analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Dok_7918737646_275062031171.doc

Full analysis: https://app.any.run/tasks/0498bc12-9ae7-4d59-98cd-348a7b18edd1
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: October 09, 2019, 14:40:37
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
emotet-doc
emotet
generated-doc
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Title: Marketing, Subject: Small Soft Pizza, Author: Orin Littel, Keywords: Consultant, Comments: fuchsia, Template: Normal.dotm, Last Saved By: Eleonore Wisozk, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Wed Oct 9 07:21:00 2019, Last Saved Time/Date: Wed Oct 9 07:21:00 2019, Number of Pages: 1, Number of Words: 30, Number of Characters: 172, Security: 0
MD5:

C48BC5376CB7DBA8AA5FB0AE9030D74B

SHA1:

F515452C39EC00ABA5E97A8FFA6E85DABFC88784

SHA256:

9BAD271E422E1FD8D4504B370E458E884DBAD25C398A70A2D04DD61CF8AF00C4

SSDEEP:

1536:s7YEVyOLYoP8jJV0f8YTrkKPubsYwKjtrzu5rGumRoHynvwMMITLxQODxrt:REVyOLYB60KgdzSrGjKyIwLx31

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 2820)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2820)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

CompObjUserType: Microsoft Word 97-2003 Document
CompObjUserTypeLen: 32
Manager: Dach
HeadingPairs:
  • Title
  • 1
TitleOfParts: -
HyperlinksChanged: No
SharedDoc: No
LinksUpToDate: No
ScaleCrop: No
AppVersion: 16
CharCountWithSpaces: 201
Paragraphs: 1
Lines: 1
Company: Jenkins, Steuber and Dickens
CodePage: Windows Latin 1 (Western European)
Security: None
Characters: 172
Words: 30
Pages: 1
ModifyDate: 2019:10:09 06:21:00
CreateDate: 2019:10:09 06:21:00
TotalEditTime: -
Software: Microsoft Office Word
RevisionNumber: 1
LastModifiedBy: Eleonore Wisozk
Template: Normal.dotm
Comments: fuchsia
Keywords: Consultant
Author: Orin Littel
Subject: Small Soft Pizza
Title: Marketing
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
33
Monitored processes
1
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winword.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2820"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Dok_7918737646_275062031171.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
Total events
1 113
Read events
699
Write events
398
Delete events
16

Modification events

(PID) Process:(2820) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:writeName:t(:
Value:
74283A00040B0000010000000000000000000000
(PID) Process:(2820) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(2820) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(2820) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:WORDFiles
Value:
1330184243
(PID) Process:(2820) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:ProductFiles
Value:
1330184359
(PID) Process:(2820) WINWORD.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage
Operation:writeName:ProductFiles
Value:
1330184360
(PID) Process:(2820) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word
Operation:writeName:MTTT
Value:
040B00004CC8DF8DAF7ED50100000000
(PID) Process:(2820) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:writeName:l):
Value:
6C293A00040B000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000
(PID) Process:(2820) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems
Operation:delete valueName:l):
Value:
6C293A00040B000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000
(PID) Process:(2820) WINWORD.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
Executable files
0
Suspicious files
0
Text files
0
Unknown types
15

Dropped files

PID
Process
Filename
Type
2820WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR74.tmp.cvr
MD5:
SHA256:
2820WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:7968429B263575F5EC02AEDD8D6FAEB0
SHA256:B673BF6E2022FA4D4AD3974A548042CB8CE4FC4D8A1C247A08C8737F5FECEFDF
2820WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E57C2FC8.wmfwmf
MD5:0A1357B3D736EA58F001B227D582A6CD
SHA256:993993FD088D9B962D165578F980A715F5111E3DF92E260CA33A00B2EC0248D5
2820WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\350414BC.wmfwmf
MD5:CF914E8766059FCEBA285A7A6B459D1D
SHA256:512A1572D41DF610F54667BC6B9C1F413FC42F00ADA7E6FFA7FCE852F421656E
2820WINWORD.EXEC:\Users\admin\AppData\Local\Temp\Word8.0\MSForms.exdtlb
MD5:E1B22F56192C49E6505231BA74C267BE
SHA256:2AE0AB51887BE50E83E04840A8A75D1B6DE6BAD9031C35144BBAD68EB3335637
2820WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5172AA92.wmfwmf
MD5:9697867F657350C9A71C22E1DAC2E6EA
SHA256:87FAF16DBB975B71FBC956B08CF606A753FA79388E6B6990FFE03CD8C0584346
2820WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\68087870.wmfwmf
MD5:27F869B5D8784FC9F6E11E802EA35754
SHA256:DEEFA8278542070F9E78F3D0F79B318794DD0A9ABDD71CC95AF465C91B383085
2820WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E45EA62A.wmfwmf
MD5:033948E7E058890ECA9E0A4A8D5AF8FB
SHA256:6343B984A293E38E4824598103F3A21143043F4498979FFA80F51A67E8C4B941
2820WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\217927FE.wmfwmf
MD5:FADF87233317358B48FBA126DE8082CB
SHA256:FBF31FA828539148133A75805F17BFD75C0544A089EA9B0E05B739ED6FF56478
2820WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\57D3F58D.wmfwmf
MD5:3ED22CD0145C0429280FE1B26D816EF2
SHA256:CF7199F8297E4FCA2F003AE5A82551742DD12F43745C9FFEFBB93A05D99D966E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info