 --enable-features=PasswordImport --disable-gpu-compositing --service-pipe-token=09DFEF9AD9FDB23C511F6D136A51657D --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=09DFEF9AD9FDB23C511F6D136A51657D --renderer-client-id=7 --mojo-platform-channel-handle=3628 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
68.0.3440.106
Total events
901
Read events
782
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
74
Text files
86
Unknown types
16

Dropped files

PID
Process
Filename
Type
3000iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[1].ico
MD5:
SHA256:
3000iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3000iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFAC9100E125420E85.TMP
MD5:
SHA256:
3000iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF4178F4847B4B92EB.TMP
MD5:
SHA256:
3000iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{0286DE23-1E79-11E9-AA93-5254004A04AF}.dat
MD5:
SHA256:
3256chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\0c65a3a6-d376-4821-aa89-4ca4e1aaac94.tmp
MD5:
SHA256:
3256chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB\000016.dbtmp
MD5:
SHA256:
3256chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000016.dbtmp
MD5:
SHA256:
3000iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{0286DE24-1E79-11E9-AA93-5254004A04AF}.datbinary
MD5:D13056FDF9C82DB32A93E5E7123BD444
SHA256:53FD0A4AD2D3B39F7211470C665490E3F6EF9831BD53F7C673E42B69C86A7D47
3256chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.oldtext
MD5:92BE6B127E72365885AD4C3FB6534EE2
SHA256:54302A2573ACC775720E7DB0AD85873276713302B4F72596A8DCC44B01C70E51
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
49
DNS requests
32
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3256
chrome.exe
GET
301
51.15.160.40:80
http://sapeduworld.com/
FR
malicious
3256
chrome.exe
GET
200
23.37.43.27:80
http://s.symcd.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS56bKHAoUD%2BOyl%2B0LhPg9JxyQm4gQUf9Nlp8Ld7LvwMAnzQzn6Aq8zMTMCEHiupDHBXOt1ew2KYQp0jmc%3D
NL
der
1.71 Kb
shared
3256
chrome.exe
GET
200
23.37.43.27:80
http://s.symcd.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS56bKHAoUD%2BOyl%2B0LhPg9JxyQm4gQUf9Nlp8Ld7LvwMAnzQzn6Aq8zMTMCEHiupDHBXOt1ew2KYQp0jmc%3D
NL
der
1.71 Kb
shared
3256
chrome.exe
GET
200
91.199.212.52:80
http://crt.comodoca.com/COMODOECCAddTrustCA.crt
GB
der
980 b
whitelisted
3296
iexplore.exe
GET
200
51.15.160.40:80
http://sapeduworld.com/Clients_information/2019-01/
FR
xml
199 Kb
malicious
3256
chrome.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQu7Xbjq6rqggE7PFAsQRgy8Q8tzwQUkEeKG4TToN%2BkJNYZtBf1IaOym6gCEA7fr0YLsTZHJYxFeyuWNYA%3D
US
der
471 b
whitelisted
3256
chrome.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQu7Xbjq6rqggE7PFAsQRgy8Q8tzwQUkEeKG4TToN%2BkJNYZtBf1IaOym6gCEA7fr0YLsTZHJYxFeyuWNYA%3D
US
der
471 b
whitelisted
3296
iexplore.exe
GET
301
51.15.160.40:80
http://sapeduworld.com/Clients_information/2019-01
FR
html
259 b
malicious
3256
chrome.exe
GET
200
93.184.220.29:80
http://status.geotrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTIyCPRUzvKHRw7iRE1lF%2BfcLu%2FjgQUypJnUmHervy6Iit%2FHIdMJftvmVgCEAUl1nAlam2BKXpyow8ex1A%3D
US
der
471 b
whitelisted
3000
iexplore.exe
GET
200
13.107.21.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3000
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3256
chrome.exe
216.58.208.35:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
3000
iexplore.exe
13.107.21.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3256
chrome.exe
172.217.22.42:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
3256
chrome.exe
172.217.23.163:443
www.gstatic.com
Google Inc.
US
whitelisted
3256
chrome.exe
172.217.16.163:443
www.google.de
Google Inc.
US
whitelisted
3296
iexplore.exe
51.15.160.40:80
sapeduworld.com
Online S.a.s.
FR
suspicious
3256
chrome.exe
172.217.16.173:443
accounts.google.com
Google Inc.
US
whitelisted
3256
chrome.exe
172.217.18.174:443
apis.google.com
Google Inc.
US
whitelisted
3256
chrome.exe
216.58.207.67:443
ssl.gstatic.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
sapeduworld.com
  • 51.15.160.40
malicious
www.google.de
  • 172.217.16.163
whitelisted
clientservices.googleapis.com
  • 216.58.208.35
whitelisted
www.gstatic.com
  • 172.217.23.163
whitelisted
safebrowsing.googleapis.com
  • 172.217.22.42
whitelisted
accounts.google.com
  • 172.217.16.173
shared
ssl.gstatic.com
  • 216.58.207.67
whitelisted
apis.google.com
  • 172.217.18.174
whitelisted
www.google.com
  • 172.217.18.100
whitelisted

Threats

PID
Process
Class
Message
3296
iexplore.exe
A Network Trojan was detected
ET TROJAN Possible malicious Office doc hidden in XML file
No debug info